last executing test programs: 2.023631566s ago: executing program 4 (id=3789): r0 = perf_event_open(&(0x7f0000000fc0)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x1000000000000400, 0xf6103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, @perf_bp={0x0, 0x8}, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$ITER_CREATE(0xb, &(0x7f0000000100), 0x0) r2 = bpf$ITER_CREATE(0xb, &(0x7f00000002c0)={r1}, 0x8) write$cgroup_int(r2, &(0x7f00000001c0), 0xfffffdef) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x16, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000000000850000002200000018010000202070250000000000202020630af8ff00000000bea100000000000007010000f8ffffffb702000008000000b7030000ffee0000850000007200000095"], 0x0, 0x0, 0x0, 0x0, 0x41000, 0x74, '\x00', 0x0, @fallback=0x15, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0xffffffff}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d0000001801000020696c2500000000002020097b1af8ff00000000bfa100000000000007010000b8ffffffb702000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r3 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) write$cgroup_pid(r3, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x5, &(0x7f0000000440)=ANY=[@ANYBLOB="1809000000ffffff00000000000000008510000002000000850000000f0000009500000000000000"], 0x0, 0xfffffdff, 0x0, 0x0, 0x727c45cd4283345, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x1, 0x4c, 0x5, 0x0, 0x40000, 0x1, 0x4, '\x00', 0x0, r1, 0x5, 0x3, 0x4}, 0x50) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r4) 1.953452429s ago: executing program 1 (id=3792): r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x16, 0xb, &(0x7f0000000140)=ANY=[@ANYBLOB="180000000100000000000000f30e000018010000756c6c2500000000ff0700007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000088030000850000000600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0x25, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000240)={r0, 0x0, 0x10, 0x38, &(0x7f00000002c0)='\x00\x00\x00\x00\x00\x00\x00\x00', &(0x7f0000000300)=""/8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x4c) r1 = perf_event_open(&(0x7f0000000fc0)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x400, 0xf6103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x24000000, 0x0, @perf_bp={0x0, 0x8}, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x15, 0x2000000000000216, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000f00000018010000646c6c2400000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000095"], 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x1c, '\x00', 0x0, @fallback=0x28, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x8, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r2) syz_clone(0x40800000, 0x0, 0x0, 0x0, 0x0, 0x0) 1.848013584s ago: executing program 0 (id=3794): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x14, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000000000000000000000000001801000020646c2100000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000007000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xb, 0x7, 0x8, 0x8, 0x5}, 0x48) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[], 0x48) (async) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[], 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000600)={0x3, 0x3, &(0x7f0000000000)=ANY=[@ANYBLOB="7a0a00ff0000000071107a00000000009500000000000000"], &(0x7f0000000480)='syzkaller\x00'}, 0x80) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000600)={0x3, 0x3, &(0x7f0000000000)=ANY=[@ANYBLOB="7a0a00ff0000000071107a00000000009500000000000000"], &(0x7f0000000480)='syzkaller\x00'}, 0x80) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x14, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000000000000000000000000001801000020646c2100000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007300000018110000", @ANYRES32=r0], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0xe, '\x00', 0x0, @fallback=0x25, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x14, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000000000000000000000000001801000020646c2100000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007300000018110000", @ANYRES32=r0], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0xe, '\x00', 0x0, @fallback=0x25, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_BIND_MAP(0xa, &(0x7f0000000080)={r1}, 0xc) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f0000000380)={0x5, 0x80, 0x1, 0x0, 0x0, 0x2, 0x0, 0x0, 0x8601, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd, 0x2, @perf_config_ext={0x1, 0x80000de}, 0x1000, 0xc4, 0x0, 0x7, 0x4008000000, 0x2, 0x13, 0x0, 0x820, 0x0, 0x8}, 0x0, 0x3, 0xffffffffffffffff, 0x0) close(r3) recvmsg$unix(r2, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) (async) recvmsg$unix(r2, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0xfc, 0x0, 0x1, 0x27030, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x0, @perf_config_ext={0x80}, 0x0, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x0, 0x3}, 0x0, 0x2000004, 0xffffffffffffffff, 0xa) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000001c0)=@base={0x9, 0x4, 0x4, 0x4, 0x2, 0x1}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x11, 0x14, &(0x7f00000002c0)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b7080000fcffffff7b8af8ff00000000bfa200000000000007020000f8ffffffb703000008230000b7040000000000008500000001000000180100002020732500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000000060ff850000000400000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x1, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x11, 0x14, &(0x7f00000002c0)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b7080000fcffffff7b8af8ff00000000bfa200000000000007020000f8ffffffb703000008230000b7040000000000008500000001000000180100002020732500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000000060ff850000000400000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x1, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000680)={r6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60, 0x0, 0x0, 0x0, 0x0}, 0x50) write$cgroup_subtree(r4, &(0x7f0000000000)=ANY=[@ANYBLOB="8fedcb790700117df37538e486dd6317ce2200fc00000000000000000000000000007f"], 0xfdef) write$cgroup_subtree(r4, &(0x7f0000000000)=ANY=[], 0xfdef) 1.840458725s ago: executing program 3 (id=3795): r0 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000000)={0x1b, 0x0, 0x0, 0x9, 0x0, 0xffffffffffffffff, 0x6, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x3}, 0x50) r1 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000180)=0xffffffffffffffff, 0x4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000500)={0xffffffffffffffff, 0xe0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000240)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x7, 0x1, &(0x7f0000000280)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000002c0)=[0x0], 0x0, 0xa0, &(0x7f0000000300)=[{}, {}, {}, {}, {}, {}, {}, {}], 0x40, 0x10, &(0x7f0000000340), &(0x7f0000000380), 0x8, 0xa4, 0x8, 0x8, &(0x7f00000003c0)}}, 0x10) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000840)={0x20, 0xf, &(0x7f0000000540)=@framed={{0x18, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x81}, [@kfunc={0x85, 0x0, 0x2, 0x0, 0x5}, @tail_call, @tail_call={{0x18, 0x2, 0x1, 0x0, 0x1}}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x1}]}, &(0x7f00000005c0)='GPL\x00', 0x8, 0xc3, &(0x7f0000000600)=""/195, 0x40f00, 0x28, '\x00', 0x0, @netfilter, 0xffffffffffffffff, 0x8, &(0x7f0000000700)={0x1, 0x4}, 0x8, 0x10, &(0x7f0000000740)={0x4, 0xa, 0xfffeffff, 0x7fff}, 0x10, 0x0, 0xffffffffffffffff, 0x6, &(0x7f0000000780)=[0xffffffffffffffff, 0x1], &(0x7f00000007c0)=[{0x5, 0x1, 0x3, 0x2}, {0x4, 0x3, 0x7}, {0x3, 0x2, 0x3, 0x7}, {0x1, 0x5, 0xe, 0x5}, {0x5, 0x3, 0x10, 0x2}, {0x4, 0x2, 0x8, 0xa}], 0x10, 0xcb9}, 0x94) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000009c0)={0x1e, 0x11, &(0x7f0000000080)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x2b}, {{0x18, 0x1, 0x1, 0x0, 0x1}}, {}, [@map_val={0x18, 0x1, 0x2, 0x0, r0, 0x0, 0x0, 0x0, 0x4}], {{}, {}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000140)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x50, '\x00', 0x0, @sk_lookup, r1, 0x8, &(0x7f00000001c0)={0x0, 0x5}, 0x8, 0x10, &(0x7f0000000200)={0x5, 0xb, 0x4d40, 0x400000}, 0x10, r3, r4, 0x7, &(0x7f0000000900)=[0xffffffffffffffff], &(0x7f0000000940)=[{0x2, 0x5, 0x7, 0xa}, {0x5, 0x3, 0x4}, {0x1, 0x5, 0xe, 0xb}, {0x0, 0x3, 0x10, 0x6}, {0x1, 0x2, 0x6}, {0x2, 0x5, 0xf, 0xc}, {0x3, 0x5, 0xe, 0x2}], 0x10, 0x1000}, 0x94) r6 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000a80)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000ac0)) r7 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000b00)=r3, 0x4) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000b40)={0x3, 0x4, 0x4, 0xa, 0x0, r0, 0x101, '\x00', 0x0, r7, 0x5, 0x2, 0x2}, 0x50) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000bc0)=r5, 0x4) openat$tun(0xffffffffffffff9c, &(0x7f0000000c00), 0x0, 0x0) r8 = openat$cgroup_int(r6, &(0x7f0000000c40)='hugetlb.1GB.rsvd.failcnt\x00', 0x2, 0x0) r9 = openat$cgroup_ro(r6, &(0x7f0000000c80)='blkio.bfq.sectors\x00', 0x0, 0x0) write$cgroup_subtree(r9, &(0x7f0000000cc0)={[{0x2d, 'net'}, {0x2d, 'devices'}, {0x2b, 'net_cls'}]}, 0x17) mkdir(&(0x7f0000000d00)='./file0\x00', 0x1) bpf$MAP_LOOKUP_BATCH(0x18, &(0x7f0000000fc0)={&(0x7f0000000d40)="61152949afd29779beced77a182b8a9b0b1dba473861e0af8ebce39d60966675b31330325de2df74d761310e7c89a246fc58b81f501c88df387d5b21d7bb7ad446ed138c3273f14b15af9ca60f1817a9a6bfaf3209", &(0x7f0000000dc0)=""/149, &(0x7f0000000e80)="fbbe3b1ec53ef4c1fad499e9ee66ec20105aacf9996c41166e2d3b380a67", &(0x7f0000000ec0)="39b412490745506c3f32b7eb87a76899d94dca770efe7becb8aa7dd5314b645b64a58f5343e86793c36bb6ea9d65b8f10a7c39919b6e8360232267ac9f953a256ac72e405d5ac9991a17b616ae42d8ab5119b22c3ac9f3bfa39253dcaea81ea4ad1bcb37adc7669f569b48301f4048429a15f0537d90ce654979f161ffbbca7bf91727d0b687a02dbe8ff8ec6649a89c2ea6be5738f18f42fa4add65c6647f753da63be86cd2d6d92a76f41ad5eba633585a20798d4df2a760e09773f696183fe0b9edcc6e2b728c352325553c8bbcfe8c653068b0747f54b8c80abdb0b123e3721e3b868d", 0x8, r9, 0x4}, 0x38) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000001100)={@cgroup=r6, 0x2f, 0x1, 0x1ff, &(0x7f0000001000)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x9, 0x0, &(0x7f0000001040)=[0x0, 0x0], &(0x7f0000001080)=[0x0, 0x0], &(0x7f00000010c0)=[0x0, 0x0], 0x0}, 0x40) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000001140)={@cgroup=r6, r5, 0x33, 0x3, r9, @void, @value=r4, @void, @void, r11}, 0x20) bpf$TOKEN_CREATE(0x24, &(0x7f0000001180)={0x0, r1}, 0x8) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000001440)={r9, 0x0, 0x26, 0x99, &(0x7f00000011c0)="c14bd19a0fbbf61fd550a5fd6679313af55c93ff14517c1ac4bdfd57aafde018d2b60e5b7b42", &(0x7f0000001200)=""/153, 0x5e0, 0x0, 0x4b, 0xce, &(0x7f00000012c0)="8753bd222175d71571e65ada2cba917ddabe2e264f42c98c882b3b0efcba47a348d6dbbb029b29e0b14cad8157f090569eed1b1e9e42640bcd1fdb815a474a5a3dae66f43221ea5746a94d", &(0x7f0000001340)="e7e5917c72010eccf4855d7678bc314c5d002d9d679f82eae6121dcc1ac3a1a87c3cb8671c303f2b0d064ac1b1d6930a34702a10e4838818671aad0e3064c9100eb806af4633f9b392432f1a80e66de940884e6f009000586808f67d6fe69ba2251a621cb03a2a6b9ab828cdb38d4a6b0087262312a83fa399cf7425204f6fe21a835926f6cc12c4b1e2da73df862c52fb15c459b34d49fb83f8c3a11494fc72a323fa9e6becc54ae3fd45994413d16b4f46dcc0c5bb55ea985f976cc613c530ae04ecb4114c1a0ddb20bd0e1501", 0x4, 0x0, 0x2}, 0x50) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001540)={{r9}, &(0x7f00000014c0), &(0x7f0000001500)=r9}, 0x20) openat$cgroup_ro(r10, &(0x7f0000001580)='cpuacct.usage_user\x00', 0x0, 0x0) ioctl$TUNSETTXFILTER(r9, 0x400454d1, &(0x7f00000015c0)={0x0, 0x1, [@broadcast]}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000027c0)={r5, 0x0, 0x2a, 0x1000, &(0x7f0000001600)="05c18ffef894ccc712ce7462acd334239daf67abe6071654dcd45838647d005224e49a9263f872ede144", &(0x7f0000001640)=""/4096, 0x8, 0x0, 0xa1, 0x83, &(0x7f0000002640)="3e6e7320a8bf83c2c624dce756e3995d8b5b67bed7ae8c3189731650b9b6257f5dabdc3684068da50304ae64762e6d2d11c911ece918bac0a756ab1d78ea0d12356298bcb48f2498151fad68d0efc03ae0a110bf4fba0fa4ae2a873bc2e4558d93c913d84e54590694862fa3d8a678252ecc9e1b166d1ac8be84c6bddb58dfd9598aa9d69459de2ac820ab5f8deb723dc989ec05fef09dce5c6e1e626c2a91591b", &(0x7f0000002700)="7dd55905d1e44fe5513e5c21c28042c1ef63866ae10d8a1485303ab4241512c42d21f4953e42c2d4fa70f0cc72ecf6ec471fb94999dcc1eaf8eca7207a6a95da930654d1d8258f6670fbaf95484ea7993ec2e675057e40a2fba12052f98028b119ee4bdf0cc129fb2e89e9a9b123f2fb390fda31d1f689a5f7659b9f0dd18e607269f1", 0x4, 0x0, 0x7ff}, 0x50) bpf$MAP_LOOKUP_BATCH(0x18, &(0x7f0000002ac0)={&(0x7f0000002840)="eb4a079b49d049c1043c5883d1e28e5be4f58878713335480ad75f4e5f98be356f1d4beb731a60d66e2284009de9188db1b48ebefa1ae746175cd4d24d1da7a91b2b167cca72c49ab86366fa6a5f61029897292a9fbb9a1e45ffc12cb976968e3370903cef5ff2dbd60613da115add726fb8e5", &(0x7f00000028c0)=""/159, &(0x7f0000002980)="1138860365033ac799ca7758", &(0x7f00000029c0)="d2f3df60770d4f86152de5020e83fb7211c8d5661b19a23dd731fbb0e7bc9655751074a495cc8ecf8e5afd77490b06aea5a1a710acfc12c1bb871e49e7541c07a2e23ff758467ec214e08711d91b471f6be59ae10db12086754e90bd4d6fac6b49275d3cfe698b10218e6787639333d998a12fe7cb9e8f812df733a2a5257b04b117b1e726740024c5102ea12eacc8bcafe680edcee134f580396e081ab0a2a869b397e31125bd9b1cc500e448fe75c89546d11032275c2fde6a6ab33d57c5c47d9c63", 0x3, r9}, 0x38) r12 = bpf$TOKEN_CREATE(0x24, &(0x7f0000002b80)={0x0, r8}, 0x8) bpf$MAP_CREATE(0x0, &(0x7f0000002b00)=@bloom_filter={0x1e, 0x0, 0x8, 0x8001, 0x10480, r9, 0x6, '\x00', r2, r1, 0x5, 0x5, 0x4, 0x2, @void, @value, @value=r12}, 0x50) r13 = bpf$TOKEN_CREATE(0x24, &(0x7f0000002cc0)={0x0, r12}, 0x8) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000002c80)={&(0x7f0000002bc0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x4, [@float={0x4, 0x0, 0x0, 0x10, 0x8}]}, {0x0, [0x30, 0x0]}}, &(0x7f0000002c00)=""/76, 0x28, 0x4c, 0x0, 0x3, 0x10000, @value=r13}, 0x28) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000002fc0)={r5, 0xe0, &(0x7f0000002ec0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000002d00)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x5, 0x6, &(0x7f0000002d40)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000002d80)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0xb8, &(0x7f0000002dc0)=[{}, {}, {}, {}], 0x20, 0x10, &(0x7f0000002e00), &(0x7f0000002e40), 0x8, 0xb0, 0x8, 0x8, &(0x7f0000002e80)}}, 0x10) 1.816577536s ago: executing program 0 (id=3796): syz_clone(0xc0126080, 0x0, 0x0, &(0x7f0000002100), 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000840)=@base={0xa, 0x5, 0x2, 0x4}, 0x48) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x1b, 0x0, 0x58, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x3}, 0x50) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x345c40, 0x0) ioctl$TUNSETOFFLOAD(r2, 0x400454d0, 0xa) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = syz_clone(0x20102400, 0x0, 0x0, 0x0, 0x0, 0x0) sendmsg$unix(r3, &(0x7f0000000500)={&(0x7f0000000100)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f00000003c0), 0x4, &(0x7f0000000400)=[@cred={{0x1c, 0x1, 0x2, {r5, 0x0, 0xee00}}}, @rights={{0x14}}, @rights={{0x34, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0xfffffffffffffed2, 0x1, 0x2, {0x0, 0xffffffffffffffff, 0xee01}}}, @cred={{0xfffffffffffffff1, 0x1, 0x2, {0x0, 0xee01, 0xee01}}}, @rights={{0xfffffffffffffe67}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff, r4]}}], 0xf8, 0x8810}, 0x20004080) bpf$PROG_LOAD(0x5, &(0x7f0000001c40)={0x14, 0x10, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b702000001000000850000008600000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2f, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r8 = bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x1, 0x10, &(0x7f0000000180)=ANY=[], &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) setsockopt$sock_attach_bpf(r6, 0x1, 0x32, &(0x7f00000000c0)=r8, 0x4) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000640)={0xe, 0x4, &(0x7f0000000040)=@framed={{}, [@ldst={0x1, 0x2, 0x3, 0x0, 0x1, 0x65}]}, &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24}, 0x80) sendmsg$unix(r7, &(0x7f00000006c0)={0x0, 0x0, 0x0}, 0x0) r9 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) ioctl$TUNSETFILTEREBPF(r9, 0x800454e1, &(0x7f0000000040)=r9) 1.760031839s ago: executing program 3 (id=3797): bpf$MAP_CREATE_RINGBUF(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) (async) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) openat$cgroup_procs(r0, 0x0, 0x2, 0x0) perf_event_open(&(0x7f0000000280)={0x0, 0x80, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1}, 0x0, 0xc8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) (async) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0xfdef) (async) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="007a707573657420006370750806"], 0x12) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000600)={0xffffffffffffffff, 0x5, 0xb68, 0x4, &(0x7f0000000000)='%', 0x0, 0xd01, 0x80040000, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x48) socketpair$unix(0x1, 0x5, 0x0, 0x0) (async) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={0xffffffffffffffff, 0x2800000002000000, 0x0, 0x0, &(0x7f0000000140), 0x0, 0x80000000, 0x4000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000}, 0x50) (async) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'ip6tnl0\x00', 0x200}) (async) socketpair(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x63, 0x0, 0x0, 0x0, 0x0, 0x0, 0x34000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}, 0x0, 0x1, 0x2, 0x1, 0xffffffffffffbbfe, 0x0, 0x0, 0x0, 0x2}, 0xffffffffffffffff, 0xfffffffffffffffe, 0xffffffffffffffff, 0x0) (async) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x89f1, &(0x7f0000000080)) (async) close(0xffffffffffffffff) (async) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r2, &(0x7f0000000000)=ANY=[], 0xfdef) (async) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz1\x00', 0x1ff) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) syz_clone(0x43b00000, 0x0, 0x5b, 0x0, 0x0, 0x0) (async) r4 = openat$cgroup_procs(r3, &(0x7f0000000840)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r4, &(0x7f0000000380), 0x12) (async) bpf$PROG_LOAD(0x5, 0x0, 0x0) (async) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) (async) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) 1.759607689s ago: executing program 3 (id=3798): r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000001ec0)=ANY=[@ANYBLOB="b702000024000080bfa30000000000000703000000feffff7a0af0fff8bffffd79a4f0ff00000000b7060000ffffffff2d640500000000006502040001001f000404000001007d60b7030000000000006a0a00fefdff00008500000026000000b7000000000000009500000000000000c743a0c8e3ebbadcb74220e5a7efcc9ac1467fb2ea80dbcf8df265e1b40e4c8afd5c0c000000008da68076774bbcdb2c769937000090af27db5b56024db96bcbbbd2cb2000ce03000000000000007e357754508535766c80114604a86fe569b05614eab9297eb290a248a120c9c6e39f403ff065fd3052aae80675eeba68562eaeaea5fecf298ca20f274233106eab63ecf772de7b265040b6c50b7420b48a93fe94c756108afcd0b2eb78040000005f02a5a6474ae549070004000000ed5020e6474ac921fee1f6d8ad6a80d0947cd6d4a561ced21a0b4a902be6af7ec2d1ba002e57f301000000000000000000000000100000aaf25343063e6581f9e6de14ad72e5ad84309f47f96a576cd20cef7ed951a73ea73d7c7f14e306f1f1d1377e57abb19700f0077e9d0000b93eb0f2c6f8141e350dc68147e5958128d22d58625cf9dba211bfff9c3709c9b134625d3d2369f516a49eeeb1a662c8dfb875bdf5c6ba73cccdfacb202994c40d322717faff03323dce8a34ee0ca2cf61efb4b30000642735d6d482ba98d252f36c54333a8b1aa736369392b9067665339820f5f1557b0bf7cc06a5a13c714e0b1a1f000000ff3283076cda3d0b1a2905cfc3d04f1db264b530abcbe44bc405f600807909727fb819afa1907228fa9e83433eedb4ac88d0285594ffb0d14c09d5c77f33702822b02488ea570204c8441ced81cacf945dcb2486d658eec8bcaffbe800a041a378b40dc9e3600e916ae6307bd8325a442095bc9a8b0c95905979f34adddbb26f0d24425c8ab9d937d84b521914f92eed3d3e9de82942a952e86b567aff5bc2e3d1fcc00f618363df5d0d181ee8f4b8fd356c9eb365adc037e443820c05c5db16ff07a9cb471e2ebf91ab00a05f88c1cd55f8c81f5eb1f8d615ca27efb2193bb61665a1ce37f30c2efc9c3b5a4a5d95479fac471ba60fbd0e50225563cd37343d09da72472efc2b2877fbab12a891513e5f0763ae06c0610a2869747c143d7500760600f3ffb2310e19ac58bf29d7f178d09a9f634a3ae492f54649589e3692768a0f3a082c5242c8fa7ff40007ff275df45508ad85950d8e08465fa1067ea8f383b3e7a7ddf5977d46f4bc38f914b4a496426d8468f9ba618b6b2218b50c8fc9efbce3ba799cf70de7e13be871aa7eb402e2b11f440361e18d4e334bfc6ae54e62e67a0338c756c544189e4519a029674e2a2bbbc7f6600000000000800000e5e30b70b198246d3a62660600000030a0af132e680510811d3ab71af5d98e2d3d928a749e8b9402d14655612bd58fb40b4625cb69bf6cea97b447f2d970d99100000000086000001b881afb2cc500003a73562af4878f75b4c98274eeb666aa1f5fcf91990cf0dcfef9540057b8a3fff2bc02c5941626d2015f414546e87835ba18e9101734a9e9c6955fc6b9a25fe2a3dd8bab7f21beccba5493a164c663eceed401737c12c65804712236a9a29a43b1e27e9b6816f2328ea8423121f12b7b35aa721fef26934ccafde573bee5c33ef15309f43cbd5d61aa679a9c402d337ebf57a5eacb569401c1df7b9c45b09743c61d1db37f0000000000020000000061d7d6818db785d8ba13dc577fe61a68eb365de5661f43d4c789bb117a3d208ae44a381b718b3157e218959156ff8e92b7e92bc275d2c9114547351a0d0f2a70d13be0194b6cb68b03000000000000004f153bbc7f52861e4e5df0d19e4e40ac44cfda6f87807e5b5ed7072c04da88afd3d4b79f060e004a0e2f00b9e726ac75d2ac0691314c627e9a8a07bdd607919fd48f01ad6d2f7621d9a75b134f1bc25ed7c33d411a5baa4daa3add16afc502b2b7629541d722e91d631e5ffb9d4beb5aa5a2c4e490a5bd5cf4538ba310b8cbc221af38ea842d4cb908bcd574f794459fd54b58c6a791e6df620047bade4ba41ee014184395a479544619f749ff70088b0fd115077f7eff7c5a3315ca604d110df1c54407f191a78d8362e4dc6e1138391c2a65246779bb76c9f1daea4f085f38810edef6dd047937c231cba791a4e7713c5b3b0a0b6ba37db5016e02d114d714459d065a79609fea4efebad04edac11aac0e53dd094827453144fa419ee81823d00a90a9058ba740d2f41253a8d01a8c1a7265a084e30ad10d412aee8170a7111d62473e7bd8f3d64fb7ebdd32aada331900000000000000000000000084ef49dd02000000bf48ea48e0e1f463d9dcb285038ec38d5f4969ed0e98a71ac7bf8159a234833a5241722b2d24aa2fa4965d4eb7966fb27d118b6ef3308627e67d42f1041d5e92da28e0a7724ce715854775cbe06c5166f1dac0745f1373156a536cb6394c2c4473e2050cacf693fdf8e305080000001a901ecd90a5f53b8327a485557bc2a147b036477915e600000000034258ebbb6099b597d17ee2fc97ca850b8580b1337016a40566814594c13052b9d2b0741326825f19a244609ac04a0c29691a7c8f7a78c1a7590a293c561f304533c638ae635f5ce026f7fa034d8cfe0e11831d4829692beab26891ef583cfcb713a4d3a2d8b958c0875d7e4bdcf98802db086ebcbb9d82fa569a18f06facc2ffe1ea9ae4231e1e7a5dd7503faa2de7f898c97788c4b9c61c70ff92abdf7476cc351156d11c0ada7614f315f4c6cca119d16827d4e864f5a7a9b690272a510c451dc07f391309d02e31e53b2bf0b5f86e776b1bcfe6c85ccd7ddf8a9559d58bb5603895f265685fdd11263c946f8ef3ccec1b0d45a47a89b8237cbbdab14e4ca6dc76b2c41e071b93a065c0f5aa718e1cfab29beea78a6bd9a3114f0fb92be9a5862627b4bd99db2c08e4636e43f05f33535d5d1f9bb40e1fd8e5125a3d29b31dd94a6744bbc21722222b976089f073a4d3fcafc6d06518cf0c4fc6c8e3da0000000000000000000000007d3b60775243f2143d9f54804b11102cf0e4c641db1ba8bf75e46ab3a8fdece6562e7ebb3e407f3c7504dfa3da3aecbd49af3d1edeea11cc970416fadeedc8423bfdc85041ac4d8243a1130e6f4cb5bbfed9d095e18c98c7d690e4c491a7ddcd5635bc61dbed719ca28e8ca3f1fbbe588913ed057f1d6e34a79f4dc10df54d1993a5bc5f9ef6dbd339ee4b0b5764169f305e284ef82cc23e9366d4bc7eb45c7230b13433e5240657cb8eba33260147be8620b6d98cc48b000000000000000000000000c1ce872b18984f080100000000000000bd3fded92547d41809b398f36749083a147eb09ff1ed601bd36b873d3947fb223da647052528e0466cb917db7800f7c7000b593fca1903991cca1343882e3a1f60044f11c081dae4fc5bcf20efacdd2c577f4bcda2eea6f75a31dc90eebb6135b6fb824052181b0ad8a49ebf03ccf61d7e39bf6b0762d24d19796016301d1415b5110ba9df7f204aedb2a2e4e621c0553d312b309db67192f98ef7800000d629c04e216afc8fc66616bbf304e452373aa927c2ad6f5417f1b9bc322b802c1c42112a92a331cdc113b9ace3ff52ede7a853f9a89002ba070bac2f635a03db3375e5564f1a798bf9c0f8c72725d2eca9b0ec7e453d78ea20eca61530fe574299b393ca144adcb06108dfbb934065a87972739150a8752ac111c4d9062ccb95c54034fbdee131d94dfbaab1854d55665746fb7b47d25e54070b0d14c0a29c57bc4930075e1761913b036d43852c6df9f10e15105b2a18668298a3577943514db0dce953dcec62139ff3f16066efec5d8cbc0600000000007289be5883aab951ea67cf2ff691d05c1ea91dd569ed9897fe8d88a0a6977dc8955be17e8026aff11c61fa5cc76196c1423cd597345253baa1537eb6962a3ce1fe5d5ab46938e8fb23fa7047bc59c4345e912585a9adb5fe2ff51b64a326321b594e3f2d339f4090bdae6b30b62064bacbc155d3c930576f506b093ca7c60957bdfdd6536baaa871cf6a603c736b78761e6463b8ac503e219cc3d98f649602ad24d5667368290ee926fba76ee482a201a03efece3b236f4ee2ffcd5d90d92a2f0c5cfa48c87f27c2f1e92988a6508c12f6b7755cc48eb10edafca92cb0260c72295a27a24846d3a2334bd60e94c0fd07e5db0a4964a7fc4e89f11a300510776934e87bb3c21394f46954a012b2a3b0760f1bad1dbd6b466ed7153bd18ee2c0b2353c38df9e0782eb000000000000000000000000001b58cadcc5aaf65e05663985a177aa1d1ea2ad1b8151c7d58f5b92827f550269b3585d98e1394e816a477e52ce2f6de2bd7192f46cf965e774968d151d2bda084b10ec4c8d2c6ab582b1e5e3ed874235ff128c661298ed75879d8a4025ad1c3d9ef6355dc7284c6e648a61da026a777fcc7ae2c60ce64a2f2b0000000000000000000000000000003022110d1230e998429a6fd8f35939a8ae5acc89125539d84b98df6f8ee2ad0b238759bf400ac14c591aefe9660076a494f73b0ea8f3cb4a9c2e4f745a2afb593fabb9481600b2f44e64dcb0d0d57d5aeae626d2700608bb283800000000008a4c26b16213f0d9d7c3c57413b1e5895c9c12259519274ca8fd3bce804c8176a297f28add10956f3aaa3db687abcc17d326fd3674b7680206e875332b82c1de5ff793f6971d98c787c6daef28f66b542f08eeb6c82fbe03a3dc625bddf98d2a200c94065db5d5414361a785ff39392d9b1c870d8a2287af0ee98231100efa30652f2dd84da00970b5d209c623b26770258fcf63690f17cce7a78aeba7f6cbc4c143f48b1d0a10afdc93eaaff72e6622fd4da72c"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x5, 0xe, &(0x7f0000002580)=ANY=[@ANYBLOB="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", @ANYRES16, @ANYRES64, @ANYRES64, @ANYRES8], &(0x7f0000000340)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x18000000000002a0, 0xe2c, 0x60000000, &(0x7f0000000100)="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", 0x0, 0xfe, 0x60000000, 0x0, 0x7000000}, 0x2c) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB="120000000f0000"], 0x50) bpf$MAP_DELETE_ELEM(0x4, &(0x7f00000002c0)={r2, &(0x7f0000000a00), 0x20000000}, 0x20) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000003c0)={r0, 0x18000000000002a0, 0x0, 0x0, &(0x7f0000000040), 0x0, 0x102a, 0x18000000, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0xfffffff1}, 0x50) r3 = perf_event_open(&(0x7f00000010c0)={0x2, 0x80, 0xb9, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xc, 0x7}, 0x410, 0x2000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, 0x0, &(0x7f0000000000)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r3, 0x40042408, r4) perf_event_open(&(0x7f00000004c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000840)=@base={0xb, 0x7, 0x2, 0x4, 0x5}, 0x48) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000001100)={{r5, 0xffffffffffffffff}, &(0x7f0000001080), &(0x7f00000010c0)='%pI4 \x00'}, 0x20) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000380)={{r6}, &(0x7f00000002c0), &(0x7f0000000300)}, 0x20) r7 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r8 = perf_event_open(&(0x7f0000000100)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={0x0, 0x4}, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r8, 0x2405, r3) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f0000000cc0)={0x0, 0x0, 0x0}, 0x0) close(0xffffffffffffffff) r9 = bpf$MAP_CREATE(0x0, &(0x7f0000000340)=ANY=[], 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYRES32=r9, @ANYBLOB], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r7, 0x40042409, 0x1) syz_open_procfs$namespace(0x0, &(0x7f0000000300)='ns/mnt\x00') bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000300)=ANY=[@ANYBLOB="9feb0100180000000000000034000000340000000300000000030000000003000000020000000000000000000000000000010500000008000000010000000000000c04000000005f00000000000000"], 0x0, 0x4f}, 0x28) bpf$MAP_CREATE(0x0, 0x0, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x1c1341, 0x0) r10 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) r11 = bpf$PROG_LOAD(0x5, &(0x7f0000000540)={0x3, 0xd, &(0x7f0000000700)=ANY=[@ANYBLOB="18000000000000000000000000000000850000006100000018110000", @ANYRES32=r10, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000009800000095"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sched_cls, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000004c0)={r11, 