last executing test programs: 3.274140938s ago: executing program 0 (id=6935): bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0xc, 0x0, 0x0, &(0x7f0000000000)='GPL\x00', 0x5}, 0x94) perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x4000, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000001, 0x0, @perf_bp={0x0, 0x1}, 0x0, 0x0, 0x0, 0x1, 0x0, 0xffff0000, 0x9, 0x0, 0x0, 0x0, 0x9ba5}, 0x0, 0x20000000000, 0xffffffffffffffff, 0x1) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'ip6gre0\x00', 0x200}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/syz1\x00', 0x200002, 0x0) r1 = perf_event_open(&(0x7f00000010c0)={0x2, 0x80, 0xb9, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xc, 0x7}, 0x410, 0x2000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000000b00)=ANY=[@ANYBLOB="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"], 0x0, 0x5, 0xc3, &(0x7f000000cf3d)=""/195}, 0x94) bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000001380)='!\x00') perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1}}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x9, 0x4}, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200}, 0x0, 0xbfffffffffffffff, r1, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f0000000600)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001d80)=ANY=[], 0x128}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x1e, 0xc, 0x0, &(0x7f0000000300)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x12, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x1, 0x4, 0x6, 0xb}, 0x50) bpf$MAP_CREATE(0x0, 0x0, 0x48) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xd0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x5, 0x80, 0x0, 0x0, 0xffdffffc, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdirat$cgroup(0xffffffffffffffff, 0x0, 0x1ff) bpf$PROG_LOAD(0x5, 0x0, 0x0) syz_clone(0x46002080, 0x0, 0x0, 0x0, 0x0, 0x0) openat$cgroup_freezer_state(0xffffffffffffffff, 0x0, 0x2, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000200)=ANY=[@ANYRES32=r2], 0x48) perf_event_open(&(0x7f00000004c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x89f1, &(0x7f0000000080)) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r3, 0x89e1, &(0x7f00000005c0)={'bridge_slave_1\x00'}) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$TUNGETIFF(r4, 0x800454d2, &(0x7f0000000180)={'syzkaller1\x00'}) 2.598400592s ago: executing program 0 (id=6943): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x1c1341, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller0\x00', 0x84aebfbd6349b7f2}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) close(r1) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000400)={0xffffffffffffffff, 0xe0, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, &(0x7f0000000100)=[0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x4, 0x4, &(0x7f0000000140)=[0x0, 0x0, 0x0, 0x0], &(0x7f0000000180)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x18, &(0x7f00000001c0)=[{}, {}, {}, {}, {}, {}], 0x30, 0x10, &(0x7f0000000240), &(0x7f0000000280), 0x8, 0xdc, 0x8, 0x8, &(0x7f00000002c0)}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x14, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r2, 0x0}, 0x94) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) ioctl$SIOCSIFHWADDR(r1, 0x8914, &(0x7f0000000200)={'syzkaller0\x00', @link_local}) write$cgroup_subtree(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="7bedcb5d07081196f37538e486dd6372ce22667f2b00dbf6e97158cf474fec87891f6d76745b686158bbcfe8875afdef00010000000029"], 0x66) 2.531090565s ago: executing program 1 (id=6944): r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x504449a0, 0x101}, 0x4110, 0x0, 0x0, 0x5, 0x0, 0xa}, 0x0, 0x0, r0, 0x2) syz_clone(0x2000400, 0x0, 0xfffffebf, 0x0, 0x0, 0x0) syz_clone(0x9bc0a80, 0x0, 0x0, 0x0, 0x0, 0x0) (async) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x2400, 0x7f) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r3 = openat$cgroup_int(r2, &(0x7f0000000100)='cpuset.cpus\x00', 0x2, 0x0) (async) bpf$PROG_LOAD(0x5, 0x0, 0x0) (async, rerun: 32) bpf$PROG_LOAD(0x5, 0x0, 0x0) (async, rerun: 32) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x4, 0x0, 0x0}, 0x94) r4 = openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, 0x0) (async) bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="170000000000000004"], 0x48) bpf$PROG_LOAD(0x5, 0x0, 0x0) (async) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async) gettid() ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) (async, rerun: 32) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=ANY=[], 0x48) (rerun: 32) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000006c0)={0x3, 0xc, &(0x7f0000000380)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b71c0000000000007b8af8ff000000000f319f46b2995b6d0702000041c4f5bc4735cff8ffffff9703000008000000b704000000000000850000005900000095e31c19e5c2c318293cf66c2e6596ae432bfd807af943f905ea7703ee70741a44e9024db9d08040da68a5bd2a3b7b4d985907ff1fa7366f12c8aa56004fd83a072d92"], 0x0, 0xfffffffe, 0x0, 0x0, 0x0, 0x2a}, 0x94) (async) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x1, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) (async) r9 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0300000004000000040000000a00000000000000", @ANYRES32=0x0, @ANYBLOB="0000000000000000000000003a000000751b4ab3", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB='\x00'/28], 0x50) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000040)={{r9}, &(0x7f0000000280), &(0x7f0000000240)=r6}, 0x20) (async) r10 = bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x1f, 0x10, &(0x7f0000000bc0)=ANY=[@ANYBLOB="1808000000000000000000000000000018120000", @ANYRES32=r9, @ANYBLOB="0000000000000000b703000000000000850000000c000000b7000000000000001801000000082c2500000000002120207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000700000095"], &(0x7f0000000980)='GPL\x00', 0x80000, 0x0, 0x0, 0x0, 0x2, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0xfffffffffffffeca) setsockopt$sock_attach_bpf(r7, 0x1, 0x32, &(0x7f00000000c0)=r10, 0x4) (async) sendmsg$inet(r8, &(0x7f0000000140)={0x0, 0x0, 0x0}, 0x0) (async, rerun: 32) syz_clone(0x40000000, 0x0, 0x0, 0x0, 0x0, 0x0) (async, rerun: 32) write$cgroup_subtree(r3, &(0x7f0000000a00)=ANY=[@ANYBLOB='1-2:', @ANYRESDEC=r3], 0x31) (async) write$cgroup_int(r3, &(0x7f0000000000)=0x7, 0x12) (async) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x2400, 0x8) 2.414300801s ago: executing program 1 (id=6946): bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x3, 0x16, &(0x7f00000001c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sched_cls}, 0x48) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x3, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000000000000000000000000000850000002f000000850000000500000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x20, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0xfffffffffffffffd}}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x3, 0x16, &(0x7f0000000980)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000002d030100000000009500000c000000006926000000000000bf67000000000000150600000fff07ffd4060000200000006a0200000ee60000bf050000000000003d35f3ff000000006507000002000000070700004a0000000f75000000000000bf54000000000000070400000400f9ff6d53010000000000840400000000000073720000000000009500000000000000db13d5d8b741f2cdaabc8383caf56b8c2b84a8d09535a157f9005bd38addaa65b925cd3ded85d3cdd66d9c79f0529d045625b8b9e2a095d2c51ef45c5588ec78c7f32946b17cecfe54c53ab530c58b67851b7e0e82452a083b98a6aa766401047d150203b0417edef332233b081df18961d6822d133bf72a4de1c2ea17f04537fc211576846ac629d1d93265ba474580047a9dc88de358ce795731891a2031de4e09740c64e5306f991ed4785a9773a433e0db9c1a7d4ab9d658ce9cfdb4db3bed62bcb2bc91ddcdfac2e6d4421c49fb6641cbf56914e76702f673b586c700e3806f825f1d0da2a304e06543b56d35235d7897a7fe912971aab876022e96f5143b6234f5a6b701690b07fb664b44e22b72e843e7cf55f394cf75d1cd57c9150bfb98cc45b3fde43e42e150d4a2fddd9a9767748ca3522443097c55dc97c09d38485b18ad2cff787338bab324336f50c97b751f2ed2c4281858b428d1b2c1194b06f9bb7ffcc95c1bcfc5540f9574f20e7f513a2a7c5dad90e7d479724d69fa0c0bf97af1231a49ea166f743279d240e2e6f01d8704f313d68b16198be5f6a50e9e0fd20893b2922df566d2622edee5000000000000000000d91c6da09fa7cdbbf16d4780d8c2401c55aff772aced3ff966ff76d796c171f5f7a31e1b14b0c0c712c0fdd2710f37a3d15710d68e7326a7db043c57784bd9bdb047db75"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sched_cls}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000240)={r1, 0x0, 0x18, 0x7, &(0x7f0000000500)="f4f7ffffe8bafaf4481478064503d59bac5ea345ffffffff", &(0x7f00000004c0)=""/7, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8001}, 0x50) r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="170000000000000004000000ff"], 0x48) r4 = perf_event_open(&(0x7f0000000fc0)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x400, 0xf6103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, @perf_bp={0x0, 0x8}, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000600)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000000001801000020646c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000040000008500000005000000850000005000000095"], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000140)={{}, &(0x7f00000000c0), &(0x7f0000000100)}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f0000001040)={0xe, 0xe, &(0x7f0000001100)=ANY=[@ANYBLOB="180000000400000000000000d5000000950000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000020000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000008200000080695000100000009500000000000000dad994e248d9a323294c5f28f2548c1e76d7d85246e64339dafcd1c5a49b1548544f3fb96994aef69c1f8d08fc7033de942e0e383b8f"], &(0x7f0000000180)='GPL\x00', 0x4, 0x7, &(0x7f0000000540)=""/7, 0x41100, 0x9, '\x00', 0x0, @fallback=0x38, r2, 0x8, &(0x7f0000000580)={0x6, 0x2}, 0x8, 0x10, &(0x7f00000006c0)={0x2, 0xb, 0x0, 0x3}, 0x10, 0x0, r2, 0x5, &(0x7f0000000f00)=[r3], &(0x7f0000000f40)=[{0x5, 0x5, 0x4, 0x8}, {0x1, 0x1, 0xc, 0x9}, {0x3, 0x3, 0x10, 0x9}, {0x1, 0x1, 0xf, 0x5}, {0x4, 0x1, 0x8, 0x7}], 0x10, 0x2}, 0x94) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r4, 0x40042408, r5) syz_clone(0x40020000, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008"], 0x0}, 0x94) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x1, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r9 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f00000011c0)=ANY=[@ANYBLOB="030000000400000004000089e118eda55a1a000a00000000000000", @ANYRES32=0x0, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB='\x00'/28], 0x50) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000040)={{r9}, &(0x7f0000000280), &(0x7f0000000240)=r6}, 0x20) r10 = bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x1, 0x10, &(0x7f0000000bc0)=ANY=[@ANYBLOB="1808000000000000000000000000000018120000", @ANYRES32=r9, @ANYBLOB="0000000000000000b703000000000000850000000c000000b7000000000000001801000000082c2500000000002120207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000700000095"], &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x2, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) setsockopt$sock_attach_bpf(r7, 0x1, 0x32, &(0x7f00000000c0)=r10, 0x4) sendmsg$inet(r8, &(0x7f0000000140)={0x0, 0x0, 0x0}, 0x0) r11 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='io.stat\x00', 0x26e1, 0x0) close(r11) r12 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000640)=ANY=[@ANYBLOB="18060000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000003000000b703000000000000850000007300000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$OBJ_PIN_PROG(0x11, &(0x7f0000000040)=@generic={&(0x7f0000000700)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', r12}, 0x18) write$cgroup_devices(r11, 0x0, 0xa) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x3, &(0x7f0000000040)='.[\x00', 0x0}, 0x30) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000000)={@cgroup, r0, 0x2f, 0x24, r11, @void, @void, @void, @value=r13}, 0x20) 2.328268775s ago: executing program 0 (id=6948): r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='hugetlb.1GB.usage_in_bytes\x00', 0x0, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x3, 0xc, &(0x7f00000003c0)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000610000001801000020646c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000001700000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sched_cls, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r0, 0x0, 0x0, 0x0, 0x0}, 0x94) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0xff, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1}, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r0, 0x0, 0x1000, 0xd8, &(0x7f0000000ac0)="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", &(0x7f0000000240)=""/216, 0x3, 0x0, 0x38, 0xdd, &(0x7f0000000080)="15aabb818621697db6763c7f54f2ecc0764abd67226429399f73806ef2d141612f2550730049301f195796f2cc7405a943e4b0bb3a091dcd", &(0x7f0000000500)="6306f92580dc4152260cc17ed94f77a05a1ce9e46f0eede9e8010437327c948f4d6ddd48a0d0798a390cb516552d77b7cb37b7717f2fb53112c7e3216cc0e4734e81cc48690e7dc9cd6cf86b9a37247a310e48c17bd480802deb6077330a375dee8513227705bfd20e56a7f8f9f43b9dbf007cb76f894ded54bf385479cf3ce6f2072f8b2d8681e323676ec3c39c0ab5604790e57a20d43d836827403cfa0e68c942a77d3c072ef8a5299e9fa75d4609dc5e03abadd6ec14de725d7a81ed69542b2cc2abf4f190584415c9862708c982c599000fb000422179fb950555", 0x2, 0x0, 0x5}, 0x50) ioctl$TUNSETSTEERINGEBPF(r0, 0x800454e0, &(0x7f0000000340)=r0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000a40)={r1, 0x27, 0xe40, 0x0, &(0x7f0000000440)="f8ad48cc02cb29dcc8007f5b08009f59d351", 0x0, 0x4000, 0xf2ffffff, 0x0, 0x0, 0x0, 0x0}, 0x50) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000200)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002000000000000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b7030000deab44f4850000002d00000095"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0xf, '\x00', 0x0, @fallback=0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) perf_event_open(&(0x7f00000010c0)={0x2, 0x80, 0xb9, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xc, 0x7}, 0x410, 0x2000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x3, @perf_bp={0x0, 0x4}, 0x6000, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x13, 0x10, 0x2}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x11, 0xa, &(0x7f0000000680)=@framed={{0x18, 0x8}, [@func={0x85, 0x0, 0x1, 0x0, 0x6}, @map_fd={0x18, 0x0, 0x0}, @generic={0x2f}, @map_fd={0x18, 0x0, 0x1, 0x0, r2}, @exit={0x95, 0x0, 0xc00}], {0x95, 0x0, 0x7000}}, &(0x7f0000000000)='GPL\x00', 0x4, 0xee, &(0x7f0000000340)=""/238}, 0x80) perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0xda, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000080)) perf_event_open(&(0x7f00000010c0)={0x2, 0x80, 0xb9, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xc, 0x7}, 0x8601, 0x2000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000140)={0x1e, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="1800000000000000000000000000000071123e000000000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24}, 0x94) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)) r3 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000000c0), 0x50) bpf$MAP_LOOKUP_ELEM(0x5, &(0x7f00000000c0)={r3, &(0x7f0000000000), &(0x7f0000000040)=""/73}, 0x70) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'ip6tnl0\x00', 0x1000}) 1.966031753s ago: executing program 0 (id=6951): r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000580)={0xd, 0x3, &(0x7f0000000000)=ANY=[@ANYBLOB="720ac4ff000000007110be00000000009500000000000000"], 0x0}, 0x94) (async) perf_event_open(&(0x7f0000000fc0)={0x1, 0x80, 0x2, 0x0, 0x0, 0x4, 0x0, 0x400, 0xf6103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x24000000, 0x0, @perf_bp={0x0, 0x8}, 0x0, 0x0, 0x0, 0x4, 0x7}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x8) (async) r1 = perf_event_open(&(0x7f00000010c0)={0x2, 0x80, 0xb9, 0x0, 0x4, 0xfe, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000, 0x1, @perf_config_ext={0xc, 0x7}, 0x4414, 0x2000000, 0x7, 0x0, 0x0, 0x0, 0xfff8}, 0x0, 0x6, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r0) (async) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f0000000300)="ebb35a0cf8b30ad446a14e88a8ae62b19b1be4b4ec85363966497c201df7ff072b9913a8faadd163e51e9889513bcd03d65bbc5db3d2f48d80dabe139c7afac4bb8c4836dfef65f485c551670753eb3068efbabbe9487144754e64f1c2ef573c84be47fa7641fb649fc0466c1016bbc68dfea8430ab46ded3f7854b68bc614eb34b8ee0df1981b12b9d65e00c4d25c2be4436c", &(0x7f0000001140)=""/4096, 0x4}, 0x20) (async) perf_event_open(&(0x7f00000004c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000003ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) (async) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) perf_event_open(&(0x7f0000000100)={0x5, 0x80, 0xfd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={0x0, 0x4}, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) sendmsg$inet(r2, 0x0, 0x0) (async) sendmsg$inet(r2, &(0x7f0000000cc0)={0x0, 0x0, 0x0}, 0x0) (async) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x3, &(0x7f0000000700)=ANY=[@ANYBLOB="f1000000000000000000000000000000950000000000000069007bea78f48a7d17a286093c4d813ee2e666d71a804df2431d04d5b60f2d3be78bbfa8844c96e6db8df92b8d36dd748fc490df599dc1f727ae2d90157929ca60ce1c1c7fdf75315a6e50273e424ba24c4ac12aaebbeaebf8a33a96795ed67c1a5a89abb514bae42174a6d9eba00f07b2391463bb2346cae40783c79224bc2e4f1fc1aee26a8a0189643b35aade83693c4304f2f407fdb590b91053f74a9466fd81bb4e19fbf0"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x31, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) bpf$PROG_LOAD(0x5, 0x0, 0x0) (async) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="1b000000000000000000"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r4], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x90) (async) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x5, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, r5) (async) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x6, 0x5, &(0x7f0000000400)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @xdp, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) sendmsg$unix(r6, &(0x7f00000001c0)={&(0x7f0000000500)=@abs={0x1, 0x2f}, 0x6e, 0x0}, 0x0) (async) ioctl$SIOCSIFHWADDR(r3, 0x8924, &(0x7f0000000000)={'macsec0\x00', @random="010000201000"}) close(r2) (async) r7 = bpf$MAP_CREATE(0x0, &(0x7f00000006c0)=ANY=[@ANYBLOB="0b00000005000000010001000a00000001"], 0x50) r8 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x11, 0x14, &(0x7f0000000940)=ANY=[@ANYBLOB="1800000003000000000000000040000018110000", @ANYRES32=r7, @ANYBLOB="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"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0xd, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_BIND_MAP(0xa, &(0x7f00000003c0)={r8}, 0xc) r9 = bpf$MAP_CREATE(0x0, &(0x7f0000000340)=ANY=[], 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYRES32=r9], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) syz_open_procfs$namespace(0x0, 0x0) (async) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) 1.939967344s ago: executing program 0 (id=6952): r0 = gettid() socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000000)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.swap.events\x00', 0x275a, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x2a, &(0x7f0000000100)=r3, 0x4) sendmsg$unix(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f00000001c0)="4d8e5ca74b", 0x5}], 0x1}, 0x0) sendmsg$inet(r2, &(0x7f00000005c0)={0x0, 0x0, 0x0}, 0x0) recvmsg(r1, &(0x7f00000006c0)={0x0, 0xfee8, 0x0, 0x0, 0x0, 0xfffffffffffffe13}, 0x10042) recvmsg$unix(r1, &(0x7f0000000980)={0x0, 0x0, 0x0}, 0x40000062) perf_event_open(&(0x7f00000002c0)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20004, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x6, 0x81}, 