last executing test programs: 2.908193743s ago: executing program 2 (id=5411): r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000640)={0x1e, 0x4, &(0x7f0000000040)=ANY=[], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x4, '\x00', 0x0, 0x24, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x3}, 0x94) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x1, 0x4, 0xcc, 0xc}, 0x50) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x15, &(0x7f0000000280)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000080850000008200000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000001c0)={0xffffffffffffffff, 0x58, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r4 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000340)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x6, [@array={0x0, 0x0, 0x0, 0x3, 0x0, {0x4, 0x1, 0x8000}}]}, {0x0, [0x5f, 0x61, 0x0, 0x2e]}}, &(0x7f0000000440)=""/234, 0x36, 0xea, 0x1, 0x9e, 0x10000}, 0x28) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000940)={r0, 0xe0, &(0x7f0000000840)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f00000005c0)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x3, 0x5, &(0x7f0000000600)=[0x0, 0x0, 0x0], &(0x7f0000000700)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x61, &(0x7f0000000740)=[{}, {}, {}], 0x18, 0x10, &(0x7f0000000780), &(0x7f00000007c0), 0x8, 0x8d, 0x8, 0x8, &(0x7f0000000800)}}, 0x10) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x5, 0x400, 0x9, 0x1}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r6], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r7 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000980)={0x1b, 0x0, 0x0, 0x6a1564a7, 0x0, 0x1, 0x5, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x5, 0x2}, 0x50) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000a80)=@bpf_lsm={0x1d, 0x9, &(0x7f0000000040)=@raw=[@tail_call={{0x18, 0x2, 0x1, 0x0, r2}}, @map_idx={0x18, 0x1, 0x5, 0x0, 0x2}, @cb_func={0x18, 0xb, 0x4, 0x0, 0xfffffffffffffffc}], &(0x7f0000000180)='syzkaller\x00', 0x10, 0x48, &(0x7f0000000240)=""/72, 0x41000, 0x94, '\x00', r3, 0x1b, r4, 0x8, &(0x7f0000000540)={0x7, 0x4}, 0x8, 0x10, &(0x7f0000000580)={0x5, 0x2, 0x10, 0xfffffff8}, 0x10, r5, 0x0, 0x3, &(0x7f0000000a00)=[r6, r7], &(0x7f0000000a40)=[{0x1, 0x3, 0x10, 0x89ec6733e30b6a65}, {0x0, 0x1, 0xb, 0x3}, {0x0, 0x2, 0xe, 0x5}], 0x10, 0xc}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x3, 0xc, &(0x7f00000003c0)=ANY=[@ANYBLOB="18000000000000000000000000000000850000004f0000001801000020646c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000001700000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sched_cls, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) 2.832705779s ago: executing program 2 (id=5412): r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="02000000040000000100000080"], 0x48) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="19000000040000000400000002"], 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x14, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000000000000000000000000001801000020646c2100000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007100000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0xe, '\x00', 0x0, @fallback=0x25, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_BIND_MAP(0xa, &(0x7f0000000080)={r2}, 0xc) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) openat$ppp(0xffffffffffffff9c, &(0x7f00000003c0), 0x100, 0x0) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xae9, 0x30, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = perf_event_open(&(0x7f00000010c0)={0x2, 0x80, 0xb9, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xc, 0x7}, 0x410, 0x2000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r4 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000680)=@base={0xa, 0x16, 0xb4, 0x3}, 0x50) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000500)={0x11, 0xb, &(0x7f00000002c0)=@framed={{0x18, 0x8}, [@func={0x85, 0x0, 0x1, 0x0, 0x6}, @map_fd={0x18, 0x0, 0x1, 0x0, r4}, @generic={0x79, 0x0, 0x0, 0x48}, @initr0, @exit, @alu={0x5, 0x0, 0xd, 0xa}]}, &(0x7f0000000000)='GPL\x00', 0x2, 0xee, &(0x7f0000000340)=""/238}, 0x94) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x40082406, 0x0) bpf$MAP_DELETE_ELEM(0x2, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000340)) perf_event_open(&(0x7f00000002c0)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_LOOKUP_ELEM(0x5, &(0x7f00000000c0)={0xffffffffffffffff, &(0x7f0000000000), &(0x7f0000000040)=""/73}, 0x70) r5 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400), 0x0, 0x0) syz_clone(0xc0001480, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$TUNSETQUEUE(r5, 0x400454d9, &(0x7f0000000380)={'veth1_to_team\x00'}) close(0x3) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x2, 0x4, 0x6, 0x1}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000400)={0xd, 0x10, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bf8100000000000007080000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018210000", @ANYRES32=r0, @ANYBLOB="0000000002000000b705000008000000850000005e00000095", @ANYRES16], &(0x7f0000000300)='GPL\x00', 0x2, 0x1002, &(0x7f0000002500)=""/4106, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0xfffffffffffffdf8, 0x10, 0x0, 0x34, 0x0, 0x0, 0xfffffffffffffe65}, 0x23) 2.585594903s ago: executing program 4 (id=5414): r0 = perf_event_open(&(0x7f00000010c0)={0x2, 0xfd32, 0xb9, 0x0, 0x0, 0x0, 0x0, 0x4, 0x8000, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xc, 0x7}, 0x410, 0x2000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002c80)={0x3, 0xc, &(0x7f0000000500)=ANY=[@ANYBLOB="1802000002000000000000000000000085000000870000001801000020786c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000009b0000009500000000000000150511203fb0882e4d2daf4d63c71dd50a282e707847831514b53142a30e4ed5c31d601563438e1c516544fc658f1244f1567b811985d944c76ca91fea9db4ea826b053069a291b3f309e74aba82192ea57289673ca6453a02ea143410c30a3236daf9a64df983b280d79f3d32a937764789ae7c14901a8b390f816d39ab47983ac9e5437639f1"], &(0x7f0000000080)='syzkaller\x00'}, 0x88) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000002c0)={r1, 0x0, 0xe, 0x0, &(0x7f0000000100)="e0b9547ed387dbe9abc89b6f5bec", 0x0, 0x2000, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) r2 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000d80)={0x18, 0x5, &(0x7f0000000480)=ANY=[@ANYBLOB="180100"], 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x94) (async) bpf$PROG_LOAD(0x5, 0x0, 0x0) (async) bpf$BPF_PROG_TEST_RUN(0x1c, &(0x7f0000000400)={0xffffffffffffffff, 0x3, 0x16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) (async) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r2) (async) perf_event_open(&(0x7f00000004c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x20a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) (async) perf_event_open(0x0, 0x0, 0xfffbffffffffffff, 0xffffffffffffffff, 0x0) (async) socketpair$unix(0x1, 0x2, 0x0, 0x0) (async) close(0xffffffffffffffff) syz_clone(0x11, 0x0, 0x0, 0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) (async) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000001c0)={0xe, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="1800000000000000000000000000000000006c"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0xf}, 0x90) (async) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000002500)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r3, 0x18000000000002a0, 0xfe, 0x60000000, &(0x7f0000000100)="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", 0x0, 0xfe, 0x60000000}, 0x2c) (async) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x4030582a, &(0x7f0000000040)) (async) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r5, 0x4030582a, &(0x7f0000000040)=0xc00600000000c006) (async) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) (async) syz_open_procfs$namespace(0x0, &(0x7f0000000300)='ns/mnt\x00') bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000380)=ANY=[@ANYBLOB="9feb010018000000000000001c000000e9ffffff01cbe4d278b113f1010281b860dbdd285caff67508e6fbc636020000c01d198679161b3604000020000000"], 0x0, 0x26, 0x0, 0x1}, 0x28) 2.471768192s ago: executing program 4 (id=5415): perf_event_open(&(0x7f00000010c0)={0x2, 0x80, 0xb9, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xc, 0x7}, 0x410, 0x2000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='devices.list\x00', 0x26e1, 0x0) close(r0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000001000)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$unix(r1, &(0x7f0000001140)={0x0, 0x2, &(0x7f0000001040)=[{&(0x7f00000015c0)=""/4096, 0x7ffff000}], 0x1, 0x0, 0x0, 0x808e}, 0x40000100) ioctl$TUNATTACHFILTER(r0, 0x401054d5, &(0x7f0000000040)={0x8, &(0x7f0000000000)=[{0x6, 0x7f, 0x0, 0x80000000}, {0x1, 0xd, 0x8, 0x2}, {0x3, 0x5, 0xf5, 0xcf}, {0x3, 0x2, 0x4d, 0x7}, {0x3, 0x1, 0x57, 0x9746}, {0x6d, 0x9, 0xa, 0x3}, {0x5, 0x9, 0x4, 0x7}, {0x8, 0x1, 0xff, 0xd9f8}]}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x5452, &(0x7f0000000400)='lo\x00\x96o\xd6Q\xb4Y\xa9\xc87,%\x81\xfe\x00\xd2\xd1|\x00\x00\x00\x00\x00\x00\xe3\xd8Yk\xdf\x85\xaac{\x8c\x8ffp`-\xcd\xd9\xd5\xf4\xe68\xe6O\xc2\xf1V0\x8b\t\xed\x13q2\xdd\xcc\xeeR\xf2/\xba\fE>k\a\xe7>t7\x8e(\xf0\x87d\xaf\x93\xfa`\xa6,o\x81.\x1cR\xa5\t\x00\x00\x00\x00\x00\x00\x00|pT\x15\xbc\f*d\xcb\xc2\xcd\x8f\x98\xdf\x00\x00\x1cM\x9c\xa5\xe0\xa8\x00\x00\x00\x80V\xf6\x80\x86\x1b\x05\xe6\"\x1d\f\xaey\x06\xd9$H!w\xa6m\xd8\x7f\xc6\x837\x83/\x9a\xdf\x01\xf2\x9e\xbb\xca\x04\x00\x05\xeb\xb8{7[\xf9\xe9\x15\xdc0]\x89\x9b~\x04\xb4\xa5\xad\v.\xd0*%`\xb0\x03\x00\x00\x00\x00\x00\x00\x00\xab\xf4\xa7\x83r\xa4\x80|\x03C\x9c\x00\xac\xba\xcb\xa4h\x86w_Eu\xbfy%,\xe5\n\xc1\xb3\xa4g\xa3P\x0f\x11\x93\xc7\xf3\xcf\x17\xf5\x86%\x7f\xec\xb2\xc5E\x00\xb2e\xa8\xf1<\xb2\xc82\xbf=o\x00\x00\x00\x00E\x00\xc6X\x92\x0e[\x19\xaa?\x06\xe5\x9d\xd1\x87\x922A\x95\x8e\xbc\xc80xffffffffffffffff}) sendmsg$unix(r0, &(0x7f00000006c0)={0x0, 0x0, 0x0}, 0x0) (async) sendmsg$unix(r0, &(0x7f00000006c0)={0x0, 0x0, 0x0}, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000500)='memory.numa_stat\x00', 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000900)={0x5, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) bpf$PROG_LOAD(0x5, &(0x7f0000000900)={0x5, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @cgroup_skb, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x94) bpf$MAP_CREATE(0x0, &(0x7f0000001d00)=ANY=[@ANYBLOB="0b00000005000000050000000900000001"], 0x48) (async) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000001d00)=ANY=[@ANYBLOB="0b00000005000000050000000900000001"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000740)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b708000008"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x37, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) bpf$PROG_LOAD(0x5, &(0x7f0000000740)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b708000008"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x37, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000200)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)) openat$tun(0xffffffffffffff9c, &(0x7f0000000100), 0x81142, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x15, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @sk_reuseport=0x27, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000001c0)={0x10, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="b4000000000000007910480000000000610400000000000095"], 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sk_msg}, 0x94) r3 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="0200000004000000080000000100000080000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/17], 0x48) bpf$MAP_LOOKUP_ELEM(0x5, &(0x7f00000000c0)={r3, &(0x7f0000000000), &(0x7f0000000280)=""/73}, 0x20) (async) bpf$MAP_LOOKUP_ELEM(0x5, &(0x7f00000000c0)={r3, &(0x7f0000000000), &(0x7f0000000280)=""/73}, 0x20) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f00000004c0)={r2, &(0x7f0000000340), &(0x7f00000005c0)=""/155}, 0x20) ioctl$TUNSETCARRIER(r1, 0x400454e2, &(0x7f0000000580)) bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x11, 0x13, &(0x7f0000000380)=ANY=[@ANYBLOB="180000000000000000000000000000001801000020646c1300000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000048aa008085000000710000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000700000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x2, '\x00', 0x0, @fallback=0x30, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x11, 0x13, &(0x7f0000000380)=ANY=[@ANYBLOB="180000000000000000000000000000001801000020646c1300000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000048aa008085000000710000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000700000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x2, '\x00', 0x0, @fallback=0x30, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_BIND_MAP(0xa, &(0x7f0000000540)={r4}, 0xc) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r2], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2c, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="1b000000000000000000"], 0x48) socketpair(0x10, 0x0, 0xb, &(0x7f0000000000)) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r5], 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x94) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000180)={r5, &(0x7f0000000040)="58839b410385b0dc97859a1496507f169a2115bde446b0abf9fcc8bab1daceb2381c0aae143cdae44ee59c2eb44104", &(0x7f0000000800)=""/235}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xa, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x9, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xa, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x9, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000001200)={r6, 0x2000000, 0xe, 0x0, &(0x7f0000000200)="63eced8e46dc3f07df33c9f7b986", 0x0, 0xffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) (async) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000001200)={r6, 0x2000000, 0xe, 0x0, &(0x7f0000000200)="63eced8e46dc3f07df33c9f7b986", 0x0, 0xffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) 1.92634986s ago: executing program 2 (id=5421): r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000000b00)=ANY=[@ANYBLOB="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"], &(0x7f0000000000)='GPL\x00', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xd, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x4a, 0x5, 0x0, 0x0, 0x0, 0x200000000000f, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x1, @perf_bp={0x0, 0x4}, 0x0, 0x1, 0x0, 0x4, 0x0, 0x2, 0x2000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) r1 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x4a, 0x5, 0x0, 0x0, 0x0, 0x200000000000f, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x1, @perf_bp={0x0, 0x4}, 0x0, 0x1, 0x0, 0x4, 0x0, 0x2, 0x2000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r0) (async) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r0) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x7, 0x10001, 0x9, 0x1}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r2, &(0x7f0000000080), &(0x7f0000000200)=""/166}, 0x20) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000480)={r2, 0x0, &(0x7f0000000380)=""/243}, 0x20) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) sendmsg$tipc(r3, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20008040}, 0x4000011) (async) sendmsg$tipc(r3, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20008040}, 0x4000011) r4 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000940)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_config_ext={0x8000000000000000, 0x5}, 0x4130, 0x0, 0x0, 0x5, 0x0, 0x0, 0xfff4}, 0x0, 0x0, r4, 0x0) (async) perf_event_open(&(0x7f0000000940)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_config_ext={0x8000000000000000, 0x5}, 0x4130, 0x0, 0x0, 0x5, 0x0, 0x0, 0xfff4}, 0x0, 0x0, r4, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x4, 0x2}, 0x0, 0x0, r4, 0x0) syz_clone(0x200400, 0x0, 0x0, 0x0, 0x0, 0x0) (async) syz_clone(0x200400, 0x0, 0x0, 0x0, 0x0, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.current\x00', 0x275a, 0x0) write$cgroup_pid(r5, &(0x7f0000000000), 0x2a979d) write$cgroup_subtree(r5, &(0x7f0000000140)={[{0x2d, 'perf_event'}, {0x6, 'freezer'}, {0x2d, 'rlimit'}, {0x2d, 'cpuset'}, {0x2b, 'cpu'}, {0x2d, 'cpuset'}, {0x2b, 'pids'}, {0x2b, 'rdma'}]}, 0x3e) 1.87182246s ago: executing program 3 (id=5422): bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="06000000040000000800000008"], 0x48) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xd, &(0x7f0000000040)=ANY=[@ANYBLOB="180100001700000000000000ff000000850000006d00000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000002007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008002010b704000000000000850000000100000095"], &(0x7f00000001c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_BIND_MAP(0xa, &(0x7f0000000340)={r1}, 0xc) r2 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0x0}, 0x48) r3 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000007c0)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) r4 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000080)={0x1b, 0x0, 0x0, 0x6, 0x0, r2, 0x1, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x2}, 0x50) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000000)=r4, 0x4) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x482, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_bp={0x0, 0xa}, 0xc05}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f0000000040)=@framed={{0xffffffb4, 0x5, 0x0, 0x0, 0x0, 0x61, 0x10, 0x4}, [@ldst={0x3, 0x0, 0x3, 0x1c10a1, 0x0, 0x2c}]}, &(0x7f0000003ff6)='GPL\x00', 0x5, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @sk_skb}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000840)={0x2, 0x1c, &(0x7f0000000d80)=ANY=[@ANYBLOB="1808000040000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000005000000bca900000000000035090200000300006e000d0000000000b702000000000000739af0ff00000000c509000035000800c3aaf0ff00000000bf8600000000000007080000f8ffffffbfa400000000000007040000f0ffffffd50200000800000018220000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7050000080000004608f0ff76000000bf9800000000000056080000020000008500000007000000b70000000000000095"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) 1.795640685s ago: executing program 3 (id=5425): r0 = perf_event_open(&(0x7f0000000fc0)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x1000000000000400, 0xf6103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, @perf_bp={0x0, 0x8}, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz0\x00', 0x1ff) r1 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xe, 0x66c}, 0x104101, 0x4, 0x0, 0x1, 0x0, 0x0, 0x1}, 0x0, 0x1, 0xffffffffffffffff, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x5, 0x5, &(0x7f0000000180)=ANY=[@ANYBLOB="180800000000000000000000000000001800000000000000000000000000000095"], &(0x7f0000000280)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x48, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r2) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r4 = openat$cgroup_int(r3, &(0x7f0000000100)='blkio.reset_stats\x00', 0x2, 0x0) write$cgroup_int(r4, &(0x7f0000000040)=0x2000000000009237, 0x12) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x14, &(0x7f0000000400)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000010000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000020850000000400000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000001c0)=@generic={&(0x7f0000000180)='./file0\x00', r5}, 0x18) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x5, &(0x7f0000000440)=ANY=[@ANYBLOB="1809000000ffffff00000000000000008510000002000000850000000f0000009500000000000000"], 0x0, 0xfffffdff, 0x0, 0x0, 0x727c45cd4283345, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r7 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETIFF(r7, 0x400454ca, &(0x7f0000000000)={'pim6reg1\x00', 0x2}) ioctl$TUNSETLINK(r7, 0x400454cd, 0x30a) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0b00000005000000010001000900000001"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x14, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000000000000000000000000001801000020646c2100000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000007000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffbf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r8 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x7, 0x6, &(0x7f0000000000)=ANY=[@ANYBLOB="05000000000000007111ae00000000008510000002000000850000000500000095000000000000009500a50500000000"], &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x6}, 0x70) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000100)={0xffffffffffffffff, 0xe0, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38, 0x0, 0xfffffffffffffde1, 0x10, &(0x7f0000002e00), &(0x7f0000000300), 0x8, 0x0, 0x8, 0x0, 0x0}}, 0x10) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000340)={r8, 0xe0, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0}}, 0x10) r9 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x14, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000000000000000000000000001801000020646c2100000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007100000018110000", @ANYRES32=r9], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0xe, '\x00', 0x0, @fallback=0x25, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r6) syz_clone(0x40020000, 0x0, 0x0, 0x0, 0x0, 0x0) 1.706427479s ago: executing program 2 (id=5426): r0 = perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x100, 0x10020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xe}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$ITER_CREATE(0xb, &(0x7f0000000100), 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$sock_attach_bpf(r2, 0x1, 0x2d, &(0x7f0000000040)=r1, 0x4) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000380)=ANY=[@ANYBLOB="1b00000000000000000000000080000000000000", @ANYRESOCT=r2, @ANYBLOB="000000000000000004c569629895312c9f8920c41fb64a8bcd", @ANYRES32=0x0, @ANYRES32, @ANYBLOB="00b9226c2a0000000000000000000000000000000005000000000000"], 0x50) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1801000011000000000000000000000018120000", @ANYRES32=r3, @ANYBLOB], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x4, &(0x7f0000000480)=@framed={{0x18, 0x2, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x8000}, [@call={0x85, 0x0, 0x0, 0x75}]}, 0x0}, 0x94) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x7, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) socketpair(0x14, 0x0, 0x0, &(0x7f0000000000)) r6 = getpid() socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000200)) r7 = perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x9, 0x5}, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x3}, r6, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r8 = perf_event_open(&(0x7f0000000fc0)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x400, 0xfe327, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, @perf_bp={0x0, 0x8}, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB], 0x48) bpf$MAP_CREATE(0x0, 0x0, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x8, 0xb, &(0x7f0000000180)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r9 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0xb, 0xb9, 0x10001, 0x9, 0x1, 0x1}, 0x50) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000000)={r9, &(0x7f0000000180), &(0x7f0000000680)=""/141}, 0x20) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000100)={r9, &(0x7f00000000c0), &(0x7f0000000280)=""/239}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x6, 0xc, &(0x7f00000001c0)=ANY=[], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @xdp, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r10 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r8, 0x40042408, r10) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r8, 0x40042409, 0x1) ioctl$PERF_EVENT_IOC_SET_BPF(r7, 0x40042408, r5) syz_clone(0x60000400, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xe, 0x6, &(0x7f0000000000)=ANY=[], &(0x7f0000000080)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @sk_skb=0x4, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, r4}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r11 = bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r11) 1.33695883s ago: executing program 3 (id=5428): perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x56, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="05000000030000000200000002"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x20000000000000fe, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x1, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x10, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$sock_attach_bpf(r2, 0x1, 0x32, &(0x7f0000000180)=r1, 0x4) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff}) recvmsg$unix(r4, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r5, &(0x7f0000000580)=ANY=[@ANYBLOB="8fedcb791f6f9875f37538e486dd6317ce8100072b00fe08000e40000200875a65969ff57b00ff020000000000000000000000000001"], 