0x18000000000002a0, 0x28, 0x0, &(0x7f0000000300)="d2ffdd934517f3e145f228e086dd", 0x0, 0xd5b4, 0x60000000, 0x0, 0x0, 0x0, 0x0}, 0x50) 1.55207494s ago: executing program 1 (id=3801): perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE_CONST_STR(0x0, 0x0, 0x48) (async) bpf$MAP_CREATE_CONST_STR(0x0, 0x0, 0x48) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.swap.events\x00', 0x275a, 0x0) (async) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.swap.events\x00', 0x275a, 0x0) setsockopt$sock_attach_bpf(r0, 0x1, 0x2a, &(0x7f0000000100)=r2, 0x4) sendmsg$unix(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f00000001c0)="4d8e", 0x2}], 0x1}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x4, 0x6, &(0x7f0000000000)=ANY=[@ANYBLOB="b40800000000000073113d00000000008510000002000000b70a0000000000009500c200000000009500001200000000"], &(0x7f0000000080)='GPL\x00', 0x4, 0xc3, &(0x7f000000cf3d)=""/195}, 0x70) (async) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x4, 0x6, &(0x7f0000000000)=ANY=[@ANYBLOB="b40800000000000073113d00000000008510000002000000b70a0000000000009500c200000000009500001200000000"], &(0x7f0000000080)='GPL\x00', 0x4, 0xc3, &(0x7f000000cf3d)=""/195}, 0x70) recvmsg$unix(r0, &(0x7f0000000580)={0x0, 0x0, 0x0}, 0x0) (async) recvmsg$unix(r0, &(0x7f0000000580)={0x0, 0x0, 0x0}, 0x0) syz_clone(0x88107100, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x181000, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x10, 0xe, &(0x7f0000003540)=ANY=[@ANYBLOB="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"], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sk_msg, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0xffffffffffffff97, 0x10, &(0x7f00000000c0), 0xffffffffffffffc2}, 0x48) 1.482583354s ago: executing program 0 (id=3802): bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0xc, [@struct={0x4, 0x2, 0x0, 0x4, 0x1, 0xfffff7fd, [{0xa, 0x2}, {0x5, 0x2, 0x4}]}, @int={0x0, 0x0, 0x0, 0x1, 0x5, 0x20}]}, {0x0, [0x61, 0x0, 0x30, 0x2e, 0x61, 0x5f, 0x5f, 0x61, 0x0, 0x61]}}, 0x0, 0x58}, 0x28) r2 = openat$cgroup_subtree(r0, &(0x7f0000000200), 0x2, 0x0) r3 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000280)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x4, '\x00', 0x0, r1, 0x2, 0x1, 0x1}, 0x50) r4 = bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={r4, 0xe0, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, &(0x7f0000000240)=[0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, &(0x7f00000002c0), &(0x7f0000000340)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x97, &(0x7f0000000380)=[{}, {}, {}, {}, {}], 0x28, 0x10, &(0x7f00000003c0), &(0x7f0000000400), 0x8, 0x87, 0x8, 0x8, &(0x7f0000000440)}}, 0x10) r6 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r7 = openat$cgroup_ro(r6, &(0x7f0000000080)='memory.numa_stat\x00', 0x80040, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000d00)={0x11, 0xf, &(0x7f00000007c0)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0xff, 0x0, 0x0, 0x0, 0xb0}, {{0x18, 0x1, 0x1, 0x0, r7}}, {}, [], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}}}, &(0x7f00000008c0)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x25, '\x00', r5, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000009c0)={0x5, 0x3}, 0x8, 0x10, &(0x7f0000000b40)={0x4, 0x8, 0x6}, 0x10, 0x0, 0x0, 0x3, &(0x7f0000000c80)=[r7, 0xffffffffffffffff], &(0x7f0000000cc0)=[{0x4, 0x3, 0x0, 0x6}, {0x3, 0x4, 0x0, 0x2}, {0x4, 0x1, 0x5, 0x7}], 0x10, 0x9}, 0x94) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000300)={0x2, 0x4, 0x8, 0x1, 0x80, r3, 0x2, '\x00', r5, r1, 0x1, 0xfffffffd}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYRESDEC], 0x0, 0x3ff, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x94) r8 = perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0xe8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x4, 0x8}, 0xc410}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r9 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000240)=@bpf_lsm={0x18, 0x7, &(0x7f0000000180)=ANY=[@ANYBLOB="8510000004000000950000000000000018000000000000000000000000000000950000000000000085100000fcffffff9500000000000000"], &(0x7f00000000c0)='GPL\x00'}, 0x78) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000580)={r9, 0xe0, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x200000000000014f, 0x1000000, &(0x7f0000001680)=[0x0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x19, 0x0, 0x8, 0x0, 0x0}}, 0x10) ioctl$PERF_EVENT_IOC_SET_FILTER(r8, 0x40082406, &(0x7f0000000000)='cpu&\t\t') write$cgroup_subtree(r2, &(0x7f0000000080)={[{0x2b, 'cpu'}]}, 0x5) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000600)={0x10, 0x3, &(0x7f00000006c0)=ANY=[@ANYBLOB="6eaa000000000c001024000075fc0102a7cd72b6000000ed463e9e80f8eed96fbe1383e2a9f2515986c96c0b03153d1d2f6ef7957a8311c39374ee34ea9cf0dac2cd5e971f3cd1d11a16975034a204cd4cb41c130a599d365b5f9181bd35544a356891c2e5c0032c70774a685c06"], &(0x7f0000000480)='syzkaller\x00'}, 0x80) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r10, 0x8983, &(0x7f0000000080)) write$cgroup_subtree(r2, &(0x7f00000000c0)=ANY=[@ANYRES16=r10], 0x5) 1.459489904s ago: executing program 2 (id=3803): bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000740)=ANY=[@ANYBLOB='\x00'/25], 0x48) r0 = perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x2024, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x104060, 0xc48}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="06000000040000000c00000008"], 0x50) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000200)={r1, 0x0, &(0x7f0000000340)=""/166}, 0x20) (async) socketpair(0x2c, 0x3, 0x0, &(0x7f0000000040)) (async) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f00000010c0)={0x2, 0x80, 0xb9, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xc, 0x7}, 0x8601, 0x2000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.swap.current\x00', 0x26e1, 0x0) write$cgroup_int(r2, &(0x7f0000000600), 0x12) (async) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000340)=ANY=[@ANYBLOB="9feb010018000000000000003c0000003c00000002000000000000000200000408000000000000000300000000000000000000000200000000000000000000000000000d000000000000000000000004"], 0x0, 0x56}, 0x28) perf_event_open(&(0x7f0000001080)={0x6, 0x80, 0x0, 0x0, 0x0, 0x81, 0x7602, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_bp={&(0x7f0000000080), 0x6}, 0x4, 0x0, 0x0, 0x8, 0x0, 0x0, 0x6}, 0x0, 0x0, r0, 0x0) (async) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r3, 0x8914, &(0x7f0000000280)={'wg2\x00'}) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$MAP_CREATE_CONST_STR(0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) socketpair(0x1d, 0x2, 0x2, &(0x7f0000000300)={0x0, 0x0}) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r4, 0x8914, &(0x7f0000000040)={'wg2\x00', @multicast}) (async) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0a000000040000000800000008"], 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000280)={{r5}, &(0x7f0000000000), 0x0}, 0x20) (async) socketpair$tipc(0x1e, 0x2, 0x0, 0x0) bpf$MAP_DELETE_ELEM(0x3, 0x0, 0x0) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0xff, 0x0, 0x0, 0x0, 0x20001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8001, 0x0, @perf_bp={0x0}, 0x0, 0xc8, 0x0, 0x0, 0x5}, 0x0, 0x3, 0xffffffffffffffff, 0x0) (async) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r6) 1.292078073s ago: executing program 2 (id=3804): mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = openat$cgroup_int(r0, &(0x7f00000001c0)='cgroup.clone_children\x00', 0x2, 0x0) bpf$ENABLE_STATS(0x20, 0x0, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=@base={0xa, 0x3, 0x4, 0x8, 0x88}, 0x50) close(r2) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x6, 0x4, 0x4, 0x4, 0x0, 0x1}, 0x48) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1, 0xd, &(0x7f0000000300)=ANY=[@ANYBLOB="18000000000000000000000000000000850000002f00000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000002c0)={r3, 0x0, 0xe, 0x0, &(0x7f00000008c0)="7a7fa22c2aff88df53ef2a2d280f", 0x0, 0xa00, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) write$cgroup_int(r1, &(0x7f0000000180), 0x12) r4 = perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x3, 0x3, 0x3, 0xe, 0x0, 0x2, 0x4, 0x8, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_config_ext={0xe, 0xfffffffffffff476}, 0x0, 0x0, 0xc, 0x5, 0x6, 0x8, 0x9, 0x0, 0x64ef, 0x0, 0x8}, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x52, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffff801, 0x100010, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x0, 0x0, 0xa27f}, 0x0, 0xffffffffffffffff, r4, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000000280)='ns/net\x00') 1.290926063s ago: executing program 0 (id=3805): bpf$PROG_LOAD(0x5, &(0x7f0000002c40)={0x14, 0xf, &(0x7f00000007c0)=ANY=[@ANYBLOB="1800000020f8ffffff1a11000000000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @lirc_mode2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100), 0xc1842, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xe, 0x4, 0x4, 0xc}, 0x50) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[], 0x50) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x14, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000000000000000000000000001801000020646c2100000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000007000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_BIND_MAP(0xa, &(0x7f0000000840)={r2}, 0xc) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.swap.events\x00', 0x275a, 0x0) setsockopt$sock_attach_bpf(r3, 0x1, 0x2a, &(0x7f0000000100)=r5, 0x4) recvmsg(r3, &(0x7f0000000500)={0x0, 0x0, 0x0}, 0x2) gettid() sendmsg$unix(r4, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000240)="a6bbe78ecaab", 0x6}], 0x1, 0x0, 0x0, 0x1}, 0x40000) r6 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f00000003c0)={0x3, 0x4, 0x4, 0xa, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x1, 0x3}, 0x50) bpf$MAP_DELETE_BATCH(0x1b, &(0x7f0000000440)={&(0x7f0000000140)="18990e48522c731a8cada27318a0cb5b7b225c9604e160a333fe349f5fe4e281005706499f6dd3fa646a00b31f2b7cd7cf4a78a7c94de682bd8b406de44c82b3b7d9f0820c8139ee9343c1d78e64ec45edeb7506dbc5c968d25deb16607a85ba9da4aaa52ed49a716ed6593a9994df", &(0x7f00000001c0)=""/143, &(0x7f0000000280)="eafbfc14a55688314477c0df940370c97c938e6d29499ab96138fafb5a072892f543adba7cef6c69e9d9bc8e243bce497d312d37f0f32d76e51d110539ee6da49a37935bbef78375782f493f5b92cb56d33fd916e7ffe65cad1371a24c40cf0fe765e0858ff3ac9e7e4922fd7c8deac4455f02beba68e7c46c27fc08348acb223647df09f11aa093d352fd4ee1963130e27148045597150d63fb2908a5336bd1876e5b327f9865259b9441aed71468f3c8c56408a871b88f30219da58f97888da74ea24acc69e69d9c9f663fa98f459bd1036721d37933c6951982b8f4099a80d2798bef161597e3c8e5a5ca6acadbe68321", &(0x7f0000000380)="d339e1c4736022a64a37f761a4a07aeabc4330319a85447d27f63a0b65f61d", 0x9, r6, 0x4}, 0x38) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000080)={'syzkaller0\x00', 0xca58c30f81b6079f}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r7, 0x8914, &(0x7f0000000080)) write$cgroup_devices(r0, &(0x7f0000000740)=ANY=[@ANYBLOB="1e030a004d8c71ef2685634a8270e7123c00000000000000000000000000ac1414cf14"], 0xffdd) 1.273549184s ago: executing program 2 (id=3806): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0100000004000000080000000d"], 0x48) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) recvmsg$unix(r1, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) ioctl$TUNSETLINK(r2, 0x400454cd, 0x337) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001a00)={&(0x7f0000000300)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x30, 0x30, 0x5, [@enum64={0xd, 0x1, 0x0, 0x13, 0x0, 0xb, [{0x4, 0x6, 0x2dda}]}, @float={0x8, 0x0, 0x0, 0x10, 0x2}, @enum64={0x3, 0x0, 0x0, 0x13, 0x1, 0x1}]}, {0x0, [0x61, 0x2e, 0x0]}}, &(0x7f0000000a00)=""/4096, 0x4d, 0x1000, 0x0, 0xd, 0x10000, @value=r2}, 0x28) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x50) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x10, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000020000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b702000002000000850000008600000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0x1b, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x1, 0x10, &(0x7f0000000180)=ANY=[], &(0x7f0000000980)='GPL\x00', 0x2, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r6 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) ioctl$TUNSETIFF(r6, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000600)={@ifindex, 0x33, 0x1, 0xe, &(0x7f0000000380)=[0x0, 0x0, 0x0, 0x0], 0x4, 0x0, &(0x7f0000000440)=[0x0, 0x0], &(0x7f0000000480)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000005c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0}, 0x40) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000640)={@map=r3, r5, 0x1e, 0x4, 0x0, @void, @value=r4, @void, @void, r7}, 0x20) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'syzkaller0\x00', 0xca58c30f81b6079f}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000680)={0x0, &(0x7f00000004c0)=""/193, &(0x7f00000005c0), &(0x7f0000000600), 0xfffffff7, r0}, 0x38) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000700)=@generic={&(0x7f00000006c0)='./file0\x00', 0x0, 0x8}, 0x18) ioctl$PERF_EVENT_IOC_SET_FILTER(r8, 0x8914, &(0x7f0000000080)) r9 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x149a82, 0x0) ioctl$TUNSETSTEERINGEBPF(r6, 0x800454e0, &(0x7f0000000200)=r5) ioctl$TUNSETIFF(r9, 0x400454ca, &(0x7f00000002c0)={'syzkaller0\x00', 0x7101}) write$cgroup_devices(r9, &(0x7f0000000280)=ANY=[@ANYBLOB="1e030600bc5cb60128876360864666702c1ffe80000000000000", @ANYRESDEC], 0xffdd) 1.215859727s ago: executing program 1 (id=3807): bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000bc0)={&(0x7f00000007c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x20, 0x20, 0x4, [@func_proto={0x0, 0x1, 0x0, 0xd, 0x0, [{0x1, 0x2}]}, @struct]}, {0x0, [0x2e, 0x2e]}}, &(0x7f0000001480)=""/132, 0x3c, 0x84, 0x1}, 0x28) (async) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000bc0)={&(0x7f00000007c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x20, 0x20, 0x4, [@func_proto={0x0, 0x1, 0x0, 0xd, 0x0, [{0x1, 0x2}]}, @struct]}, {0x0, [0x2e, 0x2e]}}, &(0x7f0000001480)=""/132, 0x3c, 0x84, 0x1}, 0x28) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x10, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4000000000000007910480000000000c6000000000009009500000c00000000"], &(0x7f0000003ff6)='GPL\x00', 0x2, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @sk_msg, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x1f2, 0x10, &(0x7f0000000000), 0xfffffe51}, 0x48) 1.143681031s ago: executing program 4 (id=3808): bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000400)={0xffffffffffffffff, 0xe0, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, &(0x7f0000000040)=[0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x3, 0x3, &(0x7f0000000140)=[0x0, 0x0, 0x0], &(0x7f0000000180)=[0x0, 0x0, 0x0], 0x0, 0xde, &(0x7f00000001c0)=[{}, {}, {}, {}], 0x20, 0x10, &(0x7f0000000200), &(0x7f0000000280), 0x8, 0x1b, 0x8, 0x8, &(0x7f00000002c0)}}, 0x10) r1 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000002040)=0xffffffffffffffff, 0x4) bpf$ITER_CREATE(0x21, &(0x7f0000000240)={r1}, 0x8) (async) r2 = bpf$ITER_CREATE(0x21, &(0x7f0000000240)={r1}, 0x8) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000013c0)={r2, 0x58, &(0x7f0000001340)}, 0x10) (async) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000013c0)={r2, 0x58, &(0x7f0000001340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000001600)={r2, 0x20, &(0x7f00000015c0)={&(0x7f0000001480)=""/23, 0x17, 0x0, &(0x7f00000014c0)=""/229, 0xe5}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000016c0)={0x20, 0x10, &(0x7f0000000280)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x3}, {{0x18, 0x1, 0x1, 0x0, 0x1}}, {}, [@alu={0x4, 0x1, 0x4, 0x8, 0x7, 0x8, 0x4}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000300)='syzkaller\x00', 0xfffffff3, 0x1000, &(0x7f0000000340)=""/4096, 0x41100, 0x74, '\x00', r3, @fallback=0x2a, 0xffffffffffffffff, 0x8, &(0x7f0000001400)={0x0, 0x4}, 0x8, 0x10, &(0x7f0000001440)={0x3, 0x7, 0x1ff, 0x90}, 0x10, r4, r2, 0x2, &(0x7f0000001640)=[r2], &(0x7f0000001680)=[{0x1, 0x3, 0x0, 0x6}, {0x1, 0x5, 0xb, 0x8}], 0x10, 0x5}, 0x94) (async) bpf$PROG_LOAD(0x5, &(0x7f00000016c0)={0x20, 0x10, &(0x7f0000000280)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x3}, {{0x18, 0x1, 0x1, 0x0, 0x1}}, {}, [@alu={0x4, 0x1, 0x4, 0x8, 0x7, 0x8, 0x4}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000300)='syzkaller\x00', 0xfffffff3, 0x1000, &(0x7f0000000340)=""/4096, 0x41100, 0x74, '\x00', r3, @fallback=0x2a, 0xffffffffffffffff, 0x8, &(0x7f0000001400)={0x0, 0x4}, 0x8, 0x10, &(0x7f0000001440)={0x3, 0x7, 0x1ff, 0x90}, 0x10, r4, r2, 0x2, &(0x7f0000001640)=[r2], &(0x7f0000001680)=[{0x1, 0x3, 0x0, 0x6}, {0x1, 0x5, 0xb, 0x8}], 0x10, 0x5}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001900)={0x11, 0x4, &(0x7f0000001780)=@raw=[@ldst={0x3, 0x2, 0x0, 0x9, 0x5, 0x4, 0x8}, @cb_func={0x18, 0x5, 0x4, 0x0, 0xfffffffffffffffb}, @call={0x85, 0x0, 0x0, 0x17}], &(0x7f00000017c0)='GPL\x00', 0x6, 0x0, 0x0, 0x40f00, 0x11, '\x00', 0x0, 0x0, r2, 0x8, 0x0, 0x0, 0x10, &(0x7f0000001800)={0x4, 0xd, 0x80000000, 0x8}, 0x10, 0x0, 0x0, 0x7, &(0x7f0000001840)=[r2, r2], &(0x7f0000001880)=[{0x1, 0x5, 0x6, 0x4}, {0x0, 0x5, 0x3, 0x1}, {0x1, 0x2, 0x7, 0x1}, {0x0, 0x3, 0xa, 0x1}, {0x1, 0x4, 0x3, 0x2}, {0x0, 0x4, 0x6, 0x8}, {0x5, 0x4, 0x4, 0xf}], 0x10, 0x8}, 0x94) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001cc0)={r2, 0xe0, &(0x7f0000001bc0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000001a00)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x4, 0x1, &(0x7f0000001a40)=[0x0, 0x0, 0x0, 0x0], &(0x7f0000001a80)=[0x0], 0x0, 0x3, &(0x7f0000001ac0)=[{}, {}, {}, {}, {}, {}, {}, {}], 0x40, 0x10, &(0x7f0000001b00), &(0x7f0000001b40), 0x8, 0x5a, 0x8, 0x8, &(0x7f0000001b80)}}, 0x10) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000001d00)={0xff9}, 0x8) (async) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000001d00)={0xff9, 0x0}, 0x8) bpf$BPF_PROG_DETACH(0x9, &(0x7f00000019c0)={@ifindex=r5, r2, 0x2d, 0x2c, 0x0, @void, @void, @void, @value=r6}, 0x20) sendmsg(r2, &(0x7f00000025c0)={&(0x7f0000001d40)=@llc={0x1a, 0x335, 0x5, 0x81, 0xec, 0x7, @dev={'\xaa\xaa\xaa\xaa\xaa', 0x1f}}, 0x80, &(0x7f0000002000)=[{&(0x7f0000001dc0)="1ef158f7f65431cefce621e377cb0520483caeeb96035b7d7016eb9387f7353210c35b2b74d8d543bd5ba71ea7e80b967bf880ac53eaa4cf09e64e97f8f2c3eb5b2d6e6ac2a793925c2dc1e67718951466054de19004dea1e1a3d366e56e04d05d6dfd001a06009ccd9899b2f06e804dc6cf1c7c22d53d27071d513277723159230d98d2ad5b9deab50b62fe4667de9166511ceff8564536c21488c0e7b103f1158ace01e30fb988932913fe0c60b2e74df4ea91526cac7698460130f300492b879db4fc5e39990b24a2a021d5cd58", 0xcf}, {&(0x7f0000001ec0)="be512c888dc726137d5eb3ee1ed07d13d64d68b8c4b0abf68c89ba4e3b554c07cb5f1a9de9ee284a8fd01aaf04a3267bbdb459ea01b715d92dced3524878ae73a25c8704dc49835bc964c087395c87", 0x4f}, {&(0x7f0000001f40)="adb15ec9f2a310fb7695", 0xa}, {&(0x7f0000001f80)="34ff2db8b68b9f4483d3962ef5d9bab9430368cf5b35a60800c251f1e3fe0f1982f64c14f358661a45a4bf467e99a7dfc4dbb21133dccf0980f710bf7248e75ee1874a0ccaf092c3ff2a34b11ba7a41a9efbe306b87694717bcbc6ee2ebb078d37c4418a5f3ba410369b543d1d023287043d98", 0x73}], 0x4, &(0x7f0000003180)=ANY=[@ANYBLOB="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"], 0x580}, 0x40008c5) (async) sendmsg(r2, &(0x7f00000025c0)={&(0x7f0000001d40)=@llc={0x1a, 0x335, 0x5, 0x81, 0xec, 0x7, @dev={'\xaa\xaa\xaa\xaa\xaa', 0x1f}}, 0x80, &(0x7f0000002000)=[{&(0x7f0000001dc0)="1ef158f7f65431cefce621e377cb0520483caeeb96035b7d7016eb9387f7353210c35b2b74d8d543bd5ba71ea7e80b967bf880ac53eaa4cf09e64e97f8f2c3eb5b2d6e6ac2a793925c2dc1e67718951466054de19004dea1e1a3d366e56e04d05d6dfd001a06009ccd9899b2f06e804dc6cf1c7c22d53d27071d513277723159230d98d2ad5b9deab50b62fe4667de9166511ceff8564536c21488c0e7b103f1158ace01e30fb988932913fe0c60b2e74df4ea91526cac7698460130f300492b879db4fc5e39990b24a2a021d5cd58", 0xcf}, {&(0x7f0000001ec0)="be512c888dc726137d5eb3ee1ed07d13d64d68b8c4b0abf68c89ba4e3b554c07cb5f1a9de9ee284a8fd01aaf04a3267bbdb459ea01b715d92dced3524878ae73a25c8704dc49835bc964c087395c87", 0x4f}, {&(0x7f0000001f40)="adb15ec9f2a310fb7695", 0xa}, {&(0x7f0000001f80)="34ff2db8b68b9f4483d3962ef5d9bab9430368cf5b35a60800c251f1e3fe0f1982f64c14f358661a45a4bf467e99a7dfc4dbb21133dccf0980f710bf7248e75ee1874a0ccaf092c3ff2a34b11ba7a41a9efbe306b87694717bcbc6ee2ebb078d37c4418a5f3ba410369b543d1d023287043d98", 0x73}], 0x4, &(0x7f0000003180)=ANY=[@ANYBLOB="880000000000000011010000030000005fcea2f62880930ac3ccdd7e310b57c9fd41886f75a27d2540701ce8fff328081e5b0816e92c86e4b0a0368a6f78e05d51bd10e1bfab98bf3d93353bacc990c19d912e7744a3a48df99dc34c337788bbce4dbd07eec331a4b2fe4c61bd1b341ca9e830cb47e767db830f484c48015d1b44262a1e00000000a8000000000000001301000000fcffffa34eedd6d25a3d392539d19f8e992626b44b46451cc1b3c9723ec3bcff2ec67600f56d193582c806afa96b9bb21c01717aeca145c1544d3b291b8b4c9fe1e48daf72b66db14ce5f5147f07f4a559aaba0cfb23e20dadee6a1dd11dbdb1229c9a4a4eceaa87807bbf13c4b8b2191735fba286e81ef198d1d21d136dd2326837d5e6ce9c34c244b7c4934545aab6deb3716000000000000000f80000000000000088000000030000008e1a581736a0f10863b3d4e19246aee79e6801de317941b66627f56dad48fe7be63e9ddf1b909f743d31cc37cea1f8aa24fe1bc57da65f9f2ab3645c78a5e2f14daae9a2d2d0a5476a64520c0a7ba4e516a4baa8adda9652b2ace8e68ebf80c579a113cc48f8de0b07b1867d51cac3df870df4dba1f185cfe93034440c43998deec86026a9832b59df6fd04b5cf5d482fbb413618fa4ce01f17d8f45af169fe9a3c4a82773a0985d241536a3eff6f08a158921188da9e7c5b2af825131c1014bc7f6776b65a0031aa904508f803d1104a7b6c1339a2b48b77940850cdd759264910679112d1288f8a0000000000000000e010000070000009114c03abc6cb29989884d56d826d8f3a3997022c9801cd4410e24663d61174a21e64efae27c679f58e4172d9aeb05a19b88e26f1196d6c93ae6990d1fa3616785113fe933959cbec4d6fa9a7e76db2f56e4c2be2ece14cc318a9ce8c1cbf040d2f1c12dd8bc3096eb37bdabb22f548e8517f96aea78115e44a82421f4bc714331d569da26564faa561477ef8e0f000020000000000000000e010000858f00008ffa4a0afc7dcf92b4f7a0000000000008010000000000001101000001040000d167c1a1212df2f9cab816ee8533f67074dd142fc229a322483e42f52d0bcf70351ba300c408c7243de265957033df8619962fe77c9f5ad3c3a51418e9fc3b95d24707911db031e85d9fdd843f65b3c5e9c1d92edc475de73ccecd36e04fc04777f36a28f5e38a153f33ba71982aa355bdce382bf513316156e1f180ca9a59372ab7354008be3709d35ec93eaecb980df2aa2c53654d174638839fd1dc8c610cf0797057ca755a017ecb3d228c7bb175cc0010d14fe549570892b2353c7005777d7d6c925098556db7913a20519f07cbf2f0229ddbfb0f234c66084e64871be224b56f99b20e2dc31355088ed9402109d97edafddca4340010000000000000000c01000007000000500000000000000000000000020000000982980b998591e8861bc240be42c29721f637ba73c13fa1f4b6cf1e7fc43ac411df5d40147d78b431ef8d68edcec10dbf74e0042be30f6ab2e331000000000000010000000000000c01000002000000e7f035e158585bfe383aa8549c56b5e0b2644365687675e6b592e88fd1127839f4b6f0eb5bf57be036d41a9d7b33d5fbdf3cd2acd564fc822aa8f90b2066159f4999d20f374937e5e7c13f26ce64d2a17f7f0bf3df2b0672400c847515e95946529630be18f471a094bd3e61bdbf9a333e71e89a072fa603742e9ddbc8ea8fab185897f133de5026a3d1f71adaee650010c6fe4280206235999eeb224cf2ddbf34e675e1641286d184d7a3a572aba6c240a6ee1c77256efc26310ab4472a908cd9a3a5e34b9e9f29f3b41be0ddb4bda786a4f75ff315271ce9ed71a18dceebb0ceb006b564cd29b3e9000000000000003000000000000000910100000d00000027da231072ecbd6d9ec41134ca0f748de788b1b4b7dbe29eb800072d1c3a0000e7727573048fea9785f77b78594ca2cc45336a9c36b6329db287f1514186fbc020240c3bb45f19fbe175794a06f4803826b5e97a633aaf916723f49c721abb3291c10d87b9abbaa3b6c3f057e3a7df8213290abf8120434dd2ce22785c2ca0c854412aa904392273f54584ca312057dfddd0c180f76bd17a301d5f54ca2638324d3a4f87"], 0x580}, 0x40008c5) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000002700)={r2, &(0x7f00000026c0)="97833fc9f712f3a1c4eb2016cffb063d19"}, 0x20) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000028c0)={&(0x7f0000002740)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x20, 0x20, 0xb, [@int={0x1, 0x0, 0x0, 0x1, 0x0, 0x63, 0x0, 0x2c, 0x3}, @decl_tag={0x7, 0x0, 0x0, 0x11, 0x5}]}, {0x0, [0x61, 0x61, 0x2e, 0x0, 0x0, 0x5f, 0x0, 0x5f, 0x5f]}}, &(0x7f00000027c0)=""/195, 0x43, 0xc3, 0x1, 0x1000}, 0x28) (async) r7 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000028c0)={&(0x7f0000002740)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x20, 0x20, 0xb, [@int={0x1, 0x0, 0x0, 0x1, 0x0, 0x63, 0x0, 0x2c, 0x3}, @decl_tag={0x7, 0x0, 0x0, 0x11, 0x5}]}, {0x0, [0x61, 0x61, 0x2e, 0x0, 0x0, 0x5f, 0x0, 0x5f, 0x5f]}}, &(0x7f00000027c0)=""/195, 0x43, 0xc3, 0x1, 0x1000}, 0x28) bpf$MAP_CREATE(0x0, &(0x7f0000002900)=@bloom_filter={0x1e, 0xd5ab, 0x735f, 0x0, 0x8cc68, r2, 0x81, '\x00', r5, r7, 0x4, 0x3, 0x2, 0x9, @value=r2}, 0x50) (async) r8 = bpf$MAP_CREATE(0x0, &(0x7f0000002900)=@bloom_filter={0x1e, 0xd5ab, 0x735f, 0x0, 0x8cc68, r2, 0x81, '\x00', r5, r7, 0x4, 0x3, 0x2, 0x9, @value=r2}, 0x50) r9 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000002bc0)={&(0x7f0000002ac0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x4, [@type_tag={0x7, 0x0, 0x0, 0x12, 0x5}, @typedef={0x5, 0x0, 0x0, 0x8, 0x5}]}, {0x0, [0x30, 0x30]}}, &(0x7f0000002b00)=""/189, 0x34, 0xbd, 0x0, 0xbf2d, 0x10000, @value=r2}, 0x28) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002cc0)={0x11, 0x3, &(0x7f00000029c0)=@raw=[@generic={0xe, 0x5, 0x1, 0x5, 0x60}, @btf_id={0x18, 0x1, 0x3, 0x0, 0x1}], &(0x7f0000002a00)='GPL\x00', 0x5, 0x68, &(0x7f0000002a40)=""/104, 0x100, 0x1, '\x00', 0x0, 0x0, r9, 0x8, &(0x7f0000002c00)={0x9, 0x3}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f0000002c40)=[r2], &(0x7f0000002c80)=[{0x2, 0x4, 0x5, 0x8}, {0x5, 0x5, 0x10, 0x2}, {0x3, 0x3, 0x1, 0x4}, {0x1, 0x1, 0xd, 0x3}], 0x10, 0x6}, 0x94) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000030c0)={0x6, 0x23, &(0x7f0000002d80)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x7fffffff}, {{0x18, 0x1, 0x1, 0x0, r8}}, {}, [@snprintf={{}, {}, {}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r8}}, @func, @alu={0x3, 0x1, 0x6, 0x7, 0xb, 0x4, 0xfffffffffffffffc}, @map_val={0x18, 0x8, 0x2, 0x0, r8, 0x0, 0x0, 0x0, 0x1}, @alu={0x7, 0x1, 0x6, 0x4, 0x3, 0x8, 0x4}, @map_fd={0x18, 0xb, 0x1, 0x0, r2}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000002ec0)='GPL\x00', 0x1, 0xdd, &(0x7f0000002f00)=""/221, 0x41100, 0x3, '\x00', r3, 0x25, r7, 0x8, 0x0, 0x0, 0x10, &(0x7f0000003000)={0x4, 0x4, 0x3c0a, 0xfffffffe}, 0x10, 0x0, 0x0, 0x1, &(0x7f0000003040)=[0x1], &(0x7f0000003080)=[{0x3, 0x4, 0x7, 0x5}], 0x10, 0x8}, 0x94) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000440)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x30, '\x00', r0, r7, 0x1, 0x2, 0x3}, 0x50) r10 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) ioctl$TUNSETIFF(r10, 0x400454ca, &(0x7f0000000000)={'syzkaller0\x00', 0x2}) ioctl$TUNSETLINK(r10, 0x400454cd, 0x30a) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'syzkaller0\x00', 0xca58c30f81b6079f}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)) (async) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r11, 0x8914, &(0x7f0000000080)) r12 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x240000, 0x0) close(r12) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)) (async) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)) ioctl$SIOCSIFHWADDR(r12, 0x8922, &(0x7f0000002280)={'syzkaller0\x00', @random="2b0100004ec6"}) (async) ioctl$SIOCSIFHWADDR(r12, 0x8922, &(0x7f0000002280)={'syzkaller0\x00', @random="2b0100004ec6"}) perf_event_open$cgroup(&(0x7f00000000c0)={0x8, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3832, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x348, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) close(0x3) 1.060966985s ago: executing program 4 (id=3809): r0 = perf_event_open(&(0x7f00000010c0)={0x2, 0x80, 0xb9, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xc, 0x7}, 0x410, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000a00)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x400, 0xf6143, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x24000000, 0x1, @perf_config_ext={0x8, 0x6}, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x800}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x1, 