last executing test programs: 3.403787552s ago: executing program 1 (id=5049): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'syzkaller0\x00', 0xca58c30f81b6079f}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)) (async) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x1c1842, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000002c0)={'syzkaller0\x00', 0x7101}) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=@base={0xa, 0x3, 0x2, 0x3, 0x0, 0xffffffffffffffff, 0x3}, 0x50) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)) (async) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={0xffffffffffffffff, 0x18000000000002a0, 0x0, 0x0, &(0x7f00000000c0), 0x0, 0x100, 0x2000000, 0xd384ed8852b2f03d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x50) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'ip6tnl0\x00', 0x200}) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x15, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x41000, 0x52, '\x00', 0x0, @sk_reuseport=0x27, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2, 0x0, &(0x7f0000000200)=[{0x4, 0x5, 0x10, 0x4}, {0x80000, 0x4, 0xc, 0x6}], 0x10, 0x800}, 0x94) (async) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x15, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x41000, 0x52, '\x00', 0x0, @sk_reuseport=0x27, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2, 0x0, &(0x7f0000000200)=[{0x4, 0x5, 0x10, 0x4}, {0x80000, 0x4, 0xc, 0x6}], 0x10, 0x800}, 0x94) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x89f3, &(0x7f0000000080)) (async) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x89f3, &(0x7f0000000080)) r5 = openat$cgroup_int(r3, &(0x7f0000000240)='cpuset.mems\x00', 0x2, 0x0) write$cgroup_subtree(r5, &(0x7f0000000080)=ANY=[@ANYBLOB='1-6:5/', @ANYRESOCT], 0x31) (async) write$cgroup_subtree(r5, &(0x7f0000000080)=ANY=[@ANYBLOB='1-6:5/', @ANYRESOCT], 0x31) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000000600)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x50) close(0x3) (async) close(0x3) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="05000000040000000800000005"], 0x48) (async) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="05000000040000000800000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000001400)={0x11, 0x15, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000002000000000000000000000018110000", @ANYRES32=r6, @ANYBLOB="0000000000000000b7080000070000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000025000000850000008200000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000090000017b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], &(0x7f0000000440)='GPL\x00', 0x0, 0x0, 0x0, 0x61800, 0x0, '\x00', 0x0, @fallback=0x29, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000001400)={0x11, 0x15, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000002000000000000000000000018110000", @ANYRES32=r6, @ANYBLOB="0000000000000000b7080000070000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000025000000850000008200000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000090000017b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], &(0x7f0000000440)='GPL\x00', 0x0, 0x0, 0x0, 0x61800, 0x0, '\x00', 0x0, @fallback=0x29, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_BIND_MAP(0xa, &(0x7f00000004c0)={r7, r6}, 0xc) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000340), 0xfffffffffffffe19, 0x0, 0xffffffffffffffff, 0x54}, 0x42) perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0xda, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x2) (async) r8 = perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0xda, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x2) r9 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x5, 0x13, &(0x7f0000000340)=ANY=[@ANYBLOB="18000000000000000000000000000080180100002020702500000000002020207b0af8ff00000000bda107000000000007010000f8ffffffb702000008000000b703000000000000850000000500000018010000202070250000000000202020db1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000400000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) ioctl$PERF_EVENT_IOC_SET_BPF(r8, 0x40042408, r9) r10 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) write$cgroup_subtree(r10, &(0x7f0000000140)=ANY=[], 0xfffffdef) perf_event_open(&(0x7f00000010c0)={0x2, 0x80, 0xb9, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xc, 0x7}, 0x8601, 0x2000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) r11 = perf_event_open(&(0x7f00000010c0)={0x2, 0x80, 0xb9, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xc, 0x7}, 0x8601, 0x2000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r12 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000000b00)=ANY=[@ANYBLOB], &(0x7f0000000000)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r11, 0x40042408, r12) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x10020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 3.339396114s ago: executing program 4 (id=5051): r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x11, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1805000000000000000000004b64ffec850000007d000000850000000700000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$PROG_BIND_MAP(0xa, &(0x7f00000004c0)={r0}, 0xc) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.current\x00', 0x275a, 0x0) (async) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.current\x00', 0x275a, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000180)={0x0, r1, 0x0, 0x0, 0x0}, 0x30) openat$cgroup_subtree(r1, &(0x7f0000000580), 0x2, 0x0) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000040)={0x0, 0x0}) (async) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000040)={0x0, 0x0}) close(r2) bpf$TOKEN_CREATE(0x24, &(0x7f0000000200)={0x0, r2}, 0x8) (async) bpf$TOKEN_CREATE(0x24, &(0x7f0000000200)={0x0, r2}, 0x8) setsockopt$sock_attach_bpf(r3, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000040)={0x0, 0x0}) sendmsg$unix(0xffffffffffffffff, &(0x7f0000001e80)={&(0x7f0000000180)=@abs={0x1, 0x5c, 0x1}, 0x6e, 0x0}, 0x20000) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000740)={r1, 0xe0, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000000240)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x8, 0x4, &(0x7f0000000440)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000480)=[0x0, 0x0, 0x0, 0x0], 0x0, 0xd5, &(0x7f00000004c0)=[{}, {}, {}, {}, {}, {}, {}], 0x38, 0x10, &(0x7f0000000500), &(0x7f0000000540), 0x8, 0x2c, 0x8, 0x8, &(0x7f0000000400)}}, 0x10) (async) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000740)={r1, 0xe0, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000000240)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x8, 0x4, &(0x7f0000000440)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000480)=[0x0, 0x0, 0x0, 0x0], 0x0, 0xd5, &(0x7f00000004c0)=[{}, {}, {}, {}, {}, {}, {}], 0x38, 0x10, &(0x7f0000000500), &(0x7f0000000540), 0x8, 0x2c, 0x8, 0x8, &(0x7f0000000400)}}, 0x10) close(r4) (async) close(r4) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0xd, 0x5, &(0x7f0000000040)=ANY=[@ANYBLOB="750a01000000000061119c0000000000180000000000000000000000000000009500000000000000"], &(0x7f0000000000)='GPL\x00'}, 0x80) openat$ppp(0xffffffffffffff9c, &(0x7f00000003c0), 0x100, 0x0) perf_event_open(&(0x7f00000005c0)={0x1, 0x80, 0x0, 0x0, 0x4, 0x0, 0x0, 0xae9, 0x30, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) perf_event_open(&(0x7f00000005c0)={0x1, 0x80, 0x0, 0x0, 0x4, 0x0, 0x0, 0xae9, 0x30, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000010c0)={0x2, 0x80, 0xb9, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xc, 0x7}, 0x410, 0x2000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000680)=ANY=[@ANYBLOB="0a00000016000000b40000000300000000000000", @ANYRES32, @ANYBLOB="000040000000000000000000ed7e99c9aff9d416", @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x50) (async) bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000680)=ANY=[@ANYBLOB="0a00000016000000b40000000300000000000000", @ANYRES32, @ANYBLOB="000040000000000000000000ed7e99c9aff9d416", @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x50) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)) (async) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)) openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) r5 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000000)={0x3, 0x4, 0x4, 0xa, 0x0, 0x1}, 0x48) bpf$OBJ_PIN_MAP(0x9, &(0x7f0000000040)=@generic={0x0, r5}, 0x18) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000000180), 0xfffffffffffffeae) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000000c0)) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x55, 0x1, 0x0, 0x0, 0x0, 0x100d, 0x2000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, @perf_config_ext={0x2, 0xff}, 0x1e51, 0x1, 0x0, 0x7, 0x4, 0x0, 0x2000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x55, 0x1, 0x0, 0x0, 0x0, 0x100d, 0x2000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, @perf_config_ext={0x2, 0xff}, 0x1e51, 0x1, 0x0, 0x7, 0x4, 0x0, 0x2000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x4a, 0x5, 0x0, 0x0, 0x0, 0x200000000000f, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x1, @perf_bp={0x0, 0x4}, 0x0, 0x1, 0x0, 0x4, 0x0, 0x2, 0x2000, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x9, 0xe, &(0x7f0000002380)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000002300)={r7, 0x18000000000002a0, 0xf, 0x0, &(0x7f0000000140)="b9ff0300600d698cff9e14f008004d", 0x0, 0xe00, 0x60000000, 0x0, 0x0, 0x0, 0x0}, 0x50) (async) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000002300)={r7, 0x18000000000002a0, 0xf, 0x0, &(0x7f0000000140)="b9ff0300600d698cff9e14f008004d", 0x0, 0xe00, 0x60000000, 0x0, 0x0, 0x0, 0x0}, 0x50) sendmsg$tipc(r6, &(0x7f0000000240)={0x0, 0x0, 0x0}, 0x80) 3.065358493s ago: executing program 4 (id=5053): perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x1c, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x10c002, 0xac5d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x3, &(0x7f0000000440)=@framed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x1e, 0x11, 0x0, &(0x7f0000000040)='GPL\x00', 0xffff68e8, 0x36, &(0x7f0000000240)=""/54, 0x41100, 0x0, '\x00', 0x0, @sk_lookup, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x2}, 0x94) bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x13, 0x10, 0x2}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x11, 0x0, 0x0, 0x0, 0x4, 0xee, &(0x7f0000000340)=""/238}, 0x94) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)) bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x13, 0x10, 0x2, 0x0, 0x2101}, 0x50) socketpair(0x2a, 0x1, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f00000004c0)={0x0, 0x0, 0x0, &(0x7f0000000740), 0x20075}, 0x38) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000300)={0xffffffffffffffff, &(0x7f00000002c0), &(0x7f0000000500)=""/204}, 0x20) perf_event_open(&(0x7f00000010c0)={0x2, 0x80, 0xb9, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @perf_config_ext={0x8000c, 0x8}, 0x410, 0x2000001, 0xfffffffc, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETOFFLOAD(r0, 0xc004743e, 0x110e22fff6) close(r0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="1b0000000000000000000000000004"], 0x48) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x8, 0x830d}, 0x0, 0x2, 0xffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000002c40)={0x10, 0x17, &(0x7f0000000140)=ANY=[@ANYBLOB="180000000c000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b702000014000000b703000000000000850000007b000000bf09000000000000550901000074f6967d00000000000000180100002020702500000000002020207baaf8ff00000000bda100000000000027010000f8ffffffb702000008000000b7030000000000002500000006000000be91000000000000b502ecffffff00008500000005000000b70000000000000095"], &(0x7f00000002c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sk_msg, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) 2.667812555s ago: executing program 3 (id=5056): perf_event_open(&(0x7f0000002100)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x8, 0xa0100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8, 0x6}, 0x0, 0x0, 0x80000001, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000005c0)=@base={0x15, 0x0, 0x8, 0x60bb}, 0x50) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000002ec0)=ANY=[@ANYBLOB], 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x18000000000002a0, 0x0, 0x0, 0x0, 0x0, 0x24, 0x60000000, 0x0, 0x0, &(0x7f0000000000), 0x0}, 0x50) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x10020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000010c0)={0x2, 0x80, 0xb9, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xc, 0x7}, 0x414, 0x2000000, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) socketpair(0x1e, 0x1, 0x0, 0x0) close(0xffffffffffffffff) r2 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000bc0)=@bpf_tracing={0x1a, 0x6, &(0x7f00000001c0)=ANY=[@ANYBLOB="1800000008000000000000f4fe00000018200000", @ANYRES32=r0, @ANYBLOB="00000000060000006f030400010000009500000000000000"], &(0x7f0000000680)='GPL\x00', 0x2, 0xbe, &(0x7f00000008c0)=""/190, 0x40f00, 0x6, '\x00', 0x0, 0x1c, 0xffffffffffffffff, 0x8, &(0x7f0000000ac0)={0x0, 0x2}, 0x8, 0x10, 0x0, 0x0, 0x160d0, r1, 0x6, &(0x7f0000000b00)=[0xffffffffffffffff, 0xffffffffffffffff, r0, r0, r0], &(0x7f0000000b40)=[{0x3, 0x3, 0xa, 0xa}, {0x4, 0x3, 0x0, 0x9}, {0x0, 0x4, 0x10}, {0x2, 0x1, 0x7, 0x4}, {0x2, 0x5, 0xb, 0x2}, {0x1, 0x2, 0x7, 0x4}], 0x10, 0xb4}, 0x94) bpf$BPF_PROG_TEST_RUN(0x1c, &(0x7f0000000240)={r2, 0x10, 0x25, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) r3 = bpf$ITER_CREATE(0xb, &(0x7f0000000100), 0x0) r4 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000003c0)=@bpf_lsm={0x1e, 0x3, &(0x7f00000000c0)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24}, 0x80) bpf$LINK_GET_NEXT_ID(0x1f, &(0x7f0000000d00)={0x0, 0x0}, 0x8) r6 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000000)=r5, 0x4) bpf$LINK_DETACH(0x22, &(0x7f0000000300)=r6, 0x4) close(0x3) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_LINK_UPDATE(0x1d, &(0x7f0000000040)={r6, r4, 0x0, r3}, 0x10) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x10f, 0x87, 0x0, 0x0) close(0xffffffffffffffff) syz_clone(0x40042700, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000280)={0x0, 0x3, 0x18}, 0xc) r7 = syz_clone(0xa00000, &(0x7f0000000300)="7f4d7d9e3edcf68c66bf718aa43c086e5e489355a61d804853278fdf2cecfbfa33d446a54b1a771a2253c649f42f1a85c483d3ee0dafcbb351404bfb0e33f9d20d934d42c13e576f1e4c94f5d309c3cb9ccd4f3215b4e89d7d51f2cf3ed0f87a4d0f591b3e5ed1ef7a548ef1cf1d381255697c707c6af3dca836d2c64fd101870b5577724c48ac5cfb67f2278109c7ff022f2cd0ccfa594b5da32cb1d6df3989f4612eceec3f229eb330b50a9f6344bb43953bf2481d8ccd2a165870da017f192578657194719eae91562b6ffa674033c181a28d", 0xd4, &(0x7f0000000400), &(0x7f0000000440), &(0x7f0000000480)="b4e778612031294f1866b8b889370c84e3da7e7b4065db098f88e4953f70590b2de03c8a3014ada23ebae0d011ea7575a09fa42770e82e7e0f0f5991ac36dfe6c464cb04104530da803d7fd628a90be074735ac518e34e52b744a955ca745b8eea8aba541f3deaff8e3b8f909d66dc490edfd7b3dfdcb048c9b16b93") syz_open_procfs$namespace(r7, &(0x7f0000000580)='ns/user\x00') bpf$MAP_CREATE(0x0, &(0x7f0000000500)=ANY=[@ANYBLOB="0600000004000000040000000600000000000000", @ANYRES32=0x1, @ANYBLOB="00003ba32b3b96f4513005000000000000000000", @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x14, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000000000000000000000000001801000020646c2100000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000001000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) close(0x3) 2.118750423s ago: executing program 1 (id=5063): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0xc, 0x1c, &(0x7f0000000400)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000083000000bf090000000000001509010000000000b500f8ffffff000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b702000000a36c00850000001700000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000082000000bf91000000000000b7020000000000008500000084000000b70000000000000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x8, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000003c0)={0x3, 0x4, &(0x7f0000000180)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@call={0x85, 0x0, 0x0, 0x29}]}, &(0x7f0000000500)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0xb, '\x00', 0x0, @sched_cls=0x37, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.net/syz1\x00', 0x200002, 0x0) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140), 0x8000, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f00000001c0)={'hsr0\x00', 0x2000}) openat$cgroup_type(r1, &(0x7f0000001140), 0x2, 0x0) mkdirat$cgroup(r1, &(0x7f0000000040)='syz0\x00', 0x1ff) 2.108939163s ago: executing program 4 (id=5064): r0 = perf_event_open(&(0x7f0000000fc0)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x9, 0xf6103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x24000000, 0x0, @perf_bp={0x0, 0x8}, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000f00000018010000646c6c2500000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0xffb}, 0x94) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000540)=ANY=[@ANYBLOB="1b00000000000000000000000080000000000000", @ANYRES8, @ANYBLOB="f9ffffffffffffffdcd5635f2e", @ANYRES8], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x30, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r2) perf_event_open(&(0x7f00000010c0)={0x2, 0x80, 0xb9, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xc, 0x7}, 0x410, 0x2000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = perf_event_open(&(0x7f00000010c0)={0x2, 0x80, 0xb9, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xc, 0x7}, 0x410, 0x2000000, 0x0, 0x5}, 0x0, 0xffffffffffffffff, r0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x40082406, &(0x7f0000000180)='cpu==0||!') r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000380)={r1, &(0x7f0000000280)="ac4eeaff4339f2a082ff5ea6e1e3d52f8860427e67d49a2cf7fedce2ab9fa10a067e5e1fa69d233cc8d9befc3e1f67c5ea4997ade1d6ed5fb30be10576df308fcd51ced5e8984cd50ac318080e8668a171e09595e2a489e629371e3a9ced94c41d004f6e703cfa093faa3b", &(0x7f0000000300)=""/98}, 0x20) write$cgroup_type(r4, &(0x7f0000000180), 0xfffffe51) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000200)={@cgroup=r4, 0x31, 0x1, 0x5, &(0x7f0000000000)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x5, 0x0, &(0x7f0000000040)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000080)=[0x0], &(0x7f00000001c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, 0x40) syz_clone(0x40800000, 0x0, 0x0, 0x0, 0x0, 0x0) 1.643551638s ago: executing program 1 (id=5070): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x3, 0x16, &(0x7f0000000140)=ANY=[@ANYBLOB="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"/1546], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sched_cls, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0xffffffffffffffd2}, 0x48) (async) r1 = bpf$ITER_CREATE(0x21, &(0x7f0000000040), 0x8) (async) r2 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) (async) r3 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000340)=ANY=[@ANYBLOB="9feb010018000000000000003c0000003c0000000200000000000000020000040800000000000000"], 0x0, 0x56}, 0x28) (async) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000880)={0xffffffffffffffff, 0xe0, &(0x7f0000000780)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000000500)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f0000000540), &(0x7f0000000580)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x96, &(0x7f00000005c0)=[{}, {}, {}, {}], 0x20, 0x10, &(0x7f00000006c0), 0x0, 0x0, 0xe4, 0x8, 0x0, 0x0}}, 0x10) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000017c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x0, '\x00', r4, r3, 0x0, 0x1}, 0x50) (async) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000cc0)=@bpf_lsm={0x1d, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x41000, 0x44, '\x00', r4, 0x1b, r2, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000bc0)={0x1, 0x0, 0x8, 0x18000000}, 0x10, 0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000c40), 0x10, 0x37}, 0x94) (async) r5 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000980)=@o_path={&(0x7f0000000940)='./file0\x00', 0x0, 0x18, r0}, 0x18) r6 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000a00)=@o_path={&(0x7f00000009c0)='./file0\x00', 0x0, 0x4000, r0}, 0x18) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a80)={0x6, 0xd, &(0x7f0000000780)=@raw=[@snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x59}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r1}}], &(0x7f0000000800)='syzkaller\x00', 0x6, 0x62, &(0x7f0000000840)=""/98, 0x41100, 0x20, '\x00', r4, 0x25, 0xffffffffffffffff, 0x8, &(0x7f00000008c0)={0x2, 0x5}, 0x8, 0x10, &(0x7f0000000900)={0x3, 0x7, 0x1, 0x3}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000a40)=[r5, 0xffffffffffffffff, r6], 0x0, 0x10, 0x80000001}, 0x94) (async) r7 = perf_event_open(&(0x7f0000000fc0)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x6, 0xf6103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x24000000, 0x0, @perf_bp={0x0, 0x8}, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) r8 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="1b00000000000000000000000080000000000000", @ANYRES32, @ANYBLOB='\x00'/16, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) (async) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000300)=ANY=[@ANYBLOB="9feb0100180000000000000040000000400000000200000000000000000000030000000002000000020000000000e800000000000000000105000000080000000000000001000085000000210000000001"], 0x0, 0x5a}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r8, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000002010000850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r9 = bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r7, 0x40042408, r9) syz_clone(0xc2002000, 0x0, 0x0, 0x0, 0x0, 0x0) 1.487605863s ago: executing program 3 (id=5073): openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r0 = perf_event_open(&(0x7f00000001c0)={0x5, 0x80, 0x60, 0x0, 0x1, 0x6, 0x0, 0x5, 0x10, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0xfffffffa, 0x6, @perf_bp={0x0, 0xc}, 0xd213, 0xce65, 0x8000, 0x0, 0x1, 0x81, 0x0, 0x0, 0x9, 0x0, 0x9}, 0xffffffffffffffff, 0x5, 0xffffffffffffffff, 0xa) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000040)={0x0, 0x0}) close(r1) recvmsg(r2, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000480)=[{&(0x7f00000003c0)=""/190, 0xbe}], 0x1, &(0x7f0000000500)=""/199, 0xc7}, 0x140) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="02000000040000000400000009"], 0x48) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0xd, 0x6, 0x4, 0x1, 0x1, r3}, 0x50) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000008c0)={{r4, 0xffffffffffffffff}, &(0x7f0000000840), &(0x7f0000000880)=r3}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000e80)={r5, &(0x7f0000000d40), 0x0}, 0x20) ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x1ff) bpf$MAP_CREATE(0x0, 0x0, 0x50) perf_event_open(&(0x7f00000010c0)={0x2, 0x80, 0xb9, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @perf_bp={0x0}, 0x410, 0x2000001, 0x0, 0x8, 0x101}, 0x0, 0xffffffffffffffff, r0, 0x0) socketpair(0x1, 0x1, 0x2, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x20, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7, 0x80}, 0x0, 0x1, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000040)={0x0, 0x0}) close(r7) setsockopt$sock_attach_bpf(r8, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[], 0x48) bpf$PROG_LOAD(0x2, 0x0, 0x0) sendmsg$sock(r8, 0x0, 0x20040851) r9 = bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x1c, 0xd, 0x0, &(0x7f0000000180)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x8, '\x00', 0x0, @fallback=0x11, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000040)={0x0, 0x0}) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="1e0000003dc7000002"], 0x48) setsockopt$sock_attach_bpf(r8, 0x10f, 0x87, &(0x7f00000000c0)=r9, 0x4) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000040)={0x0, 0x0}) close(r10) setsockopt$sock_attach_bpf(r11, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) ioctl$TUNSETLINK(0xffffffffffffffff, 0x541b, 0x200000000000) ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x8983, &(0x7f0000000080)) syz_clone(0x640c7000, 0x0, 0x0, 0x0, 0x0, 0x0) 1.487340883s ago: executing program 1 (id=5074): socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x50) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x11, 0x10, &(0x7f0000000400)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x2}, {{0x18, 0x1, 0x1, 0x0, r1}}, {}, [@call={0x85, 0x0, 0x0, 0x2a}], {{}, {}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x33, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000240)={r2, 0xfca804a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) r3 = getpid() sendmsg$unix(r0, &(0x7f0000005740)={0x0, 0x0, 0x0, 0x0, &(0x7f0000005700)=[@rights={{0x14, 0x1, 0x1, [r0]}}, @cred={{0x1c, 0x1, 0x2, {r3, 0xee01, 0xee00}}}], 0x38, 0x1}, 0x80) perf_event_open(&(0x7f0000001480)={0x2, 