0x0, 0x0, 0x0, 0x4, 0x0, 0xc, 0xfffd}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000140)={0xd, 0x4, &(0x7f0000000040)=@framed={{}, [@ldst={0x1, 0x0, 0x3, 0x2, 0x1, 0x4c}]}, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0xd}, 0x94) perf_event_open(&(0x7f00000004c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r3, 0x4008240b, &(0x7f0000000540)={0x3, 0x80, 0x3, 0x5, 0x30, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0xfffffff7, 0x0, @perf_bp={&(0x7f0000000280), 0x9}, 0x108401, 0x97, 0x1, 0x2, 0xd3a2, 0x8, 0x7f7, 0x0, 0x1, 0x0, 0x4}) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x4d, 0x5, 0x0, 0x0, 0x0, 0xf, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_bp={0x0, 0x4}, 0x8, 0x1, 0x0, 0x6, 0x3, 0x2, 0x2000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r4, &(0x7f0000000500)={&(0x7f0000000040)=@hci, 0x80, &(0x7f0000000100)=[{&(0x7f0000000400)=""/248, 0x200105d0}], 0x1}, 0x1f00) sendmsg$tipc(r5, &(0x7f0000000240)={0x0, 0xfffffff5, &(0x7f0000000200)=[{&(0x7f0000000140)="a2", 0xfffffdef}], 0x1}, 0x0) syz_clone(0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0) 1.712058975s ago: executing program 3 (id=6957): openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) (async) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) (async) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'syzkaller0\x00', 0xca58c30f81b6079f}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f0000000080)) r3 = perf_event_open(&(0x7f0000000fc0)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x400, 0xf6103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x24000000, 0x0, @perf_bp={0x0, 0x8}, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000280)=@base={0x7, 0x4, 0x18, 0x1}, 0x50) (async) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=@base={0x7, 0x4, 0x18, 0x1}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x14, &(0x7f0000000400)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000010000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000020850000000400000095"], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x40, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x9, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000001000000000000000018120000", @ANYRES32=r4, @ANYBLOB="0000000000000000b70300001a930000850000001b"], 0x0, 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r3, 0x40042408, r5) syz_clone(0x40800000, 0x0, 0x0, 0x0, 0x0, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) (async) r6 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) r7 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0f000000040000000800000008"], 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000000600)={0x15, 0xc, &(0x7f0000000440)=@framed={{0x18, 0x0, 0x0, 0x0, 0xfffffffd, 0x0, 0x0, 0x0, 0x803}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r7}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0xffffffff}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x1e00, 0x0, '\x00', 0x0, @sk_reuseport=0x28, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0xffffffff}, 0x94) r8 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x1, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) mkdir(&(0x7f0000000000)='./cgroup/../file0\x00', 0x20) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) (async) r9 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) openat$cgroup_subtree(r9, &(0x7f0000000200), 0x2, 0x0) (async) r10 = openat$cgroup_subtree(r9, &(0x7f0000000200), 0x2, 0x0) write$cgroup_subtree(r10, &(0x7f0000000400)=ANY=[], 0x5) write$cgroup_subtree(r10, &(0x7f0000000040)={[{0x2b, 'cpu'}, {0x2d, 'pids'}]}, 0xb) (async) write$cgroup_subtree(r10, &(0x7f0000000040)={[{0x2b, 'cpu'}, {0x2d, 'pids'}]}, 0xb) ioctl$TUNSETIFF(r6, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x1c1842, 0x0) (async) r11 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x1c1842, 0x0) ioctl$TUNSETIFF(r11, 0x400454ca, &(0x7f00000002c0)={'syzkaller0\x00', 0x7101}) (async) ioctl$TUNSETIFF(r11, 0x400454ca, &(0x7f00000002c0)={'syzkaller0\x00', 0x7101}) ioctl$TUNSETSTEERINGEBPF(r6, 0x800454e0, &(0x7f0000000300)=r8) perf_event_open$cgroup(&(0x7f0000000100)={0x2, 0x80, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) (async) r12 = perf_event_open$cgroup(&(0x7f0000000100)={0x2, 0x80, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r13 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0), 0x280002, 0x0) ioctl$TUNSETSTEERINGEBPF(r13, 0x800454e0, &(0x7f0000000180)=r1) ioctl$PERF_EVENT_IOC_SET_BPF(r12, 0x40042408, 0xffffffffffffffff) write$cgroup_devices(r11, &(0x7f0000000280)=ANY=[@ANYBLOB="1e030600bc5cb60128876360864666702c1ffe80000000000000", @ANYRESDEC], 0xffdd) 1.42424063s ago: executing program 4 (id=6960): r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002c80)={0x3, 0xc, &(0x7f0000000000)=ANY=[@ANYBLOB="18020000001000000000000000000000850000005300000018010000207834b000000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000a00ef00850000009b0000009500000000000000"], &(0x7f0000000080)='syzkaller\x00'}, 0x45) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000002c0)={r0, 0x0, 0xe, 0x0, &(0x7f0000000100)="e0b9547ed387dbe9abc89b6f5bec", 0x0, 0x2000, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) (async) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r2 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000040)=ANY=[@ANYRESOCT=r1], 0x50) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000002c0)={&(0x7f0000000000)=ANY=[@ANYRES32=r2], 0x0, 0x36}, 0x28) (async) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000480)={r2}, 0x4) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000300)={0xa, 0x10, &(0x7f00000004c0)=ANY=[@ANYRES64=r1, @ANYRESDEC=0x0, @ANYRESOCT=r2], &(0x7f0000000440)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x2, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_CREATE(0x0, &(0x7f0000000500)=ANY=[@ANYBLOB="1b00000000000000000000000080000000000000", @ANYRESDEC=0x0, @ANYRESOCT=r4, @ANYRESHEX=r0, @ANYRES32, @ANYBLOB="000000000000000000008ef005825f8331f5fc0718d5af0000000000"], 0x48) openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000740)) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) (async) socketpair(0xf, 0x1, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair(0x27, 0x800, 0xff2, 0x0) (async, rerun: 64) ioctl$TUNATTACHFILTER(0xffffffffffffffff, 0x401054d5, &(0x7f0000000040)={0x1, &(0x7f00000001c0)=[{0x45, 0x0, 0x2}]}) (rerun: 64) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=ANY=[@ANYBLOB="0b000000b9000000010001000900000001"], 0x48) close(r6) (async) r7 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="0b0000008b000000050010000900000001000000", @ANYRES32=0x1, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/17], 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f00000002c0)={r7, &(0x7f00000002c0), &(0x7f0000000380)=""/107}, 0x20) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r6, &(0x7f0000000040), &(0x7f0000000840)=""/215}, 0x20) (async, rerun: 64) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000000)={r6, &(0x7f0000000180), &(0x7f0000000680)=""/141}, 0x20) (async, rerun: 64) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000340)={r6, &(0x7f0000000040)}, 0x20) (async) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) (async, rerun: 64) r8 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="11000000040000000400000002"], 0x48) (async, rerun: 64) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000000)) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f00000000c0)={r8, &(0x7f00000004c0), &(0x7f0000000000)=""/10, 0x2}, 0x20) ioctl$PERF_EVENT_IOC_SET_FILTER(r5, 0x8912, 0x0) (async) r9 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r10 = openat$cgroup_int(r9, &(0x7f0000000240)='cpuset.mems\x00', 0x2, 0x0) write$cgroup_subtree(r10, &(0x7f0000000180)=ANY=[], 0x31) (async) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000007c0)={r3, 0x18000000000002a0, 0xe, 0x0, &(0x7f0000000680)="76389e6a65585578f830e9000000", 0x0, 0x10001, 0x60000000, 0x0, 0x0, 0x0, 0x0}, 0x50) 1.262805578s ago: executing program 3 (id=6961): bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x7, 0x3, &(0x7f00000000c0)=ANY=[@ANYBLOB="160a0000000000006110ac000000000095000f0000000000"], &(0x7f0000000000)='GPL\x00'}, 0x80) (async) perf_event_open(&(0x7f00000010c0)={0x2, 0x80, 0xb9, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xc, 0x7}, 0x410, 0x2000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async, rerun: 32) perf_event_open(&(0x7f00000004c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) (rerun: 32) close(0xffffffffffffffff) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f00000015c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x2}, 0x8, 0x10, &(0x7f0000000100), 0x10}, 0x57) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x702, 0xe, 0x700, &(0x7f0000000540)="e460334470b8d480eb00c15286dd", 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) (async) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x3, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="61154c000000000061138c0000000000bfa000000000000007000000080013002d03010000000000950017b8000000006916000000000000bf67000000000000350607000fff07206706000002000000160300000ee6fe5fbf500000000000000f650000000000006507f9ff01000000070700004ddfffff1e75000000000000bf54000000000000070400000400f9ffad4301000000000095000000000000001500000000000000950000000000000032ed3c12dc8c27df8ecf264e0f84f9f17d3c30e32f1754558f2278af6d71d79a5e12814cb1d8a5d4601d295c45a6a0b9bdb7dd399703cac4f6f3be4b369289aa6812b8e007e733a9a4f19de57b9d8a814261bdb94a05000000c6c60bf70d742a81762bab8395fa64810b5b40d893ea8fe0185473d51b546cad3f1d5ab2af27546e7c955ccefa1f6ab689b555202da2e0ec2871b4a7e65836429a527dc47ebe84a423b6c8d345dc8da3085b0ab71ca1b901627b562ed04ae76002d4519af619e3cca4d69e0dee5eb106774a8f3e6916dfec88158f0200000000c8fb730a5c1bf2b2bb71a629361997a75fd552bdc206438b8ef4901fd03cc86d8a297dff0445a15f21dce431e56723888fb126a163f16f920ae2fb494059bba8e3b680324a188076eb685d55c4e9b2ad9bc1172ba7cbebe174aba210d739a018f9bbec63222d20cecac4d03723f1c932b3a6aa57f1ad2e99e0e67ab93716d20000009f0f53acbb40b4f8e2738270b31562ed834f2af97787f696649a462e7ee4bcf8b07a10d6735154beb4000000000000000000000000004000bc00f674629709e7e78f4ddc211bc3ebe6bd9d42ca0140a7afaab43176e65ec1118d50d1e827f3472f4445d253887a5ad103649afa17690884f800030cffa651bb96589a7e2e509bcc1d161347623cb5e7ac4629c8ab04871bc47287cd31cc43010000007b40210000000000000000005f37d83f84e98a523d80bd970d703f37ca364a601ae899a56715a0a60100c6c94cce6994521629ab028acfc1d926a0f6a5489af8dc2f17923f3c40446d7074be86a912a5ac00f7ffffffffffffff000000000000c1eb2d91fb79ea00000000000000bb0d0000000000000000001fe4007be511fe32fbc90e2364a55e9bb66ac64423d2d00fea2594e190deae46e26c596f84eba90000000000000000fffb0000000082fb0d3cc3aa39ee4b1386bab561cda886fa642894cacd473b543ccb5f0d7b63924f17c67b00631d22a11dc3c693962895496d4f6e9cc54db6c7205a6b068fff496d2da7d6327f31d7c8cc5d325c5379b0363ce8bd1f61b007e1ff5f1be1969a1ba791ad46d800000000c7f26a0337302f3b41eae59809f905f12f6106f117b062df67d3a63f3265dd1410eea68208a3f26b2989b832d8b34a34a4f08b34b3042065acaa10856e858d27adee7daf32903d3fc78700d429a2d4c8b6d803eb83eecfe4c7ff9e6ab5a52e83d089dad7a8710e0254f1b11cced7bc3c8da0c44d2ebf9f6f3ff3be4d1458077c2253b0c7c7a0a9fdd63bf910dc20e5cb2a88e59febc47f1212a21f631dbaa74f22bad0fceee5f339550130a497c37758537650fe6db89da3c41fdc3d78e046f6160e1741299e8dc29906870e6431ed1eab5d067a183f064b060a8ec12725d42e3a74863d66bee966b1574f8e01b3f34a267ff0afa1e1c758a0079b747067312e9815a21cb3f1f8150d999d788535a4d3116dbc7e2bf2402a75fd7a557317c66dd255ed5d1c0d634fc5fb38f84d9d87b27f8a5d91217b728f13e3ee20e69e0ffb2780b1a7af137ff7b4ff139604faf0453b65586f65c7943d54b52f06c870edf0c5d644b5272b44c23488b2bdbff947c4dfa108cbb88202eeb81f428a5b3c299848649e1a57ff52f657a6749b94a42b25e9321fc2cc17dc4a29b9cba8ded5de439ab129ae818837ee1562078fc524b3baf49a0be9bb7d958d5e87c6c09bf71a894bad62934782cc308e936d7637e07c4a2a3bc87b0da20000d9ef418cf19e7a8c4c328be0ce91798adc2dca871073f6bd61dc18402cde8bf777b2eaa45c940aabc86b94f8cbde4d470667bee722a6a2af483ad0d3415ed0f9db009acaba9eaea93f3b563ab9000000ff000000000077a99fb5b0a43749ca477c9c7ca20bd428d8f77bb920ad0db4c1da671bfad7f109b776476a54939e621232cd115ba9f37057ad891fea2353f3ad9c042c64a5ecf80f4e4cf927ae39347c22822375c26edf2754695c16780429e03759691adb63553e9c4561528ded5f35bb20e98b2e6d01dbfcde82608359c50881324524db0dbe21efba4f0fc338f4b0b11cb028d1063b3bacaab92fb7f9d2971440f873ec261d54c1570adef8004c91896fcd74c9e03dfd9a781210c0346ed1b02a44c64adad8a3f238a8ddf7207c45057c02e922b942f15ddcfbfb00"/1747], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sched_cls, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0xffffffffffffffd2}, 0x48) 1.196125911s ago: executing program 1 (id=6962): socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r0, 0x8924, &(0x7f0000000000)={'macsec0\x00', @random="010000201000"}) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d0000001801000020696c2500000100002020207b1af8ff00000000bf86a26db800000007010000f8ffffffb702000008000000b703000000000000850000007100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000070000001801000020756c2500000000002020207b1af8ff00000000bfa1000000"], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0x33, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0, 0x0, 0x0, 0x0}, 0x94) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000080)={'pimreg0\x00', 0x7c2}) ioctl$TUNATTACHFILTER(r3, 0x401054d5, &(0x7f0000000040)={0x3, &(0x7f0000000000)=[{0x3c}, {0x40}, {0x6}]}) ioctl$TUNSETVNETBE(r3, 0x400454de, &(0x7f0000000040)=0x1) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[@ANYRESHEX=r1, @ANYRESOCT=r2, @ANYRES8=r1], 0x50) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x6, 0x14, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000000000000000000000000001801000020646c2100000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007200000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_BIND_MAP(0xa, &(0x7f0000000080)={r5}, 0xc) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f0000001300)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @sk_skb, 0xffffffffffffffff, 0x8, &(0x7f0000000380)={0xffffffff}, 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x94) 1.171342002s ago: executing program 4 (id=6963): bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xa, 0x6, &(0x7f0000000000)=ANY=[@ANYBLOB="050000000000000073116c00000000008510000002000000720000007600000095000000000000009500a50500000000"], &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x6}, 0x70) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000180)=ANY=[@ANYBLOB="9feb01001800000000000000300000003000000002000000000000000102000000000000000000000200000000000000000000000000000903000000000000000000000d000000000000"], 0x0, 0x4a}, 0x28) r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x10, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4000000000000007910480000000000c6000000000009009500000c00000000"], &(0x7f0000003ff6)='GPL\x00', 0x2, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @sk_msg, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x1f2, 0x10, &(0x7f0000000000), 0xfffffe51}, 0x48) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001b00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001d80)=ANY=[@ANYBLOB="28010000000000000100000001"], 0x128}, 0x0) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) sendmsg$tipc(r1, &(0x7f0000001ec0)={&(0x7f0000000180)=@name={0x1e, 0x2, 0x3, {{0x1, 0x1}}}, 0x10, 0x0, 0x0, 0x0, 0x0, 0x4040894}, 0xc040) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000140)=r0, 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r3, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001d80)=ANY=[], 0x128}, 0x0) recvmsg$unix(r2, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000140), 0x100}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x3, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4050000000000006110b0000000000063514900000000009500090000000000"], &(0x7f0000003ff6)='GPL\x00', 0x5, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @sched_cls, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x85}, 0x52) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) close(0x3) sendmsg$inet(r5, &(0x7f0000001b00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001d80)=ANY=[], 0x128}, 0x0) recvmsg$unix(r4, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000900), 0x100}, 0x0) r6 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TUNSETIFF(r6, 0x400454ca, &(0x7f0000000080)={'syzkaller0\x00', 0xf101}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r7, 0x8914, &(0x7f0000000080)) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, 0xfffffffffffffffd) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x1f, 0x13, &(0x7f0000000080)=ANY=[@ANYBLOB="18080000d0ff00000000000000000000851000000600000018000000", @ANYRES32, @ANYBLOB="00000000000000006608000000000000180000000000000000000000000000009500000000000000360a020000000000180900002020782500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b50a00000000000085000000060000009500000000000000"], &(0x7f0000000000)='GPL\x00', 0x2, 0xff5c, &(0x7f0000000340)=""/222, 0x0, 0x8}, 0x78) r8 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x2340, 0x0) close(r8) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) bpf$MAP_GET_NEXT_KEY(0x2, 0x0, 0x0) ioctl$SIOCSIFHWADDR(r8, 0x8943, &(0x7f0000002280)={'syzkaller0\x00', @random="0100"}) close(r6) 1.149064393s ago: executing program 3 (id=6964): bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000640)={&(0x7f00000004c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@fwd={0x0, 0x2}]}}, &(0x7f0000000540)=""/197, 0x26, 0xc5, 0x1}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x3, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="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"/1747], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sched_cls, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0xffffffffffffffd2}, 0x48) 947.151004ms ago: executing program 2 (id=6965): bpf$ENABLE_STATS(0x20, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x56, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x31, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020007f8ffffffb703000008000000b7040000000000008500000086"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x1b, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="1b000000000000000000"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x90) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x5, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r2) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x6, 0x5, &(0x7f0000000400)=ANY=[@ANYBLOB="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"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @xdp, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) sendmsg$unix(r3, &(0x7f00000001c0)={&(0x7f0000000500)=@abs={0x1, 0x2f}, 0x6e, 0x0}, 0x0) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000240)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x50) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x6, 0x7, &(0x7f0000000440)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4002}, [@ringbuf_query={{0x18, 0x1, 0x1, 0x0, r4}}]}, &(0x7f0000000400)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x4, '\x00', 0x0, @xdp, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_BIND_MAP(0xa, &(0x7f00000003c0)={r5}, 0xc) sendmsg$sock(r3, &(0x7f00000015c0)={&(0x7f00000002c0)=@l2tp={0x2, 0x0, @multicast2, 0x3}, 0x80, &(0x7f0000000000)=[{&(0x7f0000000580)="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", 0x1000}, {&(0x7f0000000340)="bf2bee9f0bcff67ce337cccec38765343aa8cf601507b6fff1fda576d746ea342e09fb79bf8d87e5c2b7d789bc8639b08fe99de8adf4e2e0d3f484465b15a638f34586e8a8", 0x45}], 0x2, &(0x7f0000001580)=[@mark={{0x14, 0x1, 0x24, 0xfffffff7}}], 0x18}, 0x0) 946.514184ms ago: executing program 3 (id=6966): r0 = perf_event_open(&(0x7f0000000700)={0x2, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x2, @perf_bp={&(0x7f0000000040), 