0xe, &(0x7f0000001880)=ANY=[@ANYRES32=r0], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0xfb5bf9c8dc7d0fbe, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000180), 0x10}, 0x94) bpf$PROG_LOAD(0x5, 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r1, 0x8912, &(0x7f0000000000)={'bridge_slave_0\x00', @random="010000201000"}) perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0xda, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x202, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000000c0)}, 0x100}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) bpf$MAP_CREATE(0x0, &(0x7f0000000440)=@base={0x1, 0x42, 0x6, 0x8, 0x0, 0x1}, 0x48) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000001100)={0x6, 0xb, &(0x7f00000002c0)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020782500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000005000000b7030000fcffffff850000007300000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x21, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x19, 0x4, 0x8, 0x2, 0x0, 0x1}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000100)={{r4}, &(0x7f0000000080), &(0x7f00000000c0)=r3}, 0x20) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000200)={r4, &(0x7f0000000080), &(0x7f0000000000)=""/10, 0x2}, 0x20) sendmsg$inet(r2, &(0x7f00000007c0)={&(0x7f0000000080)={0x2, 0x4e20, @empty}, 0x10, &(0x7f0000000740)=[{&(0x7f0000000380)="c9c05f075bf0740b3f62eef5cf698ac231ee66750ec3f750252be47c8cc2a3c0e280fc40b53d2d0f366a820a50f71411c6cca56dc05b248db7da64c1dfe376ccc27992b51cbc2c71cef4b1c9709d0f61ef28059aee8b890890b867fb478a10fefb3c94acfca7989806d2fc247c17b022a930b81649cc79a471bea0696e19fa8a93cf6b68259728dcbabb56b3dd544ca5d80efd4e4e00ad1cc067b43926f22d9cf3ff53e663926c75cb02a85b5453e4bd17ba4e37fb169ed100083534321892b5c8d79b5f17ed85cddad7d7673157b8049672f3bf8472a70ed0bf42cfa5a46813a625893c0d2adb613d484b4bbe9d6391ce0ec970a25ea16f4bb8", 0xfa}, {&(0x7f0000000580)="bcae18bb6ed4670e55286d63084e343957df437a0b0e82d97fc9a90a70a1e7775130880f1ae2be6f577e4d7ca950d5d66be99f3d6cc73850b14fd10086d40ab6c4ee0936e403421d86a8c4f8efeeb4d483080730fcd2a7ca41c1f0f649039b4dba2a0ac6fedd2adb71cf09e626c11baa5bf5eb1b1b1d0c93fcd1a37f2cd4e75d1701980fff344d64434bd3c4bf6bd2", 0x8f}, {&(0x7f0000000640)="0095da2dd5eac2292ac006cbeeb295b027e3d88418cc6c37f4face43c77e181faed327ff513609", 0x27}, {&(0x7f0000000680)="5f708bbdc8ab4068093a611ce89ed4456804c240568d5275767e3400102afdb212ca055aa98ebc71f3b3b9ec80eab5ccdde98daf39848401654601dca4314ef50d271a45bca944b924432a9a8374f80da8e8745adfa0b8be3c8777718b07f8dbacb238be4145f09e9f0afde0c5c2948ae5cabbb29a888dda6c72f1ba2774857d437d77c16825cddd28aeacf8a04958d697ebf523aaccb681669671c41438361d328642d78e7dd1c88f032e973f", 0xad}], 0x4, &(0x7f0000000780)=[@ip_ttl={{0x14, 0x0, 0x2, 0x2}}], 0x18}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f0000001300)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sk_skb, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x143}, 0x48) 1.039989156s ago: executing program 1 (id=3810): perf_event_open(&(0x7f00000010c0)={0x2, 0x80, 0xb9, 0x0, 0x0, 0x0, 0x0, 0x4, 0x88702, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xc, 0x7}, 0x410, 0x2000000, 0x0, 0x7, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x8}, 0x0, 0xfeffffffffffffff, 0xffffffffffffffff, 0x0) (async, rerun: 64) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz1\x00', 0x1ff) (rerun: 64) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r2 = openat$cgroup_subtree(r1, &(0x7f0000000200), 0x2, 0x0) write$cgroup_subtree(r2, &(0x7f00000000c0)=ANY=[@ANYBLOB="2bad4ebcaa1f63727520"], 0x5) r3 = openat$cgroup_int(r0, &(0x7f0000000180)='cpu.weight\x00', 0x2, 0x0) (async, rerun: 64) write$cgroup_subtree(r2, &(0x7f00000001c0)={[{0x2d, 'cpu'}]}, 0x5) (rerun: 64) write$cgroup_int(r3, 0x0, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x4, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="660a00000600000061114f0000000000850000001e0000009500000000000000"], &(0x7f0000000000)='GPL\x00'}, 0x80) (async) perf_event_open(&(0x7f0000000500)={0x4, 0x80, 0xda, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, @perf_config_ext={0x0, 0x200000}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) (async) perf_event_open(&(0x7f0000000100)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x202, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x100}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0xb, 0x800, 0x829, &(0x7f0000000380)) (async, rerun: 32) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) (rerun: 32) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000540)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18020000000030000000"], 0x0}, 0x94) (async) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000380)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_GET_PROG_INFO(0xa, &(0x7f0000000740)={r5, 0x0, 0x0}, 0x10) (async) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, 0x0, &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sk_skb, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x94) 920.073233ms ago: executing program 4 (id=3811): r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x56, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000680), 0x0, 0x0, 0x0, 0x1f00c00e}, 0x0) r1 = syz_clone(0x2100000, 0x0, 0x0, &(0x7f00000000c0), 0x0, &(0x7f0000000240)="5e169bdaf55eff9f980a1ed3a6c9e08cd091cf26") perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x8000, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_bp={0x0}, 0x1001a8, 0x0, 0xfffffffc, 0x4, 0x0, 0xffff0000, 0x9, 0x0, 0xffffbffe, 0x0, 0xfffffffffffffff1}, r1, 0x20000000000, 0xffffffffffffffff, 0x1) bpf$ENABLE_STATS(0x20, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'ip6tnl0\x00', 0x210}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x89f1, &(0x7f0000000080)) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000000001801000020646c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000040000008500000010000000850000005000000095"], 0x0, 0x0, 0x0, 0x0, 0x136e54520700452d, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000800)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000001850000006d0000001801000020696c2500000000002020097b1af8ff00000000bfa100000000000007010000b8ffffffb702000000000000b7"], 0x0, 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback=0x32, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x5, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r3) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000001080)=@base={0x9, 0x18, 0x8, 0x40, 0x42, 0x1}, 0x50) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000100), &(0x7f0000000580), 0x1000, r4}, 0x38) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000340)={r4, &(0x7f00000000c0), &(0x7f0000000240)=""/250}, 0x20) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000340)='./cgroup/syz1\x00', 0x200002, 0x0) 919.451342ms ago: executing program 3 (id=3812): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000740)=ANY=[@ANYBLOB="05000000060000000800000005"], 0x50) close(0x3) bpf$MAP_CREATE(0x0, &(0x7f0000000580)=ANY=[@ANYBLOB="0600000004000000040000000600000000000000", @ANYRES64=r0, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="0000bb717bbb700000000000000000000000000000000000000000000000000000d8764a7a173885aca5daa7c87453ed18b3aa2941823134eb53c2a0d3ac1999880000000000000000"], 0x50) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.current\x00', 0x275a, 0x0) write$cgroup_pid(r1, &(0x7f0000000000), 0x2a979d) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x11, 0x14, &(0x7f0000000280)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_BIND_MAP(0xa, &(0x7f00000004c0)={r2}, 0xc) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.current\x00', 0x275a, 0x0) ioctl$SIOCSIFHWADDR(r3, 0x40305839, 0x0) r4 = openat$cgroup_ro(r3, &(0x7f0000000380)='hugetlb.1GB.usage_in_bytes\x00', 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000300)={0xffffffffffffffff, 0xe0, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, &(0x7f0000000000)=[0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x5, 0x3, &(0x7f0000000040)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000080)=[0x0, 0x0, 0x0], 0x0, 0xe4, &(0x7f0000000340)=[{}, {}, {}, {}, {}, {}, {}], 0x28, 0xffffffffffffff38, &(0x7f0000000140), &(0x7f0000000180), 0x0, 0xb3, 0x8, 0x8, &(0x7f00000001c0)}}, 0x10) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x9, 0x6, 0x8, 0x8}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r6, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x30, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) perf_event_open$cgroup(&(0x7f0000000640)={0x2, 0x80, 0x6, 0x0, 0x8, 0x81, 0x0, 0xffffffffffffff52, 0x800, 0x8, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1000, 0x4, @perf_bp={&(0x7f0000000500), 0xa}, 0x100042, 0xe29e, 0x5, 0x0, 0x5, 0x9, 0x3a5, 0x0, 0x7ff, 0x0, 0x4}, r4, 0xd, r4, 0x0) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000010c0)={0x16, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x19, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000640), &(0x7f0000000080), 0x8000, r6}, 0x38) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r7, 0x2000000, 0xe, 0x0, &(0x7f0000000600)="c9f7b98600"/14, 0x0, 0x7ffd, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0x1e, 0x4, &(0x7f0000000100)=ANY=[@ANYBLOB="18000000010000000000000000000000711835000000000095"], &(0x7f00000003c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x6, 0xffffffffffffffff, 0x0, 0x0, 0x31, 0x0, 0x0, 0x0, r5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x94) 856.052396ms ago: executing program 4 (id=3813): r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x10, 0x3, &(0x7f0000000000)=@raw=[@ldst={0x1, 0x0, 0x3, 0x0, 0x1, 0x40}, @jmp={0x5, 0x0, 0xd}, @exit], &(0x7f0000000280)='GPL\x00'}, 0x80) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB="05000000040000000c0000000b"], 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x14, &(0x7f0000000280)=ANY=[@ANYBLOB="1800000000000000000000000000000018010000f4751f2100000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000000400000018110000", @ANYRES32=r1], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000004c0)={r0, 0xe0, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000040)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x7, 0x3, &(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000000c0)=[0x0, 0x0, 0x0], 0x0, 0x8f, &(0x7f0000000100)=[{}, {}, {}], 0x18, 0x10, &(0x7f0000000140), &(0x7f0000000180), 0x8, 0xb0, 0x8, 0x8, &(0x7f00000001c0)}}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000500)=@bloom_filter={0x1e, 0x2, 0x4, 0x2, 0x4, r1, 0x2, '\x00', r2, 0xffffffffffffffff, 0x2, 0x3, 0x2, 0xa}, 0x50) 837.623607ms ago: executing program 1 (id=3814): r0 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000ac0)='syz0\x00', 0x200002, 0x0) openat$cgroup_subtree(r0, &(0x7f0000000b00), 0x2, 0x0) r1 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000400)=@bpf_lsm={0x6, 0x5, &(0x7f0000000000)=@framed={{}, [@ldst={0x1, 0x0, 0x3, 0x0, 0x1}, @ldst={0x2, 0x0, 0x3, 0x0, 0x0, 0x2}]}, &(0x7f0000000100)='GPL\x00', 0x5, 0xd2, &(0x7f00000002c0)=""/210, 0x0, 0x5}, 0x80) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000240)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f00000001c0), &(0x7f0000000200)=r1}, 0x20) r3 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="020011dd0400000080000000000000000000", @ANYRES32, @ANYBLOB='\x00H\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="050000000100"/28], 0x50) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000940)={r1, 0xe0, &(0x7f0000000840)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, &(0x7f0000000280)=[0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x2, 0x6, &(0x7f00000003c0)=[0x0, 0x0], &(0x7f0000000700)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x1a, &(0x7f0000000740)=[{}, {}], 0x10, 0x10, &(0x7f0000000780), &(0x7f00000007c0), 0x8, 0x64, 0x8, 0x8, &(0x7f0000000800)}}, 0x10) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x91c, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x10, 0x1}, 0x12640, 0x0, 0xfffffffe, 0x6, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000c40)={r3, &(0x7f0000000b40)="92d11920e3cceadc8949f5a9ba41d0d70b5e7d7c44d445641e1f213360140e4e5da9798d89890d44122c8a4edb4a0069e0ffb8ad3659406b1ab9e3d38371ba21682e769a932aeb2c609d7ca37a96aafc0f7650922024026ee54e113d4f0d5e96a772f57e4af029ee7ea5f63bb47a9c68e0b92bfc938a318c130410afbdba8c953e579a301a56d93934043fc6d78bad89a364b09e74c7e9fc236a3b3890f331ef9fd8f0c1c021", &(0x7f0000000c00)=""/17, 0x4}, 0x20) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1}, 0x806, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) perf_event_open(&(0x7f0000000a40)={0x1, 0x80, 0x0, 0x0, 0x0, 0x1, 0x0, 0xfffffffffffffffb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x9}, 0x12100, 0xc8, 0x2, 0x8, 0x0, 0x10001, 0xa, 0x0, 0x800}, 0x0, 0x5, 0xffffffffffffffff, 0xa) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000a00)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000980)={0x2, 0x4, 0x8, 0x1, 0x80, r2, 0x6, '\x00', r4, 0xffffffffffffffff, 0x2, 0x4, 0x2}, 0x50) r5 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000540)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x9, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x0, 0x1}, 0x50) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000640)={0x18, 0x4, &(0x7f0000000040)=@framed={{0x18, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x10001}, [@ldst={0x3, 0x0, 0x3, 0x6, 0xa, 0x4, 0x18}]}, &(0x7f0000000080)='syzkaller\x00', 0x1, 0x32, &(0x7f00000000c0)=""/50, 0x41100, 0x2, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000140)={0x2, 0x1}, 0x8, 0x10, &(0x7f0000000180)={0x2, 0xb, 0x8001, 0x1000}, 0x10, 0x0, 0x0, 0x4, &(0x7f00000005c0)=[r2, r3, r5], &(0x7f0000000600)=[{0x4, 0x2, 0xc, 0x6}, {0x0, 0x5, 0x1, 0x6}, {0x0, 0x1, 0x10, 0xc}, {0x0, 0x2, 0xf}], 0x10, 0x1a}, 0x94) 780.06495ms ago: executing program 4 (id=3815): r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xb7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x40, 0x64b}, 0x200}, 0x0, 0x0, 0xffffffffffffffff, 0x8) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x2) syz_open_procfs$namespace(0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0200000004000000020000000c"], 0x48) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[], 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0xc, 0x14, &(0x7f0000000580)=ANY=[@ANYBLOB="1802000000000000000000000000000018010000786c6c2500000000070000007b1af8ff00000000bfa100000000000007010000f8ffffffb700000000000000b7030000000000fd850000007300000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x1e, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000}, 0x94) bpf$BPF_GET_PROG_INFO(0xa, &(0x7f0000000bc0)={r2, 0x0, 0x0}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000000b00)=ANY=[@ANYBLOB="850000002a00000025000000000000009500000000000000afcd48d6493790710000000000080000b2c6161dba392176dd2963038e1d69ba7ea94c500dc4ef2fad96ed406f21caf5adcf920569c00cc1199684fa7c93836d9ea2cfb0e60436e05425cc4686b066707de94a4f4d5fc79c987d669f381faca0f9d9924be41a9169bdfaf16da915b2e249f21c6eee84309e7a23c19a394830f2539fcb4e0b6eab1aa7d55545a34effa077faa55c59e88254f54077f799bf168301000000bfb1c0e6b1244d35b213bda84cc172afcc2e47a7d8b85a5e3d77ac463920e231b7ae0da8616d2b7958f91f5da6c025d060ab186d94af98af1da2b5952eb15855933a212304e035f7a35dfc72c81256a55a25f8fe3b28d7e53c78fbb888b0255f347160ec83070000000000004015cf10453f6c0b973b81a484ebad04859d928365a7ea3fab2e4b380a00d72bc0480f94479757306720399379d9271cf555c14d56b51c2298237bebfc08e0d5976a942b844139f1111f2dc5e46ac1c60a9b030074bfbcd4b09012175484135f0e519f0b1e4aaa026d570ecb5e8cddbed65ff702000000a3ff4f8a4cf796b07a6ff61c5552417fd703f7f14d8b78a602ca3cdf6a662d8bc9c89c9120072a5d00dcdd8595356c9b2492aaf1264d4ef4a410c882834867bcd2b6e558d17879570c8ad943e392955f4f979ea13201bafe4f0f6ea508000000a0c548552b571bed5647323478a996810000000571cbb17d9f37282462f0e9c147c0d497c61433c6ccc35601eef97ee611be8c97f4151fcda6cb799c6e924966a7f90bf8fd1e75ee76bd72346cfbb526894aa7fe5e68949a3b304723177d356c4604bca492ecec37e83efceefd78a2533659edc8bef9cb85451c6a145074343caea5c4bf690441974b155f5adc681a03c0bbb8358856175e2ce8b0cbbbe3c033e54ffcebde1d9d3d350000000000000000e0f209150a07682c4e14e3a83558df6f3fc97f1730a136bdee07e98cb984b2e2304a1b63afefdb636e56bbaae4e62136574bc6371a0bb2be1a962aae9c1258da6ef590e1d85ea9e12b3025f43e7e08ccffc5064dea4c39cf4b98e1fc6efb5978f51e16b678eca0b658a56008948e5a61561a9845e4ff29e2bd43b5b923b272341c5e093fd66a2946501559335781092cf8ce987c56cd31121624d7455f2a3666276c3c0e812b28e2f30d035cee5d0e77a3c72208ec651cc0ae637fa474816bc59d2e2a00092419304b338a987e9d3044d856ce24f370030be3b5f79f030b8d3ebcef5af469abe753314fae31a09c3a041a1e7b55c4e81dba1e12289ee34463aaf28345bde0c195bc9f022ca8ce37ed85464c31679053e7f9d04bb5cb51da0b7958989fd70f241262d0af3246eb4fc4bda345360200000001fbddeacd3adaa4d2715e21c772ccd44341f7fd53df58ae791ee8b489a7c9efe3625a9d971b5997485d6a063dc6f7359e2eccc2fb39d419de1a7b5c9dc22c96295a0600adf59d44e58eb1c60b3475be31a9b7cf42b6402312d2725b8d9fa7000008000000000000117ca65fc86c2dce97aa03279a66ec87122219b0f796ab92b1adecae50fdb408c8a80f7f02f750d6c977a1919f9f69a6cfefdf879d447df53f3b9b70d10355b07466d1ef0056b5af553d18a6cd50feeb7bfad9b7be3283b6450d34264e7712d2f1d7004548b19162cef04d18d4f5987baab97a9bfbd8f185b5a71e0d7696caba172745c7dd919ffb631820420b75b6522c0e21c882c66f4f25ffb6d95e07e068000000000000eb5b63e45d5d80fe52734093ae5aa3c0b4f3f45bfff201000000000000002e31560e5b741445ea2a1acee2e98c9f3427834ba0a765d20b30f87af976a46f9a9a1ac7dea1ea6845f9aa66237e0dacc107f532348cc2116473381e961f3d9c8c21578fe3245097c280abe51427b9f6cd72b5da6d0252803c66730cd5"], &(0x7f0000000000)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195}, 0x94) bpf$MAP_CREATE(0x0, 0x0, 0x50) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r3, 0x8914, &(0x7f0000000000)={'veth0_vlan\x00', @remote}) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfbfffffc, 0x0, @perf_config_ext={0x1}, 0x0, 0x5, 0x0, 0x0, 0x0, 0x10000003}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8914, &(0x7f0000000000)={'veth0_vlan\x00', @random="0106002010ff"}) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x9, 0x4}, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000c40)={0x7, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000fdffffde18000000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000003800000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x28, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3eb4}, 0x94) r4 = perf_event_open(&(0x7f0000000fc0)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x400, 0xf6103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x24000000, 0x0, @perf_bp={0x0, 0x8}, 0x0, 0x1, 0x0, 0x0, 0x7}, 0x0, 0xffeffff7ffffffff, 0xffffffffffffffff, 0x0) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r4, 0x40042408, r5) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.events\x00', 0x26e1, 0x0) write$cgroup_type(r6, &(0x7f0000000180), 0x13bb711e) r7 = getpid() syz_open_procfs$namespace(r7, &(0x7f0000000040)='ns/cgroup\x00') write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) 777.81452ms ago: executing program 1 (id=3816): bpf$PROG_LOAD_XDP(0x5, &(0x7f00000001c0)={0x10, 0x4, &(0x7f0000001300)=ANY=[@ANYBLOB="1800000000000000000000000000000071101100000000009500000000000000"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x9}, 0x80) r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xc, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0xfffffffe, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff}) recvmsg$unix(r1, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r2, &(0x7f0000000000)=ANY=[], 0xfdef) mkdirat$cgroup(r2, &(0x7f0000001180)='syz0\x00', 0x1ff) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000001c40)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r3, 0x18000000000002a0, 0x34, 0x10000000, &(0x7f0000000100)="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", 0x0, 0xfe, 0x60000000, 0x0, 0x6}, 0x2c) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001240)={{r2}, &(0x7f00000011c0), &(0x7f0000001200)=r3}, 0x20) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000000)='\x00') perf_event_open$cgroup(&(0x7f0000000080)={0x4, 0x80, 0x4, 0x9, 0x62, 0x10, 0x0, 0x3, 0x60805, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x2, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0xec27, 0x2, @perf_bp={0x0, 0xf}, 0x2, 0xd1, 0xd, 0x5, 0xfffffffffffffff7, 0x200, 0x3, 0x0, 0x8, 0x0, 0x5}, 0xffffffffffffffff, 0xf, 0xffffffffffffffff, 0x5) r4 = perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xb, 0x2, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1}, 0x0, 0xb1, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xf, 0x5}, 0x110ac4, 0x3, 0x0, 0x0, 0x0, 0xfff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f0000000040)=@framed={{0xffffffb4, 0x5, 0x0, 0x0, 0x0, 0x61, 0x10, 0x74}, [@ldst={0x3, 0x0, 0x3, 0x1c10a1, 0x0, 0x21}]}, &(0x7f0000003ff6)='GPL\x00', 0x5, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @sk_skb}, 0x48) r5 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000001040)=ANY=[@ANYRESHEX=r4, @ANYBLOB="82cb9cce03e4", @ANYRES64], 0x50) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000240)={{r5, 0xffffffffffffffff}, &(0x7f0000000180), 0x0}, 0x20) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000280)={r6}, 0x4) bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x6, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x40f00, 0x49, '\x00', 0x0, @xdp, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x1000}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r7 = openat$tun(0xffffffffffffff9c, &(0x7f0000001000), 0x400000, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000001100)={r6, 0x58, &(0x7f0000001080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) ioctl$TUNSETIFINDEX(r7, 0x400454da, &(0x7f0000001140)=r8) r9 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x7, 0x6, &(0x7f0000000000)=ANY=[@ANYBLOB="05000000000000007111ae00000000008510000002000000850000000500000095000000000000009500a50500000000"], &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x6}, 0x70) r10 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000340)={r9, 0xe0, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0}}, 0x10) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_clone(0x4021400, 0x0, 0x9000, 0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r10, 0x40042408, r3) bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x2, 0xe, &(0x7f0000000200)=ANY=[@ANYBLOB="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"], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0xffffffffffffff97, 0x10, &(0x7f00000000c0), 0xfffffffffffffd00}, 0x48) 556.006792ms ago: executing program 3 (id=3817): perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xe4, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1}, 0x0, 0x0, 0xc2ba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) (async) getpid() (async) bpf$PROG_LOAD(0x5, 0x0, 0x0) (async, rerun: 32) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6b2a7c4a, 0x30, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}, 0x200, 0x0, 0x0, 0x0, 0x0, 0xfffffffc}, 0x0, 0xb, 0xffffffffffffffff, 0x0) (rerun: 32) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x56, 0x1, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async, rerun: 64) socketpair(0x28, 0x2, 0x28, 0x0) (rerun: 64) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) (async, rerun: 64) syz_clone(0xc0001480, 0x0, 0x0, 0x0, 0x0, 0x0) (rerun: 64) 509.327104ms ago: executing program 3 (id=3818): socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r1, &(0x7f0000000940)={0x0, 0x0, 0x0}, 0x20000800) recvmsg(r0, &(0x7f0000000340)={0x0, 0x0, 0x0}, 0x2162) recvmsg$unix(r0, &(0x7f0000000980)={0x0, 0x0, 0x0}, 0x40000062) r2 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000080)={0x1b, 0x0, 0x0, 0x6, 0x0, 0xffffffffffffffff, 0xfffff001, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x5, 0x1}, 0x50) socketpair(0x26, 0x3, 0x1, &(0x7f00000004c0)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff}) recvmsg$unix(r3, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)=[@rights={{0x10}}, @cred={{0x1c}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}], 0x90}, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0xfdef) r4 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000140)=@generic={&(0x7f0000000100)='./file0\x00', 0x0, 0x10}, 0x18) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r5, 0x40305828, &(0x7f0000000040)) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0xd, 0x2b, &(0x7f0000000180)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x45b}, {{0x18, 0x1, 0x1, 0x0, r2}}, {}, [@alu={0x4, 0x0, 0x5, 0x9, 0x0, 0x30, 0xfffffffffffffffc}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x5}, @btf_id={0x18, 0x5, 0x3, 0x0, 0x5}, @map_idx={0x18, 0x5, 0x5, 0x0, 0x5}, @ringbuf_query, @alu={0x4, 0x1, 0x7, 0x7, 0xb, 0x4, 0x10}, @tail_call={{0x18, 0x2, 0x1, 0x0, r4}}, @btf_id={0x18, 0x3, 0x3, 0x0, 0x1}, @alu={0x4, 0x1, 0x7, 0x0, 0x3, 0x18, 0x10}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, r5}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x4}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000000)='GPL\x00'}, 0x94) 361.107962ms ago: executing program 0 (id=3819): recvmsg$unix(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000000)=@abs, 0x6e, &(0x7f0000000140)=[{&(0x7f0000000080)=""/185, 0xb9}], 0x1}, 0x20) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000240)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f00000001c0), &(0x7f0000000200)='%pi6 \x00'}, 0x20) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000280)={0x0, 0x3, 0x10}, 0xc) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000700)={0xffffffffffffffff, 0xe0, &(0x7f0000000600)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000000400)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x3, 0xa, &(0x7f0000000440)=[0x0, 0x0, 0x0], &(0x7f0000000480)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x8c, &(0x7f00000004c0)=[{}, {}, {}, {}, {}, {}, {}, {}, {}, {}], 0x50, 0x10, &(0x7f0000000540), &(0x7f0000000580), 0x8, 0x6f, 0x8, 0x8, &(0x7f00000005c0)}}, 0x10) r4 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000740)=0xffffffffffffffff, 0x4) r5 = bpf$PROG_LOAD_XDP(0x5, &(0x7f00000008c0)={0x6, 0xf, &(0x7f00000002c0)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x5}, {{0x18, 0x1, 0x1, 0x0, r1}}, {}, [], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000340)='GPL\x00', 0x80, 0x6b, &(0x7f0000000380)=""/107, 0x0, 0x20, '\x00', r3, 0x25, r4, 0x8, &(0x7f0000000780)={0x8, 0x3}, 0x8, 0x10, &(0x7f00000007c0)={0x1, 0x2, 0xc8cc, 0xcf1}, 0x10, 0x0, 0x0, 0x8, &(0x7f0000000800)=[r0, r0, r0, r0, r0, r0, r0], &(0x7f0000000840)=[{0x1, 0x3, 0xb, 0xa}, {0x2, 0x1, 0x2}, {0x1, 0x4, 0x7, 0x8}, {0x3, 0x5, 0x4, 0xb}, {0x5, 0x4, 0x6, 0xb}, {0x0, 0x1, 0x10, 0xb}, {0x3, 0x5, 0xc, 0x1}, {0x80, 0x2, 0x2, 0x3}], 0x10, 0x7}, 0x94) r6 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000009c0)=@generic={&(0x7f0000000980)='./file0\x00'}, 0x18) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000a00)={0xffffffffffffffff, 0xffffffffffffffff}) r9 = syz_clone(0x3020000, &(0x7f0000000c00)="6edee19343e41f3c6ba5ffff2f5f90028bcc9211f72ffefda0042efc4bfad7dbb7a42f049ca090f2984341f3ac48d3b7772bcb3f0cd33751daff61e86305ca3d4cfcf0dfaedd7e4087c2b10f3155537c3a047e17b755bccd0e33991abeb73656a401a3a5cc21bdf44e087c339872626cbac28b1a5d10c0e3f99b92897ac1f6f78424a600ecf33f0fd5e6bcb398648dac52f25c3ad1adae5308800ec699300593104c9946f187c8afe7240b2ba115b4d3a67db4b4644fc08083f91278de91ad730c7dbbae", 0xc4, &(0x7f0000000d00), &(0x7f0000000d40), &(0x7f0000000d80)="5afce17d1b78e2972f706a") r10 = gettid() r11 = getpid() r12 = gettid() r13 = syz_clone(0x100000000, &(0x7f0000000dc0)="f38ce200eeb050ad25e4f140631c623ef37765d3fc24b3e542fb1fe7c0cd400751216fa9b578ca3acb1903192c26f876c06f60ab6a8cb07afc88cbe5dbbcbeb8e78fc452c2a69f5237dd22aef10f9a551f9ff984781f296638434ec6398843e82116f2b9d76af5ef90faef36cc09f891574ac43a8f640f5b401bb34bc3b4b7eb", 0x80, &(0x7f0000000e40), &(0x7f0000000e80), &(0x7f0000000ec0)="e4250673be98b3ed66c9c6e0a3dfc8261338be267c4309812e15a62816bf4835206f1e0c0fe06c84bd69a6b11a3b804e1a03c5567dac2e6cbdae62449b615754921670ea82be0b59dc689b741dff9946b149929a2d32e0c1edc0a6a48b140c2da9c3c67055cad986a1a6e72bedb1e010634b869159e22d8a639efc9ffb32e3765dcd24c53e64d928ede2b9020d63a9b8fbc1e181f334cc624f963f634cc2cff50232660e1ce2e43f9b2315bc183adf2dd814d9b9146acbbdb2475b1fd3404a77e68b77a99883b24e62ca46c31fc3") sendmsg$unix(r8, &(0x7f0000001080)={&(0x7f0000000a40)=@abs={0x1, 