0x80, 0x82, 0x1, 0x0, 0x0, 0x0, 0x0, 0x84204, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x20000000}, 0x4, 0x0, 0x0, 0x0, 0x0, 0xd, 0x80, 0x0, 0x1}, r3, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x6, 0xb, &(0x7f0000000540)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000002000000b7030000fdffffff850000007100000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @xdp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r5 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000740)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0x0}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x5, 0x10, &(0x7f0000000180)=@framed={{0x18, 0x8}, [@tail_call={{0x18, 0x2, 0x1, 0x0, r5}, {}, {}, {0x7, 0x0, 0xb, 0x9}}, @printk={@p, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x76}}]}, &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000140)={0x1e, 0x4, &(0x7f0000000000)=@framed={{}, [@ldst={0x1, 0x0, 0x3, 0x2, 0x1, 0xc}]}, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24}, 0x80) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xb3, 0x2, 0x0, 0x0, 0x0, 0x80000000000, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000, 0x0, @perf_config_ext={0xfffffffffffff091, 0x2}, 0x10c42a, 0x900000000000100, 0x7, 0x5, 0x0, 0x200000, 0x0, 0x0, 0x8000, 0x1d3}, 0x0, 0x0, 0xffffffffffffffff, 0x8) r6 = bpf$TOKEN_CREATE(0x24, &(0x7f0000000280), 0x8) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x4, [@volatile={0x2, 0x0, 0x0, 0x9, 0x5}]}, {0x0, [0x2e, 0x61]}}, &(0x7f0000000080)=""/210, 0x28, 0xd2, 0x1, 0x8, 0x10000, @value=r6}, 0x28) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000010c0)={{r5}, &(0x7f0000001040), &(0x7f0000001080)=r4}, 0x20) 1.385306206s ago: executing program 2 (id=5075): socketpair(0x1, 0x1, 0x0, 0x0) r0 = bpf$MAP_CREATE_TAIL_CALL(0x0, 0x0, 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x3, 0x8, &(0x7f0000000d80)=ANY=[@ANYBLOB="1800000000000000000000000000000018020000", @ANYRES32=r0, @ANYBLOB="0000000000000000b703000000000000850000000d000000b70000000000000095"], &(0x7f00000000c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sched_cls, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0xc1) bpf$MAP_CREATE(0x0, &(0x7f00000006c0)=@base={0xb, 0x5, 0x10001, 0xa, 0x1, 0xffffffffffffffff, 0x3}, 0x50) bpf$MAP_CREATE(0x0, &(0x7f00000013c0)=ANY=[@ANYBLOB="0b00000005000000000400000900000001"], 0x48) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x62a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x100000000}}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000ac0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="16000000000000000400000001"], 0x50) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0, 0x0, 0x0, 0x0, 0x41100}, 0x94) r3 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x56, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}, 0x100011, 0x0, 0x0, 0x0, 0x0, 0xffff8001}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x5, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1d, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r3, 0x40042408, r4) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x56, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$tipc(0x1e, 0x4, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$tipc(r6, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f0000000040)="fb6bba8839fe8bc048c0cdafd1f8a9918bc4055eaaeb6db4ee9bcb25b1811dbf40b3a7", 0x23}], 0x1}, 0x20000000) recvmsg(r5, &(0x7f0000000740)={0x0, 0x0, &(0x7f0000000800)=[{&(0x7f0000000780)=""/54, 0x36}], 0x1}, 0x2020) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_BIND_MAP(0xa, &(0x7f0000001880)={r7}, 0xc) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000600)={0xd, 0x3, &(0x7f0000000000)=ANY=[@ANYBLOB="720ac4ff000000007110a900000000009500000000000000"], &(0x7f0000000480)='GPL\x00'}, 0x80) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x18000000000002a0, 0x2d1, 0xfffffffffffffd85, &(0x7f00000000c0)="b9ff03030018698cb89e40f086dd6000000e00002100630677", 0x0, 0x100, 0x2000000, 0x0, 0x0, &(0x7f0000000440)}, 0x28) syz_open_procfs$namespace(0x0, &(0x7f0000000580)='ns/pid_for_children\x00') openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000500)='memory.stat\x00', 0x26e1, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000140)={0x1e, 0x4, &(0x7f0000000000)=@framed={{}, [@ldst={0x1, 0x0, 0x3, 0x2, 0x1, 0xc}]}, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24}, 0x80) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)) socketpair$tipc(0x1e, 0x2, 0x0, 0x0) r8 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="02000000040000000800000001"], 0x48) bpf$MAP_LOOKUP_ELEM(0x5, &(0x7f00000000c0)={r8, &(0x7f0000000000), &(0x7f0000000040)=""/73}, 0x70) 1.345475987s ago: executing program 0 (id=5076): bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x12, 0x4, &(0x7f0000000340)=ANY=[@ANYBLOB="1800000001000000000000000000000071180a000000000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @cgroup_sock_addr=0x14, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) 1.297298909s ago: executing program 1 (id=5077): perf_event_open(&(0x7f0000000fc0)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x400, 0xf6103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x24000000, 0x0, @perf_bp={0x0, 0x8}, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='blkio.bfq.io_serviced\x00', 0x26e1, 0x0) r1 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000280)=@bpf_lsm={0x6, 0x3, &(0x7f00000003c0)=ANY=[@ANYBLOB="18000000003f000000000000000000f195"], &(0x7f0000000140)='GPL\x00'}, 0x27) r2 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xe4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1}, 0x0, 0x0, 0xc2ba, 0x0, 0x4000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, 0x0, &(0x7f0000000000)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r3) sendmsg$inet(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001d80)=ANY=[@ANYBLOB="28010000000000000100000001"], 0x128}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001480)={0xffffffffffffffff}) recvmsg$unix(r4, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x60}, 0x40002002) r5 = bpf$ITER_CREATE(0xb, &(0x7f0000000100)={r0}, 0x8) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="0700000004000000080000000100000000000000", @ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00', @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x6, 0x5, &(0x7f00000002c0)=ANY=[@ANYBLOB="1800000008000000000000005805000018100000", @ANYRES32=r6, @ANYBLOB="000000000000000095"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0x30, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) close(r5) bpf$BPF_PROG_TEST_RUN(0x1c, &(0x7f0000000240)={r1, 0x8, 0x25, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) bpf$BPF_LINK_UPDATE(0x1d, &(0x7f0000000500)={r5, r7, 0x4, r1}, 0x10) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0xda, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xae9, 0x30, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000010c0)={0x2, 0x80, 0xb9, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xc, 0x7}, 0x410, 0x2000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 1.235519651s ago: executing program 0 (id=5078): r0 = perf_event_open(&(0x7f0000000340)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x21, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x400, 0x0, 0x8, 0x0, 0xffffffff}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x3, 0xe, &(0x7f0000001540)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sched_cls, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x200000, 0x10, &(0x7f0000000000), 0x143}, 0x48) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000001a80)=ANY=[@ANYBLOB="0e000000040000000800000008"], 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r2 = perf_event_open(&(0x7f0000000fc0)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x400, 0xf6103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, @perf_bp={0x0, 0x8}, 0x40, 0x0, 0x0, 0x0, 0x7, 0x0, 0xffff}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) perf_event_open(&(0x7f00000002c0)={0x5, 0x80, 0x8, 0x3, 0x4, 0x1a, 0x0, 0x7f, 0x33010, 0x7, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x8, 0x0, @perf_config_ext={0xc63d, 0x2}, 0x80, 0x42, 0x3, 0x8, 0x9, 0x74, 0xe4, 0x0, 0x1000, 0x0, 0x8000000000000000}, 0x0, 0x5, r0, 0x3) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000001c0)={0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0xf}, 0x94) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_UPDATE_CONST_STR(0x2, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r3) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x2f, 0x0, 0x0) syz_clone(0x8010e000, 0x0, 0x0, 0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) socketpair(0x1e, 0x1, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x10f, 0x88, 0x0, 0x0) syz_clone(0x40200400, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) socketpair(0x15, 0x6, 0xff53, &(0x7f0000000040)) 1.109796285s ago: executing program 2 (id=5079): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="1200000004000000080000000280"], 0x50) syz_clone(0xc0126080, 0x0, 0x0, &(0x7f0000002100), 0x0, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f00000001c0)={r0, 0x0, 0x0}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f0000000c40)={0x7, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000fdffffde18000000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000003800000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x28, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3eb4}, 0x94) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400), 0x20, 0x0) perf_event_open(&(0x7f0000000240)={0x2, 0x80, 0x9a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x208, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x4f, 0x50d}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000000c0)={'pim6reg0\x00', 0x2}) ioctl$TUNGETVNETLE(r1, 0x800454dd, 0x0) r2 = perf_event_open(&(0x7f0000000fc0)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x400, 0xf6103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x24000000, 0x0, @perf_bp={0x0, 0x8}, 0x0, 0x1, 0x0, 0x0, 0x7}, 0x0, 0xffeffff7ffffffff, 0xffffffffffffffff, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r3) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x3a0ffffffff) openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r4 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000a40)={0x9, 0xf, &(0x7f0000000540)=@ringbuf={{0x18, 0x6}, {{0x18, 0x1, 0x1, 0x0, r4}, {}, {}, {0x85, 0x0, 0x0, 0xf}}, {}, [], {{}, {}, {0x85, 0x0, 0x0, 0x7b}}}, &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @cgroup_sock, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000140)={0x7, 0x4, &(0x7f0000000000)=@framed={{}, [@ldst={0x1, 0x2, 0x3, 0x0, 0x1, 0xab}]}, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24}, 0x80) r5 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000000c0), 0x48) bpf$MAP_LOOKUP_ELEM(0x5, &(0x7f00000000c0)={r5, &(0x7f0000000000), &(0x7f0000000040)=""/73}, 0x70) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000640)={r3, 0xe0, &(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, &(0x7f00000002c0)=[0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x3, 0x2, &(0x7f0000000300)=[0x0, 0x0, 0x0], &(0x7f0000000340)=[0x0, 0x0], 0x0, 0x3a, &(0x7f0000000380)=[{}, {}, {}, {}, {}, {}], 0x30, 0x10, &(0x7f00000003c0), &(0x7f00000004c0), 0x8, 0x6e, 0x8, 0x8, &(0x7f0000000500)}}, 0x10) r7 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000700)={&(0x7f0000000680)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@restrict={0x9, 0x0, 0x0, 0xb, 0x1}]}, {0x0, [0x61, 0x61, 0x61]}}, &(0x7f00000006c0)=""/17, 0x29, 0x11, 0x1, 0x2}, 0x28) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) recvmsg$unix(r8, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r9, &(0x7f0000000640)=ANY=[@ANYBLOB="8fedcb7907009875f37538e486dd6317ce8102032908000000000000000001000000ac14140a000000000000000000000000ac1414aa"], 0xfdef) r10 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000007c0)={0x1b, 0x0, 0x0, 0x2, 0x0, r0, 0x9, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5, 0x5}, 0x50) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000008c0)={0x9, 0x4, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff25b3}, [@call={0x85, 0x0, 0x0, 0x8e}]}, &(0x7f0000000140)='GPL\x00', 0x1, 0x14, &(0x7f0000000200)=""/20, 0x41000, 0x20, '\x00', r6, 0x0, r7, 0x8, &(0x7f0000000740)={0x5, 0x5}, 0x8, 0x10, &(0x7f0000000780)={0x5, 0xb, 0x4, 0x100}, 0x10, 0x0, 0x0, 0x2, &(0x7f0000000840)=[r0, r0, r9, r10, r0, 0xffffffffffffffff], &(0x7f0000000880)=[{0x0, 0x1, 0x5, 0x3}, {0x1, 0x1, 0x1}], 0x10, 0x8}, 0x94) r11 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.events\x00', 0x26e1, 0x0) write$cgroup_type(r11, &(0x7f0000000180), 0x13bb711e) 1.084656725s ago: executing program 4 (id=5080): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x2, 0x4, 0xcc, 0xc}, 0x50) close(0x3) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xe, 0x4, 0x8, 0x6, 0x0, 0xffffffffffffffff, 0x4}, 0x50) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) perf_event_open(&(0x7f0000000600)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x80260, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000, 0x3, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x8000000000000000, 0x8000}, 0x4105, 0x0, 0x3}, 0x0, 0xfeffffffffffffff, 0xffffffffffffffff, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)) perf_event_open(&(0x7f00000010c0)={0x2, 0x80, 0xb9, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xc, 0x7}, 0x410, 0x2000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.swap.current\x00', 0x26e1, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x16, 0xc, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000ffffffff0000000000000000180100002020732500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000000000008500000071000000850000002300000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @flow_dissector, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz0\x00', 0x1ff) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x7, 0x10001, 0x1, 0x1, 0xffffffffffffffff, 0x12}, 0x50) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r3, 0x0, 0x0}, 0x20) r4 = openat$cgroup_netprio_ifpriomap(r2, &(0x7f00000000c0), 0x2, 0x0) write$cgroup_netprio_ifpriomap(r4, &(0x7f0000000080)=ANY=[], 0x12) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x15, &(0x7f0000000280)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000080850000008200000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_GET_PROG_INFO(0xa, &(0x7f00000021c0)={r5, 0x0, 0x0}, 0x10) r6 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$TUNSETIFF(r6, 0x400454ca, &(0x7f00000000c0)={'pim6reg0\x00', 0x2}) ioctl$TUNATTACHFILTER(r6, 0x401054d5, &(0x7f0000000780)={0x3, &(0x7f0000000600)=[{0x3d, 0x0, 0x7}, {0x2}, {0x6, 0x3}]}) ioctl$TUNSETFILTEREBPF(r6, 0x800454e1, &(0x7f0000000000)=r5) 979.683789ms ago: executing program 3 (id=5081): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x4c0004, 0x0) ioctl$TUNATTACHFILTER(0xffffffffffffffff, 0x401054d5, &(0x7f0000000080)={0x2, &(0x7f0000000200)=[{0x40, 0x4, 0xb, 0xfffffff9}, {0x1, 0x0, 0x5, 0x7f}]}) socketpair(0x1, 0x5, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8941, &(0x7f0000000080)) close(r0) openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x1a1102, 0x0) ioctl$TUNSETOFFLOAD(r0, 0xc004743e, 0x110e22fff3) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="bc"], 0x50) ioctl$TUNGETVNETLE(r0, 0x40047451, &(0x7f0000000180)) close(0x3) 901.291651ms ago: executing program 3 (id=5082): r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x7, 0xe, &(0x7f00000011c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000340)}, 0x42) (async) r1 = perf_event_open(&(0x7f0000000fc0)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x3fd, 0xf6103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, @perf_config_ext={0x1e, 0x100000000}, 0x1cad, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r0) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000300)=ANY=[@ANYBLOB="0a00000004000000040000000a"], 0x48) close(0x3) (async) bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000080)='mem\x00\x10\x00\x00\x00\x00\x00\x00I\xa2l') (async) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="02000000040000000400000001"], 0x1b) (async) close(0x3) (async) r4 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="0200000004000000080000000100000080"], 0x50) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f00000001c0)={{r4, 0xffffffffffffffff}, &(0x7f0000000500), &(0x7f0000000180)='%+9llu \x00'}, 0x20) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000280)={r5}, 0x4) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x6, &(0x7f00000001c0)=ANY=[@ANYBLOB="1800000000000000000000000000000018200000", @ANYRES32=r3, @ANYBLOB="0000000000000000690300000000000095"], &(0x7f0000000100)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) (async) r6 = syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000080)) write$cgroup_pid(r6, 0x0, 0x16) (async) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000240)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) (async) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x19, 0x3, &(0x7f00000003c0)=ANY=[@ANYBLOB="1800000001000000000000000000000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x1, '\x00', 0x0, @cgroup_sockopt=0x16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0x1c, &(0x7f0000000400)={r7, 0x3, 0x16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) r8 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x19, 0x3, &(0x7f00000003c0)=ANY=[], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @cgroup_sockopt=0x16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0x1c, &(0x7f0000000400)={r8, 0x3, 0x16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) (async) r9 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x19, 0x3, &(0x7f00000003c0)=ANY=[], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @cgroup_sockopt=0x16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) r10 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000006c0)=ANY=[@ANYBLOB="1b0000000000000000000000000004"], 0x50) r11 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x16, 0xf, &(0x7f00000005c0)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r10, @ANYBLOB="0000000000000000b702000040420f00b7030000000000008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000000000008500000085000000b70000000000000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @flow_dissector, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000240)={r11, 0x0, 0xe, 0x0, &(0x7f0000001780)="000000000000000002b2138373ef", 0x0, 0x10003, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) bpf$BPF_PROG_TEST_RUN(0x1c, &(0x7f0000000400)={r9, 0x3, 0x16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) (async) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000340)={@map=r2, 0x16, 0x0, 0x14000, &(0x7f0000001780)=[0x0], 0x1, 0x0, 0x0, 0x0, 0x0}, 0x40) syz_clone(0x41980100, 0x0, 0x0, 0x0, 0x0, 0x0) 775.550765ms ago: executing program 3 (id=5083): r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x18, 0x13, &(0x7f0000000500)=ANY=[@ANYBLOB="18080000000000000000000000400000851000000600000018020000", @ANYRES32, @ANYBLOB="00000000000000006600000000000000180000000000000000000000000000009500000000000000870a000000000000180100002020782500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b50a00000000000085000000060000009500000000000000d302e4a9f4dbf845984588e79fcdafe855956803ef412dc93ef4d49df1092e41d4c77249a57590c651bbbdc9983761e1592d36c6c18d885104229f6c8c1ff04ec06627b725a251c468662ef3210268f8177c2f40466a38c914aa42272f23868e9ec385"], &(0x7f0000000740)='GPL\x00', 0x2, 0xd31d71ce356ef109, &(0x7f0000000340)=""/222}, 0x6f) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'ip6_vti0\x00', 0x200}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x89f0, &(0x7f0000000080)) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='blkio.bfq.io_serviced\x00', 0x0, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000180)={r0, &(0x7f00000000c0)="e6b480e8b6fccf465176039239476a5f7d2ac86cfb8ab119519eca89f7ca131e0feeac53f7afc7f1", &(0x7f0000000100)=""/119}, 0x20) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r2, 0x40042409, 0x1) 656.273429ms ago: executing program 3 (id=5084): r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='blkio.throttle.io_service_bytes\x00', 0x0, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x9, 0x4, &(0x7f0000000040)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x61, 0x11, 0x10}, [@ldst={0x7}]}, &(0x7f0000003ff6)='GPL\x00', 0x5, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @cgroup_sock, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0xffffff6b}, 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x5, &(0x7f0000001ac0)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='GPL\x00'}, 0x48) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000700)={0x1b, 0x41, &(0x7f00000001c0)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x5}, {{0x18, 0x1, 0x1, 0x0, r0}}, {}, [@snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x47}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r0}}, @cb_func={0x18, 0xc, 0x4, 0x0, 0xfffffffffffffffe}, @snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0xfffffff0}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r0}}, @tail_call={{0x18, 0x2, 0x1, 0x0, r0}}, @map_idx={0x18, 0x3, 0x5, 0x0, 0x6}, @snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x2}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r0}}, @map_idx={0x18, 0xb, 0x5, 0x0, 0x1}], {{}, {}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000480)='GPL\x00', 0xffffffff, 0xcb, &(0x7f00000004c0)=""/203, 0x41100, 0xc, '\x00', 0x0, @fallback=0x28, r0, 0x8, &(0x7f0000000600)={0x9, 0x2}, 0x8, 0x10, &(0x7f0000000640)={0x2, 0x5, 0x5, 0x339}, 0x10, 0x0, r0, 0x4, &(0x7f0000000680)=[r1, r0], &(0x7f00000006c0)=[{0x2, 0x5, 0x0, 0xa}, {0x2, 0x4, 0x3, 0xc}, {0x0, 0x4, 0xe}, {0x3, 0x1, 0xe, 0x8}], 0x10, 0x7}, 0x94) r4 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r5 = perf_event_open(&(0x7f0000000280)={0x2, 0x80, 0x8f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000000440)=ANY=[@ANYBLOB="850000002a00000025000000000000009500000000000000aecd48d6494d614dcc6fab5335ec470db2c6161dba392176dd2963038e1d69ba7ea94c500dc4ef2fad96ed406f21caf5adcf920569c00cc1199684fa7c93836d9ea2cfb0e60436e05425cc4686b066707de94a4f4d5fc79c1faca0f9d9924be41a9169bdfaf16da915b2e249ee1c6eee84309e7a23c19a39484809539fca4e0b6fab1aa7d55545a34effa077faa55c59e88254f54077f799bf168301000000bf2255d6a0244d35b213bda84cc172afd8cc2e47a7d8b85a5e3d77ac463920e231b7ae0da8616d2b79db2e3d5986c82b5aa94e539b204d58f91f5da6c025d060ab186d94af98af1da2b5952eb15855933a212330fb413aebdb3d43eac76e824ca7f66104e035f7a35dfc72c81256a55a25f8fe3b28d7e53c78fbfe5ab0255f347160ec83070000020000004015cf10453f6c0b973b81a484ebad04859d928365a7ea3fab8b4b380a00d72b0000000000001cf555c14d56b51c2298237bebfc08e0d5976a942b846970cfd98b9d4139f1111f2cc5e46ac1c60a9b030074bfbcd4b09012175484135f0e519f0b1e4aaa026d570ecb5e8cddbed65ff702000000a3ff4f8a4cf796b07a6ff61c5552417fd703f7f14d8b78ac02ca3cdf6a662db1c9c89c9120072a5d00dcdd8595356c9b2492aaf1264d4ef4a410c882834867bcd2b6e559d17879570c8ad943e392955f4f979ea13201bafe4f0f6ea5080000000cdcd2063d11dd665647223c78a996810000000571cbb17d9f37282462f0e9c147c0d497c61433c6ccc35601eef97ee611be8c97f4151ffdf6f7820549cda6cb799c6e924966a7f90bf8fd1e75ee76bd72346cfbb5567e54d3504723177d356c4604b7a492ecec37e83efceefd7ca2533659edc8be05cc85451c6a14507434eb54b6f43caea5c4bf690441974b155f5adc681a03c0bbb8358856175e2ce8b0cbbbe3c033e54ffca9ec9a7a3755e0f209150a07682c4e14e3a83558df6f3fc97f1730a136bdee07e98cb984b2e2304a1b63afefdb636e56bbaae4e62136574bc6371a0bb2be1a962aae9c1258da6ef590e1d85ea9e12b3025f43e7e08ccffc5064dea4c39cf4b98e1fc6efb5978f51e16b678eca0b658a56008948e561a9845e4ff29e2bdb1d0b923b272341c5e093fd66a294351c5356c1d06c92cf8ce3c7c56cd31121624d74517fd3666277f670e812b28e2f30d035cee5d0e77a3c7220000000000000005a474816bc59d2e2a00092419304b338a987e9d3044d856ce24f370030be3b5f79f034b8d3ebce68663ef5af469abe75b314fae31a0445859a5ece8fb11a4ee8e46354c9c3a041e122ce24463aaf28345bd168b4177ce37ed85464c31679053e7f9d04bb5cb51da0b7958989fd70f241262d0af3246eb4fc4bda3453602004535a976eacd3adaa4d2ee6fe0d072ccd44341f7fd53df58ae791ee8b489a7c9efe3625a9d971b5997485d6a063dc6f7359e2eccc2fb39d401adf59d44e58eb1c60b3475be31a9b7cf42b6402312d2725b8d9fa700a86407e79ae29d2c117ca65fc86c2dce97aa03279a66ec87122219b0f796ab92b1adecae50fdb40f7f02f750d6c977a191852c9ae031db044b2353199546609f9f69a6cfefdf879d447df53f3b9b70d10355b00300000000000000553d18a6cc50feeb7bfad9b7be3283b6450d264e7712d2f1d7004548b19162cef04d18d4f5987baab97a9bfbd8f185b5631820420bf5b6522c0e21c882c66f4f25ffb6d95e07de02205fca4f18a2eb5b63e45d5d80fe527340935aa3c0b4f3f45bfff2418a18217747ae442e31560e5b741445ea2a1acee2a81425ff000000d2a0a765d20b30f87af976a46f9a9a1ac7dea1ea684533dc6623920dacc107f532348cc21164efe794874eac73381e961f3d9c8c21578fe3245097c280abe51427b9f6cd72b5da6d0252803c66730cd5eac907f09b9695906313f88735fce5115dc83ed73d8ee4a9132260cc6fc01e1b9e16587bb5f721303e6b89e5c54d680ac66d09af90dbf5000000000000fa08ad0731c4b839688b22c4da2a6bc4cf45dbeea042f9b33393f85a0417854d221a2d5f96bc64647f15daa2ba79cd0f4254ed55217912ef84bd2927df82fc061aef2920c49b2a90886da75561173fa186cb7ee86dd4285c4721eb428c953296ac2f5d825da54dbef07c1b349b4901e093d13e6b9a0000009b5b22e887bc061d40bcaf0aa18623fd9b7179ccc692ba74b531b65c4decf9d080a8ac7e82d4cde1267aa64b2a94fd87a009e6742c2ddc3a9d7eccbb1831b1fa218277c2814a91cab7cb59c697166d6f1bb1a360470000000000000000000000000000000000000000000000000000f9f9b4ce7e871f507084c8c88e0652decbe579b03ed84ea94597dd1059620a050f69ea03b99b4e19d35f4a3b54e96ae2172effecec80f6baa4bf69a6ebf5392882df78b0983e662dc0cb64b77f3f006b6b25443197ae93f0"], &(0x7f0000000000)='GPL\x00', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r5, 