0xfdef) sendmsg$tipc(r5, &(0x7f00000007c0)={&(0x7f0000000200)=@id={0x1e, 0x3, 0x0, {0x4e24, 0x4}}, 0x10, &(0x7f0000000740)=[{&(0x7f0000000240)="054bea257cc6304eed727df0df23da158fcdf2a947b9cfe3e412e57331ab2260ff2b6aba4ca253ade6baa388a4a0cecbd3e86c20b2ce81650bbfb0f3e0896d3d35eaadc8285f8d963288da6b16746badb8582fd38c683c45ac64ecc312c3f0277c107c01a8a8866119bd9f918521a2566b34f4d799a3b1fe42217828ef26f7350f207baa9d03e3797847aa117bdc5b8bdc06407f539de2e7b5831182e8d0bcf7c6fbdf65803cc44e9c4d866e09af29c304558413a27fb9e93d46806d124bbae077c478ea8754a74a", 0xc8}, {&(0x7f0000000340)="c306c2aef28671a50aef62351a01bc31f7bebf9bd9bc708eddea4c4c1776d6391f13343e8ea3cb17cbf153e2f09ee110caafbcd0790bd63141e45e025f4cd158fbed01976e4f02e57012e9ea3c253c44fb8c8619bd88d9a0514f8ca655892622b367e2e837c6c17b1de7da6311c1ee8e4dcc8e0b1ea913ebd4771a8c671d67af5d015f68f7c17bccda551af6c23fb0e68cd66f733b2d57291ac66758e0b5f2ca56a5d2107d0ac583e62c1901eca328fe99696e", 0xb3}, {&(0x7f00000004c0)="b2ef20eb3416dde506793db14f381da8839bcd4a5d626c9b3ecfb3925b58ce6b01fb6fb0fdc55f62f5c243f4eb5eb3dea792e16923145fb7fe989ccfcf1d19f9d7262836e24c693f7047e05f7a9d05a8fef00a69224ede85f85e83b2c8395283cc44e43106115fa6552b2b53e4", 0x6d}, {&(0x7f0000000540)="0b5145fc5cb9152813b4bd6fd95283fc81855b906eef7d094ed5608d5b230dceff055c5541fd31e0e7fa4ae8eef0705ba0eef4eb882767e3d96af1cab48cece0b14717772f785e9c9f7f53c5ee9ee8acb5391a13323963c14896056b148455a8fbe63a689cb4310b6c7ca0f176276e43aca148a08669e434bca1c6b0b185", 0x7e}, {&(0x7f0000000400)="0170d4964a3cf29a66fb01c83310a97580d08880c6e7a647b0a339373aab17da", 0x20}, {&(0x7f00000005c0)="6d99229d95fa59c61e8d6e08564bc32cd7f395f476aae527fd0811279bd587d7ed4372c34eb8d407e412dbc35ba83b8aef852e1d56901dbe7225894eeeafbfcce7e08e8bb898360757afad2523a98d0e4c9bc7262f09da600d531659c34c988113edc7e2b7d713fc0fdce3ca5e71d282c0aa5562af81bd6c999d56d8809528db4a572dc38abce8ab483c9bd147e98cb0fc8baf9994aa000d97e177e201aade5621a3292314d029b0658d495d6e8e3263c447ef34d5bf9387047d41b3c3802a6ef523d744d11246c13b8e8f2cd93dcb996bfc010263676aa188e57771281db4328ac38e2079b82e4cc96f0edca971", 0xee}, {&(0x7f00000006c0)="ebd463154dcddee9fff9d2249268abec9188d535957d314456e3bf02ae49bc7bd4b78a4df3fbb92f164fead430a1dd239a3246db0280559a39366950b69cee2fcdf8658ea45ea718611da04741d5558bdc28571bf0f98c97a0933b3e0e9af3e3c5c69504f54a8640755831c1f1f3eb70b93706f5e29b35b8dcbf", 0x7a}], 0x7, &(0x7f0000000a00)="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", 0xfc}, 0x4000800) sendmsg$inet(r3, &(0x7f0000000100)={0x0, 0x0, 0x0}, 0x20000000) 1.155251016s ago: executing program 0 (id=5430): r0 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="1b00000000000000000000000000040000000000", @ANYRES32=0x0, @ANYBLOB="000000000000000000001c000000000000000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB='\x00'/28], 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000280)={0xffffffffffffffff, 0xe0, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, &(0x7f0000000000)=[0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x6, &(0x7f0000000040)=[0x0], &(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x8c, &(0x7f00000000c0)=[{}], 0x8, 0x10, &(0x7f0000000100), &(0x7f0000000200), 0x8, 0x8f, 0x8, 0x8, &(0x7f0000000240)}}, 0x10) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000400)=ANY=[@ANYBLOB="0300000004000000040000000a00f40000000000", @ANYRES32=0x1, @ANYBLOB="0200"/20, @ANYRES32=r1, @ANYRES32, @ANYBLOB="04000000040000000200"/28], 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000002c40)={0x12, 0x17, &(0x7f0000000140)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b702000014000000b703000000000000850000000f000000bf09000000000000550901000074f6967d00000000000000180100002020702500000000002020207baaf8ff00000000bda100000000000027010000f8ffffffb702000008000000b7030000000000002500000006000000be91000000000000b502ecffffff00008500000005000000b70009000000000095"], &(0x7f00000002c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @cgroup_sock_addr=0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) 1.145961385s ago: executing program 4 (id=5431): r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000000)='..\x00') r1 = bpf$ITER_CREATE(0x21, &(0x7f0000000200), 0x8) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000400)={r1, 0x22, &(0x7f0000000680)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0xfffffd00) bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x11, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', r2, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$TUNSETIFINDEX(r0, 0x400454da, &(0x7f0000000080)=r2) r3 = syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000000)) openat$cgroup_ro(r3, &(0x7f0000000040)='cgroup.stat\x00', 0x60ff, 0x8cffffff) 1.052569227s ago: executing program 4 (id=5432): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000b40)=ANY=[@ANYBLOB="0580000006000000080000080c00000001000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYBLOB="3da60c31da5f1d1bb4f1ca36cd8b25c8dfcadd451668fcae01cdf91998dbf12d6f43317f45ba2a1a299bd561d0a2e82b1c3efa0b68be7a6f", @ANYRES32, @ANYBLOB="000000000000de4439026f96b264c5f200"/38], 0x50) (async) bpf$PROG_LOAD(0x5, &(0x7f00000006c0)={0x6, 0xe, &(0x7f00000008c0)=ANY=[@ANYBLOB="b7020000000d0000bfa30000000000000703000000feffff7a0af0fff8ffff1971a4f0ff00000000b7060000080000006f6400000000000045040400010000001704000001000a00b7040000ff0100006a0a00fe0000000085000000bd000000b70000000000000095000000000000009e17f199a68b06d83298a8cdc21ce784909b849d5550ad857d0454d8877a6db61d69f2ffcaa10350e11cb97c8adf1bc9a0c4eeceb9971e43405d621ffbc9ce000000d8ca56b50d0c010d631f6dde53a9a53608c10556e5734eb84049761451ce540c772e2d9f8004e26f7fcc059c062234d5595f6fbaa187b81d1106000000000fd60000fd9ac3d09e29a9d542ca9d85a5c9c88474895d679838def0a83a733dc6a39b63a5ed69d32394c53361d7e43c5cbd80450f859ce8122a79c3e40000b59b0fc46d6cec3c0802882add4e3179bd4a44f231b6d753a7be428ba953df4aece69311687f4122073a236c3a32efa04137d4524847d2638da3261c8162bb7c7824be6195a66d2e17e122040e1100000000928612a29fc691e4f1f7bd053abb885f39381f1759410b1059f05684261f332d606834669b49ec99320ca7712d7e79bd5bf5ed818ecc7640917f6a559a47db608fcf9f6c131b84e41c354c66838f72b9e12d36e996f316f0812ca83efb30c7f6c6d57c4a64590401eec22523dd712c680013e87f649a1ede7142ca9d5d8a8c9f9b440fe4331ad5532c74d9a31a5d737537f7a2caa30581253d14dd3e92af7dc836686365ae01bdec561c0402b67801267a8df97d2f85426a5963d4fa3e26cc05972c162f223f000000d9"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, '\x00', 0x0, @xdp}, 0x94) r1 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0), 0x1c1842, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x4801}) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) close(r2) (async) socketpair(0x1, 0x1, 0x0, &(0x7f0000000200)) (async) ioctl$SIOCSIFHWADDR(r2, 0x8914, &(0x7f00000000c0)={'syzkaller0\x00', @broadcast}) (async) write$cgroup_devices(r1, &(0x7f0000000b00)=ANY=[@ANYBLOB="1b2388a84b83fa001f"], 0xffdd) r3 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x56, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x80000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000800)=ANY=[@ANYBLOB="0b00000008000000010001000900000001"], 0x50) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r4, &(0x7f0000000080), &(0x7f0000000200)=""/166}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f0000000540)={0x0, 0xc, &(0x7f0000000600)=ANY=[@ANYBLOB="180000000000000029976806b9417830a79a6200", @ANYRES32=r4, @ANYBLOB="0000000000000000b708000000bfa20079000000000000000ff8fffffff654e2664d8f4ab703000008000000b70400000000000085000000010000009500"/72], 0x0, 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa000000}, 0xffffffffffffffbc) (async) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x5, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x36, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r3, 0x40042408, r5) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000140)={0x9, 0x5, &(0x7f0000000380)=ANY=[@ANYBLOB="18000000cc000000000000000000000000182400", @ANYRES32=r0, @ANYBLOB="00000000030000009500000000000000"], &(0x7f0000000680)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0xc, '\x00', 0x0, 0xd}, 0x94) bpf$PROG_LOAD(0x1c, &(0x7f00000003c0)={0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sched_cls, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x200002, 0x0) (async) bpf$LINK_DETACH(0x22, &(0x7f00000004c0), 0x4) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="06000000040000000800000008"], 0x48) (async) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x19, 0x4, 0x4, 0x1, 0x4c020, 0x1}, 0x50) (async) r6 = perf_event_open(&(0x7f0000000fc0)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x6, 0xf6103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x24000000, 0x0, @perf_bp={0x0, 0x8}, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffefffffffffffff, r3, 0x0) r7 = bpf$MAP_CREATE(0x0, &(0x7f00000006c0)=ANY=[@ANYBLOB="16000000000000000400000001"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r7, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0}, 0x94) (async) r8 = bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x36, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r6, 0x40042408, r8) ioctl$TUNSETCARRIER(0xffffffffffffffff, 0x400454e2, &(0x7f0000000340)) r9 = bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x3, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="1800"/40], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x4, '\x00', 0x0, @sched_cls, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r9, 0x18000000000002a0, 0xe, 0x0, &(0x7f0000000240)="b9ff03316844268cb89e14f00800", 0x0, 0x9, 0x60000000, 0x0, 0x0, 0x0, 0x0}, 0x50) (async) syz_clone(0xc2002000, 0x0, 0x0, 0x0, 0x0, 0x0) 1.01533624s ago: executing program 2 (id=5434): r0 = perf_event_open(&(0x7f00000010c0)={0x2, 0x80, 0xb9, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xc, 0x7}, 0x410, 0x2000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000000b00)=ANY=[@ANYBLOB="850000002a00000025000000000000009500000000000000afcd48d6493790710000000000080000b2c6161dba392176dd2963038e1d69ba7ea94c500dc4ef2fad96ed406f21caf5adcf920569c00cc1199684fa7c93836d9ea2cfb0e60436e05425cc4686b066707de94a4f4d5fc79c987d669f381faca0f9d9924be41a9169bdfaf16da915b2e249f21c6eee84309e7a23c19a394830f2539fcb4e0b6eab1aa7d55545a34effa077faa55c59e88254f54077f799bf168301000000bfb1c0e6b1244d35b213bda84cc172afcc2e47a7d8b85a5e3d77ac463920e231b7ae0da8616d2b7958f91f5da6c025d060ab186d94af98af1da2b5952eb15855933a212304e035f7a35dfc72c81256a55a25f8fe3b28d7e53c78fbb888b0255f347160ec83070000000000004015cf10453f6c0b973b81a484ebad04859d928365a7ea3fab2e4b380a00d72bc0480f94479757306720399379d9271cf555c14d56b51c2298237bebfc08e0d5976a942b844139f1111f2dc5e46ac1c60a9b030074bfbcd4b09012175484135f0e519f0b1e4aaa026d570ecb5e8cddbed65ff702000000a3ff4f8a4cf796b07a6ff61c5552417fd703f7f14d8b78a602ca3cdf6a662d8bc9c89c9120072a5d00dcdd8595356c9b2492aaf1264d4ef4a410c882834867bcd2b6e558d17879570c8ad943e392955f4f979ea13201bafe4f0f6ea508000000a0c548552b571bed5647323478a996810000000571cbb17d9f37282462f0e9c147c0d497c61433c6ccc35601eef97ee611be8c97f4151fcda6cb799c6e924966a7f90bf8fd1e75ee76bd72346cfbb526894aa7fe5e68949a3b304723177d356c4604bca492ecec37e83efceefd78a2533659edc8bef9cb85451c6a145074343caea5c4bf690441974b155f5adc681a03c0bbb8358856175e2ce8b0cbbbe3c033e54ffcebde1d9d3d350000000000000000e0f209150a07682c4e14e3a83558df6f3fc97f1730a136bdee07e98cb984b2e2304a1b63afefdb636e56bbaae4e62136574bc6371a0bb2be1a962aae9c1258da6ef590e1d85ea9e12b3025f43e7e08ccffc5064dea4c39cf4b98e1fc6efb5978f51e16b678eca0b658a56008948e5a61561a9845e4ff29e2bd43b5b923b272341c5e093fd66a2946501559335781092cf8ce987c56cd31121624d7455f2a3666276c3c0e812b28e2f30d035cee5d0e77a3c72208ec651cc0ae637fa474816bc59d2e2a00092419304b338a987e9d3044d856ce24f370030be3b5f79f030b8d3ebcef5af469abe753314fae31a09c3a041a1e7b55c4e81dba1e12289ee34463aaf28345bde0c195bc9f022ca8ce37ed85464c31679053e7f9d04bb5cb51da0b7958989fd70f241262d0af3246eb4fc4bda345360200000001fbddeacd3adaa4d2715e21c772ccd44341f7fd53df58ae791ee8b489a7c9efe3625a9d971b5997485d6a063dc6f7359e2eccc2fb39d419de1a7b5c9dc22c96295a0600adf59d44e58eb1c60b3475be31a9b7cf42b6402312d2725b8d9fa7000008000000000000117ca65fc86c2dce97aa03279a66ec87122219b0f796ab92b1adecae50fdb408c8a80f7f02f750d6c977a1919f9f69a6cfefdf879d447df53f3b9b70d10355b07466d1ef0056b5af553d18a6cd50feeb7bfad9b7be3283b6450d34264e7712d2f1d7004548b19162cef04d18d4f5987baab97a9bfbd8f185b5a71e0d7696caba172745c7dd919ffb631820420b75b6522c0e21c882c66f4f25ffb6d95e07e068000000000000eb5b63e45d5d80fe52734093ae5aa3c0b4f3f45bfff201000000000000002e31560e5b741445ea2a1acee2e98c9f3427834ba0a765d20b30f87af976a46f9a9a1ac7dea1ea6845f9aa66237e0dacc107f532348cc2116473381e961f3d9c8c21578fe3245097c280abe51427b9f6cd72b5da6d0252803c66730cd5eac907f09b9695906313f8873522608c6f0100000000000000f721303e6b89e5c54d680ac66d09af90dbf50ee69a39265964279d174b0000000000000000000000fa08ad0731ba49fbf981f8265e7f1f4c2d97f4680b135f87c228ce69418a282b6caa2481a0df1774fa7d94944bb92d2b89f73f0e8b63f6316c5762f3288bc970720f48b5647dd177db6810fae0533496b6d58da50ee80a6b9a7438978c5465113f668eb4484350048289d07dbef325d3221a7cb35f812f257941a9781e3214c2a3dcf89d99844b762a9cf17548c54fccad2c7ae8072b82e0880815daf966bd5343c1635e123f868a7167cfcff33320253af570f4ef9c0254afdd89ac3943562b530dd88da8a94013bbaf204bebc38055adc39f07f7c22711f4d1f6dcc928d1578a093c072e0b92babc76f47ee367e745a024a2278319d9a4d1378482b74c516647652bfb6e93002494a5cd74e2a9a4734487062437da23e1efa6ef7674108aaa3ffac859c3577c2637bb3bdc69bc365b1f20dba96b8acca62f3f80045318de0facf2ed44b814e842c2a520159bb6c320cec0910c0b8bd3d547bdfba2e09d24d117ed0388afd37affbad2f9c77c9c1314a16ffe64f5e3744a2fffd7039670f5706e589a4c3868db06fd892d68a547477f8ef686ff0dba7b8c18c94d5a89b0567a851750a35d9cc2217db890d89385fcaa00f0f2e524672e6f4c8bedfd5da5b157709b8265cf511dc5846ab1d85916c4a6b2d1b408575982e11230cbac0a9c6eaa03c945645581f678403c2a936c53ae72940aa92bcf22b82c6bc028e0acdddf9fef595f0f7a9f80c0e4c659ced769ec463d26a81e468846761a8e1efd6a031ab7adc8665e267be0065cc315aa23012423ec8b8492d9b50fa4d8c5891959b761eec6dc988532782fda13239c948e27853606e26225c796b79cc04f3d1a5a13000000001e301d82a27010d3ac6119d2b12caf282413672d20c852c50084d7b2d50754775ed63bc18023c31351af76e24788d96103455693b34e09a163a9f613a7e5530222cebd7fa0fbff32dc98088f9fab33648cc38e87dd2dd6ee157f5f018702696915661715c979b7796d4f101a257688af7c148e8615c938c4ca8a69f6fc585ec1dd1857a501f90b161eff23181a11a2b0da4c58d459cbf9db"], &(0x7f0000000000)='GPL\x00', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$unix(r2, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000500)=[@cred={{0x20, 0x1, 0x2, {0x0, 0x0, 0xee01}}}], 0x20, 0x4014000}, 0x4000000) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) perf_event_open(&(0x7f00000004c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={0x0, 0x4}, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f0000000cc0)={0x0, 0x0, 0x0}, 0x0) close(0xffffffffffffffff) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="0e0000000400000004000000"], 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYRES32=r3, @ANYBLOB="0000000000000000b70800000d0000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) syz_open_procfs$namespace(0x0, &(0x7f0000000300)='ns/mnt\x00') bpf$MAP_CREATE(0x0, 0x0, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="1802"], 0x0, 0x7ff}, 0x94) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x1c1341, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f00000000c0)={'syzkaller0\x00', 0x84aebfbd6349b7f2}) 920.814823ms ago: executing program 4 (id=5435): r0 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000007c0)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000840)={0x1, 0xf, &(0x7f00000002c0)=ANY=[@ANYBLOB="1808000014000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000005000000bca9000000000000350901000000000095000000000002007e9800000000000056080000020000008500000007000000b70000000000000095"], &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x8, '\x00', 0x0, @fallback=0x12, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) 896.686558ms ago: executing program 4 (id=5436): openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)) socketpair(0x2a, 0x1, 0x0, &(0x7f0000000080)={0x0, 0x0}) perf_event_open(&(0x7f00000010c0)={0x2, 0x80, 0xb9, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @perf_bp={0x0, 0xe}, 0x410, 0x2000001, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[], 0x48) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8983, &(0x7f0000000080)) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x3, 0x5, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x3}, [@call={0x85, 0x0, 0x0, 0x23}, @call={0x85, 0x0, 0x0, 0x5}]}, &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x8, '\x00', 0x0, @sched_cls=0x37, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000240)={r1, 0x0, 0x88, 0xe40, &(0x7f00000002c0)='\x00\x00\x00\x00\x00\x00\x00\x00', &(0x7f0000000340)=""/8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x4c) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x5, 0x5, 0x9fd, 0x84, 0x1}, 0x48) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="160000000000000004000000ff"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0}, 0x90) r4 = perf_event_open(&(0x7f0000000fc0)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x400, 0xf6103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, @perf_bp={0x0, 0x8}, 0x40, 0x0, 0x0, 0x0, 0x7, 0x0, 0xffff}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x14, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r4, 0x40042408, r5) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000300)={0xffffffffffffffff, 0x0, &(0x7f00000000c0), &(0x7f0000000240), 0x800, r2}, 0x38) syz_clone(0x640c7000, 0x0, 0x0, 0x0, 0x0, 0x0) 887.670656ms ago: executing program 2 (id=5437): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000750000001801000020646c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000e00000095"], 0x0, 0xfffffffe, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) recvmsg$unix(r0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r1, &(0x7f0000000000), 0xe) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000540)=@base={0x7, 0xc, 0x18, 0x1, 0x0, r1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x4000000}, 0x50) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x9, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000001000000000000000018120000", @ANYRES32=r2, @ANYBLOB="0000000000000000b703000000000000850000001b"], 0x0, 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r4 = perf_event_open(&(0x7f0000000fc0)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x400, 0xf6103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, @perf_bp={0x0, 0x8}, 0x40, 0x0, 0x0, 0x0, 0x7, 0x0, 0xffff}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x17, 0x0, 0x4, 0xff, 0x8c, 0x1}, 0x48) r6 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x2, 0xc, &(0x7f0000000040)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r5}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x59}}]}, &(0x7f0000000280)='syzkaller\x00'}, 0x1c) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000380)={r2, 0x58, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40042409, 0x0) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000000400)={0x4, 0x0}, 0x8) r9 = perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7, 0xa}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000750000001801000020646c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000e00000095"], 0x0, 0xfffffffe, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xa, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18000000000000000000000000000000850000006d"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000d80)={0x18, 0x5, &(0x7f0000000480)=ANY=[@ANYBLOB="1801000021"], 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x94) r10 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r9, 0x40042408, r10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000240)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000280)='c\x00roup\x00\xfa\xc9EV\x12\x955~\x8f\xee'}, 0x87) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000740)=@bpf_lsm={0x1d, 0x17, &(0x7f0000000000)=@raw=[@map_val={0x18, 0x3, 0x2, 0x0, r5, 0x0, 0x0, 0x0, 0x4}, @initr0={0x18, 0x0, 0x0, 0x0, 0x97b, 0x0, 0x0, 0x0, 0x5}, @btf_id={0x18, 0x9, 0x3, 0x0, 0x1}, @map_val={0x18, 0x1, 0x2, 0x0, r2, 0x0, 0x0, 0x0, 0x3}, @initr0={0x18, 0x0, 0x0, 0x0, 0xfffffffc, 0x0, 0x0, 0x0, 0xe}, @map_val={0x18, 0x0, 0x2, 0x0, r2, 0x0, 0x0, 0x0, 0x80000000}, @map_idx_val={0x18, 0x9, 0x6, 0x0, 0x9, 0x0, 0x0, 0x0, 0x7}, @printk={@u, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x6439}}, @ldst={0x1, 0x0, 0x6, 0xb, 0x0, 0x4, 0xfffffffffffffff0}], &(0x7f0000000180)='GPL\x00', 0x9, 0x57, &(0x7f00000001c0)=""/87, 0x41100, 0x4, '\x00', r7, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f00000003c0)={0xa, 0x1}, 0x8, 0x10, 0x0, 0x0, r8, 0x0, 0x2, &(0x7f00000004c0)=[r2], &(0x7f0000000500)=[{0x5, 0x2, 0x8, 0x9}, {0x3, 0x5, 0xa, 0xb}], 0x10, 0x80}, 0x94) r11 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x5, 0x11, &(0x7f0000000880)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, {{0x18, 0x1, 0x1, 0x0, r1}}, {}, [@cb_func={0x18, 0x2, 0x4, 0x0, 0x6}], {{}, {}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f00000002c0)='syzkaller\x00', 0xfffffffe, 0x5a, &(0x7f0000000940)=""/90, 0x40f00, 0x21, '\x00', r7, @fallback=0x32, r1, 0x8, 0xfffffffffffffffd, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff, r3, 0x0, &(0x7f00000009c0)=[r5], 0x0, 0x10, 0x7}, 0x94) ioctl$TUNSETIFF(r11, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) r12 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x1, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x10, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$TUNSETSTEERINGEBPF(r11, 0x800454e0, &(0x7f0000000300)=r12) r13 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x7, 0xc, &(0x7f0000000800)=ANY=[@ANYRES16=r7, @ANYRES8=r6, @ANYRESDEC=r8, @ANYBLOB="369ba9bd0d24caf82c19e2778b2719d1af832bb31d812ecaf84987ec4ea9ccfd91e880abafedbd646688f9739e743520875afca54d06cb254c72afdf795f20204c3276337e6a6b706dac3bc13ab219ceebbe78", @ANYRES8=r12], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r4, 0x40042408, r13) syz_clone(0xc0126080, 0x0, 0x0, 0x0, 0x0, 0x0) 810.963572ms ago: executing program 1 (id=5439): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=@base={0x8, 0x4, 0x4, 0x9}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x13, 0x8, &(0x7f0000000940)=ANY=[@ANYBLOB="1809000000000000000000000000000018120000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7030000070400008500000021000000b70000000000000095"], &(0x7f0000000640)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000600)={r1, 0x0, 0xe, 0x0, &(0x7f0000000900)="e02742e8680d85ff9782762f0800", 0x0, 0xe8a2, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x10, 0x4, &(0x7f0000000080)=ANY=[@ANYRESHEX], &(0x7f0000003ff6)='GPL\x00', 0x7, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x3, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, &(0x7f00000000c0), 0x8, 0x10, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x9c77}, 0x10, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x62}, 0x94) 618.021566ms ago: executing program 1 (id=5440): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0xf, 0x4, 0x8, 0xc}, 0x50) close(0x3) bpf$MAP_CREATE(0x0, &(0x7f00000007c0)=@base={0x2, 0x4, 0x2, 0xc, 0x1400}, 0x50) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000840)={0x6, 0xd, &(0x7f0000000280)=@framed={{}, [@call={0x85, 0x0, 0x0, 0x8}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, r0}, {}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x3}, {0x85, 0x0, 0x0, 0x3}}]}, &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback=0x30, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r2 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="0200000004000000080000000100000080000000", @ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00S'], 0x48) bpf$MAP_LOOKUP_ELEM(0x5, &(0x7f00000000c0)={r2, &(0x7f0000000000), &(0x7f0000000040)=""/73}, 0x70) bpf$PROG_BIND_MAP(0xa, &(0x7f0000000080)={r1, r0}, 0xc) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000b40)={0xffffffffffffffff, 0xe0, &(0x7f0000000a40)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000004c0), 0x0, 0x0, 0xa9, 0x0, 0x0, 0x10, &(0x7f0000000940), 0x0, 0x0, 0x83, 0x8, 0x8, &(0x7f0000000a00)}}, 0x10) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000100)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x81, '\x00', r3, 0xffffffffffffffff, 0x0, 0x1, 0x1}, 0x50) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f00000000c0)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x1, '\x00', r3, 0xffffffffffffffff, 0x5, 0x5, 0x2}, 0x50) 568.264117ms ago: executing program 1 (id=5441): perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.throttle.io_serviced_recursive\x00', 0x26e1, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001d80)=ANY=[@ANYBLOB="28010000000000000100000001"], 0x128}, 0x0) perf_event_open(&(0x7f00000010c0)={0x2, 0x80, 