0x0, 0x4e22}, 0x6e, &(0x7f0000000bc0)=[{&(0x7f0000000ac0)="2035ce8aa5621ab199a6ec936a395310772794fef84525dd1e7b4227fcfd3fb0ca245f9f770a01e2202b2e6ccecd5b3e81f8514aeae39f1b29dea1863a6bd7262ccc2c67959f723108352188e5ed26c71d5ca89e722787e5e4ec66b5350f66e8e65ba6dbcbf2cb3fbba572be3c37b2f9f602ea9ae10ccce5628867e68fe4c754b5a3eafc2002379f006e0f50d902f37e224aa8563a4e40684e92358b8b26e50f7595f47db0b601afe1ca087abd414e7c39ff4727e018cfb72cf89a41d43a3c0ec740", 0xc2}], 0x1, &(0x7f0000000fc0)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0xee01, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {r9, 0xee01, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {r10, 0xee01, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {r11, 0xffffffffffffffff, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {r12, 0xee01, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {r13, 0x0, 0xee01}}}], 0xc0}, 0x0) close(r0) r14 = perf_event_open$cgroup(&(0x7f0000001100)={0x1, 0x80, 0x7, 0xe, 0x2, 0x84, 0x0, 0x6, 0x14020, 0xb, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x4, 0x0, @perf_bp={&(0x7f00000010c0), 0xb}, 0x2000, 0x7, 0x8, 0x0, 0x100, 0x81f6, 0x0, 0x0, 0xf, 0x0, 0x8bac}, 0xffffffffffffffff, 0xc, 0xffffffffffffffff, 0x6) ioctl$PERF_EVENT_IOC_SET_BPF(r14, 0x40042408, r5) sendmsg$unix(r7, &(0x7f00000016c0)={&(0x7f0000001180)=@abs={0x1, 0x0, 0x4e24}, 0x6e, &(0x7f0000001600)=[{&(0x7f0000001200)="daf9d359b60f06dca8aa251cf4c58c00ce69dcf83d373efa700b1c631b8797ad600d31e266df0e5f21257441b276c2724590f59b6e5cbea7735495e44ebaffece7acd6be65c384dce04fe564edcb4b26074c64c81bddb158f72b4e850e296a40d6e53f985958166503cd67da3bc6f5a2fb29809183bfe3f7f994f2ecc0d9c0dfe718abf9d60c0bb14fb42a5f883be56829b604e82a0ff3e0d2b49d1078358364fc80fc3e8235bec284177e63735c18abf19a0d160113db9006388dd8576f7e3a542e", 0xc2}, {&(0x7f0000001300)="1ffe6ed70199f1a9524efbbd6fe4418e7a3dcc577cb53160965448d86740ca200e9939f9db01c6dbc062be01529f2f870e8ed9e03c0a7919f5f457ba05567f571f735e4b7c2f38c49e462694f8fd6172be4a6060bb02da4aff75af23b9116b55fdff5462c7a70395a4552b355f94d01c67a4138e0f4524e6b03c07a683d30b85499b8516c8d02768fa240d3d83578ce7d8d0b9e3fdaa643ea30719d5cda9da1855a818ea453aa873f8c4071dee729905129210ec929fcd396286f43fb56a51eb8b369892abff368edf9da77740a4478fd033578850f93dafed60afdabc057f4aecc7bce295f3d17786a45a87b2f514b9c4", 0xf1}, {&(0x7f0000001400)="2473177f027e881717520f47b2b251afb2", 0x11}, {&(0x7f0000001440)="abdfec4cca527c8ed827ef787207affa513863ab28c87bd089ebf129774c4ed9c690456e97c6713861315d706130e52492557f9500a72ec11f61c7c54da0b6f3cd84785381da5168771927c9c343ee34b78faeaa25afb4dcf2904c9c89ae22b58c42e4f8c3e7c27be1d26e93e1dd8b20e79c42cccd3d86f313d30fc9d738e623a5b3c8a3586e448d2cd33c91227ea40d7fbcfe0710dc0d9ceeb47864081a9e2acba3d683b1c5e7115650192406a955300ba525", 0xb3}, {&(0x7f0000001500)="d8781372b33660d35143fcd5cc853450d8aea933a9ed27904ef18ecb85544efe090a13ac13a76eb4e609fa1367fc3e85215dfb45bee7301a01fbe1c67a40c74b4e6dcf2a269d78ffafde74a479b297a9d5cf2aaaabe5a19f6ec9738bc605f8c32888998977a4a2d28feadfb96219af11f38ac369bea6c788c4835d2b8cc66bd548a7f623b674eec4a4413c3e461aa317a9419daf68ff5226f7257107d8a61168cb7067e5f02963b5ed4183b24c1e8f663e2f1abfe7c851ba0fb80ad51a4b398e08d0151bcc4a94a8b84b82a59e956bfc", 0xd0}], 0x5, &(0x7f0000001680)=[@cred={{0x1c, 0x1, 0x2, {r12, 0xffffffffffffffff, 0xee01}}}], 0x20, 0x4040}, 0x20080090) r15 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000019c0)=@bpf_ext={0x1c, 0xf, &(0x7f0000001700)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0xe}, [@printk={@lx, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x4}}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x3}, @jmp={0x5, 0x0, 0xb, 0xb, 0xa, 0x50}, @ldst={0x1, 0x2, 0x3, 0x5, 0x7, 0x18, 0xffffffffffffffff}, @ldst={0x3, 0x1, 0x6, 0xa, 0x9, 0x1}]}, &(0x7f0000001780)='syzkaller\x00', 0x0, 0xe7, &(0x7f00000017c0)=""/231, 0x41000, 0x10, '\x00', r3, 0x0, r4, 0x8, &(0x7f00000018c0)={0x9, 0x2}, 0x8, 0x10, &(0x7f0000001900)={0x3, 0x1, 0xb, 0x9539}, 0x10, 0x7489, r5, 0x8, 0x0, &(0x7f0000001940)=[{0x5, 0x1, 0x2}, {0x1, 0x5, 0x1, 0x8}, {0x3, 0x5, 0x7, 0xa}, {0x1, 0x4, 0x5, 0x5}, {0x2, 0x4, 0xb, 0x6}, {0x3, 0x1, 0xb, 0xc}, {0x3, 0x2, 0xf, 0x1}, {0x1, 0x5, 0xa, 0x4}], 0x10, 0x8}, 0x94) r16 = perf_event_open(&(0x7f0000001ac0)={0x3, 0x80, 0x4, 0x0, 0x1a, 0xfb, 0x0, 0x9, 0x14820, 0x5, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x4, 0x4, @perf_bp={&(0x7f0000001a80), 0x4}, 0x22a0, 0x8, 0x2, 0x0, 0x8000, 0x33, 0x6b, 0x0, 0x7}, r11, 0xffffffffffffffff, r7, 0x7) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r16) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000001b40)='./cgroup.net/syz1\x00', 0x200002, 0x0) syz_open_procfs$namespace(r10, &(0x7f0000001b80)='ns/net\x00') r17 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000001bc0)={r2}, 0x4) close(r17) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001ec0)={r17, 0xe0, &(0x7f0000001dc0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, &(0x7f0000001c00)=[0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x5, 0xa, &(0x7f0000001c40)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000001c80)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x7c, &(0x7f0000001cc0)=[{}, {}, {}], 0x18, 0x10, &(0x7f0000001d00), &(0x7f0000001d40), 0x8, 0x38, 0x8, 0x8, &(0x7f0000001d80)}}, 0x10) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001f80)={{r1, 0xffffffffffffffff}, &(0x7f0000001f00), &(0x7f0000001f40)}, 0x20) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000020c0)={r6, 0x58, &(0x7f0000002040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r21 = bpf$PROG_LOAD(0x5, &(0x7f00000021c0)={0x14, 0x5, &(0x7f0000001fc0)=@raw=[@tail_call={{0x18, 0x2, 0x1, 0x0, r19}}], &(0x7f0000002000)='syzkaller\x00', 0x6, 0x0, 0x0, 0x40f00, 0xa, '\x00', r20, @fallback=0x1, 0xffffffffffffffff, 0x8, &(0x7f0000002100)={0x7, 0x1}, 0x8, 0x10, &(0x7f0000002140)={0x0, 0x6, 0x0, 0x9}, 0x10, r18, r15, 0x0, &(0x7f0000002180)=[r6, r1, r6, r1, r0], 0x0, 0x10, 0x1}, 0x94) close(r21) 304.247794ms ago: executing program 2 (id=3820): bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./cgroup/../file0\x00', 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)}, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'sit0\x00'}) socketpair(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x89f1, &(0x7f0000000080)) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r2 = openat$cgroup_subtree(r1, &(0x7f0000000200), 0x2, 0x0) write$cgroup_subtree(r2, &(0x7f0000000400)=ANY=[@ANYBLOB='-cpu'], 0x5) write$cgroup_subtree(r2, &(0x7f0000000040)=ANY=[@ANYBLOB="2b637000002beaa4ba957e"], 0xb) openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, 0x0, 0x2, 0x0) perf_event_open(&(0x7f00000010c0)={0x2, 0x80, 0xb9, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2a0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0xc, 0x7}, 0x410, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 265.616836ms ago: executing program 2 (id=3821): bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0xd, 0x5, 0x0, &(0x7f0000000000)='GPL\x00'}, 0x94) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)) bpf$MAP_CREATE(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0xda, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x20, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x7, 0x80}, 0x0, 0x1, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x4, &(0x7f0000000400)=ANY=[@ANYBLOB="b400000000000000691075000000000004000000000000009500000000000000"], &(0x7f0000000080)='GPL\x00', 0x2, 0x3f7, &(0x7f000000cf3d)=""/195}, 0x48) r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000001480)={'syzkaller0\x00', 0x7101}) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000840)=@base={0xa, 0x5, 0x2, 0x4}, 0x48) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x0, 0x10, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7020000010000e1850000008600000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, r2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) close(0x3) bpf$MAP_CREATE(0x0, &(0x7f0000000040)=@base={0x6, 0x4, 0x40, 0x5}, 0x48) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x1, 0x10, &(0x7f0000000180)=ANY=[], &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) setsockopt$sock_attach_bpf(r3, 0x1, 0x32, &(0x7f00000000c0)=r5, 0x4) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x18000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_bp={0x0}, 0xa100, 0xc8, 0x3}, 0x0, 0x3, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) close(r7) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="007a707573657420006370750806"], 0x12) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000600)={0xffffffffffffffff, 0x5, 0xb68, 0x4, &(0x7f0000000000)='%', 0x0, 0xd01, 0x80040000, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x48) recvmsg$unix(r6, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r8, &(0x7f0000000000), 0xfdef) sendmsg$unix(r4, &(0x7f00000006c0)={0x0, 0x11, 0x0}, 0x0) close(r0) bpf$MAP_CREATE(0x0, &(0x7f00000006c0)=ANY=[@ANYBLOB="0e00000004000000080000000180000004000000", @ANYRES32, @ANYBLOB, @ANYRES32=0x0], 0x48) 243.624947ms ago: executing program 0 (id=3822): bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000740)={0xffffffffffffffff, 0xe0, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, &(0x7f0000000380)=[0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x3, 0x1, &(0x7f0000000400)=[0x0, 0x0, 0x0], &(0x7f0000000440)=[0x0], 0x0, 0x9e, &(0x7f0000000480)=[{}], 0x8, 0x10, &(0x7f00000004c0), &(0x7f0000000500), 0x8, 0x49, 0x8, 0x8, &(0x7f0000000540)}}, 0x10) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.swap.current\x00', 0x26e1, 0x0) perf_event_open(&(0x7f00000010c0)={0x1, 0x80, 0xb9, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_bp={&(0x7f0000000180), 0x2}, 0x410, 0x2000000, 0x0, 0x6, 0x0, 0x100}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) perf_event_open(&(0x7f0000001340)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x10020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x3, 0x0, 0x2a}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r0, &(0x7f0000000900)={0x0, 0x0, &(0x7f0000000c40)=[{&(0x7f0000000c80)=""/196, 0xc4}, {&(0x7f0000000b00)=""/220, 0xdc}], 0x2}, 0x3) r1 = perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7, 0xa}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000750000001801000020646c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000e00000095"], 0x0, 0xfffffffe, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xa, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18000000000000000000000000000000850000006d"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) sendmsg$unix(0xffffffffffffffff, 0x0, 0x20000040) close(0x3) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000d80)={0x18, 0x5, &(0x7f0000000480)=ANY=[@ANYBLOB="1801000021"], 0x0, 0x40, 0x0, 0x0, 0x0, 0x42, '\x00', 0x0, 0x2}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r2) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000008c0)={&(0x7f0000000e40)=ANY=[@ANYBLOB="9feb010018000000000000004c0000004c00000005000000000000000300000d0000000008000000020020000c0000000300000010000000030000000900000000000007000000000b000000000000010000000002002607010000000000000700000000003028bf2dfeb8306ebe7b2af73564d21296203000"], &(0x7f0000000800)=""/160, 0x69, 0xa0, 0x1, 0x6}, 0x28) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000980)={0x0, 0x6, 0x28}, 0xc) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="17000000000000000400000003"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3], 0x0}, 0x90) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="17000000000000000400000003"], 0x48) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff}) recvmsg$unix(r5, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r6, &(0x7f0000000040)=ANY=[@ANYBLOB="0763707573751400000000000009"], 0x17) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000580)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r4], 0x0, 0xfffffffe, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x2d}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000080)={{r4}, 0x0, &(0x7f00000002c0)}, 0x20) r7 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="1b00000000000000000000000080000000000000", @ANYRES32, @ANYBLOB="ff0f00"/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x50) r8 = bpf$MAP_CREATE(0x0, &(0x7f0000000300)=@base={0xe, 0x4, 0x8, 0x10, 0x0, 0x1}, 0x50) r9 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xd, &(0x7f0000000040)=ANY=[@ANYBLOB="18010000000300000000000000000000850000006d00000018110000", @ANYRES32=r8, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000010b704000000000000850000000100000095"], &(0x7f00000001c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_BIND_MAP(0xa, &(0x7f0000000080)={r9}, 0xc) bpf$MAP_DELETE_ELEM(0x15, &(0x7f0000000c00)={r7, 0x0, 0x20000000}, 0x20) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="1b0000000000000000000000ff01000000000000", @ANYRES32=0x1, @ANYBLOB='\a\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="0000000003000000090000000000000000000000e8ff000000000000"], 0x50) 0s ago: executing program 2 (id=3823): r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x56, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000000001801000020646c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000040000008500000010000000850000005000000095"], 0x0, 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000800)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000001850000006d0000001801000020696c2500000000002020097b1af8ff00000000bfa100000000000007010000b8ffffffb702000000000000b7"], 0x0, 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback=0x32, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x5, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='memory.events\x00', 0x0, 0x0) r3 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000004c0)={&(0x7f0000000280)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x60, 0x60, 0x4, [@fwd={0x3}, @enum={0x7, 0x7, 0x0, 0x6, 0x4, [{0x3, 0x6541}, {0x3, 0x80000001}, {0xf, 0x7fffffff}, {0x5, 0xea}, {0x10, 0x2}, {0x9, 0x84}, {0xa, 0xfffff001}]}, @int={0x9, 0x0, 0x0, 0x1, 0x0, 0x44, 0x0, 0xd, 0xc}]}, {0x0, [0x30, 0x5f]}}, &(0x7f0000000380)=""/174, 0x7c, 0xae, 0x1, 0x6, 0x10000}, 0x28) r4 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000580)={0x1b, 0x0, 0x0, 0x6, 0x0, 0x1, 0x7fffffff, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x3, 0x1}, 0x50) r5 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000000c0), 0x48) bpf$MAP_LOOKUP_ELEM(0x5, &(0x7f00000000c0)={r5, &(0x7f0000000000), &(0x7f0000000040)=""/73}, 0x70) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000600)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000640)={0x1, 0xffffffffffffffff}, 0x4) r8 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000680)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x5b43, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x5, 0x2}, 0x50) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000e80)={r1, 0xe0, &(0x7f0000000d80)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, &(0x7f0000000bc0)=[0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x8, 0x6, &(0x7f0000000c00)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000c40)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x16, &(0x7f0000000c80)=[{}, {}], 0x10, 0x10, &(0x7f0000000cc0), &(0x7f0000000d00), 0x8, 0x26, 0x8, 0x8, &(0x7f0000000d40)}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000fc0)={0x8, 0x22, &(0x7f0000000980)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x6b, 0x0, 0x0, 0x0, 0x2}, {{0x18, 0x1, 0x1, 0x0, r2}}, {}, [@jmp={0x5, 0x1, 0xd, 0x1447f207a5a7ba05, 0xb, 0xc, 0x10}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x5}, @map_fd={0x18, 0x3, 0x1, 0x0, r7}, @printk={@llx, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0xdcc}}, @ringbuf_query={{0x18, 0x1, 0x1, 0x0, r8}}, @exit, @jmp={0x5, 0x1, 0x6, 0x2, 0x0, 0x0, 0x4}, @generic={0x3, 0x4, 0x9, 0x101, 0x8}], {{}, {}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000ac0)='GPL\x00', 0xa, 0xa1, &(0x7f0000000b00)=""/161, 0x40f00, 0x18, '\x00', r9, @fallback=0x2f, r8, 0x8, &(0x7f0000000ec0)={0x6, 0x4}, 0x8, 0x10, &(0x7f0000000f00)={0x3, 0x7, 0x1, 0x7}, 0x10, 0x0, r2, 0x5, 0x0, &(0x7f0000000f40)=[{0x1, 0x3, 0x10, 0xc}, {0x1, 0x2, 0xe, 0x3}, {0x4, 0x5, 0x5, 0xa}, {0x3, 0x1, 0xd, 0xa}, {0x1, 0x2, 0x4, 0xb}], 0x10, 0xe}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000008c0)={0x11, 0x10, &(0x7f0000000180)=@raw=[@func={0x85, 0x0, 0x1, 0x0, 0x2}, @map_fd, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, r2}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x6}}, @cb_func={0x18, 0x9, 0x4, 0x0, 0x6}, @map_idx_val={0x18, 0x9, 0x6, 0x0, 0xb, 0x0, 0x0, 0x0, 0xffffffff}], &(0x7f0000000200)='syzkaller\x00', 0x9, 0x0, 0x0, 0x41000, 0x1, '\x00', 0x0, 0x0, r3, 0x8, &(0x7f0000000500)={0x0, 0x1}, 0x8, 0x10, &(0x7f0000000540)={0x0, 0x9, 0xc00, 0x2}, 0x10, 0x0, 0x0, 0x1, &(0x7f0000000700)=[r4, r5, r6, r7, r8, 0x1], &(0x7f0000000740)=[{0x3, 0x5, 0xb, 0x5}], 0x10, 0x80000001}, 0x94) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000340)='./cgroup/syz1\x00', 0x200002, 0x0) kernel console output (not intermixed with test programs): ][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 20.458358][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 20.466894][ T7] bridge0: port 1(bridge_slave_0) entered blocking state [ 20.474251][ T7] bridge0: port 1(bridge_slave_0) entered forwarding state [ 20.481763][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 20.490309][ T7] bridge0: port 2(bridge_slave_1) entered blocking state [ 20.497322][ T7] bridge0: port 2(bridge_slave_1) entered forwarding state [ 20.504792][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 20.520762][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 20.535779][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 20.562639][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 20.571688][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 20.579463][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 20.587970][ T7] bridge0: port 1(bridge_slave_0) entered blocking state [ 20.595049][ T7] bridge0: port 1(bridge_slave_0) entered forwarding state [ 20.602734][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 20.611141][ T7] bridge0: port 2(bridge_slave_1) entered blocking state [ 20.618937][ T7] bridge0: port 2(bridge_slave_1) entered forwarding state [ 20.626891][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 20.635164][ T7] bridge0: port 1(bridge_slave_0) entered blocking state [ 20.642846][ T7] bridge0: port 1(bridge_slave_0) entered forwarding state [ 20.650232][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 20.658825][ T7] bridge0: port 2(bridge_slave_1) entered blocking state [ 20.665845][ T7] bridge0: port 2(bridge_slave_1) entered forwarding state [ 20.673566][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 20.681397][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 20.698315][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 20.706759][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 20.715034][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 20.723727][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 20.732519][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 20.740566][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 20.759261][ T275] device veth0_vlan entered promiscuous mode [ 20.767854][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 20.776157][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 20.784634][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 20.802347][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 20.809827][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 20.817170][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 20.826147][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 20.834522][ T7] bridge0: port 1(bridge_slave_0) entered blocking state [ 20.841770][ T7] bridge0: port 1(bridge_slave_0) entered forwarding state [ 20.849305][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 20.857764][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 20.866028][ T7] bridge0: port 2(bridge_slave_1) entered blocking state [ 20.873416][ T7] bridge0: port 2(bridge_slave_1) entered forwarding state [ 20.881376][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 20.903315][ T277] device veth0_vlan entered promiscuous mode [ 20.911111][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 20.919386][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 20.927411][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 20.935654][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 20.943811][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 20.952420][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 20.961689][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 20.969916][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 20.978064][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 20.986537][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 20.995125][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 21.003513][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 21.011994][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 21.020577][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 21.028702][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 21.036130][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 21.043805][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 21.051481][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 21.062524][ T275] device veth1_macvtap entered promiscuous mode [ 21.069297][ T279] device veth0_vlan entered promiscuous mode [ 21.079350][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 21.087020][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 21.096204][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 21.111029][ T278] device veth0_vlan entered promiscuous mode [ 21.123745][ T276] device veth0_vlan entered promiscuous mode [ 21.130467][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 21.138938][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 21.147164][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 21.155828][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 21.164497][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 21.172968][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 21.181698][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 21.190212][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 21.198648][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 21.206882][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 21.216046][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 21.223913][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 21.231345][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 21.239279][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 21.250322][ T277] device veth1_macvtap entered promiscuous mode [ 21.263405][ T279] device veth1_macvtap entered promiscuous mode [ 21.270382][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 21.278913][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 21.286971][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 21.294680][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 21.302948][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 21.311593][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 21.319315][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 21.327366][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 21.337550][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 21.345969][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 21.357123][ T278] device veth1_macvtap entered promiscuous mode [ 21.366405][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 21.374205][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 21.382950][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 21.399541][ T275] request_module fs-gadgetfs succeeded, but still no fs? [ 21.410801][ T275] cgroup: cgroup: disabling cgroup2 socket matching due to net_prio or net_cls activation [ 21.412108][ T276] device veth1_macvtap entered promiscuous mode [ 21.436674][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 21.445864][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 21.455536][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 21.465064][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 21.473962][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 21.482913][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 21.498848][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 21.507137][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 21.515779][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 21.524270][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 21.533080][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 21.554965][ T302] bridge0: port 1(bridge_slave_0) entered disabled state [ 21.573640][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 21.583298][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 21.592476][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 21.601148][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 21.681593][ T309] device syzkaller0 entered promiscuous mode [ 21.708402][ C0] hrtimer: interrupt took 25750 ns [ 21.888815][ T323] cgroup: syz.0.7 (323) created nested cgroup for controller "memory" which has incomplete hierarchy support. Nested cgroups may change behavior in the future. [ 21.924178][ T323] cgroup: "memory" requires setting use_hierarchy to 1 on the root [ 23.938461][ T24] kauditd_printk_skb: 48 callbacks suppressed [ 23.938475][ T24] audit: type=1400 audit(1776884699.930:122): avc: denied { create } for pid=496 comm="syz.0.62" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 24.045127][ T24] audit: type=1400 audit(1776884699.990:123): avc: denied { write } for pid=496 comm="syz.0.62" name="ppp" dev="devtmpfs" ino=153 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ppp_device_t tclass=chr_file permissive=1 [ 24.573302][ T24] audit: type=1400 audit(1776884700.570:124): avc: denied { create } for pid=528 comm="syz.3.68" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=phonet_socket permissive=1 [ 24.757370][ T24] audit: type=1400 audit(1776884700.750:125): avc: denied { create } for pid=540 comm="syz.2.72" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=pppox_socket permissive=1 [ 24.994911][ T547] ªªªªªª™™: renamed from vlan0 [ 25.467939][ T574] device syzkaller0 entered promiscuous mode [ 25.642760][ T595] : port 1(syz_tun) entered blocking state [ 25.653820][ T595] : port 1(syz_tun) entered disabled state [ 25.660761][ T595] device syz_tun entered promiscuous mode [ 25.717280][ T598] device wg2 entered promiscuous mode [ 25.782674][ T24] audit: type=1400 audit(1776884701.780:126): avc: denied { create } for pid=599 comm="syz.3.88" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=qipcrtr_socket permissive=1 [ 27.550364][ T24] audit: type=1400 audit(1776884703.550:127): avc: denied { create } for pid=701 comm="syz.3.117" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 27.596565][ T703] device syzkaller0 entered promiscuous mode [ 27.934185][ T729] device syzkaller0 entered promiscuous mode [ 28.303012][ T741] ------------[ cut here ]------------ [ 28.338651][ T741] trace type BPF program uses run-time allocation [ 28.385416][ T741] WARNING: CPU: 1 PID: 741 at kernel/bpf/verifier.c:10513 check_map_prog_compatibility+0x5d6/0x740 [ 28.435850][ T741] Modules linked in: [ 28.445395][ T741] CPU: 0 PID: 741 Comm: syz.2.126 Not tainted syzkaller #0 [ 28.455072][ T741] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/18/2026 [ 28.466881][ T741] RIP: 0010:check_map_prog_compatibility+0x5d6/0x740 [ 28.474168][ T741] Code: 85 e9 14 fe ff ff e8 99 d1 ef ff 31 c0 e9 15 fe ff ff e8 8d d1 ef ff c6 05 15 b4 4b 05 01 48 c7 c7 00 cf 25 85 e8 9a 09 05 03 <0f> 0b e9 85 fc ff ff 89 d9 80 e1 07 80 c1 03 38 c1 0f 8c a3 fa ff [ 28.496790][ T741] RSP: 0018:ffffc90000bd7448 EFLAGS: 