0x40042408, r6) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000880)={@fallback=r4, 0x9, 0x1, 0x5, &(0x7f0000000400)=[0x0, 0x0, 0x0], 0x3, 0x0, &(0x7f00000007c0)=[0x0, 0x0, 0x0, 0x0], &(0x7f0000000800)=[0x0, 0x0, 0x0], &(0x7f0000000840)=[0x0], 0x0}, 0x40) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) recvmsg$unix(r8, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r9, &(0x7f0000000000)=ANY=[@ANYBLOB="8fedcb790700117df37538e486dd6317ce2200fc00"], 0xfdef) write$cgroup_subtree(r9, &(0x7f0000000000), 0xfdef) bpf$BPF_PROG_ATTACH(0x8, &(0x7f00000008c0)={@cgroup, r6, 0x32, 0x926962830c04a28a, 0xffffffffffffffff, @value=r9, @void, @void, @void, r7}, 0x20) bpf$LINK_GET_NEXT_ID(0x1f, &(0x7f0000000d00)={0x0, 0x0}, 0x8) bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000000)=r10, 0x4) bpf$BPF_PROG_DETACH(0x9, &(0x7f00000007c0)={@fallback=r0, r3, 0x2, 0x2028, 0x0, @void, @void, @value=r10, @void, r7}, 0x20) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000400)={r2, 0x0, 0x13, 0x0, &(0x7f00000005c0)="07ec0c191cd2749bf8ffc2c4257f078b3909d0", 0xfffffffffffffffd, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) close(r0) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x8, 0x4, &(0x7f00000000c0)=ANY=[@ANYBLOB="b4000000000000ff7f00000000000000630000000000000000000000000000000b5df85bce549bda25bb9c0d0034b0a618e2aa49360816230a520cab16bf7dee7027952551541089cffe40949a0c920823371f727c2504771d89fc6cd274a4fe0020cc4b5fc354f1d5f293a4610fc5b34184d5f89ee873d1aa084c63bae4711722c15582194d7c52d3117897a70f0908e8bd2e913b2c4f3e1a094e5e8f88b6feab6549a9378fb4633c68cb21a44aec44977b65634f4d777420fffbb05958dbc7d0629fa4374d46ae64180af453233dd95c09f0d0d87bfbae164e0c6fbb5a0cc159654907355f5428299fe235"], &(0x7f0000003ff6)='GPL\x00', 0x5, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @cgroup_skb, 0xffffffffffffffff, 0x19, &(0x7f0000000000), 0xb5, 0x10, &(0x7f0000000000), 0x7, 0x0, 0xffffffffffffffff, 0x68000000}, 0x48) 423.111586ms ago: executing program 0 (id=5085): r0 = bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_DELETE_BATCH(0x1b, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500), 0x0, 0x2, r0}, 0x38) (async) r1 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="02000000040000000800000001"], 0x48) (async) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.current\x00', 0x275a, 0x0) r3 = openat$cgroup_procs(r2, &(0x7f0000000100)='cgroup.threads\x00', 0x2, 0x0) (async) r4 = syz_clone(0x0, &(0x7f0000000140)="1a19c344c58649fdfe1e818de76193c2e81bd08b446f04bed939013eec7efe7412853f406ed9a234a64ea566ff7620cc61283a9259c7b6dfa793b6a17a9892ffdf8ccd2ee37cfab4c59c288440de01fe36a53dd4d20a317ca552e2de92bacd", 0x5f, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="1447871e9aa6f6af29fca5b5be2b0431aec8b70a779ae096cead15ea7aa6e15400b67c4c14c9164660a5e4fab27f243cd834688726423e265a3e2f16e995d9084e6ec3c84d0be1d1e12e8567e05a18409ab736b3801bee0ff4bddc80da81a3e15c48bb7f33ef0af5260984d041d4001608f33f63c7c4043dc2e5789ac00cd0d28423b8a90f540e4b27fb54bb149a9ce5870a8ad9") r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x5, 0x5, 0x2, 0x7, 0x0, 0x1, 0x10000}, 0x50) close(r5) (async) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=@base={0x1, 0x1, 0x40, 0x40, 0x41, 0xffffffffffffffff, 0xfffffffe}, 0x50) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000700), &(0x7f00000003c0), 0x1003, r6}, 0x38) (async) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xd, &(0x7f0000000440)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x4000}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r5}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}, @call={0x85, 0x0, 0x0, 0x7}]}, &(0x7f0000000400)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0xd, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_BIND_MAP(0xa, &(0x7f00000003c0)={r7, r5}, 0xc) (async) write$cgroup_pid(r3, &(0x7f0000000000)=r4, 0x12) (async) bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x8, 0x1c, &(0x7f0000000d80)=ANY=[@ANYBLOB="18080000d0ffffff000000000000001718110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b706000014000000b7030000000d00008500000005000000bca900000000000035090100000000009500000000000000b7020000000000007b6af8ff00000000b50902000f0000007baaf0ff00000000bf8700000000000007080000fffdffffbf2400000000000007060000f0ffffff740200000800000018200000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7010000080000004608f0ff76000000bf9800000000000079080000000000008500000005000000b70000000000000095"], &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @cgroup_skb, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) 307.5074ms ago: executing program 0 (id=5086): bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x4, 0x6, &(0x7f0000000000)=@framed={{0x5, 0x0, 0x0, 0x0, 0x0, 0x6b, 0x11, 0x3c}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @call={0x85, 0x0, 0x0, 0x76}, @exit], {0x95, 0x0, 0x5a5}}, &(0x7f0000000080)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @fallback=0x23, 0xffffffffffffffff, 0x6}, 0x94) 278.254891ms ago: executing program 0 (id=5087): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000003000000000000000040000018010000786c6c2e00000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000020000008500000006000000850000002a00000095"], 0x0, 0x0, 0x0, 0x0, 0x41000, 0x7c, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d0000001801000020696c2500000000002020097b1af8ff00000000bfa100000000000007010000b8ffffffb702000000000000b7"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = perf_event_open(&(0x7f0000000fc0)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x400, 0xf6103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, @perf_bp={0x0, 0x8}, 0x40, 0x0, 0x0, 0x0, 0x7, 0x0, 0xffff}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xd, &(0x7f0000000280)=ANY=[@ANYBLOB="18000000000000000000000000000000850000007500000018110000", @ANYRES32, @ANYBLOB="000f000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb7030000080000ad"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x3, 0xc, &(0x7f0000000000)=ANY=[@ANYBLOB="180000000000000000000000000000008500000061000000180100002020732500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007300000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sched_cls, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000240)={r3, 0x0, 0x2a, 0xe80, &(0x7f00000002c0)="f3fffeffffffa000", &(0x7f0000000180), 0x5, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x4c) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r2) syz_clone(0xc2002000, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xa, 0x6, &(0x7f0000000000)=@framed={{0x5, 0x0, 0x0, 0x0, 0x0, 0x71, 0x11, 0x68}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @call={0x85, 0x0, 0x0, 0x76}, @exit], {0x95, 0x0, 0x5a5}}, &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x6}, 0x70) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x3, 0x6, &(0x7f0000000000)=@framed={{0x5, 0x0, 0x0, 0x0, 0x0, 0x63, 0x11, 0xc}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @call={0x85, 0x0, 0x0, 0x5}, @exit], {0x95, 0x0, 0x5a5}}, &(0x7f0000000080)='GPL\x00', 0x2, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @sched_cls, 0xffffffffffffffff, 0x6}, 0x70) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000080)={'pimreg0\x00', 0x7c2}) ioctl$TUNATTACHFILTER(r0, 0x401054d5, &(0x7f0000000040)={0x5, &(0x7f0000000000)=[{0x4d, 0x0, 0x3}, {}, {0x28, 0x0, 0x1, 0x1}, {0xb1, 0x0, 0x28, 0x3ff}, {0x6, 0x0, 0x0, 0xdfffffff}]}) 277.632981ms ago: executing program 4 (id=5088): bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x12, 0x4, &(0x7f0000000340)=ANY=[@ANYBLOB="1800000001000000000000000000000071180a000000000095"], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @cgroup_sock_addr=0x14, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) 268.663501ms ago: executing program 1 (id=5089): perf_event_open(&(0x7f0000000340)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x20061, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x1, @perf_bp={0x0}, 0x10000, 0x100, 0x8}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x3) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x8, 0x4, 0x4, 0x1, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2}, 0x50) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) mkdir(&(0x7f0000000000)='./cgroup/file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) openat$cgroup_subtree(r0, &(0x7f0000003000), 0x201, 0x0) openat$cgroup_subtree(r0, 0x0, 0x2, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000750000001801000020646c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000e00000095"], 0x0, 0xfffffffe, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x2, '\x00', 0x0, @fallback=0x38, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, &(0x7f0000000640)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x90) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)) sendmsg$inet(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001d80)=ANY=[@ANYBLOB="28010000000000000100000001"], 0x128}, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001480)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r2, &(0x7f0000001b00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001d80)=ANY=[], 0x128}, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000380), 0x0, 0x0) recvmsg$unix(r1, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000800)=[@cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x10}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0xd8}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'vlan0\x00', 0x200}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x8946, &(0x7f0000000080)) syz_clone(0x640c7000, 0x0, 0x0, 0x0, 0x0, 0x0) 195.751743ms ago: executing program 2 (id=5090): bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x3, 0x16, &(0x7f0000000140)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sched_cls}, 0x48) r0 = bpf$ITER_CREATE(0xb, &(0x7f0000000100), 0x0) close(r0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000200)={@map=r0, 0x24, 0x0, 0x5, &(0x7f0000000440)=[0x0], 0x3ffffe70, 0x0, 0x0, 0x0, 0x0}, 0x40) openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.threads\x00', 0x2, 0x0) 195.095923ms ago: executing program 4 (id=5091): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="16000000000000000400000001"], 0x50) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0, 0x0, 0x0, 0x0, 0x41100}, 0x94) r1 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x56, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) (async) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x5, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1d, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r2) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000058"], 0x0}, 0x90) (async, rerun: 32) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (rerun: 32) bpf$PROG_BIND_MAP(0xa, &(0x7f0000001880)={r3}, 0xc) (async) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x1, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) (async) r7 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000180)={0x3, 0x4, 0x4, 0xa, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000040)={{r7}, &(0x7f0000000280), &(0x7f0000000240)=r4}, 0x20) (async) r8 = bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x1, 0x10, &(0x7f0000000bc0)=ANY=[@ANYBLOB="1808000000000000000000000000000018120000", @ANYRES32=r7, @ANYBLOB="0000000000000000b703000000000000850000000c000000b7000000000000001801000000469c2500000000002120207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000700000095"], &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x2, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) setsockopt$sock_attach_bpf(r5, 0x1, 0x32, &(0x7f00000000c0)=r8, 0x4) sendmsg$inet(r6, &(0x7f0000000140)={0x0, 0x0, 0x0}, 0x0) 133.158916ms ago: executing program 0 (id=5092): r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180200000800000000000000000000001801000020646c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703001a000000008500000006000000850000000800000095000000000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x10}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d0000001801000020696c2500000000002020097b1af8ff00000000bfa100000000000007010000b8ffffffb702000000000000b7"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r2 = perf_event_open(&(0x7f0000000fc0)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x400, 0xf6103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, @perf_bp={0x0, 0x8}, 0x40, 0x0, 0x0, 0x0, 0x7, 0x0, 0xffff}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r3) syz_clone(0xc0126080, 0x0, 0x0, 0x0, 0x0, 0x0) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100), 0xc1842, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f0000000080)={'syzkaller0\x00', 0xca58c30f81b6079f}) r5 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000140)={0x1b, 0x0, 0x0, 0x0, 0x0, 0x1, 0x8000, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x2, 0x2}, 0x50) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000001c0)={0x1, 0xffffffffffffffff}, 0x4) r7 = bpf$PROG_LOAD_XDP(0x5, &(0x7f00000010c0)={0x6, 0x25, &(0x7f0000000cc0)=@framed={{0x18, 0x0, 0x0, 0x0, 0xffff, 0x0, 0x0, 0x0, 0x1ff}, [@map_val={0x18, 0xb, 0x2, 0x0, r5, 0x0, 0x0, 0x0, 0x1}, @cb_func={0x18, 0x1}, @ldst={0x0, 0x0, 0x4, 0x1, 0x1, 0xffffffffffffffe0, 0xffffffffffffffff}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, 0x1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x10}}, @tail_call={{0x18, 0x2, 0x1, 0x0, 0x1}}, @snprintf={{}, {}, {}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, 0x1}}, @map_idx={0x18, 0x9, 0x5, 0x0, 0x2}]}, &(0x7f0000000e00)='syzkaller\x00', 0xc, 0xd9, &(0x7f0000000e40)=""/217, 0x40f00, 0x6, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000f40)={0x0, 0x4}, 0x8, 0x10, &(0x7f0000000f80)={0x2, 0x2, 0x5, 0x2}, 0x10, 0x0, 0x0, 0x2, &(0x7f0000001040)=[0x1], &(0x7f0000001080)=[{0x3, 0x5, 0x10}, {0x1, 0x1, 0x9, 0x4}], 0x10, 0xffffffff}, 0x94) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000ac0)={r7, 0xe0, &(0x7f00000009c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, &(0x7f0000000800)=[0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x6, 0x5, &(0x7f0000000840)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000280)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0xab, &(0x7f00000003c0)=[{}, {}], 0x10, 0x10, &(0x7f0000000900), &(0x7f0000000940), 0x8, 0x86, 0x8, 0x8, &(0x7f0000000980)}}, 0x10) r9 = bpf$MAP_CREATE(0x0, &(0x7f0000000b00)=@base={0x1f, 0x4, 0xa, 0x10001, 0x456c24ad7170b773, 0xffffffffffffffff, 0x7, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x0, 0x4}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000000c00)={0x4, 0x1c, &(0x7f00000004c0)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x7f}, {{0x18, 0x1, 0x1, 0x0, r5}}, {}, [@snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x100000}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r6}}], {{}, {}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000780)='GPL\x00', 0x8, 0x2, &(0x7f00000007c0)=""/2, 0x41000, 0x8, '\x00', r8, @fallback=0x31, r1, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff, r0, 0x1, &(0x7f0000000b80)=[r9], &(0x7f0000000bc0)=[{0x4, 0x1, 0x6, 0xa}], 0x10, 0x3}, 0x94) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000400)=@bpf_lsm={0x1f, 0x5, &(0x7f0000000000)=@framed={{}, [@ldst={0x1, 0x3, 0x3, 0x0, 0x1, 0xb8}, @ldst={0x3, 0x0, 0x3, 0x0, 0x0, 0xffffffffffffffe0}]}, &(0x7f0000000100)='GPL\x00', 0x2, 0x10d, &(0x7f00000002c0)=""/196}, 0x80) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r10, 0x8914, &(0x7f0000000080)) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xae9, 0x30, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, 0x0, &(0x7f0000000000)='GPL\x00', 0x5}, 0x94) perf_event_open(&(0x7f00000003c0)={0x4, 0x80, 0x4, 0x8, 0x2c, 0x5, 0x0, 0x1, 0x200, 0x3, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3, 0x4, @perf_bp={0x0, 0xb}, 0xc0, 0x9, 0x9, 0x9, 0x0, 0x0, 0xfff, 0x0, 0x7ff, 0x0, 0x9}, 0x0, 0x40003, 0xffffffffffffffff, 0x1) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'bridge0\x00', 0x400}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r11, 0x89f0, &(0x7f0000000080)) write$cgroup_devices(r4, &(0x7f0000000740)=ANY=[@ANYBLOB="1e030a004d8c71ef2685634a8270e7123c00000000000000000000000000ac1414cf14"], 0xffdd) 132.872106ms ago: executing program 2 (id=5093): r0 = perf_event_open(&(0x7f0000000fc0)={0x1, 0x99, 0x2, 0x0, 0x0, 0x0, 0x0, 0x400, 0xf6103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x24000000, 0x0, @perf_bp={0x0, 0x8}, 0x0, 0xffffffffffffffff, 0x1ff, 0x0, 0x5}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000500)=ANY=[@ANYBLOB="0a000000050000000200000007"], 0x48) perf_event_open$cgroup(&(0x7f0000000140)={0x2, 0x80, 0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0x0, 0xb16}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r3) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000780)={0x18, 0x1, &(0x7f0000000040)=ANY=[@ANYBLOB="8c"], 0x0, 0x42, 0x0, 0x0, 0x40f00, 0x3, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x7ff}, 0x94) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="8fedcb7907009875f37538e486dd6317ce6203c23c00fe80000000000000875a65969ff57b00000000000000000000000000ac1414aa067707"], 0xfdef) recvmsg$unix(r2, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r4, &(0x7f0000000000)=ANY=[], 0xfdef) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000900000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r5) ioctl$PERF_EVENT_IOC_REFRESH(r0, 0x2402, 0x3) r6 = perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0xfd, 0x2, 0x0, 0x0, 0x0, 0x0, 0x80, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x9}, 0x10a205, 0x1, 0xffffffbd, 0x0, 0x80000000, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x40082406, &(0x7f00000001c0)='cpu~20\t&&') bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000980)={r5, 0xe0, &(0x7f0000000880)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f00000004c0)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x5, 0x2, &(0x7f0000000540)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000580)=[0x0, 0x0], 0x0, 0xf7, &(0x7f0000000680)=[{}, {}, {}, {}], 0x20, 0x10, &(0x7f00000006c0), &(0x7f0000000700), 0x8, 0x9d, 0x8, 0x8, &(0x7f0000000840)}}, 0x10) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000d00)={r5, 0xe0, &(0x7f0000000c00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, &(0x7f0000000a40)=[0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x8, 0x6, &(0x7f0000000a80)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000ac0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x3d, &(0x7f0000000b00)=[{}], 0x8, 0x10, &(0x7f0000000b40), &(0x7f0000000b80), 0x8, 0x92, 0x8, 0x8, &(0x7f0000000bc0)}}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000dc0)=@bpf_lsm={0x1d, 0xf, &(0x7f0000000080)=@framed={{0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xdf7}, [@map_fd={0x18, 0x3, 0x1, 0x0, r1}, @printk={@i, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0xe}}, @cb_func={0x18, 0x0, 0x4, 0x0, 0x3}]}, &(0x7f0000000100)='syzkaller\x00', 0xfd4, 0xdf, &(0x7f0000000280)=""/223, 0x20980, 0x4a, '\x00', r7, 0x1b, r4, 0x8, &(0x7f00000009c0)={0x2, 0x3}, 0x8, 0x10, &(0x7f0000000a00)={0x4, 0xe, 0xb7, 0x9}, 0x10, r8, 0x0, 0x1, &(0x7f0000000d40)=[r1], &(0x7f0000000d80)=[{0x4, 0x1, 0x9, 0x3}], 0x10, 0x8}, 0x94) r9 = syz_clone(0xc4201100, 0x0, 0x0, &(0x7f0000000740), 0x0, 0x0) perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0xf, 0x5e, 0x2, 0x0, 0x4, 0x40, 0x8, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x3, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x8, 0xbff8d625be437faa, @perf_config_ext={0x0, 0x1000}, 0x310, 0x3, 0x6, 0x0, 0x9, 0x1000, 0xa2, 0x0, 0x3, 0x0, 0x1ff}, r9, 0xe, r0, 0x0) 76.069937ms ago: executing program 2 (id=5094): perf_event_open(&(0x7f00000010c0)={0x2, 0x80, 0xb9, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xc, 0x7}, 0x410, 0x2000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r0 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000007c0)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x50) r1 = perf_event_open(&(0x7f0000000fc0)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x400, 0xf6103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x24000000, 0x0, @perf_bp={0x0, 0x8}, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x3) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r2) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40082404, &(0x7f00000000c0)=0x4) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x19, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @cgroup_sockopt=0x16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_UPDATE_BATCH(0x1a, 0x0, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000000)={0xffffffffffffffff, 0x0, 0x0}, 0x20) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000040)={0x1, 0xffffffffffffffff}, 0x4) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x5, 0x5, 0x2, 0x7, 0x0, 0x1, 0x10000}, 0x50) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000580)={{r5, 0xffffffffffffffff}, &(0x7f0000000140), &(0x7f0000000380)}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0xd, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000003000000000000000040001018110000", @ANYRES32=r6, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000001000000850000000800000095"], &(0x7f0000000400)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0xd, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r7 = bpf$MAP_CREATE(0x0, &(0x7f0000000340)=@bloom_filter={0x1e, 0x4, 0x1, 0xdd20, 0x8, 0xffffffffffffffff, 0x6, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x3, 0x3, 0x1}, 0x50) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000a00)={r3, 0xe0, &(0x7f0000000900)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f0000000680)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0xa, 0x1, &(0x7f00000006c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000740)=[0x0], 0x0, 0x9a, &(0x7f0000000780)=[{}, {}, {}, {}], 0x20, 0x10, &(0x7f0000000840), &(0x7f0000000880), 0x8, 0xa1, 0x8, 0x8, &(0x7f00000008c0)}}, 0x10) r9 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000b00)={&(0x7f0000000a40)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x38, 0x38, 0x3, [@func={0xc, 0x0, 0x0, 0xc, 0x5}, @const={0xf, 0x0, 0x0, 0xa, 0x5}, @decl_tag={0xa, 0x0, 0x0, 0x11, 0x4, 0xffffffffffffffff}, @var={0x7, 0x0, 0x0, 0xe, 0x4, 0x2}]}, {0x0, [0x30]}}, &(0x7f0000000ac0)=""/23, 0x53, 0x17, 0x0, 0x5, 0x10000}, 0x28) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000c00)={0x6, 0x1c, &(0x7f0000000500)=@raw=[@call={0x85, 0x0, 0x0, 0x2e}, @snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x47}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r4}}, @call={0x85, 0x0, 0x0, 0x15}, @ringbuf_query={{0x18, 0x1, 0x1, 0x0, r6}}, @call={0x85, 0x0, 0x0, 0x6b}, @ringbuf_query={{0x18, 0x1, 0x1, 0x0, r7}}, @ringbuf_query={{0x18, 0x1, 0x1, 0x0, 0x1}}], &(0x7f0000000600)='GPL\x00', 0x1ff, 0x34, &(0x7f0000000640)=""/52, 0x41100, 0x2, '\x00', r8, 0x25, r9, 0x8, &(0x7f0000000b40)={0x4, 0x1}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x3, &(0x7f0000000b80)=[r0, r0, r0, r0], &(0x7f0000000bc0)=[{0x5, 0x5, 0xe, 0x2}, {0x1, 0x4, 0x10, 0x2}, {0x1, 0x3, 0x10, 0x3}], 0x10, 0x1}, 0x94) bpf$MAP_UPDATE_CONST_STR(0x2, 0x0, 0x0) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000, 0x0, @perf_config_ext={0xff, 0x3}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x19, &(0x7f0000000400)=ANY=[@ANYBLOB="180000008f000000000000000b00000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000086000000bf0900000000000055090100000000009500000000000000bd0afeff00000000d500f4ff0100030018010000646c6c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000010000006500000006000000bf91000000000000b702000003000000850000002a000000b70000000000000095"], &(0x7f0000000080)='GPL\x00', 0x7, 0x1000, &(0x7f0000000cc0)=""/4096, 0x41100, 0x2f}, 0x21) 0s ago: executing program 2 (id=5095): bpf$TOKEN_CREATE(0x24, &(0x7f0000000180), 0x8) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="0b00000007000000010001000800000001000000", @ANYRES32, @ANYBLOB="00000000000000000000000000000000000000f5", @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/17], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x65, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f00000000c0)=@raw=[@tail_call={{0x18, 0x2, 0x1, 0x0, r0}}, @ldst={0x3, 0x3, 0x0, 0xb, 