0xb9, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xc, 0x7}, 0x8601, 0x2000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000001480)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r1, &(0x7f0000001b00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001d80)=ANY=[], 0x128}, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x3, [@array={0x0, 0x0, 0x0, 0x3, 0x0, {0x3, 0x2}}, @int={0x0, 0x0, 0x0, 0x1, 0x5, 0x10}, @fwd={0x1}]}, {0x0, [0x61]}}, 0x0, 0x4f}, 0x28) recvmsg$unix(r0, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000080), 0x100}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='blkio.bfq.sectors_recursive\x00', 0x275a, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x19, 0x3, 0x0, &(0x7f0000000000)='GPL\x00', 0x5, 0x0, 0x0, 0x41100, 0x8, '\x00', 0x0, @fallback=0x25}, 0x94) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) ioctl$TUNSETCARRIER(0xffffffffffffffff, 0x400454e2, &(0x7f0000000000)=0x4b) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'veth1_virt_wifi\x00'}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8946, &(0x7f0000000080)) 452.520235ms ago: executing program 1 (id=5442): bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000680)={0x18, 0x17, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000300000000000000b6030000b7080000000000007b8af8ff00000000b7080000930500007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32, @ANYBLOB="0000000000000000b70500000800000085000000a500000085000000460000008500000094000000182a0000", @ANYRES32, @ANYBLOB="0000000000000000950000b582f0ff10000000950000000000ceb800"/40], &(0x7f0000000000)='syzkaller\x00', 0x1, 0x1000, &(0x7f0000001040)=""/4096, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000080)={0x4, 0xd, 0x2, 0x3}, 0x10, 0x0, 0x0, 0x1, 0x0, &(0x7f0000000140)=[{0x5, 0x5, 0x2, 0x1}], 0x10, 0x1}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000c40)={0x7, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000fdffffde18000000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000f900850000007700000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, &(0x7f0000000140)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x31}, 0x94) perf_event_open(&(0x7f0000000380)={0x3, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x10040, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_config_ext, 0x0, 0xc8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xae9, 0x30, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000010c0)={0x2, 0x80, 0x8, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x3, 0x7}, 0x410, 0x2000000, 0x0, 0x1}, 0x0, 0x5, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x56, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x11, 0x8, &(0x7f0000000480)=ANY=[@ANYBLOB="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"], 0x0}, 0x94) close(r1) recvmsg$unix(r0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)=[@rights={{0x10}}], 0x10}, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000500)=ANY=[@ANYBLOB="8fedcb7907031175f37538e486dd630080fc00082c00db5b686158bbcfe8875a060300001123000000000000000000000000ac1414aa"], 0xfdef) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000740)={0x0, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="0d2e0020fdcc6177d93790ff", @ANYRES32, @ANYBLOB="0800000000000000950000000000000045"], 0x0}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000500)={0x12, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB=':'], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0xb}, 0x94) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'sit0\x00'}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x89f1, &(0x7f0000000080)) r3 = perf_event_open(&(0x7f0000000fc0)={0x1, 0x80, 0x2, 0x0, 0x3, 0x0, 0x0, 0x400, 0xf6103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x24000000, 0x0, @perf_bp={0x0, 0x8}, 0x0, 0x0, 0x3, 0x0, 0x7}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000500)={&(0x7f00000002c0)=ANY=[@ANYBLOB="9feb010018000000000000ec0b1fea8c48c51230b8"], &(0x7f0000001fc0)=""/142, 0x2a, 0x8e, 0x1}, 0x28) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000d00)=ANY=[@ANYBLOB="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"/443], 0x0, 0x4a}, 0x28) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r3, 0x40042408, r4) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)=ANY=[@ANYBLOB="06000000040000004020000005"], 0x48) r6 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000800)=0xffffffffffffffff, 0x4) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x11, 0x6, &(0x7f0000000b80)=@framed={{0x18, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x7}, [@btf_id={0x18, 0x2, 0x3, 0x0, 0x1}, @func={0x85, 0x0, 0x1, 0x0, 0x2}]}, &(0x7f0000000380)='syzkaller\x00', 0x10001, 0x9e, &(0x7f00000008c0)=""/158, 0x41100, 0x0, '\x00', 0x0, 0x0, r6, 0x8, &(0x7f0000000980)={0x1, 0x203}, 0x8, 0x10, &(0x7f00000009c0)={0x3, 0xc, 0x401, 0x7}, 0x10, 0x0, 0x0, 0x8, &(0x7f0000000a00)=[r5, r5, r5, r5, r5, r5], &(0x7f0000000a40)=[{0x4, 0x5, 0x10}, {0x1, 0x5, 0x9, 0xa}, {0x1, 0x3, 0x4, 0xa}, {0x2, 0x1, 0x1}, {0x4, 0x2, 0xa, 0xc}, {0x1, 0x1, 0x209}, {0x3, 0x5, 0xb}, {0x3, 0x1, 0xf, 0xa}], 0x10, 0xed}, 0x94) perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) setsockopt$sock_attach_bpf(r7, 0x1, 0x3c, &(0x7f00000001c0), 0x4) socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)) 451.576475ms ago: executing program 3 (id=5443): perf_event_open(&(0x7f0000000fc0)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x400, 0xf6103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x24000000, 0x0, @perf_config_ext={0x10000, 0x8}, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0xfffffffe}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x14, &(0x7f0000000400)=ANY=[@ANYBLOB="180000000000000000000000000000001860000000000000e9ff00000400000018120000", @ANYRES32, @ANYBLOB="0000000000000000b703000000000000850000000c000000b7000000000000001801000020646c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000000085000000060000001800000000000000000000000000000095"], 0x0, 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback=0xf, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000080000001801000020646c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000070000008500000010"], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x48, '\x00', 0x0, @fallback=0x29, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff}) recvmsg$unix(r0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) (async) r2 = bpf$MAP_CREATE(0x0, 0x0, 0x48) (async) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.current\x00', 0x275a, 0x0) ioctl$TUNSETOFFLOAD(r3, 0x400454d0, 0x1e) (async) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x56, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$tipc(r4, &(0x7f0000004440)={&(0x7f0000000ec0)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x2}}, 0x10, &(0x7f0000004340)=[{&(0x7f0000000f00)="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", 0xcff}], 0x1}, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) (async) bpf$MAP_CREATE(0x0, &(0x7f0000000740)=ANY=[@ANYBLOB="1b000000000000"], 0x48) r5 = bpf$PROG_LOAD(0x5, 0x0, 0x0) socketpair$unix(0xa, 0x2, 0x11, &(0x7f00000002c0)) (async) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000540)=@bpf_ext={0x1c, 0x5, &(0x7f0000000080)=@raw=[@map_fd={0x18, 0x6, 0x1, 0x0, r2}, @map_idx={0x18, 0x6}, @ldst={0xaab14d8b5331f15f, 0x1, 0x0, 0x9, 0x9, 0x6, 0x8}], &(0x7f0000000240)='GPL\x00', 0x6, 0x0, 0x0, 0x40f00, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000440)={0xa, 0x1}, 0x8, 0x10, &(0x7f0000000480)={0x2, 0xa, 0x2}, 0x10, 0x189f3, r5, 0x0, &(0x7f00000004c0)=[r2, r3, r3, r2, r3, r2], &(0x7f0000000500), 0x10, 0x3}, 0x94) r6 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000b80)={&(0x7f0000000b00)=ANY=[@ANYBLOB="9feb010018000000000000003c0000003c00000002000000000000000200000408000000000000000300000000000000000000000200000000000000000000000000000200000000000000000000000404"], 0x0, 0x56, 0x0, 0x8002, 0x1ff, 0x10000, @value=r1}, 0x28) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000a40)=ANY=[@ANYBLOB="0200000004000000080000000100000080000000", @ANYRES32=0x1, @ANYBLOB="0000000000001d8da93998a0385d3c00000000000000000000000000003c61c1a214c917293f94922cd07475b19fd6fe341fb42aed634a6a2e74aa42272e98b53c85", @ANYRES32=0x0, @ANYRES32=r6, @ANYBLOB="030000000100"/28], 0x50) (async) r7 = perf_event_open(&(0x7f0000000380)={0x2, 0x80, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0xa1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r7, 0x40082406, &(0x7f00000001c0)='cpu&\'\'\t|\t') (async) r8 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x52, 0x1, 0x0, 0x0, 0x0, 0x0, 0x646e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xa}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async) r9 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000000200)=ANY=[@ANYBLOB="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"], &(0x7f0000000000)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r8, 0x40042408, r9) bpf$BPF_PROG_ATTACH(0x8, 0x0, 0x0) (async) write$cgroup_pid(r3, &(0x7f0000000000), 0x2a979d) (async) r10 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.current\x00', 0x275a, 0x0) ioctl$TUNSETQUEUE(r10, 0x400454d9, &(0x7f0000000a00)={'nr0\x00', 0x600}) (async) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0xffc0) (async) bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0xd, 0xf, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, r1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) 362.360518ms ago: executing program 1 (id=5444): perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x2, 0xff, 0x0, 0x0, 0x0, 0x91c, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x10, 0x1}, 0x12640, 0x0, 0xfffffffe, 0x6, 0x7, 0x0, 0x7fa, 0x0, 0x0, 0x0, 0x76d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) syz_clone(0xc4201100, 0x0, 0x0, &(0x7f0000000740), 0x0, 0x0) 350.838686ms ago: executing program 3 (id=5445): socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r0, &(0x7f0000000500)={&(0x7f0000000040)=@hci, 0x80, &(0x7f0000000100)=[{&(0x7f0000000400)=""/248, 0x200105d0}], 0x1}, 0x1f00) socketpair$unix(0x1, 0x1, 0x0, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0xc1842, 0x0) perf_event_open(&(0x7f00000010c0)={0x2, 0x80, 0xb9, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xc, 0x7}, 0x410, 0x2000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$ENABLE_STATS(0x20, &(0x7f0000000180), 0x4) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f00000004c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x8}, 0x10117, 0x0, 0xa0}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) recvmsg(r1, &(0x7f0000000700)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000280)=""/250, 0xfa}], 0x1}, 0x0) sendmsg$tipc(r1, &(0x7f0000000240)={0x0, 0xfffffff5, &(0x7f0000000200)=[{&(0x7f0000000140)="a2", 0xfffffdef}], 0x1}, 0x0) 196.719757ms ago: executing program 0 (id=5446): r0 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000007c0)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000840)={0x1, 0xf, &(0x7f00000002c0)=ANY=[@ANYBLOB="1808000014000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000005000000bca9000000000000350901000000000095000000000007007e9800000000000056080000020000008500000007000000b70000000000000095"], &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x8, '\x00', 0x0, @fallback=0x12, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) 195.911957ms ago: executing program 0 (id=5447): r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f00000000c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@array={0x0, 0x0, 0x0, 0x3, 0x2000000, {0x3, 0x2}}]}}, 0x0, 0x32}, 0x28) socketpair(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) (async, rerun: 64) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'ip6_vti0\x00', 0x200}) (async, rerun: 64) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) (async) bpf$LINK_GET_NEXT_ID(0x1f, &(0x7f0000000240)={0x3, 0x0}, 0x8) bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000280)=r3, 0x4) (async) bpf$PROG_LOAD(0x5, &(0x7f0000000800)={0x1a, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000070000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000a5df850000002d00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async, rerun: 64) r4 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7, 0xa}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async, rerun: 64) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xa, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18000000000000000000000000000000850000006d"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000d80)={0x18, 0x5, &(0x7f0000000480)=ANY=[@ANYBLOB="1801000021"], 0x0, 0x40, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, 0x2}, 0x17) (async) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r4, 0x40042408, r5) (async) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x9a, 0x4, 0x5, 0x6, 0x0, 0xfffffffffffffffe, 0x0, 0x6, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, @perf_bp, 0x458, 0x0, 0x8, 0x9, 0xffffffff, 0x2, 0xad, 0x0, 0x4}, 0xffffffffffffffff, 0x5, r4, 0x1) (async) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000380)={@cgroup=r2, 0x2, 0x1, 0x0, &(0x7f0000000180)=[0x0], 0x1, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) openat$cgroup_type(r2, &(0x7f0000000140), 0x2, 0x0) perf_event_open(&(0x7f00000002c0)={0x3, 0x80, 0x5f, 0x2, 0x3, 0x0, 0x0, 0x9, 0xf5a05, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x4, @perf_config_ext={0x500}, 0x1075, 0x0, 0x0, 0x0, 0xffffffffffffbbfe, 0x1, 0x1, 0x0, 0x6, 0x0, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r7 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000480)={0x18, 0x12, &(0x7f00000003c0)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x400}, {{0x18, 0x1, 0x1, 0x0, 0x1}}, {}, [@alu={0x7, 0x1, 0x7, 0x1, 0x1, 0x4, 0xffffffffffffffff}, @map_val={0x18, 0x7, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x4}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000040)='syzkaller\x00', 0xfff, 0x35, &(0x7f0000000100)=""/53, 0x41100, 0x1d, '\x00', 0x0, 0x0, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f00000001c0)={0x0, 0x4, 0x6, 0x5}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000200)=[0xffffffffffffffff, 0x1, 0x1, 0x1, 0x1, 0x1, 0xffffffffffffffff], 0x0, 0x10, 0x40}, 0x94) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000540)={r2, 0xffffffffffffffff}, 0x4) (async, rerun: 32) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000580)={0x8, 0x0}, 0x8) (rerun: 32) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000340)={@map=r8, r7, 0x15, 0x30, 0x0, @void, @void, @void, @value=r9, r6}, 0x20) (async, rerun: 64) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x89f1, &(0x7f0000000080)) (rerun: 64) 195.643867ms ago: executing program 0 (id=5448): perf_event_open(&(0x7f00000010c0)={0x2, 0x80, 0xb9, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext={0xc, 0x7}, 0x410, 0x0, 0xcb3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) r0 = bpf$ITER_CREATE(0xb, &(0x7f0000000100), 0x0) close(r0) syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000300)='ns/net\x00') bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000003c0)=@bpf_lsm={0x1e, 0x3, &(0x7f00000000c0)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24}, 0x80) bpf$BPF_PROG_TEST_RUN(0x1c, &(0x7f00000005c0)={r0, 0x0, 0x0, 0x13, 0x0, 0x0, 0xfffffff9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x5}, 0x50) (async) bpf$BPF_PROG_TEST_RUN(0x1c, &(0x7f00000005c0)={r0, 0x0, 0x0, 0x13, 0x0, 0x0, 0xfffffff9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x5}, 0x50) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000200)={@fallback=r0, 0x0, 0x0, 0x1, &(0x7f0000000440)=[0x0], 0x1, 0x0, 0x0, 0x0, 0x0}, 0x40) (async) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000200)={@fallback=r0, 0x0, 0x0, 0x1, &(0x7f0000000440)=[0x0], 0x1, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) r2 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x5, 0x0, 0x100, 0x10020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x2002}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="0200000004000000080000000100b9fadafe4d", @ANYRES8=r2, @ANYRES32=0xffffffffffffffff], 0x50) bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f00000002c0), 0x4) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x52, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ppp(0xffffffffffffff9c, &(0x7f00000003c0), 0x100, 0x0) r6 = perf_event_open(&(0x7f0000000500)={0x1, 0x80, 0x4, 0x0, 0x1, 0x60, 0x0, 0x4, 0x30, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_config_ext={0xf36, 0xf}, 0x14100, 0x0, 0xfffffffd, 0x1, 0x669b, 0x0, 0x0, 0x0, 0x1, 0x0, 0x40000000}, 0x0, 0xffffffffffffffff, r5, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="1800100000000200000000", @ANYRES16=r6, @ANYRES32=r5, @ANYRESOCT=0x0, @ANYRES32, @ANYRES8=r1, @ANYRES32=r4], 0x50) openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x40020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x1, @perf_bp={&(0x7f0000000240), 0xd}, 0x2400, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0xfffffffffffffffe}, 0x0, 0x1, r5, 0x0) socketpair(0x2a, 0x1, 0x0, &(0x7f0000000080)={0x0, 0x0}) (async) socketpair(0x2a, 0x1, 0x0, &(0x7f0000000080)={0x0, 0x0}) bpf$PROG_LOAD(0x5, 0x0, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)) (async) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r7, 0x8983, &(0x7f0000000080)) (async) ioctl$PERF_EVENT_IOC_SET_FILTER(r7, 0x8983, &(0x7f0000000080)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) (async) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r8, 0x8914, &(0x7f0000000040)={'sit0\x00', @local}) r9 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f00000000c0)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r9, &(0x7f0000000180), 0x12) (async) write$cgroup_pid(r9, &(0x7f0000000180), 0x12) close(r3) (async) close(r3) r10 = openat$cgroup_int(r0, &(0x7f00000001c0)='hugetlb.2MB.rsvd.failcnt\x00', 0x2, 0x0) write$cgroup_int(r10, &(0x7f00000003c0)=0x1002, 0x12) (async) write$cgroup_int(r10, &(0x7f00000003c0)=0x1002, 0x12) 167.401982ms ago: executing program 1 (id=5449): r0 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0xc48}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x56, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_bp={0x0}, 0x80b}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x5, 0xc, &(0x7f0000001040)=ANY=[@ANYRES64=r0, @ANYRES8=r0, @ANYRES32=r0], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x17, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0xc8) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r2) ioctl$PERF_EVENT_IOC_DISABLE(r1, 0x2401, 0x80) mkdir(&(0x7f0000000000)='./cgroup/file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa/file0\x00', 0x0) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r4 = openat$cgroup_type(r3, &(0x7f0000001140), 0x2, 0x0) write$cgroup_type(r4, &(0x7f0000001100), 0x9) r5 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000001240)={@fallback=r2, 0x0, 0x0, 0x2, &(0x7f0000001080)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x8, 0x0, &(0x7f0000001180)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000011c0)=[0x0, 0x0, 0x0, 0x0], &(0x7f0000001200)=[0x0, 0x0, 0x0, 0x0], 0x0}, 0x40) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000001280)=ANY=[@ANYRES32=0x1, @ANYRES32=r2, @ANYBLOB="720b5dde0000000000", @ANYRES32, @ANYRES64=r7], 0x20) ioctl$TUNSETIFF(r5, 0x400454ca, &(0x7f0000000200)={'rose0\x00', 0x112}) close(r5) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) r8 = perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0xda, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) r9 = bpf$MAP_CREATE(0x0, &(0x7f00000012c0)=ANY=[@ANYBLOB="0400000004000000040000000500010000000000", @ANYRES32, @ANYBLOB="ffffff7f00"/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="000000000000000000000000000000000000c7da3b6539044cb09dc879743ae52d6a60733d3e532cd6073b089b2dd73ea006c8f27f27db36d3c296e8c30db98e"], 0x50) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000180)={r9, 0x58, &(0x7f0000000340)={0x0, 0x0}}, 0x10) r11 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={r10}, 0xc) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000480)={{r9}, &(0x7f0000000400), &(0x7f0000000440)=r8}, 0x20) close(r11) perf_event_open(&(0x7f00000010c0)={0x2, 0x80, 0xb9, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xc, 0x7}, 0x410, 0x2000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, r6) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x9) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0e00"/20, @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0xfe, 0x0, 0x0, 0x1ff, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x2, 0x400000000000000, 0xffffffff}, 0x0, 0x1, r1, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000840)={0x6, 0x1, &(0x7f0000001000)=ANY=[@ANYBLOB="50183000fffffffff357368ce821427e5c37c02e4ed4f199d281af8691a0f805edfd45ced2"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @xdp, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x10, 0x3, &(0x7f0000000500)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000260000001801000020646c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000000085000000170000009529"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffb}, 0x94) 148.150468ms ago: executing program 0 (id=5450): r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240)={0x2, 0x4, 0x8, 0x1, 0x80, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="020000000400000008000000070000000010"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) recvmsg$unix(r2, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0xd, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="8500000005000000760000000000000027000000980000009500000000000000"], &(0x7f0000000040)='syzkaller\x00', 0x4, 0x99, &(0x7f0000000180)=""/153, 0x0, 0x0, '\x00', 0x0, @sock_ops, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0xfffffffffffffed8}, 0x23) (async, rerun: 32) write$cgroup_subtree(r3, 0x0, 0x15) (async, rerun: 32) write$cgroup_int(r3, &(0x7f0000000440), 0x12) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x40082406, &(0x7f0000000600)='&\xa6*!