00010246 [ 28.550647][ T741] RAX: 3918e3c0c5d96c00 RBX: 0000000000000001 RCX: 0000000000080000 [ 28.611692][ T741] RDX: ffffc900024df000 RSI: 0000000000002118 RDI: 0000000000002119 [ 28.627846][ T741] RBP: ffffc90000bd7490 R08: ffff8881f7152fbf R09: 1ffff1103ee2a5f7 [ 28.648199][ T741] R10: dffffc0000000000 R11: ffffed103ee2a5f8 R12: ffff888106da0000 [ 28.661394][ T24] audit: type=1400 audit(1776884704.660:128): avc: denied { setattr } for pid=756 comm="syz.3.131" path="pipe:[14030]" dev="pipefs" ino=14030 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=fifo_file permissive=1 [ 28.684936][ T741] R13: 0000000000000002 R14: dffffc0000000000 R15: ffff8881073a7000 [ 28.695023][ T741] FS: 00007f7348f756c0(0000) GS:ffff8881f7000000(0000) knlGS:0000000000000000 [ 28.720657][ T741] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 28.736740][ T741] CR2: 000000110c2a7e2f CR3: 000000011d2cd000 CR4: 00000000003506b0 [ 28.754252][ T741] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 28.763561][ T741] DR3: 0000000000000000 DR6: 00000000ffff0ff0 DR7: 0000000000000600 [ 28.772389][ T741] Call Trace: [ 28.776061][ T741] ? __fdget+0x1a1/0x230 [ 28.782128][ T741] resolve_pseudo_ldimm64+0x55e/0x1060 [ 28.788111][ T741] ? bpf_check+0xdb10/0xdb10 [ 28.793462][ T741] ? resolve_pseudo_ldimm64+0xa/0x1060 [ 28.799509][ T741] bpf_check+0x9058/0xdb10 [ 28.804146][ T741] ? kvm_sched_clock_read+0x18/0x40 [ 28.812382][ T741] ? sched_clock+0x3a/0x40 [ 28.817323][ T741] ? bpf_get_btf_vmlinux+0x60/0x60 [ 28.839136][ T741] ? __irq_exit_rcu+0x40/0x150 [ 28.854145][ T741] ? irq_exit_rcu+0x9/0x10 [ 28.892164][ T741] ? sysvec_apic_timer_interrupt+0xcb/0xe0 [ 28.935125][ T741] ? asm_sysvec_apic_timer_interrupt+0x12/0x20 [ 28.968662][ T741] ? __stack_depot_save+0x1c0/0x4c0 [ 28.969363][ T24] audit: type=1400 audit(1776884704.970:129): avc: denied { create } for pid=788 comm="syz.3.143" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 28.987787][ T741] ? selinux_bpf_prog_alloc+0x51/0x140 [ 29.003413][ T741] ? kvm_sched_clock_read+0x18/0x40 [ 29.009160][ T741] ? sched_clock+0x3a/0x40 [ 29.013892][ T741] ? sched_clock_cpu+0x1b/0x3d0 [ 29.019432][ T741] ? sched_clock+0x3a/0x40 [ 29.024259][ T741] ? sched_clock_cpu+0x1b/0x3d0 [ 29.029615][ T741] ? __irq_exit_rcu+0x40/0x150 [ 29.034719][ T741] ? irq_exit_rcu+0x9/0x10 [ 29.050607][ T791] device wg2 entered promiscuous mode [ 29.051243][ T741] ? sysvec_apic_timer_interrupt+0xcb/0xe0 [ 29.067289][ T741] ? asm_sysvec_apic_timer_interrupt+0x12/0x20 [ 29.074926][ T741] ? __virt_addr_valid+0x97/0x2c0 [ 29.093008][ T741] ? memset+0x35/0x40 [ 29.097271][ T741] ? bpf_obj_name_cpy+0x193/0x1e0 [ 29.109615][ T741] bpf_prog_load+0xfca/0x14a0 [ 29.168055][ T741] ? map_freeze+0x320/0x320 [ 29.173264][ T741] ? selinux_bpf+0xc7/0xf0 [ 29.177926][ T741] ? security_bpf+0x82/0xa0 [ 29.183164][ T741] __se_sys_bpf+0x49a/0x740 [ 29.187854][ T741] ? __x64_sys_bpf+0x90/0x90 [ 29.193643][ T741] ? __kasan_check_read+0x11/0x20 [ 29.199129][ T741] __x64_sys_bpf+0x7b/0x90 [ 29.204347][ T741] do_syscall_64+0x31/0x40 [ 29.211724][ T741] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 29.224177][ T741] RIP: 0033:0x7f734a51a819 [ 29.228905][ T741] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 29.250260][ T741] RSP: 002b:00007f7348f75028 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 29.274587][ T741] RAX: ffffffffffffffda RBX: 00007f734a793fa0 RCX: 00007f734a51a819 [ 29.283250][ T741] RDX: 0000000000000080 RSI: 0000200000000440 RDI: 0000000000000005 [ 29.293379][ T741] RBP: 00007f734a5b0c91 R08: 0000000000000000 R09: 0000000000000000 [ 29.301928][ T741] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 29.323896][ T741] R13: 00007f734a794038 R14: 00007f734a793fa0 R15: 00007ffe6256eb98 [ 29.360058][ T741] ---[ end trace 5a8b62a9e88ff76c ]--- [ 29.498121][ T24] audit: type=1400 audit(1776884705.490:130): avc: denied { create } for pid=825 comm="syz.2.150" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netrom_socket permissive=1 [ 29.740332][ T24] audit: type=1400 audit(1776884705.740:131): avc: denied { create } for pid=842 comm="syz.1.154" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 29.996389][ T24] audit: type=1400 audit(1776884705.990:132): avc: denied { create } for pid=869 comm="syz.1.163" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=appletalk_socket permissive=1 [ 30.633296][ T900] nr0: port 1(macsec0) entered blocking state [ 30.642397][ T900] nr0: port 1(macsec0) entered disabled state [ 30.649823][ T900] device macsec0 entered promiscuous mode [ 31.059116][ T24] audit: type=1400 audit(1776884707.060:133): avc: denied { create } for pid=935 comm="syz.0.183" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=x25_socket permissive=1 [ 32.726913][ T992] device syzkaller0 entered promiscuous mode [ 32.733756][ T990] syz.2.197 (990) used obsolete PPPIOCDETACH ioctl [ 32.765984][ T990] cgroup: fork rejected by pids controller in /syz2 [ 33.095721][ T24] audit: type=1400 audit(1776884709.090:134): avc: denied { write } for pid=1007 comm="syz.3.205" name="cgroup.subtree_control" dev="cgroup2" ino=270 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 [ 33.143067][ T24] audit: type=1400 audit(1776884709.100:135): avc: denied { open } for pid=1007 comm="syz.3.205" path="" dev="cgroup2" ino=270 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 [ 33.624557][ T1023] bridge0: port 1(bridge_slave_0) entered blocking state [ 33.658525][ T1023] bridge0: port 1(bridge_slave_0) entered disabled state [ 33.668330][ T1023] device bridge_slave_0 entered promiscuous mode [ 33.745042][ T1023] bridge0: port 2(bridge_slave_1) entered blocking state [ 33.778942][ T1023] bridge0: port 2(bridge_slave_1) entered disabled state [ 33.786408][ T1023] device bridge_slave_1 entered promiscuous mode [ 33.835556][ T1045] device team_slave_0 entered promiscuous mode [ 33.908563][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 33.926734][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 34.180733][ T24] audit: type=1400 audit(1776884710.180:136): avc: denied { ioctl } for pid=1060 comm="syz.0.219" path="pid:[4026532281]" dev="nsfs" ino=4026532281 ioctlcmd=0xb701 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 34.266602][ T24] audit: type=1400 audit(1776884710.250:137): avc: denied { create } for pid=1023 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 34.350860][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 34.362501][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 34.383266][ T24] audit: type=1400 audit(1776884710.250:138): avc: denied { write } for pid=1023 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 34.439921][ T24] audit: type=1400 audit(1776884710.250:139): avc: denied { read } for pid=1023 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 34.451008][ T1078] device syzkaller0 entered promiscuous mode [ 34.501031][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 34.515786][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 34.537630][ T9] bridge0: port 1(bridge_slave_0) entered blocking state [ 34.545025][ T9] bridge0: port 1(bridge_slave_0) entered forwarding state [ 34.573321][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 34.583078][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 34.591734][ T9] bridge0: port 2(bridge_slave_1) entered blocking state [ 34.598888][ T9] bridge0: port 2(bridge_slave_1) entered forwarding state [ 34.626747][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 34.879105][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 34.891658][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 34.934179][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 34.965734][ T49] device macsec0 left promiscuous mode [ 34.978641][ T49] nr0: port 1(macsec0) entered disabled state [ 35.018067][ T49] device bridge_slave_1 left promiscuous mode [ 35.047988][ T49] bridge0: port 2(bridge_slave_1) entered disabled state [ 35.079929][ T49] device bridge_slave_0 left promiscuous mode [ 35.086111][ T49] bridge0: port 1(bridge_slave_0) entered disabled state [ 35.124596][ T49] device veth1_macvtap left promiscuous mode [ 35.380094][ T1023] device veth0_vlan entered promiscuous mode [ 35.396759][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 35.411605][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 35.429470][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 35.470943][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 35.496349][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 35.516027][ T1023] device veth1_macvtap entered promiscuous mode [ 35.551427][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 35.569012][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 35.594128][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 35.643954][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 35.684258][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 36.078080][ T24] audit: type=1400 audit(1776884712.070:140): avc: denied { create } for pid=1149 comm="syz.2.242" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 36.125230][ T24] audit: type=1400 audit(1776884712.120:141): avc: denied { create } for pid=1149 comm="syz.2.242" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=atmsvc_socket permissive=1 [ 36.281310][ T24] audit: type=1400 audit(1776884712.280:142): avc: denied { create } for pid=1162 comm="syz.0.245" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 37.438674][ T1213] device veth0_vlan left promiscuous mode [ 37.495010][ T1213] device veth0_vlan entered promiscuous mode [ 37.588634][ T303] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 37.608851][ T303] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 37.616442][ T303] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 38.328695][ T24] audit: type=1400 audit(1776884714.330:143): avc: denied { create } for pid=1244 comm="syz.3.269" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=ax25_socket permissive=1 [ 38.473811][ T1249] device sit0 entered promiscuous mode [ 38.951944][ T1259] +: renamed from team_slave_1 [ 39.430035][ T1294] device syzkaller0 entered promiscuous mode [ 40.097948][ T1334] geneve1: tun_chr_ioctl cmd 2147767521 [ 40.358014][ T1365] device wg2 entered promiscuous mode [ 42.842280][ T1466] device syzkaller0 entered promiscuous mode [ 42.965857][ T1475] tap0: tun_chr_ioctl cmd 1074025673 [ 43.094281][ T1480] device syzkaller0 entered promiscuous mode [ 43.757953][ T1508] device syzkaller0 entered promiscuous mode [ 44.846898][ T1612] nr0: port 1(macsec0) entered blocking state [ 44.854107][ T1612] nr0: port 1(macsec0) entered disabled state [ 44.861437][ T1612] device macsec0 entered promiscuous mode [ 45.402587][ T24] audit: type=1400 audit(1776884721.400:144): avc: denied { create } for pid=1659 comm="syz.4.394" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bluetooth_socket permissive=1 [ 45.580545][ T1670] device syzkaller0 entered promiscuous mode [ 45.633237][ T1676] device syzkaller0 entered promiscuous mode [ 45.867759][ T1700] -1: renamed from syzkaller0 [ 46.485636][ T1749] device syzkaller0 entered promiscuous mode [ 46.506753][ T24] audit: type=1400 audit(1776884722.500:145): avc: denied { create } for pid=1759 comm="syz.1.425" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=isdn_socket permissive=1 [ 46.515849][ T495] syzkaller0: tun_net_xmit 48 [ 46.535161][ T24] audit: type=1400 audit(1776884722.530:146): avc: denied { create } for pid=1759 comm="syz.1.425" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 46.540238][ T1749] syzkaller0: tun_net_xmit 1280 [ 46.570881][ T1749] syzkaller0: create flow: hash 1769919088 index 1 [ 46.713462][ T1769] syzkaller0: delete flow: hash 1769919088 index 1 [ 47.321748][ T9] bridge0: port 2(bridge_slave_1) entered disabled state [ 48.671904][ T1883] device syzkaller0 entered promiscuous mode [ 48.926861][ T1919] device sit0 left promiscuous mode [ 48.990998][ T1919] device sit0 entered promiscuous mode [ 49.517337][ T24] audit: type=1400 audit(1776884725.510:147): avc: denied { tracepoint } for pid=1936 comm="syz.0.479" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=1 [ 51.273685][ T24] audit: type=1400 audit(1776884727.270:148): avc: denied { create } for pid=2042 comm="syz.0.511" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rxrpc_socket permissive=1 [ 51.748942][ T2059] skbuff: bad partial csum: csum=65489/0 headroom=64 headlen=65491 [ 51.785599][ T2059] skbuff: bad partial csum: csum=65489/0 headroom=64 headlen=65491 [ 51.814007][ T2059] skbuff: bad partial csum: csum=65489/0 headroom=64 headlen=65491 [ 51.857093][ T2061] bridge0: port 2(bridge_slave_1) entered disabled state [ 51.865182][ T2061] bridge0: port 1(bridge_slave_0) entered disabled state [ 51.884105][ T2059] skbuff: bad partial csum: csum=65489/0 headroom=64 headlen=65491 [ 51.919708][ T2059] skbuff: bad partial csum: csum=65489/0 headroom=64 headlen=65491 [ 51.994945][ T2059] skbuff: bad partial csum: csum=65489/0 headroom=64 headlen=65491 [ 52.023896][ T2059] skbuff: bad partial csum: csum=65489/0 headroom=64 headlen=65491 [ 52.041411][ T2059] skbuff: bad partial csum: csum=65489/0 headroom=64 headlen=65491 [ 52.064615][ T2059] skbuff: bad partial csum: csum=65489/0 headroom=64 headlen=65491 [ 52.099776][ T2059] skbuff: bad partial csum: csum=65489/0 headroom=64 headlen=65491 [ 52.466335][ T2097] device veth1_macvtap left promiscuous mode [ 52.492252][ T2098] device veth1_macvtap entered promiscuous mode [ 52.508577][ T2098] device macsec0 entered promiscuous mode [ 54.721915][ T2198] device veth1_macvtap left promiscuous mode [ 55.081617][ T2209] device syzkaller0 entered promiscuous mode [ 55.614893][ T2249] bridge0: port 3(veth0_to_bridge) entered blocking state [ 55.660257][ T2249] bridge0: port 3(veth0_to_bridge) entered disabled state [ 55.703428][ T2249] device veth0_to_bridge entered promiscuous mode [ 56.153821][ T2277] device veth1_macvtap left promiscuous mode [ 56.344659][ T2289] device ip_vti0 entered promiscuous mode [ 56.405382][ T2289] ±ÿ: renamed from team_slave_1 [ 57.316523][ T2396] @0Ù: renamed from bond_slave_1 [ 57.574421][ T2405] device syzkaller0 entered promiscuous mode [ 58.329191][ T2435] device sit0 entered promiscuous mode [ 59.179223][ T2481] bridge0: port 3(veth1_macvtap) entered blocking state [ 59.205629][ T2481] bridge0: port 3(veth1_macvtap) entered disabled state [ 59.572423][ T2506] : renamed from bond_slave_0 [ 59.643548][ T2520] Scheduler tracepoints stat_sleep, stat_iowait, stat_blocked and stat_runtime require the kernel parameter schedstats=enable or kernel.sched_schedstats=1 [ 59.927142][ T2547] device syzkaller0 entered promiscuous mode [ 59.993178][ T2548] device syzkaller0 entered promiscuous mode [ 60.017018][ T2547] device syzkaller0 entered promiscuous mode [ 60.539067][ T2595] Â: renamed from pim6reg1 [ 62.280640][ T2715] device syzkaller0 entered promiscuous mode [ 63.181917][ T24] audit: type=1400 audit(1776884739.180:149): avc: denied { create } for pid=2773 comm="syz.4.717" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 63.691138][ T2794] : port 1(veth1) entered blocking state [ 63.696916][ T2794] : port 1(veth1) entered disabled state [ 63.721209][ T2794] device veth1 entered promiscuous mode [ 63.853398][ T2806] device sit0 entered promiscuous mode [ 64.921333][ T24] audit: type=1400 audit(1776884740.920:150): avc: denied { ioctl } for pid=2844 comm="syz.0.740" path="socket:[24424]" dev="sockfs" ino=24424 ioctlcmd=0x8914 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 66.446010][ T2940] device syzkaller0 entered promiscuous mode [ 66.778294][ T2969] device syzkaller0 entered promiscuous mode [ 67.336423][ T3004] device veth0_to_bridge left promiscuous mode [ 67.348191][ T3004] bridge0: port 3(veth0_to_bridge) entered disabled state [ 67.369998][ T3004] device bridge_slave_1 left promiscuous mode [ 67.400488][ T3004] bridge0: port 2(bridge_slave_1) entered disabled state [ 67.420674][ T3004] device bridge_slave_0 left promiscuous mode [ 67.432677][ T3004] bridge0: port 1(bridge_slave_0) entered disabled state [ 67.897121][ T3025] tun0: tun_chr_ioctl cmd 2147767520 [ 67.937698][ T3019] tun0: tun_chr_ioctl cmd 2147767506 [ 68.188498][ T3046] device syzkaller0 entered promiscuous mode [ 68.229772][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 69.427316][ T3138] device syzkaller0 entered promiscuous mode [ 70.379536][ T3173] device syzkaller0 entered promiscuous mode [ 72.276502][ T3246] device syzkaller0 entered promiscuous mode [ 73.225837][ T3313] device wg2 left promiscuous mode [ 73.376924][ T3307] device wg2 entered promiscuous mode [ 76.015741][ T3450] device wg2 entered promiscuous mode [ 76.937336][ T3528] net_ratelimit: 55 callbacks suppressed [ 76.937361][ T3528] sock: sock_set_timeout: `syz.0.945' (pid 3528) tries to set negative timeout [ 77.056683][ T3534] device syzkaller0 entered promiscuous mode [ 77.066319][ T3534] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 78.739740][ T3618] +: renamed from team_slave_1 [ 79.477703][ T3656] device syzkaller0 entered promiscuous mode [ 79.911128][ T3688] device sit0 left promiscuous mode [ 79.961341][ T3688] device sit0 entered promiscuous mode [ 80.131616][ T24] audit: type=1400 audit(1776884756.130:151): avc: denied { create } for pid=3699 comm="syz.0.994" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=dccp_socket permissive=1 [ 81.373904][ T3752] device syzkaller0 entered promiscuous mode [ 81.380785][ T713] syzkaller0: tun_net_xmit 48 [ 81.429275][ T3752] syzkaller0: tun_net_xmit 1280 [ 81.439125][ T3752] syzkaller0: create flow: hash 1769919088 index 1 [ 81.458533][ T3751] syzkaller0: delete flow: hash 1769919088 index 1 [ 82.090070][ T3798] bridge0: port 1(bridge_slave_0) entered blocking state [ 82.097693][ T3798] bridge0: port 1(bridge_slave_0) entered disabled state [ 82.107574][ T3798] device bridge_slave_0 entered promiscuous mode [ 82.117092][ T3798] bridge0: port 2(bridge_slave_1) entered blocking state [ 82.127080][ T3798] bridge0: port 2(bridge_slave_1) entered disabled state [ 82.135730][ T3798] device bridge_slave_1 entered promiscuous mode [ 82.153246][ T3812] device wg2 left promiscuous mode [ 82.203376][ T3812] device wg2 entered promiscuous mode [ 82.299828][ T3834] device syzkaller0 entered promiscuous mode [ 82.658883][ T405] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 82.666750][ T405] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 82.682316][ T405] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 82.690873][ T405] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 82.699472][ T24] audit: type=1400 audit(1776884758.700:152): avc: denied { create } for pid=3849 comm="syz.0.1041" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=caif_socket permissive=1 [ 82.719616][ T405] bridge0: port 1(bridge_slave_0) entered blocking state [ 82.726668][ T405] bridge0: port 1(bridge_slave_0) entered forwarding state [ 82.734679][ T405] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 82.743232][ T405] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 82.752011][ T405] bridge0: port 2(bridge_slave_1) entered blocking state [ 82.759097][ T405] bridge0: port 2(bridge_slave_1) entered forwarding state [ 82.766709][ T405] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 82.792303][ T405] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 82.800563][ T405] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 82.819444][ T405] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 82.832770][ T3798] device veth0_vlan entered promiscuous mode [ 82.846638][ T405] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 82.857238][ T405] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 82.865866][ T405] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 82.874969][ T405] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 82.884968][ T3798] device veth1_macvtap entered promiscuous mode [ 82.909422][ T405] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 82.919063][ T405] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 83.270182][ T3914] device syzkaller0 entered promiscuous mode [ 83.826915][ T303] device veth1 left promiscuous mode [ 83.835676][ T303] : port 1(veth1) entered disabled state [ 83.859864][ T303] device bridge_slave_1 left promiscuous mode [ 83.866479][ T303] bridge0: port 2(bridge_slave_1) entered disabled state [ 83.874715][ T303] device bridge_slave_0 left promiscuous mode [ 83.881330][ T303] bridge0: port 1(bridge_slave_0) entered disabled state [ 83.892156][ T303] device veth1_macvtap left promiscuous mode [ 83.898657][ T303] device veth0_vlan left promiscuous mode [ 84.281048][ T24] audit: type=1400 audit(1776884760.280:153): avc: denied { create } for pid=3969 comm="syz.4.1076" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=iucv_socket permissive=1 [ 84.664227][ T24] audit: type=1400 audit(1776884760.660:154): avc: denied { read } for pid=4014 comm="syz.0.1084" dev="nsfs" ino=4026532286 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 84.729523][ T24] audit: type=1400 audit(1776884760.690:155): avc: denied { open } for pid=4014 comm="syz.0.1084" path="net:[4026532286]" dev="nsfs" ino=4026532286 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 84.878711][ T24] audit: type=1400 audit(1776884760.690:156): avc: denied { create } for pid=4014 comm="syz.0.1084" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=irda_socket permissive=1 [ 86.208469][ T4104] device pim6reg1 entered promiscuous mode [ 86.394894][ T4111] device syzkaller0 entered promiscuous mode [ 86.429511][ T4103] PF_CAN: dropped non conform CAN skbuff: dev type 280, len 65487 [ 87.396499][ T4148] device wg2 entered promiscuous mode [ 88.419181][ T24] audit: type=1400 audit(1776884764.420:157): avc: denied { create } for pid=4211 comm="syz.2.1143" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1 [ 88.583331][ T4208] cgroup: fork rejected by pids controller in /syz1 [ 88.818094][ T4326] device wg2 left promiscuous mode [ 90.130976][ T4389] bridge0: port 1(bridge_slave_0) entered blocking state [ 90.148317][ T4389] bridge0: port 1(bridge_slave_0) entered disabled state [ 90.166959][ T4389] device bridge_slave_0 entered promiscuous mode [ 90.177270][ T4389] bridge0: port 2(bridge_slave_1) entered blocking state [ 90.185007][ T4389] bridge0: port 2(bridge_slave_1) entered disabled state [ 90.198980][ T4389] device bridge_slave_1 entered promiscuous mode [ 90.334617][ T4415] device syzkaller0 entered promiscuous mode [ 90.377968][ T4417] device syzkaller0 entered promiscuous mode [ 90.491160][ T4389] bridge0: port 2(bridge_slave_1) entered blocking state [ 90.498378][ T4389] bridge0: port 2(bridge_slave_1) entered forwarding state [ 90.505752][ T4389] bridge0: port 1(bridge_slave_0) entered blocking state [ 90.512969][ T4389] bridge0: port 1(bridge_slave_0) entered forwarding state [ 90.544350][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 90.553877][ T9] bridge0: port 1(bridge_slave_0) entered disabled state [ 90.562322][ T9] bridge0: port 2(bridge_slave_1) entered disabled state [ 90.594518][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 90.609176][ T9] bridge0: port 1(bridge_slave_0) entered blocking state [ 90.616380][ T9] bridge0: port 1(bridge_slave_0) entered forwarding state [ 90.625442][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 90.644987][ T9] bridge0: port 2(bridge_slave_1) entered blocking state [ 90.652129][ T9] bridge0: port 2(bridge_slave_1) entered forwarding state [ 90.661044][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 90.669519][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 90.685196][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 90.734576][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 90.746129][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 90.764897][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 90.790697][ T4389] device veth0_vlan entered promiscuous mode [ 90.842687][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 90.856097][ T4389] device veth1_macvtap entered promiscuous mode [ 90.887669][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 90.911234][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 90.962963][ T4439] @0Ù: renamed from bond_slave_1 [ 91.003828][ T4434] device syzkaller0 entered promiscuous mode [ 91.349583][ T303] device bridge_slave_1 left promiscuous mode [ 91.359754][ T303] bridge0: port 2(bridge_slave_1) entered disabled state [ 91.406340][ T303] device bridge_slave_0 left promiscuous mode [ 91.440235][ T303] bridge0: port 1(bridge_slave_0) entered disabled state [ 91.635173][ T4482] device syzkaller0 entered promiscuous mode [ 92.086690][ T4543] device syzkaller0 entered promiscuous mode [ 92.297302][ T4550] device syzkaller0 entered promiscuous mode [ 93.049210][ T4585] syzkaller0: tun_chr_ioctl cmd 2147767506 [ 93.457341][ T4609] bridge0: port 3(veth1_macvtap) entered blocking state [ 93.484757][ T4609] bridge0: port 3(veth1_macvtap) entered disabled state [ 96.250483][ T4760] device syzkaller0 entered promiscuous mode [ 96.282902][ T4758] device wg2 left promiscuous mode [ 96.389224][ T4758] device wg2 entered promiscuous mode [ 96.510885][ T4775] syzkaller0: default qdisc (pfifo_fast) fail, fallback to noqueue [ 96.597468][ T4775] device syzkaller0 entered promiscuous mode [ 96.779039][ T4792] device sit0 left promiscuous mode [ 97.211636][ T24] audit: type=1400 audit(1776884773.210:158): avc: denied { ioctl } for pid=4813 comm="syz.2.1277" path="pid:[4026532456]" dev="nsfs" ino=4026532456 ioctlcmd=0xb703 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 97.268252][ T4819] device syzkaller0 entered promiscuous mode [ 97.641351][ T4840] tap0: tun_chr_ioctl cmd 35108 [ 97.896363][ T4863] FAULT_INJECTION: forcing a failure. [ 97.896363][ T4863] name fail_usercopy, interval 1, probability 0, space 0, times 1 [ 97.931138][ T4863] CPU: 1 PID: 4863 Comm: syz.0.1290 Tainted: G W syzkaller #0 [ 97.940025][ T4863] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/18/2026 [ 97.950284][ T4863] Call Trace: [ 97.953679][ T4863] __dump_stack+0x21/0x24 [ 97.958070][ T4863] dump_stack_lvl+0x1a7/0x208 [ 97.962907][ T4863] ? show_regs_print_info+0x18/0x18 [ 97.968228][ T4863] dump_stack+0x15/0x1c [ 97.972416][ T4863] should_fail+0x3c1/0x510 [ 97.976942][ T4863] should_fail_usercopy+0x1a/0x20 [ 97.981982][ T4863] copy_page_from_iter+0x381/0x6c0 [ 97.987105][ T4863] pipe_write+0x912/0x18b0 [ 97.991638][ T4863] ? pipe_write+0x101/0x18b0 [ 97.996333][ T4863] ? pipe_read+0x1010/0x1010 [ 98.001062][ T4863] ? fsnotify_perm+0x66/0x4b0 [ 98.005944][ T4863] ? security_file_permission+0x83/0xa0 [ 98.011677][ T4863] ? iov_iter_init+0x3f/0x120 [ 98.016399][ T4863] vfs_write+0x758/0xdc0 [ 98.020677][ T4863] ? kernel_write+0x3c0/0x3c0 [ 98.025441][ T4863] ? __fget_files+0x2c4/0x320 [ 98.030286][ T4863] ? __fdget_pos+0x1f7/0x380 [ 98.034865][ T4863] ? ksys_write+0x71/0x250 [ 98.039270][ T4863] ksys_write+0x149/0x250 [ 98.043680][ T4863] ? __ia32_sys_read+0x90/0x90 [ 98.048440][ T4863] ? debug_smp_processor_id+0x17/0x20 [ 98.053894][ T4863] __x64_sys_write+0x7b/0x90 [ 98.058485][ T4863] do_syscall_64+0x31/0x40 [ 98.062919][ T4863] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 98.068812][ T4863] RIP: 0033:0x7fa581e19819 [ 98.073233][ T4863] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 98.092942][ T4863] RSP: 002b:00007fa580874028 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 98.101368][ T4863] RAX: ffffffffffffffda RBX: 00007fa582092fa0 RCX: 00007fa581e19819 [ 98.109351][ T4863] RDX: 00000000fffffdef RSI: 00002000000001c0 RDI: 0000000000000000 [ 98.117413][ T4863] RBP: 00007fa580874090 R08: 0000000000000000 R09: 0000000000000000 [ 98.125554][ T4863] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 98.133956][ T4863] R13: 00007fa582093038 R14: 00007fa582092fa0 R15: 00007ffffb5e2e88 [ 98.518376][ T4885] device veth0_vlan left promiscuous mode [ 98.536693][ T4885] device veth0_vlan entered promiscuous mode [ 98.793633][ T4909] FAULT_INJECTION: forcing a failure. [ 98.793633][ T4909] name fail_page_alloc, interval 1, probability 0, space 0, times 1 [ 98.827238][ T4909] CPU: 0 PID: 4909 Comm: syz.2.1304 Tainted: G W syzkaller #0 [ 98.836148][ T4909] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/18/2026 [ 