0xa, 0x6, 0x1}], &(0x7f0000000600)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff2165}, 0x94) (async) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f00000000c0)=@raw=[@tail_call={{0x18, 0x2, 0x1, 0x0, r0}}, @ldst={0x3, 0x3, 0x0, 0xb, 0xa, 0x6, 0x1}], &(0x7f0000000600)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff2165}, 0x94) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000002c0)={0x1, 0x58, &(0x7f0000000240)}, 0x10) (async) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000002c0)={0x1, 0x58, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000300)={0x4, 0xc, 0x0, 0x0, 0xffffffff, 0x0, 0x0, 0x40f00, 0x0, '\x00', r2, @fallback=0x2d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) bpf$PROG_LOAD(0x5, &(0x7f0000000300)={0x4, 0xc, 0x0, 0x0, 0xffffffff, 0x0, 0x0, 0x40f00, 0x0, '\x00', r2, @fallback=0x2d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$unix(r3, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r5, &(0x7f0000000000)=ANY=[], 0xfdef) (async) write$cgroup_subtree(r5, &(0x7f0000000000)=ANY=[], 0xfdef) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000040)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x4, '\x00', r2, r5, 0x2, 0x5, 0x4}, 0x50) (async) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000040)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x4, '\x00', r2, r5, 0x2, 0x5, 0x4}, 0x50) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, 0x0, 0x0) (async) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f00000010c0)={0x2, 0x80, 0xb9, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xaa9d9f9731c387d2}, 0x10610, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) perf_event_open(&(0x7f00000010c0)={0x2, 0x80, 0xb9, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xaa9d9f9731c387d2}, 0x10610, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='devices.list\x00', 0x26e1, 0x0) close(r6) (async) close(r6) mkdir(&(0x7f0000000000)='./file0\x00', 0x20) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000001000)) write$cgroup_devices(r6, &(0x7f00000005c0)=ANY=[], 0xfffffeff) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) r7 = perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000750000001801000020646c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000e00000095"], 0x0, 0xfffffffe, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xa, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18000000000000000000000000000000850000006d"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000d80)={0x18, 0x5, &(0x7f0000000480)=ANY=[@ANYBLOB="1801000021"], 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x94) r8 = bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0x7, 0xc, &(0x7f00000001c0)=ANY=[@ANYRESDEC=r4], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x8, '\x00', 0x0, @fallback=0x35, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r7, 0x40042408, r8) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) write$cgroup_int(r6, &(0x7f0000000300)=0x6, 0x12) bpf$BPF_GET_PROG_INFO(0xa, &(0x7f0000000400)={r1, 0x0, 0x0}, 0x10) kernel console output (not intermixed with test programs): ][ T24] audit: type=1400 audit(1778718396.430:130): avc: denied { create } for pid=1189 comm="syz.1.243" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 41.628993][ T1190] device wg2 entered promiscuous mode [ 41.740928][ T1222] device syzkaller0 entered promiscuous mode [ 42.399554][ T24] audit: type=1400 audit(1778718397.240:131): avc: denied { create } for pid=1239 comm="syz.4.259" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 43.188022][ T1283] device syzkaller0 entered promiscuous mode [ 43.205407][ T1297] device macsec0 entered promiscuous mode [ 43.410472][ T1336] bridge0: port 1(bridge_slave_0) entered disabled state [ 44.070944][ T24] audit: type=1400 audit(1778718398.910:132): avc: denied { create } for pid=1367 comm="syz.1.294" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 44.382524][ T1394] device sit0 entered promiscuous mode [ 44.435372][ T24] audit: type=1400 audit(1778718399.270:133): avc: denied { create } for pid=1398 comm="syz.4.302" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netrom_socket permissive=1 [ 44.966398][ T1421] device syzkaller0 entered promiscuous mode [ 45.032339][ T1420] device syzkaller0 entered promiscuous mode [ 45.733352][ T1453] device syzkaller0 entered promiscuous mode [ 45.794887][ T1482] device syzkaller0 entered promiscuous mode [ 46.167667][ T1518] џџџџџџ: renamed from vlan1 [ 46.279734][ T1527] device macsec0 entered promiscuous mode [ 46.528538][ T1534] tap0: tun_chr_ioctl cmd 1074025681 [ 46.723730][ T24] audit: type=1400 audit(1778718401.560:134): avc: denied { create } for pid=1546 comm="syz.1.339" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 47.151473][ T1566] sock: sock_set_timeout: `syz.1.346' (pid 1566) tries to set negative timeout [ 47.160552][ T1566] sock: sock_set_timeout: `syz.1.346' (pid 1566) tries to set negative timeout [ 47.229972][ T24] audit: type=1400 audit(1778718402.070:135): avc: denied { create } for pid=1573 comm="syz.0.349" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 47.271252][ T1577] 7B’чїя: renamed from syzkaller0 [ 47.724734][ T1608] device syzkaller0 entered promiscuous mode [ 48.907823][ T24] audit: type=1400 audit(1778718403.740:136): avc: denied { create } for pid=1660 comm="syz.3.377" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 51.617146][ T1764] device syzkaller0 entered promiscuous mode [ 51.716068][ T1766] device wg2 entered promiscuous mode [ 52.942341][ T1832] tun0: tun_chr_ioctl cmd 1074025677 [ 52.947680][ T1832] tun0: linktype set to 270 [ 52.986942][ T24] audit: type=1400 audit(1778718407.820:137): avc: denied { create } for pid=1830 comm="syz.0.428" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 53.188299][ T24] audit: type=1400 audit(1778718408.010:138): avc: denied { create } for pid=1838 comm="syz.1.431" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1 [ 53.928091][ T1884] device syzkaller0 entered promiscuous mode [ 54.775859][ T1926] device wg2 left promiscuous mode [ 54.924988][ T1936] device sit0 left promiscuous mode [ 55.145896][ T1951] syz.0.461[1951] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 55.145937][ T1951] syz.0.461[1951] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 55.280061][ T1962] device syzkaller0 entered promiscuous mode [ 56.026826][ T2049] device syzkaller0 entered promiscuous mode [ 56.177403][ T2054] device syzkaller0 entered promiscuous mode [ 56.226582][ T476] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 56.255102][ T2054] tun0: tun_chr_ioctl cmd 2148553947 [ 56.283525][ T2054] tun0: tun_chr_ioctl cmd 1074025677 [ 56.343313][ T2054] tun0: linktype set to 780 [ 56.592992][ T2082] syzkaller0: default qdisc (pfifo_fast) fail, fallback to noqueue [ 56.611731][ T2082] device syzkaller0 entered promiscuous mode [ 57.315978][ T24] audit: type=1400 audit(1778718412.150:139): avc: denied { create } for pid=2145 comm="syz.4.521" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=isdn_socket permissive=1 [ 57.608352][ T2161] device syzkaller0 entered promiscuous mode [ 57.987440][ T2188] device syzkaller0 entered promiscuous mode [ 58.408146][ T2219] device syzkaller0 entered promiscuous mode [ 58.594103][ T24] audit: type=1400 audit(1778718413.430:140): avc: denied { write } for pid=2241 comm="syz.2.551" name="cgroup.subtree_control" dev="cgroup2" ino=250 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 [ 58.656754][ T24] audit: type=1400 audit(1778718413.440:141): avc: denied { open } for pid=2241 comm="syz.2.551" path="" dev="cgroup2" ino=250 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 [ 58.696911][ T2248] device syzkaller0 entered promiscuous mode [ 59.453960][ T2302] device sit0 entered promiscuous mode [ 59.786196][ T24] audit: type=1400 audit(1778718414.620:142): avc: denied { create } for pid=2329 comm="syz.0.579" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=appletalk_socket permissive=1 [ 60.285480][ T24] audit: type=1400 audit(1778718415.120:143): avc: denied { create } for pid=2375 comm="syz.1.595" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=ax25_socket permissive=1 [ 61.514339][ T2475] device syzkaller0 entered promiscuous mode [ 63.052726][ T2553] device syzkaller0 entered promiscuous mode [ 63.369239][ T2593] bridge0: port 3(vlan1) entered blocking state [ 63.375573][ T2593] bridge0: port 3(vlan1) entered disabled state [ 63.389170][ T2593] device vlan1 entered promiscuous mode [ 63.411644][ T2593] bridge0: port 3(vlan1) entered blocking state [ 63.417941][ T2593] bridge0: port 3(vlan1) entered forwarding state [ 63.442886][ T2589] bridge0: port 3(gretap0) entered disabled state [ 63.449410][ T2589] bridge0: port 2(bridge_slave_1) entered disabled state [ 63.456580][ T2589] bridge0: port 1(bridge_slave_0) entered disabled state [ 64.001499][ T2601] device syzkaller0 entered promiscuous mode [ 64.525816][ T2640] device wg2 entered promiscuous mode [ 66.148954][ T24] audit: type=1400 audit(1778718420.990:144): avc: denied { create } for pid=2730 comm="syz.3.698" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 66.499763][ T2751] device syzkaller0 entered promiscuous mode [ 66.738470][ T2784] ------------[ cut here ]------------ [ 66.747769][ T2784] trace type BPF program uses run-time allocation [ 66.756954][ T2783] FAULT_INJECTION: forcing a failure. [ 66.756954][ T2783] name failslab, interval 1, probability 0, space 0, times 1 [ 66.770220][ T2784] WARNING: CPU: 0 PID: 2784 at kernel/bpf/verifier.c:10518 check_map_prog_compatibility+0x5d6/0x740 [ 66.782117][ T2784] Modules linked in: [ 66.786100][ T2784] CPU: 0 PID: 2784 Comm: syz.4.712 Not tainted syzkaller #0 [ 66.794099][ T2783] CPU: 0 PID: 2783 Comm: syz.1.713 Not tainted syzkaller #0 [ 66.801413][ T2783] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/18/2026 [ 66.811483][ T2783] Call Trace: [ 66.814790][ T2783] __dump_stack+0x21/0x24 [ 66.819135][ T2783] dump_stack_lvl+0x1a7/0x208 [ 66.823828][ T2783] ? show_regs_print_info+0x18/0x18 [ 66.829039][ T2783] dump_stack+0x15/0x1c [ 66.833212][ T2783] should_fail+0x3c1/0x510 [ 66.837645][ T2783] ? mm_init+0x36e/0x8e0 [ 66.841910][ T2783] __should_failslab+0xa4/0xe0 [ 66.846695][ T2783] should_failslab+0x9/0x20 [ 66.851209][ T2783] kmem_cache_alloc_trace+0x3a/0x2e0 [ 66.856509][ T2783] mm_init+0x36e/0x8e0 [ 66.860590][ T2783] copy_mm+0x1cd/0x13d0 [ 66.864771][ T2783] ? _raw_spin_lock+0x94/0xf0 [ 66.869488][ T2783] ? copy_signal+0x600/0x600 [ 66.874096][ T2783] ? __kasan_check_write+0x14/0x20 [ 66.879220][ T2783] ? __init_rwsem+0xd5/0x1c0 [ 66.883825][ T2783] ? copy_signal+0x4cb/0x600 [ 66.888432][ T2783] copy_process+0x11a2/0x3300 [ 66.893139][ T2783] ? proc_fail_nth_read+0x220/0x220 [ 66.898377][ T2783] ? __pidfd_prepare+0x150/0x150 [ 66.903336][ T2783] ? rw_verify_area+0x1c0/0x360 [ 66.908202][ T2783] ? vfs_write+0xb27/0xdc0 [ 66.912635][ T2783] kernel_clone+0x233/0x960 [ 66.917152][ T2783] ? kernel_write+0x3c0/0x3c0 [ 66.921839][ T2783] ? create_io_thread+0x170/0x170 [ 66.926871][ T2783] ? mutex_lock+0x92/0xf0 [ 66.931224][ T2783] __x64_sys_clone+0x198/0x210 [ 66.936003][ T2783] ? __ia32_sys_vfork+0x130/0x130 [ 66.941043][ T2783] ? ksys_write+0x1f4/0x250 [ 66.945571][ T2783] ? debug_smp_processor_id+0x17/0x20 [ 66.950950][ T2783] ? fpregs_assert_state_consistent+0xb1/0xe0 [ 66.957024][ T2783] ? exit_to_user_mode_prepare+0x2f/0xa0 [ 66.962670][ T2783] do_syscall_64+0x31/0x40 [ 66.967114][ T2783] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 66.973030][ T2783] RIP: 0033:0x7f0b9a52ee59 [ 66.977462][ T2783] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 66.997082][ T2783] RSP: 002b:00007f0b98f88fd8 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 67.005507][ T2783] RAX: ffffffffffffffda RBX: 00007f0b9a7a7fa0 RCX: 00007f0b9a52ee59 [ 67.013490][ T2783] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000020102400 [ 67.021482][ T2783] RBP: 00007f0b98f89090 R08: 0000000000000000 R09: 0000000000000000 [ 67.029483][ T2783] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000001 [ 67.037470][ T2783] R13: 00007f0b9a7a8038 R14: 00007f0b9a7a7fa0 R15: 00007ffec6d5c318 [ 67.078686][ T2784] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/18/2026 [ 67.148422][ T2784] RIP: 0010:check_map_prog_compatibility+0x5d6/0x740 [ 67.158486][ T2784] Code: 85 e9 14 fe ff ff e8 99 d1 ef ff 31 c0 e9 15 fe ff ff e8 8d d1 ef ff c6 05 06 b8 4b 05 01 48 c7 c7 c0 d2 25 85 e8 3a 25 05 03 <0f> 0b e9 85 fc ff ff 89 d9 80 e1 07 80 c1 03 38 c1 0f 8c a3 fa ff [ 67.182704][ T2784] RSP: 0018:ffffc90000dc7448 EFLAGS: 00010246 [ 67.198489][ T2784] RAX: dae398145d69ae00 RBX: 0000000000000001 RCX: 0000000000080000 [ 67.207298][ T2784] RDX: ffffc90004507000 RSI: 0000000000001cdd RDI: 0000000000001cde [ 67.271360][ T2784] RBP: ffffc90000dc7490 R08: ffff8881f7052fbf R09: 1ffff1103ee0a5f7 [ 67.313571][ T2784] R10: dffffc0000000000 R11: ffffed103ee0a5f8 R12: ffff8881119c4000 [ 67.356552][ T2784] R13: 0000000000000011 R14: dffffc0000000000 R15: ffff888111fd9800 [ 67.369232][ T2784] FS: 00007f5c641da6c0(0000) GS:ffff8881f7000000(0000) knlGS:0000000000000000 [ 67.381626][ T2784] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 67.388529][ T2784] CR2: 0000000000000000 CR3: 0000000139d98000 CR4: 00000000003506b0 [ 67.396647][ T2784] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 67.409107][ T2784] DR3: 0000000000000000 DR6: 00000000ffff0ff0 DR7: 0000000000000600 [ 67.417233][ T2784] Call Trace: [ 67.420663][ T2784] ? __fdget+0x1a1/0x230 [ 67.424972][ T2784] resolve_pseudo_ldimm64+0x55e/0x1060 [ 67.430530][ T2784] ? bpf_check+0xdb10/0xdb10 [ 67.435205][ T2784] ? kvmalloc_node+0x88/0x130 [ 67.439967][ T2784] bpf_check+0x9058/0xdb10 [ 67.444438][ T2784] ? bpf_get_btf_vmlinux+0x60/0x60 [ 67.449938][ T2784] ? 0xffffffffa002a674 [ 67.454149][ T2784] ? is_bpf_text_address+0x177/0x190 [ 67.459711][ T2784] ? selinux_bpf_prog_alloc+0x51/0x140 [ 67.465623][ T2784] ? __kernel_text_address+0xa0/0x100 [ 67.471378][ T2784] ? unwind_get_return_address+0x4d/0x90 [ 67.477101][ T2784] ? stack_trace_save+0xf0/0xf0 [ 67.482032][ T2784] ? arch_stack_walk+0xee/0x140 [ 67.486941][ T2784] ? stack_trace_save+0xa6/0xf0 [ 67.491962][ T2784] ? stack_trace_snprint+0xf0/0xf0 [ 67.577860][ T2784] ? __kasan_slab_alloc+0x69/0xf0 [ 67.638472][ T2784] ? pcpu_block_update+0x451/0x900 [ 67.668361][ T2784] ? selinux_bpf_prog_alloc+0x51/0x140 [ 67.673886][ T2784] ? selinux_bpf_prog_alloc+0x51/0x140 [ 67.685117][ T2784] ? __kasan_kmalloc+0xec/0x110 [ 67.691010][ T2784] ? __kasan_kmalloc+0xda/0x110 [ 67.701738][ T2784] ? kmem_cache_alloc_trace+0x181/0x2e0 [ 67.707316][ T2784] ? selinux_bpf_prog_alloc+0x51/0x140 [ 67.713076][ T2784] ? security_bpf_prog_alloc+0x62/0x90 [ 67.718947][ T2784] ? bpf_prog_load+0x9d8/0x14a0 [ 67.723895][ T2784] ? __se_sys_bpf+0x49a/0x740 [ 67.754162][ T2784] ? __x64_sys_bpf+0x7b/0x90 [ 67.762132][ T2784] ? do_syscall_64+0x31/0x40 [ 67.771604][ T2784] ? entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 67.777783][ T2784] ? memset+0x35/0x40 [ 67.785992][ T2784] ? bpf_obj_name_cpy+0x193/0x1e0 [ 67.829333][ T2784] bpf_prog_load+0xfca/0x14a0 [ 67.834051][ T2784] ? map_freeze+0x320/0x320 [ 67.866380][ T2784] ? selinux_bpf+0xc7/0xf0 [ 67.898741][ T2784] ? security_bpf+0x82/0xa0 [ 67.903327][ T2784] __se_sys_bpf+0x49a/0x740 [ 67.952830][ T2784] ? __x64_sys_bpf+0x90/0x90 [ 68.002805][ T2784] ? __kasan_check_read+0x11/0x20 [ 68.007869][ T2784] __x64_sys_bpf+0x7b/0x90 [ 68.078612][ T2784] do_syscall_64+0x31/0x40 [ 68.128306][ T2784] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 68.134386][ T2784] RIP: 0033:0x7f5c657a0e59 [ 68.175028][ T2784] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 68.214634][ T2784] RSP: 002b:00007f5c641da028 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 68.223844][ T2784] RAX: ffffffffffffffda RBX: 00007f5c65a1a090 RCX: 00007f5c657a0e59 [ 68.251617][ T2784] RDX: 0000000000000094 RSI: 00002000000000c0 RDI: 0000000000000005 [ 68.259700][ T2784] RBP: 00007f5c65836d6f R08: 0000000000000000 R09: 0000000000000000 [ 68.267780][ T2784] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 68.282034][ T2784] R13: 00007f5c65a1a128 R14: 00007f5c65a1a090 R15: 00007ffeb1913d08 [ 68.295730][ T2784] ---[ end trace 2f5a739a9b19431d ]--- [ 69.752381][ T2900] device syzkaller0 entered promiscuous mode [ 69.823413][ T2913] Scheduler tracepoints stat_sleep, stat_iowait, stat_blocked and stat_runtime require the kernel parameter schedstats=enable or kernel.sched_schedstats=1 [ 70.262799][ T2921] device syzkaller0 entered promiscuous mode [ 70.390871][ T2921] geneve0: tun_chr_ioctl cmd 1074812117 [ 70.408002][ T24] audit: type=1400 audit(1778718425.240:145): avc: denied { create } for pid=2929 comm="syz.2.756" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=atmsvc_socket permissive=1 [ 72.540635][ T3004] device syzkaller0 entered promiscuous mode [ 72.956285][ T3012] tun0: tun_chr_ioctl cmd 1074025677 [ 72.967188][ T3012] tun0: linktype set to 820 [ 74.684591][ T3069] device syzkaller0 entered promiscuous mode [ 76.276924][ T3147] skbuff: bad partial csum: csum=65489/0 headroom=64 headlen=65491 [ 76.396561][ T3157] device syzkaller0 entered promiscuous mode [ 76.694092][ T3182] : port 1(ip6gretap0) entered blocking state [ 76.701716][ T3182] : port 1(ip6gretap0) entered disabled state [ 76.711403][ T3182] device ip6gretap0 entered promiscuous mode [ 76.747351][ T3182] device ip6gretap0 left promiscuous mode [ 76.759856][ T3182] : port 1(ip6gretap0) entered disabled state [ 76.886632][ T3208] device syzkaller0 entered promiscuous mode [ 78.683033][ T3268] @0йџџ: renamed from bond_slave_1 [ 79.308830][ T3287] -1: renamed from syzkaller0 [ 81.387961][ T3378] device syzkaller0 entered promiscuous mode [ 81.879343][ T3388] device wg2 entered promiscuous mode [ 82.646522][ T3420] FAULT_INJECTION: forcing a failure. [ 82.646522][ T3420] name failslab, interval 1, probability 0, space 0, times 0 [ 82.668713][ T3420] CPU: 0 PID: 3420 Comm: syz.2.899 Tainted: G W syzkaller #0 [ 82.677418][ T3420] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/18/2026 [ 82.687484][ T3420] Call Trace: [ 82.690797][ T3420] __dump_stack+0x21/0x24 [ 82.695131][ T3420] dump_stack_lvl+0x1a7/0x208 [ 82.699835][ T3420] ? show_regs_print_info+0x18/0x18 [ 82.705050][ T3420] dump_stack+0x15/0x1c [ 82.709228][ T3420] should_fail+0x3c1/0x510 [ 82.713673][ T3420] ? copy_signal+0x54/0x600 [ 82.718202][ T3420] __should_failslab+0xa4/0xe0 [ 82.722974][ T3420] should_failslab+0x9/0x20 [ 82.727500][ T3420] kmem_cache_alloc+0x3d/0x2d0 [ 82.732277][ T3420] copy_signal+0x54/0x600 [ 82.736613][ T3420] ? copy_process+0x1155/0x3300 [ 82.741472][ T3420] copy_process+0x1176/0x3300 [ 82.746166][ T3420] ? proc_fail_nth_read+0x220/0x220 [ 82.751377][ T3420] ? __pidfd_prepare+0x150/0x150 [ 82.756330][ T3420] ? rw_verify_area+0x1c0/0x360 [ 82.761212][ T3420] ? vfs_write+0xb27/0xdc0 [ 82.765637][ T3420] kernel_clone+0x233/0x960 [ 82.770165][ T3420] ? kernel_write+0x3c0/0x3c0 [ 82.774859][ T3420] ? create_io_thread+0x170/0x170 [ 82.779896][ T3420] ? mutex_lock+0x92/0xf0 [ 82.784236][ T3420] __x64_sys_clone+0x198/0x210 [ 82.789132][ T3420] ? __ia32_sys_vfork+0x130/0x130 [ 82.794169][ T3420] ? ksys_write+0x1f4/0x250 [ 82.798687][ T3420] ? debug_smp_processor_id+0x17/0x20 [ 82.804070][ T3420] ? fpregs_assert_state_consistent+0xb1/0xe0 [ 82.810154][ T3420] ? exit_to_user_mode_prepare+0x2f/0xa0 [ 82.815802][ T3420] do_syscall_64+0x31/0x40 [ 82.820232][ T3420] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 82.826147][ T3420] RIP: 0033:0x7fcc0b0a7e59 [ 82.830583][ T3420] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 82.850206][ T3420] RSP: 002b:00007fcc09b01fd8 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 82.858636][ T3420] RAX: ffffffffffffffda RBX: 00007fcc0b320fa0 RCX: 00007fcc0b0a7e59 [ 82.866624][ T3420] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000020102400 [ 82.874594][ T3420] RBP: 00007fcc09b02090 R08: 0000000000000000 R09: 0000000000000000 [ 82.882564][ T3420] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000002 [ 82.890540][ T3420] R13: 00007fcc0b321038 R14: 00007fcc0b320fa0 R15: 00007ffd744f0e38 [ 83.452349][ T3453] device syzkaller0 entered promiscuous mode [ 86.579856][ T24] audit: type=1400 audit(1778718441.420:146): avc: denied { ioctl } for pid=3609 comm="syz.2.960" path="socket:[26183]" dev="sockfs" ino=26183 ioctlcmd=0x8907 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 88.299867][ T3677] device syzkaller0 entered promiscuous mode [ 88.774368][ T3697] device syzkaller0 entered promiscuous mode [ 88.817802][ T3697] PF_CAN: dropped non conform CAN skbuff: dev type 280, len 65487 [ 88.907795][ T3708] device syzkaller0 entered promiscuous mode [ 89.864806][ T3764] syz.1.1003[3764] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 89.864849][ T3764] syz.1.1003[3764] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 90.673629][ T3806] device syzkaller0 entered promiscuous mode [ 90.962535][ T3820] bridge0: port 3(vlan1) entered disabled state [ 90.968901][ T3820] bridge0: port 2(bridge_slave_1) entered disabled state [ 91.003574][ T3820] device vlan1 left promiscuous mode [ 91.009697][ T3820] bridge0: port 3(vlan1) entered disabled state [ 91.016817][ T3820] device bridge_slave_1 left promiscuous mode [ 91.023014][ T3820] bridge0: port 2(bridge_slave_1) entered disabled state [ 91.041096][ T3820] device bridge_slave_0 left promiscuous mode [ 91.047302][ T3820] bridge0: port 1(bridge_slave_0) entered disabled state [ 91.240006][ T3849] device syzkaller0 entered promiscuous mode [ 91.782013][ T3906] FAULT_INJECTION: forcing a failure. [ 91.782013][ T3906] name failslab, interval 1, probability 0, space 0, times 0 [ 91.816614][ T3906] CPU: 1 PID: 3906 Comm: syz.4.1044 Tainted: G W syzkaller #0 [ 91.825409][ T3906] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/18/2026 [ 91.835472][ T3906] Call Trace: [ 91.838779][ T3906] __dump_stack+0x21/0x24 [ 91.843126][ T3906] dump_stack_lvl+0x1a7/0x208 [ 91.847815][ T3906] ? thaw_kernel_threads+0x220/0x220 [ 91.853141][ T3906] ? show_regs_print_info+0x18/0x18 [ 91.858353][ T3906] ? perf_trace_kmem_alloc+0xf6/0x140 [ 91.863721][ T3906] ? vma_interval_tree_augment_rotate+0x1f0/0x1f0 [ 91.870139][ T3906] dump_stack+0x15/0x1c [ 91.874297][ T3906] should_fail+0x3c1/0x510 [ 91.878717][ T3906] ? anon_vma_fork+0xf2/0x510 [ 91.883504][ T3906] __should_failslab+0xa4/0xe0 [ 91.888264][ T3906] should_failslab+0x9/0x20 [ 91.892783][ T3906] kmem_cache_alloc+0x3d/0x2d0 [ 91.897542][ T3906] anon_vma_fork+0xf2/0x510 [ 91.902045][ T3906] copy_mm+0x920/0x13d0 [ 91.906202][ T3906] ? copy_signal+0x600/0x600 [ 91.910796][ T3906] ? __init_rwsem+0xd5/0x1c0 [ 91.915388][ T3906] ? copy_signal+0x4cb/0x600 [ 91.919984][ T3906] copy_process+0x11a2/0x3300 [ 91.924665][ T3906] ? proc_fail_nth_read+0x220/0x220 [ 91.929868][ T3906] ? __pidfd_prepare+0x150/0x150 [ 91.934804][ T3906] ? rw_verify_area+0x1c0/0x360 [ 91.939659][ T3906] ? vfs_write+0xb27/0xdc0 [ 91.944078][ T3906] kernel_clone+0x233/0x960 [ 91.948582][ T3906] ? kernel_write+0x3c0/0x3c0 [ 91.953260][ T3906] ? create_io_thread+0x170/0x170 [ 91.958285][ T3906] ? mutex_lock+0x92/0xf0 [ 91.962624][ T3906] __x64_sys_clone+0x198/0x210 [ 91.967391][ T3906] ? __ia32_sys_vfork+0x130/0x130 [ 91.972413][ T3906] ? ksys_write+0x1f4/0x250 [ 91.976921][ T3906] ? syscall_trace_enter+0x108/0x170 [ 91.982203][ T3906] do_syscall_64+0x31/0x40 [ 91.986618][ T3906] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 91.992504][ T3906] RIP: 0033:0x7f5c657a0e59 [ 91.996917][ T3906] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 92.016521][ T3906] RSP: 002b:00007f5c641fafd8 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 92.024932][ T3906] RAX: ffffffffffffffda RBX: 00007f5c65a19fa0 RCX: 00007f5c657a0e59 [ 92.032906][ T3906] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000020102400 [ 92.040880][ T3906] RBP: 00007f5c641fb090 R08: 0000000000000000 R09: 0000000000000000 [ 92.048849][ T3906] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000002 [ 92.056816][ T3906] R13: 00007f5c65a1a038 R14: 00007f5c65a19fa0 R15: 00007ffeb1913d08 [ 92.179631][ T3923] device veth0_vlan left promiscuous mode [ 92.194047][ T3923] device veth0_vlan entered promiscuous mode [ 92.303704][ T309] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 92.318648][ T309] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 92.350904][ T309] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 92.369842][ T3933] device wg2 left promiscuous mode [ 92.394853][ T3933] device wg2 entered promiscuous mode [ 93.703980][ T3987] skbuff: bad partial csum: csum=65489/0 headroom=64 headlen=65491 [ 96.621045][ T4158] Бџ: renamed from team_slave_1 [ 96.833247][ T4171] FAULT_INJECTION: forcing a failure. [ 96.833247][ T4171] name fail_page_alloc, interval 1, probability 0, space 0, times 1 [ 96.854998][ T4171] CPU: 1 PID: 4171 Comm: syz.3.1112 Tainted: G W syzkaller #0 [ 96.863790][ T4171] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/18/2026 [ 96.873916][ T4171] Call Trace: [ 96.877215][ T4171] __dump_stack+0x21/0x24 [ 96.881552][ T4171] dump_stack_lvl+0x1a7/0x208 [ 