(\\\x00') (async, rerun: 64) r4 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="9feb010018000000000000000c0000000c000000020000000000000000000004"], 0x0, 0x26}, 0x28) (rerun: 64) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xd, 0x3, &(0x7f0000000040)=@framed, &(0x7f0000000080)='GPL\x00', 0x5, 0x1f6, &(0x7f00000002c0)=""/168, 0x0, 0x0, '\x00', 0x0, @sock_ops, r4, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000200), 0x1}, 0x6d) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001a80)={r5, 0x39, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fc, 0x0, 0x0, 0x0}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x1a, 0xf, &(0x7f0000000580)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x107a654, 0x0, 0x0, 0x0, 0x1}, {}, {}, [], {{}, {}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x10, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r7, r5, 0x0, 0x0, 0x0, 0x0}, 0x94) r8 = bpf$MAP_CREATE(0x0, &(0x7f00000002c0)=@bloom_filter={0x1e, 0x4, 0x3, 0x101, 0x4, r0, 0x5, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2, 0x1, 0xa}, 0x50) (async) r9 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000340)={0x0, 0x1}, 0xc) (async, rerun: 64) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000380)={r0, 0xffffffffffffffff}, 0x4) (rerun: 64) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1b, 0x15, &(0x7f0000000000)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x18}, {{0x18, 0x1, 0x1, 0x0, r1}}, {}, [@map_idx={0x18, 0x2, 0x5, 0x0, 0x1}, @exit, @btf_id={0x18, 0x4, 0x3, 0x0, 0x3}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x5}]}, &(0x7f00000000c0)='GPL\x00', 0xffff, 0xbe, &(0x7f0000000100)=""/190, 0x40f00, 0x40, '\x00', 0x0, @fallback, r3, 0x8, &(0x7f00000001c0)={0x5, 0x4}, 0x8, 0x10, &(0x7f0000000200)={0x3, 0xc, 0x8, 0x6}, 0x10, r7, 0xffffffffffffffff, 0x4, &(0x7f00000003c0)=[r0, r8, r0, r9, r10], &(0x7f0000000400)=[{0x1, 0x1, 0x9, 0x4}, {0x4, 0x5, 0xa, 0xa}, {0x4, 0x4, 0x10, 0x2}, {0x4, 0x5, 0x0, 0x6}], 0x10, 0x6}, 0x94) (async) bpf$PROG_LOAD(0x5, &(0x7f0000000840)={0x8, 0x1c, &(0x7f0000000d80)=@ringbuf={{0x18, 0x8, 0x0, 0x0, 0x4000}, {{0x18, 0x1, 0x1, 0x0, r0}, {}, {}, {0x85, 0x0, 0x0, 0x5}}, {{0x5, 0x0, 0x3}}, [@snprintf={{0x7, 0x0, 0xb, 0x2}, {0x3, 0x3, 0x3, 0xa, 0x9}, {0x6, 0x0, 0xc, 0x9}, {0x3, 0x3, 0x3, 0xa, 0xa}, {0x7, 0x1, 0xb, 0x7, 0x8}, {0x7, 0x0, 0x0, 0x8, 0x0, 0x0, 0xfffffdff}, {}, {}, {0x4, 0x0, 0x7}, {0x18, 0x2, 0x2, 0x0, r0}, {}, {0x46, 0x8, 0xfff0, 0x76}}], {{0x5, 0x1, 0xb, 0x8}, {0x6, 0x0, 0x5, 0x8}, {0x85, 0x0, 0x0, 0x5}}}, &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @cgroup_skb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) r11 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='io.stat\x00', 0x26e1, 0x0) close(r11) (async) write$cgroup_devices(r11, &(0x7f00000000c0)=ANY=[@ANYBLOB="80fd"], 0xa) bpf$MAP_CREATE(0x0, &(0x7f0000000500)=@bloom_filter={0x1e, 0x4, 0x0, 0x81, 0x10280, 0x1, 0xfffffff8, '\x00', r6, r4, 0x1, 0x2, 0x1, 0x1, @void, @value, @value=r11}, 0x50) 0s ago: executing program 0 (id=5451): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=@base={0x2, 0x4, 0x4, 0x9}, 0x48) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)=@base={0xd, 0x6, 0x4, 0x1, 0x0, r0, 0x4}, 0x50) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000180)={r1, &(0x7f0000000340), 0x0}, 0x20) kernel console output (not intermixed with test programs): _map_area_alloc+0xd5/0xe0 [ 72.260759][ T2682] ? htab_map_alloc+0x4b6/0x970 [ 72.265638][ T2682] htab_map_alloc+0x4b6/0x970 [ 72.270358][ T2682] map_create+0x44e/0x2090 [ 72.274789][ T2682] __se_sys_bpf+0x24b/0x740 [ 72.279307][ T2682] ? __x64_sys_bpf+0x90/0x90 [ 72.283915][ T2682] ? asm_sysvec_apic_timer_interrupt+0xa/0x20 [ 72.290008][ T2682] ? debug_smp_processor_id+0x17/0x20 [ 72.295394][ T2682] ? fpregs_assert_state_consistent+0xb1/0xe0 [ 72.301473][ T2682] __x64_sys_bpf+0x7b/0x90 [ 72.305900][ T2682] do_syscall_64+0x31/0x40 [ 72.310332][ T2682] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 72.316267][ T2682] RIP: 0033:0x7fbcf22d1799 [ 72.320699][ T2682] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 72.340405][ T2682] RSP: 002b:00007fbcf0d2c028 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 72.348836][ T2682] RAX: ffffffffffffffda RBX: 00007fbcf254afa0 RCX: 00007fbcf22d1799 [ 72.356827][ T2682] RDX: 0000000000000048 RSI: 0000200000000240 RDI: 0000000000000000 [ 72.364813][ T2682] RBP: 00007fbcf0d2c090 R08: 0000000000000000 R09: 0000000000000000 [ 72.372805][ T2682] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 72.380791][ T2682] R13: 00007fbcf254b038 R14: 00007fbcf254afa0 R15: 00007ffd3748bea8 [ 72.674384][ T2696] device veth1_macvtap left promiscuous mode [ 72.807963][ T2696] device veth1_macvtap entered promiscuous mode [ 72.834122][ T2715] device syzkaller0 entered promiscuous mode [ 72.932465][ T2720] device syzkaller0 entered promiscuous mode [ 74.301429][ T24] audit: type=1400 audit(1773318272.030:146): avc: denied { create } for pid=2779 comm="syz.0.708" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_crypto_socket permissive=1 [ 74.612269][ T2796] device syzkaller0 entered promiscuous mode [ 77.244683][ T24] audit: type=1400 audit(1773318274.970:147): avc: denied { create } for pid=2952 comm="syz.3.761" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1 [ 77.372578][ T2963] bridge0: port 3(veth0_vlan) entered disabled state [ 77.411947][ T2964] bridge0: port 3(veth0_vlan) entered blocking state [ 77.418837][ T2964] bridge0: port 3(veth0_vlan) entered forwarding state [ 77.958721][ T2984] FAULT_INJECTION: forcing a failure. [ 77.958721][ T2984] name fail_usercopy, interval 1, probability 0, space 0, times 1 [ 77.984347][ T2984] CPU: 1 PID: 2984 Comm: syz.3.770 Tainted: G W syzkaller #0 [ 77.993083][ T2984] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 78.003242][ T2984] Call Trace: [ 78.006557][ T2984] __dump_stack+0x21/0x24 [ 78.010906][ T2984] dump_stack_lvl+0x1a7/0x208 [ 78.015599][ T2984] ? show_regs_print_info+0x18/0x18 [ 78.020808][ T2984] ? vfs_write+0xb27/0xdc0 [ 78.025246][ T2984] dump_stack+0x15/0x1c [ 78.029417][ T2984] should_fail+0x3c1/0x510 [ 78.033854][ T2984] should_fail_usercopy+0x1a/0x20 [ 78.038893][ T2984] _copy_from_user+0x20/0xd0 [ 78.043499][ T2984] __se_sys_bpf+0x1bb/0x740 [ 78.048030][ T2984] ? __x64_sys_bpf+0x90/0x90 [ 78.052669][ T2984] ? debug_smp_processor_id+0x17/0x20 [ 78.058517][ T2984] __x64_sys_bpf+0x7b/0x90 [ 78.063137][ T2984] do_syscall_64+0x31/0x40 [ 78.067570][ T2984] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 78.073564][ T2984] RIP: 0033:0x7f2d7bb3e799 [ 78.077994][ T2984] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 78.097709][ T2984] RSP: 002b:00007f2d7a599028 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 78.106151][ T2984] RAX: ffffffffffffffda RBX: 00007f2d7bdb7fa0 RCX: 00007f2d7bb3e799 [ 78.114142][ T2984] RDX: 0000000000000048 RSI: 0000200000000200 RDI: 0000000000000005 [ 78.122130][ T2984] RBP: 00007f2d7a599090 R08: 0000000000000000 R09: 0000000000000000 [ 78.130203][ T2984] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 78.138192][ T2984] R13: 00007f2d7bdb8038 R14: 00007f2d7bdb7fa0 R15: 00007fff3dabd6a8 [ 79.711404][ T24] audit: type=1400 audit(1773318277.440:148): avc: denied { create } for pid=3013 comm="syz.3.780" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_connector_socket permissive=1 [ 79.883348][ T3020] FAULT_INJECTION: forcing a failure. [ 79.883348][ T3020] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 80.000135][ T3020] CPU: 0 PID: 3020 Comm: syz.3.782 Tainted: G W syzkaller #0 [ 80.008945][ T3020] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 80.019028][ T3020] Call Trace: [ 80.022342][ T3020] __dump_stack+0x21/0x24 [ 80.026711][ T3020] dump_stack_lvl+0x1a7/0x208 [ 80.031417][ T3020] ? show_regs_print_info+0x18/0x18 [ 80.036631][ T3020] dump_stack+0x15/0x1c [ 80.040806][ T3020] should_fail+0x3c1/0x510 [ 80.045344][ T3020] should_fail_usercopy+0x1a/0x20 [ 80.050416][ T3020] strncpy_from_user+0x24/0x2e0 [ 80.055282][ T3020] bpf_prog_load+0x18c/0x14a0 [ 80.059975][ T3020] ? avc_has_perm_noaudit+0x260/0x260 [ 80.065361][ T3020] ? map_freeze+0x320/0x320 [ 80.069890][ T3020] ? vfs_write+0xb27/0xdc0 [ 80.074335][ T3020] ? selinux_bpf+0xc7/0xf0 [ 80.078784][ T3020] ? security_bpf+0x82/0xa0 [ 80.083317][ T3020] __se_sys_bpf+0x49a/0x740 [ 80.087847][ T3020] ? __x64_sys_bpf+0x90/0x90 [ 80.092463][ T3020] ? debug_smp_processor_id+0x17/0x20 [ 80.097871][ T3020] __x64_sys_bpf+0x7b/0x90 [ 80.102328][ T3020] do_syscall_64+0x31/0x40 [ 80.106795][ T3020] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 80.113253][ T3020] RIP: 0033:0x7f2d7bb3e799 [ 80.117684][ T3020] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 80.137394][ T3020] RSP: 002b:00007f2d7a599028 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 80.145830][ T3020] RAX: ffffffffffffffda RBX: 00007f2d7bdb7fa0 RCX: 00007f2d7bb3e799 [ 80.153826][ T3020] RDX: 0000000000000048 RSI: 0000200000000200 RDI: 0000000000000005 [ 80.161824][ T3020] RBP: 00007f2d7a599090 R08: 0000000000000000 R09: 0000000000000000 [ 80.169812][ T3020] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 80.177808][ T3020] R13: 00007f2d7bdb8038 R14: 00007f2d7bdb7fa0 R15: 00007fff3dabd6a8 [ 81.115894][ T3058] FAULT_INJECTION: forcing a failure. [ 81.115894][ T3058] name failslab, interval 1, probability 0, space 0, times 0 [ 81.158322][ T3058] CPU: 1 PID: 3058 Comm: syz.3.793 Tainted: G W syzkaller #0 [ 81.167043][ T3058] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 81.177113][ T3058] Call Trace: [ 81.180424][ T3058] __dump_stack+0x21/0x24 [ 81.184813][ T3058] dump_stack_lvl+0x1a7/0x208 [ 81.189506][ T3058] ? thaw_kernel_threads+0x220/0x220 [ 81.194833][ T3058] ? show_regs_print_info+0x18/0x18 [ 81.200049][ T3058] ? unwind_get_return_address+0x4d/0x90 [ 81.205692][ T3058] ? stack_trace_save+0xf0/0xf0 [ 81.210661][ T3058] dump_stack+0x15/0x1c [ 81.214838][ T3058] should_fail+0x3c1/0x510 [ 81.219273][ T3058] ? __get_vm_area_node+0x113/0x450 [ 81.224570][ T3058] __should_failslab+0xa4/0xe0 [ 81.229348][ T3058] should_failslab+0x9/0x20 [ 81.233858][ T3058] kmem_cache_alloc_trace+0x3a/0x2e0 [ 81.239147][ T3058] __get_vm_area_node+0x113/0x450 [ 81.244350][ T3058] __vmalloc_node_range+0xe0/0x790 [ 81.249471][ T3058] ? bpf_prog_alloc_no_stats+0x3b/0x250 [ 81.255206][ T3058] ? _kstrtoull+0x3c0/0x4d0 [ 81.259730][ T3058] ? bpf_prog_alloc_no_stats+0x3b/0x250 [ 81.265291][ T3058] __vmalloc+0x79/0x90 [ 81.269367][ T3058] ? bpf_prog_alloc_no_stats+0x3b/0x250 [ 81.274943][ T3058] bpf_prog_alloc_no_stats+0x3b/0x250 [ 81.280322][ T3058] ? bpf_prog_alloc+0x17/0x1f0 [ 81.285088][ T3058] bpf_prog_alloc+0x21/0x1f0 [ 81.289687][ T3058] bpf_prog_load+0x7c4/0x14a0 [ 81.294368][ T3058] ? map_freeze+0x320/0x320 [ 81.298881][ T3058] ? vfs_write+0xb27/0xdc0 [ 81.303307][ T3058] ? selinux_bpf+0xc7/0xf0 [ 81.307735][ T3058] ? security_bpf+0x82/0xa0 [ 81.312249][ T3058] __se_sys_bpf+0x49a/0x740 [ 81.316759][ T3058] ? __x64_sys_bpf+0x90/0x90 [ 81.321410][ T3058] ? debug_smp_processor_id+0x17/0x20 [ 81.326784][ T3058] __x64_sys_bpf+0x7b/0x90 [ 81.331208][ T3058] do_syscall_64+0x31/0x40 [ 81.335634][ T3058] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 81.341529][ T3058] RIP: 0033:0x7f2d7bb3e799 [ 81.345948][ T3058] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 81.365565][ T3058] RSP: 002b:00007f2d7a599028 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 81.373983][ T3058] RAX: ffffffffffffffda RBX: 00007f2d7bdb7fa0 RCX: 00007f2d7bb3e799 [ 81.381986][ T3058] RDX: 0000000000000048 RSI: 0000200000000200 RDI: 0000000000000005 [ 81.389959][ T3058] RBP: 00007f2d7a599090 R08: 0000000000000000 R09: 0000000000000000 [ 81.397955][ T3058] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 81.405927][ T3058] R13: 00007f2d7bdb8038 R14: 00007f2d7bdb7fa0 R15: 00007fff3dabd6a8 [ 81.451898][ T3058] syz.3.793: vmalloc: allocation failure: 4096 bytes, mode:0x100dc0(GFP_USER|__GFP_ZERO), nodemask=(null),cpuset=syz3,mems_allowed=0 [ 81.472692][ T3058] CPU: 1 PID: 3058 Comm: syz.3.793 Tainted: G W syzkaller #0 [ 81.481390][ T3058] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 81.491460][ T3058] Call Trace: [ 81.494777][ T3058] __dump_stack+0x21/0x24 [ 81.499122][ T3058] dump_stack_lvl+0x1a7/0x208 [ 81.503810][ T3058] ? show_regs_print_info+0x18/0x18 [ 81.509014][ T3058] ? pr_cont_kernfs_name+0xe3/0xf0 [ 81.514130][ T3058] dump_stack+0x15/0x1c [ 81.518288][ T3058] warn_alloc+0x1dc/0x200 [ 81.522621][ T3058] ? __get_vm_area_node+0x113/0x450 [ 81.527826][ T3058] ? zone_watermark_ok_safe+0x250/0x250 [ 81.533374][ T3058] ? __get_vm_area_node+0x345/0x450 [ 81.538576][ T3058] __vmalloc_node_range+0x27d/0x790 [ 81.543781][ T3058] ? _kstrtoull+0x3c0/0x4d0 [ 81.548290][ T3058] ? bpf_prog_alloc_no_stats+0x3b/0x250 [ 81.553837][ T3058] __vmalloc+0x79/0x90 [ 81.557912][ T3058] ? bpf_prog_alloc_no_stats+0x3b/0x250 [ 81.563468][ T3058] bpf_prog_alloc_no_stats+0x3b/0x250 [ 81.568845][ T3058] ? bpf_prog_alloc+0x17/0x1f0 [ 81.573613][ T3058] bpf_prog_alloc+0x21/0x1f0 [ 81.578206][ T3058] bpf_prog_load+0x7c4/0x14a0 [ 81.582885][ T3058] ? map_freeze+0x320/0x320 [ 81.587393][ T3058] ? vfs_write+0xb27/0xdc0 [ 81.591814][ T3058] ? selinux_bpf+0xc7/0xf0 [ 81.596235][ T3058] ? security_bpf+0x82/0xa0 [ 81.600753][ T3058] __se_sys_bpf+0x49a/0x740 [ 81.605258][ T3058] ? __x64_sys_bpf+0x90/0x90 [ 81.609851][ T3058] ? debug_smp_processor_id+0x17/0x20 [ 81.615221][ T3058] __x64_sys_bpf+0x7b/0x90 [ 81.619638][ T3058] do_syscall_64+0x31/0x40 [ 81.624065][ T3058] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 81.629991][ T3058] RIP: 0033:0x7f2d7bb3e799 [ 81.634409][ T3058] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 81.654019][ T3058] RSP: 002b:00007f2d7a599028 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 81.662437][ T3058] RAX: ffffffffffffffda RBX: 00007f2d7bdb7fa0 RCX: 00007f2d7bb3e799 [ 81.670409][ T3058] RDX: 0000000000000048 RSI: 0000200000000200 RDI: 0000000000000005 [ 81.678388][ T3058] RBP: 00007f2d7a599090 R08: 0000000000000000 R09: 0000000000000000 [ 81.686364][ T3058] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 81.694343][ T3058] R13: 00007f2d7bdb8038 R14: 00007f2d7bdb7fa0 R15: 00007fff3dabd6a8 [ 81.705220][ T3058] Mem-Info: [ 81.708488][ T3058] active_anon:37 inactive_anon:7266 isolated_anon:0 [ 81.708488][ T3058] active_file:24111 inactive_file:3515 isolated_file:0 [ 81.708488][ T3058] unevictable:0 dirty:276 writeback:0 [ 81.708488][ T3058] slab_reclaimable:7442 slab_unreclaimable:75739 [ 81.708488][ T3058] mapped:29380 shmem:178 pagetables:651 bounce:0 [ 81.708488][ T3058] free:1563324 free_pcp:849 free_cma:0 [ 81.745530][ T3058] Node 0 active_anon:148kB inactive_anon:29056kB active_file:96452kB inactive_file:14060kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:117548kB dirty:1136kB writeback:0kB shmem:712kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 0kB writeback_tmp:0kB kernel_stack:5408kB all_unreclaimable? no [ 81.774757][ T3058] DMA32 free:2985148kB min:62644kB low:78304kB high:93964kB reserved_highatomic:0KB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:3145324kB managed:2986532kB mlocked:0kB pagetables:0kB bounce:0kB free_pcp:1384kB local_pcp:1384kB free_cma:0kB [ 81.803651][ T3058] lowmem_reserve[]: 0 3941 3941 [ 81.820502][ T3058] Normal free:3268052kB min:84808kB low:106008kB high:127208kB reserved_highatomic:0KB active_anon:148kB inactive_anon:29056kB active_file:96452kB inactive_file:14060kB unevictable:0kB writepending:1136kB present:5242880kB managed:4036112kB mlocked:0kB pagetables:2644kB bounce:0kB free_pcp:2108kB local_pcp:712kB free_cma:0kB [ 81.851228][ T3058] lowmem_reserve[]: 0 0 0 [ 81.855618][ T3058] DMA32: 7*4kB (UM) 4*8kB (M) 2*16kB (M) 7*32kB (UM) 8*64kB (UM) 5*128kB (UM) 7*256kB (UM) 6*512kB (M) 5*1024kB (UM) 4*2048kB (UM) 724*4096kB (M) = 2985148kB [ 81.872170][ T3058] Normal: 1351*4kB (UME) 1315*8kB (UME) 1278*16kB (UME) 470*32kB (UME) 389*64kB (UME) 219*128kB (UME) 103*256kB (UME) 51*512kB (UME) 23*1024kB (ME) 10*2048kB (M) 749*4096kB (UM) = 3268756kB [ 81.891554][ T3058] 27806 total pagecache pages [ 81.896288][ T3058] 0 pages in swap cache [ 81.900803][ T3058] Swap cache stats: add 0, delete 0, find 0/0 [ 81.906890][ T3058] Free swap = 124996kB [ 81.940690][ T3058] Total swap = 124996kB [ 81.944970][ T3058] 2097051 pages RAM [ 81.948999][ T3058] 0 pages HighMem/MovableOnly [ 81.953703][ T3058] 341390 pages reserved [ 81.971930][ T3058] 0 pages cma reserved [ 82.076156][ T3067] device syzkaller0 entered promiscuous mode [ 82.150114][ T3073] device veth1_macvtap left promiscuous mode [ 82.877154][ T3116] device veth1_macvtap left promiscuous mode [ 83.311366][ T24] audit: type=1400 audit(1773318281.040:149): avc: denied { create } for pid=3141 comm="syz.0.818" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rose_socket permissive=1 [ 83.931758][ T24] audit: type=1400 audit(1773318281.660:150): avc: denied { create } for pid=3165 comm="syz.2.824" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=atmpvc_socket permissive=1 [ 86.173635][ T3248] device syzkaller0 entered promiscuous mode [ 86.869047][ T3272] syzkaller0: default qdisc (pfifo_fast) fail, fallback to noqueue [ 86.918461][ T3272] device syzkaller0 entered promiscuous mode [ 87.455824][ T3316] syz.3.865 (3316) used obsolete PPPIOCDETACH ioctl [ 87.544957][ T3312] device syzkaller0 entered promiscuous mode [ 87.582691][ T1148] syzkaller0: tun_net_xmit 48 [ 87.587825][ T3312] syzkaller0: create flow: hash 2915929664 index 0 [ 87.758461][ T3312] syzkaller0 (unregistered): delete flow: hash 2915929664 index 0 [ 87.829943][ T3343] device syzkaller0 entered promiscuous mode [ 89.086101][ T3398] FAULT_INJECTION: forcing a failure. [ 89.086101][ T3398] name failslab, interval 1, probability 0, space 0, times 0 [ 89.102836][ T3398] CPU: 0 PID: 3398 Comm: syz.2.894 Tainted: G W syzkaller #0 [ 89.111563][ T3398] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 89.121664][ T3398] Call Trace: [ 89.124977][ T3398] __dump_stack+0x21/0x24 [ 89.129334][ T3398] dump_stack_lvl+0x1a7/0x208 [ 89.134038][ T3398] ? show_regs_print_info+0x18/0x18 [ 89.139258][ T3398] ? htab_map_alloc+0x99/0x970 [ 89.144049][ T3398] ? __kasan_kmalloc+0xec/0x110 [ 89.149005][ T3398] ? __kasan_kmalloc+0xda/0x110 [ 89.153875][ T3398] dump_stack+0x15/0x1c [ 89.158052][ T3398] should_fail+0x3c1/0x510 [ 89.162493][ T3398] ? __get_vm_area_node+0x113/0x450 [ 89.167723][ T3398] __should_failslab+0xa4/0xe0 [ 89.172528][ T3398] should_failslab+0x9/0x20 [ 89.177141][ T3398] kmem_cache_alloc_trace+0x3a/0x2e0 [ 89.182452][ T3398] __get_vm_area_node+0x113/0x450 [ 89.187629][ T3398] __vmalloc_node_range+0xe0/0x790 [ 89.192769][ T3398] ? htab_map_alloc+0x4b6/0x970 [ 89.197648][ T3398] bpf_map_area_alloc+0xd5/0xe0 [ 89.202532][ T3398] ? htab_map_alloc+0x4b6/0x970 [ 89.207414][ T3398] htab_map_alloc+0x4b6/0x970 [ 89.212115][ T3398] map_create+0x44e/0x2090 [ 89.216552][ T3398] __se_sys_bpf+0x24b/0x740 [ 89.221084][ T3398] ? __x64_sys_bpf+0x90/0x90 [ 89.225719][ T3398] ? debug_smp_processor_id+0x17/0x20 [ 89.231224][ T3398] __x64_sys_bpf+0x7b/0x90 [ 89.235669][ T3398] do_syscall_64+0x31/0x40 [ 89.240112][ T3398] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 89.246019][ T3398] RIP: 0033:0x7f0007fcd799 [ 89.250463][ T3398] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 89.270089][ T3398] RSP: 002b:00007f0006a28028 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 89.278575][ T3398] RAX: ffffffffffffffda RBX: 00007f0008246fa0 RCX: 00007f0007fcd799 [ 89.286574][ T3398] RDX: 0000000000000048 RSI: 0000200000000240 RDI: 0000000000000000 [ 89.294594][ T3398] RBP: 00007f0006a28090 R08: 0000000000000000 R09: 0000000000000000 [ 89.302587][ T3398] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 89.310596][ T3398] R13: 00007f0008247038 R14: 00007f0008246fa0 R15: 00007ffc58d8be08 [ 89.827472][ T3439] FAULT_INJECTION: forcing a failure. [ 89.827472][ T3439] name failslab, interval 1, probability 0, space 0, times 0 [ 89.872321][ T3439] CPU: 0 PID: 3439 Comm: syz.1.908 Tainted: G W syzkaller #0 [ 89.881036][ T3439] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 89.891139][ T3439] Call Trace: [ 89.894471][ T3439] __dump_stack+0x21/0x24 [ 89.898817][ T3439] dump_stack_lvl+0x1a7/0x208 [ 89.903524][ T3439] ? show_regs_print_info+0x18/0x18 [ 89.908744][ T3439] ? __get_vm_area_node+0x113/0x450 [ 89.913961][ T3439] dump_stack+0x15/0x1c [ 89.918138][ T3439] should_fail+0x3c1/0x510 [ 89.922664][ T3439] ? alloc_vmap_area+0x178/0x1a20 [ 89.927743][ T3439] __should_failslab+0xa4/0xe0 [ 89.932568][ T3439] should_failslab+0x9/0x20 [ 89.937087][ T3439] kmem_cache_alloc+0x3d/0x2d0 [ 89.941879][ T3439] alloc_vmap_area+0x178/0x1a20 [ 89.946748][ T3439] ? vm_map_ram+0x9c0/0x9c0 [ 89.951365][ T3439] ? kmem_cache_alloc_trace+0x181/0x2e0 [ 89.956935][ T3439] ? __get_vm_area_node+0x113/0x450 [ 89.962153][ T3439] __get_vm_area_node+0x147/0x450 [ 89.967195][ T3439] __vmalloc_node_range+0xe0/0x790 [ 89.972324][ T3439] ? htab_map_alloc+0x4b6/0x970 [ 89.977190][ T3439] bpf_map_area_alloc+0xd5/0xe0 [ 89.982062][ T3439] ? htab_map_alloc+0x4b6/0x970 [ 89.986935][ T3439] htab_map_alloc+0x4b6/0x970 [ 89.991638][ T3439] map_create+0x44e/0x2090 [ 89.996187][ T3439] __se_sys_bpf+0x24b/0x740 [ 90.000713][ T3439] ? __x64_sys_bpf+0x90/0x90 [ 90.005411][ T3439] ? asm_sysvec_apic_timer_interrupt+0x12/0x20 [ 90.011587][ T3439] __x64_sys_bpf+0x7b/0x90 [ 90.016022][ T3439] do_syscall_64+0x31/0x40 [ 90.020459][ T3439] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 90.026357][ T3439] RIP: 0033:0x7fc09174a799 [ 90.030791][ T3439] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 90.050498][ T3439] RSP: 002b:00007fc0901a5028 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 90.058926][ T3439] RAX: ffffffffffffffda RBX: 00007fc0919c3fa0 RCX: 00007fc09174a799 [ 90.066916][ T3439] RDX: 0000000000000048 RSI: 0000200000000240 RDI: 0000000000000000 [ 90.074905][ T3439] RBP: 00007fc0901a5090 R08: 0000000000000000 R09: 0000000000000000 [ 90.082893][ T3439] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 90.090882][ T3439] R13: 00007fc0919c4038 R14: 00007fc0919c3fa0 R15: 00007ffd02e71a38 [ 90.794236][ T3502] FAULT_INJECTION: forcing a failure. [ 90.794236][ T3502] name failslab, interval 1, probability 0, space 0, times 0 [ 90.824873][ T3502] CPU: 1 PID: 3502 Comm: syz.1.925 Tainted: G W syzkaller #0 [ 90.833740][ T3502] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 90.843812][ T3502] Call Trace: [ 90.847134][ T3502] __dump_stack+0x21/0x24 [ 90.851501][ T3502] dump_stack_lvl+0x1a7/0x208 [ 90.856199][ T3502] ? show_regs_print_info+0x18/0x18 [ 90.861418][ T3502] dump_stack+0x15/0x1c [ 90.865589][ T3502] should_fail+0x3c1/0x510 [ 90.870022][ T3502] ? alloc_vmap_area+0x63f/0x1a20 [ 90.875069][ T3502] __should_failslab+0xa4/0xe0 [ 90.880038][ T3502] should_failslab+0x9/0x20 [ 90.884571][ T3502] kmem_cache_alloc+0x3d/0x2d0 [ 90.889352][ T3502] ? alloc_vmap_area+0x178/0x1a20 [ 90.894411][ T3502] alloc_vmap_area+0x63f/0x1a20 [ 90.899286][ T3502] ? vm_map_ram+0x9c0/0x9c0 [ 90.903807][ T3502] ? kmem_cache_alloc_trace+0x181/0x2e0 [ 90.909378][ T3502] ? __get_vm_area_node+0x113/0x450 [ 90.914596][ T3502] __get_vm_area_node+0x147/0x450 [ 90.919643][ T3502] __vmalloc_node_range+0xe0/0x790 [ 90.924773][ T3502] ? htab_map_alloc+0x4b6/0x970 [ 90.929648][ T3502] bpf_map_area_alloc+0xd5/0xe0 [ 90.934518][ T3502] ? htab_map_alloc+0x4b6/0x970 [ 90.939413][ T3502] htab_map_alloc+0x4b6/0x970 [ 90.944122][ T3502] map_create+0x44e/0x2090 [ 90.948559][ T3502] __se_sys_bpf+0x24b/0x740 [ 90.953075][ T3502] ? __x64_sys_bpf+0x90/0x90 [ 90.957687][ T3502] ? debug_smp_processor_id+0x17/0x20 [ 90.963078][ T3502] __x64_sys_bpf+0x7b/0x90 [ 90.967519][ T3502] do_syscall_64+0x31/0x40 [ 90.971953][ T3502] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 90.977861][ T3502] RIP: 0033:0x7fc09174a799 [ 90.982299][ T3502] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 91.001927][ T3502] RSP: 002b:00007fc0901a5028 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 91.010361][ T3502] RAX: ffffffffffffffda RBX: 00007fc0919c3fa0 RCX: 00007fc09174a799 [ 91.018355][ T3502] RDX: 0000000000000048 RSI: 0000200000000240 RDI: 0000000000000000 [ 91.026362][ T3502] RBP: 00007fc0901a5090 R08: 0000000000000000 R09: 0000000000000000 [ 91.034350][ T3502] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 91.042357][ T3502] R13: 00007fc0919c4038 R14: 00007fc0919c3fa0 R15: 00007ffd02e71a38 [ 92.091233][ T3551] device sit0 left promiscuous mode [ 92.118132][ T3551] device sit0 entered promiscuous mode [ 92.367512][ T3560] device vlan0 entered promiscuous mode [ 92.549980][ T24] audit: type=1400 audit(1773318290.280:151): avc: denied { create } for pid=3582 comm="syz.3.944" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=atmsvc_socket permissive=1 [ 92.759635][ T3602] device veth0_vlan left promiscuous mode [ 92.785720][ T3602] device veth0_vlan entered promiscuous mode [ 92.843533][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 92.868944][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 92.893586][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 92.908853][ T3618] syzkaller0: tun_chr_ioctl cmd 1074025677 [ 92.922468][ T3618] syzkaller0: linktype set to 825 [ 96.489419][ T3807] device syzkaller0 entered promiscuous mode [ 100.392585][ T3961] device syzkaller0 entered promiscuous mode [ 100.460426][ T3979] FAULT_INJECTION: forcing a failure. [ 100.460426][ T3979] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 100.474078][ T3979] CPU: 0 PID: 3979 Comm: syz.3.1060 Tainted: G W syzkaller #0 [ 100.482864][ T3979] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 100.492939][ T3979] Call Trace: [ 100.496258][ T3979] __dump_stack+0x21/0x24 [ 100.500613][ T3979] dump_stack_lvl+0x1a7/0x208 [ 100.505319][ T3979] ? show_regs_print_info+0x18/0x18 [ 100.510537][ T3979] ? __irq_exit_rcu+0x40/0x150 [ 100.515322][ T3979] dump_stack+0x15/0x1c [ 100.519494][ T3979] should_fail+0x3c1/0x510 [ 100.523930][ T3979] should_fail_alloc_page+0x4f/0x60 [ 100.529150][ T3979] __alloc_pages_nodemask+0x119/0x620 [ 100.534536][ T3979] ? _raw_spin_lock+0x94/0xf0 [ 100.539232][ T3979] ? kasan_check_range+0x57/0x2a0 [ 100.544277][ T3979] ? gfp_pfmemalloc_allowed+0x130/0x130 [ 100.549860][ T3979] ? _raw_spin_trylock_bh+0x150/0x150 [ 100.555259][ T3979] ? sched_clock+0x3a/0x40 [ 100.559690][ T3979] ? sched_clock_cpu+0x1b/0x3d0 [ 100.564530][ T3979] ? sched_clock+0x3a/0x40 [ 100.568951][ T3979] __get_free_pages+0xe/0x30 [ 100.573552][ T3979] kasan_populate_vmalloc_pte+0x29/0x120 [ 100.579194][ T3979] __apply_to_page_range+0x74e/0x9e0 [ 100.584490][ T3979] ? kasan_populate_vmalloc+0x70/0x70 [ 100.589877][ T3979] ? kasan_populate_vmalloc+0x70/0x70 [ 100.595260][ T3979] apply_to_page_range+0x3b/0x50 [ 100.600204][ T3979] kasan_populate_vmalloc+0x60/0x70 [ 100.605409][ T3979] alloc_vmap_area+0x18e0/0x1a20 [ 100.610358][ T3979] ? vm_map_ram+0x9c0/0x9c0 [ 100.614864][ T3979] ? kmem_cache_alloc_trace+0x181/0x2e0 [ 100.620439][ T3979] ? __get_vm_area_node+0x113/0x450 [ 100.625649][ T3979] __get_vm_area_node+0x147/0x450 [ 100.630681][ T3979] __vmalloc_node_range+0xe0/0x790 [ 100.635801][ T3979] ? htab_map_alloc+0x4b6/0x970 [ 100.640664][ T3979] bpf_map_area_alloc+0xd5/0xe0 [ 100.645520][ T3979] ? htab_map_alloc+0x4b6/0x970 [ 100.650394][ T3979] htab_map_alloc+0x4b6/0x970 [ 100.655080][ T3979] map_create+0x44e/0x2090 [ 100.659508][ T3979] __se_sys_bpf+0x24b/0x740 [ 100.664024][ T3979] ? __x64_sys_bpf+0x90/0x90 [ 100.668622][ T3979] ? asm_sysvec_apic_timer_interrupt+0x12/0x20 [ 100.674781][ T3979] __x64_sys_bpf+0x7b/0x90 [ 100.679204][ T3979] do_syscall_64+0x31/0x40 [ 100.683633][ T3979] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 100.689532][ T3979] RIP: 0033:0x7f2d7bb3e799 [ 100.694083][ T3979] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 100.713707][ T3979] RSP: 002b:00007f2d7a599028 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 100.722125][ T3979] RAX: ffffffffffffffda RBX: 00007f2d7bdb7fa0 RCX: 00007f2d7bb3e799 [ 100.730116][ T3979] RDX: 0000000000000048 RSI: 0000200000000240 RDI: 0000000000000000 [ 100.738098][ T3979] RBP: 00007f2d7a599090 R08: 0000000000000000 R09: 0000000000000000 [ 100.746089][ T3979] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 100.754074][ T3979] R13: 00007f2d7bdb8038 R14: 00007f2d7bdb7fa0 R15: 00007fff3dabd6a8 [ 101.350767][ T4032] FAULT_INJECTION: forcing a failure. [ 101.350767][ T4032] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 101.405145][ T4032] CPU: 1 PID: 4032 Comm: syz.2.1074 Tainted: G W syzkaller #0 [ 101.413953][ T4032] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 101.424048][ T4032] Call Trace: [ 101.427365][ T4032] __dump_stack+0x21/0x24 [ 101.431711][ T4032] dump_stack_lvl+0x1a7/0x208 [ 101.436410][ T4032] ? show_regs_print_info+0x18/0x18 [ 101.441901][ T4032] dump_stack+0x15/0x1c [ 101.446187][ T4032] should_fail+0x3c1/0x510 [ 101.450653][ T4032] should_fail_alloc_page+0x4f/0x60 [ 101.455871][ T4032] __alloc_pages_nodemask+0x119/0x620 [ 101.461269][ T4032] ? irq_exit_rcu+0x9/0x10 [ 101.465713][ T4032] ? gfp_pfmemalloc_allowed+0x130/0x130 [ 101.471313][ T4032] ? _raw_spin_trylock_bh+0x150/0x150 [ 101.476750][ T4032] __get_free_pages+0xe/0x30 [ 101.481372][ T4032] kasan_populate_vmalloc_pte+0x29/0x120 [ 101.487037][ T4032] __apply_to_page_range+0x74e/0x9e0 [ 101.492357][ T4032] ? kasan_populate_vmalloc+0x70/0x70 [ 101.497841][ T4032] ? kasan_populate_vmalloc+0x70/0x70 [ 101.503243][ T4032] apply_to_page_range+0x3b/0x50 [ 101.508215][ T4032] kasan_populate_vmalloc+0x60/0x70 [ 101.513439][ T4032] alloc_vmap_area+0x18e0/0x1a20 [ 101.518487][ T4032] ? vm_map_ram+0x9c0/0x9c0 [ 101.523028][ T4032] ? kmem_cache_alloc_trace+0x181/0x2e0 [ 101.528587][ T4032] ? __get_vm_area_node+0x113/0x450 [ 101.533805][ T4032] __get_vm_area_node+0x147/0x450 [ 101.538848][ T4032] ? __irq_exit_rcu+0x40/0x150 [ 101.543719][ T4032] __vmalloc_node_range+0xe0/0x790 [ 101.548845][ T4032] ? htab_map_alloc+0x4b6/0x970 [ 101.553726][ T4032] bpf_map_area_alloc+0xd5/0xe0 [ 101.558593][ T4032] ? htab_map_alloc+0x4b6/0x970 [ 101.563457][ T4032] htab_map_alloc+0x4b6/0x970 [ 101.568159][ T4032] map_create+0x44e/0x2090 [ 101.572595][ T4032] __se_sys_bpf+0x24b/0x740 [ 101.577204][ T4032] ? __x64_sys_bpf+0x90/0x90 [ 101.581813][ T4032] ? debug_smp_processor_id+0x17/0x20 [ 101.587209][ T4032] __x64_sys_bpf+0x7b/0x90 [ 101.591634][ T4032] do_syscall_64+0x31/0x40 [ 101.596072][ T4032] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 101.602414][ T4032] RIP: 0033:0x7f0007fcd799 [ 101.606863][ T4032] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 101.626571][ T4032] RSP: 002b:00007f0006a28028 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 101.635003][ T4032] RAX: ffffffffffffffda RBX: 00007f0008246fa0 RCX: 00007f0007fcd799 [ 101.642994][ T4032] RDX: 0000000000000048 RSI: 0000200000000240 RDI: 0000000000000000 [ 101.650979][ T4032] RBP: 00007f0006a28090 R08: 0000000000000000 R09: 0000000000000000 [ 101.658972][ T4032] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 101.666969][ T4032] R13: 00007f0008247038 R14: 00007f0008246fa0 R15: 00007ffc58d8be08 [ 102.313845][ T4079] device syzkaller0 entered promiscuous mode [ 102.341910][ T4083] device syzkaller0 entered promiscuous mode [ 102.357240][ T4079] device syzkaller0 left promiscuous mode [ 102.412223][ T4088] FAULT_INJECTION: forcing a failure. [ 102.412223][ T4088] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 102.430115][ T4088] CPU: 1 PID: 4088 Comm: syz.2.1091 Tainted: G W syzkaller #0 [ 102.439063][ T4088] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 102.449144][ T4088] Call Trace: [ 102.452462][ T4088] __dump_stack+0x21/0x24 [ 102.456821][ T4088] dump_stack_lvl+0x1a7/0x208 [ 102.461526][ T4088] ? show_regs_print_info+0x18/0x18 [ 102.466753][ T4088] dump_stack+0x15/0x1c [ 102.470941][ T4088] should_fail+0x3c1/0x510 [ 102.475435][ T4088] should_fail_alloc_page+0x4f/0x60 [ 102.480911][ T4088] __alloc_pages_nodemask+0x119/0x620 [ 102.486303][ T4088] ? gfp_pfmemalloc_allowed+0x130/0x130 [ 102.491864][ T4088] ? __irq_exit_rcu+0x40/0x150 [ 102.496648][ T4088] ? sysvec_apic_timer_interrupt+0xcb/0xe0 [ 102.502730][ T4088] ? asm_sysvec_apic_timer_interrupt+0x12/0x20 [ 102.508909][ T4088] __get_free_pages+0xe/0x30 [ 102.513520][ T4088] kasan_populate_vmalloc_pte+0x29/0x120 [ 102.519168][ T4088] __apply_to_page_range+0x74e/0x9e0 [ 102.524470][ T4088] ? kasan_populate_vmalloc+0x70/0x70 [ 102.529858][ T4088] ? kasan_populate_vmalloc+0x70/0x70 [ 102.535768][ T4088] apply_to_page_range+0x3b/0x50 [ 102.540724][ T4088] kasan_populate_vmalloc+0x60/0x70 [ 102.546114][ T4088] alloc_vmap_area+0x18e0/0x1a20 [ 102.551069][ T4088] ? vm_map_ram+0x9c0/0x9c0 [ 102.555580][ T4088] ? kmem_cache_alloc_trace+0x181/0x2e0 [ 102.561133][ T4088] ? __get_vm_area_node+0x113/0x450 [ 102.566337][ T4088] __get_vm_area_node+0x147/0x450 [ 102.571372][ T4088] __vmalloc_node_range+0xe0/0x790 [ 102.576487][ T4088] ? htab_map_alloc+0x4b6/0x970 [ 102.581346][ T4088] bpf_map_area_alloc+0xd5/0xe0 [ 102.586210][ T4088] ? htab_map_alloc+0x4b6/0x970 [ 102.591068][ T4088] htab_map_alloc+0x4b6/0x970 [ 102.595751][ T4088] map_create+0x44e/0x2090 [ 102.600180][ T4088] __se_sys_bpf+0x24b/0x740 [ 102.604693][ T4088] ? __x64_sys_bpf+0x90/0x90 [ 102.609389][ T4088] ? asm_sysvec_apic_timer_interrupt+0x12/0x20 [ 102.615552][ T4088] __x64_sys_bpf+0x7b/0x90 [ 102.619973][ T4088] do_syscall_64+0x31/0x40 [ 102.624396][ T4088] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 102.630296][ T4088] RIP: 0033:0x7f0007fcd799 [ 102.634827][ T4088] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 102.654435][ T4088] RSP: 002b:00007f0006a28028 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 102.662855][ T4088] RAX: ffffffffffffffda RBX: 00007f0008246fa0 RCX: 00007f0007fcd799 [ 102.670830][ T4088] RDX: 0000000000000048 RSI: 0000200000000240 RDI: 0000000000000000 [ 102.678895][ T4088] RBP: 00007f0006a28090 R08: 0000000000000000 R09: 0000000000000000 [ 102.686886][ T4088] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 102.694871][ T4088] R13: 00007f0008247038 R14: 00007f0008246fa0 R15: 00007ffc58d8be08 [ 103.892921][ T4169] dvmrp1: tun_chr_ioctl cmd 1074812118 [ 103.952813][ T4168] batadv0: tun_chr_ioctl cmd 1074025684 [ 104.620365][ T4193] device pim6reg1 entered promiscuous mode [ 105.393291][ T4237] device veth0_vlan left promiscuous mode [ 105.427049][ T4237] device veth0_vlan entered promiscuous mode [ 105.811431][ T4263] device syzkaller0 entered promiscuous mode [ 106.493087][ T4288] FAULT_INJECTION: forcing a failure. [ 106.493087][ T4288] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 106.618540][ T4288] CPU: 1 PID: 4288 Comm: syz.2.1146 Tainted: G W syzkaller #0 [ 106.627461][ T4288] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 106.637533][ T4288] Call Trace: [ 106.640840][ T4288] __dump_stack+0x21/0x24 [ 106.645200][ T4288] dump_stack_lvl+0x1a7/0x208 [ 106.649897][ T4288] ? show_regs_print_info+0x18/0x18 [ 106.655112][ T4288] ? kvm_sched_clock_read+0x18/0x40 [ 106.660327][ T4288] dump_stack+0x15/0x1c [ 106.664497][ T4288] should_fail+0x3c1/0x510 [ 106.669006][ T4288] should_fail_alloc_page+0x4f/0x60 [ 106.674348][ T4288] __alloc_pages_nodemask+0x119/0x620 [ 106.679734][ T4288] ? irq_exit_rcu+0x9/0x10 [ 106.684165][ T4288] ? gfp_pfmemalloc_allowed+0x130/0x130 [ 106.689722][ T4288] ? _raw_spin_trylock_bh+0x150/0x150 [ 106.695104][ T4288] __get_free_pages+0xe/0x30 [ 106.699703][ T4288] kasan_populate_vmalloc_pte+0x29/0x120 [ 106.705432][ T4288] __apply_to_page_range+0x74e/0x9e0 [ 106.710730][ T4288] ? kasan_populate_vmalloc+0x70/0x70 [ 106.716109][ T4288] ? kasan_populate_vmalloc+0x70/0x70 [ 106.721578][ T4288] apply_to_page_range+0x3b/0x50 [ 106.726533][ T4288] kasan_populate_vmalloc+0x60/0x70 [ 106.731746][ T4288] alloc_vmap_area+0x18e0/0x1a20 [ 106.736696][ T4288] ? vm_map_ram+0x9c0/0x9c0 [ 106.741211][ T4288] ? kmem_cache_alloc_trace+0x181/0x2e0 [ 106.746762][ T4288] ? __get_vm_area_node+0x113/0x450 [ 106.751974][ T4288] __get_vm_area_node+0x147/0x450 [ 106.757017][ T4288] ? __irq_exit_rcu+0x40/0x150 [ 106.761785][ T4288] __vmalloc_node_range+0xe0/0x790 [ 106.766896][ T4288] ? htab_map_alloc+0x4b6/0x970 [ 106.771761][ T4288] bpf_map_area_alloc+0xd5/0xe0 [ 106.776626][ T4288] ? htab_map_alloc+0x4b6/0x970 [ 106.781483][ T4288] htab_map_alloc+0x4b6/0x970 [ 106.786169][ T4288] map_create+0x44e/0x2090 [ 106.790590][ T4288] __se_sys_bpf+0x24b/0x740 [ 106.795102][ T4288] ? __x64_sys_bpf+0x90/0x90 [ 106.799698][ T4288] ? asm_sysvec_apic_timer_interrupt+0x12/0x20 [ 106.805853][ T4288] __x64_sys_bpf+0x7b/0x90 [ 106.810272][ T4288] do_syscall_64+0x31/0x40 [ 106.814694][ T4288] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 106.820589][ T4288] RIP: 0033:0x7f0007fcd799 [ 106.825013][ T4288] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 106.844629][ T4288] RSP: 002b:00007f0006a28028 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 106.853055][ T4288] RAX: ffffffffffffffda RBX: 00007f0008246fa0 RCX: 00007f0007fcd799 [ 106.861029][ T4288] RDX: 0000000000000048 RSI: 0000200000000240 RDI: 0000000000000000 [ 106.869008][ T4288] RBP: 00007f0006a28090 R08: 0000000000000000 R09: 0000000000000000 [ 106.876987][ T4288] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 106.884962][ T4288] R13: 00007f0008247038 R14: 00007f0008246fa0 R15: 00007ffc58d8be08 [ 107.502128][ T4316] device wg2 left promiscuous mode [ 107.536780][ T4323] device wg2 entered promiscuous mode [ 108.270374][ T24] audit: type=1400 audit(1773318306.000:152): avc: denied { create } for pid=4395 comm="syz.1.1174" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=caif_socket permissive=1 [ 108.960932][ T4470] device syzkaller0 entered promiscuous mode [ 108.987648][ T24] audit: type=1400 audit(1773318306.710:153): avc: denied { associate } for pid=4472 comm="syz.1.1196" name="cgroup.stat" scontext=root:object_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 [ 111.691936][ T4610] FAULT_INJECTION: forcing a failure. [ 111.691936][ T4610] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 111.739687][ T4610] CPU: 0 PID: 4610 Comm: syz.0.1238 Tainted: G W syzkaller #0 [ 111.748670][ T4610] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 111.758743][ T4610] Call Trace: [ 111.762060][ T4610] __dump_stack+0x21/0x24 [ 111.766405][ T4610] dump_stack_lvl+0x1a7/0x208 [ 111.771114][ T4610] ? show_regs_print_info+0x18/0x18 [ 111.776335][ T4610] dump_stack+0x15/0x1c [ 111.780507][ T4610] should_fail+0x3c1/0x510 [ 111.784969][ T4610] should_fail_alloc_page+0x4f/0x60 [ 111.790192][ T4610] __alloc_pages_nodemask+0x119/0x620 [ 111.795588][ T4610] ? gfp_pfmemalloc_allowed+0x130/0x130 [ 111.801154][ T4610] ? __kmalloc+0x1a4/0x330 [ 111.805591][ T4610] ? __vmalloc_node_range+0x29f/0x790 [ 111.810980][ T4610] __vmalloc_node_range+0x353/0x790 [ 111.816197][ T4610] bpf_map_area_alloc+0xd5/0xe0 [ 111.821065][ T4610] ? htab_map_alloc+0x4b6/0x970 [ 111.825936][ T4610] htab_map_alloc+0x4b6/0x970 [ 111.830632][ T4610] map_create+0x44e/0x2090 [ 111.835074][ T4610] __se_sys_bpf+0x24b/0x740 [ 111.839595][ T4610] ? __x64_sys_bpf+0x90/0x90 [ 111.844228][ T4610] ? asm_sysvec_apic_timer_interrupt+0xa/0x20 [ 111.850473][ T4610] ? debug_smp_processor_id+0x17/0x20 [ 111.855865][ T4610] ? fpregs_assert_state_consistent+0xb1/0xe0 [ 111.861956][ T4610] __x64_sys_bpf+0x7b/0x90 [ 111.866388][ T4610] do_syscall_64+0x31/0x40 [ 111.870822][ T4610] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 111.876733][ T4610] RIP: 0033:0x7f01262fa799 [ 111.881340][ T4610] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 111.901070][ T4610] RSP: 002b:00007f0124d55028 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 111.909522][ T4610] RAX: ffffffffffffffda RBX: 00007f0126573fa0 RCX: 00007f01262fa799 [ 111.917631][ T4610] RDX: 0000000000000048 RSI: 0000200000000240 RDI: 0000000000000000 [ 111.925717][ T4610] RBP: 00007f0124d55090 R08: 0000000000000000 R09: 0000000000000000 [ 111.933712][ T4610] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 111.941712][ T4610] R13: 00007f0126574038 R14: 00007f0126573fa0 R15: 00007fff6a27b128 [ 113.469583][ T4729] bridge0: port 2(bridge_slave_1) entered disabled state [ 113.476892][ T4729] bridge0: port 1(bridge_slave_0) entered disabled state [ 113.561136][ T4731] device bridge_slave_1 left promiscuous mode [ 113.585821][ T4731] bridge0: port 2(bridge_slave_1) entered disabled state [ 113.645299][ T4731] device bridge_slave_0 left promiscuous mode [ 113.670015][ T4731] bridge0: port 1(bridge_slave_0) entered disabled state [ 114.492695][ T4784] FAULT_INJECTION: forcing a failure. [ 114.492695][ T4784] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 114.506540][ T4784] CPU: 1 PID: 4784 Comm: syz.3.1287 Tainted: G W syzkaller #0 [ 114.515327][ T4784] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 114.525387][ T4784] Call Trace: [ 114.528734][ T4784] __dump_stack+0x21/0x24 [ 114.533064][ T4784] dump_stack_lvl+0x1a7/0x208 [ 114.537741][ T4784] ? show_regs_print_info+0x18/0x18 [ 114.543034][ T4784] dump_stack+0x15/0x1c [ 114.547199][ T4784] should_fail+0x3c1/0x510 [ 114.551626][ T4784] should_fail_alloc_page+0x4f/0x60 [ 114.556833][ T4784] __alloc_pages_nodemask+0x119/0x620 [ 114.562211][ T4784] ? gfp_pfmemalloc_allowed+0x130/0x130 [ 114.567761][ T4784] ? __kmalloc+0x1a4/0x330 [ 114.572203][ T4784] ? __vmalloc_node_range+0x29f/0x790 [ 114.577576][ T4784] __vmalloc_node_range+0x353/0x790 [ 114.582795][ T4784] bpf_map_area_alloc+0xd5/0xe0 [ 114.587649][ T4784] ? htab_map_alloc+0x4b6/0x970 [ 114.592501][ T4784] htab_map_alloc+0x4b6/0x970 [ 114.597189][ T4784] map_create+0x44e/0x2090 [ 114.601612][ T4784] __se_sys_bpf+0x24b/0x740 [ 114.606119][ T4784] ? __x64_sys_bpf+0x90/0x90 [ 114.610719][ T4784] ? asm_sysvec_apic_timer_interrupt+0x12/0x20 [ 114.616878][ T4784] __x64_sys_bpf+0x7b/0x90 [ 114.621308][ T4784] do_syscall_64+0x31/0x40 [ 114.625819][ T4784] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 114.631820][ T4784] RIP: 0033:0x7f2d7bb3e799 [ 114.636344][ T4784] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 114.656073][ T4784] RSP: 002b:00007f2d7a599028 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 114.664499][ T4784] RAX: ffffffffffffffda RBX: 00007f2d7bdb7fa0 RCX: 00007f2d7bb3e799 [ 114.672480][ T4784] RDX: 0000000000000048 RSI: 0000200000000240 RDI: 0000000000000000 [ 114.680454][ T4784] RBP: 00007f2d7a599090 R08: 0000000000000000 R09: 0000000000000000 [ 114.688433][ T4784] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 114.696422][ T4784] R13: 00007f2d7bdb8038 R14: 00007f2d7bdb7fa0 R15: 00007fff3dabd6a8 [ 114.720570][ T4788] IPv6: pim6reg1: Disabled Multicast RS [ 114.746629][ T4790] geneve1: tun_chr_ioctl cmd 1074025672 [ 114.752300][ T4790] geneve1: ignored: set checksum enabled [ 115.045570][ T4820] device bond_slave_0 entered promiscuous mode [ 115.271305][ T4828] FAULT_INJECTION: forcing a failure. [ 115.271305][ T4828] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 115.287473][ T24] audit: type=1400 audit(1773318313.010:154): avc: denied { create } for pid=4829 comm="syz.4.1301" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 115.338444][ T4828] CPU: 1 PID: 4828 Comm: syz.2.1300 Tainted: G W syzkaller #0 [ 115.347256][ T4828] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 115.357441][ T4828] Call Trace: [ 115.360764][ T4828] __dump_stack+0x21/0x24 [ 115.365118][ T4828] dump_stack_lvl+0x1a7/0x208 [ 115.369816][ T4828] ? show_regs_print_info+0x18/0x18 [ 115.375037][ T4828] dump_stack+0x15/0x1c [ 115.379206][ T4828] should_fail+0x3c1/0x510 [ 115.383649][ T4828] should_fail_alloc_page+0x4f/0x60 [ 115.388863][ T4828] __alloc_pages_nodemask+0x119/0x620 [ 115.394261][ T4828] ? gfp_pfmemalloc_allowed+0x130/0x130 [ 115.399833][ T4828] ? __kmalloc+0x1a4/0x330 [ 115.404271][ T4828] ? __vmalloc_node_range+0x29f/0x790 [ 115.409663][ T4828] __vmalloc_node_range+0x353/0x790 [ 115.414889][ T4828] bpf_map_area_alloc+0xd5/0xe0 [ 115.419753][ T4828] ? htab_map_alloc+0x4b6/0x970 [ 115.424620][ T4828] htab_map_alloc+0x4b6/0x970 [ 115.429330][ T4828] map_create+0x44e/0x2090 [ 115.433767][ T4828] __se_sys_bpf+0x24b/0x740 [ 115.438283][ T4828] ? __x64_sys_bpf+0x90/0x90 [ 115.442894][ T4828] ? asm_sysvec_apic_timer_interrupt+0x12/0x20 [ 115.449064][ T4828] __x64_sys_bpf+0x7b/0x90 [ 115.453506][ T4828] do_syscall_64+0x31/0x40 [ 115.457944][ T4828] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 115.463857][ T4828] RIP: 0033:0x7f0007fcd799 [ 115.468292][ T4828] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 115.488435][ T4828] RSP: 002b:00007f0006a28028 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 115.496869][ T4828] RAX: ffffffffffffffda RBX: 00007f0008246fa0 RCX: 00007f0007fcd799 [ 115.505146][ T4828] RDX: 0000000000000048 RSI: 0000200000000240 RDI: 0000000000000000 [ 115.513141][ T4828] RBP: 00007f0006a28090 R08: 0000000000000000 R09: 0000000000000000 [ 115.521129][ T4828] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 115.529140][ T4828] R13: 00007f0008247038 R14: 00007f0008246fa0 R15: 00007ffc58d8be08 [ 115.936207][ T24] audit: type=1400 audit(1773318313.660:155): avc: denied { create } for pid=4848 comm="syz.0.1307" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 115.963767][ T4844] device syzkaller0 entered promiscuous mode [ 116.584439][ T24] audit: type=1400 audit(1773318314.310:156): avc: denied { ioctl } for pid=4901 comm="syz.1.1323" path="uts:[4026532285]" dev="nsfs" ino=4026532285 ioctlcmd=0xb701 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 118.545768][ T4971] -: renamed from syzkaller0 [ 118.806375][ T24] audit: type=1400 audit(1773318316.530:157): avc: denied { create } for pid=4970 comm="syz.0.1343" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 120.073188][ T5041] device wg2 left promiscuous mode [ 120.365481][ T5059] device syzkaller0 entered promiscuous mode [ 120.465703][ T5047] device syzkaller0 entered promiscuous mode [ 121.167979][ T5092] cgroup: fork rejected by pids controller in /syz0 [ 121.474860][ T24] audit: type=1400 audit(1773318319.200:158): avc: denied { create } for pid=5151 comm="syz.4.1383" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 122.203101][ T5187] syzkaller0: default qdisc (pfifo_fast) fail, fallback to noqueue [ 122.234012][ T5187] device syzkaller0 entered promiscuous mode [ 124.129664][ T5275] FAULT_INJECTION: forcing a failure. [ 124.129664][ T5275] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 124.216466][ T24] audit: type=1400 audit(1773318321.940:159): avc: denied { read } for pid=5283 comm="syz.2.1422" dev="nsfs" ino=4026531837 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 124.238421][ T5275] CPU: 0 PID: 5275 Comm: syz.0.1420 Tainted: G W syzkaller #0 [ 124.247232][ T5275] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 124.257325][ T5275] Call Trace: [ 124.260649][ T5275] __dump_stack+0x21/0x24 [ 124.265003][ T5275] dump_stack_lvl+0x1a7/0x208 [ 124.269701][ T5275] ? show_regs_print_info+0x18/0x18 [ 124.274920][ T5275] dump_stack+0x15/0x1c [ 124.278352][ T24] audit: type=1400 audit(1773318321.940:160): avc: denied { open } for pid=5283 comm="syz.2.1422" path="user:[4026531837]" dev="nsfs" ino=4026531837 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 124.279086][ T5275] should_fail+0x3c1/0x510 [ 124.279102][ T5275] should_fail_alloc_page+0x4f/0x60 [ 124.279146][ T5275] __alloc_pages_nodemask+0x119/0x620 [ 124.317345][ T5275] ? gfp_pfmemalloc_allowed+0x130/0x130 [ 124.322913][ T5275] ? __kmalloc+0x1a4/0x330 [ 124.327331][ T5275] ? __vmalloc_node_range+0x29f/0x790 [ 124.332709][ T5275] __vmalloc_node_range+0x353/0x790 [ 124.337917][ T5275] bpf_map_area_alloc+0xd5/0xe0 [ 124.342770][ T5275] ? htab_map_alloc+0x4b6/0x970 [ 124.347628][ T5275] htab_map_alloc+0x4b6/0x970 [ 124.352312][ T5275] map_create+0x44e/0x2090 [ 124.356731][ T5275] __se_sys_bpf+0x24b/0x740 [ 124.361243][ T5275] ? __x64_sys_bpf+0x90/0x90 [ 124.365843][ T5275] ? asm_sysvec_apic_timer_interrupt+0xa/0x20 [ 124.371934][ T5275] ? debug_smp_processor_id+0x17/0x20 [ 124.377339][ T5275] ? fpregs_assert_state_consistent+0xb1/0xe0 [ 124.383413][ T5275] __x64_sys_bpf+0x7b/0x90 [ 124.387832][ T5275] do_syscall_64+0x31/0x40 [ 124.392254][ T5275] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 124.398148][ T5275] RIP: 0033:0x7f01262fa799 [ 124.402571][ T5275] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 124.422245][ T5275] RSP: 002b:00007f0124d55028 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 124.430665][ T5275] RAX: ffffffffffffffda RBX: 00007f0126573fa0 RCX: 00007f01262fa799 [ 124.438647][ T5275] RDX: 0000000000000048 RSI: 0000200000000240 RDI: 0000000000000000 [ 124.446631][ T5275] RBP: 00007f0124d55090 R08: 0000000000000000 R09: 0000000000000000 [ 124.454621][ T5275] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 124.462601][ T5275] R13: 00007f0126574038 R14: 00007f0126573fa0 R15: 00007fff6a27b128 [ 124.736071][ T5296] device syzkaller0 entered promiscuous mode [ 125.063101][ T5329] FAULT_INJECTION: forcing a failure. [ 125.063101][ T5329] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 125.159147][ T5329] CPU: 0 PID: 5329 Comm: syz.1.1436 Tainted: G W syzkaller #0 [ 125.168084][ T5329] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 125.178334][ T5329] Call Trace: [ 125.181652][ T5329] __dump_stack+0x21/0x24 [ 125.185995][ T5329] dump_stack_lvl+0x1a7/0x208 [ 125.190782][ T5329] ? show_regs_print_info+0x18/0x18 [ 125.196059][ T5329] dump_stack+0x15/0x1c [ 125.200252][ T5329] should_fail+0x3c1/0x510 [ 125.204695][ T5329] should_fail_alloc_page+0x4f/0x60 [ 125.209923][ T5329] __alloc_pages_nodemask+0x119/0x620 [ 125.215394][ T5329] ? gfp_pfmemalloc_allowed+0x130/0x130 [ 125.220965][ T5329] ? __kmalloc+0x1a4/0x330 [ 125.225396][ T5329] ? __vmalloc_node_range+0x29f/0x790 [ 125.230905][ T5329] __vmalloc_node_range+0x353/0x790 [ 125.236124][ T5329] bpf_map_area_alloc+0xd5/0xe0 [ 125.240995][ T5329] ? htab_map_alloc+0x4b6/0x970 [ 125.245872][ T5329] htab_map_alloc+0x4b6/0x970 [ 125.250565][ T5329] map_create+0x44e/0x2090 [ 125.254997][ T5329] __se_sys_bpf+0x24b/0x740 [ 125.259515][ T5329] ? __x64_sys_bpf+0x90/0x90 [ 125.264139][ T5329] ? asm_sysvec_apic_timer_interrupt+0xa/0x20 [ 125.270242][ T5329] ? debug_smp_processor_id+0x17/0x20 [ 125.275631][ T5329] ? fpregs_assert_state_consistent+0xb1/0xe0 [ 125.281711][ T5329] __x64_sys_bpf+0x7b/0x90 [ 125.286147][ T5329] do_syscall_64+0x31/0x40 [ 125.290590][ T5329] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 125.296500][ T5329] RIP: 0033:0x7fc09174a799 [ 125.301070][ T5329] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 125.320979][ T5329] RSP: 002b:00007fc0901a5028 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 125.329425][ T5329] RAX: ffffffffffffffda RBX: 00007fc0919c3fa0 RCX: 00007fc09174a799 [ 125.337423][ T5329] RDX: 0000000000000048 RSI: 0000200000000240 RDI: 0000000000000000 [ 125.345427][ T5329] RBP: 00007fc0901a5090 R08: 0000000000000000 R09: 0000000000000000 [ 125.353433][ T5329] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 125.361563][ T5329] R13: 00007fc0919c4038 R14: 00007fc0919c3fa0 R15: 00007ffd02e71a38 [ 126.231112][ T5372] FAULT_INJECTION: forcing a failure. [ 126.231112][ T5372] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 126.293699][ T5372] CPU: 1 PID: 5372 Comm: syz.1.1451 Tainted: G W syzkaller #0 [ 126.302506][ T5372] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 126.312581][ T5372] Call Trace: [ 126.315894][ T5372] __dump_stack+0x21/0x24 [ 126.320239][ T5372] dump_stack_lvl+0x1a7/0x208 [ 126.324951][ T5372] ? show_regs_print_info+0x18/0x18 [ 126.330171][ T5372] dump_stack+0x15/0x1c [ 126.334481][ T5372] should_fail+0x3c1/0x510 [ 126.338910][ T5372] should_fail_alloc_page+0x4f/0x60 [ 126.344119][ T5372] __alloc_pages_nodemask+0x119/0x620 [ 126.349505][ T5372] ? gfp_pfmemalloc_allowed+0x130/0x130 [ 126.355075][ T5372] ? __kmalloc+0x1a4/0x330 [ 126.359514][ T5372] ? __vmalloc_node_range+0x29f/0x790 [ 126.364902][ T5372] __vmalloc_node_range+0x353/0x790 [ 126.370118][ T5372] bpf_map_area_alloc+0xd5/0xe0 [ 126.374988][ T5372] ? htab_map_alloc+0x4b6/0x970 [ 126.379848][ T5372] htab_map_alloc+0x4b6/0x970 [ 126.384543][ T5372] map_create+0x44e/0x2090 [ 126.388979][ T5372] __se_sys_bpf+0x24b/0x740 [ 126.393497][ T5372] ? __x64_sys_bpf+0x90/0x90 [ 126.398107][ T5372] ? debug_smp_processor_id+0x17/0x20 [ 126.403577][ T5372] __x64_sys_bpf+0x7b/0x90 [ 126.408010][ T5372] do_syscall_64+0x31/0x40 [ 126.412442][ T5372] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 126.418345][ T5372] RIP: 0033:0x7fc09174a799 [ 126.422798][ T5372] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 126.442419][ T5372] RSP: 002b:00007fc0901a5028 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 126.450859][ T5372] RAX: ffffffffffffffda RBX: 00007fc0919c3fa0 RCX: 00007fc09174a799 [ 126.458844][ T5372] RDX: 0000000000000048 RSI: 0000200000000240 RDI: 0000000000000000 [ 126.466938][ T5372] RBP: 00007fc0901a5090 R08: 0000000000000000 R09: 0000000000000000 [ 126.474929][ T5372] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 126.482918][ T5372] R13: 00007fc0919c4038 R14: 00007fc0919c3fa0 R15: 00007ffd02e71a38 [ 126.951467][ T5397] bridge0: port 4(gretap0) entered disabled state [ 126.957999][ T5397] bridge0: port 3(veth0_vlan) entered disabled state [ 126.964962][ T5397] bridge0: port 2(bridge_slave_1) entered disabled state [ 126.972152][ T5397] bridge0: port 1(bridge_slave_0) entered disabled state [ 127.004998][ T5396] bridge0: port 4(gretap0) entered blocking state [ 127.011499][ T5396] bridge0: port 4(gretap0) entered forwarding state [ 127.018301][ T5396] bridge0: port 3(veth0_vlan) entered blocking state [ 127.024996][ T5396] bridge0: port 3(veth0_vlan) entered forwarding state [ 127.031962][ T5396] bridge0: port 2(bridge_slave_1) entered blocking state [ 127.039038][ T5396] bridge0: port 2(bridge_slave_1) entered forwarding state [ 127.046340][ T5396] bridge0: port 1(bridge_slave_0) entered blocking state [ 127.053439][ T5396] bridge0: port 1(bridge_slave_0) entered forwarding state [ 127.138190][ T5396] device bridge0 entered promiscuous mode [ 127.407111][ T5403] device syzkaller0 entered promiscuous mode [ 128.020786][ T562] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 130.655116][ T5520] device syzkaller0 entered promiscuous mode [ 131.824517][ T5595] device bridge_slave_0 entered promiscuous mode [ 133.042289][ T5649] device syzkaller0 entered promiscuous mode [ 133.314820][ T5660] device syzkaller0 entered promiscuous mode [ 133.327506][ T24] audit: type=1400 audit(1773318331.050:161): avc: denied { ioctl } for pid=5659 comm="syz.4.1543" path="uts:[4026532536]" dev="nsfs" ino=4026532536 ioctlcmd=0xb701 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 133.459877][ T5666] device syzkaller0 entered promiscuous mode [ 133.900405][ T5703] device syzkaller0 entered promiscuous mode [ 133.949449][ T5711] device wg2 entered promiscuous mode [ 135.482247][ T5771] nr0: port 1(macsec0) entered blocking state [ 135.494041][ T5771] nr0: port 1(macsec0) entered disabled state [ 135.548783][ T5771] device macsec0 entered promiscuous mode [ 137.267048][ T5840] bridge0: port 1(bridge_slave_0) entered blocking state [ 137.275226][ T5840] bridge0: port 1(bridge_slave_0) entered disabled state [ 137.284446][ T5840] device bridge_slave_0 entered promiscuous mode [ 137.332817][ T5851] device syzkaller0 entered promiscuous mode [ 137.340802][ T5840] bridge0: port 2(bridge_slave_1) entered blocking state [ 137.347890][ T5840] bridge0: port 2(bridge_slave_1) entered disabled state [ 137.360671][ T5840] device bridge_slave_1 entered promiscuous mode [ 137.788843][ T24] audit: type=1400 audit(1773318335.520:162): avc: denied { write } for pid=5840 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 137.928336][ T24] audit: type=1400 audit(1773318335.540:163): avc: denied { read } for pid=5840 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 137.988578][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 137.996100][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 138.031116][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 138.053445][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 138.069622][ T7] bridge0: port 1(bridge_slave_0) entered blocking state [ 138.076721][ T7] bridge0: port 1(bridge_slave_0) entered forwarding state [ 138.094938][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 138.117948][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 138.139139][ T7] bridge0: port 2(bridge_slave_1) entered blocking state [ 138.146233][ T7] bridge0: port 2(bridge_slave_1) entered forwarding state [ 138.153851][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 138.308233][ T562] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 138.316418][ T562] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 138.381785][ T562] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 138.429800][ T562] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 138.453285][ T562] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 138.494653][ T562] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 138.542140][ T5840] device veth0_vlan entered promiscuous mode [ 138.552527][ T562] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 138.571740][ T562] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 138.606771][ T5840] device veth1_macvtap entered promiscuous mode [ 138.624401][ T562] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 138.633569][ T562] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 138.664873][ T562] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 138.683563][ T562] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 138.697386][ T562] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 138.744471][ T562] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 138.753130][ T562] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 138.799123][ T562] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 138.810214][ T562] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 139.095754][ T5900] device syzkaller0 entered promiscuous mode [ 139.363733][ T492] device macsec0 left promiscuous mode [ 139.369391][ T492] nr0: port 1(macsec0) entered disabled state [ 139.376912][ T492] device bridge_slave_1 left promiscuous mode [ 139.383335][ T492] bridge0: port 2(bridge_slave_1) entered disabled state [ 139.390954][ T492] bridge0: port 1(bridge_slave_0) entered disabled state [ 139.399326][ T492] device veth0_vlan left promiscuous mode [ 140.688316][ T6003] device sit0 left promiscuous mode [ 140.852880][ T6004] device sit0 entered promiscuous mode [ 141.353272][ T6041] syz.2.1650[6041] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 141.353330][ T6041] syz.2.1650[6041] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 142.011569][ T6066] device sit0 left promiscuous mode [ 142.145330][ T6074] device sit0 entered promiscuous mode [ 142.201668][ T6072] tap0: tun_chr_ioctl cmd 1074025677 [ 142.228517][ T6072] tap0: linktype set to 769 [ 143.558990][ T6133] device wg2 left promiscuous mode [ 143.582972][ T6133] device wg2 entered promiscuous mode [ 143.956068][ T6158] bridge0: port 2(bridge_slave_1) entered disabled state [ 144.572711][ T6235] device syzkaller0 entered promiscuous mode [ 144.688422][ T6244] device syzkaller0 entered promiscuous mode [ 144.779920][ T6260] bridge0: port 3(veth0_vlan) entered disabled state [ 144.795872][ T6265] bridge0: port 3(veth0_vlan) entered blocking state [ 144.802667][ T6265] bridge0: port 3(veth0_vlan) entered forwarding state [ 145.029340][ T6281] syzkaller0: default qdisc (pfifo_fast) fail, fallback to noqueue [ 145.047720][ T6281] device syzkaller0 entered promiscuous mode [ 145.125387][ T6295] device syzkaller0 entered promiscuous mode [ 147.828753][ T24] audit: type=1400 audit(1773318345.560:164): avc: denied { create } for pid=6459 comm="syz.0.1781" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 148.457908][ T6484] device pim6reg1 entered promiscuous mode [ 148.549278][ T6493] device syzkaller0 entered promiscuous mode [ 149.785410][ T6576] FAULT_INJECTION: forcing a failure. [ 149.785410][ T6576] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 149.908347][ T6576] CPU: 0 PID: 6576 Comm: syz.1.1817 Tainted: G W syzkaller #0 [ 149.917281][ T6576] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 149.927362][ T6576] Call Trace: [ 149.930691][ T6576] __dump_stack+0x21/0x24 [ 149.935045][ T6576] dump_stack_lvl+0x1a7/0x208 [ 149.939750][ T6576] ? show_regs_print_info+0x18/0x18 [ 149.944977][ T6576] ? irq_exit_rcu+0x9/0x10 [ 149.949425][ T6576] ? sysvec_apic_timer_interrupt+0xcb/0xe0 [ 149.955042][ T24] audit: type=1400 audit(1773318347.640:165): avc: denied { create } for pid=6577 comm="syz.0.1818" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bluetooth_socket permissive=1 [ 149.955304][ T6576] dump_stack+0x15/0x1c [ 149.979213][ T6576] should_fail+0x3c1/0x510 [ 149.983653][ T6576] should_fail_alloc_page+0x4f/0x60 [ 149.988958][ T6576] __alloc_pages_nodemask+0x119/0x620 [ 149.994345][ T6576] ? irq_exit_rcu+0x9/0x10 [ 149.998777][ T6576] ? gfp_pfmemalloc_allowed+0x130/0x130 [ 150.004355][ T6576] ? __vmalloc_node_range+0x3cd/0x790 [ 150.009744][ T6576] ? __alloc_pages_nodemask+0xa/0x620 [ 150.015131][ T6576] __vmalloc_node_range+0x353/0x790 [ 150.020358][ T6576] bpf_map_area_alloc+0xd5/0xe0 [ 150.025234][ T6576] ? htab_map_alloc+0x4b6/0x970 [ 150.030105][ T6576] htab_map_alloc+0x4b6/0x970 [ 150.034903][ T6576] map_create+0x44e/0x2090 [ 150.039434][ T6576] __se_sys_bpf+0x24b/0x740 [ 150.043960][ T6576] ? __x64_sys_bpf+0x90/0x90 [ 150.048582][ T6576] ? asm_sysvec_apic_timer_interrupt+0xa/0x20 [ 150.054667][ T6576] ? debug_smp_processor_id+0x17/0x20 [ 150.060063][ T6576] ? fpregs_assert_state_consistent+0xb1/0xe0 [ 150.066326][ T6576] __x64_sys_bpf+0x7b/0x90 [ 150.070757][ T6576] do_syscall_64+0x31/0x40 [ 150.075191][ T6576] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 150.081274][ T6576] RIP: 0033:0x7fc09174a799 [ 150.085709][ T6576] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 150.105339][ T6576] RSP: 002b:00007fc0901a5028 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 150.113782][ T6576] RAX: ffffffffffffffda RBX: 00007fc0919c3fa0 RCX: 00007fc09174a799 [ 150.121928][ T6576] RDX: 0000000000000048 RSI: 0000200000000240 RDI: 0000000000000000 [ 150.129922][ T6576] RBP: 00007fc0901a5090 R08: 0000000000000000 R09: 0000000000000000 [ 150.137928][ T6576] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 150.146065][ T6576] R13: 00007fc0919c4038 R14: 00007fc0919c3fa0 R15: 00007ffd02e71a38 [ 150.862296][ T6610] device syzkaller0 entered promiscuous mode [ 151.085629][ T6623] FAULT_INJECTION: forcing a failure. [ 151.085629][ T6623] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 151.232585][ T6623] CPU: 0 PID: 6623 Comm: syz.4.1833 Tainted: G W syzkaller #0 [ 151.241411][ T6623] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 151.251609][ T6623] Call Trace: [ 151.254927][ T6623] __dump_stack+0x21/0x24 [ 151.259278][ T6623] dump_stack_lvl+0x1a7/0x208 [ 151.263980][ T6623] ? show_regs_print_info+0x18/0x18 [ 151.269205][ T6623] ? irq_exit_rcu+0x9/0x10 [ 151.273736][ T6623] dump_stack+0x15/0x1c [ 151.277918][ T6623] should_fail+0x3c1/0x510 [ 151.282458][ T6623] should_fail_alloc_page+0x4f/0x60 [ 151.287681][ T6623] __alloc_pages_nodemask+0x119/0x620 [ 151.293078][ T6623] ? __irq_exit_rcu+0x40/0x150 [ 151.297864][ T6623] ? gfp_pfmemalloc_allowed+0x130/0x130 [ 151.303434][ T6623] ? sysvec_apic_timer_interrupt+0xcb/0xe0 [ 151.309387][ T6623] __vmalloc_node_range+0x353/0x790 [ 151.314615][ T6623] bpf_map_area_alloc+0xd5/0xe0 [ 151.319496][ T6623] ? htab_map_alloc+0x4b6/0x970 [ 151.324364][ T6623] htab_map_alloc+0x4b6/0x970 [ 151.329064][ T6623] map_create+0x44e/0x2090 [ 151.333497][ T6623] __se_sys_bpf+0x24b/0x740 [ 151.338031][ T6623] ? __x64_sys_bpf+0x90/0x90 [ 151.342643][ T6623] ? asm_sysvec_apic_timer_interrupt+0xa/0x20 [ 151.348728][ T6623] ? debug_smp_processor_id+0x17/0x20 [ 151.354119][ T6623] ? fpregs_assert_state_consistent+0xb1/0xe0 [ 151.360205][ T6623] __x64_sys_bpf+0x7b/0x90 [ 151.364636][ T6623] do_syscall_64+0x31/0x40 [ 151.369067][ T6623] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 151.374968][ T6623] RIP: 0033:0x7fbcf22d1799 [ 151.379483][ T6623] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 151.399108][ T6623] RSP: 002b:00007fbcf0d2c028 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 151.407534][ T6623] RAX: ffffffffffffffda RBX: 00007fbcf254afa0 RCX: 00007fbcf22d1799 [ 151.415523][ T6623] RDX: 0000000000000048 RSI: 0000200000000240 RDI: 0000000000000000 [ 151.423514][ T6623] RBP: 00007fbcf0d2c090 R08: 0000000000000000 R09: 0000000000000000 [ 151.431604][ T6623] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 151.439587][ T6623] R13: 00007fbcf254b038 R14: 00007fbcf254afa0 R15: 00007ffd3748bea8 [ 153.768436][ T6716] FAULT_INJECTION: forcing a failure. [ 153.768436][ T6716] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 153.938624][ T6716] CPU: 1 PID: 6716 Comm: syz.1.1858 Tainted: G W syzkaller #0 [ 153.947426][ T6716] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 153.957492][ T6716] Call Trace: [ 153.960804][ T6716] __dump_stack+0x21/0x24 [ 153.965152][ T6716] dump_stack_lvl+0x1a7/0x208 [ 153.969867][ T6716] ? show_regs_print_info+0x18/0x18 [ 153.975099][ T6716] dump_stack+0x15/0x1c [ 153.979277][ T6716] should_fail+0x3c1/0x510 [ 153.983710][ T6716] should_fail_alloc_page+0x4f/0x60 [ 153.988913][ T6716] __alloc_pages_nodemask+0x119/0x620 [ 153.994301][ T6716] ? gfp_pfmemalloc_allowed+0x130/0x130 [ 153.999859][ T6716] ? sysvec_apic_timer_interrupt+0xcb/0xe0 [ 154.005684][ T6716] __vmalloc_node_range+0x353/0x790 [ 154.010898][ T6716] bpf_map_area_alloc+0xd5/0xe0 [ 154.015772][ T6716] ? htab_map_alloc+0x4b6/0x970 [ 154.020641][ T6716] htab_map_alloc+0x4b6/0x970 [ 154.025353][ T6716] map_create+0x44e/0x2090 [ 154.029792][ T6716] __se_sys_bpf+0x24b/0x740 [ 154.034307][ T6716] ? __x64_sys_bpf+0x90/0x90 [ 154.038928][ T6716] ? debug_smp_processor_id+0x17/0x20 [ 154.044410][ T6716] __x64_sys_bpf+0x7b/0x90 [ 154.048857][ T6716] do_syscall_64+0x31/0x40 [ 154.053303][ T6716] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 154.059244][ T6716] RIP: 0033:0x7fc09174a799 [ 154.063678][ T6716] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 154.083297][ T6716] RSP: 002b:00007fc0901a5028 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 154.091769][ T6716] RAX: ffffffffffffffda RBX: 00007fc0919c3fa0 RCX: 00007fc09174a799 [ 154.099756][ T6716] RDX: 0000000000000048 RSI: 0000200000000240 RDI: 0000000000000000 [ 154.108004][ T6716] RBP: 00007fc0901a5090 R08: 0000000000000000 R09: 0000000000000000 [ 154.115998][ T6716] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 154.124080][ T6716] R13: 00007fc0919c4038 R14: 00007fc0919c3fa0 R15: 00007ffd02e71a38 [ 154.668284][ T6732] : renamed from bond_slave_0 [ 155.156178][ T6758] device syzkaller0 entered promiscuous mode [ 155.762302][ T6783] device syzkaller0 entered promiscuous mode [ 155.922142][ T6793] device pim6reg1 entered promiscuous mode [ 156.251216][ T6822] FAULT_INJECTION: forcing a failure. [ 156.251216][ T6822] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 156.268031][ T6822] CPU: 0 PID: 6822 Comm: syz.2.1892 Tainted: G W syzkaller #0 [ 156.276900][ T6822] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 156.286966][ T6822] Call Trace: [ 156.290255][ T6822] __dump_stack+0x21/0x24 [ 156.294574][ T6822] dump_stack_lvl+0x1a7/0x208 [ 156.299239][ T6822] ? show_regs_print_info+0x18/0x18 [ 156.304450][ T6822] dump_stack+0x15/0x1c [ 156.308626][ T6822] should_fail+0x3c1/0x510 [ 156.313060][ T6822] should_fail_alloc_page+0x4f/0x60 [ 156.318274][ T6822] __alloc_pages_nodemask+0x119/0x620 [ 156.323661][ T6822] ? gfp_pfmemalloc_allowed+0x130/0x130 [ 156.329214][ T6822] ? __kmalloc+0x1a4/0x330 [ 156.333635][ T6822] ? __vmalloc_node_range+0x29f/0x790 [ 156.339007][ T6822] __vmalloc_node_range+0x353/0x790 [ 156.344210][ T6822] bpf_map_area_alloc+0xd5/0xe0 [ 156.349069][ T6822] ? htab_map_alloc+0x4b6/0x970 [ 156.353921][ T6822] htab_map_alloc+0x4b6/0x970 [ 156.358612][ T6822] map_create+0x44e/0x2090 [ 156.363034][ T6822] __se_sys_bpf+0x24b/0x740 [ 156.367536][ T6822] ? __x64_sys_bpf+0x90/0x90 [ 156.372134][ T6822] ? asm_sysvec_apic_timer_interrupt+0x12/0x20 [ 156.378291][ T6822] __x64_sys_bpf+0x7b/0x90 [ 156.382710][ T6822] do_syscall_64+0x31/0x40 [ 156.387130][ T6822] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 156.393023][ T6822] RIP: 0033:0x7f7a5ce5c799 [ 156.397442][ T6822] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 156.417152][ T6822] RSP: 002b:00007f7a5b8b7028 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 156.425719][ T6822] RAX: ffffffffffffffda RBX: 00007f7a5d0d5fa0 RCX: 00007f7a5ce5c799 [ 156.433701][ T6822] RDX: 0000000000000048 RSI: 0000200000000240 RDI: 0000000000000000 [ 156.441697][ T6822] RBP: 00007f7a5b8b7090 R08: 0000000000000000 R09: 0000000000000000 [ 156.449822][ T6822] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 156.457806][ T6822] R13: 00007f7a5d0d6038 R14: 00007f7a5d0d5fa0 R15: 00007ffd396a0068 [ 156.483005][ T6825] device syzkaller0 entered promiscuous mode [ 157.113686][ T6867] FAULT_INJECTION: forcing a failure. [ 157.113686][ T6867] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 157.198387][ T6867] CPU: 0 PID: 6867 Comm: syz.3.1908 Tainted: G W syzkaller #0 [ 157.207209][ T6867] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 157.217298][ T6867] Call Trace: [ 157.220635][ T6867] __dump_stack+0x21/0x24 [ 157.224979][ T6867] dump_stack_lvl+0x1a7/0x208 [ 157.229668][ T6867] ? show_regs_print_info+0x18/0x18 [ 157.234881][ T6867] dump_stack+0x15/0x1c [ 157.239043][ T6867] should_fail+0x3c1/0x510 [ 157.243492][ T6867] should_fail_alloc_page+0x4f/0x60 [ 157.248693][ T6867] __alloc_pages_nodemask+0x119/0x620 [ 157.254072][ T6867] ? gfp_pfmemalloc_allowed+0x130/0x130 [ 157.259629][ T6867] ? __kmalloc+0x1a4/0x330 [ 157.264053][ T6867] ? __vmalloc_node_range+0x29f/0x790 [ 157.269435][ T6867] __vmalloc_node_range+0x353/0x790 [ 157.274643][ T6867] bpf_map_area_alloc+0xd5/0xe0 [ 157.279670][ T6867] ? htab_map_alloc+0x4b6/0x970 [ 157.284526][ T6867] htab_map_alloc+0x4b6/0x970 [ 157.289208][ T6867] map_create+0x44e/0x2090 [ 157.293623][ T6867] __se_sys_bpf+0x24b/0x740 [ 157.298128][ T6867] ? __x64_sys_bpf+0x90/0x90 [ 157.302815][ T6867] ? debug_smp_processor_id+0x17/0x20 [ 157.308191][ T6867] __x64_sys_bpf+0x7b/0x90 [ 157.312611][ T6867] do_syscall_64+0x31/0x40 [ 157.317034][ T6867] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 157.322931][ T6867] RIP: 0033:0x7f2d7bb3e799 [ 157.327349][ T6867] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 157.346963][ T6867] RSP: 002b:00007f2d7a599028 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 157.355377][ T6867] RAX: ffffffffffffffda RBX: 00007f2d7bdb7fa0 RCX: 00007f2d7bb3e799 [ 157.363353][ T6867] RDX: 0000000000000048 RSI: 0000200000000240 RDI: 0000000000000000 [ 157.371326][ T6867] RBP: 00007f2d7a599090 R08: 0000000000000000 R09: 0000000000000000 [ 157.379302][ T6867] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 157.387283][ T6867] R13: 00007f2d7bdb8038 R14: 00007f2d7bdb7fa0 R15: 00007fff3dabd6a8 [ 158.083822][ T6913] syzkaller0: default qdisc (pfifo_fast) fail, fallback to noqueue [ 158.136845][ T6913] device syzkaller0 entered promiscuous mode [ 160.803780][ T7002] device syzkaller0 entered promiscuous mode [ 160.844811][ T7000] syzkaller0: default qdisc (pfifo_fast) fail, fallback to noqueue [ 160.889516][ T7000] device syzkaller0 entered promiscuous mode [ 161.267321][ T7028] bridge0: port 2(bridge_slave_1) entered disabled state [ 161.274582][ T7028] bridge0: port 1(bridge_slave_0) entered disabled state [ 161.464862][ T7031] ÿÿÿÿÿÿ: renamed from vlan1 [ 161.524407][ T7043] device syzkaller0 entered promiscuous mode [ 162.624996][ T7091] FAULT_INJECTION: forcing a failure. [ 162.624996][ T7091] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 162.661512][ T7091] CPU: 1 PID: 7091 Comm: syz.4.1977 Tainted: G W syzkaller #0 [ 162.670316][ T7091] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 162.680399][ T7091] Call Trace: [ 162.683713][ T7091] __dump_stack+0x21/0x24 [ 162.688043][ T7091] dump_stack_lvl+0x1a7/0x208 [ 162.692729][ T7091] ? show_regs_print_info+0x18/0x18 [ 162.697931][ T7091] dump_stack+0x15/0x1c [ 162.702088][ T7091] should_fail+0x3c1/0x510 [ 162.706520][ T7091] should_fail_alloc_page+0x4f/0x60 [ 162.711725][ T7091] __alloc_pages_nodemask+0x119/0x620 [ 162.717103][ T7091] ? gfp_pfmemalloc_allowed+0x130/0x130 [ 162.722682][ T7091] ? __kmalloc+0x1a4/0x330 [ 162.727102][ T7091] ? __vmalloc_node_range+0x29f/0x790 [ 162.732485][ T7091] __vmalloc_node_range+0x353/0x790 [ 162.737691][ T7091] bpf_map_area_alloc+0xd5/0xe0 [ 162.742547][ T7091] ? htab_map_alloc+0x4b6/0x970 [ 162.747407][ T7091] htab_map_alloc+0x4b6/0x970 [ 162.752178][ T7091] map_create+0x44e/0x2090 [ 162.756633][ T7091] __se_sys_bpf+0x24b/0x740 [ 162.761283][ T7091] ? __x64_sys_bpf+0x90/0x90 [ 162.765877][ T7091] ? asm_sysvec_apic_timer_interrupt+0x12/0x20 [ 162.772035][ T7091] __x64_sys_bpf+0x7b/0x90 [ 162.776468][ T7091] do_syscall_64+0x31/0x40 [ 162.780917][ T7091] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 162.786914][ T7091] RIP: 0033:0x7fbcf22d1799 [ 162.791356][ T7091] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 162.810972][ T7091] RSP: 002b:00007fbcf0d2c028 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 162.819402][ T7091] RAX: ffffffffffffffda RBX: 00007fbcf254afa0 RCX: 00007fbcf22d1799 [ 162.827473][ T7091] RDX: 0000000000000048 RSI: 0000200000000240 RDI: 0000000000000000 [ 162.835533][ T7091] RBP: 00007fbcf0d2c090 R08: 0000000000000000 R09: 0000000000000000 [ 162.843512][ T7091] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 162.851493][ T7091] R13: 00007fbcf254b038 R14: 00007fbcf254afa0 R15: 00007ffd3748bea8 [ 163.388101][ T7115] syz.3.1984[7115] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 163.388172][ T7115] syz.3.1984[7115] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 163.506898][ T7131] FAULT_INJECTION: forcing a failure. [ 163.506898][ T7131] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 163.535518][ T7131] CPU: 0 PID: 7131 Comm: syz.3.1989 Tainted: G W syzkaller #0 [ 163.544323][ T7131] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 163.554403][ T7131] Call Trace: [ 163.557711][ T7131] __dump_stack+0x21/0x24 [ 163.562052][ T7131] dump_stack_lvl+0x1a7/0x208 [ 163.566746][ T7131] ? show_regs_print_info+0x18/0x18 [ 163.571950][ T7131] dump_stack+0x15/0x1c [ 163.576144][ T7131] should_fail+0x3c1/0x510 [ 163.580571][ T7131] should_fail_alloc_page+0x4f/0x60 [ 163.585775][ T7131] __alloc_pages_nodemask+0x119/0x620 [ 163.591163][ T7131] ? gfp_pfmemalloc_allowed+0x130/0x130 [ 163.596715][ T7131] ? __kmalloc+0x1a4/0x330 [ 163.601141][ T7131] ? __vmalloc_node_range+0x29f/0x790 [ 163.606521][ T7131] __vmalloc_node_range+0x353/0x790 [ 163.611726][ T7131] bpf_map_area_alloc+0xd5/0xe0 [ 163.616589][ T7131] ? htab_map_alloc+0x4b6/0x970 [ 163.621452][ T7131] htab_map_alloc+0x4b6/0x970 [ 163.626138][ T7131] map_create+0x44e/0x2090 [ 163.630584][ T7131] __se_sys_bpf+0x24b/0x740 [ 163.635091][ T7131] ? __x64_sys_bpf+0x90/0x90 [ 163.639688][ T7131] ? asm_sysvec_apic_timer_interrupt+0xa/0x20 [ 163.645755][ T7131] ? debug_smp_processor_id+0x17/0x20 [ 163.651132][ T7131] ? fpregs_assert_state_consistent+0xb1/0xe0 [ 163.657194][ T7131] __x64_sys_bpf+0x7b/0x90 [ 163.661624][ T7131] do_syscall_64+0x31/0x40 [ 163.666043][ T7131] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 163.671931][ T7131] RIP: 0033:0x7f2d7bb3e799 [ 163.676356][ T7131] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 163.696064][ T7131] RSP: 002b:00007f2d7a599028 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 163.704494][ T7131] RAX: ffffffffffffffda RBX: 00007f2d7bdb7fa0 RCX: 00007f2d7bb3e799 [ 163.712511][ T7131] RDX: 0000000000000048 RSI: 0000200000000240 RDI: 0000000000000000 [ 163.720496][ T7131] RBP: 00007f2d7a599090 R08: 0000000000000000 R09: 0000000000000000 [ 163.728468][ T7131] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 163.736459][ T7131] R13: 00007f2d7bdb8038 R14: 00007f2d7bdb7fa0 R15: 00007fff3dabd6a8 [ 165.088166][ T7197] syzkaller0: default qdisc (pfifo_fast) fail, fallback to noqueue [ 165.246660][ T7207] device wg2 left promiscuous mode [ 165.389019][ T7205] device wg2 entered promiscuous mode [ 167.031079][ T24] audit: type=1400 audit(1773318364.760:166): avc: denied { create } for pid=7262 comm="syz.3.2032" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rxrpc_socket permissive=1 [ 168.460058][ T7314] device syzkaller0 entered promiscuous mode [ 171.169838][ T7435] ref_ctr_offset mismatch. inode: 0x8ea offset: 0x0 ref_ctr_offset(old): 0x0 ref_ctr_offset(new): 0x1fe [ 171.254925][ T7440] device syzkaller0 entered promiscuous mode [ 171.340431][ T7435] device aaaaaaaaaaaaaaa entered promiscuous mode [ 171.387573][ T7456] device sit0 left promiscuous mode [ 171.411947][ T7456] device sit0 entered promiscuous mode [ 171.515586][ T7467] device pim6reg1 left promiscuous mode [ 171.946129][ T7495] device  entered promiscuous mode [ 171.980029][ T2648] ip6_tunnel:  xmit: Local address not yet configured! [ 172.902994][ T7551] Ÿë: port 1(veth0_to_team) entered blocking state [ 172.918296][ T7551] Ÿë: port 1(veth0_to_team) entered disabled state [ 172.949165][ T7551] device veth0_to_team entered promiscuous mode [ 174.133457][ T7598] ref_ctr_offset mismatch. inode: 0x858 offset: 0x0 ref_ctr_offset(old): 0x0 ref_ctr_offset(new): 0x1fe [ 174.192256][ T7595] device aaaaaaaaaaaaaaa entered promiscuous mode [ 175.698268][ C0] ip6_tunnel:  xmit: Local address not yet configured! [ 175.768350][ T7695] device sit0 left promiscuous mode [ 177.200715][ T7753] device syzkaller0 entered promiscuous mode [ 182.683997][ T7960] nr0: port 1(macsec0) entered blocking state [ 182.791795][ T7960] nr0: port 1(macsec0) entered disabled state [ 182.804448][ T7960] device macsec0 entered promiscuous mode [ 183.138651][ C0] ip6_tunnel:  xmit: Local address not yet configured! [ 183.402390][ T7978] device syzkaller0 entered promiscuous mode [ 184.820326][ T8032] device wg2 left promiscuous mode [ 185.514421][ T8079] device sit0 entered promiscuous mode [ 188.668597][ T8200] device veth1_macvtap entered promiscuous mode [ 188.752916][ T48] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 188.857916][ T8204] device veth1_macvtap left promiscuous mode [ 191.593944][ T8275] device pim6reg1 entered promiscuous mode [ 192.643345][ T8315] cgroup: fork rejected by pids controller in /syz4 [ 193.628706][ T8341] bridge0: port 1(bridge_slave_0) entered blocking state [ 193.635872][ T8341] bridge0: port 1(bridge_slave_0) entered disabled state [ 193.643489][ T8341] device bridge_slave_0 entered promiscuous mode [ 193.652267][ T8341] bridge0: port 2(bridge_slave_1) entered blocking state [ 193.659630][ T8341] bridge0: port 2(bridge_slave_1) entered disabled state [ 193.667133][ T8341] device bridge_slave_1 entered promiscuous mode [ 193.728947][ T8341] bridge0: port 2(bridge_slave_1) entered blocking state [ 193.736028][ T8341] bridge0: port 2(bridge_slave_1) entered forwarding state [ 193.743355][ T8341] bridge0: port 1(bridge_slave_0) entered blocking state [ 193.750424][ T8341] bridge0: port 1(bridge_slave_0) entered forwarding state [ 193.877157][ T492] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 193.885008][ T492] bridge0: port 1(bridge_slave_0) entered disabled state [ 193.898567][ T492] bridge0: port 2(bridge_slave_1) entered disabled state [ 193.928246][ T492] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 194.009336][ T492] bridge0: port 1(bridge_slave_0) entered blocking state [ 194.016420][ T492] bridge0: port 1(bridge_slave_0) entered forwarding state [ 194.062637][ T7] device veth0_vlan left promiscuous mode [ 194.229443][ T8387] device sit0 entered promiscuous mode [ 194.313900][ T492] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 194.322383][ T492] bridge0: port 2(bridge_slave_1) entered blocking state [ 194.329496][ T492] bridge0: port 2(bridge_slave_1) entered forwarding state [ 194.409877][ T492] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 194.420344][ T492] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 194.456608][ T492] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 194.491607][ T492] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 194.553812][ T8341] device veth0_vlan entered promiscuous mode [ 194.635716][ T492] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 194.661131][ T492] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 194.741951][ T492] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 194.784120][ T492] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 194.828794][ T492] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 194.849881][ T492] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 194.911801][ T8341] device veth1_macvtap entered promiscuous mode [ 194.919468][ T492] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 194.933212][ T492] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 194.951410][ T492] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 194.994855][ T492] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 195.003725][ T492] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 195.013075][ T492] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 195.023141][ T492] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 195.653345][ T8459] device syzkaller0 entered promiscuous mode [ 195.842584][ T8465] bridge0: port 3(veth0_vlan) entered disabled state [ 195.945435][ T8465] ÿÿÿÿÿÿ: renamed from vlan1 [ 196.809506][ T8493] dvmrp1: tun_chr_ioctl cmd 1074812118 [ 197.166717][ T8502] 7B’ç÷ï: renamed from syzkaller0 [ 197.858699][ C0] ip6_tunnel:  xmit: Local address not yet configured! [ 201.505608][ T8683] tap0: tun_chr_ioctl cmd 1074025677 [ 201.524952][ T8683] tap0: linktype set to 6 [ 202.140873][ T8715] device syzkaller0 entered promiscuous mode [ 202.152601][ T24] audit: type=1400 audit(1773318399.880:167): avc: denied { create } for pid=8716 comm="syz.3.2470" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_nflog_socket permissive=1 [ 202.207142][ T8717] bridge0: port 4(gretap0) entered disabled state [ 202.213726][ T8717] bridge0: port 2(bridge_slave_1) entered disabled state [ 202.220950][ T8717] bridge0: port 1(bridge_slave_0) entered disabled state [ 202.242334][ T8717] device bridge0 left promiscuous mode [ 202.781671][ T8759] device syzkaller0 entered promiscuous mode [ 202.942558][ T8767] device syzkaller0 entered promiscuous mode [ 204.591461][ T8839] device syzkaller0 entered promiscuous mode [ 205.426319][ T8876] device syzkaller0 entered promiscuous mode [ 205.925200][ T8904] device syzkaller0 entered promiscuous mode [ 208.309902][ T24] audit: type=1400 audit(1773318406.040:168): avc: denied { create } for pid=8986 comm="syz.2.2547" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=isdn_socket permissive=1 [ 210.069678][ T9063] device syzkaller0 entered promiscuous mode [ 210.703010][ T9120] tap0: tun_chr_ioctl cmd 1074025675 [ 210.718646][ T9120] tap0: persist enabled [ 210.745755][ T9121] tap0: tun_chr_ioctl cmd 1074025675 [ 210.778225][ T9121] tap0: persist disabled [ 211.194157][ T562] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 211.221416][ T562] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 211.299535][ T562] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ: link becomes ready [ 211.820265][ T9189] device syzkaller0 entered promiscuous mode [ 213.259092][ T24] audit: type=1400 audit(1773318410.990:169): avc: denied { create } for pid=9287 comm="syz.0.2646" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 213.599046][ T9321] tap0: tun_chr_ioctl cmd 1074025675 [ 213.608227][ T9321] tap0: persist enabled [ 213.614119][ T9321] tap0: tun_chr_ioctl cmd 1074025675 [ 213.647875][ T9321] tap0: persist enabled [ 213.830235][ T9319] device wg2 entered promiscuous mode [ 213.981894][ T9357] device veth1_macvtap left promiscuous mode [ 214.142537][ T9363] device pimreg0 entered promiscuous mode [ 215.038884][ T9431] device syzkaller0 entered promiscuous mode [ 215.159496][ T9456] device syzkaller0 entered promiscuous mode [ 215.225698][ T9456] syzkaller0: tun_net_xmit 1280 [ 215.310083][ T9469] device syzkaller0 entered promiscuous mode [ 217.611757][ T9569] device syzkaller0 entered promiscuous mode [ 223.100118][ T9778] erspan0: mtu less than device minimum [ 223.345433][ T9791] device syzkaller0 entered promiscuous mode [ 223.548054][ T9803] device syzkaller0 entered promiscuous mode [ 223.612797][ T9807] bridge0: port 1(bridge_slave_0) entered disabled state [ 224.203199][ T9851] device wg2 left promiscuous mode [ 227.691607][ T9992] device sit0 left promiscuous mode [ 227.938477][ C0] ip6_tunnel:  xmit: Local address not yet configured! [ 228.517926][ T24] audit: type=1400 audit(1773318426.240:170): avc: denied { setattr } for pid=10007 comm="syz.1.2854" path="/dev/net/tun" dev="devtmpfs" ino=151 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tun_tap_device_t tclass=chr_file permissive=1 [ 228.784272][T10025] device syzkaller0 entered promiscuous mode [ 231.072607][T10098] device pimreg0 entered promiscuous mode [ 232.813236][T10177] device aaaaaaaaaaaaaaa entered promiscuous mode [ 233.549720][T10194] device syzkaller0 entered promiscuous mode [ 234.305257][T10252] device syzkaller0 entered promiscuous mode [ 236.895584][T10353] bridge0: port 1(bridge_slave_0) entered blocking state [ 236.914199][T10353] bridge0: port 1(bridge_slave_0) entered disabled state [ 236.928683][T10353] device bridge_slave_0 entered promiscuous mode [ 236.953348][T10353] bridge0: port 2(bridge_slave_1) entered blocking state [ 236.961392][T10353] bridge0: port 2(bridge_slave_1) entered disabled state [ 236.969225][T10353] device bridge_slave_1 entered promiscuous mode [ 236.977754][T10387] tap0: tun_chr_ioctl cmd 1074025677 [ 236.984170][T10387] tap0: linktype set to 823 [ 237.015671][T10387] tap0: tun_chr_ioctl cmd 2147767511 [ 237.161133][T10353] bridge0: port 2(bridge_slave_1) entered blocking state [ 237.168264][T10353] bridge0: port 2(bridge_slave_1) entered forwarding state [ 237.175634][T10353] bridge0: port 1(bridge_slave_0) entered blocking state [ 237.182864][T10353] bridge0: port 1(bridge_slave_0) entered forwarding state [ 237.301272][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 237.318598][ T296] bridge0: port 1(bridge_slave_0) entered disabled state [ 237.341161][ T296] bridge0: port 2(bridge_slave_1) entered disabled state [ 237.361541][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 237.383579][ T296] bridge0: port 1(bridge_slave_0) entered blocking state [ 237.390913][ T296] bridge0: port 1(bridge_slave_0) entered forwarding state [ 237.434897][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 237.453299][ T296] bridge0: port 2(bridge_slave_1) entered blocking state [ 237.460364][ T296] bridge0: port 2(bridge_slave_1) entered forwarding state [ 237.478318][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 237.501281][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 237.518773][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 237.546260][T10353] device veth0_vlan entered promiscuous mode [ 237.589996][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 237.598578][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 237.607046][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 237.615337][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 237.643138][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 237.651150][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 237.663860][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 237.672524][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 237.693032][T10353] device veth1_macvtap entered promiscuous mode [ 237.704230][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 237.713180][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 237.722230][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 237.750388][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 237.775326][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 239.231514][ T492] device macsec0 left promiscuous mode [ 239.237071][ T492] nr0: port 1(macsec0) entered disabled state [ 239.254195][ T492] device bridge_slave_1 left promiscuous mode [ 239.260954][ T492] bridge0: port 2(bridge_slave_1) entered disabled state [ 239.268885][ T492] device bridge_slave_0 left promiscuous mode [ 239.275591][ T492] bridge0: port 1(bridge_slave_0) entered disabled state [ 239.736429][T10471] bridge0: port 1(bridge_slave_0) entered blocking state [ 239.744316][T10471] bridge0: port 1(bridge_slave_0) entered disabled state [ 239.752079][T10471] device bridge_slave_0 entered promiscuous mode [ 239.890257][T10471] bridge0: port 2(bridge_slave_1) entered blocking state [ 239.897444][T10471] bridge0: port 2(bridge_slave_1) entered disabled state [ 239.912968][T10471] device bridge_slave_1 entered promiscuous mode [ 240.297323][T10471] bridge0: port 2(bridge_slave_1) entered blocking state [ 240.304441][T10471] bridge0: port 2(bridge_slave_1) entered forwarding state [ 240.314082][T10507] -: renamed from syzkaller0 [ 240.526216][ T296] bridge0: port 2(bridge_slave_1) entered disabled state [ 240.538773][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 240.549224][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 240.645094][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 240.653874][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 240.668412][ T296] bridge0: port 1(bridge_slave_0) entered blocking state [ 240.675511][ T296] bridge0: port 1(bridge_slave_0) entered forwarding state [ 240.689988][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 240.700789][ T296] bridge0: port 2(bridge_slave_1) entered blocking state [ 240.707942][ T296] bridge0: port 2(bridge_slave_1) entered forwarding state [ 240.728420][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 240.765313][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 240.787013][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 240.827387][T10471] device veth0_vlan entered promiscuous mode [ 240.907938][ T48] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 240.916012][ T48] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 240.925462][ T48] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 240.934607][ T48] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 240.956720][ T48] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 240.965027][ T48] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 241.009960][T10471] device veth1_macvtap entered promiscuous mode [ 241.020902][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 241.029279][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 241.037597][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 241.131349][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 241.200179][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 241.633143][T10551] bridge0: port 1(bridge_slave_0) entered blocking state [ 241.748239][T10551] bridge0: port 1(bridge_slave_0) entered disabled state [ 241.796421][T10551] device bridge_slave_0 entered promiscuous mode [ 241.803608][T10551] bridge0: port 2(bridge_slave_1) entered blocking state [ 241.810807][T10551] bridge0: port 2(bridge_slave_1) entered disabled state [ 241.829800][T10551] device bridge_slave_1 entered promiscuous mode [ 242.321619][ T492] device gretap0 left promiscuous mode [ 242.327231][ T492] bridge0: port 4(gretap0) entered disabled state [ 242.376933][T10551] device veth0_vlan entered promiscuous mode [ 242.394636][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 242.414966][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 242.434519][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 242.472049][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 242.489112][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 242.527374][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 242.565068][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 242.595131][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 242.633379][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 242.645728][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 242.660420][ T296] bridge0: port 1(bridge_slave_0) entered blocking state [ 242.667576][ T296] bridge0: port 1(bridge_slave_0) entered forwarding state [ 242.675234][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 242.683740][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 242.692131][ T296] bridge0: port 2(bridge_slave_1) entered blocking state [ 242.699211][ T296] bridge0: port 2(bridge_slave_1) entered forwarding state [ 242.782794][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 242.967627][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 243.037943][T10551] device veth1_macvtap entered promiscuous mode [ 243.081101][ T492] device veth0_to_team left promiscuous mode [ 243.087239][ T492] Ÿë: port 1(veth0_to_team) entered disabled state [ 243.145862][ T492] device macsec0 left promiscuous mode [ 243.155918][ T492] nr0: port 1(macsec0) entered disabled state [ 243.181043][ T492] bridge0: port 3(veth0_vlan) entered disabled state [ 243.194624][ T492] device bridge_slave_1 left promiscuous mode [ 243.200961][ T492] bridge0: port 2(bridge_slave_1) entered disabled state [ 243.209089][ T492] device bridge_slave_0 left promiscuous mode [ 243.215386][ T492] bridge0: port 1(bridge_slave_0) entered disabled state [ 243.236963][ T24] audit: type=1400 audit(1773318440.960:171): avc: denied { create } for pid=10638 comm="syz.4.3033" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=irda_socket permissive=1 [ 243.527040][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 243.535422][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 243.588922][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 243.597336][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 243.620177][ T24] audit: type=1400 audit(1773318441.350:172): avc: denied { unmount } for pid=10551 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fs_t tclass=filesystem permissive=1 [ 243.832001][T10672] device syzkaller0 entered promiscuous mode [ 245.760549][ T492] nr0: port 1(macsec0) entered disabled state [ 245.775660][ T492] device bridge_slave_1 left promiscuous mode [ 245.812960][ T492] bridge0: port 2(bridge_slave_1) entered disabled state [ 245.831364][ T492] device bridge_slave_0 left promiscuous mode [ 245.837566][ T492] bridge0: port 1(bridge_slave_0) entered disabled state [ 245.846558][ T492] device veth1_macvtap left promiscuous mode [ 246.779582][T10786] device syzkaller0 entered promiscuous mode [ 248.406809][T10822] : port 1(ip6gretap0) entered blocking state [ 248.413687][T10822] : port 1(ip6gretap0) entered disabled state [ 248.423394][T10822] device ip6gretap0 entered promiscuous mode [ 248.431556][T10810] device ip6gretap0 left promiscuous mode [ 248.528909][T10810] : port 1(ip6gretap0) entered disabled state [ 249.357714][T10867] device veth1_macvtap left promiscuous mode [ 249.374807][T10867] device macsec0 entered promiscuous mode [ 250.423658][T10903] device aaaaaaaaaaaaaaa entered promiscuous mode [ 250.848979][T10932] device veth1_macvtap left promiscuous mode [ 250.974186][T10932] device veth1_macvtap entered promiscuous mode [ 251.036041][T10932] device macsec0 entered promiscuous mode [ 253.299901][T11000] device syzkaller0 entered promiscuous mode [ 256.779202][T11110] device veth0_vlan left promiscuous mode [ 256.828544][T11110] device veth0_vlan entered promiscuous mode [ 256.862044][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 256.907574][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 256.962354][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 259.519456][T11197] device syzkaller0 entered promiscuous mode [ 260.255539][T11247] device syzkaller0 entered promiscuous mode [ 261.787851][T11334] device syzkaller0 entered promiscuous mode [ 263.140162][T11422] device syzkaller0 entered promiscuous mode [ 263.741562][T11451] device syzkaller0 entered promiscuous mode [ 263.782722][T11449] device syzkaller0 entered promiscuous mode [ 264.077616][T11453] device syzkaller0 entered promiscuous mode [ 264.837952][T11474] device syzkaller0 entered promiscuous mode [ 268.964096][T11640] bridge0: port 2(bridge_slave_1) entered disabled state [ 268.972744][T11640] bridge0: port 1(bridge_slave_0) entered disabled state [ 269.082756][T11657] device bridge_slave_1 left promiscuous mode [ 269.089109][T11657] bridge0: port 2(bridge_slave_1) entered disabled state [ 269.102658][T11657] device bridge_slave_0 left promiscuous mode [ 269.118302][T11657] bridge0: port 1(bridge_slave_0) entered disabled state [ 270.004357][T11711] device syzkaller0 entered promiscuous mode [ 270.766744][T11740] device syzkaller0 entered promiscuous mode [ 272.464985][T11802] device syzkaller0 entered promiscuous mode [ 272.874046][T11833] syzkaller0: tun_chr_ioctl cmd 2147767507 [ 272.996100][T11833] device sit0 left promiscuous mode [ 274.918792][T11949] device syzkaller0 entered promiscuous mode [ 279.637193][T12194] device syzkaller0 entered promiscuous mode [ 279.683155][T12194] device syzkaller0 left promiscuous mode [ 280.810083][T12225] nr0: port 1(macsec0) entered blocking state [ 280.818052][T12225] nr0: port 1(macsec0) entered disabled state [ 281.951545][T12321] device syzkaller0 entered promiscuous mode [ 282.417080][T12336] tun0: tun_chr_ioctl cmd 1074025677 [ 282.431419][T12336] tun0: linktype set to 804 [ 284.386615][T12453] device sit0 entered promiscuous mode [ 284.712228][T12458] 7B’ç÷ï: renamed from syzkaller0 [ 284.854340][T12461] device syzkaller0 entered promiscuous mode [ 286.701112][T12515] nr0: port 1(macsec0) entered blocking state [ 286.723598][T12515] nr0: port 1(macsec0) entered disabled state [ 286.779744][T12515] device macsec0 entered promiscuous mode [ 287.246453][T12540] device wg2 entered promiscuous mode [ 287.486520][T12550] device syzkaller0 entered promiscuous mode [ 288.775355][T12593] syz.2.3612[12593] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 288.775415][T12593] syz.2.3612[12593] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 289.183842][T12608] device syzkaller0 entered promiscuous mode [ 289.352257][T12614] ÿÿÿÿÿÿ: renamed from vlan1 [ 290.943719][T12700] device wg2 left promiscuous mode [ 295.582433][T12899] device syzkaller0 entered promiscuous mode [ 295.738615][T12900] device syzkaller0 entered promiscuous mode [ 296.687826][T12960] syzkaller0: tun_chr_ioctl cmd 2147767511 [ 296.807637][T12963] device dummy0 entered promiscuous mode [ 296.861700][T12982] @0Ù: renamed from bond_slave_1 [ 298.662519][T13084] device syzkaller0 entered promiscuous mode [ 299.042222][T13121] bridge0: port 3(gretap0) entered blocking state [ 299.059870][T13121] bridge0: port 3(gretap0) entered disabled state [ 299.066740][T13121] device gretap0 entered promiscuous mode [ 299.083285][T13121] bridge0: port 3(gretap0) entered blocking state [ 299.089778][T13121] bridge0: port 3(gretap0) entered forwarding state [ 302.738724][T13324] tap1: tun_chr_ioctl cmd 1074025677 [ 302.758557][T13324] tap1: linktype set to 823 [ 304.445983][T13379] device syzkaller0 entered promiscuous mode [ 305.654843][T13417] dvmrp1: tun_chr_ioctl cmd 2147767520 [ 305.708635][T13428] dvmrp1: tun_chr_ioctl cmd 1074025673 [ 307.180101][T13503] device syzkaller0 entered promiscuous mode [ 310.085358][T13600] device syzkaller0 entered promiscuous mode [ 311.637582][T13682] €Â0: renamed from pim6reg1 [ 312.788037][T13734] device syzkaller0 entered promiscuous mode [ 313.254094][T13752] bridge0: port 3(gretap0) entered blocking state [ 313.281223][T13752] bridge0: port 3(gretap0) entered disabled state [ 313.342511][T13752] device gretap0 entered promiscuous mode [ 313.369769][T13752] bridge0: port 3(gretap0) entered blocking state [ 313.376409][T13752] bridge0: port 3(gretap0) entered forwarding state [ 315.069723][T13865] device pim6reg1 entered promiscuous mode [ 317.556336][T13921] device syzkaller0 entered promiscuous mode [ 317.718536][T13915] device sit0 left promiscuous mode [ 317.782841][ T24] audit: type=1400 audit(1773318515.510:173): avc: denied { create } for pid=13945 comm="syz.0.4031" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 317.914549][T13935] device sit0 entered promiscuous mode [ 318.109641][T13953] device pim6reg1 left promiscuous mode [ 318.286189][T13959] device syzkaller0 entered promiscuous mode [ 318.574401][T13986] bridge0: port 3(gretap0) entered disabled state [ 318.580947][T13986] bridge0: port 2(bridge_slave_1) entered disabled state [ 318.588097][T13986] bridge0: port 1(bridge_slave_0) entered disabled state [ 318.613036][T13986] device gretap0 left promiscuous mode [ 318.619093][T13986] bridge0: port 3(gretap0) entered disabled state [ 318.626994][T13986] device bridge_slave_1 left promiscuous mode [ 318.633583][T13986] bridge0: port 2(bridge_slave_1) entered disabled state [ 318.643854][T13986] device bridge_slave_0 left promiscuous mode [ 318.655610][T13986] bridge0: port 1(bridge_slave_0) entered disabled state [ 319.248656][T14007] device syzkaller0 entered promiscuous mode [ 319.507067][T14021] device syzkaller0 entered promiscuous mode [ 319.932331][T14055] device wg2 entered promiscuous mode [ 320.395784][T14069] device syzkaller0 entered promiscuous mode [ 321.602597][T14153] device syzkaller0 entered promiscuous mode [ 321.637996][T14149] device syzkaller0 entered promiscuous mode [ 322.594632][T14215] device syzkaller0 entered promiscuous mode [ 322.676726][T14219] device wg2 left promiscuous mode [ 323.206531][T14288] syzkaller0: tun_chr_ioctl cmd 2147767511 [ 323.555441][T14304] device syzkaller0 entered promiscuous mode [ 323.661748][T14304] device syzkaller0 left promiscuous mode [ 324.365020][T14359] device syzkaller0 entered promiscuous mode [ 324.449387][T14363] : port 1(syz_tun) entered blocking state [ 324.455334][T14363] : port 1(syz_tun) entered disabled state [ 324.461744][T14363] device syz_tun entered promiscuous mode [ 324.747388][T14382] device syzkaller0 entered promiscuous mode [ 326.600643][T14466] device wg2 entered promiscuous mode [ 327.151015][T14499] device macsec0 entered promiscuous mode [ 328.306943][T14541] device macsec0 left promiscuous mode [ 329.099668][T14561] syzkaller0: default qdisc (pfifo_fast) fail, fallback to noqueue [ 329.109035][T14561] device syzkaller0 entered promiscuous mode [ 329.612024][T14591] device sit0 left promiscuous mode [ 330.950988][T14627] device syzkaller0 entered promiscuous mode [ 331.109674][T14633] device syzkaller0 left promiscuous mode [ 335.855675][T14837] device syzkaller0 entered promiscuous mode [ 337.467571][T14919] : renamed from bond_slave_0 [ 338.926939][T14993] syz.4.4348[14993] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 338.927003][T14993] syz.4.4348[14993] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 339.171116][T14993] device