0x7}, 0x0, 0x0, 0x0, 0x1, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000000000}, 0x0, 0xa, 0xffffffffffffffff, 0x0) r1 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct]}}, &(0x7f0000000040)=""/247, 0x26, 0xf7, 0x1}, 0x20) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000003c0)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000000180), &(0x7f00000001c0)}, 0x20) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)=@base={0x1, 0x5, 0x1, 0x81, 0x4001, 0x1, 0xa, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x5, 0x3}, 0x50) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000800)={0x1, 0x58, &(0x7f0000000780)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r6, &(0x7f0000001780)={0x0, 0x0, 0x0}, 0x4800) recvmsg$unix(r5, &(0x7f0000001b40)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) setsockopt$sock_attach_bpf(r6, 0x1, 0x41, &(0x7f0000000040)=r7, 0x4) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000a40)={r1, 0x20, &(0x7f0000000a00)={&(0x7f00000008c0)=""/90, 0x5a, 0x0, &(0x7f0000000940)=""/155, 0x9b}}, 0x10) r9 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000c80)={0x18, 0x24, &(0x7f0000000a80)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x3af, 0x0, 0x0, 0x0, 0x1}, {}, {}, [@tail_call={{0x18, 0x2, 0x1, 0x0, 0x1}}, @map_idx_val={0x18, 0xb, 0x6, 0x0, 0xc, 0x0, 0x0, 0x0, 0x80000000}, @ringbuf_query={{0x18, 0x1, 0x1, 0x0, 0x1}}, @map_fd={0x18, 0x5, 0x1, 0x0, 0x1}, @printk={@llx, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x7}}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000bc0)='GPL\x00', 0x3, 0x0, 0x0, 0x41100, 0x64, '\x00', 0x0, 0x0, r1, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000c00)=[0x1], &(0x7f0000000c40)=[{0x0, 0x4, 0x2, 0x2}], 0x10, 0x8001}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000d80)={0x16, 0x16, &(0x7f00000005c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0xd10}, [@initr0={0x18, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x1}, @map_fd={0x18, 0xb, 0x1, 0x0, r2}, @func={0x85, 0x0, 0x1, 0x0, 0x4}, @printk={@ld, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x4}}, @ldst={0x0, 0x3, 0x4, 0x1, 0x6, 0x20, 0x1}, @ringbuf_query={{0x18, 0x1, 0x1, 0x0, r3}}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffd}]}, &(0x7f0000000480)='syzkaller\x00', 0x858, 0x71, &(0x7f0000000680)=""/113, 0x41000, 0x50, '\x00', r4, @flow_dissector, r7, 0x8, &(0x7f0000000840)={0x1, 0x2}, 0x8, 0x10, &(0x7f0000000880)={0x1, 0xd, 0x779ce91b, 0x3c}, 0x10, r8, r9, 0x4, 0x0, &(0x7f0000000d40)=[{0x5, 0x2, 0x8, 0x3}, {0x3, 0x3, 0x1, 0x2}, {0x0, 0x3, 0x7, 0x7}, {0x3, 0x2, 0x10, 0x8}], 0x10, 0x80000001}, 0x94) r10 = syz_clone(0x0, &(0x7f0000000f00)="6a4d33079e36d5a7fb649b725cae0790287550bb469961bcd353d0adff9d0b2a4d87406a60f0354e0bf024447a20eee7d6ac2a82ea8ae7f53a1d805c99a9e1173e4bdf317f723937a68a078e2980943f35035e2164501da910be4ad5af62065f100ed4b142f20c16960c2376f38bfc2d97592e4f4b3ed38544f5a87c899ecf7e71a27078181a452a880a351a7e4954b41c1a7033c836bf00559ec2", 0x9b, &(0x7f0000000fc0), &(0x7f0000001000), &(0x7f0000001040)="c1a527ace181836a7aaead9564ebc5c1019dac8e98de7fec1fdd") perf_event_open(&(0x7f0000000e80)={0x5, 0x80, 0xfe, 0xff, 0x1, 0x81, 0x0, 0x8000000, 0x1400, 0x8, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x3, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0xe, 0x4, @perf_bp={&(0x7f0000000e40), 0x9}, 0x20, 0x2688, 0x7, 0xd, 0x1ff, 0x8000, 0x1b66, 0x0, 0x3, 0x0, 0xcab6}, r10, 0x10, r0, 0x13) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000500)={0x6, 0x3, &(0x7f0000000200)=@framed, &(0x7f0000000280)='GPL\x00', 0x5, 0xe2, &(0x7f00000002c0)=""/226, 0x0, 0x0, '\x00', 0x0, 0x25, r1, 0x8, 0x0, 0x0, 0x10, &(0x7f00000004c0)={0x0, 0x0, 0x64}, 0x2}, 0x80) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x6, 0xe, &(0x7f0000001540)=ANY=[@ANYRESDEC=r0], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000080), 0x8, 0x10, &(0x7f0000000000)={0x2}, 0x10}, 0x94) 945.895564ms ago: executing program 2 (id=6967): r0 = bpf$ITER_CREATE(0xb, &(0x7f0000000100), 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) close(r0) syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000300)='ns/net\x00') r1 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000003c0)=@bpf_lsm={0x1e, 0x3, &(0x7f00000000c0)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24}, 0x80) bpf$BPF_PROG_TEST_RUN(0x1c, &(0x7f00000005c0)={r1, 0x0, 0x24, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xa) bpf$LINK_GET_NEXT_ID(0x1f, &(0x7f0000000200)={0x0, 0x0}, 0x8) r3 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000000)=r2, 0x4) bpf$BPF_LINK_UPDATE(0x1d, &(0x7f0000001300)={r3, r1, 0x4, r1}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@bloom_filter={0x1e, 0x9, 0x3, 0x9, 0x1, 0xffffffffffffffff, 0x1, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x3, 0x4, 0xc}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x1f, 0x13, &(0x7f0000000080)=@framed={{0x18, 0x8, 0x0, 0x0, 0xffd0}, [@func={0x85, 0x0, 0x1, 0x0, 0x6}, @map_fd={0x18, 0x0, 0x0}, @generic={0x66, 0x8}, @initr0, @exit, @alu={0x6, 0x0, 0x3, 0xa, 0x0, 0x2}, @printk={@x, {}, {}, {}, {}, {0x5, 0x0, 0xb, 0xa, 0x0, 0xd0ff}}]}, &(0x7f0000000000)='GPL\x00', 0x2, 0xff5c, &(0x7f0000000340)=""/222, 0x0, 0x8}, 0x78) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000000)={0x0, 0x0}) close(r4) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=ANY=[@ANYBLOB="01000000050000000200000007"], 0x50) close(0x3) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x7, 0x10001, 0x9, 0x1, 0xffffffffffffffff, 0xfffffffc}, 0x50) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, 0x0, 0x0) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000740)={r6, &(0x7f0000000340), &(0x7f00000000c0)=""/109}, 0x20) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xd, &(0x7f0000000440)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0xfffffff7}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r5}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}, @call={0x85, 0x0, 0x0, 0x50}]}, &(0x7f0000000400)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0xd, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_BIND_MAP(0xa, &(0x7f00000003c0)={r7, r5}, 0xc) ioctl$PERF_EVENT_IOC_REFRESH(0xffffffffffffffff, 0x2402, 0x3) syz_clone(0x108000, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f00000010c0)={0x2, 0x80, 0xb9, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xc, 0x7}, 0x410, 0x2000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000b00)=ANY=[@ANYBLOB='\n\x00\x00\x00\a\x00\x00'], 0x48) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000880)={&(0x7f0000000700)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x3}, {0x0, [0x61]}}, &(0x7f00000007c0)=""/134, 0x1b, 0x86, 0x1}, 0x28) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x210, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x8, 0x0, 0x58c4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x3, 0xe, &(0x7f0000001540)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sched_cls=0x2e, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x3}, 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x94) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 909.228275ms ago: executing program 3 (id=6968): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000300)=ANY=[@ANYBLOB="09000000160000000800000040"], 0x50) r1 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000a00)=ANY=[@ANYBLOB="0200000004000000080000000100000080000000", @ANYBLOB, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00'], 0x48) r2 = perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0xc48}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x10, 0x4, &(0x7f0000000040)=ANY=[@ANYRESOCT=r2], &(0x7f00000002c0)='syzkaller\x00', 0x2, 0xd0, &(0x7f00000001c0)=""/208, 0x0, 0x0, '\x00', 0x0, @sk_msg}, 0x94) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.throttle.io_serviced_recursive\x00', 0x26e1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000e40)={r4, 0xe0, &(0x7f0000000d40)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, &(0x7f0000000880)=[0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x5, 0x7, &(0x7f00000008c0)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000940)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0xa, &(0x7f0000000980)=[{}, {}], 0x10, 0x10, &(0x7f00000009c0), &(0x7f0000000cc0), 0x8, 0xd0, 0x8, 0x8, &(0x7f0000000d00)}}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000f00)=@bpf_lsm={0x1d, 0x29, &(0x7f0000000a40)=@raw=[@snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0xfff}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r1}}, @ldst={0x0, 0x2, 0x4, 0xa, 0x4, 0xfffffffffffffffe, 0x1}, @snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x1f49}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r4}}, @snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x3}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r4}}, @exit], &(0x7f0000000800)='syzkaller\x00', 0x0, 0xde, &(0x7f0000000bc0)=""/222, 0x41100, 0x0, '\x00', 0x0, 0x1b, r4, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000840)={0x5, 0xd, 0x2, 0xf00}, 0x10, r5, 0x0, 0x0, &(0x7f0000000e80)=[0xffffffffffffffff], &(0x7f0000000ec0), 0x10, 0x5}, 0x94) write$cgroup_int(r4, &(0x7f0000000600)=0xd, 0x18) r6 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000740)=@bpf_lsm={0x1d, 0x16, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x7}, [@printk={@lld, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x9}}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, r0}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x2}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x1}}, @map_idx_val={0x18, 0x8, 0x6, 0x0, 0x7, 0x0, 0x0, 0x0, 0xda}]}, &(0x7f0000000340)='GPL\x00', 0x3, 0xca, &(0x7f0000000500)=""/202, 0x40f00, 0x28, '\x00', 0x0, 0x1b, r4, 0x8, &(0x7f0000000900)={0x0, 0x4}, 0x8, 0x10, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x10, 0x40000}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x15, 0x1c, &(0x7f0000000100)=@ringbuf={{0x18, 0x8, 0x0, 0x0, 0xcd9}, {{0x18, 0x1, 0x1, 0x0, r0}, {}, {0x7, 0x0, 0xb, 0x6}, {0x85, 0x0, 0x0, 0x5}}, {{0x5, 0x0, 0x3}}, [@snprintf={{0x7, 0x0, 0xb, 0x2}, {0x3, 0x3, 0x3, 0xa, 0x9}, {0x5, 0x0, 0xb, 0x9, 0x0, 0x0, 0xd00a}, {0x3, 0x3, 0x3, 0xa, 0xa}, {0x6, 0x1, 0xa, 0x9, 0x8}, {0x7, 0x0, 0x0, 0x8}, {0x7, 0x1, 0xb, 0x4, 0x8}, {}, {0x7, 0x0, 0xc}, {0x18, 0x6, 0x2, 0x0, r1}, {}, {0x46, 0x8, 0xfff0, 0x76}}], {{0x7, 0x1, 0xb, 0x8}, {0x6, 0x0, 0x5, 0x8, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x7}}}, &(0x7f0000000380)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0xd, '\x00', 0x0, @sk_reuseport=0x27, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_QUERY(0x10, &(0x7f00000006c0)={@ifindex, 0x3, 0x0, 0x7, &(0x7f0000000000)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x7, 0x0, &(0x7f0000000600)=[0x0, 0x0, 0x0], &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0], &(0x7f0000000680)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0}, 0x40) bpf$LINK_GET_NEXT_ID(0x1f, &(0x7f0000000200)={0x0, 0x0}, 0x8) bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000000)=r8, 0x4) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000700)={@fallback=r6, r3, 0x1b, 0x2022, r3, @void, @void, @value=r8, @void, r7}, 0x20) 907.781645ms ago: executing program 0 (id=6969): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="10000000040000000800000008"], 0x48) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000840)={0xffffffffffffffff, 0xe0, &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, &(0x7f0000000480)=[0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x6, &(0x7f00000005c0)=[0x0], &(0x7f0000000600)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0xe4, &(0x7f0000000640)=[{}, {}, {}], 0x18, 0x10, &(0x7f0000000680), &(0x7f00000006c0), 0x8, 0xf7, 0x8, 0x8, &(0x7f0000000700)}}, 0x10) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff}) recvmsg$unix(r3, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x5452, &(0x7f00000006c0)='\x02;\xe5\b\x00\x1c\x9c\x00\x00\x00\x00\x00\x00\x91\xecB\xdcZ\xe5\xbd$\x05\x90\xa9\xf3\xc7\xcb\xb7\xf0\xa1;#\x989\xe9\x12\xdf^6T\xdf\xcd\x02\xc5\xb0\xba\x12\'QXp\t\xfc\xf3\x01\x02\xbc\xbf\xc0\xf0\x10\xee\xd3\\yy\xa4\xf9\xe8\x00\xdd\xe97 0_\xe4]W\xf7~\xacVK\xc9t\x9e+:\x85\xef\x94\x0e\x19\x9cV[N.\xeb\x9fJ>\xd9\x99\x88\xd8\xdd\xb8Y\xc3$\xc6\x93\v\x04REY\xf4\xea\xf2\xcd\xcd.\x16\x861\xa1\v\x8d\x8e\x84R\xa6\x83\x84\xc0\x01e\xc3\xc8\xcc?\xc8?\x19\xb2\xa2\xe1\xac<\xe9f\x11\xff3\xc7\x19\x9e\x19\xf5-\xfe\xbd\xae\xbbR\x82\x16\xf9\x15S\x03U\xe0\xd8t\xe3%96') ioctl$TUNGETFEATURES(r4, 0x5452, &(0x7f00000013c0)) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f00000008c0)={0x0, 0x0}, 0x8) bpf$PROG_LOAD(0x5, &(0x7f0000000a40)={0xd, 0x18, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0xfffffffa}, [@call={0x85, 0x0, 0x0, 0x27}, @jmp={0x5, 0x1, 0x6, 0x5, 0x4, 0xfffffffffffffff8}, @snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x3}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r0}}, @generic={0x3, 0xf, 0x6, 0x1000, 0xe7b}, @ringbuf_query={{0x18, 0x1, 0x1, 0x0, r0}}, @generic={0x5, 0xe, 0x4, 0x4000, 0x80}]}, &(0x7f00000001c0)='GPL\x00', 0x5, 0xd4, &(0x7f0000000380)=""/212, 0x41000, 0x1, '\x00', r2, @sock_ops, r4, 0x8, &(0x7f0000000880)={0x7, 0x2}, 0x8, 0x10, 0x0, 0x0, r5, 0xffffffffffffffff, 0x1, &(0x7f0000000900)=[r0, r0, r0], &(0x7f0000000940)=[{0x3, 0x5, 0x0, 0x6}], 0x10, 0x400}, 0x94) ioctl$TUNSETOFFLOAD(r1, 0xc004743e, 0x110e22fff6) r6 = perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x40082406, &(0x7f0000000580)='(m\xf0\x10f&\"\"\xd5Y\x9d\x87=\xe1\x17\x9e\x18\xff{4\xa3\xaa\x81\xda\xd2\x10\xb5\x124\xdf\xef/+}\t\xc8r\xbaU\xfar\x9dJB\x8a\xee\xdf\xec\x1c\xad\xa6V\x83\x8e\xf9\x1c\xaf{%\xe3\xdd\x06\xc3Q\xb6\xd2\xc9)') perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x56, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x10000, 0x33}, 0x4000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r7 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x1, 0x0) ioctl$TUNSETOFFLOAD(r7, 0x4004743d, 0x110e22fff6) write$cgroup_type(r7, &(0x7f0000000280), 0xfffffeed) r8 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x6, 0x4, 0x8, 0x8}, 0x50) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000580)={{r8}, &(0x7f00000004c0), &(0x7f0000000540)}, 0x20) r9 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x6, 0xd, &(0x7f0000000200)=ANY=[@ANYBLOB="004000000000181100"/20, @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bca2000000000000a6020000f8ffffffb703000008000000b7040000000000008500000033000000850000007d0000009500000000000000"], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @xdp, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_BIND_MAP(0xa, &(0x7f0000000500)={r9}, 0xc) 833.625709ms ago: executing program 2 (id=6970): socketpair(0x1, 0x1, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000280)=@bpf_lsm={0x6, 0x3, &(0x7f00000003c0)=ANY=[@ANYBLOB="18000000003f000000000000000000f195"], &(0x7f0000000140)='GPL\x00'}, 0x80) r2 = bpf$ITER_CREATE(0xb, &(0x7f00000004c0)={r1}, 0x8) close(r2) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000500)) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001b00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001d80)=ANY=[@ANYBLOB="28010000000000000100000001"], 0x128}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r4, &(0x7f0000001b00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001d80)=ANY=[], 0x128}, 0x0) recvmsg$unix(r3, &(0x7f0000000000)={0x0, 0x0, 0x0}, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8902, &(0x7f00000013c0)) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x7, 0xa, &(0x7f0000000680)=@framed={{0x18, 0x8}, [@func={0x85, 0x0, 0x1, 0x0, 0x6}, @map_fd={0x18, 0x0, 0x0}, @generic={0x2c}, @initr0, @exit]}, &(0x7f0000000000)='GPL\x00', 0x4, 0xee, &(0x7f0000000340)=""/238}, 0x80) 747.961203ms ago: executing program 1 (id=6971): bpf$PROG_LOAD(0x5, &(0x7f0000000600)={0x1e, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018000000", @ANYRES32=0x0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000f66f63bb850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0xae, '\x00', 0x0, @fallback=0x30, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x7ffd}, 0x94) (async) r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000280)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x0, 0x5}, 0x50) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000200)=r0, 0x4) (async) bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000b40)={0xffffffffffffffff, 0xe0, &(0x7f0000000a40)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000180), ""/16, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, &(0x7f0000000900)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000200), 0x0, 0x45, &(0x7f00000002c0), 0x0, 0x10, &(0x7f0000000580), &(0x7f0000000800), 0x8, 0xb4, 0x8, 0x0, 0x0}}, 0x10) sendmsg$inet(0xffffffffffffffff, &(0x7f0000000bc0)={&(0x7f0000000040)={0x2, 0x4e23, @remote}, 0x10, &(0x7f0000000780), 0x0, &(0x7f0000000b80)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r1, @loopback, @private=0xa010101}}}], 0x20}, 0xc0) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x19, 0x4, 0x4, 0x2, 0x0, 0x1, 0x4, '\x00', r1, 0xffffffffffffffff, 0x4}, 0x50) (async) r2 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000740)={&(0x7f0000000380)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x4, [@ptr={0xd, 0x0, 0x0, 0x2, 0x1}]}, {0x0, [0x61, 0x5f]}}, &(0x7f00000004c0)=""/197, 0x28, 0xc5, 0x1, 0xc225, 0x10000}, 0x28) (async) r3 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct]}}, 0x0, 0x26}, 0x20) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xd, 0x3, &(0x7f0000000040)=@framed, &(0x7f0000000080)='GPL\x00', 0x5, 0x1f6, &(0x7f00000002c0)=""/168, 0x0, 0x0, '\x00', 0x0, @sock_ops, r3, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000200), 0x1}, 0x6d) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000004c0)={r4, 0xc0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000440)=r5, 0x4) (async) bpf$PROG_LOAD(0x5, &(0x7f0000000800)={0x1b, 0x5, &(0x7f0000000300)=@framed={{0x18, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x10000}, [@map_fd={0x18, 0x3, 0x1, 0x0, r0}]}, &(0x7f0000000340)='syzkaller\x00', 0x99, 0x1000, &(0x7f0000000f40)=""/4096, 0x40f00, 0x20, '\x00', r1, @fallback=0x22, r2, 0x8, &(0x7f0000000780)={0x6, 0x5}, 0x8, 0x10, &(0x7f00000007c0)={0x1, 0x1, 0x4, 0x7}, 0x10, r5, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x8}, 0x94) r6 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000000c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x8, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x5, 0x4}, 0x50) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f00000001c0)={{r6}, &(0x7f0000000140), &(0x7f0000000180)='%pI4 \x00'}, 0x20) r7 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000000)={0xffffffffffffffff, 0xfffffff7, 0x8}, 0xc) (async) r8 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="0b00000007000000010001000900000001"], 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000f00)={{r8}, &(0x7f0000000d80), &(0x7f0000000dc0)}, 0x20) (async) r9 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x14, &(0x7f00000009c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x4002}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r8}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x6}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}, @printk={@lli, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x1}}]}, &(0x7f0000000400)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x33, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_BIND_MAP(0xa, &(0x7f00000003c0)={r9}, 0xc) (async) bpf$MAP_CREATE(0x0, &(0x7f0000000040)=@bloom_filter={0x1e, 0x9, 0x5, 0xd, 0x2, r7, 0x3, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x4, 0x1, 0x3}, 0x50) 700.071506ms ago: executing program 4 (id=6972): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000070000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000a500850000002d00000095"], 0x0, 0x0, 0x0, 0x0, 0x41100, 0x4, '\x00', 0x0, @fallback=0x34, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x94) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="07000000040000001800000001"], 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x9, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000001000000000000000018120000", @ANYRES32=r0, @ANYBLOB="0000000000000000b703000000d0df00850000001b"], 0x0, 0xfffffffe, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = perf_event_open(&(0x7f0000000fc0)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x400, 0xf6103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, @perf_bp={0x0, 0x8}, 0x40, 0x0, 0x0, 0x0, 0x7, 0x0, 0xffff}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r3 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000000)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x7, '\x00', 0x0, 0xffffffffffffffff, 0x7, 0x5, 0x4}, 0x50) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000750000001801000020646c2500000000002020207b1af8ff00000000bfa100000000000007"], 0x0, 0x5f4, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x94) r5 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x111600, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000780)={r4, 0xe0, &(0x7f0000000680)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, &(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x4, 0x2, &(0x7f0000000380)=[0x0, 0x0, 0x0, 0x0], &(0x7f00000003c0)=[0x0, 0x0], 0x0, 0x9c, &(0x7f0000000400)=[{}, {}, {}, {}, {}], 0x28, 0x10, &(0x7f00000005c0), &(0x7f0000000600), 0x8, 0x64, 0x8, 0x8, &(0x7f0000000640)}}, 0x10) ioctl$TUNSETIFINDEX(r5, 0x400454da, &(0x7f00000007c0)=r6) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000740)={0x18, 0x15, &(0x7f0000000180)=@raw=[@initr0={0x18, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0xd}, @map_val={0x18, 0x4, 0x2, 0x0, r0, 0x0, 0x0, 0x0, 0xfffffffd}, @map_idx={0x18, 0x8, 0x5, 0x0, 0xb}, @snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x6}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r3}}, @cb_func={0x18, 0x8, 0x4, 0x0, 0x3}], &(0x7f0000000080)='syzkaller\x00', 0x5, 0xa6, &(0x7f00000002c0)=""/166, 0x40f00, 0x49, '\x00', r6, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0xa, &(0x7f0000000380)=[r0, r0, r0], &(0x7f00000004c0)=[{0x0, 0x4, 0xe, 0x8}, {0x5, 0x1, 0x10, 0xa}, {0x0, 0x2, 0xe}, {0x3, 0x2, 0x4, 0x1}, {0x5, 0x3, 0x4, 0xc}, {0x1, 0x5, 0x8, 0xa}, {0x0, 0x4, 0x5, 0x3}, {0x5, 0x3, 0x7, 0x1}, {0x0, 0x1, 0x5, 0xa}, {0x4, 0x1, 0xc, 0xb}]}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r2) syz_clone(0x60000400, 0x0, 0x0, 0x0, 0x0, 0x0) 699.312276ms ago: executing program 2 (id=6973): syz_clone(0x11, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000750000001801000020646c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000e00000095"], 0x0, 0xfffffffe, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xa, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18000000000000000000000000000000850000006d"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=@base={0x7, 0x4, 0x18, 0x1}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x9, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000001000000000000000018120000", @ANYRES32=r0, @ANYBLOB="0000000000000000b703000000000000850000001b"], 0x0, 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$sock(r1, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000740)=[{&(0x7f0000000300)="e3bb896d33775ddf2dc2bbd9d085d772bf33f54a319e71a0cdc86bf4ae79d93c56c2f5bd44e819c1179daaaad033b843c3d9c1a6099703f66719052cbdcfb7fbb2aeef1d2a0f93e190816efbb7f55d46517762c9f27c8de61b67e4ffc2bc649dfac78295376d6b3d38ff9475b4b25a6b94accc832624d2ebb08f7b0f95d25e2e9af1d3ebf3e05f91dc9e4a187edf7542180cd8d3e60edbc8a6b30f99ad863b4f03c7b4b53ef38f29db2400f2ab3e9a61f1bcfd5850c83f7b3eca5ebaa157bffe0a5b8511c31d5291681f9f1ad62624f32602e3393708ef207620e560271ced60d466ed80fb4f", 0xe6}, {&(0x7f0000000040)="11d8ba083a23b08b50c89c580ff6d89eb7f0ce1ea6", 0x15}, {&(0x7f00000004c0)="29d9ac8c03c6df5d1f5ac5edfe69f2a6e4eaf61d819c4920f442136581f28e4fc619debb68a1d00e0673c71bfa5b1c5c99b8c7642ff22aa989f8ae30469263954487559d7c1db2a6df62462b41423be7934889f59cfedaa201526eefc8786a31a97dbbf6da3dd559249570a044f4d4303bac30207ff9ff67b26b0ce8cae79393111f1dacc6037b45bc2df5c9d245d6bf2d853eeaf6ca5ba9e7bac685ff39671f41c1822bc3b342b67a3254584ee2d9298ad0bb9bbd7d378729f44edfa6631aafc7a83a7a605498", 0xc7}, {&(0x7f0000000080)="4e674a7d9bb05b6546d01a2e06c6a6f2431f2913089270624131a3db71732d60e5544a3abd3d110a20c4805b", 0x2c}, {&(0x7f0000000180)="243be379f887b06c6da18b0fcbf60037d4d646080ba07b30a32d32d727a423e64566f43850dd0f08277ac864d5ff702288243f32cd30b2", 0x37}, {&(0x7f00000001c0)="eb9fc59717a7c8b1a5b0457aae275b4e89e4ba73e18328e3a26370", 0x1b}], 0x6, &(0x7f0000000200)=[@mark={{0x14, 0x1, 0x24, 0x80000001}}], 0x18}, 0x20000044) r2 = perf_event_open(&(0x7f0000000fc0)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x400, 0xf6103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, @perf_bp={0x0, 0x8}, 0x40, 0x0, 0x0, 0x0, 0x7, 0x0, 0xffff}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r3) syz_clone(0xc0126080, 0x0, 0x0, 0x0, 0x0, 0x0) 577.042591ms ago: executing program 4 (id=6974): r0 = openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000), 0x2, 0x0) write$cgroup_subtree(r0, &(0x7f0000000040)={[{0x2d, 'hugetlb'}]}, 0x9) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000080)='hugetlb.1GB.rsvd.max_usage_in_bytes\x00', 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)) r1 = openat$cgroup_type(0xffffffffffffffff, &(0x7f0000000100), 0x2, 0x0) r2 = syz_clone(0x400000, &(0x7f0000000200)="c3cae14e59a413b9b38395f2b87647ba06dcf27975893a2d8ca01aca5c29b281", 0x20, &(0x7f0000000240), &(0x7f0000000280), &(0x7f00000002c0)="01f60ed4fc25d907252627eb763274b2ec1eee36b49ca8cf979b5972b14f521ebb0b2044c0f573155c849019bf807cf2730bc7cc7fd0b72394f5fa7ff45208a7c4e4dc0155e9eb5c21de769aa5389fd8f0df16120838d584cf66b168428fcfbdcf15bee9c8064174d4040e79c93e36112cff7be422dfd8a6792ef4f23bdcee2646da6ddaadd3e462c55194ef9119cd7e9fdd9f07ba4ec21987b54f02311b8534b86ccdb1") r3 = perf_event_open$cgroup(&(0x7f00000003c0)={0x4, 0x80, 0xe3, 0x5, 0xff, 0x81, 0x0, 0x7, 0x3802, 0xc, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x2, 0x4, @perf_bp={&(0x7f0000000380), 0xcdebcd55b2c9a1b0}, 0x1840, 0x3, 0x6, 0x1, 0x4, 0x10001, 0x3b9, 0x0, 0x7, 0x0, 0x1}, 0xffffffffffffffff, 0xd, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000180)={0x3, 0x80, 0x0, 0x3, 0x3, 0xe, 0x0, 0xfffffffffffffff7, 0x80, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x33, 0x1, @perf_bp={&(0x7f0000000140), 0x5}, 0x100000, 0x7, 0x9, 0x0, 0xad56, 0x8001, 0x89, 0x0, 0x9, 0x0, 0x6}, r2, 0x5, r3, 0x0) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000440), 0x402, 0x0) ioctl$TUNSETCARRIER(r4, 0x400454e2, &(0x7f0000000480)=0x1) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=@base={0xf, 0x2, 0x9, 0xbf, 0x8, 0xffffffffffffffff, 0x6, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x3}, 0x50) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000005c0)={0x1, 0x58, &(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000600)=@base={0x16, 0x2, 0x3, 0xe555, 0x2, r5, 0xa, '\x00', r7, 0xffffffffffffffff, 0x5, 0x4, 0x3}, 0x50) write$cgroup_pid(r1, &(0x7f0000000680)=r2, 0x12) r8 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000900)={&(0x7f00000006c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10c, 0x10c, 0x9, [@enum64={0x7, 0x2, 0x0, 0x13, 0x1, 0x6, [{0xc, 0x9, 0xe55}, {0x9, 0x5, 0x2}]}, @enum64={0x9, 0x9, 0x0, 0x13, 0x1, 0xc, [{0x8, 0x346b, 0x400}, {0x1, 0x5, 0xfffffffa}, {0x2, 0x0, 0x7d}, {0x4, 0x0, 0x3}, {0x1, 0xf, 0x9}, {0x8, 0x81, 0x8}, {0x9, 0x3, 0x3}, {0x10, 0x3, 0x3}, {0xb, 0x1, 0x3}]}, @const={0x3, 0x0, 0x0, 0xa, 0x5}, @array={0x0, 0x0, 0x0, 0x3, 0x0, {0x2, 0x4, 0xfffffff9}}, @struct={0xe, 0x3, 0x0, 0x4, 0x1, 0x7, [{0x3, 0x0, 0x9}, {0x2, 0x0, 0x9d}, {0x6, 0x1, 0x5}]}, @int={0x8, 0x0, 0x0, 0x1, 0x0, 0x77, 0x0, 0x53, 0x1}, @const={0xa, 0x0, 0x0, 0xa, 0x5}]}, {0x0, [0x30, 0x2e, 0x0, 0x61, 0x5f, 0x0, 0x0]}}, &(0x7f0000000800)=""/243, 0x12d, 0xf3, 0x1, 0x22b, 0x10000}, 0x28) r9 = bpf$ITER_CREATE(0x21, &(0x7f00000009c0), 0x8) bpf$MAP_CREATE(0x0, &(0x7f0000000940)=@bloom_filter={0x1e, 0x0, 0x4a1, 0x56e, 0x10420, 0xffffffffffffffff, 0x9, '\x00', r7, r8, 0x2, 0x1, 0x3, 0x1, @void, @value, @value=r9}, 0x50) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000a00)='./cgroup.cpu/syz1\x00', 0x1ff) r10 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000a40)={0x3, 0x4, 0x4, 0xa, 0x0, r5, 0x1, '\x00', r7, r9, 0x3, 0x2}, 0x50) r11 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000ac0)='./cgroup/syz0\x00', 0x200002, 0x0) openat$cgroup_freezer_state(r11, &(0x7f0000000b00), 0x2, 0x0) r12 = syz_clone(0x10001000, &(0x7f0000000bc0)="4abeef342b48dee66bf5ee2c2426509388bb83339c04963155283d240799fcaeb75e581fd63c08080905b802e36f204748efbf478e9687d06b461478d93d3167cba6416ef4a1942f273c633bbe5415f9e3aa731486f353ab31e2e196f2af8125d739848d8b01d32bcaff4651b78a1f09017091f188b62eb4a5ae6e286f265f4420eb2610ad3c820a0a8ba6ff0c0345f152591f7cbcbfaa7af8255dde0f182b2609c10cb57168fce5ee52cbc070cf8928153f37826aa306dc8dd849fd7f4d86973509c0adfc78d4dd96e35cc33a0abf80dac9b92cfeb2b65726129ba120", 0xdd, &(0x7f0000000cc0), &(0x7f0000000d00), &(0x7f0000000d40)="4e0b623e4e9bff08875bd1e919f8af46bb7e579f860f55cc143a6ea4b60f93f976af91a1f49c38c20ddaeb346c5f266d1fc6573d38d3b8c32ffd2c3c8ea898d79c73cb286c9eb37aaad30c182734a84365fdeb42945c43cd687926ccefab7f48abbe20") perf_event_open(&(0x7f0000000b40)={0x4, 0x80, 0x0, 0x7, 0xd, 0xa9, 0x0, 0x6, 0x3204c, 0x3, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x3, 0x1, @perf_config_ext={0x1}, 0x400, 0xec, 0x101, 0x3, 0x7ff, 0x2, 0x10, 0x0, 0x2, 0x0, 0x1c00000}, r12, 0x6, 0xffffffffffffffff, 0x8) getpid() bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000f80)={r10, &(0x7f0000000dc0)="94781481d046758d3bb53852da8304c45cad89f93b235c513493aecfaf436206b300309911efb1c8763f5f64223923502bc0bf56c8a52417901b8df4182ec97e922c6e684c8d8eda8faacd5b372a9b98b5d7bf6f0ebc60930784b4e05bd76dd89f611ed5171c1034da48e2c8d821c5c41fc1963bdec6786dc06b8bbea0bbacb2bc43343fdff26427832ca2ba6b8c96037dd3b416dded9f5b9f35b92b2afffd5d12a21bec3f94fbfb0cb012dbf0781212ab585f3383bbd188b6e1db318839fde661768f8956bc7d434d4b5f1a14f9e0ee4a682016c2f0631f946eeaf594e2e99cc386ea2469583dbb53e533d42182a73781e672200a00d0268b", &(0x7f0000000ec0)=""/172}, 0x20) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000fc0)={r6, 0x7, 0x10}, 0xc) openat$cgroup_freezer_state(r9, &(0x7f0000001000), 0x2, 0x0) close(0xffffffffffffffff) r13 = openat$cgroup_freezer_state(r9, &(0x7f0000001040), 0x2, 0x0) write$cgroup_freezer_state(r13, &(0x7f0000001080)='THAWED\x00', 0x7) 575.658542ms ago: executing program 1 (id=6975): r0 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5c31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x8}, 0x100c, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x19, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b400000000000000dd0a00000000000073012700000000009500008000"], &(0x7f0000003ff6)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @cgroup_sockopt=0x16, 0xffffffffffffffff, 0x19, &(0x7f0000000000)={0xfffffffe, 0x4}, 0x8, 0x10, &(0x7f0000000000)={0x2}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x9}, 0x46) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=ANY=[@ANYBLOB], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x14, &(0x7f0000000280)=ANY=[@ANYBLOB], 0x0, 0x0, 0x0, 0x0, 0x0, 0xe, '\x00', 0x0, @fallback=0x25, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0xda, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.throttle.io_serviced_recursive\x00', 0x26e1, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='blkio.bfq.sectors_recursive\x00', 0x275a, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) socketpair(0x1, 0x1, 0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r2 = openat$cgroup_int(r1, &(0x7f0000000240)='cpuset.mems\x00', 0x2, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xe, 0x4, 0x8, 0x7}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0xc, 0xc, &(0x7f00000001c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa000000}, [@ringbuf_output={{0x18, 0x5, 0x1, 0x0, r3}, {}, {0x3, 0x3, 0x3, 0xa, 0x5}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x14}}]}, &(0x7f0000000840)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) write$cgroup_subtree(r2, &(0x7f0000000100)=ANY=[@ANYRESOCT=0x0], 0x31) bpf$PROG_LOAD(0x5, &(0x7f0000000a40)={0x9, 0xf, &(0x7f0000000540)=@ringbuf={{0x18, 0x6}, {{0x18, 0x1, 0x1, 0x0, r0}, {}, {}, {0x85, 0x0, 0x0, 0xf}}, {}, [], {{}, {}, {0x85, 0x0, 0x0, 0x7b}}}, &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @cgroup_sock, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) 459.446218ms ago: executing program 4 (id=6976): bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x1, 0xe, &(0x7f0000000ac0)=ANY=[@ANYBLOB="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"], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0xfffffffffffffd00}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4080000000000006110680000000000a6000000000000009500000000000000"], &(0x7f0000003ff6)='GPL\x00', 0x5, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, &(0x7f00000000c0), 0x0, 0x10, &(0x7f0000000080), 0xffffffffffffffb2}, 0x48) r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000200)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x3, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x2}, 0x50) bpf$MAP_DELETE_ELEM(0x3, &(0x7f00000002c0)={r0, &(0x7f0000000280)}, 0x20) 308.205905ms ago: executing program 4 (id=6977): syz_clone(0x4021400, 0x0, 0x9000, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) (async) bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0), 0x1c1842, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000180)={'syzkaller0\x00', 0x7101}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) close(r1) (async) close(r1) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) ioctl$SIOCSIFHWADDR(r1, 0x8914, &(0x7f00000004c0)={'syzkaller0\x00', @link_local}) (async) ioctl$SIOCSIFHWADDR(r1, 0x8914, &(0x7f00000004c0)={'syzkaller0\x00', @link_local}) write$cgroup_devices(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="0100000000000000288563dfc3d338"], 0xffdd) 307.452025ms ago: executing program 2 (id=6978): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x5, 0x5, 0x2, 0x7, 0x0, 0x1, 0x10000}, 0x50) close(r0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000000)={0xffffffffffffffff, 0xe0, &(0x7f0000000780)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0}}, 0x10) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x7, 0x10001, 0x9, 0x1}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r1, &(0x7f0000000080), &(0x7f0000000200)=""/166}, 0x20) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000000)={{r1}, 0x0, 0x0}, 0x20) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000740)={r1, &(0x7f0000000000), &(0x7f00000000c0)=""/109}, 0x20) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000380)={{r1}, &(0x7f00000002c0), &(0x7f0000000300)}, 0x20) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xd, &(0x7f0000000440)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x4000}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r0}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}, @call={0x85, 0x0, 0x0, 0x5}]}, &(0x7f0000000400)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0xd, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_BIND_MAP(0xa, &(0x7f00000003c0)={r2, r0}, 0xc) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000600)={0x8, 0x3, &(0x7f0000000000)=ANY=[@ANYBLOB="7a0a00ff0000000071104a00000000009500000000000000"], &(0x7f0000000480)='syzkaller\x00'}, 0x80) bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x5, 0x5, 0x2, 0x7, 0x0, 0x1, 0x10000}, 0x50) (async) close(r0) (async) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000000)={0xffffffffffffffff, 0xe0, &(0x7f0000000780)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0}}, 0x10) (async) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x7, 0x10001, 0x9, 0x1}, 0x48) (async) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r1, &(0x7f0000000080), &(0x7f0000000200)=""/166}, 0x20) (async) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000000)={{r1}, 0x0, 0x0}, 0x20) (async) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000740)={r1, &(0x7f0000000000), &(0x7f00000000c0)=""/109}, 0x20) (async) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000380)={{r1}, &(0x7f00000002c0), &(0x7f0000000300)}, 0x20) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xd, &(0x7f0000000440)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x4000}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r0}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}, @call={0x85, 0x0, 0x0, 0x5}]}, &(0x7f0000000400)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0xd, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) bpf$PROG_BIND_MAP(0xa, &(0x7f00000003c0)={r2, r0}, 0xc) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000600)={0x8, 0x3, &(0x7f0000000000)=ANY=[@ANYBLOB="7a0a00ff0000000071104a00000000009500000000000000"], &(0x7f0000000480)='syzkaller\x00'}, 0x80) (async) 240.168388ms ago: executing program 2 (id=6979): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x1c1341, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="160000000000000004000000ff00000000000000", @ANYRES32=r0, @ANYBLOB="0000001b51d0795f2e"], 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x8, 0x4, &(0x7f00000000c0)=ANY=[@ANYBLOB="d2835a9cb4020000000000006111a2000000000085000000540000009500007d"], &(0x7f0000000380)='GPL\x00', 0x5, 0xff92, &(0x7f00000003c0)=""/195, 0x0, 0x0, '\x00', 0x0, @cgroup_skb, 0xffffffffffffffff, 0x8, &(0x7f0000000100), 0x36c, 0x10, &(0x7f0000000000), 0x26}, 0x48) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000500)=ANY=[@ANYRES8=r2, @ANYRES16=r2, @ANYRES16=r2, @ANYRESOCT=r1, @ANYRES8=r0, @ANYRESDEC=r2], 0x50) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000840)={0x6, 0x14, &(0x7f00000000c0)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000b60100007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000013da0000850000000600000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000047b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback=0x34, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_BIND_MAP(0xa, &(0x7f0000000080)={r4, r3}, 0xc) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller0\x00', 0x84aebfbd6349b7f2}) openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x11, 0xc, &(0x7f0000000280)=ANY=[@ANYBLOB="1801000000000000000000000000000085000000230000001801000020646c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000400000095"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x11, 0x13, &(0x7f0000000080)=ANY=[@ANYBLOB="18080000000000000000000002000000851000000600000018020000", @ANYRES32, @ANYBLOB="00000000000000006600020000000000180000000000000000000000000000009500040000000000360a020000000000180100002020782500000000002020207b1a00fe00000000bfa100000000000007010000f8ffffffb702000008000000b50a00000000000085000000060000009500000000000000"], &(0x7f0000000000)='GPL\x00', 0x2, 0xff5c, &(0x7f0000000340)=""/222}, 0x78) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="0a00000004000000060000008000000042000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="00000000000000000000000000000000000000000000000000000000db90de7b34ce18b729d165605f66668a3d4d3d7e727e39c32f664cdd0b8eb62fe2d00059fadd42e6da57de173e65ab0418c9f7b8845b543b2ca559657cfd4dbb0446ea29bccda38015d6db831c166425ecbb2e0c0cd4be78f7133e1687e756532b6aec61a8ea1f87306c2a3d900921b83424a9e699adc9ffea9aa104000000b96027cb6166d13306b7d81b84966a650f1c45bde2f3"], 0x48) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r6, 