96.886232][ T4171] ? show_regs_print_info+0x18/0x18 [ 96.891433][ T4171] ? ctx_sched_in+0x259/0x2f0 [ 96.896108][ T4171] ? _raw_spin_unlock+0x4d/0x70 [ 96.900958][ T4171] dump_stack+0x15/0x1c [ 96.905121][ T4171] should_fail+0x3c1/0x510 [ 96.909558][ T4171] should_fail_alloc_page+0x4f/0x60 [ 96.914760][ T4171] __alloc_pages_nodemask+0x119/0x620 [ 96.920132][ T4171] ? __alloc_pages_nodemask+0x5e6/0x620 [ 96.925680][ T4171] ? gfp_pfmemalloc_allowed+0x130/0x130 [ 96.931227][ T4171] ? gfp_pfmemalloc_allowed+0x130/0x130 [ 96.936767][ T4171] ? __kasan_check_write+0x14/0x20 [ 96.941874][ T4171] ? _raw_spin_lock+0x94/0xf0 [ 96.946550][ T4171] ? _raw_spin_trylock_bh+0x150/0x150 [ 96.951920][ T4171] ? _raw_spin_lock+0x94/0xf0 [ 96.956596][ T4171] ? _raw_spin_trylock_bh+0x150/0x150 [ 96.961989][ T4171] ? __schedule+0xb5b/0x1320 [ 96.966593][ T4171] pte_alloc_one+0x1f/0xc0 [ 96.971020][ T4171] __pte_alloc+0x24/0x1d0 [ 96.975351][ T4171] copy_page_range+0x23b7/0x2880 [ 96.980300][ T4171] ? down_write+0x7b/0x120 [ 96.984727][ T4171] ? pfn_valid+0x1c0/0x1c0 [ 96.989147][ T4171] ? trace_raw_output_vm_unmapped_area+0x210/0x210 [ 96.995657][ T4171] ? _raw_write_unlock+0x2b/0x60 [ 97.000602][ T4171] copy_mm+0xc30/0x13d0 [ 97.004765][ T4171] ? copy_signal+0x600/0x600 [ 97.009364][ T4171] ? __init_rwsem+0xd5/0x1c0 [ 97.013952][ T4171] ? copy_signal+0x4cb/0x600 [ 97.018542][ T4171] copy_process+0x11a2/0x3300 [ 97.023224][ T4171] ? proc_fail_nth_read+0x220/0x220 [ 97.028417][ T4171] ? __pidfd_prepare+0x150/0x150 [ 97.033352][ T4171] ? rw_verify_area+0x1c0/0x360 [ 97.038198][ T4171] ? vfs_write+0xb27/0xdc0 [ 97.042631][ T4171] kernel_clone+0x233/0x960 [ 97.047141][ T4171] ? kernel_write+0x3c0/0x3c0 [ 97.051816][ T4171] ? create_io_thread+0x170/0x170 [ 97.056847][ T4171] ? mutex_lock+0x92/0xf0 [ 97.061175][ T4171] __x64_sys_clone+0x198/0x210 [ 97.065940][ T4171] ? __ia32_sys_vfork+0x130/0x130 [ 97.071002][ T4171] ? ksys_write+0x1f4/0x250 [ 97.075509][ T4171] ? debug_smp_processor_id+0x17/0x20 [ 97.080887][ T4171] ? fpregs_assert_state_consistent+0xb1/0xe0 [ 97.086965][ T4171] ? exit_to_user_mode_prepare+0x2f/0xa0 [ 97.092602][ T4171] do_syscall_64+0x31/0x40 [ 97.097014][ T4171] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 97.103033][ T4171] RIP: 0033:0x7f067d226e59 [ 97.107478][ T4171] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 97.127093][ T4171] RSP: 002b:00007f067bc80fd8 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 97.135511][ T4171] RAX: ffffffffffffffda RBX: 00007f067d49ffa0 RCX: 00007f067d226e59 [ 97.143479][ T4171] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000020102400 [ 97.151448][ T4171] RBP: 00007f067bc81090 R08: 0000000000000000 R09: 0000000000000000 [ 97.159684][ T4171] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000002 [ 97.167787][ T4171] R13: 00007f067d4a0038 R14: 00007f067d49ffa0 R15: 00007ffd6a016a38 [ 97.320898][ T24] audit: type=1400 audit(1778718452.160:147): avc: denied { create } for pid=4189 comm="syz.3.1118" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rxrpc_socket permissive=1 [ 97.998048][ T4241] FAULT_INJECTION: forcing a failure. [ 97.998048][ T4241] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 98.158348][ T4241] CPU: 1 PID: 4241 Comm: syz.1.1127 Tainted: G W syzkaller #0 [ 98.167242][ T4241] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/18/2026 [ 98.177320][ T4241] Call Trace: [ 98.180622][ T4241] __dump_stack+0x21/0x24 [ 98.184970][ T4241] dump_stack_lvl+0x1a7/0x208 [ 98.189674][ T4241] ? show_regs_print_info+0x18/0x18 [ 98.194894][ T4241] dump_stack+0x15/0x1c [ 98.199068][ T4241] should_fail+0x3c1/0x510 [ 98.203503][ T4241] should_fail_alloc_page+0x4f/0x60 [ 98.208718][ T4241] __alloc_pages_nodemask+0x119/0x620 [ 98.214101][ T4241] ? gfp_pfmemalloc_allowed+0x130/0x130 [ 98.219678][ T4241] ? debug_smp_processor_id+0x17/0x20 [ 98.225077][ T4241] ? __kasan_check_write+0x14/0x20 [ 98.230202][ T4241] ? _raw_spin_lock+0x94/0xf0 [ 98.234906][ T4241] ? _raw_spin_trylock_bh+0x150/0x150 [ 98.240306][ T4241] ? __kasan_slab_alloc+0xcf/0xf0 [ 98.245331][ T4241] ? __kasan_slab_alloc+0xbd/0xf0 [ 98.250355][ T4241] ? slab_post_alloc_hook+0x5d/0x2f0 [ 98.255644][ T4241] __pmd_alloc+0x41/0x360 [ 98.260187][ T4241] ? __pud_alloc+0x17f/0x1a0 [ 98.264799][ T4241] copy_page_range+0x252b/0x2880 [ 98.269755][ T4241] ? pfn_valid+0x1c0/0x1c0 [ 98.274195][ T4241] ? trace_raw_output_vm_unmapped_area+0x210/0x210 [ 98.280698][ T4241] ? _raw_write_unlock+0x2b/0x60 [ 98.285645][ T4241] copy_mm+0xc30/0x13d0 [ 98.289822][ T4241] ? copy_signal+0x600/0x600 [ 98.294420][ T4241] ? __init_rwsem+0xd5/0x1c0 [ 98.299017][ T4241] ? copy_signal+0x4cb/0x600 [ 98.303616][ T4241] copy_process+0x11a2/0x3300 [ 98.308299][ T4241] ? proc_fail_nth_read+0x220/0x220 [ 98.313508][ T4241] ? __pidfd_prepare+0x150/0x150 [ 98.318461][ T4241] ? rw_verify_area+0x1c0/0x360 [ 98.323339][ T4241] ? vfs_write+0xb27/0xdc0 [ 98.327765][ T4241] kernel_clone+0x233/0x960 [ 98.332279][ T4241] ? kernel_write+0x3c0/0x3c0 [ 98.336974][ T4241] ? create_io_thread+0x170/0x170 [ 98.342006][ T4241] ? mutex_lock+0x92/0xf0 [ 98.346354][ T4241] __x64_sys_clone+0x198/0x210 [ 98.351153][ T4241] ? __ia32_sys_vfork+0x130/0x130 [ 98.356183][ T4241] ? ksys_write+0x1f4/0x250 [ 98.360708][ T4241] ? debug_smp_processor_id+0x17/0x20 [ 98.366114][ T4241] ? fpregs_assert_state_consistent+0xb1/0xe0 [ 98.372187][ T4241] ? exit_to_user_mode_prepare+0x2f/0xa0 [ 98.377827][ T4241] do_syscall_64+0x31/0x40 [ 98.382284][ T4241] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 98.388186][ T4241] RIP: 0033:0x7f0b9a52ee59 [ 98.392609][ T4241] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 98.412220][ T4241] RSP: 002b:00007f0b98f88fd8 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 98.420659][ T4241] RAX: ffffffffffffffda RBX: 00007f0b9a7a7fa0 RCX: 00007f0b9a52ee59 [ 98.428635][ T4241] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000020102400 [ 98.436601][ T4241] RBP: 00007f0b98f89090 R08: 0000000000000000 R09: 0000000000000000 [ 98.444571][ T4241] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000002 [ 98.452550][ T4241] R13: 00007f0b9a7a8038 R14: 00007f0b9a7a7fa0 R15: 00007ffec6d5c318 [ 98.786597][ T4264] tun0: tun_chr_ioctl cmd 2148553947 [ 100.159431][ T4299] FAULT_INJECTION: forcing a failure. [ 100.159431][ T4299] name failslab, interval 1, probability 0, space 0, times 0 [ 100.188275][ T4299] CPU: 0 PID: 4299 Comm: syz.0.1143 Tainted: G W syzkaller #0 [ 100.197069][ T4299] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/18/2026 [ 100.207139][ T4299] Call Trace: [ 100.210461][ T4299] __dump_stack+0x21/0x24 [ 100.214801][ T4299] dump_stack_lvl+0x1a7/0x208 [ 100.219490][ T4299] ? thaw_kernel_threads+0x220/0x220 [ 100.224793][ T4299] ? show_regs_print_info+0x18/0x18 [ 100.230011][ T4299] dump_stack+0x15/0x1c [ 100.234179][ T4299] should_fail+0x3c1/0x510 [ 100.238617][ T4299] ? anon_vma_clone+0xc0/0x500 [ 100.243398][ T4299] __should_failslab+0xa4/0xe0 [ 100.248183][ T4299] should_failslab+0x9/0x20 [ 100.252702][ T4299] kmem_cache_alloc+0x3d/0x2d0 [ 100.257487][ T4299] anon_vma_clone+0xc0/0x500 [ 100.262093][ T4299] ? vm_area_dup+0x26/0x250 [ 100.266609][ T4299] anon_vma_fork+0x8c/0x510 [ 100.271132][ T4299] copy_mm+0x920/0x13d0 [ 100.275317][ T4299] ? copy_signal+0x600/0x600 [ 100.279924][ T4299] ? __init_rwsem+0xd5/0x1c0 [ 100.284536][ T4299] ? copy_signal+0x4cb/0x600 [ 100.289151][ T4299] copy_process+0x11a2/0x3300 [ 100.293852][ T4299] ? proc_fail_nth_read+0x220/0x220 [ 100.299076][ T4299] ? __pidfd_prepare+0x150/0x150 [ 100.304035][ T4299] ? rw_verify_area+0x1c0/0x360 [ 100.308923][ T4299] ? vfs_write+0xb27/0xdc0 [ 100.313361][ T4299] kernel_clone+0x233/0x960 [ 100.317875][ T4299] ? kernel_write+0x3c0/0x3c0 [ 100.322572][ T4299] ? create_io_thread+0x170/0x170 [ 100.327614][ T4299] ? mutex_lock+0x92/0xf0 [ 100.332053][ T4299] __x64_sys_clone+0x198/0x210 [ 100.336826][ T4299] ? __ia32_sys_vfork+0x130/0x130 [ 100.341861][ T4299] ? ksys_write+0x1f4/0x250 [ 100.346386][ T4299] ? debug_smp_processor_id+0x17/0x20 [ 100.351804][ T4299] ? fpregs_assert_state_consistent+0xb1/0xe0 [ 100.357877][ T4299] ? exit_to_user_mode_prepare+0x2f/0xa0 [ 100.363517][ T4299] do_syscall_64+0x31/0x40 [ 100.367943][ T4299] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 100.373839][ T4299] RIP: 0033:0x7f8f02fbce59 [ 100.378267][ T4299] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 100.397921][ T4299] RSP: 002b:00007f8f01a16fd8 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 100.406347][ T4299] RAX: ffffffffffffffda RBX: 00007f8f03235fa0 RCX: 00007f8f02fbce59 [ 100.414351][ T4299] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000020102400 [ 100.422330][ T4299] RBP: 00007f8f01a17090 R08: 0000000000000000 R09: 0000000000000000 [ 100.430317][ T4299] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000002 [ 100.438298][ T4299] R13: 00007f8f03236038 R14: 00007f8f03235fa0 R15: 00007ffee547e078 [ 100.776539][ T4358] FAULT_INJECTION: forcing a failure. [ 100.776539][ T4358] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 100.790713][ T4358] CPU: 0 PID: 4358 Comm: syz.3.1162 Tainted: G W syzkaller #0 [ 100.799508][ T4358] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/18/2026 [ 100.809582][ T4358] Call Trace: [ 100.812905][ T4358] __dump_stack+0x21/0x24 [ 100.817251][ T4358] dump_stack_lvl+0x1a7/0x208 [ 100.821944][ T4358] ? show_regs_print_info+0x18/0x18 [ 100.827156][ T4358] dump_stack+0x15/0x1c [ 100.831322][ T4358] should_fail+0x3c1/0x510 [ 100.835763][ T4358] should_fail_alloc_page+0x4f/0x60 [ 100.840987][ T4358] __alloc_pages_nodemask+0x119/0x620 [ 100.846387][ T4358] ? gfp_pfmemalloc_allowed+0x130/0x130 [ 100.851947][ T4358] ? debug_smp_processor_id+0x17/0x20 [ 100.857337][ T4358] ? __kasan_check_write+0x14/0x20 [ 100.862467][ T4358] ? _raw_spin_lock+0x94/0xf0 [ 100.867163][ T4358] ? _raw_spin_trylock_bh+0x150/0x150 [ 100.872547][ T4358] ? __kasan_slab_alloc+0xcf/0xf0 [ 100.877586][ T4358] ? __kasan_slab_alloc+0xbd/0xf0 [ 100.882635][ T4358] ? slab_post_alloc_hook+0x5d/0x2f0 [ 100.887943][ T4358] __pmd_alloc+0x41/0x360 [ 100.892287][ T4358] ? __pud_alloc+0x17f/0x1a0 [ 100.896890][ T4358] copy_page_range+0x252b/0x2880 [ 100.901849][ T4358] ? pfn_valid+0x1c0/0x1c0 [ 100.906275][ T4358] ? trace_raw_output_vm_unmapped_area+0x210/0x210 [ 100.912785][ T4358] ? _raw_write_unlock+0x2b/0x60 [ 100.917751][ T4358] copy_mm+0xc30/0x13d0 [ 100.921915][ T4358] ? copy_signal+0x600/0x600 [ 100.926514][ T4358] ? __init_rwsem+0xd5/0x1c0 [ 100.931114][ T4358] ? copy_signal+0x4cb/0x600 [ 100.935706][ T4358] copy_process+0x11a2/0x3300 [ 100.940400][ T4358] ? proc_fail_nth_read+0x220/0x220 [ 100.945613][ T4358] ? __pidfd_prepare+0x150/0x150 [ 100.950656][ T4358] ? rw_verify_area+0x1c0/0x360 [ 100.955526][ T4358] ? vfs_write+0xb27/0xdc0 [ 100.959955][ T4358] kernel_clone+0x233/0x960 [ 100.964473][ T4358] ? kernel_write+0x3c0/0x3c0 [ 100.969158][ T4358] ? create_io_thread+0x170/0x170 [ 100.974193][ T4358] ? mutex_lock+0x92/0xf0 [ 100.978532][ T4358] __x64_sys_clone+0x198/0x210 [ 100.983310][ T4358] ? __ia32_sys_vfork+0x130/0x130 [ 100.988339][ T4358] ? ksys_write+0x1f4/0x250 [ 100.992957][ T4358] ? debug_smp_processor_id+0x17/0x20 [ 100.998337][ T4358] ? fpregs_assert_state_consistent+0xb1/0xe0 [ 101.004417][ T4358] ? exit_to_user_mode_prepare+0x2f/0xa0 [ 101.010068][ T4358] do_syscall_64+0x31/0x40 [ 101.014568][ T4358] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 101.020579][ T4358] RIP: 0033:0x7f067d226e59 [ 101.025010][ T4358] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 101.044710][ T4358] RSP: 002b:00007f067bc80fd8 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 101.053131][ T4358] RAX: ffffffffffffffda RBX: 00007f067d49ffa0 RCX: 00007f067d226e59 [ 101.061124][ T4358] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000020102400 [ 101.069102][ T4358] RBP: 00007f067bc81090 R08: 0000000000000000 R09: 0000000000000000 [ 101.077094][ T4358] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000002 [ 101.085081][ T4358] R13: 00007f067d4a0038 R14: 00007f067d49ffa0 R15: 00007ffd6a016a38 [ 102.017140][ T4408] device syzkaller0 entered promiscuous mode [ 103.782853][ T4522] bridge0: port 2(bridge_slave_1) entered disabled state [ 103.790649][ T4522] bridge0: port 1(bridge_slave_0) entered disabled state [ 103.833760][ T4522] device bridge_slave_1 left promiscuous mode [ 103.847702][ T4522] bridge0: port 2(bridge_slave_1) entered disabled state [ 103.864170][ T4522] device bridge_slave_0 left promiscuous mode [ 103.878353][ T4522] bridge0: port 1(bridge_slave_0) entered disabled state [ 104.293476][ T4544] device syzkaller0 entered promiscuous mode [ 105.110155][ T4619] device syzkaller0 entered promiscuous mode [ 106.501375][ T4670] device syzkaller0 entered promiscuous mode [ 107.088193][ T4691] device syzkaller0 entered promiscuous mode [ 107.524786][ T4711] FAULT_INJECTION: forcing a failure. [ 107.524786][ T4711] name failslab, interval 1, probability 0, space 0, times 0 [ 107.540858][ T4711] CPU: 1 PID: 4711 Comm: syz.3.1268 Tainted: G W syzkaller #0 [ 107.549649][ T4711] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/18/2026 [ 107.559711][ T4711] Call Trace: [ 107.563017][ T4711] __dump_stack+0x21/0x24 [ 107.567355][ T4711] dump_stack_lvl+0x1a7/0x208 [ 107.572048][ T4711] ? thaw_kernel_threads+0x220/0x220 [ 107.577358][ T4711] ? show_regs_print_info+0x18/0x18 [ 107.582579][ T4711] dump_stack+0x15/0x1c [ 107.586745][ T4711] should_fail+0x3c1/0x510 [ 107.591169][ T4711] ? anon_vma_clone+0xc0/0x500 [ 107.595945][ T4711] __should_failslab+0xa4/0xe0 [ 107.600716][ T4711] should_failslab+0x9/0x20 [ 107.605238][ T4711] kmem_cache_alloc+0x3d/0x2d0 [ 107.610007][ T4711] anon_vma_clone+0xc0/0x500 [ 107.614607][ T4711] anon_vma_fork+0x8c/0x510 [ 107.619118][ T4711] copy_mm+0x920/0x13d0 [ 107.623372][ T4711] ? copy_signal+0x600/0x600 [ 107.627968][ T4711] ? __init_rwsem+0xd5/0x1c0 [ 107.632568][ T4711] ? copy_signal+0x4cb/0x600 [ 107.637160][ T4711] copy_process+0x11a2/0x3300 [ 107.641845][ T4711] ? proc_fail_nth_read+0x220/0x220 [ 107.647052][ T4711] ? __pidfd_prepare+0x150/0x150 [ 107.652000][ T4711] ? rw_verify_area+0x1c0/0x360 [ 107.656853][ T4711] ? vfs_write+0xb27/0xdc0 [ 107.661291][ T4711] kernel_clone+0x233/0x960 [ 107.665800][ T4711] ? kernel_write+0x3c0/0x3c0 [ 107.670487][ T4711] ? create_io_thread+0x170/0x170 [ 107.675601][ T4711] ? mutex_lock+0x92/0xf0 [ 107.679957][ T4711] __x64_sys_clone+0x198/0x210 [ 107.684721][ T4711] ? __ia32_sys_vfork+0x130/0x130 [ 107.689747][ T4711] ? ksys_write+0x1f4/0x250 [ 107.694260][ T4711] ? debug_smp_processor_id+0x17/0x20 [ 107.699643][ T4711] ? fpregs_assert_state_consistent+0xb1/0xe0 [ 107.705716][ T4711] ? syscall_trace_enter+0x108/0x170 [ 107.711013][ T4711] do_syscall_64+0x31/0x40 [ 107.715429][ T4711] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 107.721339][ T4711] RIP: 0033:0x7f067d226e59 [ 107.725767][ T4711] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 107.745396][ T4711] RSP: 002b:00007f067bc80fd8 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 107.753830][ T4711] RAX: ffffffffffffffda RBX: 00007f067d49ffa0 RCX: 00007f067d226e59 [ 107.761829][ T4711] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000020102400 [ 107.769810][ T4711] RBP: 00007f067bc81090 R08: 0000000000000000 R09: 0000000000000000 [ 107.777912][ T4711] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000002 [ 107.785895][ T4711] R13: 00007f067d4a0038 R14: 00007f067d49ffa0 R15: 00007ffd6a016a38 [ 108.233952][ T4722] device syzkaller0 entered promiscuous mode [ 110.075134][ T4766] device veth0_vlan left promiscuous mode [ 110.100706][ T4766] device veth0_vlan entered promiscuous mode [ 110.129928][ T4766] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 110.154759][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 110.168670][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 110.200574][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 110.478429][ T4789] device syzkaller0 entered promiscuous mode [ 110.668778][ T24] audit: type=1400 audit(1778718465.510:148): avc: denied { create } for pid=4791 comm="syz.1.1293" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=atmpvc_socket permissive=1 [ 111.322465][ T4812] device syzkaller0 entered promiscuous mode [ 111.556250][ T4832] device syzkaller0 entered promiscuous mode [ 111.702153][ T4832] device syzkaller0 left promiscuous mode [ 112.252976][ T4850] device wg2 entered promiscuous mode [ 112.959957][ T4913] FAULT_INJECTION: forcing a failure. [ 112.959957][ T4913] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 112.975608][ T4913] CPU: 0 PID: 4913 Comm: syz.2.1329 Tainted: G W syzkaller #0 [ 112.984397][ T4913] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/18/2026 [ 112.994477][ T4913] Call Trace: [ 112.997795][ T4913] __dump_stack+0x21/0x24 [ 113.002135][ T4913] dump_stack_lvl+0x1a7/0x208 [ 113.006845][ T4913] ? show_regs_print_info+0x18/0x18 [ 113.012055][ T4913] dump_stack+0x15/0x1c [ 113.016306][ T4913] should_fail+0x3c1/0x510 [ 113.020856][ T4913] should_fail_alloc_page+0x4f/0x60 [ 113.026168][ T4913] __alloc_pages_nodemask+0x119/0x620 [ 113.031568][ T4913] ? __alloc_pages_nodemask+0x5e6/0x620 [ 113.037123][ T4913] ? gfp_pfmemalloc_allowed+0x130/0x130 [ 113.042657][ T4913] ? gfp_pfmemalloc_allowed+0x130/0x130 [ 113.048209][ T4913] ? __kasan_check_write+0x14/0x20 [ 113.053333][ T4913] ? _raw_spin_lock+0x94/0xf0 [ 113.058007][ T4913] ? _raw_spin_trylock_bh+0x150/0x150 [ 113.063372][ T4913] ? _raw_spin_lock+0x94/0xf0 [ 113.068039][ T4913] ? _raw_spin_trylock_bh+0x150/0x150 [ 113.073407][ T4913] pte_alloc_one+0x1f/0xc0 [ 113.077814][ T4913] __pte_alloc+0x24/0x1d0 [ 113.082161][ T4913] copy_page_range+0x23b7/0x2880 [ 113.087099][ T4913] ? pfn_valid+0x1c0/0x1c0 [ 113.091519][ T4913] ? trace_raw_output_vm_unmapped_area+0x210/0x210 [ 113.098006][ T4913] ? _raw_write_unlock+0x2b/0x60 [ 113.102932][ T4913] copy_mm+0xc30/0x13d0 [ 113.107080][ T4913] ? copy_signal+0x600/0x600 [ 113.111658][ T4913] ? __init_rwsem+0xd5/0x1c0 [ 113.116250][ T4913] ? copy_signal+0x4cb/0x600 [ 113.120858][ T4913] copy_process+0x11a2/0x3300 [ 113.125540][ T4913] ? proc_fail_nth_read+0x220/0x220 [ 113.130732][ T4913] ? __pidfd_prepare+0x150/0x150 [ 113.135662][ T4913] ? rw_verify_area+0x1c0/0x360 [ 113.140507][ T4913] ? vfs_write+0xb27/0xdc0 [ 113.144920][ T4913] kernel_clone+0x233/0x960 [ 113.149415][ T4913] ? kernel_write+0x3c0/0x3c0 [ 113.154087][ T4913] ? create_io_thread+0x170/0x170 [ 113.159099][ T4913] ? mutex_lock+0x92/0xf0 [ 113.163428][ T4913] __x64_sys_clone+0x198/0x210 [ 113.168206][ T4913] ? __ia32_sys_vfork+0x130/0x130 [ 113.173415][ T4913] ? ksys_write+0x1f4/0x250 [ 113.177911][ T4913] ? debug_smp_processor_id+0x17/0x20 [ 113.183279][ T4913] ? fpregs_assert_state_consistent+0xb1/0xe0 [ 113.189380][ T4913] ? exit_to_user_mode_prepare+0x2f/0xa0 [ 113.195005][ T4913] do_syscall_64+0x31/0x40 [ 113.199435][ T4913] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 113.205346][ T4913] RIP: 0033:0x7fcc0b0a7e59 [ 113.209756][ T4913] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 113.229362][ T4913] RSP: 002b:00007fcc09b01fd8 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 113.237787][ T4913] RAX: ffffffffffffffda RBX: 00007fcc0b320fa0 RCX: 00007fcc0b0a7e59 [ 113.245755][ T4913] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000020102400 [ 113.253718][ T4913] RBP: 00007fcc09b02090 R08: 0000000000000000 R09: 0000000000000000 [ 113.261683][ T4913] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000002 [ 113.269649][ T4913] R13: 00007fcc0b321038 R14: 00007fcc0b320fa0 R15: 00007ffd744f0e38 [ 113.302228][ T4916] device sit0 entered promiscuous mode [ 113.495879][ T4920] device syzkaller0 entered promiscuous mode [ 114.992668][ T24] audit: type=1400 audit(1778718469.830:149): avc: denied { attach_queue } for pid=4993 comm="syz.4.1354" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tun_socket permissive=1 [ 115.381388][ T5022] device syzkaller0 entered promiscuous mode [ 116.593412][ T5076] device syzkaller0 entered promiscuous mode [ 120.971890][ T5306] geneve1: tun_chr_ioctl cmd 2148553947 [ 122.530750][ T5379] skbuff: bad partial csum: csum=65489/0 headroom=64 headlen=65491 [ 123.130851][ T5413] device syzkaller0 entered promiscuous mode [ 124.319182][ T5447] device syzkaller0 entered promiscuous mode [ 124.455266][ T24] audit: type=1400 audit(1778718479.290:150): avc: denied { create } for pid=5459 comm="syz.0.1492" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=x25_socket permissive=1 [ 125.340201][ T5521] device syzkaller0 entered promiscuous mode [ 125.482095][ T5531] device wg2 left promiscuous mode [ 126.023482][ T5557] device veth1_macvtap left promiscuous mode [ 126.999352][ T5620] cgroup: fork rejected by pids controller in /syz0 [ 128.205090][ T5751] bridge0: port 1(bridge_slave_0) entered blocking state [ 128.213644][ T5751] bridge0: port 1(bridge_slave_0) entered disabled state [ 128.221404][ T5751] device bridge_slave_0 entered promiscuous mode [ 128.244722][ T5751] bridge0: port 2(bridge_slave_1) entered blocking state [ 128.252011][ T5751] bridge0: port 2(bridge_slave_1) entered disabled state [ 128.259812][ T5751] device bridge_slave_1 entered promiscuous mode [ 128.586895][ T24] audit: type=1400 audit(1778718483.420:151): avc: denied { create } for pid=5751 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 128.667308][ T24] audit: type=1400 audit(1778718483.470:152): avc: denied { write } for pid=5751 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 128.813967][ T309] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 128.825621][ T24] audit: type=1400 audit(1778718483.470:153): avc: denied { read } for pid=5751 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 128.856068][ T309] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 128.980776][ T476] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 129.028771][ T476] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 129.128344][ T476] bridge0: port 1(bridge_slave_0) entered blocking state [ 129.135429][ T476] bridge0: port 1(bridge_slave_0) entered forwarding state [ 129.388924][ T476] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 129.398531][ T476] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 129.409634][ T476] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 129.417958][ T476] bridge0: port 2(bridge_slave_1) entered blocking state [ 129.425064][ T476] bridge0: port 2(bridge_slave_1) entered forwarding state [ 129.436788][ T476] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 129.475247][ T476] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 129.486712][ T476] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 129.510639][ T9] device veth0_vlan left promiscuous mode [ 129.912173][ T5751] device veth0_vlan entered promiscuous mode [ 129.923040][ T476] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 129.936069][ T476] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 129.949936][ T476] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 129.975346][ T476] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 129.985723][ T476] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 129.994055][ T476] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 130.065901][ T476] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 130.074753][ T476] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 130.090875][ T5751] device veth1_macvtap entered promiscuous mode [ 130.194096][ T300] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 130.208712][ T300] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 130.217433][ T300] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 130.303444][ T300] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 130.311793][ T300] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 130.483499][ T5838] device syzkaller0 entered promiscuous mode [ 131.791694][ T5890] device syzkaller0 entered promiscuous mode [ 131.908703][ T5902] device sit0 entered promiscuous mode [ 131.950469][ T5906] device syzkaller0 entered promiscuous mode [ 132.024331][ T5904] device syzkaller0 entered promiscuous mode [ 133.343400][ T24] audit: type=1400 audit(1778718488.180:154): avc: denied { create } for pid=5957 comm="syz.2.1602" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_connector_socket permissive=1 [ 133.729035][ T24] audit: type=1400 audit(1778718488.570:155): avc: denied { read } for pid=5973 comm="syz.0.1605" dev="nsfs" ino=4026533016 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 133.872212][ T24] audit: type=1400 audit(1778718488.590:156): avc: denied { open } for pid=5973 comm="syz.0.1605" path="cgroup:[4026533016]" dev="nsfs" ino=4026533016 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 133.964854][ T902] syzkaller0: tun_net_xmit 76 [ 133.970927][ T902] syzkaller0: tun_net_xmit 48 [ 133.979864][ T5974] syzkaller0: create flow: hash 4003877076 index 1 [ 133.998267][ C0] syzkaller0: tun_net_xmit 76 [ 134.041685][ T5973] syzkaller0: delete flow: hash 4003877076 index 1 [ 134.175571][ T5991] pim6reg0: tun_chr_ioctl cmd 1074025677 [ 134.212353][ T5991] pim6reg0: linktype set to 780 [ 134.932762][ T6044] bridge0: port 