98.846396][ T4909] Call Trace: [ 98.850169][ T4909] __dump_stack+0x21/0x24 [ 98.854526][ T4909] dump_stack_lvl+0x1a7/0x208 [ 98.859219][ T4909] ? show_regs_print_info+0x18/0x18 [ 98.864426][ T4909] ? do_kern_addr_fault+0x80/0x80 [ 98.869540][ T4909] dump_stack+0x15/0x1c [ 98.873783][ T4909] should_fail+0x3c1/0x510 [ 98.878201][ T4909] should_fail_alloc_page+0x4f/0x60 [ 98.883495][ T4909] __alloc_pages_nodemask+0x119/0x620 [ 98.888968][ T4909] ? gfp_pfmemalloc_allowed+0x130/0x130 [ 98.894609][ T4909] ? copy_user_enhanced_fast_string+0xe/0x40 [ 98.900781][ T4909] pipe_write+0x56e/0x18b0 [ 98.905202][ T4909] ? pipe_write+0x101/0x18b0 [ 98.909792][ T4909] ? pipe_read+0x1010/0x1010 [ 98.914382][ T4909] ? fsnotify_perm+0x66/0x4b0 [ 98.919062][ T4909] ? security_file_permission+0x83/0xa0 [ 98.924723][ T4909] ? iov_iter_init+0x3f/0x120 [ 98.929405][ T4909] vfs_write+0x758/0xdc0 [ 98.933655][ T4909] ? perf_trace_kmem_free+0x3f/0x110 [ 98.938943][ T4909] ? kernel_write+0x3c0/0x3c0 [ 98.943638][ T4909] ? __fget_files+0x2c4/0x320 [ 98.948414][ T4909] ? __fdget_pos+0x1f7/0x380 [ 98.953037][ T4909] ? ksys_write+0x71/0x250 [ 98.957468][ T4909] ksys_write+0x149/0x250 [ 98.961810][ T4909] ? __ia32_sys_read+0x90/0x90 [ 98.966675][ T4909] ? debug_smp_processor_id+0x17/0x20 [ 98.972055][ T4909] __x64_sys_write+0x7b/0x90 [ 98.976648][ T4909] do_syscall_64+0x31/0x40 [ 98.981072][ T4909] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 98.986971][ T4909] RIP: 0033:0x7f2559ee4819 [ 98.991496][ T4909] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 99.011105][ T4909] RSP: 002b:00007f255893f028 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 99.019527][ T4909] RAX: ffffffffffffffda RBX: 00007f255a15dfa0 RCX: 00007f2559ee4819 [ 99.027679][ T4909] RDX: 00000000fffffdef RSI: 00002000000001c0 RDI: 0000000000000000 [ 99.035739][ T4909] RBP: 00007f255893f090 R08: 0000000000000000 R09: 0000000000000000 [ 99.043710][ T4909] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 99.051767][ T4909] R13: 00007f255a15e038 R14: 00007f255a15dfa0 R15: 00007fffe2f0dde8 [ 99.380677][ T4931] -: renamed from syzkaller0 [ 99.502715][ T4940] device syzkaller0 entered promiscuous mode [ 99.831886][ T4951] FAULT_INJECTION: forcing a failure. [ 99.831886][ T4951] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 99.958766][ T4951] CPU: 0 PID: 4951 Comm: syz.2.1317 Tainted: G W syzkaller #0 [ 99.967649][ T4951] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/18/2026 [ 99.977801][ T4951] Call Trace: [ 99.981103][ T4951] __dump_stack+0x21/0x24 [ 99.985610][ T4951] dump_stack_lvl+0x1a7/0x208 [ 99.990481][ T4951] ? show_regs_print_info+0x18/0x18 [ 99.995684][ T4951] dump_stack+0x15/0x1c [ 99.999854][ T4951] should_fail+0x3c1/0x510 [ 100.004370][ T4951] should_fail_usercopy+0x1a/0x20 [ 100.009409][ T4951] copy_page_from_iter+0x381/0x6c0 [ 100.014527][ T4951] pipe_write+0x912/0x18b0 [ 100.019228][ T4951] ? pipe_write+0x101/0x18b0 [ 100.023823][ T4951] ? pipe_read+0x1010/0x1010 [ 100.028505][ T4951] ? fsnotify_perm+0x66/0x4b0 [ 100.033295][ T4951] ? security_file_permission+0x83/0xa0 [ 100.038843][ T4951] ? iov_iter_init+0x3f/0x120 [ 100.043523][ T4951] vfs_write+0x758/0xdc0 [ 100.047858][ T4951] ? kernel_write+0x3c0/0x3c0 [ 100.052535][ T4951] ? __fget_files+0x2c4/0x320 [ 100.057220][ T4951] ? __fdget_pos+0x1f7/0x380 [ 100.061910][ T4951] ? ksys_write+0x71/0x250 [ 100.066429][ T4951] ksys_write+0x149/0x250 [ 100.070786][ T4951] ? __ia32_sys_read+0x90/0x90 [ 100.075553][ T4951] ? debug_smp_processor_id+0x17/0x20 [ 100.080939][ T4951] __x64_sys_write+0x7b/0x90 [ 100.085639][ T4951] do_syscall_64+0x31/0x40 [ 100.090069][ T4951] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 100.095969][ T4951] RIP: 0033:0x7f2559ee4819 [ 100.100390][ T4951] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 100.120003][ T4951] RSP: 002b:00007f255893f028 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 100.128424][ T4951] RAX: ffffffffffffffda RBX: 00007f255a15dfa0 RCX: 00007f2559ee4819 [ 100.136417][ T4951] RDX: 00000000fffffdef RSI: 00002000000001c0 RDI: 0000000000000000 [ 100.144400][ T4951] RBP: 00007f255893f090 R08: 0000000000000000 R09: 0000000000000000 [ 100.152378][ T4951] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 100.160451][ T4951] R13: 00007f255a15e038 R14: 00007f255a15dfa0 R15: 00007fffe2f0dde8 [ 100.700524][ T4971] device syzkaller0 entered promiscuous mode [ 101.126228][ T5000] FAULT_INJECTION: forcing a failure. [ 101.126228][ T5000] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 101.156753][ T5000] CPU: 0 PID: 5000 Comm: syz.0.1331 Tainted: G W syzkaller #0 [ 101.165899][ T5000] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/18/2026 [ 101.176159][ T5000] Call Trace: [ 101.179456][ T5000] __dump_stack+0x21/0x24 [ 101.183969][ T5000] dump_stack_lvl+0x1a7/0x208 [ 101.188660][ T5000] ? show_regs_print_info+0x18/0x18 [ 101.193872][ T5000] ? do_kern_addr_fault+0x80/0x80 [ 101.198916][ T5000] dump_stack+0x15/0x1c [ 101.203082][ T5000] should_fail+0x3c1/0x510 [ 101.207507][ T5000] should_fail_alloc_page+0x4f/0x60 [ 101.212706][ T5000] __alloc_pages_nodemask+0x119/0x620 [ 101.218183][ T5000] ? gfp_pfmemalloc_allowed+0x130/0x130 [ 101.223840][ T5000] ? copy_user_enhanced_fast_string+0xe/0x40 [ 101.229822][ T5000] pipe_write+0x56e/0x18b0 [ 101.234238][ T5000] ? pipe_write+0x101/0x18b0 [ 101.238830][ T5000] ? pipe_read+0x1010/0x1010 [ 101.243597][ T5000] ? fsnotify_perm+0x66/0x4b0 [ 101.248367][ T5000] ? security_file_permission+0x83/0xa0 [ 101.253911][ T5000] ? iov_iter_init+0x3f/0x120 [ 101.258594][ T5000] vfs_write+0x758/0xdc0 [ 101.262889][ T5000] ? kernel_write+0x3c0/0x3c0 [ 101.267590][ T5000] ? __fget_files+0x2c4/0x320 [ 101.272271][ T5000] ? __fdget_pos+0x1f7/0x380 [ 101.276853][ T5000] ? ksys_write+0x71/0x250 [ 101.281361][ T5000] ksys_write+0x149/0x250 [ 101.286149][ T5000] ? __ia32_sys_read+0x90/0x90 [ 101.291039][ T5000] ? debug_smp_processor_id+0x17/0x20 [ 101.296546][ T5000] __x64_sys_write+0x7b/0x90 [ 101.301151][ T5000] do_syscall_64+0x31/0x40 [ 101.305564][ T5000] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 101.311551][ T5000] RIP: 0033:0x7fa581e19819 [ 101.315974][ T5000] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 101.337005][ T5000] RSP: 002b:00007fa580874028 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 101.345724][ T5000] RAX: ffffffffffffffda RBX: 00007fa582092fa0 RCX: 00007fa581e19819 [ 101.354223][ T5000] RDX: 00000000fffffdef RSI: 00002000000001c0 RDI: 0000000000000000 [ 101.362369][ T5000] RBP: 00007fa580874090 R08: 0000000000000000 R09: 0000000000000000 [ 101.370597][ T5000] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 101.378673][ T5000] R13: 00007fa582093038 R14: 00007fa582092fa0 R15: 00007ffffb5e2e88 [ 101.818721][ T5027] device wg2 left promiscuous mode [ 101.948478][ T5032] device veth1_macvtap left promiscuous mode [ 102.004019][ T5032] device veth1_macvtap entered promiscuous mode [ 102.014844][ T5032] device macsec0 entered promiscuous mode [ 103.742876][ T5119] syz.2.1367[5119] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 103.742984][ T5119] syz.2.1367[5119] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 105.891878][ T5215] device syzkaller0 entered promiscuous mode [ 106.886629][ T5258] device syzkaller0 entered promiscuous mode [ 106.901854][ T297] syzkaller0: tun_net_xmit 48 [ 108.384656][ T5358] device veth0_vlan left promiscuous mode [ 108.451429][ T5358] device veth0_vlan entered promiscuous mode [ 109.573765][ T5422] device sit0 entered promiscuous mode [ 109.737273][ T5429] device syzkaller0 entered promiscuous mode [ 110.689534][ T5491] FAULT_INJECTION: forcing a failure. [ 110.689534][ T5491] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 110.750582][ T5491] CPU: 0 PID: 5491 Comm: syz.1.1475 Tainted: G W syzkaller #0 [ 110.759404][ T5491] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/18/2026 [ 110.769466][ T5491] Call Trace: [ 110.772770][ T5491] __dump_stack+0x21/0x24 [ 110.777222][ T5491] dump_stack_lvl+0x1a7/0x208 [ 110.781902][ T5491] ? show_regs_print_info+0x18/0x18 [ 110.787122][ T5491] ? do_kern_addr_fault+0x80/0x80 [ 110.792188][ T5491] dump_stack+0x15/0x1c [ 110.796354][ T5491] should_fail+0x3c1/0x510 [ 110.800955][ T5491] should_fail_alloc_page+0x4f/0x60 [ 110.806282][ T5491] __alloc_pages_nodemask+0x119/0x620 [ 110.811651][ T5491] ? gfp_pfmemalloc_allowed+0x130/0x130 [ 110.817210][ T5491] ? copy_user_enhanced_fast_string+0xe/0x40 [ 110.823293][ T5491] pipe_write+0x56e/0x18b0 [ 110.827901][ T5491] ? pipe_write+0x101/0x18b0 [ 110.832680][ T5491] ? pipe_read+0x1010/0x1010 [ 110.837547][ T5491] ? fsnotify_perm+0x66/0x4b0 [ 110.842236][ T5491] ? security_file_permission+0x83/0xa0 [ 110.847909][ T5491] ? iov_iter_init+0x3f/0x120 [ 110.852952][ T5491] vfs_write+0x758/0xdc0 [ 110.857401][ T5491] ? kernel_write+0x3c0/0x3c0 [ 110.862194][ T5491] ? __fget_files+0x2c4/0x320 [ 110.866875][ T5491] ? __fdget_pos+0x1f7/0x380 [ 110.871480][ T5491] ? ksys_write+0x71/0x250 [ 110.876007][ T5491] ksys_write+0x149/0x250 [ 110.880575][ T5491] ? __ia32_sys_read+0x90/0x90 [ 110.885344][ T5491] ? debug_smp_processor_id+0x17/0x20 [ 110.890726][ T5491] __x64_sys_write+0x7b/0x90 [ 110.895319][ T5491] do_syscall_64+0x31/0x40 [ 110.899744][ T5491] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 110.905821][ T5491] RIP: 0033:0x7f3de1827819 [ 110.910715][ T5491] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 110.930588][ T5491] RSP: 002b:00007f3de0282028 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 110.939097][ T5491] RAX: ffffffffffffffda RBX: 00007f3de1aa0fa0 RCX: 00007f3de1827819 [ 110.947070][ T5491] RDX: 00000000fffffdef RSI: 00002000000001c0 RDI: 0000000000000000 [ 110.955313][ T5491] RBP: 00007f3de0282090 R08: 0000000000000000 R09: 0000000000000000 [ 110.963912][ T5491] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 110.971998][ T5491] R13: 00007f3de1aa1038 R14: 00007f3de1aa0fa0 R15: 00007fffbe6ebb08 [ 112.190748][ T5559] device syzkaller0 entered promiscuous mode [ 112.451197][ T5568] device sit0 entered promiscuous mode [ 113.029318][ T5594] device veth0_vlan left promiscuous mode [ 113.037038][ T5594] device veth0_vlan entered promiscuous mode [ 113.226810][ T5604] bridge0: port 2(bridge_slave_1) entered disabled state [ 113.234058][ T5604] bridge0: port 1(bridge_slave_0) entered disabled state [ 113.446497][ T5618] device syzkaller0 entered promiscuous mode [ 113.585033][ T5626] device syzkaller0 entered promiscuous mode [ 113.807854][ T5635] device aaaaaaaaaaaaaaa entered promiscuous mode [ 114.529213][ T5661] device syzkaller0 entered promiscuous mode [ 115.193888][ T5719] FAULT_INJECTION: forcing a failure. [ 115.193888][ T5719] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 115.289612][ T5719] CPU: 1 PID: 5719 Comm: syz.4.1546 Tainted: G W syzkaller #0 [ 115.298416][ T5719] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/18/2026 [ 115.309031][ T5719] Call Trace: [ 115.312471][ T5719] __dump_stack+0x21/0x24 [ 115.316906][ T5719] dump_stack_lvl+0x1a7/0x208 [ 115.321686][ T5719] ? show_regs_print_info+0x18/0x18 [ 115.326895][ T5719] ? do_kern_addr_fault+0x80/0x80 [ 115.332021][ T5719] dump_stack+0x15/0x1c [ 115.336273][ T5719] should_fail+0x3c1/0x510 [ 115.340788][ T5719] should_fail_alloc_page+0x4f/0x60 [ 115.346076][ T5719] __alloc_pages_nodemask+0x119/0x620 [ 115.351559][ T5719] ? gfp_pfmemalloc_allowed+0x130/0x130 [ 115.357108][ T5719] ? copy_user_enhanced_fast_string+0xe/0x40 [ 115.363106][ T5719] pipe_write+0x56e/0x18b0 [ 115.367540][ T5719] ? pipe_write+0x101/0x18b0 [ 115.372241][ T5719] ? pipe_read+0x1010/0x1010 [ 115.376853][ T5719] ? fsnotify_perm+0x66/0x4b0 [ 115.381553][ T5719] ? security_file_permission+0x83/0xa0 [ 115.387198][ T5719] ? iov_iter_init+0x3f/0x120 [ 115.391921][ T5719] vfs_write+0x758/0xdc0 [ 115.396324][ T5719] ? kernel_write+0x3c0/0x3c0 [ 115.401030][ T5719] ? __fget_files+0x2c4/0x320 [ 115.405736][ T5719] ? __fdget_pos+0x1f7/0x380 [ 115.410345][ T5719] ? ksys_write+0x71/0x250 [ 115.414981][ T5719] ksys_write+0x149/0x250 [ 115.419547][ T5719] ? __ia32_sys_read+0x90/0x90 [ 115.424409][ T5719] ? debug_smp_processor_id+0x17/0x20 [ 115.429899][ T5719] __x64_sys_write+0x7b/0x90 [ 115.434516][ T5719] do_syscall_64+0x31/0x40 [ 115.438966][ T5719] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 115.445398][ T5719] RIP: 0033:0x7f8360ab8819 [ 115.449926][ T5719] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 115.469732][ T5719] RSP: 002b:00007f835f513028 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 115.478186][ T5719] RAX: ffffffffffffffda RBX: 00007f8360d31fa0 RCX: 00007f8360ab8819 [ 115.486258][ T5719] RDX: 00000000fffffdef RSI: 00002000000001c0 RDI: 0000000000000000 [ 115.494248][ T5719] RBP: 00007f835f513090 R08: 0000000000000000 R09: 0000000000000000 [ 115.502234][ T5719] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 115.510339][ T5719] R13: 00007f8360d32038 R14: 00007f8360d31fa0 R15: 00007ffef3a386b8 [ 115.609216][ T5736] device wg2 entered promiscuous mode [ 115.901889][ T5778] FAULT_INJECTION: forcing a failure. [ 115.901889][ T5778] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 115.937999][ T5778] CPU: 1 PID: 5778 Comm: syz.4.1560 Tainted: G W syzkaller #0 [ 115.946934][ T5778] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/18/2026 [ 115.957447][ T5778] Call Trace: [ 115.960880][ T5778] __dump_stack+0x21/0x24 [ 115.965225][ T5778] dump_stack_lvl+0x1a7/0x208 [ 115.969921][ T5778] ? show_regs_print_info+0x18/0x18 [ 115.975228][ T5778] dump_stack+0x15/0x1c [ 115.979451][ T5778] should_fail+0x3c1/0x510 [ 115.984073][ T5778] should_fail_usercopy+0x1a/0x20 [ 115.989113][ T5778] copy_page_from_iter+0x381/0x6c0 [ 115.994635][ T5778] pipe_write+0x912/0x18b0 [ 115.999254][ T5778] ? pipe_write+0x101/0x18b0 [ 116.003850][ T5778] ? pipe_read+0x1010/0x1010 [ 116.008529][ T5778] ? fsnotify_perm+0x66/0x4b0 [ 116.013204][ T5778] ? security_file_permission+0x83/0xa0 [ 116.018841][ T5778] ? iov_iter_init+0x3f/0x120 [ 116.023540][ T5778] vfs_write+0x758/0xdc0 [ 116.027783][ T5778] ? kernel_write+0x3c0/0x3c0 [ 116.032473][ T5778] ? sysvec_call_function_single+0xc8/0xd0 [ 116.038281][ T5778] ? __fget_files+0x2c4/0x320 [ 116.042954][ T5778] ? __fdget_pos+0x1f7/0x380 [ 116.047533][ T5778] ? ksys_write+0x71/0x250 [ 116.052048][ T5778] ksys_write+0x149/0x250 [ 116.056463][ T5778] ? __ia32_sys_read+0x90/0x90 [ 116.061311][ T5778] ? debug_smp_processor_id+0x17/0x20 [ 116.066764][ T5778] __x64_sys_write+0x7b/0x90 [ 116.071366][ T5778] do_syscall_64+0x31/0x40 [ 116.076024][ T5778] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 116.082065][ T5778] RIP: 0033:0x7f8360ab8819 [ 116.086481][ T5778] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 116.107241][ T5778] RSP: 002b:00007f835f513028 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 116.115783][ T5778] RAX: ffffffffffffffda RBX: 00007f8360d31fa0 RCX: 00007f8360ab8819 [ 116.123761][ T5778] RDX: 00000000fffffdef RSI: 00002000000001c0 RDI: 0000000000000000 [ 116.131906][ T5778] RBP: 00007f835f513090 R08: 0000000000000000 R09: 0000000000000000 [ 116.139872][ T5778] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 116.147870][ T5778] R13: 00007f8360d32038 R14: 00007f8360d31fa0 R15: 00007ffef3a386b8 [ 117.069663][ T5828] FAULT_INJECTION: forcing a failure. [ 117.069663][ T5828] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 117.102843][ T5828] CPU: 1 PID: 5828 Comm: syz.2.1575 Tainted: G W syzkaller #0 [ 117.111654][ T5828] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/18/2026 [ 117.121991][ T5828] Call Trace: [ 117.125294][ T5828] __dump_stack+0x21/0x24 [ 117.129617][ T5828] dump_stack_lvl+0x1a7/0x208 [ 117.134289][ T5828] ? show_regs_print_info+0x18/0x18 [ 117.139567][ T5828] ? do_kern_addr_fault+0x80/0x80 [ 117.144681][ T5828] dump_stack+0x15/0x1c [ 117.148828][ T5828] should_fail+0x3c1/0x510 [ 117.153240][ T5828] should_fail_alloc_page+0x4f/0x60 [ 117.158652][ T5828] __alloc_pages_nodemask+0x119/0x620 [ 117.164022][ T5828] ? gfp_pfmemalloc_allowed+0x130/0x130 [ 117.169675][ T5828] ? copy_user_enhanced_fast_string+0xe/0x40 [ 117.175646][ T5828] pipe_write+0x56e/0x18b0 [ 117.180060][ T5828] ? pipe_write+0x101/0x18b0 [ 117.184649][ T5828] ? pipe_read+0x1010/0x1010 [ 117.189517][ T5828] ? fsnotify_perm+0x66/0x4b0 [ 117.194229][ T5828] ? security_file_permission+0x83/0xa0 [ 117.199768][ T5828] ? iov_iter_init+0x3f/0x120 [ 117.204438][ T5828] vfs_write+0x758/0xdc0 [ 117.208697][ T5828] ? kernel_write+0x3c0/0x3c0 [ 117.213364][ T5828] ? __fget_files+0x2c4/0x320 [ 117.218142][ T5828] ? __fdget_pos+0x1f7/0x380 [ 117.222898][ T5828] ? ksys_write+0x71/0x250 [ 117.227302][ T5828] ksys_write+0x149/0x250 [ 117.231622][ T5828] ? __ia32_sys_read+0x90/0x90 [ 117.236473][ T5828] ? debug_smp_processor_id+0x17/0x20 [ 117.241838][ T5828] __x64_sys_write+0x7b/0x90 [ 117.246416][ T5828] do_syscall_64+0x31/0x40 [ 117.250828][ T5828] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 117.256710][ T5828] RIP: 0033:0x7f2559ee4819 [ 117.261139][ T5828] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 117.280911][ T5828] RSP: 002b:00007f255893f028 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 117.289323][ T5828] RAX: ffffffffffffffda RBX: 00007f255a15dfa0 RCX: 00007f2559ee4819 [ 117.297371][ T5828] RDX: 00000000fffffdef RSI: 00002000000001c0 RDI: 0000000000000000 [ 117.305421][ T5828] RBP: 00007f255893f090 R08: 0000000000000000 R09: 0000000000000000 [ 117.313405][ T5828] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 117.321383][ T5828] R13: 00007f255a15e038 R14: 00007f255a15dfa0 R15: 00007fffe2f0dde8 [ 117.345784][ T5838] device sit0 left promiscuous mode [ 117.391867][ T5835] device veth0_vlan left promiscuous mode [ 117.412969][ T5835] device veth0_vlan entered promiscuous mode [ 117.449005][ T303] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 117.464458][ T303] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 117.498846][ T303] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 117.538127][ T5845] device syzkaller0 entered promiscuous mode [ 117.558107][ T5838] device sit0 entered promiscuous mode [ 117.735990][ T5862] device veth1_macvtap left promiscuous mode [ 118.355010][ T5900] tun0: tun_chr_ioctl cmd 2148553947 [ 118.525159][ T5919] device veth1_macvtap left promiscuous mode [ 118.549604][ T5919] device macsec0 left promiscuous mode [ 118.577459][ T5920] device veth1_macvtap entered promiscuous mode [ 118.618919][ T5920] device macsec0 entered promiscuous mode [ 119.181722][ T5955] device syzkaller0 entered promiscuous mode [ 119.509800][ T24] audit: type=1400 audit(1776884795.500:159): avc: denied { create } for pid=5969 comm="syz.1.1616" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=isdn_socket permissive=1 [ 119.552232][ T5978] FAULT_INJECTION: forcing a failure. [ 119.552232][ T5978] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 119.572532][ T5978] CPU: 1 PID: 5978 Comm: syz.1.1619 Tainted: G W syzkaller #0 [ 119.581347][ T5978] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/18/2026 [ 119.591688][ T5978] Call Trace: [ 119.595004][ T5978] __dump_stack+0x21/0x24 [ 119.599355][ T5978] dump_stack_lvl+0x1a7/0x208 [ 119.604138][ T5978] ? show_regs_print_info+0x18/0x18 [ 119.609348][ T5978] ? do_kern_addr_fault+0x80/0x80 [ 119.614502][ T5978] dump_stack+0x15/0x1c [ 119.618656][ T5978] should_fail+0x3c1/0x510 [ 119.623446][ T5978] should_fail_alloc_page+0x4f/0x60 [ 119.628636][ T5978] __alloc_pages_nodemask+0x119/0x620 [ 119.634009][ T5978] ? gfp_pfmemalloc_allowed+0x130/0x130 [ 119.639924][ T5978] ? copy_user_enhanced_fast_string+0xe/0x40 [ 119.645995][ T5978] pipe_write+0x56e/0x18b0 [ 119.650591][ T5978] ? pipe_write+0x101/0x18b0 [ 119.655178][ T5978] ? pipe_read+0x1010/0x1010 [ 119.659777][ T5978] ? fsnotify_perm+0x66/0x4b0 [ 119.664547][ T5978] ? security_file_permission+0x83/0xa0 [ 119.670193][ T5978] ? iov_iter_init+0x3f/0x120 [ 119.674876][ T5978] vfs_write+0x758/0xdc0 [ 119.679116][ T5978] ? kernel_write+0x3c0/0x3c0 [ 119.683870][ T5978] ? __fget_files+0x2c4/0x320 [ 119.688546][ T5978] ? __fdget_pos+0x1f7/0x380 [ 119.693221][ T5978] ? ksys_write+0x71/0x250 [ 119.697626][ T5978] ksys_write+0x149/0x250 [ 119.701956][ T5978] ? __ia32_sys_read+0x90/0x90 [ 119.706725][ T5978] ? debug_smp_processor_id+0x17/0x20 [ 119.712290][ T5978] __x64_sys_write+0x7b/0x90 [ 119.716977][ T5978] do_syscall_64+0x31/0x40 [ 119.721388][ T5978] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 119.727360][ T5978] RIP: 0033:0x7f3de1827819 [ 119.732202][ T5978] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 119.752468][ T5978] RSP: 002b:00007f3de0282028 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 119.760877][ T5978] RAX: ffffffffffffffda RBX: 00007f3de1aa0fa0 RCX: 00007f3de1827819 [ 119.768857][ T5978] RDX: 00000000fffffdef RSI: 00002000000001c0 RDI: 0000000000000000 [ 119.776822][ T5978] RBP: 00007f3de0282090 R08: 0000000000000000 R09: 0000000000000000 [ 119.784977][ T5978] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 119.793290][ T5978] R13: 00007f3de1aa1038 R14: 00007f3de1aa0fa0 R15: 00007fffbe6ebb08 [ 120.726666][ T6039] FAULT_INJECTION: forcing a failure. [ 120.726666][ T6039] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 120.748492][ T6039] CPU: 0 PID: 6039 Comm: syz.4.1635 Tainted: G W syzkaller #0 [ 120.757291][ T6039] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/18/2026 [ 120.767353][ T6039] Call Trace: [ 120.770667][ T6039] __dump_stack+0x21/0x24 [ 120.774997][ T6039] dump_stack_lvl+0x1a7/0x208 [ 120.779693][ T6039] ? show_regs_print_info+0x18/0x18 [ 120.784910][ T6039] dump_stack+0x15/0x1c [ 120.789157][ T6039] should_fail+0x3c1/0x510 [ 120.793797][ T6039] should_fail_usercopy+0x1a/0x20 [ 120.799036][ T6039] copy_page_from_iter+0x381/0x6c0 [ 120.804164][ T6039] pipe_write+0x912/0x18b0 [ 120.809045][ T6039] ? pipe_write+0x101/0x18b0 [ 120.813638][ T6039] ? pipe_read+0x1010/0x1010 [ 120.818313][ T6039] ? fsnotify_perm+0x66/0x4b0 [ 120.823359][ T6039] ? security_file_permission+0x83/0xa0 [ 120.828989][ T6039] ? iov_iter_init+0x3f/0x120 [ 120.833658][ T6039] vfs_write+0x758/0xdc0 [ 120.837892][ T6039] ? kernel_write+0x3c0/0x3c0 [ 120.842641][ T6039] ? __fget_files+0x2c4/0x320 [ 120.847311][ T6039] ? __fdget_pos+0x1f7/0x380 [ 120.851918][ T6039] ? ksys_write+0x71/0x250 [ 120.856425][ T6039] ksys_write+0x149/0x250 [ 120.860881][ T6039] ? __ia32_sys_read+0x90/0x90 [ 120.865842][ T6039] ? debug_smp_processor_id+0x17/0x20 [ 120.871255][ T6039] __x64_sys_write+0x7b/0x90 [ 120.876026][ T6039] do_syscall_64+0x31/0x40 [ 120.880523][ T6039] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 120.886414][ T6039] RIP: 0033:0x7f8360ab8819 [ 120.891044][ T6039] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 120.912379][ T6039] RSP: 002b:00007f835f513028 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 120.920788][ T6039] RAX: ffffffffffffffda RBX: 00007f8360d31fa0 RCX: 00007f8360ab8819 [ 120.929256][ T6039] RDX: 00000000fffffdef RSI: 00002000000001c0 RDI: 0000000000000000 [ 120.937260][ T6039] RBP: 00007f835f513090 R08: 0000000000000000 R09: 0000000000000000 [ 120.945496][ T6039] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 120.953832][ T6039] R13: 00007f8360d32038 R14: 00007f8360d31fa0 R15: 00007ffef3a386b8 [ 121.116163][ T6055] device syzkaller0 entered promiscuous mode [ 121.211034][ T6070] FAULT_INJECTION: forcing a failure. [ 121.211034][ T6070] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 121.249187][ T6070] CPU: 1 PID: 6070 Comm: syz.4.1646 Tainted: G W syzkaller #0 [ 121.258793][ T6070] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/18/2026 [ 121.269044][ T6070] Call Trace: [ 121.272363][ T6070] __dump_stack+0x21/0x24 [ 121.276723][ T6070] dump_stack_lvl+0x1a7/0x208 [ 121.281435][ T6070] ? show_regs_print_info+0x18/0x18 [ 121.286747][ T6070] ? do_kern_addr_fault+0x80/0x80 [ 121.291800][ T6070] dump_stack+0x15/0x1c [ 121.296098][ T6070] should_fail+0x3c1/0x510 [ 121.300736][ T6070] should_fail_alloc_page+0x4f/0x60 [ 121.305958][ T6070] __alloc_pages_nodemask+0x119/0x620 [ 121.311364][ T6070] ? gfp_pfmemalloc_allowed+0x130/0x130 [ 121.317169][ T6070] ? copy_user_enhanced_fast_string+0xe/0x40 [ 121.323160][ T6070] pipe_write+0x56e/0x18b0 [ 121.327669][ T6070] ? pipe_write+0x101/0x18b0 [ 121.332436][ T6070] ? pipe_read+0x1010/0x1010 [ 121.337035][ T6070] ? fsnotify_perm+0x66/0x4b0 [ 121.341789][ T6070] ? security_file_permission+0x83/0xa0 [ 121.347331][ T6070] ? iov_iter_init+0x3f/0x120 [ 121.352010][ T6070] vfs_write+0x758/0xdc0 [ 121.356261][ T6070] ? kernel_write+0x3c0/0x3c0 [ 121.361115][ T6070] ? __fget_files+0x2c4/0x320 [ 121.365868][ T6070] ? __fdget_pos+0x1f7/0x380 [ 121.370448][ T6070] ? ksys_write+0x71/0x250 [ 121.374855][ T6070] ksys_write+0x149/0x250 [ 121.379175][ T6070] ? __ia32_sys_read+0x90/0x90 [ 121.383939][ T6070] ? debug_smp_processor_id+0x17/0x20 [ 121.389497][ T6070] __x64_sys_write+0x7b/0x90 [ 121.394108][ T6070] do_syscall_64+0x31/0x40 [ 121.398536][ T6070] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 121.404591][ T6070] RIP: 0033:0x7f8360ab8819 [ 121.409001][ T6070] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 121.428714][ T6070] RSP: 002b:00007f835f513028 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 121.437135][ T6070] RAX: ffffffffffffffda RBX: 00007f8360d31fa0 RCX: 00007f8360ab8819 [ 121.445184][ T6070] RDX: 00000000fffffdef RSI: 00002000000001c0 RDI: 0000000000000000 [ 121.453148][ T6070] RBP: 00007f835f513090 R08: 0000000000000000 R09: 0000000000000000 [ 121.461205][ T6070] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 121.469346][ T6070] R13: 00007f8360d32038 R14: 00007f8360d31fa0 R15: 00007ffef3a386b8 [ 121.589043][ T6088] device wg2 entered promiscuous mode [ 122.796629][ T6170] device syzkaller0 entered promiscuous mode [ 124.012160][ T24] audit: type=1400 audit(1776884800.010:160): avc: denied { create } for pid=6253 comm="syz.3.1700" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_dnrt_socket permissive=1 [ 124.250912][ T24] audit: type=1400 audit(1776884800.250:161): avc: denied { create } for pid=6263 comm="syz.2.1702" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 125.054310][ T6298] device veth1_macvtap entered promiscuous mode [ 125.061565][ T6298] device macsec0 entered promiscuous mode [ 125.088196][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 125.129324][ T6304] device veth1_macvtap left promiscuous mode [ 126.400863][ T6375] IPv6: : Disabled Multicast RS [ 127.881191][ T24] audit: type=1400 audit(1776884803.880:162): avc: denied { create } for pid=6445 comm="syz.3.1757" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_connector_socket permissive=1 [ 128.597638][ T6475] device syzkaller0 entered promiscuous mode [ 128.746930][ T6486] FAULT_INJECTION: forcing a failure. [ 128.746930][ T6486] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 128.835552][ T6494] tap0: tun_chr_ioctl cmd 1074025677 [ 128.855760][ T6494] tap0: linktype set to 769 [ 128.898006][ T6486] CPU: 1 PID: 6486 Comm: syz.3.1768 Tainted: G W syzkaller #0 [ 128.906813][ T6486] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/18/2026 [ 128.916988][ T6486] Call Trace: [ 128.920291][ T6486] __dump_stack+0x21/0x24 [ 128.924629][ T6486] dump_stack_lvl+0x1a7/0x208 [ 128.929319][ T6486] ? show_regs_print_info+0x18/0x18 [ 128.934623][ T6486] ? do_kern_addr_fault+0x80/0x80 [ 128.939660][ T6486] ? __kasan_check_write+0x14/0x20 [ 128.944885][ T6486] dump_stack+0x15/0x1c [ 128.949059][ T6486] should_fail+0x3c1/0x510 [ 128.953668][ T6486] should_fail_alloc_page+0x4f/0x60 [ 128.958891][ T6486] __alloc_pages_nodemask+0x119/0x620 [ 128.964282][ T6486] ? gfp_pfmemalloc_allowed+0x130/0x130 [ 128.970025][ T6486] ? copy_user_enhanced_fast_string+0xe/0x40 [ 128.976018][ T6486] pipe_write+0x56e/0x18b0 [ 128.980449][ T6486] ? pipe_write+0xe01/0x18b0 [ 128.985043][ T6486] ? pipe_write+0xe01/0x18b0 [ 128.989642][ T6486] ? pipe_read+0x1010/0x1010 [ 128.994248][ T6486] ? fsnotify_perm+0x66/0x4b0 [ 128.999031][ T6486] ? security_file_permission+0x83/0xa0 [ 129.004789][ T6486] ? iov_iter_init+0x3f/0x120 [ 129.009741][ T6486] vfs_write+0x758/0xdc0 [ 129.014092][ T6486] ? kernel_write+0x3c0/0x3c0 [ 129.018813][ T6486] ? __fget_files+0x2c4/0x320 [ 129.023727][ T6486] ? __fdget_pos+0x1f7/0x380 [ 129.028597][ T6486] ? ksys_write+0x71/0x250 [ 129.033024][ T6486] ksys_write+0x149/0x250 [ 129.037357][ T6486] ? __ia32_sys_read+0x90/0x90 [ 129.042230][ T6486] ? debug_smp_processor_id+0x17/0x20 [ 129.047611][ T6486] __x64_sys_write+0x7b/0x90 [ 129.052221][ T6486] do_syscall_64+0x31/0x40 [ 129.056726][ T6486] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 129.062714][ T6486] RIP: 0033:0x7f0fdcd09819 [ 129.067330][ T6486] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 129.087024][ T6486] RSP: 002b:00007f0fdb764028 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 129.095553][ T6486] RAX: ffffffffffffffda RBX: 00007f0fdcf82fa0 RCX: 00007f0fdcd09819 [ 129.103530][ T6486] RDX: 00000000fffffdef RSI: 00002000000001c0 RDI: 0000000000000000 [ 129.111508][ T6486] RBP: 00007f0fdb764090 R08: 0000000000000000 R09: 0000000000000000 [ 129.119477][ T6486] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 129.127448][ T6486] R13: 00007f0fdcf83038 R14: 00007f0fdcf82fa0 R15: 00007ffd77e79b68 [ 129.387502][ T6501] device syzkaller0 entered promiscuous mode [ 129.955871][ T6536] FAULT_INJECTION: forcing a failure. [ 129.955871][ T6536] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 130.025246][ T6536] CPU: 0 PID: 6536 Comm: syz.0.1781 Tainted: G W syzkaller #0 [ 130.034153][ T6536] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/18/2026 [ 130.044407][ T6536] Call Trace: [ 130.047720][ T6536] __dump_stack+0x21/0x24 [ 130.052154][ T6536] dump_stack_lvl+0x1a7/0x208 [ 130.057255][ T6536] ? show_regs_print_info+0x18/0x18 [ 130.062473][ T6536] dump_stack+0x15/0x1c [ 130.066649][ T6536] should_fail+0x3c1/0x510 [ 130.071079][ T6536] should_fail_usercopy+0x1a/0x20 [ 130.076123][ T6536] copy_page_from_iter+0x381/0x6c0 [ 130.081297][ T6536] pipe_write+0x912/0x18b0 [ 130.085843][ T6536] ? pipe_write+0xe01/0x18b0 [ 130.090472][ T6536] ? pipe_write+0xe00/0x18b0 [ 130.095085][ T6536] ? pipe_read+0x1010/0x1010 [ 130.100030][ T6536] ? io_schedule+0xe0/0xe0 [ 130.104497][ T6536] ? security_file_permission+0x83/0xa0 [ 130.110351][ T6536] ? iov_iter_init+0x3f/0x120 [ 130.115023][ T6536] vfs_write+0x758/0xdc0 [ 130.119263][ T6536] ? kernel_write+0x3c0/0x3c0 [ 130.124040][ T6536] ? __fget_files+0x2c4/0x320 [ 130.128720][ T6536] ? __fdget_pos+0x1f7/0x380 [ 130.133302][ T6536] ? ksys_write+0x71/0x250 [ 130.137736][ T6536] ksys_write+0x149/0x250 [ 130.142324][ T6536] ? __ia32_sys_read+0x90/0x90 [ 130.147184][ T6536] ? debug_smp_processor_id+0x17/0x20 [ 130.152819][ T6536] __x64_sys_write+0x7b/0x90 [ 130.157530][ T6536] do_syscall_64+0x31/0x40 [ 130.162375][ T6536] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 130.168274][ T6536] RIP: 0033:0x7fa581e19819 [ 130.172693][ T6536] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 130.192476][ T6536] RSP: 002b:00007fa580874028 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 130.200922][ T6536] RAX: ffffffffffffffda RBX: 00007fa582092fa0 RCX: 00007fa581e19819 [ 130.208989][ T6536] RDX: 00000000fffffdef RSI: 00002000000001c0 RDI: 0000000000000000 [ 130.217047][ T6536] RBP: 00007fa580874090 R08: 0000000000000000 R09: 0000000000000000 [ 130.225209][ T6536] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 130.233450][ T6536] R13: 00007fa582093038 R14: 00007fa582092fa0 R15: 00007ffffb5e2e88 [ 131.742738][ T6606] device wg2 left promiscuous mode [ 131.827857][ T6606] device wg2 entered promiscuous mode [ 133.066936][ T6695] syzkaller0: default qdisc (pfifo_fast) fail, fallback to noqueue [ 133.088829][ T6695] device syzkaller0 entered promiscuous mode [ 135.385249][ T6824] tap0: tun_chr_ioctl cmd 1074812118 [ 135.504277][ T6830] device sit0 left promiscuous mode [ 135.536099][ T6830] syz.0.1864[6830] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 135.536249][ T6830] syz.0.1864[6830] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 135.613666][ T6830] device sit0 entered promiscuous mode [ 136.316449][ T6863] device sit0 left promiscuous mode [ 136.424037][ T6874] device sit0 entered promiscuous mode [ 136.980591][ T6910] device wg2 left promiscuous mode [ 137.612924][ T6938] device syzkaller0 entered promiscuous mode [ 139.287917][ T7070] device syzkaller0 entered promiscuous mode [ 139.699323][ T7134] device sit0 left promiscuous mode [ 139.851427][ T7134] device sit0 entered promiscuous mode [ 140.379399][ T7188] : port 1(ip6gretap0) entered blocking state [ 140.388581][ T7188] : port 1(ip6gretap0) entered disabled state [ 140.404706][ T7188] device ip6gretap0 entered promiscuous mode [ 140.510574][ T7203] device syzkaller0 entered promiscuous mode [ 140.526331][ T405] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 140.643641][ T7216] FAULT_INJECTION: forcing a failure. [ 140.643641][ T7216] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 140.691007][ T7216] CPU: 1 PID: 7216 Comm: syz.3.1967 Tainted: G W syzkaller #0 [ 140.699900][ T7216] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/18/2026 [ 140.710415][ T7216] Call Trace: [ 140.713708][ T7216] __dump_stack+0x21/0x24 [ 140.718050][ T7216] dump_stack_lvl+0x1a7/0x208 [ 140.723361][ T7216] ? show_regs_print_info+0x18/0x18 [ 140.728653][ T7216] ? do_kern_addr_fault+0x80/0x80 [ 140.733868][ T7216] dump_stack+0x15/0x1c [ 140.738107][ T7216] should_fail+0x3c1/0x510 [ 140.742617][ T7216] should_fail_alloc_page+0x4f/0x60 [ 140.747825][ T7216] __alloc_pages_nodemask+0x119/0x620 [ 140.753221][ T7216] ? gfp_pfmemalloc_allowed+0x130/0x130 [ 140.758784][ T7216] ? copy_user_enhanced_fast_string+0xe/0x40 [ 140.764946][ T7216] pipe_write+0x56e/0x18b0 [ 140.769446][ T7216] ? pipe_write+0xe01/0x18b0 [ 140.774023][ T7216] ? pipe_write+0xe01/0x18b0 [ 140.778735][ T7216] ? pipe_read+0x1010/0x1010 [ 140.783415][ T7216] ? io_schedule+0xe0/0xe0 [ 140.787831][ T7216] ? security_file_permission+0x83/0xa0 [ 140.793374][ T7216] ? iov_iter_init+0x3f/0x120 [ 140.798047][ T7216] vfs_write+0x758/0xdc0 [ 140.802287][ T7216] ? kernel_write+0x3c0/0x3c0 [ 140.806960][ T7216] ? __fget_files+0x2c4/0x320 [ 140.811720][ T7216] ? __fdget_pos+0x1f7/0x380 [ 140.816313][ T7216] ? ksys_write+0x71/0x250 [ 140.820819][ T7216] ksys_write+0x149/0x250 [ 140.825138][ T7216] ? __ia32_sys_read+0x90/0x90 [ 140.829908][ T7216] ? debug_smp_processor_id+0x17/0x20 [ 140.835358][ T7216] __x64_sys_write+0x7b/0x90 [ 140.840125][ T7216] do_syscall_64+0x31/0x40 [ 140.844621][ T7216] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 140.850605][ T7216] RIP: 0033:0x7f0fdcd09819 [ 140.855341][ T7216] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 140.875915][ T7216] RSP: 002b:00007f0fdb764028 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 140.884624][ T7216] RAX: ffffffffffffffda RBX: 00007f0fdcf82fa0 RCX: 00007f0fdcd09819 [ 140.893308][ T7216] RDX: 00000000fffffdef RSI: 00002000000001c0 RDI: 0000000000000000 [ 140.902614][ T7216] RBP: 00007f0fdb764090 R08: 0000000000000000 R09: 0000000000000000 [ 140.910769][ T7216] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 140.919119][ T7216] R13: 00007f0fdcf83038 R14: 00007f0fdcf82fa0 R15: 00007ffd77e79b68 [ 141.301638][ T7260] FAULT_INJECTION: forcing a failure. [ 141.301638][ T7260] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 141.389807][ T7260] CPU: 1 PID: 7260 Comm: syz.4.1980 Tainted: G W syzkaller #0 [ 141.398806][ T7260] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/18/2026 [ 141.409088][ T7260] Call Trace: [ 141.412495][ T7260] __dump_stack+0x21/0x24 [ 141.416828][ T7260] dump_stack_lvl+0x1a7/0x208 [ 141.421685][ T7260] ? show_regs_print_info+0x18/0x18 [ 141.426891][ T7260] dump_stack+0x15/0x1c [ 141.431151][ T7260] should_fail+0x3c1/0x510 [ 141.435658][ T7260] should_fail_usercopy+0x1a/0x20 [ 141.440694][ T7260] copy_page_from_iter+0x381/0x6c0 [ 141.445812][ T7260] pipe_write+0x912/0x18b0 [ 141.450237][ T7260] ? pipe_write+0xe01/0x18b0 [ 141.454835][ T7260] ? pipe_write+0xe01/0x18b0 [ 141.459449][ T7260] ? pipe_read+0x1010/0x1010 [ 141.464039][ T7260] ? fsnotify_perm+0x66/0x4b0 [ 141.468730][ T7260] ? security_file_permission+0x83/0xa0 [ 141.474280][ T7260] ? iov_iter_init+0x3f/0x120 [ 141.479010][ T7260] vfs_write+0x758/0xdc0 [ 141.483255][ T7260] ? kernel_write+0x3c0/0x3c0 [ 141.487943][ T7260] ? __fget_files+0x2c4/0x320 [ 141.492624][ T7260] ? __fdget_pos+0x1f7/0x380 [ 141.497213][ T7260] ? ksys_write+0x71/0x250 [ 141.501717][ T7260] ksys_write+0x149/0x250 [ 141.506063][ T7260] ? __ia32_sys_read+0x90/0x90 [ 141.510926][ T7260] ? debug_smp_processor_id+0x17/0x20 [ 141.516298][ T7260] __x64_sys_write+0x7b/0x90 [ 141.520944][ T7260] do_syscall_64+0x31/0x40 [ 141.525362][ T7260] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 141.531255][ T7260] RIP: 0033:0x7f8360ab8819 [ 141.535675][ T7260] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 141.555464][ T7260] RSP: 002b:00007f835f513028 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 141.563987][ T7260] RAX: ffffffffffffffda RBX: 00007f8360d31fa0 RCX: 00007f8360ab8819 [ 141.572054][ T7260] RDX: 00000000fffffdef RSI: 00002000000001c0 RDI: 0000000000000000 [ 141.580132][ T7260] RBP: 00007f835f513090 R08: 0000000000000000 R09: 0000000000000000 [ 141.588192][ T7260] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 141.596170][ T7260] R13: 00007f8360d32038 R14: 00007f8360d31fa0 R15: 00007ffef3a386b8 [ 141.846082][ T7278] device vlan0 entered promiscuous mode [ 142.001529][ T7311] FAULT_INJECTION: forcing a failure. [ 142.001529][ T7311] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 142.015310][ T7311] CPU: 1 PID: 7311 Comm: syz.4.1994 Tainted: G W syzkaller #0 [ 142.024386][ T7311] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/18/2026 [ 142.034635][ T7311] Call Trace: [ 142.037984][ T7311] __dump_stack+0x21/0x24 [ 142.042336][ T7311] dump_stack_lvl+0x1a7/0x208 [ 142.047123][ T7311] ? show_regs_print_info+0x18/0x18 [ 142.052435][ T7311] ? do_kern_addr_fault+0x80/0x80 [ 142.057474][ T7311] dump_stack+0x15/0x1c [ 142.061730][ T7311] should_fail+0x3c1/0x510 [ 142.066203][ T7311] should_fail_alloc_page+0x4f/0x60 [ 142.071421][ T7311] __alloc_pages_nodemask+0x119/0x620 [ 142.076907][ T7311] ? gfp_pfmemalloc_allowed+0x130/0x130 [ 142.082470][ T7311] ? copy_user_enhanced_fast_string+0xe/0x40 [ 142.088466][ T7311] pipe_write+0x56e/0x18b0 [ 142.092977][ T7311] ? pipe_write+0xe01/0x18b0 [ 142.097581][ T7311] ? pipe_write+0xe01/0x18b0 [ 142.102193][ T7311] ? pipe_read+0x1010/0x1010 [ 142.106795][ T7311] ? fsnotify_perm+0x66/0x4b0 [ 142.111480][ T7311] ? security_file_permission+0x83/0xa0 [ 142.117038][ T7311] ? iov_iter_init+0x3f/0x120 [ 142.121738][ T7311] vfs_write+0x758/0xdc0 [ 142.126272][ T7311] ? kernel_write+0x3c0/0x3c0 [ 142.131035][ T7311] ? __fget_files+0x2c4/0x320 [ 142.135744][ T7311] ? __fdget_pos+0x1f7/0x380 [ 142.140359][ T7311] ? ksys_write+0x71/0x250 [ 142.144879][ T7311] ksys_write+0x149/0x250 [ 142.149226][ T7311] ? __ia32_sys_read+0x90/0x90 [ 142.154103][ T7311] ? debug_smp_processor_id+0x17/0x20 [ 142.159492][ T7311] __x64_sys_write+0x7b/0x90 [ 142.164092][ T7311] do_syscall_64+0x31/0x40 [ 142.168516][ T7311] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 142.174544][ T7311] RIP: 0033:0x7f8360ab8819 [ 142.178975][ T7311] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 142.198680][ T7311] RSP: 002b:00007f835f513028 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 142.207362][ T7311] RAX: ffffffffffffffda RBX: 00007f8360d31fa0 RCX: 00007f8360ab8819 [ 142.215782][ T7311] RDX: 00000000fffffdef RSI: 00002000000001c0 RDI: 0000000000000000 [ 142.223774][ T7311] RBP: 00007f835f513090 R08: 0000000000000000 R09: 0000000000000000 [ 142.232064][ T7311] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 142.240178][ T7311] R13: 00007f8360d32038 R14: 00007f8360d31fa0 R15: 00007ffef3a386b8 [ 143.048113][ T7340] device syzkaller0 entered promiscuous mode [ 143.143723][ T7345] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 143.261754][ T7349] FAULT_INJECTION: forcing a failure. [ 143.261754][ T7349] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 143.343729][ T7349] CPU: 1 PID: 7349 Comm: syz.0.2009 Tainted: G W syzkaller #0 [ 143.352669][ T7349] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/18/2026 [ 143.362740][ T7349] Call Trace: [ 143.366130][ T7349] __dump_stack+0x21/0x24 [ 143.370601][ T7349] dump_stack_lvl+0x1a7/0x208 [ 143.375287][ T7349] ? show_regs_print_info+0x18/0x18 [ 143.380507][ T7349] dump_stack+0x15/0x1c [ 143.384797][ T7349] should_fail+0x3c1/0x510 [ 143.389229][ T7349] should_fail_usercopy+0x1a/0x20 [ 143.394262][ T7349] copy_page_from_iter+0x381/0x6c0 [ 143.399384][ T7349] pipe_write+0x912/0x18b0 [ 143.403810][ T7349] ? pipe_write+0xe01/0x18b0 [ 143.408402][ T7349] ? pipe_write+0xe01/0x18b0 [ 143.413099][ T7349] ? pipe_read+0x1010/0x1010 [ 143.417706][ T7349] ? fsnotify_perm+0x66/0x4b0 [ 143.422502][ T7349] ? security_file_permission+0x83/0xa0 [ 143.428056][ T7349] ? iov_iter_init+0x3f/0x120 [ 143.432876][ T7349] vfs_write+0x758/0xdc0 [ 143.437283][ T7349] ? kernel_write+0x3c0/0x3c0 [ 143.441981][ T7349] ? __fget_files+0x2c4/0x320 [ 143.446749][ T7349] ? __fdget_pos+0x1f7/0x380 [ 143.451548][ T7349] ? ksys_write+0x71/0x250 [ 143.455982][ T7349] ksys_write+0x149/0x250 [ 143.460329][ T7349] ? __ia32_sys_read+0x90/0x90 [ 143.465108][ T7349] ? debug_smp_processor_id+0x17/0x20 [ 143.470495][ T7349] __x64_sys_write+0x7b/0x90 [ 143.475111][ T7349] do_syscall_64+0x31/0x40 [ 143.479539][ T7349] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 143.485541][ T7349] RIP: 0033:0x7fa581e19819 [ 143.489976][ T7349] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 143.509619][ T7349] RSP: 002b:00007fa580874028 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 143.518059][ T7349] RAX: ffffffffffffffda RBX: 00007fa582092fa0 RCX: 00007fa581e19819 [ 143.526058][ T7349] RDX: 00000000fffffdef RSI: 00002000000001c0 RDI: 0000000000000000 [ 143.534214][ T7349] RBP: 00007fa580874090 R08: 0000000000000000 R09: 0000000000000000 [ 143.542195][ T7349] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 143.550446][ T7349] R13: 00007fa582093038 R14: 00007fa582092fa0 R15: 00007ffffb5e2e88 [ 143.745358][ T7359] device syzkaller0 entered promiscuous mode [ 144.722649][ T7400] device syzkaller0 entered promiscuous mode [ 144.747047][ T7400] syzkaller0: create flow: hash 3996287129 index 1 [ 144.761212][ T20] syzkaller0: tun_net_xmit 48 [ 144.917719][ T7399] syzkaller0: delete flow: hash 3996287129 index 1 [ 148.128056][ T7574] batadv0: tun_chr_ioctl cmd 1074025677 [ 148.156298][ T7574] batadv0: linktype set to 804 [ 148.526302][ T7589] device pim6reg1 entered promiscuous mode [ 148.786303][ T7611] €Â0: renamed from pim6reg1 [ 148.987417][ T7637] tap0: tun_chr_ioctl cmd 1074025677 [ 149.048478][ T7637] tap0: linktype set to 805 [ 150.020064][ T7675] syzkaller0: default qdisc (pfifo_fast) fail, fallback to noqueue [ 150.039685][ T7675] device syzkaller0 entered promiscuous mode [ 150.535537][ T7716] syzkaller0: tun_chr_ioctl cmd 1074025675 [ 150.549426][ T7716] syzkaller0: persist disabled [ 152.975514][ T7863] device wg2 left promiscuous mode [ 153.184241][ T7874] device wg2 entered promiscuous mode [ 154.459012][ T7950] device syzkaller0 entered promiscuous mode [ 156.532009][ T8076] device syzkaller0 entered promiscuous mode [ 156.734903][ T8084] ³þ: renamed from bond_slave_0 [ 157.347055][ T8129] device syzkaller0 entered promiscuous mode [ 157.440252][ T8131] device bridge_slave_1 left promiscuous mode [ 157.452182][ T8131] bridge0: port 2(bridge_slave_1) entered disabled state [ 157.460483][ T8131] device bridge_slave_0 left promiscuous mode [ 157.466739][ T8131] bridge0: port 1(bridge_slave_0) entered disabled state [ 160.233319][ T8297] device syzkaller0 entered promiscuous mode [ 160.711314][ T24] audit: type=1400 audit(1776884836.710:163): avc: denied { create } for pid=8345 comm="syz.0.2311" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_iscsi_socket permissive=1 [ 161.058369][ T8386] device syzkaller0 entered promiscuous mode [ 162.285011][ T8436] device wg2 entered promiscuous mode [ 162.543180][ T8465] bridge0: port 2(bridge_slave_1) entered disabled state [ 162.550476][ T8465] bridge0: port 1(bridge_slave_0) entered disabled state [ 166.266994][ T8628] device syzkaller0 entered promiscuous mode [ 166.357421][ T8640] device syzkaller0 entered promiscuous mode [ 167.203258][ T8676] syz.1.2410[8676] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 167.203327][ T8676] syz.1.2410[8676] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 168.101549][ T8680] device syzkaller0 entered promiscuous mode [ 169.701953][ T8725] tun0: tun_chr_ioctl cmd 1074025678 [ 169.712183][ T8725] tun0: group set to 1 [ 170.821781][ T8778] device bridge_slave_1 left promiscuous mode [ 170.897749][ T8778] bridge0: port 2(bridge_slave_1) entered disabled state [ 170.971043][ T8778] device bridge_slave_0 left promiscuous mode [ 170.998667][ T8778] bridge0: port 1(bridge_slave_0) entered disabled state [ 171.941284][ T8829] cgroup: fork rejected by pids controller in /syz0 [ 171.995262][ T8828] cgroup: fork rejected by pids controller in /syz4 [ 172.546014][ T8848] bridge0: port 1(bridge_slave_0) entered blocking state [ 172.562591][ T8848] bridge0: port 1(bridge_slave_0) entered disabled state [ 172.578787][ T8848] device bridge_slave_0 entered promiscuous mode [ 172.586529][ T8848] bridge0: port 2(bridge_slave_1) entered blocking state [ 172.593882][ T8848] bridge0: port 2(bridge_slave_1) entered disabled state [ 172.602381][ T8848] device bridge_slave_1 entered promiscuous mode [ 172.677394][ T8857] bridge0: port 1(bridge_slave_0) entered blocking state [ 172.684902][ T8857] bridge0: port 1(bridge_slave_0) entered disabled state [ 172.692777][ T8857] device bridge_slave_0 entered promiscuous mode [ 172.711217][ T8857] bridge0: port 2(bridge_slave_1) entered blocking state [ 172.718517][ T8857] bridge0: port 2(bridge_slave_1) entered disabled state [ 172.727019][ T8857] device bridge_slave_1 entered promiscuous mode [ 173.120066][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 173.128992][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 173.228628][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 173.248621][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 173.268595][ T49] bridge0: port 1(bridge_slave_0) entered blocking state [ 173.275748][ T49] bridge0: port 1(bridge_slave_0) entered forwarding state [ 173.338537][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 173.356752][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 173.388496][ T49] bridge0: port 2(bridge_slave_1) entered blocking state [ 173.395565][ T49] bridge0: port 2(bridge_slave_1) entered forwarding state [ 173.440496][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 173.478691][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 173.486962][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 173.510674][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 173.529303][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 173.540163][ T8882] device veth1_macvtap left promiscuous mode [ 173.546427][ T8882] device macsec0 left promiscuous mode [ 173.570396][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 173.586909][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 173.617522][ T49] bridge0: port 1(bridge_slave_0) entered blocking state [ 173.624710][ T49] bridge0: port 1(bridge_slave_0) entered forwarding state [ 173.649643][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 173.672973][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 173.683131][ T49] bridge0: port 2(bridge_slave_1) entered blocking state [ 173.690343][ T49] bridge0: port 2(bridge_slave_1) entered forwarding state [ 173.708245][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 173.760078][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 173.771098][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 173.782074][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 173.790239][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 173.798735][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 173.807210][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 173.823173][ T8848] device veth0_vlan entered promiscuous mode [ 173.837300][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 173.846234][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 173.854805][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 173.862766][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 173.876783][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 173.885266][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 173.896347][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 173.904621][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 173.914318][ T8857] device veth0_vlan entered promiscuous mode [ 173.922132][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 173.930947][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 173.942628][ T8848] device veth1_macvtap entered promiscuous mode [ 173.976832][ T303] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 173.985135][ T303] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 173.993771][ T303] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 174.009988][ T303] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 174.018418][ T303] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 174.030979][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 174.040082][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 174.049761][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 174.058591][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 174.070514][ T9] device ip6gretap0 left promiscuous mode [ 174.076332][ T9] : port 1(ip6gretap0) entered disabled state [ 174.089364][ T8910] device xfrm0 entered promiscuous mode [ 174.105767][ T8857] device veth1_macvtap entered promiscuous mode [ 174.170764][ T303] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 174.179458][ T303] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 174.188098][ T303] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 174.239589][ T303] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 174.250641][ T303] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 174.517342][ T8934] syzkaller0: default qdisc (pfifo_fast) fail, fallback to noqueue [ 174.549314][ T8934] device syzkaller0 entered promiscuous mode [ 174.950874][ T9] device bridge_slave_1 left promiscuous mode [ 174.957589][ T9] bridge0: port 2(bridge_slave_1) entered disabled state [ 175.015261][ T9] device bridge_slave_0 left promiscuous mode [ 175.025242][ T9] bridge0: port 1(bridge_slave_0) entered disabled state [ 175.056604][ T9] device macsec0 left promiscuous mode [ 175.077402][ T9] nr0: port 1(macsec0) entered disabled state [ 175.107048][ T9] device veth0_vlan left promiscuous mode [ 175.844629][ T8999] device syzkaller0 entered promiscuous mode [ 176.613546][ T9044] syz.1.2518 uses obsolete (PF_INET,SOCK_PACKET) [ 179.613060][ T9182] device veth1_macvtap left promiscuous mode [ 179.660317][ T9182] device veth1_macvtap entered promiscuous mode [ 179.693035][ T9182] device macsec0 entered promiscuous mode [ 180.133290][ T9206] device syzkaller0 entered promiscuous mode [ 180.727460][ T9246] syzkaller0: tun_chr_ioctl cmd 2147767506 [ 181.469153][ T9282] bridge0: port 3(gretap0) entered blocking state [ 181.477925][ T9282] bridge0: port 3(gretap0) entered disabled state [ 181.554243][ T9282] device gretap0 entered promiscuous mode [ 182.799076][ T9360] bridge0: port 2(bridge_slave_1) entered disabled state [ 182.806307][ T9360] bridge0: port 1(bridge_slave_0) entered disabled state [ 183.405073][ T9366] device syzkaller0 entered promiscuous mode [ 184.090110][ T9413] bridge0: port 2(bridge_slave_1) entered disabled state [ 184.097432][ T9413] bridge0: port 1(bridge_slave_0) entered disabled state [ 184.158760][ T9416] device bridge_slave_1 left promiscuous mode [ 184.164978][ T9416] bridge0: port 2(bridge_slave_1) entered disabled state [ 184.238940][ T9416] device bridge_slave_0 left promiscuous mode [ 184.259634][ T9416] bridge0: port 1(bridge_slave_0) entered disabled state [ 185.216835][ T9422] device wg2 left promiscuous mode [ 186.987992][ T9493] device syzkaller0 entered promiscuous mode [ 187.902842][ T9546] device sit0 left promiscuous mode [ 188.083932][ T9546] device sit0 entered promiscuous mode [ 192.059773][ T9679] device syzkaller0 entered promiscuous mode [ 193.183367][ T9753] device syzkaller0 entered promiscuous mode [ 193.265139][ T9763] device veth1_macvtap left promiscuous mode [ 193.302580][ T9763] device macsec0 entered promiscuous mode [ 193.323784][ T9763] device veth1_macvtap entered promiscuous mode [ 194.569694][ T24] audit: type=1400 audit(1776884870.570:164): avc: denied { read } for pid=9819 comm="syz.0.2747" name="cgroup.subtree_control" dev="cgroup2" ino=505 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 [ 195.111047][ T9850] device syzkaller0 entered promiscuous mode [ 195.183447][ T9854] device syzkaller0 entered promiscuous mode [ 196.064672][ T9925] device sit0 left promiscuous mode [ 196.114492][ T9928] device syzkaller0 entered promiscuous mode [ 196.121613][ T9925] device sit0 entered promiscuous mode [ 196.613102][ T9963] device syzkaller0 entered promiscuous mode [ 196.760988][ T9980] device syzkaller0 entered promiscuous mode [ 197.187181][T10009] device syzkaller0 entered promiscuous mode [ 197.284482][T10028] device syzkaller0 entered promiscuous mode [ 197.803223][T10053] tap0: tun_chr_ioctl cmd 1074812118 [ 199.273104][T10131] device sit0 entered promiscuous mode [ 202.204137][ T24] audit: type=1400 audit(1776884878.200:165): avc: denied { append } for pid=10301 comm="syz.0.2895" name="ppp" dev="devtmpfs" ino=153 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ppp_device_t tclass=chr_file permissive=1 [ 203.743285][T10375] tun0: tun_chr_ioctl cmd 1074812118 [ 203.757113][T10375] tap0: tun_chr_ioctl cmd 1074025681 [ 204.011814][T10402] device wg2 entered promiscuous mode [ 204.310809][T10436] geneve0: tun_chr_ioctl cmd 1074025677 [ 204.316413][T10436] geneve0: linktype set to 1 [ 204.434772][T10447] device syzkaller0 entered promiscuous mode [ 205.453661][T10498] device wg2 entered promiscuous mode [ 206.002355][T10526] device sit0 left promiscuous mode [ 206.563216][T10578] device syzkaller0 entered promiscuous mode [ 206.622672][T10580] device syzkaller0 entered promiscuous mode [ 207.438984][T10611] device syzkaller0 entered promiscuous mode [ 208.001776][T10649] device macsec0 entered promiscuous mode [ 208.185525][T10656] device macsec0 left promiscuous mode [ 208.295638][T10661] device macsec0 entered promiscuous mode [ 210.288242][T10753] device syzkaller0 entered promiscuous mode [ 210.321568][T10757] geneve1: tun_chr_ioctl cmd 1074025677 [ 210.337504][T10757] geneve1: linktype set to 780 [ 211.434807][ T24] audit: type=1400 audit(1776884887.430:166): avc: denied { create } for pid=10807 comm="syz.3.3045" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=ieee802154_socket permissive=1 [ 211.586497][T10817] device syzkaller0 entered promiscuous mode [ 211.787519][T10837] device syzkaller0 entered promiscuous mode [ 212.096218][T10854] device syzkaller0 entered promiscuous mode [ 212.108107][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 212.783613][T10891] device syzkaller0 entered promiscuous mode [ 213.597833][T10936] device syzkaller0 entered promiscuous mode [ 214.280683][T11011] syzkaller0: tun_chr_ioctl cmd 1074025673 [ 214.298172][T11011] syzkaller0: tun_chr_ioctl cmd 1074025673 [ 214.313239][T11014] syzkaller0: tun_chr_ioctl cmd 1074025675 [ 214.328398][T11014] syzkaller0: persist disabled [ 214.346947][T11011] syzkaller0: tun_chr_ioctl cmd 1074025673 [ 214.365012][T11011] syzkaller0: tun_chr_ioctl cmd 1074025673 [ 214.396167][T11011] syzkaller0: tun_chr_ioctl cmd 1074025673 [ 214.411137][T11011] syzkaller0: tun_chr_ioctl cmd 1074025673 [ 214.428277][T11011] syzkaller0: tun_chr_ioctl cmd 1074025673 [ 214.452239][T11011] syzkaller0: tun_chr_ioctl cmd 1074025673 [ 214.479165][T11011] syzkaller0: tun_chr_ioctl cmd 1074025673 [ 214.485054][T11011] syzkaller0: tun_chr_ioctl cmd 1074025673 [ 214.492148][T11011] syzkaller0: tun_chr_ioctl cmd 1074025673 [ 214.515828][T11011] syzkaller0: tun_chr_ioctl cmd 1074025673 [ 214.533169][T11011] syzkaller0: tun_chr_ioctl cmd 1074025673 [ 214.550623][T11011] syzkaller0: tun_chr_ioctl cmd 1074025673 [ 214.569160][T11011] syzkaller0: tun_chr_ioctl cmd 1074025673 [ 214.581204][T11011] syzkaller0: tun_chr_ioctl cmd 1074025673 [ 214.590548][T11011] syzkaller0: tun_chr_ioctl cmd 1074025673 [ 214.603904][T11011] syzkaller0: tun_chr_ioctl cmd 1074025673 [ 214.614983][T11011] syzkaller0: tun_chr_ioctl cmd 1074025673 [ 214.621306][T11011] syzkaller0: tun_chr_ioctl cmd 1074025673 [ 214.627455][T11011] syzkaller0: tun_chr_ioctl cmd 1074025673 [ 214.643978][T11011] syzkaller0: tun_chr_ioctl cmd 1074025673 [ 214.658158][T11011] syzkaller0: tun_chr_ioctl cmd 1074025673 [ 214.678300][T11011] syzkaller0: tun_chr_ioctl cmd 1074025673 [ 214.694889][T11011] syzkaller0: tun_chr_ioctl cmd 1074025673 [ 214.705119][T11011] syzkaller0: tun_chr_ioctl cmd 1074025673 [ 214.725306][T11011] syzkaller0: tun_chr_ioctl cmd 1074025673 [ 214.762624][T11011] syzkaller0: tun_chr_ioctl cmd 1074025673 [ 214.778406][T11011] syzkaller0: tun_chr_ioctl cmd 1074025673 [ 214.799947][T11011] syzkaller0: tun_chr_ioctl cmd 1074025673 [ 214.805851][T11011] syzkaller0: tun_chr_ioctl cmd 1074025673 [ 214.815707][T11011] syzkaller0: tun_chr_ioctl cmd 1074025673 [ 214.821638][T11011] syzkaller0: tun_chr_ioctl cmd 1074025673 [ 214.827828][T11011] syzkaller0: tun_chr_ioctl cmd 1074025673 [ 214.833871][T11011] syzkaller0: tun_chr_ioctl cmd 1074025673 [ 214.842989][T11011] syzkaller0: tun_chr_ioctl cmd 1074025673 [ 214.851673][T11011] syzkaller0: tun_chr_ioctl cmd 1074025673 [ 214.857789][T11011] syzkaller0: tun_chr_ioctl cmd 1074025673 [ 214.873623][T11011] syzkaller0: tun_chr_ioctl cmd 1074025673 [ 214.879776][T11011] syzkaller0: tun_chr_ioctl cmd 1074025673 [ 214.885854][T11011] syzkaller0: tun_chr_ioctl cmd 1074025673 [ 214.892445][T11011] syzkaller0: tun_chr_ioctl cmd 1074025673 [ 214.899751][T11011] syzkaller0: tun_chr_ioctl cmd 1074025673 [ 214.906474][T11011] syzkaller0: tun_chr_ioctl cmd 1074025673 [ 214.912545][T11011] syzkaller0: tun_chr_ioctl cmd 1074025673 [ 214.918511][T11011] syzkaller0: tun_chr_ioctl cmd 1074025673 [ 214.924371][T11011] syzkaller0: tun_chr_ioctl cmd 1074025673 [ 214.930398][T11011] syzkaller0: tun_chr_ioctl cmd 1074025673 [ 214.936232][T11011] syzkaller0: tun_chr_ioctl cmd 1074025673 [ 214.942814][T11011] syzkaller0: tun_chr_ioctl cmd 1074025673 [ 214.948710][T11011] syzkaller0: tun_chr_ioctl cmd 1074025673 [ 214.954685][T11011] syzkaller0: tun_chr_ioctl cmd 1074025673 [ 214.970174][T11011] syzkaller0: tun_chr_ioctl cmd 1074025673 [ 214.977325][T11011] syzkaller0: tun_chr_ioctl cmd 1074025673 [ 214.993425][T11011] syzkaller0: tun_chr_ioctl cmd 1074025673 [ 215.004430][T11011] syzkaller0: tun_chr_ioctl cmd 1074025673 [ 215.011234][T11011] syzkaller0: tun_chr_ioctl cmd 1074025673 [ 215.017677][T11011] syzkaller0: tun_chr_ioctl cmd 1074025673 [ 215.024462][T11011] syzkaller0: tun_chr_ioctl cmd 1074025673 [ 215.030495][T11011] syzkaller0: tun_chr_ioctl cmd 1074025673 [ 215.036695][T11011] syzkaller0: tun_chr_ioctl cmd 1074025673 [ 215.042762][T11011] syzkaller0: tun_chr_ioctl cmd 1074025673 [ 215.068168][T11011] syzkaller0: tun_chr_ioctl cmd 1074025673 [ 215.075430][T11011] syzkaller0: tun_chr_ioctl cmd 1074025673 [ 215.094439][T11055] device syzkaller0 entered promiscuous mode [ 215.179211][T11060] tun0: tun_chr_ioctl cmd 1074025677 [ 215.185051][T11060] tun0: linktype set to 783 [ 215.190609][T11060] tun0: tun_chr_ioctl cmd 1074025678 [ 215.196207][T11060] tun0: group set to 1 [ 215.201276][T11060] tun0: tun_chr_ioctl cmd 2147767519 [ 215.676117][T11092] device syzkaller0 entered promiscuous mode [ 215.841157][T11118] device syzkaller0 entered promiscuous mode [ 217.635841][T11218] device wg2 entered promiscuous mode [ 217.742867][ T279] device syz_tun left promiscuous mode [ 217.773566][ T279] : port 1(syz_tun) entered disabled state [ 217.836175][ T24] audit: type=1400 audit(1776884893.830:167): avc: denied { mounton } for pid=11232 comm="syz-executor" path="/" dev="sda1" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:root_t tclass=dir permissive=1 [ 218.116000][T11232] bridge0: port 1(bridge_slave_0) entered blocking state [ 218.125448][T11232] bridge0: port 1(bridge_slave_0) entered disabled state [ 218.133738][T11232] device bridge_slave_0 entered promiscuous mode [ 218.143019][T11232] bridge0: port 2(bridge_slave_1) entered blocking state [ 218.150885][T11232] bridge0: port 2(bridge_slave_1) entered disabled state [ 218.158778][T11232] device bridge_slave_1 entered promiscuous mode [ 218.433636][ T405] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 218.450270][ T405] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 218.525102][ T405] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 218.562587][ T405] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 218.571597][ T405] bridge0: port 1(bridge_slave_0) entered blocking state [ 218.578883][ T405] bridge0: port 1(bridge_slave_0) entered forwarding state [ 218.655795][ T405] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 218.666491][ T405] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 218.697874][ T405] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 218.717206][ T24] audit: type=1400 audit(1776884894.710:168): avc: denied { create } for pid=11289 comm="syz.0.3195" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_nflog_socket permissive=1 [ 218.721960][ T405] bridge0: port 2(bridge_slave_1) entered blocking state [ 218.745130][ T405] bridge0: port 2(bridge_slave_1) entered forwarding state [ 218.756119][ T405] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 218.779472][ T405] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 218.837316][T11232] device veth0_vlan entered promiscuous mode [ 218.860966][ T405] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 218.876924][ T405] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 218.909297][ T405] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 218.934524][ T405] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 218.975383][T11232] device veth1_macvtap entered promiscuous mode [ 219.010455][ T405] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 219.037818][ T405] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 219.095366][ T24] audit: type=1400 audit(1776884895.090:169): avc: denied { unmount } for pid=11232 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fs_t tclass=filesystem permissive=1 [ 219.119163][ T405] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 219.853579][T11336] device syzkaller0 entered promiscuous mode [ 220.521708][T11379] @0Ù: renamed from bond_slave_1 [ 220.629568][T11396] device veth0_vlan left promiscuous mode [ 220.646355][T11396] device veth0_vlan entered promiscuous mode [ 220.674173][ T303] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 220.709058][ T303] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 220.729065][ T303] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 220.757536][T11400] tun0: tun_chr_ioctl cmd 1074025675 [ 220.774882][T11400] tun0: persist enabled [ 220.791152][T11406] syzkaller0: tun_chr_ioctl cmd 2147767519 [ 220.889110][T11421] €Â0: renamed from pim6reg1 [ 221.089490][T11441] device syzkaller0 entered promiscuous mode [ 221.139024][T11441] device wg2 entered promiscuous mode [ 221.835186][T11477] device syzkaller0 entered promiscuous mode [ 223.372895][T11564] device syzkaller0 entered promiscuous mode [ 223.436625][T11579] device syz_tun entered promiscuous mode [ 224.627153][T11667] device wg2 entered promiscuous mode [ 224.798870][T11677] device syzkaller0 entered promiscuous mode [ 224.870150][T11679] device syzkaller0 entered promiscuous mode [ 224.996900][T11683] device syzkaller0 entered promiscuous mode [ 225.827479][T11732] sock: sock_set_timeout: `syz.4.3334' (pid 11732) tries to set negative timeout [ 225.912994][T11736] device syzkaller0 entered promiscuous mode [ 226.155183][T11755] device sit0 entered promiscuous mode [ 226.532403][T11774] +: renamed from team_slave_1 [ 226.694797][T11789] device gretap0 left promiscuous mode [ 226.732253][T11789] bridge0: port 3(gretap0) entered disabled state [ 226.769109][T11789] device bridge_slave_1 left promiscuous mode [ 226.810292][T11789] bridge0: port 2(bridge_slave_1) entered disabled state [ 226.900371][T11789] device bridge_slave_0 left promiscuous mode [ 226.929763][T11789] bridge0: port 1(bridge_slave_0) entered disabled state [ 227.903679][T11850] device wg2 left promiscuous mode [ 227.989534][T11843] device wg2 entered promiscuous mode [ 228.382583][T11868] syzkaller0: default qdisc (pfifo_fast) fail, fallback to noqueue [ 228.538730][T11868] device syzkaller0 entered promiscuous mode [ 228.930185][T11884] device syzkaller0 entered promiscuous mode [ 229.707901][T11927] device syzkaller0 entered promiscuous mode [ 230.683129][T11990] device wg2 left promiscuous mode [ 230.700617][T11989] device sit0 left promiscuous mode [ 230.761565][T11990] device dummy0 entered promiscuous mode [ 230.869220][T11989] device sit0 entered promiscuous mode [ 230.984783][ T24] audit: type=1400 audit(1776884906.980:170): avc: denied { ioctl } for pid=12005 comm="syz.4.3421" path="" dev="cgroup2" ino=190 ioctlcmd=0x8914 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 [ 231.245134][T12015] device veth0_vlan left promiscuous mode [ 231.272768][T12015] device veth0_vlan entered promiscuous mode [ 231.324863][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 231.336931][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 231.359639][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 232.082868][T12072] device syzkaller0 entered promiscuous mode [ 232.799300][T12104] device pim6reg1 entered promiscuous mode [ 233.118997][T12144] tun0: tun_chr_ioctl cmd 1074025677 [ 233.124336][T12144] tun0: linktype set to 0 [ 233.247783][T12151] device syzkaller0 entered promiscuous mode [ 233.814765][T12213] ÿ: renamed from bond_slave_0 [ 235.204094][T12285] device syzkaller0 entered promiscuous mode [ 236.008099][T12317] device syzkaller0 entered promiscuous mode [ 236.415646][T12350] device syzkaller0 entered promiscuous mode [ 236.423534][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 237.097691][T12384] ÿÿÿÿÿÿ: renamed from vlan1 [ 237.795876][T12440] device syzkaller0 entered promiscuous mode [ 237.802615][ T2359] syzkaller0: tun_net_xmit 48 [ 237.809455][T12440] syzkaller0: tun_net_xmit 1280 [ 237.814571][T12440] syzkaller0: create flow: hash 1769919088 index 1 [ 237.831886][T12441] syzkaller0: delete flow: hash 1769919088 index 1 [ 238.084293][T12454] tun0: tun_chr_ioctl cmd 1074025673 [ 238.117404][T12456] ref_ctr_offset mismatch. inode: 0x526 offset: 0x0 ref_ctr_offset(old): 0x0 ref_ctr_offset(new): 0x1fe [ 238.138741][T12457] tun0: tun_chr_ioctl cmd 1074025676 [ 238.168387][T12457] tun0: owner set to 0 [ 238.179279][T12453] tun0: tun_chr_ioctl cmd 1074025676 [ 238.184794][T12453] tun0: owner set to 0 [ 238.756172][T12483] device syzkaller0 entered promiscuous mode [ 238.948797][T12512] batadv0: tun_chr_ioctl cmd 1074025677 [ 238.961214][T12512] batadv0: linktype set to 804 [ 239.453472][T12542] tun0: tun_chr_ioctl cmd 1074025677 [ 239.459394][T12542] tun0: linktype set to 783 [ 239.466069][T12542] tun0: tun_chr_ioctl cmd 1074025678 [ 239.472344][T12542] tun0: group set to 1 [ 239.477124][T12542] tun0: tun_chr_ioctl cmd 2147767519 [ 239.690779][T12557] device wg2 left promiscuous mode [ 240.375412][T12602] device sit0 entered promiscuous mode [ 240.695779][T12613] device syzkaller0 entered promiscuous mode [ 240.711920][ T24] audit: type=1400 audit(1776884916.710:171): avc: denied { create } for pid=12612 comm="syz.2.3618" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 240.984213][T12644] device wg2 entered promiscuous mode [ 241.028966][T12638] device syzkaller0 entered promiscuous mode [ 242.284925][T12706] device syzkaller0 entered promiscuous mode [ 242.495758][T12720] device aaaaaaaaaaaaaaa entered promiscuous mode [ 242.817013][T12728] Ÿë: port 1(vlan1) entered blocking state [ 242.823182][T12728] Ÿë: port 1(vlan1) entered disabled state [ 242.835939][T12728] device vlan1 entered promiscuous mode [ 242.861987][T12751] device wg2 entered promiscuous mode [ 242.947046][T12760] device syzkaller0 entered promiscuous mode [ 243.335900][T12782] device syzkaller0 entered promiscuous mode [ 243.856157][T12811] device syzkaller0 entered promiscuous mode [ 244.861554][T12896] FAULT_INJECTION: forcing a failure. [ 244.861554][T12896] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 244.898410][T12896] CPU: 0 PID: 12896 Comm: syz.4.3711 Tainted: G W syzkaller #0 [ 244.900683][T12893] device syzkaller0 entered promiscuous mode [ 244.908112][T12896] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/18/2026 [ 244.924257][T12896] Call Trace: [ 244.927562][T12896] __dump_stack+0x21/0x24 [ 244.931900][T12896] dump_stack_lvl+0x1a7/0x208 [ 244.936677][T12896] ? thaw_kernel_threads+0x220/0x220 [ 244.941980][T12896] ? show_regs_print_info+0x18/0x18 [ 244.947187][T12896] dump_stack+0x15/0x1c [ 244.951358][T12896] should_fail+0x3c1/0x510 [ 244.955802][T12896] should_fail_usercopy+0x1a/0x20 [ 244.960917][T12896] strncpy_from_user+0x24/0x2e0 [ 244.966018][T12896] ? kmem_cache_alloc+0x162/0x2d0 [ 244.971055][T12896] ? getname_flags+0xb9/0x500 [ 244.975939][T12896] getname_flags+0xf4/0x500 [ 244.980464][T12896] getname+0x19/0x20 [ 244.984367][T12896] do_sys_openat2+0xde/0x750 [ 244.988976][T12896] ? __kasan_check_write+0x14/0x20 [ 244.994454][T12896] ? fput_many+0x15a/0x1a0 [ 244.998880][T12896] ? do_sys_open+0xe0/0xe0 [ 245.003297][T12896] ? fput+0x1a/0x20 [ 245.007115][T12896] ? ksys_write+0x1f4/0x250 [ 245.011632][T12896] ? __ia32_sys_read+0x90/0x90 [ 245.016416][T12896] __x64_sys_openat+0x136/0x160 [ 245.021475][T12896] do_syscall_64+0x31/0x40 [ 245.025902][T12896] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 245.031795][T12896] RIP: 0033:0x7f426106d819 [ 245.036439][T12896] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 245.056418][T12896] RSP: 002b:00007f425fac8028 EFLAGS: 00000246 ORIG_RAX: 0000000000000101 [ 245.064976][T12896] RAX: ffffffffffffffda RBX: 00007f42612e6fa0 RCX: 00007f426106d819 [ 245.073136][T12896] RDX: 0000000000200002 RSI: 0000200000000340 RDI: ffffffffffffff9c [ 245.081113][T12896] RBP: 00007f425fac8090 R08: 0000000000000000 R09: 0000000000000000 [ 245.089204][T12896] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 245.097184][T12896] R13: 00007f42612e7038 R14: 00007f42612e6fa0 R15: 00007ffda46a4368 [ 245.204559][T12901] device veth0_vlan left promiscuous mode [ 245.248416][T12901] device veth0_vlan entered promiscuous mode [ 245.299664][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 245.308527][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 245.321993][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 245.812067][T12945] FAULT_INJECTION: forcing a failure. [ 245.812067][T12945] name failslab, interval 1, probability 0, space 0, times 1 [ 245.826752][T12945] CPU: 1 PID: 12945 Comm: syz.0.3727 Tainted: G W syzkaller #0 [ 245.835894][T12945] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/18/2026 [ 245.846723][T12945] Call Trace: [ 245.850204][T12945] __dump_stack+0x21/0x24 [ 245.854791][T12945] dump_stack_lvl+0x1a7/0x208 [ 245.859648][T12945] ? thaw_kernel_threads+0x220/0x220 [ 245.865021][T12945] ? show_regs_print_info+0x18/0x18 [ 245.870247][T12945] dump_stack+0x15/0x1c [ 245.874598][T12945] should_fail+0x3c1/0x510 [ 245.879208][T12945] ? __alloc_file+0x28/0x320 [ 245.883812][T12945] __should_failslab+0xa4/0xe0 [ 245.888664][T12945] should_failslab+0x9/0x20 [ 245.893168][T12945] kmem_cache_alloc+0x3d/0x2d0 [ 245.897940][T12945] ? arch_stack_walk+0xee/0x140 [ 245.902886][T12945] __alloc_file+0x28/0x320 [ 245.907351][T12945] alloc_empty_file+0x97/0x180 [ 245.912123][T12945] path_openat+0xf5/0x31c0 [ 245.916628][T12945] ? __kasan_slab_alloc+0xcf/0xf0 [ 245.921642][T12945] ? __kasan_slab_alloc+0xbd/0xf0 [ 245.926749][T12945] ? slab_post_alloc_hook+0x5d/0x2f0 [ 245.932140][T12945] ? getname_flags+0xb9/0x500 [ 245.936936][T12945] ? getname+0x19/0x20 [ 245.941115][T12945] ? do_sys_openat2+0xde/0x750 [ 245.946100][T12945] ? __x64_sys_openat+0x136/0x160 [ 245.951322][T12945] ? entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 245.957640][T12945] ? do_filp_open+0x410/0x410 [ 245.962439][T12945] do_filp_open+0x1e2/0x410 [ 245.967046][T12945] ? vfs_tmpfile+0x2c0/0x2c0 [ 245.971816][T12945] ? get_unused_fd_flags+0x92/0xa0 [ 245.977132][T12945] do_sys_openat2+0x19f/0x750 [ 245.981905][T12945] ? __kasan_check_write+0x14/0x20 [ 245.987008][T12945] ? fput_many+0x15a/0x1a0 [ 245.991525][T12945] ? do_sys_open+0xe0/0xe0 [ 245.995934][T12945] ? fput+0x1a/0x20 [ 245.999735][T12945] ? ksys_write+0x1f4/0x250 [ 246.004342][T12945] ? __ia32_sys_read+0x90/0x90 [ 246.009184][T12945] __x64_sys_openat+0x136/0x160 [ 246.014052][T12945] do_syscall_64+0x31/0x40 [ 246.018550][T12945] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 246.024443][T12945] RIP: 0033:0x7f136f3ec819 [ 246.028952][T12945] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 246.048784][T12945] RSP: 002b:00007f136de47028 EFLAGS: 00000246 ORIG_RAX: 0000000000000101 [ 246.057206][T12945] RAX: ffffffffffffffda RBX: 00007f136f665fa0 RCX: 00007f136f3ec819 [ 246.065625][T12945] RDX: 0000000000200002 RSI: 0000200000000340 RDI: ffffffffffffff9c [ 246.073708][T12945] RBP: 00007f136de47090 R08: 0000000000000000 R09: 0000000000000000 [ 246.082024][T12945] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 246.089989][T12945] R13: 00007f136f666038 R14: 00007f136f665fa0 R15: 00007fff9701f258 [ 246.832443][T12993] FAULT_INJECTION: forcing a failure. [ 246.832443][T12993] name failslab, interval 1, probability 0, space 0, times 0 [ 246.885895][T12993] CPU: 1 PID: 12993 Comm: syz.0.3741 Tainted: G W syzkaller #0 [ 246.894975][T12993] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/18/2026 [ 246.905322][T12993] Call Trace: [ 246.908729][T12993] __dump_stack+0x21/0x24 [ 246.913075][T12993] dump_stack_lvl+0x1a7/0x208 [ 246.917764][T12993] ? show_regs_print_info+0x18/0x18 [ 246.922978][T12993] dump_stack+0x15/0x1c [ 246.927146][T12993] should_fail+0x3c1/0x510 [ 246.931657][T12993] ? security_file_alloc+0x33/0x120 [ 246.936873][T12993] __should_failslab+0xa4/0xe0 [ 246.941662][T12993] should_failslab+0x9/0x20 [ 246.946193][T12993] kmem_cache_alloc+0x3d/0x2d0 [ 246.950967][T12993] ? __alloc_file+0x28/0x320 [ 246.955624][T12993] security_file_alloc+0x33/0x120 [ 246.960762][T12993] __alloc_file+0xb5/0x320 [ 246.965282][T12993] alloc_empty_file+0x97/0x180 [ 246.970137][T12993] path_openat+0xf5/0x31c0 [ 246.974680][T12993] ? __kasan_slab_alloc+0xcf/0xf0 [ 246.979706][T12993] ? __kasan_slab_alloc+0xbd/0xf0 [ 246.984728][T12993] ? slab_post_alloc_hook+0x5d/0x2f0 [ 246.990099][T12993] ? getname_flags+0xb9/0x500 [ 246.994783][T12993] ? getname+0x19/0x20 [ 246.998855][T12993] ? do_sys_openat2+0xde/0x750 [ 247.003626][T12993] ? __x64_sys_openat+0x136/0x160 [ 247.008939][T12993] ? entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 247.015094][T12993] ? do_filp_open+0x410/0x410 [ 247.019853][T12993] do_filp_open+0x1e2/0x410 [ 247.024349][T12993] ? vfs_tmpfile+0x2c0/0x2c0 [ 247.028937][T12993] ? get_unused_fd_flags+0x92/0xa0 [ 247.034053][T12993] do_sys_openat2+0x19f/0x750 [ 247.038741][T12993] ? __kasan_check_write+0x14/0x20 [ 247.043916][T12993] ? fput_many+0x15a/0x1a0 [ 247.048332][T12993] ? do_sys_open+0xe0/0xe0 [ 247.052869][T12993] ? fput+0x1a/0x20 [ 247.056668][T12993] ? ksys_write+0x1f4/0x250 [ 247.061167][T12993] ? __ia32_sys_read+0x90/0x90 [ 247.065951][T12993] __x64_sys_openat+0x136/0x160 [ 247.070808][T12993] do_syscall_64+0x31/0x40 [ 247.075330][T12993] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 247.081388][T12993] RIP: 0033:0x7f136f3ec819 [ 247.085894][T12993] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 247.105875][T12993] RSP: 002b:00007f136de47028 EFLAGS: 00000246 ORIG_RAX: 0000000000000101 [ 247.114459][T12993] RAX: ffffffffffffffda RBX: 00007f136f665fa0 RCX: 00007f136f3ec819 [ 247.122429][T12993] RDX: 0000000000200002 RSI: 0000200000000340 RDI: ffffffffffffff9c [ 247.130407][T12993] RBP: 00007f136de47090 R08: 0000000000000000 R09: 0000000000000000 [ 247.138381][T12993] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 247.146456][T12993] R13: 00007f136f666038 R14: 00007f136f665fa0 R15: 00007fff9701f258 [ 247.442232][T13018] : renamed from bond_slave_0 [ 247.666289][T13034] device syzkaller0 entered promiscuous mode [ 247.701582][ T2658] syzkaller0: tun_net_xmit 48 [ 247.720298][T13034] syzkaller0: tun_net_xmit 1280 [ 247.725611][T13034] syzkaller0: create flow: hash 3167590086 index 1 [ 247.758523][T13022] syzkaller0: delete flow: hash 3167590086 index 1 [ 249.038011][T13107] syzkaller0: default qdisc (pfifo_fast) fail, fallback to noqueue [ 249.059952][T13107] device syzkaller0 entered promiscuous mode [ 249.904197][T13155] device syzkaller0 entered promiscuous mode [ 250.417627][T13192] device wg2 left promiscuous mode [ 250.674254][T13204] device syzkaller0 entered promiscuous mode [ 250.699708][T13209] device syzkaller0 entered promiscuous mode [ 250.736946][T13210] device syzkaller0 entered promiscuous mode [ 251.855746][T13228] general protection fault, probably for non-canonical address 0xdffffc0000000006: 0000 [#1] PREEMPT SMP KASAN [ 251.867595][T13228] KASAN: null-ptr-deref in range [0x0000000000000030-0x0000000000000037] [ 251.876089][T13228] CPU: 0 PID: 13228 Comm: syz.4.3815 Tainted: G W syzkaller #0 [ 251.885110][T13228] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/18/2026 [ 251.895172][T13228] RIP: 0010:bpf_overflow_handler+0x246/0x370 [ 251.901197][T13228] Code: 3b 00 74 0a 48 8b 7c 24 10 e8 26 64 1a 00 48 8b 44 24 10 4c 8b 28 49 8d 45 38 48 89 44 24 18 49 83 c5 30 4c 89 e8 48 c1 e8 03 <42> 80 3c 38 00 74 08 4c 89 ef e8 fb 63 1a 00 4c 89 e7 48 8b 74 24 [ 251.921005][T13228] RSP: 0018:ffffc90001e27400 EFLAGS: 00010206 [ 251.927159][T13228] RAX: 0000000000000006 RBX: 1ffff1102330f779 RCX: 00000000000000ff [ 251.935220][T13228] RDX: 1ffffffff0dcf400 RSI: 0000003b6e1f5873 RDI: ffffffff86e7a000 [ 251.943183][T13228] RBP: ffffc90001e27500 R08: ffffffff86e7a008 R09: ffffffff86e7a018 [ 251.951255][T13228] R10: ffffffff86e7a01c R11: ffffffff86e7a003 R12: ffffc90001e27460 [ 251.959465][T13228] R13: 0000000000000030 R14: 1ffff920003c4e88 R15: dffffc0000000000 [ 251.967532][T13228] FS: 00007f425fac86c0(0000) GS:ffff8881f7000000(0000) knlGS:0000000000000000 [ 251.976811][T13228] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 251.983575][T13228] CR2: 00002000007a517f CR3: 000000011a5c0000 CR4: 00000000003506b0 [ 251.991730][T13228] DR0: 0000000000000000 DR1: 000000000000000a DR2: 000000000000000a [ 251.999783][T13228] DR3: 000000000000000a DR6: 00000000ffff0ff0 DR7: 0000000000000600 [ 252.007933][T13228] Call Trace: [ 252.011329][T13228] ? perf_pending_event+0x560/0x560 [ 252.016763][T13228] ? __perf_event_account_interrupt+0x102/0x2c0 [ 252.023129][T13228] ? __perf_event_account_interrupt+0x102/0x2c0 [ 252.029460][T13228] ? __perf_event_account_interrupt+0x1a4/0x2c0 [ 252.035904][T13228] __perf_event_overflow+0x1b3/0x340 [ 252.041217][T13228] perf_swevent_event+0x2f7/0x530 [ 252.046353][T13228] ___perf_sw_event+0x3aa/0x4d0 [ 252.051211][T13228] ? perf_swevent_put_recursion_context+0xb0/0xb0 [ 252.057715][T13228] ? __irq_exit_rcu+0x40/0x150 [ 252.062887][T13228] ? irq_exit_rcu+0x9/0x10 [ 252.067472][T13228] ? sysvec_apic_timer_interrupt+0xcb/0xe0 [ 252.073576][T13228] ? asm_sysvec_apic_timer_interrupt+0x12/0x20 [ 252.080032][T13228] __perf_sw_event+0x134/0x270 [ 252.084860][T13228] do_user_addr_fault+0xc76/0xc90 [ 252.089895][T13228] ? sched_clock_cpu+0x1b/0x3d0 [ 252.094755][T13228] ? do_kern_addr_fault+0x80/0x80 [ 252.099892][T13228] ? __irq_exit_rcu+0x40/0x150 [ 252.104758][T13228] ? irq_exit_rcu+0x9/0x10 [ 252.109203][T13228] ? sysvec_apic_timer_interrupt+0xcb/0xe0 [ 252.115007][T13228] exc_page_fault+0x5a/0xc0 [ 252.119570][T13228] asm_exc_page_fault+0x1e/0x30 [ 252.124763][T13228] RIP: 0010:__get_user_nocheck_1+0x6/0x10 [ 252.130473][T13228] Code: d0 73 64 48 19 d2 48 21 d0 0f 01 cb 48 8b 10 31 c0 0f 01 ca c3 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 0f 01 cb 0f ae e8 <0f> b6 10 31 c0 0f 01 ca c3 90 0f 01 cb 0f ae e8 0f b7 10 31 c0 0f [ 252.150161][T13228] RSP: 0018:ffffc90001e27a40 EFLAGS: 00050287 [ 252.156228][T13228] RAX: 00002000007a517f RBX: 0000000000000000 RCX: ffff88811e16e2c0 [ 252.164431][T13228] RDX: 0000000000000002 RSI: 00000000000000ff RDI: 0000000000001000 [ 252.172659][T13228] RBP: ffffc90001e27a90 R08: ffff88811e16e2c0 R09: 0000000000000002 [ 252.180758][T13228] R10: 0000000000000040 R11: 0000000000000002 R12: 00002000007a517f [ 252.189075][T13228] R13: 00000000000000ff R14: 00002000007a5180 R15: 00000000ffffffff [ 252.197503][T13228] ? iov_iter_fault_in_readable+0x19f/0x320 [ 252.203481][T13228] generic_perform_write+0x1ab/0x540 [ 252.208757][T13228] ? atime_needs_update+0x5b0/0x5b0 [ 252.213952][T13228] ? grab_cache_page_write_begin+0xb0/0xb0 [ 252.219747][T13228] ? file_remove_privs+0x5b0/0x5b0 [ 252.224941][T13228] __generic_file_write_iter+0x24b/0x480 [ 252.230670][T13228] ? generic_write_checks+0x3b3/0x480 [ 252.236134][T13228] generic_file_write_iter+0xa9/0x1d0 [ 252.241590][T13228] vfs_write+0x758/0xdc0 [ 252.245928][T13228] ? kernel_write+0x3c0/0x3c0 [ 252.250844][T13228] ? mutex_trylock+0xa0/0xa0 [ 252.255904][T13228] ? __fdget_pos+0x2d2/0x380 [ 252.260754][T13228] ? ksys_write+0x71/0x250 [ 252.265227][T13228] ksys_write+0x149/0x250 [ 252.269549][T13228] ? __ia32_sys_read+0x90/0x90 [ 252.274310][T13228] ? asm_sysvec_apic_timer_interrupt+0xa/0x20 [ 252.280461][T13228] ? __kasan_check_read+0x11/0x20 [ 252.285478][T13228] __x64_sys_write+0x7b/0x90 [ 252.290097][T13228] do_syscall_64+0x31/0x40 [ 252.294595][T13228] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 252.300571][T13228] RIP: 0033:0x7f426106d819 [ 252.304992][T13228] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 252.324625][T13228] RSP: 002b:00007f425fac8028 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 252.333220][T13228] RAX: ffffffffffffffda RBX: 00007f42612e6fa0 RCX: 00007f426106d819 [ 252.341444][T13228] RDX: 0000000013bb711e RSI: 0000200000000180 RDI: 000000000000000b [ 252.349528][T13228] RBP: 00007f4261103c91 R08: 0000000000000000 R09: 0000000000000000 [ 252.357583][T13228] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 252.365724][T13228] R13: 00007f42612e7038 R14: 00007f42612e6fa0 R15: 00007ffda46a4368 [ 252.373788][T13228] Modules linked in: [ 252.378011][T13228] ---[ end trace 5a8b62a9e88ff76d ]--- [ 252.383641][T13228] RIP: 0010:bpf_overflow_handler+0x246/0x370 [ 252.383684][ T24] audit: type=1400 audit(1776884928.380:172): avc: denied { read } for pid=77 comm="syslogd" name="log" dev="sda1" ino=2010 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 252.389900][T13228] Code: 3b 00 74 0a 48 8b 7c 24 10 e8 26 64 1a 00 48 8b 44 24 10 4c 8b 28 49 8d 45 38 48 89 44 24 18 49 83 c5 30 4c 89 e8 48 c1 e8 03 <42> 80 3c 38 00 74 08 4c 89 ef e8 fb 63 1a 00 4c 89 e7 48 8b 74 24 [ 252.389908][T13228] RSP: 0018:ffffc90001e27400 EFLAGS: 00010206 [ 252.389921][T13228] RAX: 0000000000000006 RBX: 1ffff1102330f779 RCX: 00000000000000ff [ 252.389930][T13228] RDX: 1ffffffff0dcf400 RSI: 0000003b6e1f5873 RDI: ffffffff86e7a000 [ 252.389938][T13228] RBP: ffffc90001e27500 R08: ffffffff86e7a008 R09: ffffffff86e7a018 [ 252.389946][T13228] R10: ffffffff86e7a01c R11: ffffffff86e7a003 R12: ffffc90001e27460 [ 252.389955][T13228] R13: 0000000000000030 R14: 1ffff920003c4e88 R15: dffffc0000000000 [ 252.389965][T13228] FS: 00007f425fac86c0(0000) GS:ffff8881f7000000(0000) knlGS:0000000000000000 [ 252.389973][T13228] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 252.390010][T13228] CR2: 00002000007a517f CR3: 000000011a5c0000 CR4: 00000000003506b0 [ 252.412656][ T24] audit: type=1400 audit(1776884928.380:173): avc: denied { search } for pid=77 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 252.432179][T13228] DR0: 0000000000000000 DR1: 000000000000000a DR2: 000000000000000a [ 252.432187][T13228] DR3: 000000000000000a DR6: 00000000ffff0ff0 DR7: 0000000000000600 [ 252.432194][T13228] Kernel panic - not syncing: Fatal exception [ 252.432593][T13228] Kernel Offset: disabled [ 252.552271][T13228] Rebooting in 86400 seconds..