0x8914, &(0x7f0000000900)={'bridge0\x00', @remote}) perf_event_open(&(0x7f0000000240)={0x2, 0x80, 0x5, 0x3, 0x8, 0x9, 0x0, 0x7ff, 0x4008, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x2, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_config_ext={0x4}, 0x3648, 0x5, 0x2, 0x2, 0x9, 0x94, 0x4, 0x0, 0xff, 0x0, 0x4}, 0x0, 0xb, 0xffffffffffffffff, 0x1) r7 = bpf$MAP_CREATE(0x0, &(0x7f0000000480)=ANY=[@ANYBLOB="120000007f00000004000000"], 0x50) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r9 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="170000000000000004000000ff"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r9, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000058"], 0x0}, 0x90) r10 = bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x1, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x10, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$sock_attach_bpf(r11, 0x1, 0x32, &(0x7f0000000180)=r10, 0x4) sendmsg$inet(r12, &(0x7f0000000100)={0x0, 0x0, 0x0}, 0x20000000) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000440)={r7, &(0x7f00000002c0), 0x0}, 0x20) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000003c0)) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000180)="e2c5cf426f", &(0x7f0000000080), 0x619, r5}, 0x38) perf_event_open(&(0x7f0000000fc0)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x1000000000000400, 0xf6103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, @perf_bp={0x0, 0x8}, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x14, &(0x7f0000000400)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000010000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000020850000000400000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000001a00)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d0000001801000020696c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000000000008500000071"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000740)={0x11, 0x5, &(0x7f0000000300)=ANY=[@ANYRESDEC=r8], 0x0, 0xfffffdff, 0x0, 0x0, 0x727c45cd4283345, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) 208.78006ms ago: executing program 1 (id=6980): r0 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000380)=0xffffffffffffffff, 0x4) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000bc0)={0x18, 0x4, &(0x7f0000000b80)=ANY=[@ANYRES8=0x0], &(0x7f00000000c0)='GPL\x00', 0x5, 0x9c, &(0x7f0000000000)=""/156, 0x41100, 0x0, '\x00', 0x0, 0x0, r0}, 0x94) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000bc0)={0x18, 0x4, &(0x7f0000000b80)=ANY=[@ANYRES8=0x0], &(0x7f00000000c0)='GPL\x00', 0x5, 0x9c, &(0x7f0000000000)=""/156, 0x41100, 0x0, '\x00', 0x0, 0x0, r0}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, &(0x7f0000000640)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x21, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x94) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="8fedcb7907003675f37538e486dd6317ce623900fe800000002000e0865a6596aff57b00000000000000000000000000ac1414"], 0xfe1b) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000740)={0x0, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="0000186df4b1768c36153d42", @ANYRES32, @ANYBLOB="1c00000000000300000000000000010045"], 0x0}, 0x90) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'tunl0\x00'}) bpf$PROG_LOAD(0x2, 0x0, 0x0) r3 = bpf$ITER_CREATE(0x21, &(0x7f0000000600), 0x8) bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x1c, 0x0, 0x0, &(0x7f0000000180)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x8, '\x00', 0x0, @fallback=0x11, r3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x94) (async) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x1c, 0x0, 0x0, &(0x7f0000000180)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x8, '\x00', 0x0, @fallback=0x11, r3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000005c0)={{0x1, 0xffffffffffffffff}, &(0x7f0000000340), &(0x7f0000000580)=r2}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f0000000ec0)={0x0, 0x18, &(0x7f0000000c80)=@framed={{0x18, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x5}, [@generic={0x1, 0x9, 0x4, 0x3, 0x5}, @alu={0x4, 0x0, 0x1, 0x4, 0x8, 0xffffffffffffffff, 0xffffffffffffffff}, @map_val={0x18, 0xd6378de05216df7b, 0x2, 0x0, r5, 0x0, 0x0, 0x0, 0x5}, @map_idx_val={0x18, 0x1, 0x6, 0x0, 0xc, 0x0, 0x0, 0x0, 0x7}, @snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x100}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r3}}, @exit, @exit]}, &(0x7f0000000d40)='GPL\x00', 0x1, 0x88, &(0x7f0000000d80)=""/136, 0x41100, 0x7d, '\x00', 0x0, @fallback=0xb, r3, 0x8, &(0x7f0000000e40)={0x4, 0x3}, 0x8, 0x10, 0x0, 0x0, 0x0, r4, 0x3, 0x0, &(0x7f0000000e80)=[{0x5, 0x3, 0xf, 0x8}, {0x3, 0x3, 0xe, 0x9}, {0x1, 0x5, 0xb, 0x3}], 0x10, 0x7fffffff}, 0x94) unlink(&(0x7f0000000f80)='./file0\x00') (async) unlink(&(0x7f0000000f80)='./file0\x00') bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000006c0)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000000600), &(0x7f0000000680)=r2}, 0x20) bpf$MAP_CREATE(0x0, &(0x7f0000000800)=@bloom_filter={0x1e, 0x8, 0x6, 0x20e85e64, 0x2, 0xffffffffffffffff, 0xffff, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x3, 0x5, 0xa}, 0x50) (async) r7 = bpf$MAP_CREATE(0x0, &(0x7f0000000800)=@bloom_filter={0x1e, 0x8, 0x6, 0x20e85e64, 0x2, 0xffffffffffffffff, 0xffff, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x3, 0x5, 0xa}, 0x50) r8 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000740)={0x3, 0x4, 0x4, 0xa, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x3, 0x10, &(0x7f0000000000)=@framed={{0x18, 0x6, 0x0, 0x0, 0x40000}, [@tail_call={{0x18, 0x2, 0x1, 0x0, r8}, {}, {}, {0x7, 0x0, 0xb, 0x7}}, @printk]}, &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sched_cls, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) r9 = bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x3, 0x10, &(0x7f0000000000)=@framed={{0x18, 0x6, 0x0, 0x0, 0x40000}, [@tail_call={{0x18, 0x2, 0x1, 0x0, r8}, {}, {}, {0x7, 0x0, 0xb, 0x7}}, @printk]}, &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sched_cls, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x3, 0x8, &(0x7f0000000000)=@framed={{0x18, 0x6, 0x0, 0x0, 0x400000}, [@tail_call={{0x18, 0x2, 0x1, 0x0, r8}}]}, &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sched_cls, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) r10 = bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x3, 0x8, &(0x7f0000000000)=@framed={{0x18, 0x6, 0x0, 0x0, 0x400000}, [@tail_call={{0x18, 0x2, 0x1, 0x0, r8}}]}, &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sched_cls, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000200)={{r8}, &(0x7f0000000080), &(0x7f00000000c0)=r10}, 0x20) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000180)={{r8}, &(0x7f0000000100), &(0x7f0000000140)=r9}, 0x20) (async) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000180)={{r8}, &(0x7f0000000100), &(0x7f0000000140)=r9}, 0x20) r11 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x5, 0x400, 0x9, 0x1}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f00000004c0)={r11, &(0x7f0000000340), &(0x7f00000005c0)=""/155}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r11], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f00000008c0)={{}, &(0x7f0000000700), &(0x7f0000000880)='%-5lx \x00'}, 0x20) (async) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f00000008c0)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000000700), &(0x7f0000000880)='%-5lx \x00'}, 0x20) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000980)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000000900), &(0x7f0000000940)='%pB \x00'}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f0000000a80)={0xd, 0xa, &(0x7f0000000240)=@framed={{0x18, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1}, [@alu={0x7, 0x0, 0x3, 0x9, 0xa, 0xb8, 0x4}, @map_idx={0x18, 0x5, 0x5, 0x0, 0xe}, @initr0={0x18, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x10}, @map_idx={0x18, 0x2, 0x5, 0x0, 0x1}]}, &(0x7f00000001c0)='syzkaller\x00', 0xc, 0xdb, &(0x7f0000000480)=""/219, 0x40f00, 0x1, '\x00', 0x0, @sock_ops=0x3, 0xffffffffffffffff, 0x8, &(0x7f00000002c0)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000b40)={0x0, 0x9, 0x1, 0x8000}, 0x10, 0x0, 0xffffffffffffffff, 0x5, &(0x7f00000009c0)=[r5, r1, r6, r7, r8, r11, r12, r13], &(0x7f0000000a00)=[{0x2, 0x2, 0x7, 0xd}, {0x3, 0x4, 0x2, 0x8}, {0x5, 0x4, 0xc, 0xc}, {0x2, 0x1, 0xe, 0x9}, {0x5, 0x1, 0xc, 0x6}], 0x10, 0xb}, 0x94) (async) bpf$PROG_LOAD(0x5, &(0x7f0000000a80)={0xd, 0xa, &(0x7f0000000240)=@framed={{0x18, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1}, [@alu={0x7, 0x0, 0x3, 0x9, 0xa, 0xb8, 0x4}, @map_idx={0x18, 0x5, 0x5, 0x0, 0xe}, @initr0={0x18, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x10}, @map_idx={0x18, 0x2, 0x5, 0x0, 0x1}]}, &(0x7f00000001c0)='syzkaller\x00', 0xc, 0xdb, &(0x7f0000000480)=""/219, 0x40f00, 0x1, '\x00', 0x0, @sock_ops=0x3, 0xffffffffffffffff, 0x8, &(0x7f00000002c0)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000b40)={0x0, 0x9, 0x1, 0x8000}, 0x10, 0x0, 0xffffffffffffffff, 0x5, &(0x7f00000009c0)=[r5, r1, r6, r7, r8, r11, r12, r13], &(0x7f0000000a00)=[{0x2, 0x2, 0x7, 0xd}, {0x3, 0x4, 0x2, 0x8}, {0x5, 0x4, 0xc, 0xc}, {0x2, 0x1, 0xe, 0x9}, {0x5, 0x1, 0xc, 0x6}], 0x10, 0xb}, 0x94) r14 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d0000001801000020696c2500000100002020207b1af8ff00000000bf86a26db800000007010000f8ffffffb702000008000000b703000000000000850000007100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000070000001801000020756c2500000000002020207b1af8ff00000000bfa1000000"], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0x33, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r14, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) (async) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x1, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000680)) 0s ago: executing program 3 (id=6981): perf_event_open(&(0x7f00000010c0)={0x2, 0x80, 0xb9, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xc, 0x7}, 0x8601, 0x2000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="1b0000000000000000000000000004"], 0x48) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xae9, 0x30, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000006c0)={&(0x7f0000000580)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x64, 0x64, 0x2, [@decl_tag={0x9, 0x0, 0x0, 0x11, 0x4, 0x7}, @enum={0x2, 0x9, 0x0, 0x6, 0x4, [{0xa, 0x6db8}, {0x3, 0xfff}, {0x4, 0x3}, {0x4, 0x9}, {0xe, 0x7}, {0xa, 0x9}, {0x10, 0x3}, {0x8, 0xd825}, {0x2, 0x80000001}]}]}}, 0x0, 0x7e, 0x0, 0x1, 0x9, 0x10000}, 0x28) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)=@base={0x9, 0x17, 0x8, 0x40, 0x42, 0x1}, 0x48) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000100), &(0x7f0000000580), 0x1000, r2}, 0x38) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000840)=@base={0x5, 0x8, 0x2, 0x4}, 0x50) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="19000000040000000800000008"], 0x48) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000001b518110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b70800000000"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000600)={{r4}, &(0x7f0000000000), &(0x7f00000005c0)=r5}, 0x20) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000680)={0xffffffffffffffff, 0xe0, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, &(0x7f0000000340)=[0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x4, 0x6, &(0x7f0000000380)=[0x0, 0x0, 0x0, 0x0], &(0x7f00000003c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0xc2, &(0x7f0000000400)=[{}, {}], 0x10, 0x10, &(0x7f0000000480), &(0x7f0000000600), 0x8, 0x82, 0x8, 0x8, &(0x7f0000000640)}}, 0x10) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000008c0)={0x2, 0x4, 0x8, 0x1, 0x80, r4, 0x2, '\x00', r6, r1, 0x0, 0x4, 0x5}, 0x50) close(0x3) bpf$MAP_CREATE(0x0, &(0x7f0000002080)=ANY=[@ANYBLOB="020000000400000006000000050000000010"], 0x48) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x14, &(0x7f0000000200)=ANY=[@ANYBLOB="1802000000000000000000000000000018010000786c6c3a00000000070000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000080000850000002d00000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000440)={r2, &(0x7f0000000600), &(0x7f0000000580)=""/95}, 0x20) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r8, 0x8914, &(0x7f0000000040)={'sit0\x00', @local}) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000e00)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x52, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x4a00, 0x0) ioctl$SIOCSIFHWADDR(r9, 0x8914, &(0x7f0000000040)={'sit0\x00', @random="4f33e363a4b1"}) bpf$PROG_LOAD(0x5, &(0x7f0000002c40)={0x10, 0x17, &(0x7f0000000140)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000086000000bf09000000000000550901000074f6967d00000000000000180100002020702500000000002020207baaf8ff00000000bda100000000000027010000f8ffffffb702000008000000b7030000000000002500000006000000be91000000000000b502ecffffff00008500000005000000b70000000000000095"], &(0x7f00000002c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x1, '\x00', 0x0, @sk_msg, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) kernel console output (not intermixed with test programs): __sys_sendmsg+0x5b7/0x8f0 [ 188.429501][ T9101] ? __sys_sendmsg_sock+0x40/0x40 [ 188.434657][ T9101] ? import_iovec+0x7c/0xb0 [ 188.439166][ T9101] ___sys_sendmsg+0x236/0x2e0 [ 188.443855][ T9101] ? __sys_sendmsg+0x280/0x280 [ 188.448797][ T9101] ? rw_verify_area+0x1c0/0x360 [ 188.453675][ T9101] ? __fdget+0x1a1/0x230 [ 188.458018][ T9101] __x64_sys_sendmsg+0x1f9/0x2c0 [ 188.462970][ T9101] ? fput+0x1a/0x20 [ 188.466793][ T9101] ? ___sys_sendmsg+0x2e0/0x2e0 [ 188.471791][ T9101] ? debug_smp_processor_id+0x17/0x20 [ 188.477173][ T9101] ? fpregs_assert_state_consistent+0xb1/0xe0 [ 188.483425][ T9101] ? exit_to_user_mode_prepare+0x2f/0xa0 [ 188.489157][ T9101] do_syscall_64+0x31/0x40 [ 188.493649][ T9101] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 188.499663][ T9101] RIP: 0033:0x7f17998a6799 [ 188.504184][ T9101] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 188.523821][ T9101] RSP: 002b:00007f1798301028 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 188.532245][ T9101] RAX: ffffffffffffffda RBX: 00007f1799b1ffa0 RCX: 00007f17998a6799 [ 188.540365][ T9101] RDX: 0000000000000000 RSI: 00002000000006c0 RDI: 0000000000000005 [ 188.548683][ T9101] RBP: 00007f1798301090 R08: 0000000000000000 R09: 0000000000000000 [ 188.556680][ T9101] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 188.564785][ T9101] R13: 00007f1799b20038 R14: 00007f1799b1ffa0 R15: 00007fffb85590d8 [ 188.958488][ T9131] device syzkaller0 entered promiscuous mode [ 189.551958][ T9160] FAULT_INJECTION: forcing a failure. [ 189.551958][ T9160] name fail_page_alloc, interval 1, probability 0, space 0, times 1 [ 189.606615][ T9160] CPU: 1 PID: 9160 Comm: syz.4.2565 Tainted: G W syzkaller #0 [ 189.615857][ T9160] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 189.626219][ T9160] Call Trace: [ 189.629548][ T9160] __dump_stack+0x21/0x24 [ 189.633911][ T9160] dump_stack_lvl+0x1a7/0x208 [ 189.639275][ T9160] ? show_regs_print_info+0x18/0x18 [ 189.644515][ T9160] dump_stack+0x15/0x1c [ 189.648774][ T9160] should_fail+0x3c1/0x510 [ 189.653212][ T9160] should_fail_alloc_page+0x4f/0x60 [ 189.658442][ T9160] __alloc_pages_nodemask+0x119/0x620 [ 189.664196][ T9160] ? gfp_pfmemalloc_allowed+0x130/0x130 [ 189.669772][ T9160] ? __kmalloc_track_caller+0x17e/0x320 [ 189.675468][ T9160] ? __kasan_check_write+0x14/0x20 [ 189.680600][ T9160] ? __alloc_skb+0x38b/0x520 [ 189.685212][ T9160] alloc_skb_with_frags+0x18c/0x560 [ 189.690564][ T9160] sock_alloc_send_pskb+0x87f/0x9a0 [ 189.695795][ T9160] ? avc_has_perm+0x168/0x3d0 [ 189.700544][ T9160] ? sock_kzfree_s+0x60/0x60 [ 189.705165][ T9160] ? security_socket_getpeersec_dgram+0x93/0xb0 [ 189.711521][ T9160] unix_stream_sendmsg+0x4c9/0xbe0 [ 189.716654][ T9160] ? unix_show_fdinfo+0xa0/0xa0 [ 189.721558][ T9160] ? check_stack_object+0x106/0x140 [ 189.726791][ T9160] ? security_socket_sendmsg+0x82/0xa0 [ 189.732631][ T9160] ? unix_show_fdinfo+0xa0/0xa0 [ 189.737989][ T9160] ____sys_sendmsg+0x5b7/0x8f0 [ 189.743121][ T9160] ? __sys_sendmsg_sock+0x40/0x40 [ 189.748250][ T9160] ? import_iovec+0x7c/0xb0 [ 189.752790][ T9160] ___sys_sendmsg+0x236/0x2e0 [ 189.757485][ T9160] ? __sys_sendmsg+0x280/0x280 [ 189.762365][ T9160] ? rw_verify_area+0x1c0/0x360 [ 189.767288][ T9160] ? __fdget+0x1a1/0x230 [ 189.771659][ T9160] __x64_sys_sendmsg+0x1f9/0x2c0 [ 189.776754][ T9160] ? fput+0x1a/0x20 [ 189.780583][ T9160] ? ___sys_sendmsg+0x2e0/0x2e0 [ 189.785658][ T9160] ? debug_smp_processor_id+0x17/0x20 [ 189.791051][ T9160] ? fpregs_assert_state_consistent+0xb1/0xe0 [ 189.797465][ T9160] ? exit_to_user_mode_prepare+0x2f/0xa0 [ 189.803145][ T9160] do_syscall_64+0x31/0x40 [ 189.807619][ T9160] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 189.813535][ T9160] RIP: 0033:0x7f13eb2c0799 [ 189.817978][ T9160] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 189.837909][ T9160] RSP: 002b:00007f13e9d1b028 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 189.846446][ T9160] RAX: ffffffffffffffda RBX: 00007f13eb539fa0 RCX: 00007f13eb2c0799 [ 189.854816][ T9160] RDX: 0000000000000000 RSI: 00002000000006c0 RDI: 0000000000000005 [ 189.862896][ T9160] RBP: 00007f13e9d1b090 R08: 0000000000000000 R09: 0000000000000000 [ 189.870908][ T9160] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 189.879255][ T9160] R13: 00007f13eb53a038 R14: 00007f13eb539fa0 R15: 00007ffe38c06d18 [ 190.650123][ T9182] device syzkaller0 entered promiscuous mode [ 190.805130][ T9209] FAULT_INJECTION: forcing a failure. [ 190.805130][ T9209] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 190.824182][ T9209] CPU: 0 PID: 9209 Comm: syz.4.2582 Tainted: G W syzkaller #0 [ 190.833006][ T9209] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 190.843171][ T9209] Call Trace: [ 190.846481][ T9209] __dump_stack+0x21/0x24 [ 190.850915][ T9209] dump_stack_lvl+0x1a7/0x208 [ 190.855615][ T9209] ? show_regs_print_info+0x18/0x18 [ 190.860933][ T9209] dump_stack+0x15/0x1c [ 190.865179][ T9209] should_fail+0x3c1/0x510 [ 190.869654][ T9209] should_fail_usercopy+0x1a/0x20 [ 190.874705][ T9209] _copy_from_iter+0x1d1/0x9f0 [ 190.879485][ T9209] ? __check_object_size+0x2f4/0x3c0 [ 190.884817][ T9209] skb_copy_datagram_from_iter+0xfa/0x6b0 [ 190.890555][ T9209] ? skb_put+0x10e/0x1f0 [ 190.894807][ T9209] unix_stream_sendmsg+0x73d/0xbe0 [ 190.900087][ T9209] ? unix_show_fdinfo+0xa0/0xa0 [ 190.905615][ T9209] ? check_stack_object+0x106/0x140 [ 190.910834][ T9209] ? security_socket_sendmsg+0x82/0xa0 [ 190.916592][ T9209] ? unix_show_fdinfo+0xa0/0xa0 [ 190.921496][ T9209] ____sys_sendmsg+0x5b7/0x8f0 [ 190.926370][ T9209] ? __sys_sendmsg_sock+0x40/0x40 [ 190.931691][ T9209] ? import_iovec+0x7c/0xb0 [ 190.936233][ T9209] ___sys_sendmsg+0x236/0x2e0 [ 190.941207][ T9209] ? __sys_sendmsg+0x280/0x280 [ 190.946097][ T9209] ? rw_verify_area+0x1c0/0x360 [ 190.951230][ T9209] ? __fdget+0x1a1/0x230 [ 190.955487][ T9209] __x64_sys_sendmsg+0x1f9/0x2c0 [ 190.960525][ T9209] ? fput+0x1a/0x20 [ 190.964435][ T9209] ? ___sys_sendmsg+0x2e0/0x2e0 [ 190.969826][ T9209] ? debug_smp_processor_id+0x17/0x20 [ 190.975306][ T9209] ? fpregs_assert_state_consistent+0xb1/0xe0 [ 190.981672][ T9209] ? exit_to_user_mode_prepare+0x2f/0xa0 [ 190.987504][ T9209] do_syscall_64+0x31/0x40 [ 190.991948][ T9209] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 190.998023][ T9209] RIP: 0033:0x7f13eb2c0799 [ 191.002453][ T9209] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 191.022253][ T9209] RSP: 002b:00007f13e9d1b028 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 191.030676][ T9209] RAX: ffffffffffffffda RBX: 00007f13eb539fa0 RCX: 00007f13eb2c0799 [ 191.038892][ T9209] RDX: 0000000000000000 RSI: 00002000000006c0 RDI: 0000000000000005 [ 191.047504][ T9209] RBP: 