1(bridge_slave_0) entered disabled state [ 135.529346][ T24] audit: type=1400 audit(1778718490.370:157): avc: denied { append } for pid=6085 comm="syz.3.1637" name="ppp" dev="devtmpfs" ino=153 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ppp_device_t tclass=chr_file permissive=1 [ 136.015473][ T6112] device syzkaller0 entered promiscuous mode [ 136.078281][ T6114] device syzkaller0 entered promiscuous mode [ 136.138907][ T24] audit: type=1400 audit(1778718490.980:158): avc: denied { create } for pid=6113 comm="syz.3.1645" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=isdn_socket permissive=1 [ 139.760861][ T6297] device xfrm0 entered promiscuous mode [ 140.242207][ T24] audit: type=1400 audit(1778718495.080:159): avc: denied { create } for pid=6311 comm="syz.3.1698" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=dccp_socket permissive=1 [ 140.984796][ T6345] device syzkaller0 entered promiscuous mode [ 142.902997][ T6403] device syzkaller0 entered promiscuous mode [ 143.503238][ T6445] tap0: tun_chr_ioctl cmd 1074025677 [ 143.516292][ T6445] tap0: linktype set to 805 [ 147.702604][ T6663] tap0: tun_chr_ioctl cmd 1074025677 [ 147.708049][ T6663] tap0: linktype set to 769 [ 147.877794][ T6663] device syzkaller0 entered promiscuous mode [ 148.387163][ T6718] device veth1_macvtap left promiscuous mode [ 148.548478][ T6722] device veth1_macvtap entered promiscuous mode [ 148.562220][ T6722] device macsec0 entered promiscuous mode [ 148.568606][ T6722] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 148.583278][ T476] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 148.702043][ T6734] pim6reg0: tun_chr_ioctl cmd 1074025677 [ 148.741959][ T6734] pim6reg0: linktype set to 774 [ 150.187235][ T6784] device veth1_macvtap left promiscuous mode [ 151.011291][ T6835] FAULT_INJECTION: forcing a failure. [ 151.011291][ T6835] name failslab, interval 1, probability 0, space 0, times 0 [ 151.027427][ T6835] CPU: 1 PID: 6835 Comm: syz.4.1853 Tainted: G W syzkaller #0 [ 151.036321][ T6835] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/18/2026 [ 151.046399][ T6835] Call Trace: [ 151.049726][ T6835] __dump_stack+0x21/0x24 [ 151.054086][ T6835] dump_stack_lvl+0x1a7/0x208 [ 151.058777][ T6835] ? thaw_kernel_threads+0x220/0x220 [ 151.064089][ T6835] ? show_regs_print_info+0x18/0x18 [ 151.069307][ T6835] dump_stack+0x15/0x1c [ 151.073482][ T6835] should_fail+0x3c1/0x510 [ 151.077932][ T6835] ? anon_vma_fork+0x200/0x510 [ 151.082720][ T6835] __should_failslab+0xa4/0xe0 [ 151.087503][ T6835] should_failslab+0x9/0x20 [ 151.092028][ T6835] kmem_cache_alloc+0x3d/0x2d0 [ 151.096811][ T6835] ? anon_vma_fork+0xf2/0x510 [ 151.101532][ T6835] anon_vma_fork+0x200/0x510 [ 151.106149][ T6835] copy_mm+0x920/0x13d0 [ 151.110324][ T6835] ? copy_signal+0x600/0x600 [ 151.115042][ T6835] ? __init_rwsem+0xd5/0x1c0 [ 151.119662][ T6835] ? copy_signal+0x4cb/0x600 [ 151.124276][ T6835] copy_process+0x11a2/0x3300 [ 151.128974][ T6835] ? proc_fail_nth_read+0x220/0x220 [ 151.134197][ T6835] ? __pidfd_prepare+0x150/0x150 [ 151.139154][ T6835] ? rw_verify_area+0x1c0/0x360 [ 151.144031][ T6835] ? vfs_write+0xb27/0xdc0 [ 151.148480][ T6835] kernel_clone+0x233/0x960 [ 151.152998][ T6835] ? kernel_write+0x3c0/0x3c0 [ 151.157700][ T6835] ? create_io_thread+0x170/0x170 [ 151.162743][ T6835] ? mutex_lock+0x92/0xf0 [ 151.167094][ T6835] __x64_sys_clone+0x198/0x210 [ 151.171865][ T6835] ? __ia32_sys_vfork+0x130/0x130 [ 151.176892][ T6835] ? ksys_write+0x1f4/0x250 [ 151.181406][ T6835] ? debug_smp_processor_id+0x17/0x20 [ 151.186781][ T6835] ? fpregs_assert_state_consistent+0xb1/0xe0 [ 151.192848][ T6835] ? exit_to_user_mode_prepare+0x2f/0xa0 [ 151.198481][ T6835] do_syscall_64+0x31/0x40 [ 151.202905][ T6835] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 151.208799][ T6835] RIP: 0033:0x7f5c657a0e59 [ 151.213229][ T6835] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 151.232834][ T6835] RSP: 002b:00007f5c641fafd8 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 151.241250][ T6835] RAX: ffffffffffffffda RBX: 00007f5c65a19fa0 RCX: 00007f5c657a0e59 [ 151.249218][ T6835] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000020102400 [ 151.257190][ T6835] RBP: 00007f5c641fb090 R08: 0000000000000000 R09: 0000000000000000 [ 151.265163][ T6835] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000002 [ 151.273145][ T6835] R13: 00007f5c65a1a038 R14: 00007f5c65a19fa0 R15: 00007ffeb1913d08 [ 151.343662][ T6839] device syzkaller0 entered promiscuous mode [ 151.564460][ T6867] device syzkaller0 entered promiscuous mode [ 151.635867][ T6876] device syzkaller0 entered promiscuous mode [ 152.009969][ T24] audit: type=1400 audit(1778718506.850:160): avc: denied { setattr } for pid=6932 comm="syz.3.1882" path="/net/tun" dev="devtmpfs" ino=151 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tun_tap_device_t tclass=chr_file permissive=1 [ 152.966361][ T6971] syz.2.1894 uses obsolete (PF_INET,SOCK_PACKET) [ 153.208926][ T7001] device syzkaller0 entered promiscuous mode [ 154.122023][ T7038] device syzkaller0 entered promiscuous mode [ 154.306087][ T7038] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 154.658273][ T7067] : port 1(ip6gretap0) entered blocking state [ 154.664741][ T7067] : port 1(ip6gretap0) entered disabled state [ 154.699772][ T7067] device ip6gretap0 entered promiscuous mode [ 154.738519][ T7084] device ip6gretap0 left promiscuous mode [ 154.744394][ T7084] : port 1(ip6gretap0) entered disabled state [ 155.336563][ T24] audit: type=1400 audit(1778718510.170:161): avc: denied { ioctl } for pid=7112 comm="syz.3.1936" path="user:[4026531837]" dev="nsfs" ino=4026531837 ioctlcmd=0xb704 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 155.817085][ T7123] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 155.882449][ T7127] FAULT_INJECTION: forcing a failure. [ 155.882449][ T7127] name failslab, interval 1, probability 0, space 0, times 0 [ 156.254222][ T7127] CPU: 1 PID: 7127 Comm: syz.1.1940 Tainted: G W syzkaller #0 [ 156.263037][ T7127] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/18/2026 [ 156.273137][ T7127] Call Trace: [ 156.276458][ T7127] __dump_stack+0x21/0x24 [ 156.280822][ T7127] dump_stack_lvl+0x1a7/0x208 [ 156.285524][ T7127] ? thaw_kernel_threads+0x220/0x220 [ 156.290830][ T7127] ? show_regs_print_info+0x18/0x18 [ 156.296049][ T7127] dump_stack+0x15/0x1c [ 156.300333][ T7127] should_fail+0x3c1/0x510 [ 156.304782][ T7127] ? anon_vma_clone+0xc0/0x500 [ 156.309597][ T7127] __should_failslab+0xa4/0xe0 [ 156.314386][ T7127] should_failslab+0x9/0x20 [ 156.318906][ T7127] kmem_cache_alloc+0x3d/0x2d0 [ 156.323704][ T7127] anon_vma_clone+0xc0/0x500 [ 156.328308][ T7127] ? vm_area_dup+0x26/0x250 [ 156.332831][ T7127] anon_vma_fork+0x8c/0x510 [ 156.337352][ T7127] copy_mm+0x920/0x13d0 [ 156.341540][ T7127] ? copy_signal+0x600/0x600 [ 156.346157][ T7127] ? __init_rwsem+0xd5/0x1c0 [ 156.350762][ T7127] ? copy_signal+0x4cb/0x600 [ 156.355372][ T7127] copy_process+0x11a2/0x3300 [ 156.360080][ T7127] ? proc_fail_nth_read+0x220/0x220 [ 156.365299][ T7127] ? __pidfd_prepare+0x150/0x150 [ 156.370255][ T7127] ? rw_verify_area+0x1c0/0x360 [ 156.375120][ T7127] ? vfs_write+0xb27/0xdc0 [ 156.379556][ T7127] kernel_clone+0x233/0x960 [ 156.384112][ T7127] ? kernel_write+0x3c0/0x3c0 [ 156.388808][ T7127] ? create_io_thread+0x170/0x170 [ 156.393849][ T7127] ? mutex_lock+0x92/0xf0 [ 156.398202][ T7127] __x64_sys_clone+0x198/0x210 [ 156.402982][ T7127] ? __ia32_sys_vfork+0x130/0x130 [ 156.408023][ T7127] ? ksys_write+0x1f4/0x250 [ 156.412554][ T7127] ? debug_smp_processor_id+0x17/0x20 [ 156.417960][ T7127] ? fpregs_assert_state_consistent+0xb1/0xe0 [ 156.424052][ T7127] ? exit_to_user_mode_prepare+0x2f/0xa0 [ 156.429703][ T7127] do_syscall_64+0x31/0x40 [ 156.434143][ T7127] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 156.440055][ T7127] RIP: 0033:0x7f0b9a52ee59 [ 156.444522][ T7127] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 156.464147][ T7127] RSP: 002b:00007f0b98f88fd8 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 156.472572][ T7127] RAX: ffffffffffffffda RBX: 00007f0b9a7a7fa0 RCX: 00007f0b9a52ee59 [ 156.480548][ T7127] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000020102400 [ 156.488526][ T7127] RBP: 00007f0b98f89090 R08: 0000000000000000 R09: 0000000000000000 [ 156.496504][ T7127] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000002 [ 156.504479][ T7127] R13: 00007f0b9a7a8038 R14: 00007f0b9a7a7fa0 R15: 00007ffec6d5c318 [ 156.679562][ T7179] tun0: tun_chr_ioctl cmd 2147767519 [ 156.696981][ T7183] syz.2.1955[7183] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 156.697040][ T7183] syz.2.1955[7183] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 156.991521][ T7212] FAULT_INJECTION: forcing a failure. [ 156.991521][ T7212] name failslab, interval 1, probability 0, space 0, times 0 [ 157.043050][ T7212] CPU: 0 PID: 7212 Comm: syz.4.1966 Tainted: G W syzkaller #0 [ 157.051865][ T7212] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/18/2026 [ 157.061935][ T7212] Call Trace: [ 157.065239][ T7212] __dump_stack+0x21/0x24 [ 157.069604][ T7212] dump_stack_lvl+0x1a7/0x208 [ 157.074299][ T7212] ? thaw_kernel_threads+0x220/0x220 [ 157.079631][ T7212] ? show_regs_print_info+0x18/0x18 [ 157.085028][ T7212] dump_stack+0x15/0x1c [ 157.089215][ T7212] should_fail+0x3c1/0x510 [ 157.093651][ T7212] ? anon_vma_clone+0xc0/0x500 [ 157.098430][ T7212] __should_failslab+0xa4/0xe0 [ 157.103207][ T7212] should_failslab+0x9/0x20 [ 157.107733][ T7212] kmem_cache_alloc+0x3d/0x2d0 [ 157.112507][ T7212] anon_vma_clone+0xc0/0x500 [ 157.117107][ T7212] anon_vma_fork+0x8c/0x510 [ 157.121617][ T7212] copy_mm+0x920/0x13d0 [ 157.125786][ T7212] ? copy_signal+0x600/0x600 [ 157.130544][ T7212] ? __init_rwsem+0xd5/0x1c0 [ 157.135145][ T7212] ? copy_signal+0x4cb/0x600 [ 157.139748][ T7212] copy_process+0x11a2/0x3300 [ 157.144443][ T7212] ? proc_fail_nth_read+0x220/0x220 [ 157.149663][ T7212] ? __pidfd_prepare+0x150/0x150 [ 157.154624][ T7212] ? rw_verify_area+0x1c0/0x360 [ 157.159482][ T7212] ? vfs_write+0xb27/0xdc0 [ 157.163907][ T7212] kernel_clone+0x233/0x960 [ 157.168417][ T7212] ? kernel_write+0x3c0/0x3c0 [ 157.173108][ T7212] ? create_io_thread+0x170/0x170 [ 157.178137][ T7212] ? mutex_lock+0x92/0xf0 [ 157.182479][ T7212] __x64_sys_clone+0x198/0x210 [ 157.187256][ T7212] ? __ia32_sys_vfork+0x130/0x130 [ 157.192288][ T7212] ? ksys_write+0x1f4/0x250 [ 157.196901][ T7212] ? debug_smp_processor_id+0x17/0x20 [ 157.202295][ T7212] ? fpregs_assert_state_consistent+0xb1/0xe0 [ 157.208373][ T7212] ? exit_to_user_mode_prepare+0x2f/0xa0 [ 157.214017][ T7212] do_syscall_64+0x31/0x40 [ 157.218446][ T7212] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 157.224341][ T7212] RIP: 0033:0x7f5c657a0e59 [ 157.228781][ T7212] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 157.248398][ T7212] RSP: 002b:00007f5c641fafd8 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 157.256865][ T7212] RAX: ffffffffffffffda RBX: 00007f5c65a19fa0 RCX: 00007f5c657a0e59 [ 157.264987][ T7212] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000020102400 [ 157.272977][ T7212] RBP: 00007f5c641fb090 R08: 0000000000000000 R09: 0000000000000000 [ 157.280956][ T7212] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000002 [ 157.288954][ T7212] R13: 00007f5c65a1a038 R14: 00007f5c65a19fa0 R15: 00007ffeb1913d08 [ 157.918819][ T7263] FAULT_INJECTION: forcing a failure. [ 157.918819][ T7263] name failslab, interval 1, probability 0, space 0, times 0 [ 157.931659][ T7263] CPU: 1 PID: 7263 Comm: syz.1.1978 Tainted: G W syzkaller #0 [ 157.940429][ T7263] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/18/2026 [ 157.950493][ T7263] Call Trace: [ 157.953803][ T7263] __dump_stack+0x21/0x24 [ 157.958136][ T7263] dump_stack_lvl+0x1a7/0x208 [ 157.962821][ T7263] ? thaw_kernel_threads+0x220/0x220 [ 157.968118][ T7263] ? show_regs_print_info+0x18/0x18 [ 157.973328][ T7263] dump_stack+0x15/0x1c [ 157.977490][ T7263] should_fail+0x3c1/0x510 [ 157.981918][ T7263] ? anon_vma_clone+0xc0/0x500 [ 157.986687][ T7263] __should_failslab+0xa4/0xe0 [ 157.991458][ T7263] should_failslab+0x9/0x20 [ 157.995974][ T7263] kmem_cache_alloc+0x3d/0x2d0 [ 158.000755][ T7263] anon_vma_clone+0xc0/0x500 [ 158.005357][ T7263] anon_vma_fork+0x8c/0x510 [ 158.009874][ T7263] copy_mm+0x920/0x13d0 [ 158.014149][ T7263] ? copy_signal+0x600/0x600 [ 158.018751][ T7263] ? __init_rwsem+0xd5/0x1c0 [ 158.023615][ T7263] ? copy_signal+0x4cb/0x600 [ 158.028211][ T7263] copy_process+0x11a2/0x3300 [ 158.032921][ T7263] ? proc_fail_nth_read+0x220/0x220 [ 158.038122][ T7263] ? __pidfd_prepare+0x150/0x150 [ 158.043062][ T7263] ? rw_verify_area+0x1c0/0x360 [ 158.047918][ T7263] ? vfs_write+0xb27/0xdc0 [ 158.052346][ T7263] kernel_clone+0x233/0x960 [ 158.056850][ T7263] ? kernel_write+0x3c0/0x3c0 [ 158.061542][ T7263] ? create_io_thread+0x170/0x170 [ 158.066576][ T7263] ? mutex_lock+0x92/0xf0 [ 158.070924][ T7263] __x64_sys_clone+0x198/0x210 [ 158.075716][ T7263] ? __ia32_sys_vfork+0x130/0x130 [ 158.080758][ T7263] ? ksys_write+0x1f4/0x250 [ 158.085293][ T7263] ? syscall_trace_enter+0x108/0x170 [ 158.090585][ T7263] do_syscall_64+0x31/0x40 [ 158.095019][ T7263] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 158.100916][ T7263] RIP: 0033:0x7f0b9a52ee59 [ 158.105348][ T7263] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 158.124965][ T7263] RSP: 002b:00007f0b98f88fd8 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 158.133393][ T7263] RAX: ffffffffffffffda RBX: 00007f0b9a7a7fa0 RCX: 00007f0b9a52ee59 [ 158.141380][ T7263] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000020102400 [ 158.149378][ T7263] RBP: 00007f0b98f89090 R08: 0000000000000000 R09: 0000000000000000 [ 158.157354][ T7263] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000002 [ 158.165421][ T7263] R13: 00007f0b9a7a8038 R14: 00007f0b9a7a7fa0 R15: 00007ffec6d5c318 [ 158.180034][ T7264] device sit0 left promiscuous mode [ 158.319556][ T7275] device syzkaller0 entered promiscuous mode [ 158.891889][ T7305] FAULT_INJECTION: forcing a failure. [ 158.891889][ T7305] name failslab, interval 1, probability 0, space 0, times 0 [ 158.904835][ T7305] CPU: 0 PID: 7305 Comm: syz.3.1991 Tainted: G W syzkaller #0 [ 158.913621][ T7305] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/18/2026 [ 158.923684][ T7305] Call Trace: [ 158.926986][ T7305] __dump_stack+0x21/0x24 [ 158.931330][ T7305] dump_stack_lvl+0x1a7/0x208 [ 158.936014][ T7305] ? thaw_kernel_threads+0x220/0x220 [ 158.941305][ T7305] ? show_regs_print_info+0x18/0x18 [ 158.946504][ T7305] dump_stack+0x15/0x1c [ 158.950661][ T7305] should_fail+0x3c1/0x510 [ 158.955077][ T7305] ? anon_vma_clone+0xc0/0x500 [ 158.959864][ T7305] __should_failslab+0xa4/0xe0 [ 158.964628][ T7305] should_failslab+0x9/0x20 [ 158.969133][ T7305] kmem_cache_alloc+0x3d/0x2d0 [ 158.973894][ T7305] anon_vma_clone+0xc0/0x500 [ 158.978479][ T7305] anon_vma_fork+0x8c/0x510 [ 158.982981][ T7305] copy_mm+0x920/0x13d0 [ 158.987135][ T7305] ? copy_signal+0x600/0x600 [ 158.991718][ T7305] ? __init_rwsem+0xd5/0x1c0 [ 158.996305][ T7305] ? copy_signal+0x4cb/0x600 [ 159.000885][ T7305] copy_process+0x11a2/0x3300 [ 159.005560][ T7305] ? proc_fail_nth_read+0x220/0x220 [ 159.010748][ T7305] ? __pidfd_prepare+0x150/0x150 [ 159.015719][ T7305] ? rw_verify_area+0x1c0/0x360 [ 159.020565][ T7305] ? vfs_write+0xb27/0xdc0 [ 159.024972][ T7305] kernel_clone+0x233/0x960 [ 159.029512][ T7305] ? kernel_write+0x3c0/0x3c0 [ 159.034231][ T7305] ? create_io_thread+0x170/0x170 [ 159.039276][ T7305] ? mutex_lock+0x92/0xf0 [ 159.043607][ T7305] __x64_sys_clone+0x198/0x210 [ 159.048601][ T7305] ? __ia32_sys_vfork+0x130/0x130 [ 159.053634][ T7305] ? ksys_write+0x1f4/0x250 [ 159.058139][ T7305] ? debug_smp_processor_id+0x17/0x20 [ 159.063530][ T7305] ? fpregs_assert_state_consistent+0xb1/0xe0 [ 159.069605][ T7305] ? exit_to_user_mode_prepare+0x2f/0xa0 [ 159.075278][ T7305] do_syscall_64+0x31/0x40 [ 159.079713][ T7305] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 159.085600][ T7305] RIP: 0033:0x7f067d226e59 [ 159.090052][ T7305] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 159.109677][ T7305] RSP: 002b:00007f067bc80fd8 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 159.118101][ T7305] RAX: ffffffffffffffda RBX: 00007f067d49ffa0 RCX: 00007f067d226e59 [ 159.126067][ T7305] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000020102400 [ 159.134073][ T7305] RBP: 00007f067bc81090 R08: 0000000000000000 R09: 0000000000000000 [ 159.142049][ T7305] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000002 [ 159.150015][ T7305] R13: 00007f067d4a0038 R14: 00007f067d49ffa0 R15: 00007ffd6a016a38 [ 159.577600][ T7351] FAULT_INJECTION: forcing a failure. [ 159.577600][ T7351] name failslab, interval 1, probability 0, space 0, times 0 [ 159.641665][ T7351] CPU: 0 PID: 7351 Comm: syz.1.2002 Tainted: G W syzkaller #0 [ 159.650468][ T7351] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/18/2026 [ 159.660531][ T7351] Call Trace: [ 159.663829][ T7351] __dump_stack+0x21/0x24 [ 159.668166][ T7351] dump_stack_lvl+0x1a7/0x208 [ 159.672848][ T7351] ? show_regs_print_info+0x18/0x18 [ 159.678048][ T7351] dump_stack+0x15/0x1c [ 159.682203][ T7351] should_fail+0x3c1/0x510 [ 159.686633][ T7351] ? vm_area_dup+0x26/0x250 [ 159.691149][ T7351] __should_failslab+0xa4/0xe0 [ 159.695915][ T7351] should_failslab+0x9/0x20 [ 159.700423][ T7351] kmem_cache_alloc+0x3d/0x2d0 [ 159.705187][ T7351] ? __kasan_check_read+0x11/0x20 [ 159.710220][ T7351] vm_area_dup+0x26/0x250 [ 159.714562][ T7351] copy_mm+0x879/0x13d0 [ 159.718734][ T7351] ? copy_signal+0x600/0x600 [ 159.723324][ T7351] ? __init_rwsem+0xd5/0x1c0 [ 159.727911][ T7351] ? copy_signal+0x4cb/0x600 [ 159.732519][ T7351] copy_process+0x11a2/0x3300 [ 159.737201][ T7351] ? proc_fail_nth_read+0x220/0x220 [ 159.742402][ T7351] ? __pidfd_prepare+0x150/0x150 [ 159.747341][ T7351] ? rw_verify_area+0x1c0/0x360 [ 159.752196][ T7351] ? vfs_write+0xb27/0xdc0 [ 159.756611][ T7351] kernel_clone+0x233/0x960 [ 159.761109][ T7351] ? kernel_write+0x3c0/0x3c0 [ 159.765782][ T7351] ? create_io_thread+0x170/0x170 [ 159.770812][ T7351] ? mutex_lock+0x92/0xf0 [ 159.775149][ T7351] __x64_sys_clone+0x198/0x210 [ 159.779913][ T7351] ? __ia32_sys_vfork+0x130/0x130 [ 159.784939][ T7351] ? ksys_write+0x1f4/0x250 [ 159.789455][ T7351] ? debug_smp_processor_id+0x17/0x20 [ 159.794839][ T7351] ? fpregs_assert_state_consistent+0xb1/0xe0 [ 159.800937][ T7351] ? exit_to_user_mode_prepare+0x2f/0xa0 [ 159.806571][ T7351] do_syscall_64+0x31/0x40 [ 159.810991][ T7351] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 159.816915][ T7351] RIP: 0033:0x7f0b9a52ee59 [ 159.821333][ T7351] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 159.840945][ T7351] RSP: 002b:00007f0b98f88fd8 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 159.849369][ T7351] RAX: ffffffffffffffda RBX: 00007f0b9a7a7fa0 RCX: 00007f0b9a52ee59 [ 159.857344][ T7351] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000020102400 [ 159.865332][ T7351] RBP: 00007f0b98f89090 R08: 0000000000000000 R09: 0000000000000000 [ 159.873310][ T7351] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000002 [ 159.881298][ T7351] R13: 00007f0b9a7a8038 R14: 00007f0b9a7a7fa0 R15: 00007ffec6d5c318 [ 160.179034][ T7382] device wg2 left promiscuous mode [ 160.315569][ T7400] FAULT_INJECTION: forcing a failure. [ 160.315569][ T7400] name failslab, interval 1, probability 0, space 0, times 0 [ 160.368556][ T7400] CPU: 0 PID: 7400 Comm: syz.0.2019 Tainted: G W syzkaller #0 [ 160.377363][ T7400] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/18/2026 [ 160.387434][ T7400] Call Trace: [ 160.390744][ T7400] __dump_stack+0x21/0x24 [ 160.395086][ T7400] dump_stack_lvl+0x1a7/0x208 [ 160.399779][ T7400] ? thaw_kernel_threads+0x220/0x220 [ 160.405081][ T7400] ? show_regs_print_info+0x18/0x18 [ 160.410299][ T7400] dump_stack+0x15/0x1c [ 160.414467][ T7400] should_fail+0x3c1/0x510 [ 160.418902][ T7400] ? anon_vma_fork+0x200/0x510 [ 160.423681][ T7400] __should_failslab+0xa4/0xe0 [ 160.428457][ T7400] should_failslab+0x9/0x20 [ 160.432976][ T7400] kmem_cache_alloc+0x3d/0x2d0 [ 160.437754][ T7400] ? anon_vma_fork+0xf2/0x510 [ 160.442441][ T7400] anon_vma_fork+0x200/0x510 [ 160.447043][ T7400] copy_mm+0x920/0x13d0 [ 160.451212][ T7400] ? copy_signal+0x600/0x600 [ 160.455810][ T7400] ? __init_rwsem+0xd5/0x1c0 [ 160.460411][ T7400] ? copy_signal+0x4cb/0x600 [ 160.465010][ T7400] copy_process+0x11a2/0x3300 [ 160.469702][ T7400] ? proc_fail_nth_read+0x220/0x220 [ 160.474918][ T7400] ? __pidfd_prepare+0x150/0x150 [ 160.479875][ T7400] ? rw_verify_area+0x1c0/0x360 [ 160.484740][ T7400] ? vfs_write+0xb27/0xdc0 [ 160.489168][ T7400] kernel_clone+0x233/0x960 [ 160.493678][ T7400] ? kernel_write+0x3c0/0x3c0 [ 160.498367][ T7400] ? create_io_thread+0x170/0x170 [ 160.503401][ T7400] ? mutex_lock+0x92/0xf0 [ 160.507748][ T7400] __x64_sys_clone+0x198/0x210 [ 160.512525][ T7400] ? __ia32_sys_vfork+0x130/0x130 [ 160.517601][ T7400] ? ksys_write+0x1f4/0x250 [ 160.522124][ T7400] ? debug_smp_processor_id+0x17/0x20 [ 160.527515][ T7400] ? fpregs_assert_state_consistent+0xb1/0xe0 [ 160.533594][ T7400] ? exit_to_user_mode_prepare+0x2f/0xa0 [ 160.539246][ T7400] do_syscall_64+0x31/0x40 [ 160.543672][ T7400] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 160.549574][ T7400] RIP: 0033:0x7f3c4feede59 [ 160.554001][ T7400] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 160.573620][ T7400] RSP: 002b:00007f3c4e947fd8 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 160.582050][ T7400] RAX: ffffffffffffffda RBX: 00007f3c50166fa0 RCX: 00007f3c4feede59 [ 160.590036][ T7400] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000020102400 [ 160.598024][ T7400] RBP: 00007f3c4e948090 R08: 0000000000000000 R09: 0000000000000000 [ 160.606011][ T7400] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000002 [ 160.613995][ T7400] R13: 00007f3c50167038 R14: 00007f3c50166fa0 R15: 00007ffef32ed528 [ 161.703089][ T7479] device wg2 left promiscuous mode [ 163.065410][ T7548] device syzkaller0 entered promiscuous mode [ 164.141228][ T7583] pim6reg0: tun_chr_ioctl cmd 1074025677 [ 164.147190][ T7583] pim6reg0: linktype set to 776 [ 165.697863][ T7687] device syzkaller0 entered promiscuous mode [ 166.006029][ T7711] device syzkaller0 entered promiscuous mode [ 166.416886][ T7712] device syzkaller0 entered promiscuous mode [ 167.041070][ T7791] device syzkaller0 entered promiscuous mode [ 167.516172][ T7828] tun0: tun_chr_ioctl cmd 2148553947 [ 168.197960][ T7859] tap0: tun_chr_ioctl cmd 1074025673 [ 169.610997][ T7919] device syzkaller0 entered promiscuous mode [ 169.966659][ T24] audit: type=1400 audit(1778718524.800:162): avc: denied { associate } for pid=7949 comm="syz.0.2174" name="cgroup.stat" scontext=root:object_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 [ 170.134449][ T7950] @0й: renamed from bond_slave_1 [ 170.996951][ T7999] device syzkaller0 entered promiscuous mode [ 171.525816][ T8042] FAULT_INJECTION: forcing a failure. [ 171.525816][ T8042] name failslab, interval 1, probability 0, space 0, times 0 [ 171.538811][ T8042] CPU: 0 PID: 8042 Comm: syz.2.2199 Tainted: G W syzkaller #0 [ 171.547595][ T8042] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/18/2026 [ 171.557666][ T8042] Call Trace: [ 171.560974][ T8042] __dump_stack+0x21/0x24 [ 171.565323][ T8042] dump_stack_lvl+0x1a7/0x208 [ 171.570017][ T8042] ? thaw_kernel_threads+0x220/0x220 [ 171.575323][ T8042] ? show_regs_print_info+0x18/0x18 [ 171.580539][ T8042] dump_stack+0x15/0x1c [ 171.584709][ T8042] should_fail+0x3c1/0x510 [ 171.589138][ T8042] ? anon_vma_clone+0xc0/0x500 [ 171.593928][ T8042] __should_failslab+0xa4/0xe0 [ 171.598704][ T8042] should_failslab+0x9/0x20 [ 171.603218][ T8042] kmem_cache_alloc+0x3d/0x2d0 [ 171.608004][ T8042] anon_vma_clone+0xc0/0x500 [ 171.612610][ T8042] anon_vma_fork+0x8c/0x510 [ 171.617125][ T8042] copy_mm+0x920/0x13d0 [ 171.621293][ T8042] ? copy_signal+0x600/0x600 [ 171.625884][ T8042] ? __init_rwsem+0xd5/0x1c0 [ 171.630480][ T8042] ? copy_signal+0x4cb/0x600 [ 171.635079][ T8042] copy_process+0x11a2/0x3300 [ 171.639762][ T8042] ? proc_fail_nth_read+0x220/0x220 [ 171.644966][ T8042] ? __pidfd_prepare+0x150/0x150 [ 171.649910][ T8042] ? rw_verify_area+0x1c0/0x360 [ 171.654763][ T8042] ? vfs_write+0xb27/0xdc0 [ 171.659199][ T8042] kernel_clone+0x233/0x960 [ 171.663707][ T8042] ? kernel_write+0x3c0/0x3c0 [ 171.668386][ T8042] ? create_io_thread+0x170/0x170 [ 171.673416][ T8042] ? mutex_lock+0x92/0xf0 [ 171.677750][ T8042] __x64_sys_clone+0x198/0x210 [ 171.682518][ T8042] ? __ia32_sys_vfork+0x130/0x130 [ 171.687552][ T8042] ? ksys_write+0x1f4/0x250 [ 171.692068][ T8042] ? debug_smp_processor_id+0x17/0x20 [ 171.697438][ T8042] ? fpregs_assert_state_consistent+0xb1/0xe0 [ 171.703515][ T8042] ? exit_to_user_mode_prepare+0x2f/0xa0 [ 171.709156][ T8042] do_syscall_64+0x31/0x40 [ 171.713582][ T8042] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 171.719478][ T8042] RIP: 0033:0x7fcc0b0a7e59 [ 171.723905][ T8042] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 171.743517][ T8042] RSP: 002b:00007fcc09b01fd8 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 171.751942][ T8042] RAX: ffffffffffffffda RBX: 00007fcc0b320fa0 RCX: 00007fcc0b0a7e59 [ 171.759920][ T8042] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000020102400 [ 171.767900][ T8042] RBP: 00007fcc09b02090 R08: 0000000000000000 R09: 0000000000000000 [ 171.775878][ T8042] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000002 [ 171.783856][ T8042] R13: 00007fcc0b321038 R14: 00007fcc0b320fa0 R15: 00007ffd744f0e38 [ 173.214758][ T8115] device veth1_macvtap left promiscuous mode [ 173.757137][ T8145] device dummy0 entered promiscuous mode [ 173.824979][ T8152] device syzkaller0 entered promiscuous mode [ 175.015334][ T8183] device syzkaller0 entered promiscuous mode [ 177.447577][ T8332] џџџџџџ: renamed from vlan1 [ 177.527823][ T8329] device syzkaller0 entered promiscuous mode [ 177.707255][ T8358] device xfrm0 entered promiscuous mode [ 179.327745][ T8423] device lo entered promiscuous mode [ 180.422944][ T8459] device syzkaller0 entered promiscuous mode [ 180.501710][ T8466] device syzkaller0 entered promiscuous mode [ 180.621481][ T8471] device wg2 entered promiscuous mode [ 181.154424][ T8515] FAULT_INJECTION: forcing a failure. [ 181.154424][ T8515] name failslab, interval 1, probability 0, space 0, times 0 [ 181.167690][ T8515] CPU: 0 PID: 8515 Comm: syz.3.2334 Tainted: G W syzkaller #0 [ 181.176466][ T8515] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/18/2026 [ 181.186523][ T8515] Call Trace: [ 181.189822][ T8515] __dump_stack+0x21/0x24 [ 181.194157][ T8515] dump_stack_lvl+0x1a7/0x208 [ 181.198843][ T8515] ? thaw_kernel_threads+0x220/0x220 [ 181.204131][ T8515] ? show_regs_print_info+0x18/0x18 [ 181.209347][ T8515] ? perf_trace_kmem_alloc+0xf6/0x140 [ 181.214724][ T8515] ? vma_interval_tree_augment_rotate+0x1f0/0x1f0 [ 181.221139][ T8515] dump_stack+0x15/0x1c [ 181.225292][ T8515] should_fail+0x3c1/0x510 [ 181.229711][ T8515] ? anon_vma_fork+0xf2/0x510 [ 181.234398][ T8515] __should_failslab+0xa4/0xe0 [ 181.239162][ T8515] should_failslab+0x9/0x20 [ 181.243667][ T8515] kmem_cache_alloc+0x3d/0x2d0 [ 181.248434][ T8515] anon_vma_fork+0xf2/0x510 [ 181.252939][ T8515] copy_mm+0x920/0x13d0 [ 181.257096][ T8515] ? copy_signal+0x600/0x600 [ 181.261688][ T8515] ? __init_rwsem+0xd5/0x1c0 [ 181.266274][ T8515] ? copy_signal+0x4cb/0x600 [ 181.270870][ T8515] copy_process+0x11a2/0x3300 [ 181.275560][ T8515] ? proc_fail_nth_read+0x220/0x220 [ 181.280790][ T8515] ? __pidfd_prepare+0x150/0x150 [ 181.285721][ T8515] ? rw_verify_area+0x1c0/0x360 [ 181.290572][ T8515] ? vfs_write+0xb27/0xdc0 [ 181.294991][ T8515] kernel_clone+0x233/0x960 [ 181.299495][ T8515] ? kernel_write+0x3c0/0x3c0 [ 181.304175][ T8515] ? create_io_thread+0x170/0x170 [ 181.309195][ T8515] ? mutex_lock+0x92/0xf0 [ 181.313525][ T8515] __x64_sys_clone+0x198/0x210 [ 181.318292][ T8515] ? __ia32_sys_vfork+0x130/0x130 [ 181.323315][ T8515] ? ksys_write+0x1f4/0x250 [ 181.327854][ T8515] ? debug_smp_processor_id+0x17/0x20 [ 181.333235][ T8515] ? fpregs_assert_state_consistent+0xb1/0xe0 [ 181.339315][ T8515] ? exit_to_user_mode_prepare+0x2f/0xa0 [ 181.344966][ T8515] do_syscall_64+0x31/0x40 [ 181.349391][ T8515] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 181.355280][ T8515] RIP: 0033:0x7f067d226e59 [ 181.359712][ T8515] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 181.379494][ T8515] RSP: 002b:00007f067bc80fd8 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 181.387925][ T8515] RAX: ffffffffffffffda RBX: 00007f067d49ffa0 RCX: 00007f067d226e59 [ 181.395895][ T8515] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000020102400 [ 181.403864][ T8515] RBP: 00007f067bc81090 R08: 0000000000000000 R09: 0000000000000000 [ 181.411839][ T8515] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000003 [ 181.419817][ T8515] R13: 00007f067d4a0038 R14: 00007f067d49ffa0 R15: 00007ffd6a016a38 [ 181.661620][ T8542] device syzkaller0 entered promiscuous mode [ 182.209440][ T8572] device syzkaller0 entered promiscuous mode [ 183.877296][ T8666] device wg2 left promiscuous mode [ 183.948573][ T8653] device wg2 entered promiscuous mode [ 184.836838][ T8720] device syzkaller0 entered promiscuous mode [ 185.297546][ T8755] tap0: tun_chr_ioctl cmd 1074025673 [ 185.361700][ T8755] device sit0 entered promiscuous mode [ 185.502147][ T8770] device syzkaller0 entered promiscuous mode [ 187.668066][ T8849] device wg2 entered promiscuous mode [ 188.516099][ T8891] device syzkaller0 entered promiscuous mode [ 189.028459][ T8940] geneve0: tun_chr_ioctl cmd 1074812117 [ 189.854059][ T8996] device syzkaller0 entered promiscuous mode [ 190.263280][ T9019] device syzkaller0 entered promiscuous mode [ 191.142886][ T9067] -: renamed from syzkaller0 [ 191.363174][ T9103] device syzkaller0 entered promiscuous mode [ 191.762243][ T9110] device syzkaller0 entered promiscuous mode [ 193.192024][ T9163] device syzkaller0 entered promiscuous mode [ 194.587403][ T9249] device syzkaller0 entered promiscuous mode [ 195.156275][ T24] audit: type=1400 audit(1778718549.990:163): avc: denied { create } for pid=9287 comm="syz.4.2548" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=iucv_socket permissive=1 [ 195.195813][ T9288] device syzkaller0 entered promiscuous mode [ 195.265057][ T9303] device syzkaller0 entered promiscuous mode [ 195.374454][ T9324] device syzkaller0 entered promiscuous mode [ 196.077212][ T24] audit: type=1400 audit(1778718550.910:164): avc: denied { create } for pid=9370 comm="syz.4.2577" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 196.678405][ T9409] device wg2 left promiscuous mode [ 196.766284][ T9408] device wg2 entered promiscuous mode [ 196.923187][ T9431] device syzkaller0 entered promiscuous mode [ 198.231040][ T9493] device syzkaller0 entered promiscuous mode [ 198.654404][ T9536] erspan0: refused to change device tx_queue_len [ 204.115382][ T9745] device veth0_vlan left promiscuous mode [ 204.163476][ T9745] device veth0_vlan entered promiscuous mode [ 204.245652][ T9745] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 204.290349][ T476] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 204.308609][ T476] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 204.337506][ T476] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 204.836659][ T9785] device wg2 left promiscuous mode [ 205.041705][ T9785] device wg2 entered promiscuous mode [ 206.589189][ T9844] device syzkaller0 entered promiscuous mode [ 207.830674][ T9876] device syzkaller0 entered promiscuous mode [ 209.158715][ T9943] device syzkaller0 entered promiscuous mode [ 209.422036][ T9944] bridge0: port 1(bridge_slave_0) entered blocking state [ 209.437049][ T9944] bridge0: port 1(bridge_slave_0) entered disabled state [ 209.444828][ T9944] device bridge_slave_0 entered promiscuous mode [ 209.528545][ T9944] bridge0: port 2(bridge_slave_1) entered blocking state [ 209.536046][ T9944] bridge0: port 2(bridge_slave_1) entered disabled state [ 209.543948][ T9944] device bridge_slave_1 entered promiscuous mode [ 210.016018][ T476] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 210.024810][ T476] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 210.114678][ T476] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 210.134101][ T476] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 210.143105][ T476] bridge0: port 1(bridge_slave_0) entered blocking state [ 210.150288][ T476] bridge0: port 1(bridge_slave_0) entered forwarding state [ 210.207514][ T476] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 210.216506][ T476] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 210.226506][ T476] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 210.235369][ T476] bridge0: port 2(bridge_slave_1) entered blocking state [ 210.242605][ T476] bridge0: port 2(bridge_slave_1) entered forwarding state [ 210.250558][ T476] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 210.258686][ T476] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 210.300720][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 210.373889][ T476] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 210.382856][ T476] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 210.390638][ T476] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 210.399609][ T9944] device veth0_vlan entered promiscuous mode [ 210.459719][ T476] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 210.469886][ T9944] device veth1_macvtap entered promiscuous mode [ 210.481495][ T476] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 210.492309][ T476] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 210.616103][ T300] device veth1_macvtap left promiscuous mode [ 210.629156][ T300] device veth0_vlan left promiscuous mode [ 210.945340][T10020] bridge0: port 1(bridge_slave_0) entered blocking state [ 210.952642][T10020] bridge0: port 1(bridge_slave_0) entered disabled state [ 210.960212][T10020] device bridge_slave_0 entered promiscuous mode [ 210.967663][T10020] bridge0: port 2(bridge_slave_1) entered blocking state [ 210.974843][T10020] bridge0: port 2(bridge_slave_1) entered disabled state [ 210.982752][T10020] device bridge_slave_1 entered promiscuous mode [ 211.045580][T10020] bridge0: port 2(bridge_slave_1) entered blocking state [ 211.052694][T10020] bridge0: port 2(bridge_slave_1) entered forwarding state [ 211.060025][T10020] bridge0: port 1(bridge_slave_0) entered blocking state [ 211.067083][T10020] bridge0: port 1(bridge_slave_0) entered forwarding state [ 211.118830][ T476] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 211.126602][ T476] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 211.183666][ T476] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 211.251989][ T476] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 211.260446][ T476] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 211.298478][ T476] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 211.307179][ T476] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 211.317211][ T476] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 211.325349][ T476] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 211.340610][T10020] device veth0_vlan entered promiscuous mode [ 211.362154][T10020] device veth1_macvtap entered promiscuous mode [ 211.375103][ T476] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 211.420713][ T476] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 211.455087][ T476] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 212.944118][T10112] -: renamed from syzkaller0 [ 213.879370][T10137] device wg2 left promiscuous mode [ 213.949361][T10137] device wg2 entered promiscuous mode [ 214.249418][T10189] device syzkaller0 entered promiscuous mode [ 215.137293][T10226] bridge0: port 3(gretap0) entered blocking state [ 215.146578][T10226] bridge0: port 3(gretap0) entered disabled state [ 215.158963][T10226] device gretap0 entered promiscuous mode [ 215.169575][T10226] bridge0: port 3(gretap0) entered blocking state [ 215.176073][T10226] bridge0: port 3(gretap0) entered forwarding state [ 224.054044][T10603] : port 1(ip6gretap0) entered blocking state [ 224.087012][T10603] : port 1(ip6gretap0) entered disabled state [ 224.117484][T10603] device ip6gretap0 entered promiscuous mode [ 224.147997][T10600] device ip6gretap0 left promiscuous mode [ 224.182809][T10600] : port 1(ip6gretap0) entered disabled state [ 224.679534][T10625] device wg2 left promiscuous mode [ 224.716419][T10637] Гў: renamed from bond_slave_0 [ 225.091896][T10648] device syzkaller0 entered promiscuous mode [ 225.830065][T10709] device syzkaller0 entered promiscuous mode [ 225.990585][T10709] gretap0: mtu less than device minimum [ 226.258022][T10746] device veth0_vlan left promiscuous mode [ 226.291368][T10746] device veth0_vlan entered promiscuous mode [ 226.510445][T10763] device syzkaller0 entered promiscuous mode [ 226.632499][T10773] syz.1.2990[10773] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 226.632561][T10773] syz.1.2990[10773] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 227.334253][T10834] device syzkaller0 entered promiscuous mode [ 233.122311][T11073] device syzkaller0 entered promiscuous mode [ 233.323299][T11075] device sit0 entered promiscuous mode [ 234.303800][T11133] ref_ctr_offset mismatch. inode: 0x17c offset: 0x0 ref_ctr_offset(old): 0x0 ref_ctr_offset(new): 0x1fe [ 235.257223][T11159] geneve1: tun_chr_ioctl cmd 1074812118 [ 235.674998][T11187] syz.3.3108 (11187) used obsolete PPPIOCDETACH ioctl [ 236.204768][T11214] device sit0 entered promiscuous mode [ 236.501303][T11225] device syzkaller0 entered promiscuous mode [ 236.520329][T11228] syzkaller0: tun_chr_ioctl cmd 1074025677 [ 236.530438][T11228] syzkaller0: linktype set to 778 [ 236.554824][T11225] device syzkaller0 left promiscuous mode [ 239.876091][T11337] bridge0: port 1(bridge_slave_0) entered blocking state [ 239.894730][T11337] bridge0: port 1(bridge_slave_0) entered disabled state [ 239.924075][T11337] device bridge_slave_0 entered promiscuous mode [ 239.958249][T11337] bridge0: port 2(bridge_slave_1) entered blocking state [ 239.965320][T11337] bridge0: port 2(bridge_slave_1) entered disabled state [ 239.972966][T11337] device bridge_slave_1 entered promiscuous mode [ 240.027945][T11337] bridge0: port 2(bridge_slave_1) entered blocking state [ 240.035153][T11337] bridge0: port 2(bridge_slave_1) entered forwarding state [ 240.042475][T11337] bridge0: port 1(bridge_slave_0) entered blocking state [ 240.049565][T11337] bridge0: port 1(bridge_slave_0) entered forwarding state [ 240.158864][ T9] bridge0: port 1(bridge_slave_0) entered disabled state [ 240.168660][ T9] bridge0: port 2(bridge_slave_1) entered disabled state [ 240.386809][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 240.419713][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 240.457241][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 240.492787][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 240.507803][ T9] bridge0: port 1(bridge_slave_0) entered blocking state [ 240.515020][ T9] bridge0: port 1(bridge_slave_0) entered forwarding state [ 240.600051][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 240.621266][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 240.678939][ T9] bridge0: port 2(bridge_slave_1) entered blocking state [ 240.686028][ T9] bridge0: port 2(bridge_slave_1) entered forwarding state [ 240.728298][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 240.785051][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 240.819093][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 240.827386][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 240.923219][T11369] device syzkaller0 entered promiscuous mode [ 240.961853][T11377] device syzkaller0 entered promiscuous mode [ 240.988673][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 241.003358][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 241.155589][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 241.171035][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 241.199131][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 241.229032][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 241.251231][T11337] device veth0_vlan entered promiscuous mode [ 241.294361][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 241.313014][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 241.717704][T11337] device veth1_macvtap entered promiscuous mode [ 242.077640][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 242.107166][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 242.179314][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 242.189679][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 242.238546][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 242.424118][ T300] device veth0_vlan left promiscuous mode [ 244.571411][T11471] device veth0_vlan left promiscuous mode [ 244.577544][T11471] device veth0_vlan entered promiscuous mode [ 244.584803][ T476] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 244.609094][ T476] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 244.617007][ T476] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 244.775734][T11469] device sit0 entered promiscuous mode [ 246.447667][T11500] device syzkaller0 entered promiscuous mode [ 247.251114][ T24] audit: type=1400 audit(1778718602.090:165): avc: denied { create } for pid=11541 comm="syz.2.3216" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_iscsi_socket permissive=1 [ 247.510332][T11548] geneve1: tun_chr_ioctl cmd 2147767517 [ 247.961104][T11563] device syzkaller0 entered promiscuous mode [ 249.048452][T11594] device syzkaller0 entered promiscuous mode [ 249.249209][T11603] device syzkaller0 entered promiscuous mode [ 250.471356][T11691] bridge0: port 3(ip6gretap0) entered blocking state [ 250.479097][T11691] bridge0: port 3(ip6gretap0) entered disabled state [ 250.486863][T11691] device ip6gretap0 entered promiscuous mode [ 250.494738][T11691] bridge0: port 3(ip6gretap0) entered blocking state [ 250.501483][T11691] bridge0: port 3(ip6gretap0) entered forwarding state [ 251.087286][T11729] device syzkaller0 entered promiscuous mode [ 251.967275][T11789] device syzkaller0 entered promiscuous mode [ 252.228214][T11826] device veth1_macvtap entered promiscuous mode [ 252.253064][T11826] device macsec0 entered promiscuous mode [ 252.282359][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 252.387415][T11836] erspan0: refused to change device tx_queue_len [ 252.429424][T11837] device syzkaller0 entered promiscuous mode [ 253.307637][T11871] device sit0 left promiscuous mode [ 253.930503][T11909] syz.4.3328[11909] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 255.008794][T11963] device syzkaller0 entered promiscuous mode [ 255.138065][T11969] device syzkaller0 entered promiscuous mode [ 255.860424][T12008] sit0: mtu greater than device maximum [ 256.038126][ T476] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 256.060659][T12016] device syzkaller0 left promiscuous mode [ 256.307389][T12025] syzkaller0: default qdisc (pfifo_fast) fail, fallback to noqueue [ 256.357690][T12025] device syzkaller0 entered promiscuous mode [ 257.945780][T12082] @џ: renamed from bond_slave_0 [ 260.232193][T12162] device lo entered promiscuous mode [ 260.237652][T12162] IPv6: ADDRCONF(NETDEV_CHANGE): lo: link becomes ready [ 261.202880][T12245] device syzkaller0 entered promiscuous mode [ 261.305773][T12258] device syzkaller0 entered promiscuous mode [ 261.415060][T12261] device syzkaller0 entered promiscuous mode [ 261.546921][T12276] device dummy0 entered promiscuous mode [ 262.092784][T12295] device syzkaller0 entered promiscuous mode [ 263.100634][T12380] geneve0: tun_chr_ioctl cmd 35108 [ 263.405425][T12398] device syzkaller0 entered promiscuous mode [ 263.458676][T12388] device syzkaller0 entered promiscuous mode [ 263.604012][T12400] device syzkaller0 entered promiscuous mode [ 264.696911][ T24] audit: type=1400 audit(1778718619.530:166): avc: denied { create } for pid=12447 comm="syz.3.3489" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=irda_socket permissive=1 [ 265.700172][T12467] device syzkaller0 entered promiscuous mode [ 266.012438][T12489] џ: renamed from bond_slave_0 [ 266.826800][T12514] cgroup: fork rejected by pids controller in /syz3 [ 267.215691][ T24] audit: type=1400 audit(1778718622.050:167): avc: denied { mounton } for pid=12533 comm="syz-executor" path="/" dev="sda1" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:root_t tclass=dir permissive=1 [ 267.280047][T12536] device veth0_vlan left promiscuous mode [ 267.286147][T12536] device veth0_vlan entered promiscuous mode [ 267.388643][T12530] device syzkaller0 entered promiscuous mode [ 267.405513][ T300] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 267.414014][ T300] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 267.424982][ T300] IPv6: ADDRCONF(NETDEV_CHANGE): џџџџџџ: link becomes ready [ 267.488172][T12538] device syzkaller0 left promiscuous mode [ 267.507379][T12533] bridge0: port 1(bridge_slave_0) entered blocking state [ 267.514887][T12533] bridge0: port 1(bridge_slave_0) entered disabled state [ 267.522439][T12533] device bridge_slave_0 entered promiscuous mode [ 267.529588][T12533] bridge0: port 2(bridge_slave_1) entered blocking state [ 267.536706][T12533] bridge0: port 2(bridge_slave_1) entered disabled state [ 267.544336][T12533] device bridge_slave_1 entered promiscuous mode [ 267.629395][T12533] bridge0: port 2(bridge_slave_1) entered blocking state [ 267.636502][T12533] bridge0: port 2(bridge_slave_1) entered forwarding state [ 267.643828][T12533] bridge0: port 1(bridge_slave_0) entered blocking state [ 267.650886][T12533] bridge0: port 1(bridge_slave_0) entered forwarding state [ 267.719519][T12560] device syzkaller0 entered promiscuous mode [ 267.788265][ T300] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 267.817343][ T300] bridge0: port 1(bridge_slave_0) entered disabled state [ 267.831226][ T300] bridge0: port 2(bridge_slave_1) entered disabled state [ 268.005537][ T300] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 268.013833][ T300] bridge0: port 1(bridge_slave_0) entered blocking state [ 268.020900][ T300] bridge0: port 1(bridge_slave_0) entered forwarding state [ 268.028431][ T300] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 268.037020][ T300] bridge0: port 2(bridge_slave_1) entered blocking state [ 268.044102][ T300] bridge0: port 2(bridge_slave_1) entered forwarding state [ 268.051563][ T300] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 268.076561][ T300] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 268.096944][ T300] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 268.112843][ T300] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 268.121238][ T300] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 268.129150][ T300] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 268.137517][T12533] device veth0_vlan entered promiscuous mode [ 268.159760][ T300] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 268.175315][ T309] bridge0: port 3(ip6gretap0) entered disabled state [ 268.192282][ T309] device ip6gretap0 left promiscuous mode [ 268.201177][ T309] bridge0: port 3(ip6gretap0) entered disabled state [ 268.214028][T12533] device veth1_macvtap entered promiscuous mode [ 268.230611][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 268.245959][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 268.279725][T12578] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 268.280767][ T24] audit: type=1400 audit(1778718623.120:168): avc: denied { unmount } for pid=12533 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fs_t tclass=filesystem permissive=1 [ 268.719831][ T309] device bridge_slave_1 left promiscuous mode [ 268.727230][ T309] bridge0: port 2(bridge_slave_1) entered disabled state [ 268.741647][ T309] device bridge_slave_0 left promiscuous mode [ 268.750174][ T309] bridge0: port 1(bridge_slave_0) entered disabled state [ 268.763401][ T309] device veth1_macvtap left promiscuous mode [ 268.966269][T12658] device wg2 entered promiscuous mode [ 270.006784][T12735] device syzkaller0 entered promiscuous mode [ 274.387215][T12906] device wg2 entered promiscuous mode [ 274.590175][T12930] device syzkaller0 entered promiscuous mode [ 274.596779][ T476] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 274.609490][T12929] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 274.667314][T12938] syzkaller0: default qdisc (pfifo_fast) fail, fallback to noqueue [ 274.679608][T12938] device syzkaller0 entered promiscuous mode [ 276.053663][T13016] device syzkaller0 left promiscuous mode [ 276.292566][T13051] syzkaller0: tun_chr_ioctl cmd 1074025692 [ 276.665550][T13083] syzkaller0: tun_chr_ioctl cmd 2147767520 [ 277.428089][T13133] device wg2 left promiscuous mode [ 278.387898][T13179] device syzkaller0 entered promiscuous mode [ 278.513772][ T24] audit: type=1400 audit(1778718633.350:169): avc: denied { read } for pid=13187 comm="syz.0.3708" name="cgroup.subtree_control" dev="cgroup2" ino=394 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 [ 278.638373][T13189] device wg0 entered promiscuous mode [ 278.712927][T13195] device syzkaller0 entered promiscuous mode [ 279.287599][T13222] device syzkaller0 entered promiscuous mode [ 279.329867][ T300] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 279.340082][T13234] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 280.980264][ T476] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 281.010748][T13335] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 282.469639][T13427] syzkaller0: default qdisc (pfifo_fast) fail, fallback to noqueue [ 282.482307][T13427] device syzkaller0 entered promiscuous mode [ 283.849321][T13496] bridge0: port 4(џџџџџџ) entered blocking state [ 283.881457][T13496] bridge0: port 4(џџџџџџ) entered disabled state [ 283.913531][T13496] device џџџџџџ entered promiscuous mode [ 283.948718][T13496] bridge0: port 4(џџџџџџ) entered blocking state [ 283.955127][T13496] bridge0: port 4(џџџџџџ) entered forwarding state [ 284.103768][T13507] device syzkaller0 entered promiscuous mode [ 284.885131][T13564] device syzkaller0 entered promiscuous mode [ 285.287252][T13569] bridge0: port 