syzkaller0 entered promiscuous mode [ 339.880734][T15051] device syzkaller0 entered promiscuous mode [ 341.591834][T15195] device wg2 entered promiscuous mode [ 342.093626][T15212] device bridge0 entered promiscuous mode [ 342.896338][T15242] device syzkaller0 entered promiscuous mode [ 343.150777][T15267] syzkaller0: tun_chr_ioctl cmd 1074025681 [ 344.045703][T15278] device veth1_macvtap left promiscuous mode [ 344.090648][T15283] device veth1_macvtap entered promiscuous mode [ 344.167711][T15283] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 344.187547][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 344.264275][T15296] device wg2 entered promiscuous mode [ 345.216666][T15331] device syzkaller0 entered promiscuous mode [ 346.081633][T15366] FAULT_INJECTION: forcing a failure. [ 346.081633][T15366] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 346.228371][T15366] CPU: 1 PID: 15366 Comm: syz.0.4451 Tainted: G W syzkaller #0 [ 346.237267][T15366] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 346.247335][T15366] Call Trace: [ 346.250645][T15366] __dump_stack+0x21/0x24 [ 346.254995][T15366] dump_stack_lvl+0x1a7/0x208 [ 346.259688][T15366] ? show_regs_print_info+0x18/0x18 [ 346.264992][T15366] ? vfs_write+0xb27/0xdc0 [ 346.269541][T15366] dump_stack+0x15/0x1c [ 346.273713][T15366] should_fail+0x3c1/0x510 [ 346.278154][T15366] should_fail_usercopy+0x1a/0x20 [ 346.283292][T15366] _copy_from_user+0x20/0xd0 [ 346.287894][T15366] __se_sys_bpf+0x1bb/0x740 [ 346.292412][T15366] ? __x64_sys_bpf+0x90/0x90 [ 346.297023][T15366] ? ____fput+0x15/0x20 [ 346.301193][T15366] ? debug_smp_processor_id+0x17/0x20 [ 346.306584][T15366] __x64_sys_bpf+0x7b/0x90 [ 346.311023][T15366] do_syscall_64+0x31/0x40 [ 346.315467][T15366] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 346.321371][T15366] RIP: 0033:0x7f31a62dc799 [ 346.325860][T15366] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 346.345570][T15366] RSP: 002b:00007f31a4d37028 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 346.354141][T15366] RAX: ffffffffffffffda RBX: 00007f31a6555fa0 RCX: 00007f31a62dc799 [ 346.362133][T15366] RDX: 0000000000000010 RSI: 00002000000001c0 RDI: 0000000000000009 [ 346.370301][T15366] RBP: 00007f31a4d37090 R08: 0000000000000000 R09: 0000000000000000 [ 346.378285][T15366] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 346.386265][T15366] R13: 00007f31a6556038 R14: 00007f31a6555fa0 R15: 00007ffe90803a18 [ 348.830427][T15479] dvmrp1: tun_chr_ioctl cmd 1074812118 [ 351.866938][T15593] device syzkaller0 entered promiscuous mode [ 351.955675][T15606] syzkaller0: tun_chr_ioctl cmd 2147767517 [ 352.262993][T15635] device syzkaller0 entered promiscuous mode [ 355.442539][T15786] ªªªªªª™™: renamed from vlan0 [ 356.644758][T15845] device syzkaller0 entered promiscuous mode [ 356.976094][T15851] device syzkaller0 entered promiscuous mode [ 357.987047][T15888] device syzkaller0 entered promiscuous mode [ 359.081806][T15898] device syzkaller0 entered promiscuous mode [ 360.230853][T15943] device veth0_vlan left promiscuous mode [ 360.244282][T15943] device veth0_vlan entered promiscuous mode [ 360.306027][ T492] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 360.320437][ T492] IPv6: ADDRCONF(NETDEV_CHANGE): ªªªªªª™™: link becomes ready [ 360.367132][ T492] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 361.516647][T15983] device sit0 entered promiscuous mode [ 363.109939][T16033] device syzkaller0 entered promiscuous mode [ 363.457535][T16045] syzkaller0: default qdisc (pfifo_fast) fail, fallback to noqueue [ 363.512188][T16045] device syzkaller0 entered promiscuous mode [ 365.334057][T16129] device syzkaller0 entered promiscuous mode [ 365.511232][T16129] device syzkaller0 left promiscuous mode [ 368.142449][T16210] device syzkaller0 entered promiscuous mode [ 369.801162][T16275] device syzkaller0 entered promiscuous mode [ 370.853520][T16302] lo: mtu less than device minimum [ 371.642728][T16308] device syzkaller0 entered promiscuous mode [ 371.778723][T16341] device gre0 entered promiscuous mode [ 373.296507][T16380] device syzkaller0 entered promiscuous mode [ 376.251958][T16482] device syzkaller0 entered promiscuous mode [ 376.504576][ T24] audit: type=1400 audit(1773318574.230:174): avc: denied { mounton } for pid=16493 comm="syz-executor" path="/" dev="sda1" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:root_t tclass=dir permissive=1 [ 376.606743][T16493] bridge0: port 1(bridge_slave_0) entered blocking state [ 376.614039][T16493] bridge0: port 1(bridge_slave_0) entered disabled state [ 376.621967][T16493] device bridge_slave_0 entered promiscuous mode [ 376.631003][T16493] bridge0: port 2(bridge_slave_1) entered blocking state [ 376.638255][T16493] bridge0: port 2(bridge_slave_1) entered disabled state [ 376.646347][T16493] device bridge_slave_1 entered promiscuous mode [ 376.743682][T16493] bridge0: port 2(bridge_slave_1) entered blocking state [ 376.750793][T16493] bridge0: port 2(bridge_slave_1) entered forwarding state [ 376.758063][T16493] bridge0: port 1(bridge_slave_0) entered blocking state [ 376.765127][T16493] bridge0: port 1(bridge_slave_0) entered forwarding state [ 376.799462][ T562] bridge0: port 1(bridge_slave_0) entered disabled state [ 376.811690][ T562] bridge0: port 2(bridge_slave_1) entered disabled state [ 376.836416][ T562] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 376.844434][ T562] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 376.866738][ T562] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 376.875486][ T562] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 376.884335][ T562] bridge0: port 1(bridge_slave_0) entered blocking state [ 376.891429][ T562] bridge0: port 1(bridge_slave_0) entered forwarding state [ 376.899658][ T562] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 376.908879][ T562] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 376.917224][ T562] bridge0: port 2(bridge_slave_1) entered blocking state [ 376.924471][ T562] bridge0: port 2(bridge_slave_1) entered forwarding state [ 376.946675][ T562] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 376.955470][ T562] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 376.987314][ T562] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 376.995649][ T562] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 377.123288][T16493] device veth0_vlan entered promiscuous mode [ 377.158794][ T492] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 377.167184][ T492] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 377.198548][ T492] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 377.207227][ T492] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 377.215370][ T492] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 377.223036][ T492] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 377.268120][ T562] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 377.279478][ T562] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 377.408488][T16493] device veth1_macvtap entered promiscuous mode [ 377.539726][ T562] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 377.557740][ T562] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 377.577579][ T562] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 377.601776][ T562] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 377.629654][ T562] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 378.253613][ T48] device macsec0 left promiscuous mode [ 378.260687][ T48] nr0: port 1(macsec0) entered disabled state [ 378.279645][ T48] device bridge_slave_1 left promiscuous mode [ 378.285818][ T48] bridge0: port 2(bridge_slave_1) entered disabled state [ 378.320269][ T48] device bridge_slave_0 left promiscuous mode [ 378.336633][ T48] bridge0: port 1(bridge_slave_0) entered disabled state [ 379.081950][T16577] syzkaller0: tun_chr_ioctl cmd 1074025677 [ 379.128289][T16577] syzkaller0: linktype set to 0 [ 381.245289][T16636] bridge0: port 2(bridge_slave_1) entered disabled state [ 381.252549][T16636] bridge0: port 1(bridge_slave_0) entered disabled state [ 381.412775][T16641] bridge0: port 2(bridge_slave_1) entered blocking state [ 381.419898][T16641] bridge0: port 2(bridge_slave_1) entered forwarding state [ 381.427209][T16641] bridge0: port 1(bridge_slave_0) entered blocking state [ 381.434269][T16641] bridge0: port 1(bridge_slave_0) entered forwarding state [ 381.467692][T16641] device bridge0 entered promiscuous mode [ 383.903576][T16824] device syzkaller0 entered promiscuous mode [ 383.959904][T16824] syzkaller0: create flow: hash 720763076 index 0 [ 384.118451][T16823] syzkaller0 (unregistered): delete flow: hash 720763076 index 0 [ 384.353474][T16854] syzkaller0: tun_chr_ioctl cmd 1074025677 [ 384.359560][T16854] syzkaller0: linktype set to 825 [ 384.378185][T16841] bridge0: port 1(bridge_slave_0) entered blocking state [ 384.388402][T16841] bridge0: port 1(bridge_slave_0) entered disabled state [ 384.414627][T16841] device bridge_slave_0 entered promiscuous mode [ 384.449179][T16841] bridge0: port 2(bridge_slave_1) entered blocking state [ 384.463171][T16841] bridge0: port 2(bridge_slave_1) entered disabled state [ 384.489928][T16841] device bridge_slave_1 entered promiscuous mode [ 384.643586][T16841] bridge0: port 2(bridge_slave_1) entered blocking state [ 384.650764][T16841] bridge0: port 2(bridge_slave_1) entered forwarding state [ 384.658153][T16841] bridge0: port 1(bridge_slave_0) entered blocking state [ 384.665206][T16841] bridge0: port 1(bridge_slave_0) entered forwarding state [ 384.739951][ T492] bridge0: port 1(bridge_slave_0) entered disabled state [ 384.757707][ T492] bridge0: port 2(bridge_slave_1) entered disabled state [ 384.771083][ T492] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 384.778677][ T492] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 384.789029][ T492] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 384.797752][ T492] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 384.806164][ T492] bridge0: port 1(bridge_slave_0) entered blocking state [ 384.813256][ T492] bridge0: port 1(bridge_slave_0) entered forwarding state [ 384.859349][ T492] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 384.872132][ T492] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 384.881109][ T492] bridge0: port 2(bridge_slave_1) entered blocking state [ 384.888310][ T492] bridge0: port 2(bridge_slave_1) entered forwarding state [ 384.930351][ T492] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 384.939085][ T492] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 384.947216][ T492] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 384.958261][ T492] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 384.970089][ T492] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 384.978627][ T492] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 384.991067][T16841] device veth0_vlan entered promiscuous mode [ 385.076374][ T492] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 385.090899][ T492] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 385.155355][T16841] device veth1_macvtap entered promiscuous mode [ 385.174832][ T492] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 385.183382][ T492] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 385.203955][ T492] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 385.222043][ T492] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 385.273567][ T492] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 385.300006][ T492] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 385.338518][ T492] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 385.357191][ T492] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 385.382604][ T492] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 385.877988][T16926] syzkaller0: default qdisc (pfifo_fast) fail, fallback to noqueue [ 385.922285][T16926] device syzkaller0 entered promiscuous mode [ 386.834651][T17003] device syzkaller0 entered promiscuous mode [ 389.269467][T17082] device syzkaller0 entered promiscuous mode [ 389.969299][T17150] tap0: tun_chr_ioctl cmd 1074025675 [ 390.038621][T17150] tap0: persist enabled [ 390.083420][T17153] tap0: tun_chr_ioctl cmd 1074025675 [ 390.128752][T17153] tap0: persist disabled [ 394.282301][T17309] device wg2 entered promiscuous mode [ 396.754669][T17401] sock: sock_set_timeout: `syz.4.5047' (pid 17401) tries to set negative timeout [ 396.891929][T17411] device syzkaller0 entered promiscuous mode [ 396.930596][ T562] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 397.013028][T17404] device syzkaller0 entered promiscuous mode [ 397.333779][T17432] +: renamed from team_slave_1 [ 397.991914][T17457] device syzkaller0 entered promiscuous mode [ 398.101135][T17475] device macsec0 entered promiscuous mode [ 398.118424][T17472] device veth1_macvtap left promiscuous mode [ 398.137885][T17472] device macsec0 left promiscuous mode [ 400.629500][T17584] device syzkaller0 entered promiscuous mode [ 404.513954][T17754] ªªªªªª™™: renamed from vlan0 [ 404.662330][T17757] device sit0 entered promiscuous mode [ 405.140102][T17775] device syzkaller0 entered promiscuous mode [ 406.576142][T17814] device syzkaller0 entered promiscuous mode [ 406.878584][ T24] audit: type=1400 audit(1773318604.610:175): avc: denied { create } for pid=17835 comm="syz.2.5168" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_crypto_socket permissive=1 [ 407.373332][T17856] device syzkaller0 entered promiscuous mode [ 407.880398][T17860] +: renamed from team_slave_1 [ 407.972599][T17871] device syzkaller0 entered promiscuous mode [ 408.064953][T17869] device wg2 left promiscuous mode [ 408.196483][T17878] device wg2 entered promiscuous mode [ 409.385479][T17923] device syzkaller0 entered promiscuous mode [ 409.500139][T17923] syzkaller0: tun_net_xmit 1280 [ 410.857116][T17987] bridge0: port 1(bridge_slave_0) entered blocking state [ 410.902884][T17987] bridge0: port 1(bridge_slave_0) entered disabled state [ 410.926723][T17987] device bridge_slave_0 entered promiscuous mode [ 410.951242][T17987] bridge0: port 2(bridge_slave_1) entered blocking state [ 410.968114][T17987] bridge0: port 2(bridge_slave_1) entered disabled state [ 410.985770][T17987] device bridge_slave_1 entered promiscuous mode [ 411.220523][T18021] device wg2 left promiscuous mode [ 411.334249][T18014] device wg2 entered promiscuous mode [ 411.445295][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 411.454602][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 411.520015][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 411.555422][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 411.565430][ T296] bridge0: port 1(bridge_slave_0) entered blocking state [ 411.572635][ T296] bridge0: port 1(bridge_slave_0) entered forwarding state [ 411.604318][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 411.642811][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 411.676278][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 411.700403][ T296] bridge0: port 2(bridge_slave_1) entered blocking state [ 411.707495][ T296] bridge0: port 2(bridge_slave_1) entered forwarding state [ 411.836999][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 411.859144][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 411.909058][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 411.954520][T17987] device veth0_vlan entered promiscuous mode [ 412.032580][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 412.069433][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 412.088979][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 412.149291][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 412.200804][T17987] device veth1_macvtap entered promiscuous mode [ 412.281364][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 412.309503][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 412.367497][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 412.426492][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 413.092728][ T562] device bridge_slave_1 left promiscuous mode [ 413.112461][ T562] bridge0: port 2(bridge_slave_1) entered disabled state [ 413.135991][ T562] device bridge_slave_0 left promiscuous mode [ 413.174202][ T562] bridge0: port 1(bridge_slave_0) entered disabled state [ 413.216769][ T562] device veth0_vlan left promiscuous mode [ 413.602155][T18063] device syzkaller0 entered promiscuous mode [ 413.755714][T18068] syzkaller0: tun_chr_ioctl cmd 2147767507 [ 415.597043][T18119] device sit0 entered promiscuous mode [ 416.092504][T18150] device syzkaller0 entered promiscuous mode [ 417.237044][T18195] tun0: tun_chr_ioctl cmd 1074025677 [ 417.242546][T18195] tun0: linktype set to 804 [ 417.734986][T18210] device syzkaller0 entered promiscuous mode [ 421.616612][T18284] device syzkaller0 entered promiscuous mode [ 422.087151][T18321] tap0: tun_chr_ioctl cmd 1074025692 [ 422.453723][T18332] erspan0: mtu less than device minimum [ 424.416402][T18382] device syzkaller0 entered promiscuous mode [ 424.534447][T18386] device syzkaller0 entered promiscuous mode [ 425.801435][T18435] device veth0_vlan left promiscuous mode [ 425.865622][T18435] device veth0_vlan entered promiscuous mode [ 426.068786][T18435] device wg2 left promiscuous mode [ 427.725530][T18488] device wg2 entered promiscuous mode [ 428.146277][T18495] device sit0 left promiscuous mode [ 428.230311][T18496] device sit0 entered promiscuous mode [ 428.781777][T18525] device syzkaller0 entered promiscuous mode [ 429.210613][T18568] @0Ù: renamed from bond_slave_1 [ 430.602635][T18670] device syzkaller0 entered promiscuous mode [ 431.657171][T18718] device veth0_vlan left promiscuous mode [ 431.720782][T18718] device veth0_vlan entered promiscuous mode [ 431.787370][ T562] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 431.806056][ T562] IPv6: ADDRCONF(NETDEV_CHANGE): ªªªªªª™™: link becomes ready [ 431.895259][ T562] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 433.464522][T18761] general protection fault, probably for non-canonical address 0xdffffc0000000004: 0000 [#1] PREEMPT SMP KASAN [ 433.476283][T18761] KASAN: null-ptr-deref in range [0x0000000000000020-0x0000000000000027] [ 433.484725][T18761] CPU: 1 PID: 18761 Comm: syz.4.5436 Tainted: G W syzkaller #0 [ 433.493586][T18761] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 433.503763][T18761] RIP: 0010:bpf_overflow_handler+0x288/0x370 [ 433.509768][T18761] Code: ff 55 00 41 89 c4 42 80 3c 3b 00 74 0a 48 8b 7c 24 10 e8 db 63 1a 00 48 8b 44 24 10 4c 8b 28 49 83 c5 20 4c 89 e8 48 c1 e8 03 <42> 80 3c 38 00 74 08 4c 89 ef e8 b9 63 1a 00 bb 70 02 00 00 49 03 [ 433.529403][T18761] RSP: 0018:ffffc90000c175c0 EFLAGS: 00010202 [ 433.535680][T18761] RAX: 0000000000000004 RBX: 1ffff11024636679 RCX: 0000000000000000 [ 433.543679][T18761] RDX: ffffc9000610c000 RSI: 0000000000000a02 RDI: 00000000ffffffff [ 433.551676][T18761] RBP: ffffc90000c176c0 R08: 0000000000000003 R09: 0000000000000004 [ 433.559668][T18761] R10: dffffc0000000000 R11: fffff52000182e80 R12: 00000000fffffff9 [ 433.567663][T18761] R13: 0000000000000020 R14: 1ffff92000182ec0 R15: dffffc0000000000 [ 433.575658][T18761] FS: 00007f47982946c0(0000) GS:ffff8881f7100000(0000) knlGS:0000000000000000 [ 433.584604][T18761] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 433.591203][T18761] CR2: 00002000006aa000 CR3: 000000010adbd000 CR4: 00000000003506a0 [ 433.599198][T18761] DR0: 0000200000000300 DR1: 0000200000000300 DR2: 0000000000000000 [ 433.607193][T18761] DR3: 0000000000000000 DR6: 00000000ffff0ff1 DR7: 0000000000000600 [ 433.615196][T18761] Call Trace: [ 433.618515][T18761] ? perf_pending_event+0x560/0x560 [ 433.623718][T18761] ? sched_clock+0x3a/0x40 [ 433.628142][T18761] ? __this_cpu_preempt_check+0x13/0x20 [ 433.633862][T18761] ? __perf_event_account_interrupt+0x1a4/0x2c0 [ 433.640105][T18761] __perf_event_overflow+0x1b3/0x340 [ 433.645394][T18761] perf_swevent_event+0x2f7/0x530 [ 433.650440][T18761] ___perf_sw_event+0x3aa/0x4d0 [ 433.655311][T18761] ? perf_swevent_put_recursion_context+0xb0/0xb0 [ 433.661753][T18761] ? kvm_sched_clock_read+0x18/0x40 [ 433.666988][T18761] ? sched_clock+0x3a/0x40 [ 433.671414][T18761] ? sched_clock_cpu+0x1b/0x3d0 [ 433.676270][T18761] ? sched_clock+0x3a/0x40 [ 433.680697][T18761] __perf_sw_event+0x134/0x270 [ 433.685493][T18761] do_user_addr_fault+0xc76/0xc90 [ 433.690530][T18761] ? irq_exit_rcu+0x9/0x10 [ 433.694952][T18761] ? asm_sysvec_apic_timer_interrupt+0x12/0x20 [ 433.701145][T18761] ? do_kern_addr_fault+0x80/0x80 [ 433.706182][T18761] ? _raw_spin_unlock_irqrestore+0x51/0x80 [ 433.711989][T18761] exc_page_fault+0x5a/0xc0 [ 433.716510][T18761] asm_exc_page_fault+0x1e/0x30 [ 433.721368][T18761] RIP: 0010:copy_user_enhanced_fast_string+0xe/0x40 [ 433.727955][T18761] Code: 89 d1 c1 e9 03 83 e2 07 f3 48 a5 89 d1 f3 a4 31 c0 0f 01 ca c3 90 90 90 90 90 90 90 0f 01 cb 83 fa 40 0f 82 70 ff ff ff 89 d1 a4 31 c0 0f 01 ca c3 90 90 90 90 90 90 90 90 90 90 89 d1 83 f8 [ 433.747559][T18761] RSP: 0018:ffffc90000c17c00 EFLAGS: 00050206 [ 433.753625][T18761] RAX: ffffffff823e7401 RBX: 0000000000001400 RCX: 0000000000000640 [ 433.761595][T18761] RDX: 0000000000001400 RSI: 00002000006aa000 RDI: ffff888141b18dc0 [ 433.769577][T18761] RBP: ffffc90000c17c30 R08: ffff888141b193ff R09: 1ffff1102836327f [ 433.777549][T18761] R10: dffffc0000000000 R11: ffffed1028363280 R12: 00007ffffffff000 [ 433.785609][T18761] R13: 00002000006aa640 R14: ffff888141b18000 R15: 00002000006a9240 [ 433.793594][T18761] ? _copy_from_user+0x61/0xd0 [ 433.798364][T18761] ? _copy_from_user+0x7e/0xd0 [ 433.803130][T18761] generic_map_update_batch+0x4ad/0x760 [ 433.808769][T18761] ? bpf_enable_instrumentation+0x50/0x50 [ 433.814606][T18761] ? bpf_enable_instrumentation+0x50/0x50 [ 433.820331][T18761] bpf_map_do_batch+0x463/0x5f0 [ 433.825191][T18761] __se_sys_bpf+0x5bf/0x740 [ 433.829720][T18761] ? __x64_sys_bpf+0x90/0x90 [ 433.834335][T18761] ? __kasan_check_read+0x11/0x20 [ 433.839365][T18761] __x64_sys_bpf+0x7b/0x90 [ 433.843790][T18761] do_syscall_64+0x31/0x40 [ 433.848216][T18761] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 433.854127][T18761] RIP: 0033:0x7f4799839799 [ 433.858555][T18761] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 433.878280][T18761] RSP: 002b:00007f4798294028 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 433.886696][T18761] RAX: ffffffffffffffda RBX: 00007f4799ab2fa0 RCX: 00007f4799839799 [ 433.894682][T18761] RDX: 0000000000000038 RSI: 0000200000000300 RDI: 000000000000001a [ 433.902670][T18761] RBP: 00007f47998cfc99 R08: 0000000000000000 R09: 0000000000000000 [ 433.910657][T18761] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 433.918636][T18761] R13: 00007f4799ab3038 R14: 00007f4799ab2fa0 R15: 00007fff394d5838 [ 433.926620][T18761] Modules linked in: [ 433.930831][T18761] ---[ end trace 1e3d5f3a953dd23e ]--- [ 433.936341][T18761] RIP: 0010:bpf_overflow_handler+0x288/0x370 [ 433.942751][T18761] Code: ff 55 00 41 89 c4 42 80 3c 3b 00 74 0a 48 8b 7c 24 10 e8 db 63 1a 00 48 8b 44 24 10 4c 8b 28 49 83 c5 20 4c 89 e8 48 c1 e8 03 <42> 80 3c 38 00 74 08 4c 89 ef e8 b9 63 1a 00 bb 70 02 00 00 49 03 [ 433.953194][ T24] audit: type=1400 audit(1773318631.670:176): avc: denied { read } for pid=77 comm="syslogd" name="log" dev="sda1" ino=2010 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 433.962445][T18761] RSP: 0018:ffffc90000c175c0 EFLAGS: 00010202 [ 433.990249][T18761] RAX: 0000000000000004 RBX: 1ffff11024636679 RCX: 0000000000000000 [ 433.998261][T18761] RDX: ffffc9000610c000 RSI: 0000000000000a02 RDI: 00000000ffffffff [ 434.006206][ T24] audit: type=1400 audit(1773318631.670:177): avc: denied { search } for pid=77 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 434.006281][T18761] RBP: ffffc90000c176c0 R08: 0000000000000003 R09: 0000000000000004 [ 434.035934][T18761] R10: dffffc0000000000 R11: fffff52000182e80 R12: 00000000fffffff9 [ 434.038715][ T24] audit: type=1400 audit(1773318631.670:178): avc: denied { write } for pid=77 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 434.043991][T18761] R13: 0000000000000020 R14: 1ffff92000182ec0 R15: dffffc0000000000 [ 434.073402][T18761] FS: 00007f47982946c0(0000) GS:ffff8881f7100000(0000) knlGS:0000000000000000 [ 434.082432][T18761] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 434.086707][ T24] audit: type=1400 audit(1773318631.670:179): avc: denied { add_name } for pid=77 comm="syslogd" name="messages" scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 434.089069][T18761] CR2: 00002000006aa000 CR3: 000000010adbd000 CR4: 00000000003506a0 [ 434.089081][T18761] DR0: 0000200000000300 DR1: 0000200000000300 DR2: 0000000000000000 [ 434.089088][T18761] DR3: 0000000000000000 DR6: 00000000ffff0ff1 DR7: 0000000000000600 [ 434.089136][T18761] Kernel panic - not syncing: Fatal exception [ 434.124401][ T24] audit: type=1400 audit(1773318631.670:180): avc: denied { create } for pid=77 comm="syslogd" name="messages" scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 434.125949][T18761] Kernel Offset: disabled [ 434.164790][T18761] Rebooting in 86400 seconds..