3(gretap0) entered blocking state [ 285.297180][T13569] bridge0: port 3(gretap0) entered disabled state [ 285.331440][T13569] device gretap0 entered promiscuous mode [ 285.341670][T13569] bridge0: port 3(gretap0) entered blocking state [ 285.348291][T13569] bridge0: port 3(gretap0) entered forwarding state [ 285.662241][T13603] device wg2 left promiscuous mode [ 285.763461][T13603] device wg2 entered promiscuous mode [ 285.997229][ T476] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 286.601289][T13606] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 287.137805][T13681] bridge0: port 3(gretap0) entered blocking state [ 287.144514][T13681] bridge0: port 3(gretap0) entered forwarding state [ 287.151302][T13681] bridge0: port 2(bridge_slave_1) entered blocking state [ 287.158510][T13681] bridge0: port 2(bridge_slave_1) entered forwarding state [ 287.165902][T13681] bridge0: port 1(bridge_slave_0) entered blocking state [ 287.173077][T13681] bridge0: port 1(bridge_slave_0) entered forwarding state [ 287.238279][T13681] device bridge0 entered promiscuous mode [ 287.298927][ T309] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 290.149268][T13832] device syzkaller0 entered promiscuous mode [ 290.774880][T13852] device syzkaller0 entered promiscuous mode [ 291.786665][T13898] bridge0: port 1(bridge_slave_0) entered blocking state [ 291.838958][T13898] bridge0: port 1(bridge_slave_0) entered disabled state [ 291.874967][T13898] device bridge_slave_0 entered promiscuous mode [ 291.948854][T13898] bridge0: port 2(bridge_slave_1) entered blocking state [ 291.965279][T13898] bridge0: port 2(bridge_slave_1) entered disabled state [ 291.973397][T13898] device bridge_slave_1 entered promiscuous mode [ 292.512945][T13898] bridge0: port 2(bridge_slave_1) entered blocking state [ 292.520064][T13898] bridge0: port 2(bridge_slave_1) entered forwarding state [ 292.527396][T13898] bridge0: port 1(bridge_slave_0) entered blocking state [ 292.534725][T13898] bridge0: port 1(bridge_slave_0) entered forwarding state [ 292.639278][ T476] bridge0: port 1(bridge_slave_0) entered disabled state [ 292.667039][ T476] bridge0: port 2(bridge_slave_1) entered disabled state [ 292.923865][ T476] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 292.932239][ T476] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 293.007033][ T476] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 293.052458][ T476] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 293.092639][ T476] bridge0: port 1(bridge_slave_0) entered blocking state [ 293.099754][ T476] bridge0: port 1(bridge_slave_0) entered forwarding state [ 293.113364][ T476] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 293.122302][ T476] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 293.135568][ T476] bridge0: port 2(bridge_slave_1) entered blocking state [ 293.142822][ T476] bridge0: port 2(bridge_slave_1) entered forwarding state [ 293.162773][ T476] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 293.181951][ T476] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 293.280939][ T476] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 293.323015][ T476] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 293.361451][T13898] device veth0_vlan entered promiscuous mode [ 293.389880][ T476] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 293.459980][ T476] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 293.468983][ T476] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 293.477076][ T476] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 293.485423][ T476] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 293.493345][ T476] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 293.534159][ T476] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 293.544069][ T476] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 293.554037][T13898] device veth1_macvtap entered promiscuous mode [ 293.618649][ T9] bridge0: port 3(gretap0) entered disabled state [ 293.637927][ T9] device gretap0 left promiscuous mode [ 293.645976][ T9] bridge0: port 3(gretap0) entered disabled state [ 293.675056][ T476] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 293.684158][ T476] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 293.696562][ T476] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 293.728678][ T476] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 293.740458][ T476] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 294.016156][ T24] audit: type=1400 audit(1778718648.850:170): avc: denied { create } for pid=13971 comm="syz.2.3930" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_nflog_socket permissive=1 [ 294.109601][T13974] device syzkaller0 entered promiscuous mode [ 294.229544][ T9] device bridge_slave_1 left promiscuous mode [ 294.235878][ T9] bridge0: port 2(bridge_slave_1) entered disabled state [ 294.243650][ T9] device bridge_slave_0 left promiscuous mode [ 294.250583][ T9] bridge0: port 1(bridge_slave_0) entered disabled state [ 294.258993][ T9] device veth0_vlan left promiscuous mode [ 295.105438][T14040] : renamed from team_slave_1 [ 295.148864][ T300] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 295.494456][T14044] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 295.834012][ T24] audit: type=1400 audit(1778718650.670:171): avc: denied { create } for pid=14068 comm="syz.0.3958" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_fib_lookup_socket permissive=1 [ 295.868414][ T24] audit: type=1400 audit(1778718650.700:172): avc: denied { create } for pid=14069 comm="syz.3.3957" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 296.059643][T14076] device wg2 left promiscuous mode [ 296.162916][T14076] device wg2 entered promiscuous mode [ 296.324719][T14094] tun0: tun_chr_ioctl cmd 1074025684 [ 296.456355][T14103] device syzkaller0 entered promiscuous mode [ 296.749040][T14114] -: renamed from syzkaller0 [ 296.989953][T14106] device wg2 entered promiscuous mode [ 297.036609][T14106] IPv6: ADDRCONF(NETDEV_CHANGE): wg2: link becomes ready [ 297.878199][T14164] ЊЊЊЊЊЊ: renamed from vlan0 [ 298.279322][T14204] device syzkaller0 entered promiscuous mode [ 299.250435][T14257] device syzkaller0 entered promiscuous mode [ 301.074716][T14330] device syzkaller0 entered promiscuous mode [ 301.115221][T14332] syzkaller0: tun_net_xmit 1280 [ 301.166016][T14332] syzkaller0: create flow: hash 2897725983 index 1 [ 301.263518][T14343] tap0: tun_chr_ioctl cmd 1074025673 [ 302.210258][T14399] syzkaller0: create flow: hash 446874166 index 3 [ 302.342464][T14401] bridge0: port 1(bridge_slave_0) entered blocking state [ 302.398213][T14401] bridge0: port 1(bridge_slave_0) entered disabled state [ 302.405797][T14401] device bridge_slave_0 entered promiscuous mode [ 302.450492][T14401] bridge0: port 2(bridge_slave_1) entered blocking state [ 302.513130][T14401] bridge0: port 2(bridge_slave_1) entered disabled state [ 302.533060][T14401] device bridge_slave_1 entered promiscuous mode [ 302.728480][T14396] syzkaller0: delete flow: hash 446874166 index 3 [ 302.961015][ T300] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 302.979430][ T300] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 303.085055][ T300] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 303.095856][ T300] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 303.106634][ T300] bridge0: port 1(bridge_slave_0) entered blocking state [ 303.113763][ T300] bridge0: port 1(bridge_slave_0) entered forwarding state [ 303.123489][ T300] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 303.132202][ T300] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 303.140800][ T300] bridge0: port 2(bridge_slave_1) entered blocking state [ 303.147921][ T300] bridge0: port 2(bridge_slave_1) entered forwarding state [ 303.201025][ T300] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 303.219668][ T300] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 303.228698][ T300] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 303.253458][ T300] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 303.280584][T14401] device veth0_vlan entered promiscuous mode [ 303.298156][ T309] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 303.319856][ T309] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 303.329138][ T309] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 303.380988][ T309] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 303.405170][T14361] syzkaller0: delete flow: hash 2897725983 index 1 [ 303.527720][T14401] device veth1_macvtap entered promiscuous mode [ 303.668513][ T309] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 303.803255][ T309] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 303.818675][ T309] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 303.830009][ T309] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 304.580487][ T9] bridge0: port 3(gretap0) entered disabled state [ 304.614521][ T9] device gretap0 left promiscuous mode [ 304.632829][ T9] bridge0: port 3(gretap0) entered disabled state [ 304.941275][ T9] device џџџџџџ left promiscuous mode [ 304.946820][ T9] bridge0: port 4(џџџџџџ) entered disabled state [ 304.962865][ T9] device bridge_slave_1 left promiscuous mode [ 304.970330][ T9] bridge0: port 2(bridge_slave_1) entered disabled state [ 304.989095][ T9] device bridge_slave_0 left promiscuous mode [ 304.996749][ T9] bridge0: port 1(bridge_slave_0) entered disabled state [ 305.008124][ T9] device veth1_macvtap left promiscuous mode [ 305.014287][ T9] device veth0_vlan left promiscuous mode [ 305.331047][T14502] device syzkaller0 entered promiscuous mode [ 305.468048][ T309] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 305.492941][T14510] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 305.694123][T14527] : port 1(ip6gretap0) entered blocking state [ 305.741984][T14527] : port 1(ip6gretap0) entered disabled state [ 305.765871][T14527] device ip6gretap0 entered promiscuous mode [ 305.852807][T14541] device ip6gretap0 left promiscuous mode [ 305.859285][T14541] : port 1(ip6gretap0) entered disabled state [ 306.056847][T14548] device syzkaller0 entered promiscuous mode [ 306.236906][ T476] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 306.265533][T14563] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 306.467745][T14569] device syzkaller0 entered promiscuous mode [ 306.970511][ T476] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 307.012680][T14583] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 307.463923][T14605] device team_slave_1 entered promiscuous mode [ 307.496977][ T476] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 307.516093][ T476] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 308.176610][ T24] audit: type=1400 audit(1778718663.010:173): avc: denied { setattr } for pid=14631 comm="syz.2.4117" path="pipe:[55088]" dev="pipefs" ino=55088 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=fifo_file permissive=1 [ 310.696620][T14775] lo: mtu less than device minimum [ 310.811443][T14785] device syzkaller0 entered promiscuous mode [ 310.847515][ T5] syzkaller0: tun_net_xmit 48 [ 311.160017][T14817] device syzkaller0 entered promiscuous mode [ 311.740750][T14841] batadv0: tun_chr_ioctl cmd 1074025680 [ 312.208431][T14860] device syzkaller0 entered promiscuous mode [ 312.797065][T14885] device syzkaller0 entered promiscuous mode [ 312.832102][T14888] device syzkaller0 entered promiscuous mode [ 312.870217][T14888] device syzkaller0 left promiscuous mode [ 314.033584][ T24] audit: type=1400 audit(1778718668.870:174): avc: denied { create } for pid=14959 comm="syz.1.4217" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_dnrt_socket permissive=1 [ 314.150698][T14971] џџџџџџ: renamed from vlan1 [ 314.390051][ T476] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 314.413571][T14994] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 314.765792][T15015] device syzkaller0 entered promiscuous mode [ 315.338674][T15025] device syzkaller0 entered promiscuous mode [ 316.531057][T15119] device syzkaller0 entered promiscuous mode [ 316.531321][T15124] syzkaller0: create flow: hash 1823027870 index 0 [ 316.618693][ T1499] syzkaller0: tun_net_xmit 48 [ 316.672528][T15130] syzkaller0: create flow: hash 4003877076 index 1 [ 316.679614][T15119] syzkaller0 (unregistered): delete flow: hash 1823027870 index 0 [ 316.692730][T15130] syzkaller0: delete flow: hash 4003877076 index 1 [ 316.863395][T15133] device syzkaller0 entered promiscuous mode [ 317.393503][T15160] device syzkaller0 entered promiscuous mode [ 317.439414][T15164] device syzkaller0 entered promiscuous mode [ 319.951532][T15271] device syzkaller0 entered promiscuous mode [ 322.111135][T15391] device wg2 left promiscuous mode [ 322.176506][T15388] tap0: tun_chr_ioctl cmd 1074025681 [ 322.184537][T15398] device wg2 entered promiscuous mode [ 322.286825][T15417] geneve0: tun_chr_ioctl cmd 1074025677 [ 322.292485][T15417] geneve0: linktype set to 804 [ 324.759869][T15464] geneve1: tun_chr_ioctl cmd 2147767506 [ 324.825219][T15464] geneve1: tun_chr_ioctl cmd 2148553947 [ 325.286372][T15499] device syzkaller0 entered promiscuous mode [ 325.777918][T15540] device syzkaller0 entered promiscuous mode [ 325.786831][T15540] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 325.818776][T15542] џџџџџџ: renamed from vlan1 [ 325.834273][T15538] : port 1(ip6gretap0) entered blocking state [ 325.858841][T15538] : port 1(ip6gretap0) entered disabled state [ 325.875096][T15538] device ip6gretap0 entered promiscuous mode [ 325.896868][T15543] device ip6gretap0 left promiscuous mode [ 325.903025][T15543] : port 1(ip6gretap0) entered disabled state [ 326.570534][T15603] device syzkaller0 entered promiscuous mode [ 326.622822][T15601] device syzkaller0 entered promiscuous mode [ 327.559198][T15678] gretap0: mtu less than device minimum [ 327.650315][T15681] b‹ЁY­4`в˜: renamed from lo [ 327.999915][T15710] device syzkaller0 entered promiscuous mode [ 328.952851][T15780] Бџ: renamed from team_slave_1 [ 329.447149][T15819] device syzkaller0 entered promiscuous mode [ 331.003193][T15870] bridge0: port 2(bridge_slave_1) entered disabled state [ 331.010533][T15870] bridge0: port 1(bridge_slave_0) entered disabled state [ 331.478736][T15889] device syzkaller0 entered promiscuous mode [ 331.713229][T15903] device syzkaller0 entered promiscuous mode [ 331.919476][ T300] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 331.932237][T15915] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 331.949611][T15914] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 331.957941][T15914] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 332.337371][T15939] device syzkaller0 entered promiscuous mode [ 335.075652][T16059] device wg2 entered promiscuous mode [ 335.550771][T16092] device syzkaller0 left promiscuous mode [ 335.916888][T16107] gretap0: mtu less than device minimum [ 336.559668][T16145] device syzkaller0 entered promiscuous mode [ 337.070109][ T300] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 337.261299][T16155] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 337.780649][T16198] geneve1: tun_chr_ioctl cmd 1074025675 [ 337.791993][T16198] geneve1: persist enabled [ 338.665476][T16258] device bridge_slave_1 left promiscuous mode [ 338.671826][T16258] bridge0: port 2(bridge_slave_1) entered disabled state [ 338.684219][T16258] device bridge_slave_0 left promiscuous mode [ 338.690859][T16258] bridge0: port 1(bridge_slave_0) entered disabled state [ 339.476732][ T309] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 339.499388][T16317] device bridge0 entered promiscuous mode [ 339.578633][T16318] bridge0: port 3(ip6gretap0) entered blocking state [ 339.591758][T16318] bridge0: port 3(ip6gretap0) entered disabled state [ 339.625853][T16318] device ip6gretap0 entered promiscuous mode [ 339.643972][T16318] bridge0: port 3(ip6gretap0) entered blocking state [ 339.650755][T16318] bridge0: port 3(ip6gretap0) entered forwarding state [ 339.674730][T16319] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 339.736701][T16319] device syzkaller0 entered promiscuous mode [ 339.804197][T16319] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 339.976106][T16313] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 340.023987][T16313] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 340.795151][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 340.818676][T16403] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 340.846248][T16402] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 341.003000][T16402] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 342.002984][T16470] syzkaller0: default qdisc (pfifo_fast) fail, fallback to noqueue [ 342.041073][T16470] device syzkaller0 entered promiscuous mode [ 342.074945][T16474] geneve0: tun_chr_ioctl cmd 1074025677 [ 342.108325][T16474] geneve0: linktype set to 804 [ 342.177419][T16478] bridge0: port 3(gretap0) entered disabled state [ 342.183968][T16478] bridge0: port 2(bridge_slave_1) entered disabled state [ 342.191175][T16478] bridge0: port 1(bridge_slave_0) entered disabled state [ 342.225494][T16478] device gretap0 left promiscuous mode [ 342.238838][T16478] bridge0: port 3(gretap0) entered disabled state [ 342.251393][T16478] device bridge_slave_1 left promiscuous mode [ 342.260992][T16478] bridge0: port 2(bridge_slave_1) entered disabled state [ 342.283481][T16478] device bridge_slave_0 left promiscuous mode [ 342.289986][T16478] bridge0: port 1(bridge_slave_0) entered disabled state [ 342.426891][T16486] device sit0 entered promiscuous mode [ 344.553861][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 344.572609][T16579] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 344.930295][T16602] bridge0: port 4(gretap0) entered blocking state [ 344.937096][T16602] bridge0: port 4(gretap0) entered disabled state [ 344.959735][T16602] device gretap0 entered promiscuous mode [ 344.967860][T16602] bridge0: port 4(gretap0) entered blocking state [ 344.974488][T16602] bridge0: port 4(gretap0) entered forwarding state [ 346.479836][T16719] geneve1: tun_chr_ioctl cmd 1074025675 [ 346.485455][T16719] geneve1: persist enabled [ 346.506165][T16719] geneve1: tun_chr_ioctl cmd 1074025675 [ 346.513730][T16719] geneve1: persist disabled [ 346.769523][T16740] device wg2 entered promiscuous mode [ 346.999048][ T476] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 347.138000][T16757] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 348.772291][T16855] tun0: tun_chr_ioctl cmd 1074025675 [ 348.787857][T16855] tun0: persist enabled [ 348.799408][T16855] tun0: tun_chr_ioctl cmd 1074025675 [ 348.804833][T16855] tun0: persist enabled [ 349.223381][T16884] skbuff: bad partial csum: csum=65489/0 headroom=64 headlen=65491 [ 349.231652][T16883] skbuff: bad partial csum: csum=65489/0 headroom=64 headlen=65491 [ 350.124662][T16927] tap0: tun_chr_ioctl cmd 1074025677 [ 350.135898][T16927] tap0: linktype set to 823 [ 350.154658][T16927] tap0: tun_chr_ioctl cmd 1074025677 [ 350.163382][T16927] tap0: linktype set to 2 [ 350.505398][T16953] -1: renamed from syzkaller0 [ 351.452780][T16997] device syzkaller0 entered promiscuous mode [ 353.281906][T17135] device syzkaller0 entered promiscuous mode [ 353.402067][T17142] device syzkaller0 entered promiscuous mode [ 354.296394][T17172] pim6reg0: tun_chr_ioctl cmd 1074025677 [ 354.306486][T17172] pim6reg0: linktype set to 6 [ 356.178450][T17266] pim6reg0: tun_chr_ioctl cmd 2147767521 [ 356.431732][T17283] device syzkaller0 entered promiscuous mode [ 359.056469][T17383] device veth0_vlan left promiscuous mode [ 359.089286][T17383] device veth0_vlan entered promiscuous mode [ 360.476065][ T476] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 360.559243][T17443] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 361.720751][ T476] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 361.758732][T17538] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 361.811691][ T476] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 361.875414][T17544] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 362.149759][T17554] device wg2 left promiscuous mode [ 362.257946][T17554] device wg2 entered promiscuous mode [ 362.507746][T17577] device veth0_vlan left promiscuous mode [ 362.532069][T17577] device veth0_vlan entered promiscuous mode [ 362.608342][ T300] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 362.617164][ T300] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 362.625322][ T300] IPv6: ADDRCONF(NETDEV_CHANGE): џџџџџџ: link becomes ready [ 363.412244][T17611] device syzkaller0 entered promiscuous mode [ 364.044330][T17636] device syzkaller0 entered promiscuous mode [ 365.626512][T17716] ќЏтыД: renamed from bond_slave_0 [ 366.017632][T17709] device wg2 left promiscuous mode [ 367.890770][T17824] bridge0: port 4(gretap0) entered disabled state [ 367.897405][T17824] bridge0: port 3(ip6gretap0) entered disabled state [ 367.904221][T17824] bridge0: port 2(bridge_slave_1) entered disabled state [ 367.911478][T17824] bridge0: port 1(bridge_slave_0) entered disabled state [ 367.948267][T17824] device bridge0 left promiscuous mode [ 368.102109][ T309] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 368.167418][T17842] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 368.189636][T17846] erspan0: refused to change device tx_queue_len [ 368.525750][ T309] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 368.548470][T17862] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 370.014336][T13662] ------------[ cut here ]------------ [ 370.020700][T13662] kernel BUG at kernel/bpf/arraymap.c:993! [ 370.038736][T13662] invalid opcode: 0000 [#1] PREEMPT SMP KASAN [ 370.044864][T13662] CPU: 1 PID: 13662 Comm: kworker/1:58 Tainted: G W syzkaller #0 [ 370.053898][T13662] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/18/2026 [ 370.063985][T13662] Workqueue: events prog_array_map_clear_deferred [ 370.070425][T13662] RIP: 0010:prog_array_map_poke_run+0x6fb/0x710 [ 370.076681][T13662] Code: 61 e9 ff 48 83 c4 58 5b 41 5c 41 5d 41 5e 41 5f 5d c3 e8 98 61 e9 ff 0f 0b e9 78 f9 ff ff e8 8c 61 e9 ff 0f 0b e8 85 61 e9 ff <0f> 0b e8 7e 61 e9 ff 0f 0b e8 77 61 e9 ff 0f 0b 0f 1f 44 00 00 55 [ 370.095697][T17934] device syzkaller0 entered promiscuous mode [ 370.096339][T13662] RSP: 0018:ffffc90001857c18 EFLAGS: 00010293 [ 370.108392][T13662] RAX: ffffffff817b560b RBX: ffff8881065dedd0 RCX: ffff888114a94f00 [ 370.116382][T13662] RDX: 0000000000000000 RSI: 00000000fffffff0 RDI: 00000000ffffffea [ 370.124370][T13662] RBP: ffffc90001857c98 R08: ffffffff864ea6c7 R09: 1ffffffff0c9d4d8 [ 370.132376][T13662] R10: dffffc0000000000 R11: fffffbfff0c9d4d9 R12: 00000000fffffff0 [ 370.140363][T13662] R13: ffff888111ad1800 R14: 0000000000000001 R15: ffff888111ad1800 [ 370.148359][T13662] FS: 0000000000000000(0000) GS:ffff8881f7100000(0000) knlGS:0000000000000000 [ 370.157304][T13662] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 370.163907][T13662] CR2: 0000000000000000 CR3: 000000010f8ea000 CR4: 00000000003506a0 [ 370.171897][T13662] DR0: 0000000000000000 DR1: 0000200000000300 DR2: 0000200000000300 [ 370.179887][T13662] DR3: 0000200000000300 DR6: 00000000ffff0ff0 DR7: 0000000000000600 [ 370.187875][T13662] Call Trace: [ 370.191193][T13662] ? bpf_prog_94b194d4ebfffdd5+0xb/0x678 [ 370.196843][T13662] fd_array_map_delete_elem+0x14c/0x250 [ 370.202403][T13662] prog_array_map_clear_deferred+0x9e/0x140 [ 370.208314][T13662] process_one_work+0x6e1/0xba0 [ 370.213180][T13662] worker_thread+0xa6a/0x13c0 [ 370.217889][T13662] kthread+0x346/0x3d0 [ 370.221973][T13662] ? worker_clr_flags+0x190/0x190 [ 370.227013][T13662] ? kthread_blkcg+0xd0/0xd0 [ 370.231629][T13662] ret_from_fork+0x1f/0x30 [ 370.236059][T13662] Modules linked in: [ 370.328190][T13662] ---[ end trace 2f5a739a9b19431e ]--- [ 370.333721][T13662] RIP: 0010:prog_array_map_poke_run+0x6fb/0x710 [ 370.340216][T13662] Code: 61 e9 ff 48 83 c4 58 5b 41 5c 41 5d 41 5e 41 5f 5d c3 e8 98 61 e9 ff 0f 0b e9 78 f9 ff ff e8 8c 61 e9 ff 0f 0b e8 85 61 e9 ff <0f> 0b e8 7e 61 e9 ff 0f 0b e8 77 61 e9 ff 0f 0b 0f 1f 44 00 00 55 [ 370.360402][T13662] RSP: 0018:ffffc90001857c18 EFLAGS: 00010293 [ 370.366529][T13662] RAX: ffffffff817b560b RBX: ffff8881065dedd0 RCX: ffff888114a94f00 [ 370.374926][T13662] RDX: 0000000000000000 RSI: 00000000fffffff0 RDI: 00000000ffffffea [ 370.383167][T13662] RBP: ffffc90001857c98 R08: ffffffff864ea6c7 R09: 1ffffffff0c9d4d8 [ 370.391385][T13662] R10: dffffc0000000000 R11: fffffbfff0c9d4d9 R12: 00000000fffffff0 [ 370.399592][T13662] R13: ffff888111ad1800 R14: 0000000000000001 R15: ffff888111ad1800 [ 370.407606][T13662] FS: 0000000000000000(0000) GS:ffff8881f7100000(0000) knlGS:0000000000000000 [ 370.416800][T13662] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 370.423561][T13662] CR2: 00007fb99b143540 CR3: 000000010cf7a000 CR4: 00000000003506a0 [ 370.431707][T13662] DR0: 0000000000000000 DR1: 0000200000000300 DR2: 0000200000000300 [ 370.439889][T13662] DR3: 0000200000000300 DR6: 00000000ffff0ff0 DR7: 0000000000000600 [ 370.447906][T13662] Kernel panic - not syncing: Fatal exception [ 370.454236][T13662] Kernel Offset: disabled [ 370.458567][T13662] Rebooting in 86400 seconds..