00007f13e9d1b090 R08: 0000000000000000 R09: 0000000000000000 [ 191.055662][ T9209] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 191.064089][ T9209] R13: 00007f13eb53a038 R14: 00007f13eb539fa0 R15: 00007ffe38c06d18 [ 191.254600][ T9217] device syzkaller0 entered promiscuous mode [ 191.498683][ T9242] dvmrp1: tun_chr_ioctl cmd 1074812118 [ 191.842970][ T9266] ÿÿÿÿÿÿ: renamed from vlan1 [ 192.011233][ T9279] device sit0 left promiscuous mode [ 192.868166][ T9311] device wg2 left promiscuous mode [ 194.797732][ T9373] device wg2 left promiscuous mode [ 195.336954][ T9397] device syzkaller0 entered promiscuous mode [ 195.352723][ T9408] device syzkaller0 entered promiscuous mode [ 196.142657][ T9457] device syzkaller0 entered promiscuous mode [ 197.975517][ T9538] syz.3.2682[9538] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 197.975574][ T9538] syz.3.2682[9538] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 197.991646][ T9538] syz.3.2682[9538] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 198.022993][ T9538] syz.3.2682[9538] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 198.157245][ T9547] device syzkaller0 entered promiscuous mode [ 198.199336][ T9561] FAULT_INJECTION: forcing a failure. [ 198.199336][ T9561] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 198.234563][ T9561] CPU: 0 PID: 9561 Comm: syz.4.2690 Tainted: G W syzkaller #0 [ 198.243381][ T9561] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 198.253616][ T9561] Call Trace: [ 198.256932][ T9561] __dump_stack+0x21/0x24 [ 198.261276][ T9561] dump_stack_lvl+0x1a7/0x208 [ 198.265968][ T9561] ? show_regs_print_info+0x18/0x18 [ 198.271271][ T9561] ? setup_object+0x19/0x120 [ 198.275890][ T9561] dump_stack+0x15/0x1c [ 198.280057][ T9561] should_fail+0x3c1/0x510 [ 198.284489][ T9561] should_fail_alloc_page+0x4f/0x60 [ 198.289698][ T9561] __alloc_pages_nodemask+0x119/0x620 [ 198.295183][ T9561] ? gfp_pfmemalloc_allowed+0x130/0x130 [ 198.300743][ T9561] ? __kmalloc_track_caller+0x17e/0x320 [ 198.306296][ T9561] ? __kasan_check_write+0x14/0x20 [ 198.311422][ T9561] ? __alloc_skb+0x38b/0x520 [ 198.316021][ T9561] alloc_skb_with_frags+0x18c/0x560 [ 198.321325][ T9561] sock_alloc_send_pskb+0x87f/0x9a0 [ 198.326623][ T9561] ? sock_kzfree_s+0x60/0x60 [ 198.331274][ T9561] ? sock_def_readable+0x1c8/0x320 [ 198.336426][ T9561] ? __kasan_check_write+0x14/0x20 [ 198.341562][ T9561] ? sock_no_sendpage_locked+0x180/0x180 [ 198.347207][ T9561] ? _raw_spin_unlock_irqrestore+0x5b/0x80 [ 198.353018][ T9561] ? skb_queue_tail+0xcb/0xf0 [ 198.357710][ T9561] unix_stream_sendmsg+0x4c9/0xbe0 [ 198.362837][ T9561] ? unix_show_fdinfo+0xa0/0xa0 [ 198.367838][ T9561] ? check_stack_object+0x106/0x140 [ 198.373053][ T9561] ? security_socket_sendmsg+0x82/0xa0 [ 198.378541][ T9561] ? unix_show_fdinfo+0xa0/0xa0 [ 198.383398][ T9561] ____sys_sendmsg+0x5b7/0x8f0 [ 198.388174][ T9561] ? __sys_sendmsg_sock+0x40/0x40 [ 198.393232][ T9561] ? import_iovec+0x7c/0xb0 [ 198.397831][ T9561] ___sys_sendmsg+0x236/0x2e0 [ 198.402517][ T9561] ? __sys_sendmsg+0x280/0x280 [ 198.407405][ T9561] ? rw_verify_area+0x1c0/0x360 [ 198.412377][ T9561] ? __fdget+0x1a1/0x230 [ 198.416631][ T9561] __x64_sys_sendmsg+0x1f9/0x2c0 [ 198.421590][ T9561] ? fput+0x1a/0x20 [ 198.425492][ T9561] ? ___sys_sendmsg+0x2e0/0x2e0 [ 198.430350][ T9561] ? debug_smp_processor_id+0x17/0x20 [ 198.435726][ T9561] ? fpregs_assert_state_consistent+0xb1/0xe0 [ 198.441802][ T9561] ? exit_to_user_mode_prepare+0x2f/0xa0 [ 198.447440][ T9561] do_syscall_64+0x31/0x40 [ 198.451948][ T9561] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 198.457839][ T9561] RIP: 0033:0x7f13eb2c0799 [ 198.462271][ T9561] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 198.481881][ T9561] RSP: 002b:00007f13e9d1b028 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 198.490302][ T9561] RAX: ffffffffffffffda RBX: 00007f13eb539fa0 RCX: 00007f13eb2c0799 [ 198.498281][ T9561] RDX: 0000000000000000 RSI: 00002000000006c0 RDI: 0000000000000005 [ 198.506258][ T9561] RBP: 00007f13e9d1b090 R08: 0000000000000000 R09: 0000000000000000 [ 198.514425][ T9561] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 198.522402][ T9561] R13: 00007f13eb53a038 R14: 00007f13eb539fa0 R15: 00007ffe38c06d18 [ 199.223453][ T24] audit: type=1400 audit(1774279823.850:170): avc: denied { create } for pid=9601 comm="syz.3.2700" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=irda_socket permissive=1 [ 199.440787][ T9611] FAULT_INJECTION: forcing a failure. [ 199.440787][ T9611] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 199.511716][ T9611] CPU: 0 PID: 9611 Comm: syz.3.2704 Tainted: G W syzkaller #0 [ 199.520821][ T9611] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 199.531068][ T9611] Call Trace: [ 199.534394][ T9611] __dump_stack+0x21/0x24 [ 199.538835][ T9611] dump_stack_lvl+0x1a7/0x208 [ 199.543540][ T9611] ? thaw_kernel_threads+0x220/0x220 [ 199.549203][ T9611] ? show_regs_print_info+0x18/0x18 [ 199.554454][ T9611] dump_stack+0x15/0x1c [ 199.558645][ T9611] should_fail+0x3c1/0x510 [ 199.563083][ T9611] should_fail_usercopy+0x1a/0x20 [ 199.568246][ T9611] copy_page_from_iter+0x381/0x6c0 [ 199.573401][ T9611] skb_copy_datagram_from_iter+0x2d0/0x6b0 [ 199.579329][ T9611] unix_stream_sendmsg+0x73d/0xbe0 [ 199.584468][ T9611] ? unix_show_fdinfo+0xa0/0xa0 [ 199.589357][ T9611] ? check_stack_object+0x106/0x140 [ 199.594675][ T9611] ? security_socket_sendmsg+0x82/0xa0 [ 199.600257][ T9611] ? unix_show_fdinfo+0xa0/0xa0 [ 199.605130][ T9611] ____sys_sendmsg+0x5b7/0x8f0 [ 199.610024][ T9611] ? __sys_sendmsg_sock+0x40/0x40 [ 199.615188][ T9611] ? import_iovec+0x7c/0xb0 [ 199.619718][ T9611] ___sys_sendmsg+0x236/0x2e0 [ 199.624430][ T9611] ? __sys_sendmsg+0x280/0x280 [ 199.630016][ T9611] ? __fdget+0x1a1/0x230 [ 199.634488][ T9611] __x64_sys_sendmsg+0x1f9/0x2c0 [ 199.639543][ T9611] ? ___sys_sendmsg+0x2e0/0x2e0 [ 199.644450][ T9611] ? perf_trace_run_bpf_submit+0x126/0x1c0 [ 199.650299][ T9611] ? debug_smp_processor_id+0x17/0x20 [ 199.655790][ T9611] ? fpregs_assert_state_consistent+0xb1/0xe0 [ 199.661886][ T9611] ? syscall_trace_enter+0x108/0x170 [ 199.667289][ T9611] do_syscall_64+0x31/0x40 [ 199.671874][ T9611] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 199.677783][ T9611] RIP: 0033:0x7f17998a6799 [ 199.682266][ T9611] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 199.702369][ T9611] RSP: 002b:00007f1798301028 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 199.710914][ T9611] RAX: ffffffffffffffda RBX: 00007f1799b1ffa0 RCX: 00007f17998a6799 [ 199.719092][ T9611] RDX: 0000000000000000 RSI: 00002000000006c0 RDI: 0000000000000005 [ 199.727179][ T9611] RBP: 00007f1798301090 R08: 0000000000000000 R09: 0000000000000000 [ 199.735177][ T9611] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 199.743178][ T9611] R13: 00007f1799b20038 R14: 00007f1799b1ffa0 R15: 00007fffb85590d8 [ 200.638457][ T9666] FAULT_INJECTION: forcing a failure. [ 200.638457][ T9666] name failslab, interval 1, probability 0, space 0, times 0 [ 200.724117][ T9666] CPU: 0 PID: 9666 Comm: syz.4.2720 Tainted: G W syzkaller #0 [ 200.732940][ T9666] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 200.743008][ T9666] Call Trace: [ 200.746319][ T9666] __dump_stack+0x21/0x24 [ 200.750657][ T9666] dump_stack_lvl+0x1a7/0x208 [ 200.755343][ T9666] ? thaw_kernel_threads+0x220/0x220 [ 200.760723][ T9666] ? show_regs_print_info+0x18/0x18 [ 200.766008][ T9666] ? __kasan_check_write+0x14/0x20 [ 200.771215][ T9666] ? down_read_trylock+0x106/0x160 [ 200.776420][ T9666] dump_stack+0x15/0x1c [ 200.780591][ T9666] should_fail+0x3c1/0x510 [ 200.785017][ T9666] ? __alloc_skb+0x9e/0x520 [ 200.789717][ T9666] __should_failslab+0xa4/0xe0 [ 200.794669][ T9666] should_failslab+0x9/0x20 [ 200.799452][ T9666] kmem_cache_alloc+0x3d/0x2d0 [ 200.804237][ T9666] __alloc_skb+0x9e/0x520 [ 200.808574][ T9666] ? do_kern_addr_fault+0x80/0x80 [ 200.813610][ T9666] alloc_skb_with_frags+0xa2/0x560 [ 200.818738][ T9666] ? exc_page_fault+0x67/0xc0 [ 200.823427][ T9666] sock_alloc_send_pskb+0x87f/0x9a0 [ 200.828639][ T9666] ? sock_kzfree_s+0x60/0x60 [ 200.833236][ T9666] ? sock_def_readable+0x1c8/0x320 [ 200.838359][ T9666] ? __kasan_check_write+0x14/0x20 [ 200.843488][ T9666] ? sock_no_sendpage_locked+0x180/0x180 [ 200.849147][ T9666] ? _raw_spin_unlock_irqrestore+0x5b/0x80 [ 200.854963][ T9666] ? skb_queue_tail+0xcb/0xf0 [ 200.859736][ T9666] unix_stream_sendmsg+0x4c9/0xbe0 [ 200.865037][ T9666] ? unix_show_fdinfo+0xa0/0xa0 [ 200.869902][ T9666] ? check_stack_object+0x106/0x140 [ 200.875109][ T9666] ? security_socket_sendmsg+0x82/0xa0 [ 200.880587][ T9666] ? unix_show_fdinfo+0xa0/0xa0 [ 200.885737][ T9666] ____sys_sendmsg+0x5b7/0x8f0 [ 200.890523][ T9666] ? __sys_sendmsg_sock+0x40/0x40 [ 200.895612][ T9666] ? import_iovec+0x7c/0xb0 [ 200.900130][ T9666] ___sys_sendmsg+0x236/0x2e0 [ 200.905033][ T9666] ? __sys_sendmsg+0x280/0x280 [ 200.909811][ T9666] ? rw_verify_area+0x1c0/0x360 [ 200.914684][ T9666] ? __fdget+0x1a1/0x230 [ 200.919027][ T9666] __x64_sys_sendmsg+0x1f9/0x2c0 [ 200.923974][ T9666] ? fput+0x1a/0x20 [ 200.927792][ T9666] ? ___sys_sendmsg+0x2e0/0x2e0 [ 200.932651][ T9666] ? debug_smp_processor_id+0x17/0x20 [ 200.938035][ T9666] ? fpregs_assert_state_consistent+0xb1/0xe0 [ 200.944299][ T9666] ? exit_to_user_mode_prepare+0x2f/0xa0 [ 200.950044][ T9666] do_syscall_64+0x31/0x40 [ 200.954473][ T9666] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 200.960464][ T9666] RIP: 0033:0x7f13eb2c0799 [ 200.965000][ T9666] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 200.985398][ T9666] RSP: 002b:00007f13e9d1b028 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 200.993913][ T9666] RAX: ffffffffffffffda RBX: 00007f13eb539fa0 RCX: 00007f13eb2c0799 [ 201.001961][ T9666] RDX: 0000000000000000 RSI: 00002000000006c0 RDI: 0000000000000005 [ 201.010029][ T9666] RBP: 00007f13e9d1b090 R08: 0000000000000000 R09: 0000000000000000 [ 201.018097][ T9666] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 201.026083][ T9666] R13: 00007f13eb53a038 R14: 00007f13eb539fa0 R15: 00007ffe38c06d18 [ 201.649993][ T9714] FAULT_INJECTION: forcing a failure. [ 201.649993][ T9714] name failslab, interval 1, probability 0, space 0, times 0 [ 201.684368][ T9714] CPU: 0 PID: 9714 Comm: syz.4.2737 Tainted: G W syzkaller #0 [ 201.693278][ T9714] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 201.703449][ T9714] Call Trace: [ 201.706862][ T9714] __dump_stack+0x21/0x24 [ 201.711227][ T9714] dump_stack_lvl+0x1a7/0x208 [ 201.716019][ T9714] ? show_regs_print_info+0x18/0x18 [ 201.721519][ T9714] dump_stack+0x15/0x1c [ 201.725793][ T9714] should_fail+0x3c1/0x510 [ 201.730238][ T9714] ? alloc_skb_with_frags+0xa2/0x560 [ 201.735552][ T9714] __should_failslab+0xa4/0xe0 [ 201.740441][ T9714] should_failslab+0x9/0x20 [ 201.744973][ T9714] __kmalloc_track_caller+0x5f/0x320 [ 201.750316][ T9714] ? kmem_cache_alloc+0x162/0x2d0 [ 201.755377][ T9714] ? __alloc_skb+0x9e/0x520 [ 201.759902][ T9714] ? alloc_skb_with_frags+0xa2/0x560 [ 201.765214][ T9714] __alloc_skb+0xdc/0x520 [ 201.769561][ T9714] ? do_kern_addr_fault+0x80/0x80 [ 201.774628][ T9714] alloc_skb_with_frags+0xa2/0x560 [ 201.779868][ T9714] ? exc_page_fault+0x67/0xc0 [ 201.784690][ T9714] sock_alloc_send_pskb+0x87f/0x9a0 [ 201.790055][ T9714] ? sock_kzfree_s+0x60/0x60 [ 201.795074][ T9714] ? sock_def_readable+0x1c8/0x320 [ 201.800496][ T9714] ? __kasan_check_write+0x14/0x20 [ 201.805653][ T9714] ? sock_no_sendpage_locked+0x180/0x180 [ 201.811310][ T9714] ? _raw_spin_unlock_irqrestore+0x5b/0x80 [ 201.817148][ T9714] ? skb_queue_tail+0xcb/0xf0 [ 201.821874][ T9714] unix_stream_sendmsg+0x4c9/0xbe0 [ 201.827137][ T9714] ? unix_show_fdinfo+0xa0/0xa0 [ 201.832143][ T9714] ? check_stack_object+0x106/0x140 [ 201.837371][ T9714] ? security_socket_sendmsg+0x82/0xa0 [ 201.842992][ T9714] ? unix_show_fdinfo+0xa0/0xa0 [ 201.847969][ T9714] ____sys_sendmsg+0x5b7/0x8f0 [ 201.852871][ T9714] ? __sys_sendmsg_sock+0x40/0x40 [ 201.858057][ T9714] ? import_iovec+0x7c/0xb0 [ 201.862584][ T9714] ___sys_sendmsg+0x236/0x2e0 [ 201.867311][ T9714] ? __sys_sendmsg+0x280/0x280 [ 201.872111][ T9714] ? rw_verify_area+0x1c0/0x360 [ 201.877000][ T9714] ? __fdget+0x1a1/0x230 [ 201.881441][ T9714] __x64_sys_sendmsg+0x1f9/0x2c0 [ 201.886404][ T9714] ? fput+0x1a/0x20 [ 201.890242][ T9714] ? ___sys_sendmsg+0x2e0/0x2e0 [ 201.895151][ T9714] ? debug_smp_processor_id+0x17/0x20 [ 201.900901][ T9714] ? fpregs_assert_state_consistent+0xb1/0xe0 [ 201.907097][ T9714] ? exit_to_user_mode_prepare+0x2f/0xa0 [ 201.912792][ T9714] do_syscall_64+0x31/0x40 [ 201.917241][ T9714] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 201.923152][ T9714] RIP: 0033:0x7f13eb2c0799 [ 201.927733][ T9714] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 201.947366][ T9714] RSP: 002b:00007f13e9d1b028 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 201.956242][ T9714] RAX: ffffffffffffffda RBX: 00007f13eb539fa0 RCX: 00007f13eb2c0799 [ 201.964581][ T9714] RDX: 0000000000000000 RSI: 00002000000006c0 RDI: 0000000000000005 [ 201.973122][ T9714] RBP: 00007f13e9d1b090 R08: 0000000000000000 R09: 0000000000000000 [ 201.981158][ T9714] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 201.989968][ T9714] R13: 00007f13eb53a038 R14: 00007f13eb539fa0 R15: 00007ffe38c06d18 [ 202.525150][ T9750] FAULT_INJECTION: forcing a failure. [ 202.525150][ T9750] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 202.554269][ T9750] CPU: 1 PID: 9750 Comm: syz.1.2749 Tainted: G W syzkaller #0 [ 202.563103][ T9750] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 202.573166][ T9750] Call Trace: [ 202.576467][ T9750] __dump_stack+0x21/0x24 [ 202.580799][ T9750] dump_stack_lvl+0x1a7/0x208 [ 202.585479][ T9750] ? show_regs_print_info+0x18/0x18 [ 202.590827][ T9750] dump_stack+0x15/0x1c [ 202.594997][ T9750] should_fail+0x3c1/0x510 [ 202.599416][ T9750] should_fail_alloc_page+0x4f/0x60 [ 202.604636][ T9750] __alloc_pages_nodemask+0x119/0x620 [ 202.610026][ T9750] ? gfp_pfmemalloc_allowed+0x130/0x130 [ 202.615581][ T9750] ? __kmalloc_track_caller+0x17e/0x320 [ 202.621137][ T9750] ? __kasan_check_write+0x14/0x20 [ 202.626249][ T9750] ? __alloc_skb+0x38b/0x520 [ 202.630851][ T9750] alloc_skb_with_frags+0x18c/0x560 [ 202.636072][ T9750] sock_alloc_send_pskb+0x87f/0x9a0 [ 202.641367][ T9750] ? sock_kzfree_s+0x60/0x60 [ 202.645993][ T9750] ? sock_def_readable+0x1c8/0x320 [ 202.651533][ T9750] ? __kasan_check_write+0x14/0x20 [ 202.656748][ T9750] ? sock_no_sendpage_locked+0x180/0x180 [ 202.662654][ T9750] ? _raw_spin_unlock_irqrestore+0x5b/0x80 [ 202.668470][ T9750] ? skb_queue_tail+0xcb/0xf0 [ 202.673158][ T9750] unix_stream_sendmsg+0x4c9/0xbe0 [ 202.678285][ T9750] ? unix_show_fdinfo+0xa0/0xa0 [ 202.683270][ T9750] ? check_stack_object+0x106/0x140 [ 202.688565][ T9750] ? security_socket_sendmsg+0x82/0xa0 [ 202.694027][ T9750] ? unix_show_fdinfo+0xa0/0xa0 [ 202.699057][ T9750] ____sys_sendmsg+0x5b7/0x8f0 [ 202.703945][ T9750] ? __sys_sendmsg_sock+0x40/0x40 [ 202.708981][ T9750] ? import_iovec+0x7c/0xb0 [ 202.713704][ T9750] ___sys_sendmsg+0x236/0x2e0 [ 202.718651][ T9750] ? __sys_sendmsg+0x280/0x280 [ 202.723693][ T9750] ? rw_verify_area+0x1c0/0x360 [ 202.728659][ T9750] ? __fdget+0x1a1/0x230 [ 202.733312][ T9750] __x64_sys_sendmsg+0x1f9/0x2c0 [ 202.738446][ T9750] ? fput+0x1a/0x20 [ 202.742260][ T9750] ? ___sys_sendmsg+0x2e0/0x2e0 [ 202.747118][ T9750] ? debug_smp_processor_id+0x17/0x20 [ 202.752593][ T9750] ? fpregs_assert_state_consistent+0xb1/0xe0 [ 202.758872][ T9750] ? exit_to_user_mode_prepare+0x2f/0xa0 [ 202.764525][ T9750] do_syscall_64+0x31/0x40 [ 202.768963][ T9750] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 202.774946][ T9750] RIP: 0033:0x7fee2b595799 [ 202.779504][ T9750] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 202.799241][ T9750] RSP: 002b:00007fee29ff0028 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 202.807786][ T9750] RAX: ffffffffffffffda RBX: 00007fee2b80efa0 RCX: 00007fee2b595799 [ 202.815800][ T9750] RDX: 0000000000000000 RSI: 00002000000006c0 RDI: 0000000000000005 [ 202.823810][ T9750] RBP: 00007fee29ff0090 R08: 0000000000000000 R09: 0000000000000000 [ 202.831926][ T9750] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 202.840136][ T9750] R13: 00007fee2b80f038 R14: 00007fee2b80efa0 R15: 00007ffeb4ca8b38 [ 203.412756][ T9804] FAULT_INJECTION: forcing a failure. [ 203.412756][ T9804] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 203.538534][ T9804] CPU: 0 PID: 9804 Comm: syz.0.2765 Tainted: G W syzkaller #0 [ 203.547478][ T9804] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 203.557870][ T9804] Call Trace: [ 203.561191][ T9804] __dump_stack+0x21/0x24 [ 203.565551][ T9804] dump_stack_lvl+0x1a7/0x208 [ 203.570281][ T9804] ? show_regs_print_info+0x18/0x18 [ 203.575678][ T9804] dump_stack+0x15/0x1c [ 203.579866][ T9804] should_fail+0x3c1/0x510 [ 203.584311][ T9804] should_fail_usercopy+0x1a/0x20 [ 203.589463][ T9804] _copy_from_iter+0x1d1/0x9f0 [ 203.594272][ T9804] ? __check_object_size+0x2f4/0x3c0 [ 203.599679][ T9804] skb_copy_datagram_from_iter+0xfa/0x6b0 [ 203.605424][ T9804] ? sock_no_sendpage_locked+0x180/0x180 [ 203.611444][ T9804] ? _raw_spin_unlock_irqrestore+0x5b/0x80 [ 203.617707][ T9804] ? skb_put+0x10e/0x1f0 [ 203.621979][ T9804] unix_stream_sendmsg+0x73d/0xbe0 [ 203.627126][ T9804] ? unix_show_fdinfo+0xa0/0xa0 [ 203.632000][ T9804] ? check_stack_object+0x106/0x140 [ 203.637240][ T9804] ? security_socket_sendmsg+0x82/0xa0 [ 203.642732][ T9804] ? unix_show_fdinfo+0xa0/0xa0 [ 203.647756][ T9804] ____sys_sendmsg+0x5b7/0x8f0 [ 203.652554][ T9804] ? __sys_sendmsg_sock+0x40/0x40 [ 203.657843][ T9804] ? import_iovec+0x7c/0xb0 [ 203.662372][ T9804] ___sys_sendmsg+0x236/0x2e0 [ 203.667077][ T9804] ? __sys_sendmsg+0x280/0x280 [ 203.672033][ T9804] ? rw_verify_area+0x1c0/0x360 [ 203.677133][ T9804] ? __fdget+0x1a1/0x230 [ 203.681390][ T9804] __x64_sys_sendmsg+0x1f9/0x2c0 [ 203.686443][ T9804] ? fput+0x1a/0x20 [ 203.690295][ T9804] ? ___sys_sendmsg+0x2e0/0x2e0 [ 203.695167][ T9804] ? debug_smp_processor_id+0x17/0x20 [ 203.700955][ T9804] ? fpregs_assert_state_consistent+0xb1/0xe0 [ 203.707302][ T9804] ? exit_to_user_mode_prepare+0x2f/0xa0 [ 203.713227][ T9804] do_syscall_64+0x31/0x40 [ 203.717817][ T9804] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 203.724135][ T9804] RIP: 0033:0x7fc19c962799 [ 203.728945][ T9804] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 203.748879][ T9804] RSP: 002b:00007fc19b3bd028 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 203.757319][ T9804] RAX: ffffffffffffffda RBX: 00007fc19cbdbfa0 RCX: 00007fc19c962799 [ 203.765873][ T9804] RDX: 0000000000000000 RSI: 00002000000006c0 RDI: 0000000000000005 [ 203.773889][ T9804] RBP: 00007fc19b3bd090 R08: 0000000000000000 R09: 0000000000000000 [ 203.781993][ T9804] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 203.790441][ T9804] R13: 00007fc19cbdc038 R14: 00007fc19cbdbfa0 R15: 00007ffe57f681a8 [ 204.556898][ T9878] FAULT_INJECTION: forcing a failure. [ 204.556898][ T9878] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 204.590331][ T9878] CPU: 0 PID: 9878 Comm: syz.0.2783 Tainted: G W syzkaller #0 [ 204.599397][ T9878] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 204.609564][ T9878] Call Trace: [ 204.612889][ T9878] __dump_stack+0x21/0x24 [ 204.617339][ T9878] dump_stack_lvl+0x1a7/0x208 [ 204.622138][ T9878] ? thaw_kernel_threads+0x220/0x220 [ 204.627600][ T9878] ? show_regs_print_info+0x18/0x18 [ 204.632830][ T9878] dump_stack+0x15/0x1c [ 204.637007][ T9878] should_fail+0x3c1/0x510 [ 204.641454][ T9878] should_fail_usercopy+0x1a/0x20 [ 204.646549][ T9878] copy_page_from_iter+0x381/0x6c0 [ 204.651787][ T9878] skb_copy_datagram_from_iter+0x2d0/0x6b0 [ 204.657643][ T9878] unix_stream_sendmsg+0x73d/0xbe0 [ 204.662786][ T9878] ? unix_show_fdinfo+0xa0/0xa0 [ 204.667752][ T9878] ? check_stack_object+0x106/0x140 [ 204.673085][ T9878] ? security_socket_sendmsg+0x82/0xa0 [ 204.678573][ T9878] ? unix_show_fdinfo+0xa0/0xa0 [ 204.683445][ T9878] ____sys_sendmsg+0x5b7/0x8f0 [ 204.688236][ T9878] ? __sys_sendmsg_sock+0x40/0x40 [ 204.693332][ T9878] ? import_iovec+0x7c/0xb0 [ 204.698075][ T9878] ___sys_sendmsg+0x236/0x2e0 [ 204.703031][ T9878] ? __sys_sendmsg+0x280/0x280 [ 204.707918][ T9878] ? rw_verify_area+0x1c0/0x360 [ 204.713256][ T9878] ? __fdget+0x1a1/0x230 [ 204.718299][ T9878] __x64_sys_sendmsg+0x1f9/0x2c0 [ 204.723306][ T9878] ? fput+0x1a/0x20 [ 204.727281][ T9878] ? ___sys_sendmsg+0x2e0/0x2e0 [ 204.732438][ T9878] ? debug_smp_processor_id+0x17/0x20 [ 204.737853][ T9878] ? fpregs_assert_state_consistent+0xb1/0xe0 [ 204.744147][ T9878] ? exit_to_user_mode_prepare+0x2f/0xa0 [ 204.749800][ T9878] do_syscall_64+0x31/0x40 [ 204.754245][ T9878] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 204.760163][ T9878] RIP: 0033:0x7fc19c962799 [ 204.764608][ T9878] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 204.784423][ T9878] RSP: 002b:00007fc19b3bd028 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 204.792876][ T9878] RAX: ffffffffffffffda RBX: 00007fc19cbdbfa0 RCX: 00007fc19c962799 [ 204.800903][ T9878] RDX: 0000000000000000 RSI: 00002000000006c0 RDI: 0000000000000005 [ 204.808917][ T9878] RBP: 00007fc19b3bd090 R08: 0000000000000000 R09: 0000000000000000 [ 204.816918][ T9878] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 204.824918][ T9878] R13: 00007fc19cbdc038 R14: 00007fc19cbdbfa0 R15: 00007ffe57f681a8 [ 205.290259][ T9931] device syzkaller0 entered promiscuous mode [ 205.478150][ T9944] FAULT_INJECTION: forcing a failure. [ 205.478150][ T9944] name failslab, interval 1, probability 0, space 0, times 0 [ 205.517398][ T9944] CPU: 0 PID: 9944 Comm: syz.3.2804 Tainted: G W syzkaller #0 [ 205.526442][ T9944] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 205.536530][ T9944] Call Trace: [ 205.539862][ T9944] __dump_stack+0x21/0x24 [ 205.544232][ T9944] dump_stack_lvl+0x1a7/0x208 [ 205.549131][ T9944] ? thaw_kernel_threads+0x220/0x220 [ 205.555025][ T9944] ? show_regs_print_info+0x18/0x18 [ 205.560444][ T9944] ? __kasan_check_write+0x14/0x20 [ 205.565854][ T9944] ? down_read_trylock+0x106/0x160 [ 205.571875][ T9944] dump_stack+0x15/0x1c [ 205.576072][ T9944] should_fail+0x3c1/0x510 [ 205.580612][ T9944] ? __alloc_skb+0x9e/0x520 [ 205.585288][ T9944] __should_failslab+0xa4/0xe0 [ 205.590167][ T9944] should_failslab+0x9/0x20 [ 205.594714][ T9944] kmem_cache_alloc+0x3d/0x2d0 [ 205.599955][ T9944] __alloc_skb+0x9e/0x520 [ 205.604499][ T9944] ? do_kern_addr_fault+0x80/0x80 [ 205.609667][ T9944] alloc_skb_with_frags+0xa2/0x560 [ 205.614852][ T9944] ? exc_page_fault+0x67/0xc0 [ 205.619838][ T9944] sock_alloc_send_pskb+0x87f/0x9a0 [ 205.625291][ T9944] ? sock_kzfree_s+0x60/0x60 [ 205.630128][ T9944] ? sock_def_readable+0x1c8/0x320 [ 205.635275][ T9944] ? __kasan_check_write+0x14/0x20 [ 205.640438][ T9944] ? sock_no_sendpage_locked+0x180/0x180 [ 205.646250][ T9944] ? _raw_spin_unlock_irqrestore+0x5b/0x80 [ 205.652553][ T9944] ? skb_queue_tail+0xcb/0xf0 [ 205.657255][ T9944] unix_stream_sendmsg+0x4c9/0xbe0 [ 205.662591][ T9944] ? unix_show_fdinfo+0xa0/0xa0 [ 205.667463][ T9944] ? check_stack_object+0x106/0x140 [ 205.672678][ T9944] ? security_socket_sendmsg+0x82/0xa0 [ 205.678433][ T9944] ? unix_show_fdinfo+0xa0/0xa0 [ 205.683325][ T9944] ____sys_sendmsg+0x5b7/0x8f0 [ 205.688279][ T9944] ? __sys_sendmsg_sock+0x40/0x40 [ 205.693315][ T9944] ? import_iovec+0x7c/0xb0 [ 205.697826][ T9944] ___sys_sendmsg+0x236/0x2e0 [ 205.702589][ T9944] ? __sys_sendmsg+0x280/0x280 [ 205.707454][ T9944] ? rw_verify_area+0x1c0/0x360 [ 205.712428][ T9944] ? __fdget+0x1a1/0x230 [ 205.716696][ T9944] __x64_sys_sendmsg+0x1f9/0x2c0 [ 205.721885][ T9944] ? fput+0x1a/0x20 [ 205.725824][ T9944] ? ___sys_sendmsg+0x2e0/0x2e0 [ 205.730697][ T9944] ? debug_smp_processor_id+0x17/0x20 [ 205.736258][ T9944] ? fpregs_assert_state_consistent+0xb1/0xe0 [ 205.742352][ T9944] ? exit_to_user_mode_prepare+0x2f/0xa0 [ 205.748016][ T9944] do_syscall_64+0x31/0x40 [ 205.752453][ T9944] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 205.758543][ T9944] RIP: 0033:0x7f17998a6799 [ 205.762969][ T9944] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 205.783337][ T9944] RSP: 002b:00007f1798301028 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 205.791878][ T9944] RAX: ffffffffffffffda RBX: 00007f1799b1ffa0 RCX: 00007f17998a6799 [ 205.800569][ T9944] RDX: 0000000000000000 RSI: 00002000000006c0 RDI: 0000000000000005 [ 205.808663][ T9944] RBP: 00007f1798301090 R08: 0000000000000000 R09: 0000000000000000 [ 205.817116][ T9944] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 205.825210][ T9944] R13: 00007f1799b20038 R14: 00007f1799b1ffa0 R15: 00007fffb85590d8 [ 205.940708][ T9959] device syzkaller0 entered promiscuous mode [ 206.425878][ T9979] device syzkaller0 entered promiscuous mode [ 206.623489][ T9980] device syzkaller0 entered promiscuous mode [ 207.003045][T10005] device wg2 entered promiscuous mode [ 209.711915][T10126] FAULT_INJECTION: forcing a failure. [ 209.711915][T10126] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 209.756133][T10126] CPU: 0 PID: 10126 Comm: syz.4.2860 Tainted: G W syzkaller #0 [ 209.765322][T10126] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 209.775504][T10126] Call Trace: [ 209.778861][T10126] __dump_stack+0x21/0x24 [ 209.783255][T10126] dump_stack_lvl+0x1a7/0x208 [ 209.787966][T10126] ? show_regs_print_info+0x18/0x18 [ 209.793459][T10126] dump_stack+0x15/0x1c [ 209.797661][T10126] should_fail+0x3c1/0x510 [ 209.802128][T10126] should_fail_usercopy+0x1a/0x20 [ 209.807292][T10126] _copy_from_iter+0x1d1/0x9f0 [ 209.812300][T10126] ? __check_object_size+0x2f4/0x3c0 [ 209.817793][T10126] skb_copy_datagram_from_iter+0xfa/0x6b0 [ 209.823627][T10126] ? sock_no_sendpage_locked+0x180/0x180 [ 209.829561][T10126] ? _raw_spin_unlock_irqrestore+0x5b/0x80 [ 209.835515][T10126] ? skb_put+0x10e/0x1f0 [ 209.839839][T10126] unix_stream_sendmsg+0x73d/0xbe0 [ 209.844965][T10126] ? unix_show_fdinfo+0xa0/0xa0 [ 209.849931][T10126] ? check_stack_object+0x106/0x140 [ 209.855148][T10126] ? security_socket_sendmsg+0x82/0xa0 [ 209.860733][T10126] ? unix_show_fdinfo+0xa0/0xa0 [ 209.865700][T10126] ____sys_sendmsg+0x5b7/0x8f0 [ 209.870478][T10126] ? __sys_sendmsg_sock+0x40/0x40 [ 209.875516][T10126] ? import_iovec+0x7c/0xb0 [ 209.880034][T10126] ___sys_sendmsg+0x236/0x2e0 [ 209.884721][T10126] ? __sys_sendmsg+0x280/0x280 [ 209.889507][T10126] ? rw_verify_area+0x1c0/0x360 [ 209.894554][T10126] ? __fdget+0x1a1/0x230 [ 209.898825][T10126] __x64_sys_sendmsg+0x1f9/0x2c0 [ 209.903860][T10126] ? fput+0x1a/0x20 [ 209.907881][T10126] ? ___sys_sendmsg+0x2e0/0x2e0 [ 209.912752][T10126] ? debug_smp_processor_id+0x17/0x20 [ 209.918330][T10126] ? fpregs_assert_state_consistent+0xb1/0xe0 [ 209.924421][T10126] ? exit_to_user_mode_prepare+0x2f/0xa0 [ 209.930073][T10126] do_syscall_64+0x31/0x40 [ 209.934873][T10126] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 209.941071][T10126] RIP: 0033:0x7f13eb2c0799 [ 209.945501][T10126] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 209.965507][T10126] RSP: 002b:00007f13e9d1b028 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 209.973938][T10126] RAX: ffffffffffffffda RBX: 00007f13eb539fa0 RCX: 00007f13eb2c0799 [ 209.981919][T10126] RDX: 0000000000000000 RSI: 00002000000006c0 RDI: 0000000000000005 [ 209.990109][T10126] RBP: 00007f13e9d1b090 R08: 0000000000000000 R09: 0000000000000000 [ 209.998337][T10126] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 210.006592][T10126] R13: 00007f13eb53a038 R14: 00007f13eb539fa0 R15: 00007ffe38c06d18 [ 210.435943][T10150] device syzkaller0 left promiscuous mode [ 210.796718][T10188] FAULT_INJECTION: forcing a failure. [ 210.796718][T10188] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 210.845093][T10188] CPU: 1 PID: 10188 Comm: syz.4.2878 Tainted: G W syzkaller #0 [ 210.854004][T10188] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 210.864299][T10188] Call Trace: [ 210.867795][T10188] __dump_stack+0x21/0x24 [ 210.872153][T10188] dump_stack_lvl+0x1a7/0x208 [ 210.876854][T10188] ? thaw_kernel_threads+0x220/0x220 [ 210.882196][T10188] ? show_regs_print_info+0x18/0x18 [ 210.887430][T10188] dump_stack+0x15/0x1c [ 210.891613][T10188] should_fail+0x3c1/0x510 [ 210.896051][T10188] should_fail_usercopy+0x1a/0x20 [ 210.901285][T10188] copy_page_from_iter+0x381/0x6c0 [ 210.906599][T10188] skb_copy_datagram_from_iter+0x2d0/0x6b0 [ 210.912431][T10188] unix_stream_sendmsg+0x73d/0xbe0 [ 210.917567][T10188] ? unix_show_fdinfo+0xa0/0xa0 [ 210.922456][T10188] ? check_stack_object+0x106/0x140 [ 210.927685][T10188] ? security_socket_sendmsg+0x82/0xa0 [ 210.933182][T10188] ? unix_show_fdinfo+0xa0/0xa0 [ 210.938071][T10188] ____sys_sendmsg+0x5b7/0x8f0 [ 210.942864][T10188] ? __sys_sendmsg_sock+0x40/0x40 [ 210.947937][T10188] ? import_iovec+0x7c/0xb0 [ 210.952520][T10188] ___sys_sendmsg+0x236/0x2e0 [ 210.957355][T10188] ? __sys_sendmsg+0x280/0x280 [ 210.962202][T10188] ? rw_verify_area+0x1c0/0x360 [ 210.967096][T10188] ? __fdget+0x1a1/0x230 [ 210.971381][T10188] __x64_sys_sendmsg+0x1f9/0x2c0 [ 210.976356][T10188] ? fput+0x1a/0x20 [ 210.980207][T10188] ? ___sys_sendmsg+0x2e0/0x2e0 [ 210.985100][T10188] ? debug_smp_processor_id+0x17/0x20 [ 210.990575][T10188] ? fpregs_assert_state_consistent+0xb1/0xe0 [ 210.996679][T10188] ? exit_to_user_mode_prepare+0x2f/0xa0 [ 211.002432][T10188] do_syscall_64+0x31/0x40 [ 211.007030][T10188] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 211.012953][T10188] RIP: 0033:0x7f13eb2c0799 [ 211.017620][T10188] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 211.037339][T10188] RSP: 002b:00007f13e9d1b028 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 211.046314][T10188] RAX: ffffffffffffffda RBX: 00007f13eb539fa0 RCX: 00007f13eb2c0799 [ 211.054373][T10188] RDX: 0000000000000000 RSI: 00002000000006c0 RDI: 0000000000000005 [ 211.062599][T10188] RBP: 00007f13e9d1b090 R08: 0000000000000000 R09: 0000000000000000 [ 211.070781][T10188] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 211.079074][T10188] R13: 00007f13eb53a038 R14: 00007f13eb539fa0 R15: 00007ffe38c06d18 [ 211.394986][T10224] device syzkaller0 entered promiscuous mode [ 211.418414][ T2124] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 211.608663][T10237] FAULT_INJECTION: forcing a failure. [ 211.608663][T10237] name failslab, interval 1, probability 0, space 0, times 0 [ 211.639114][T10237] CPU: 1 PID: 10237 Comm: syz.1.2893 Tainted: G W syzkaller #0 [ 211.648034][T10237] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 211.658201][T10237] Call Trace: [ 211.661544][T10237] __dump_stack+0x21/0x24 [ 211.665917][T10237] dump_stack_lvl+0x1a7/0x208 [ 211.670625][T10237] ? thaw_kernel_threads+0x220/0x220 [ 211.675939][T10237] ? show_regs_print_info+0x18/0x18 [ 211.681155][T10237] ? __kasan_check_write+0x14/0x20 [ 211.686299][T10237] ? down_read_trylock+0x106/0x160 [ 211.691446][T10237] dump_stack+0x15/0x1c [ 211.695617][T10237] should_fail+0x3c1/0x510 [ 211.700055][T10237] ? __alloc_skb+0x9e/0x520 [ 211.704611][T10237] __should_failslab+0xa4/0xe0 [ 211.709395][T10237] should_failslab+0x9/0x20 [ 211.713915][T10237] kmem_cache_alloc+0x3d/0x2d0 [ 211.718809][T10237] __alloc_skb+0x9e/0x520 [ 211.723178][T10237] ? do_kern_addr_fault+0x80/0x80 [ 211.728492][T10237] alloc_skb_with_frags+0xa2/0x560 [ 211.733931][T10237] ? exc_page_fault+0x67/0xc0 [ 211.738645][T10237] sock_alloc_send_pskb+0x87f/0x9a0 [ 211.744076][T10237] ? sock_kzfree_s+0x60/0x60 [ 211.748792][T10237] ? sock_def_readable+0x1c8/0x320 [ 211.753942][T10237] ? __kasan_check_write+0x14/0x20 [ 211.759086][T10237] ? sock_no_sendpage_locked+0x180/0x180 [ 211.764845][T10237] ? _raw_spin_unlock_irqrestore+0x5b/0x80 [ 211.770686][T10237] ? skb_queue_tail+0xcb/0xf0 [ 211.775421][T10237] unix_stream_sendmsg+0x4c9/0xbe0 [ 211.780654][T10237] ? unix_show_fdinfo+0xa0/0xa0 [ 211.785539][T10237] ? check_stack_object+0x106/0x140 [ 211.790836][T10237] ? security_socket_sendmsg+0x82/0xa0 [ 211.796358][T10237] ? unix_show_fdinfo+0xa0/0xa0 [ 211.801276][T10237] ____sys_sendmsg+0x5b7/0x8f0 [ 211.806113][T10237] ? __sys_sendmsg_sock+0x40/0x40 [ 211.811196][T10237] ? import_iovec+0x7c/0xb0 [ 211.815815][T10237] ___sys_sendmsg+0x236/0x2e0 [ 211.820527][T10237] ? __sys_sendmsg+0x280/0x280 [ 211.825408][T10237] ? rw_verify_area+0x1c0/0x360 [ 211.830476][T10237] ? __fdget+0x1a1/0x230 [ 211.834751][T10237] __x64_sys_sendmsg+0x1f9/0x2c0 [ 211.839726][T10237] ? fput+0x1a/0x20 [ 211.843558][T10237] ? ___sys_sendmsg+0x2e0/0x2e0 [ 211.848424][T10237] ? syscall_trace_enter+0x108/0x170 [ 211.854041][T10237] do_syscall_64+0x31/0x40 [ 211.858474][T10237] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 211.864379][T10237] RIP: 0033:0x7fee2b595799 [ 211.869946][T10237] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 211.890558][T10237] RSP: 002b:00007fee29ff0028 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 211.898984][T10237] RAX: ffffffffffffffda RBX: 00007fee2b80efa0 RCX: 00007fee2b595799 [ 211.907019][T10237] RDX: 0000000000000000 RSI: 00002000000006c0 RDI: 0000000000000005 [ 211.915361][T10237] RBP: 00007fee29ff0090 R08: 0000000000000000 R09: 0000000000000000 [ 211.923442][T10237] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 211.931425][T10237] R13: 00007fee2b80f038 R14: 00007fee2b80efa0 R15: 00007ffeb4ca8b38 [ 212.447824][ T24] audit: type=1400 audit(1774279837.070:171): avc: denied { mounton } for pid=10285 comm="syz-executor" path="/" dev="sda1" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:root_t tclass=dir permissive=1 [ 212.486884][ T276] IPv6: ADDRCONF(NETDEV_CHANGE): syz_tun: link becomes ready [ 212.734444][T10285] bridge0: port 1(bridge_slave_0) entered blocking state [ 212.754453][T10285] bridge0: port 1(bridge_slave_0) entered disabled state [ 212.762322][T10285] device bridge_slave_0 entered promiscuous mode [ 212.785274][T10285] bridge0: port 2(bridge_slave_1) entered blocking state [ 212.800249][T10285] bridge0: port 2(bridge_slave_1) entered disabled state [ 212.807839][T10285] device bridge_slave_1 entered promiscuous mode [ 213.351540][T10285] bridge0: port 2(bridge_slave_1) entered blocking state [ 213.358710][T10285] bridge0: port 2(bridge_slave_1) entered forwarding state [ 213.366091][T10285] bridge0: port 1(bridge_slave_0) entered blocking state [ 213.373162][T10285] bridge0: port 1(bridge_slave_0) entered forwarding state [ 213.563637][ T9] bridge0: port 1(bridge_slave_0) entered disabled state [ 213.580049][ T9] bridge0: port 2(bridge_slave_1) entered disabled state [ 213.751200][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 213.782177][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 213.848147][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 213.858330][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 213.876413][ T7] bridge0: port 1(bridge_slave_0) entered blocking state [ 213.883659][ T7] bridge0: port 1(bridge_slave_0) entered forwarding state [ 213.901579][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 213.932041][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 213.950953][ T7] bridge0: port 2(bridge_slave_1) entered blocking state [ 213.958452][ T7] bridge0: port 2(bridge_slave_1) entered forwarding state [ 213.988243][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 214.000628][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 214.031656][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 214.044247][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 214.101253][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 214.155694][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 214.168521][T10285] device veth0_vlan entered promiscuous mode [ 214.182393][ T332] device veth1_macvtap left promiscuous mode [ 214.356949][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 214.370951][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 214.379584][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 214.388085][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 214.416496][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 214.438703][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 214.451683][T10285] device veth1_macvtap entered promiscuous mode [ 214.494484][ T2124] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 214.508142][ T2124] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 214.517208][ T2124] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 214.564977][ T24] audit: type=1400 audit(1774279839.190:172): avc: denied { unmount } for pid=10285 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fs_t tclass=filesystem permissive=1 [ 214.585225][ T2124] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 214.631015][ T2124] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 215.158942][T10430] device syzkaller0 entered promiscuous mode [ 216.371981][T10502] device syzkaller0 entered promiscuous mode [ 216.497759][T10514] device syzkaller0 entered promiscuous mode [ 219.039128][T10629] +: renamed from team_slave_1 [ 220.659803][T10712] device syzkaller0 left promiscuous mode [ 221.920934][T10743] bridge0: port 1(bridge_slave_0) entered blocking state [ 221.990285][T10743] bridge0: port 1(bridge_slave_0) entered disabled state [ 221.997971][T10743] device bridge_slave_0 entered promiscuous mode [ 222.382576][T10743] bridge0: port 2(bridge_slave_1) entered blocking state [ 222.389899][T10743] bridge0: port 2(bridge_slave_1) entered disabled state [ 222.466206][T10743] device bridge_slave_1 entered promiscuous mode [ 222.964139][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 222.975586][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 223.029495][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 223.043578][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 223.057918][ T7] bridge0: port 1(bridge_slave_0) entered blocking state [ 223.065156][ T7] bridge0: port 1(bridge_slave_0) entered forwarding state [ 223.103574][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 223.116191][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 223.147352][ T7] bridge0: port 2(bridge_slave_1) entered blocking state [ 223.154766][ T7] bridge0: port 2(bridge_slave_1) entered forwarding state [ 223.219476][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 223.267287][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 223.280730][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 223.367921][T10743] device veth0_vlan entered promiscuous mode [ 223.423228][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 223.434958][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 223.450931][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 223.461573][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 223.547917][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 223.560625][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 223.588683][T10743] device veth1_macvtap entered promiscuous mode [ 223.652768][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 223.682904][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 223.752702][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 223.807679][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 223.817878][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 224.383087][ T332] device bridge_slave_1 left promiscuous mode [ 224.395997][ T332] bridge0: port 2(bridge_slave_1) entered disabled state [ 224.432346][ T332] bridge0: port 1(bridge_slave_0) entered disabled state [ 224.470113][ T332] device veth1_macvtap left promiscuous mode [ 224.818241][T10829] bridge0: port 1(bridge_slave_0) entered blocking state [ 224.840462][T10829] bridge0: port 1(bridge_slave_0) entered disabled state [ 224.856789][T10829] device bridge_slave_0 entered promiscuous mode [ 224.906199][T10874] device syzkaller0 entered promiscuous mode [ 224.935554][T10829] bridge0: port 2(bridge_slave_1) entered blocking state [ 224.944358][T10829] bridge0: port 2(bridge_slave_1) entered disabled state [ 224.953432][T10829] device bridge_slave_1 entered promiscuous mode [ 225.361417][T10829] bridge0: port 2(bridge_slave_1) entered blocking state [ 225.368630][T10829] bridge0: port 2(bridge_slave_1) entered forwarding state [ 225.375961][T10829] bridge0: port 1(bridge_slave_0) entered blocking state [ 225.383026][T10829] bridge0: port 1(bridge_slave_0) entered forwarding state [ 225.489531][T10829] device veth0_vlan entered promiscuous mode [ 225.498109][ T300] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 225.518328][ T300] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 225.537669][ T300] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 225.585359][ T300] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 225.599592][ T300] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 225.608908][ T300] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 225.618321][ T300] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 225.626881][ T300] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 225.634664][ T300] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 225.670009][T10891] device syzkaller0 entered promiscuous mode [ 225.723384][T10829] device veth1_macvtap entered promiscuous mode [ 225.735260][ T300] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 225.856168][ T300] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 225.879425][ T300] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 225.992103][ T300] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 226.008218][ T300] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 226.677091][ T332] device veth1_macvtap left promiscuous mode [ 227.134414][T10953] bridge0: port 1(bridge_slave_0) entered blocking state [ 227.150267][T10953] bridge0: port 1(bridge_slave_0) entered disabled state [ 227.157861][T10953] device bridge_slave_0 entered promiscuous mode [ 227.165190][T10953] bridge0: port 2(bridge_slave_1) entered blocking state [ 227.172400][T10953] bridge0: port 2(bridge_slave_1) entered disabled state [ 227.179929][T10953] device bridge_slave_1 entered promiscuous mode [ 227.240306][T10953] bridge0: port 2(bridge_slave_1) entered blocking state [ 227.247396][T10953] bridge0: port 2(bridge_slave_1) entered forwarding state [ 227.254776][T10953] bridge0: port 1(bridge_slave_0) entered blocking state [ 227.262063][T10953] bridge0: port 1(bridge_slave_0) entered forwarding state [ 227.293473][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 227.302924][ T9] bridge0: port 1(bridge_slave_0) entered disabled state [ 227.310862][ T9] bridge0: port 2(bridge_slave_1) entered disabled state [ 227.337422][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 227.365020][ T9] bridge0: port 1(bridge_slave_0) entered blocking state [ 227.372149][ T9] bridge0: port 1(bridge_slave_0) entered forwarding state [ 227.384089][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 227.410486][ T9] bridge0: port 2(bridge_slave_1) entered blocking state [ 227.417585][ T9] bridge0: port 2(bridge_slave_1) entered forwarding state [ 227.440839][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 227.449195][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 227.592599][T10995] device syzkaller0 entered promiscuous mode [ 227.602143][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 227.642975][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 227.667044][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 227.681674][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 227.701288][T10953] device veth0_vlan entered promiscuous mode [ 227.716109][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 227.726744][T10953] device veth1_macvtap entered promiscuous mode [ 227.805195][T11013] device wg2 entered promiscuous mode [ 227.871966][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 227.925065][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 228.139345][T11035] bridge0: port 2(bridge_slave_1) entered disabled state [ 228.146956][T11035] bridge0: port 1(bridge_slave_0) entered disabled state [ 228.238194][T11042] bridge0: port 2(bridge_slave_1) entered blocking state [ 228.245313][T11042] bridge0: port 2(bridge_slave_1) entered forwarding state [ 228.252649][T11042] bridge0: port 1(bridge_slave_0) entered blocking state [ 228.259704][T11042] bridge0: port 1(bridge_slave_0) entered forwarding state [ 228.364564][T11042] device bridge0 entered promiscuous mode [ 231.107459][T11209] +: renamed from team_slave_1 [ 231.620672][T11221] device veth1_macvtap left promiscuous mode [ 231.867872][T11221] syzkaller0: default qdisc (pfifo_fast) fail, fallback to noqueue [ 232.058037][T11221] device syzkaller0 entered promiscuous mode [ 232.141589][T11229] device veth1_macvtap entered promiscuous mode [ 232.148028][T11229] device macsec0 entered promiscuous mode [ 232.191603][T11229] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 232.435985][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 233.109048][T11273] device syzkaller0 entered promiscuous mode [ 233.134383][T11263] device wg2 entered promiscuous mode [ 233.214601][ T300] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 233.251858][ T300] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 233.259244][ T300] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 233.526066][T11303] syzkaller0: default qdisc (pfifo_fast) fail, fallback to noqueue [ 233.574904][T11303] device syzkaller0 entered promiscuous mode [ 234.876575][ T24] audit: type=1400 audit(1774279859.500:173): avc: denied { setattr } for pid=11334 comm="syz.2.3209" path="/net/tun" dev="devtmpfs" ino=151 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tun_tap_device_t tclass=chr_file permissive=1 [ 235.332917][T11361] : port 1(ip6gretap0) entered blocking state [ 235.339934][T11361] : port 1(ip6gretap0) entered disabled state [ 235.358968][T11361] device ip6gretap0 entered promiscuous mode [ 235.395797][T11369] device ip6gretap0 left promiscuous mode [ 235.401752][T11369] : port 1(ip6gretap0) entered disabled state [ 235.435850][T11371] bridge0: port 3(veth0_vlan) entered blocking state [ 235.498778][T11371] bridge0: port 3(veth0_vlan) entered disabled state [ 235.550957][T11371] bridge0: port 3(veth0_vlan) entered blocking state [ 235.557738][T11371] bridge0: port 3(veth0_vlan) entered forwarding state [ 236.556936][T11459] device pim6reg1 entered promiscuous mode [ 236.574491][T11461] bond_slave_0: mtu less than device minimum [ 239.970996][ T24] audit: type=1400 audit(1774279864.600:174): avc: denied { create } for pid=11669 comm="syz.4.3324" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=iucv_socket permissive=1 [ 241.101026][T11740] device veth1_macvtap left promiscuous mode [ 241.216643][T11744] device syzkaller0 entered promiscuous mode [ 241.244755][T11739] : port 1(ip6gretap0) entered blocking state [ 241.257147][T11739] : port 1(ip6gretap0) entered disabled state [ 241.280128][T11739] device ip6gretap0 entered promiscuous mode [ 241.352367][T11751] device ip6gretap0 left promiscuous mode [ 241.366374][T11751] : port 1(ip6gretap0) entered disabled state [ 241.481363][T11767] device veth0_vlan left promiscuous mode [ 241.534407][T11767] device veth0_vlan entered promiscuous mode [ 241.590508][T11774] bridge0: port 2(bridge_slave_1) entered disabled state [ 241.599941][T11774] bridge0: port 1(bridge_slave_0) entered disabled state [ 242.364210][T11835] device veth1_macvtap entered promiscuous mode [ 242.377674][T11835] device macsec0 entered promiscuous mode [ 242.410304][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 242.904834][T11866] syz.3.3379[11866] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 242.904900][T11866] syz.3.3379[11866] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 243.837121][T11903] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 244.517097][T11954] device syzkaller0 entered promiscuous mode [ 244.680107][T11957] 7B’ç÷ï: renamed from syzkaller0 [ 246.624409][T12073] device syzkaller0 entered promiscuous mode [ 247.052398][T12105] device syzkaller0 entered promiscuous mode [ 247.766087][T12132] : port 1(ip6gretap0) entered blocking state [ 247.772551][T12132] : port 1(ip6gretap0) entered disabled state [ 247.791461][T12132] device ip6gretap0 entered promiscuous mode [ 247.824629][T12133] device ip6gretap0 left promiscuous mode [ 247.867059][T12133] : port 1(ip6gretap0) entered disabled state [ 249.470923][T12218] device wg2 left promiscuous mode [ 249.544206][T12218] device wg2 entered promiscuous mode [ 252.136908][T12384] device syzkaller0 entered promiscuous mode [ 254.444135][T12471] device veth1_macvtap left promiscuous mode [ 254.462637][T12471] device macsec0 left promiscuous mode [ 254.567034][T12475] device veth1_macvtap entered promiscuous mode [ 254.580485][T12475] device macsec0 entered promiscuous mode [ 254.617746][T12470] device syzkaller0 entered promiscuous mode [ 254.665297][ T300] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 254.720254][T12473] device syzkaller0 left promiscuous mode [ 254.880206][T12476] device veth1_macvtap left promiscuous mode [ 255.559182][T12542] sit0: mtu greater than device maximum [ 258.223949][T12705] bridge0: port 2(bridge_slave_1) entered blocking state [ 258.231234][T12705] bridge0: port 2(bridge_slave_1) entered forwarding state [ 258.238643][T12705] bridge0: port 1(bridge_slave_0) entered blocking state [ 258.245709][T12705] bridge0: port 1(bridge_slave_0) entered forwarding state [ 258.300324][T12705] device bridge0 entered promiscuous mode [ 258.313487][T12708] syzkaller0: default qdisc (pfifo_fast) fail, fallback to noqueue [ 258.331083][T12708] device syzkaller0 entered promiscuous mode [ 258.570275][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 260.115451][T12818] bridge0: port 3(gretap0) entered blocking state [ 260.140533][T12818] bridge0: port 3(gretap0) entered disabled state [ 260.158596][T12818] device gretap0 entered promiscuous mode [ 260.173744][T12818] bridge0: port 3(gretap0) entered blocking state [ 260.180291][T12818] bridge0: port 3(gretap0) entered forwarding state [ 260.689596][T12837] device wg2 entered promiscuous mode [ 263.596838][T12931] device syzkaller0 left promiscuous mode [ 264.093629][T12964] device syzkaller0 entered promiscuous mode [ 264.637876][T13004] bridge0: port 1(bridge_slave_0) entered blocking state [ 264.655201][T13004] bridge0: port 1(bridge_slave_0) entered disabled state [ 264.673323][T13004] device bridge_slave_0 entered promiscuous mode [ 264.700537][T13004] bridge0: port 2(bridge_slave_1) entered blocking state [ 264.710310][T13004] bridge0: port 2(bridge_slave_1) entered disabled state [ 264.725661][T13004] device bridge_slave_1 entered promiscuous mode [ 265.001333][T13004] bridge0: port 2(bridge_slave_1) entered blocking state [ 265.008454][T13004] bridge0: port 2(bridge_slave_1) entered forwarding state [ 265.015999][T13004] bridge0: port 1(bridge_slave_0) entered blocking state [ 265.023677][T13004] bridge0: port 1(bridge_slave_0) entered forwarding state [ 265.126691][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 265.170668][ T9] bridge0: port 1(bridge_slave_0) entered disabled state [ 265.190354][ T9] bridge0: port 2(bridge_slave_1) entered disabled state [ 265.302025][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 265.313661][ T9] bridge0: port 1(bridge_slave_0) entered blocking state [ 265.320811][ T9] bridge0: port 1(bridge_slave_0) entered forwarding state [ 265.338153][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 265.352288][ T9] bridge0: port 2(bridge_slave_1) entered blocking state [ 265.359499][ T9] bridge0: port 2(bridge_slave_1) entered forwarding state [ 265.385812][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 265.399296][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 265.683848][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 265.698813][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 265.717486][T13004] device veth0_vlan entered promiscuous mode [ 265.742510][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 265.751851][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 265.760125][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 265.768781][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 265.777548][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 265.785388][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 265.835740][T13004] device veth1_macvtap entered promiscuous mode [ 265.843179][T13058] device aaaaaaaaaaaaaaa entered promiscuous mode [ 265.865051][ T300] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 265.873114][ T300] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 265.882116][ T300] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 265.920482][ T300] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 265.957204][ T300] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 266.038722][T13068] device syzkaller0 entered promiscuous mode [ 266.126586][T13087] @ÿ: renamed from bond_slave_0 [ 266.449231][T13114] device wg2 entered promiscuous mode [ 266.754164][ T9] device vlan1 left promiscuous mode [ 266.763330][ T9] Ÿë: port 1(vlan1) entered disabled state [ 266.780106][ T9] device bridge_slave_1 left promiscuous mode [ 266.812910][ T9] bridge0: port 2(bridge_slave_1) entered disabled state [ 266.823827][ T9] device bridge_slave_0 left promiscuous mode [ 266.831124][ T9] bridge0: port 1(bridge_slave_0) entered disabled state [ 266.842252][ T9] device veth1_macvtap left promiscuous mode [ 269.533166][T13310] device syzkaller0 entered promiscuous mode [ 270.341839][T13350] device wg2 left promiscuous mode [ 270.427064][T13355] bridge0: port 4(veth0_to_bridge) entered blocking state [ 270.449067][T13355] bridge0: port 4(veth0_to_bridge) entered disabled state [ 270.481194][T13355] device veth0_to_bridge entered promiscuous mode [ 270.494517][T13355] bridge0: adding interface veth0_to_bridge with same address as a received packet (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 270.508595][T13355] bridge0: port 4(veth0_to_bridge) entered blocking state [ 270.515825][T13355] bridge0: port 4(veth0_to_bridge) entered forwarding state [ 270.734143][T13355] device wg2 entered promiscuous mode [ 272.907240][T13449] Â: renamed from pim6reg1 [ 273.209273][T13460] cgroup: fork rejected by pids controller in /syz4 [ 274.326817][T13586] bridge0: port 4(veth0_to_bridge) entered disabled state [ 274.334174][T13586] bridge0: port 3(veth0_vlan) entered disabled state [ 274.340987][T13586] bridge0: port 2(bridge_slave_1) entered disabled state [ 274.348434][T13586] bridge0: port 1(bridge_slave_0) entered disabled state [ 274.372123][T13586] bridge0: port 4(veth0_to_bridge) entered blocking state [ 274.379321][T13586] bridge0: port 4(veth0_to_bridge) entered forwarding state [ 274.386755][T13586] bridge0: port 3(veth0_vlan) entered blocking state [ 274.393516][T13586] bridge0: port 3(veth0_vlan) entered forwarding state [ 274.400518][T13586] bridge0: port 2(bridge_slave_1) entered blocking state [ 274.407574][T13586] bridge0: port 2(bridge_slave_1) entered forwarding state [ 274.415331][T13586] bridge0: port 1(bridge_slave_0) entered blocking state [ 274.422623][T13586] bridge0: port 1(bridge_slave_0) entered forwarding state [ 274.445581][T13586] device bridge0 entered promiscuous mode [ 274.452489][T13595] bridge0: port 4(veth0_to_bridge) entered disabled state [ 274.459722][T13595] bridge0: port 3(veth0_vlan) entered disabled state [ 274.466518][T13595] bridge0: port 2(bridge_slave_1) entered disabled state [ 274.473727][T13595] bridge0: port 1(bridge_slave_0) entered disabled state [ 274.485007][T13595] device bridge0 left promiscuous mode [ 274.497886][T13586] device veth0_to_bridge left promiscuous mode [ 274.508866][T13586] bridge0: port 4(veth0_to_bridge) entered disabled state [ 274.517256][T13586] bridge0: port 3(veth0_vlan) entered disabled state [ 274.524635][T13586] device bridge_slave_1 left promiscuous mode [ 274.531201][T13586] bridge0: port 2(bridge_slave_1) entered disabled state [ 274.538949][T13586] device bridge_slave_0 left promiscuous mode [ 274.545477][T13586] bridge0: port 1(bridge_slave_0) entered disabled state [ 274.708924][T13612] tap0: tun_chr_ioctl cmd 1074025680 [ 274.714853][T13613] tap0: tun_chr_ioctl cmd 1074025680 [ 274.812974][T13630] device syzkaller0 entered promiscuous mode [ 275.343007][T13688] : renamed from bond_slave_0 [ 276.422310][T13730] device wg2 left promiscuous mode [ 276.581892][T13730] device wg2 entered promiscuous mode [ 277.329611][T13800] device syzkaller0 entered promiscuous mode [ 277.714335][ T24] audit: type=1400 audit(1774279902.340:175): avc: denied { create } for pid=13825 comm="syz.4.3936" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=x25_socket permissive=1 [ 278.755163][T13899] device syzkaller0 entered promiscuous mode [ 279.864951][T13942] device pim6reg1 entered promiscuous mode [ 280.225942][T13958] device syzkaller0 entered promiscuous mode [ 284.893277][T14246] ±ÿ: renamed from team_slave_1 [ 285.316540][T14270] device syzkaller0 entered promiscuous mode [ 285.414787][T14277] device syzkaller0 entered promiscuous mode [ 286.350048][T14333] ³þ: renamed from bond_slave_0 [ 286.600315][T14337] device sit0 entered promiscuous mode [ 288.297117][T14426] device syzkaller0 entered promiscuous mode [ 288.653011][T14450] erspan0: refused to change device tx_queue_len [ 288.984243][T14480] device syzkaller0 entered promiscuous mode [ 289.559908][T14533] bridge0: port 1(bridge_slave_0) entered disabled state [ 289.575092][T14533] bridge0: port 1(bridge_slave_0) entered blocking state [ 289.582346][T14533] bridge0: port 1(bridge_slave_0) entered forwarding state [ 289.649407][T14540] FAULT_INJECTION: forcing a failure. [ 289.649407][T14540] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 289.691073][T14540] CPU: 0 PID: 14540 Comm: syz.4.4153 Tainted: G W syzkaller #0 [ 289.700206][T14540] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 289.710393][T14540] Call Trace: [ 289.713730][T14540] __dump_stack+0x21/0x24 [ 289.718079][T14540] dump_stack_lvl+0x1a7/0x208 [ 289.722779][T14540] ? show_regs_print_info+0x18/0x18 [ 289.728297][T14540] ? vfs_write+0xb27/0xdc0 [ 289.732756][T14540] dump_stack+0x15/0x1c [ 289.736933][T14540] should_fail+0x3c1/0x510 [ 289.741371][T14540] should_fail_usercopy+0x1a/0x20 [ 289.746703][T14540] _copy_from_user+0x20/0xd0 [ 289.751591][T14540] __se_sys_bpf+0x1bb/0x740 [ 289.756286][T14540] ? __x64_sys_bpf+0x90/0x90 [ 289.761000][T14540] ? debug_smp_processor_id+0x17/0x20 [ 289.766481][T14540] __x64_sys_bpf+0x7b/0x90 [ 289.770910][T14540] do_syscall_64+0x31/0x40 [ 289.775373][T14540] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 289.781683][T14540] RIP: 0033:0x7fae8e4af799 [ 289.786210][T14540] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 289.807934][T14540] RSP: 002b:00007fae8cf0a028 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 289.816361][T14540] RAX: ffffffffffffffda RBX: 00007fae8e728fa0 RCX: 00007fae8e4af799 [ 289.824618][T14540] RDX: 0000000000000080 RSI: 0000200000000340 RDI: 0000000000000005 [ 289.832970][T14540] RBP: 00007fae8cf0a090 R08: 0000000000000000 R09: 0000000000000000 [ 289.841154][T14540] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 289.849415][T14540] R13: 00007fae8e729038 R14: 00007fae8e728fa0 R15: 00007ffd07183eb8 [ 290.331988][T14582] FAULT_INJECTION: forcing a failure. [ 290.331988][T14582] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 290.389858][T14582] CPU: 1 PID: 14582 Comm: syz.3.4166 Tainted: G W syzkaller #0 [ 290.398939][T14582] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 290.409020][T14582] Call Trace: [ 290.412383][T14582] __dump_stack+0x21/0x24 [ 290.416845][T14582] dump_stack_lvl+0x1a7/0x208 [ 290.421653][T14582] ? show_regs_print_info+0x18/0x18 [ 290.426896][T14582] dump_stack+0x15/0x1c [ 290.431209][T14582] should_fail+0x3c1/0x510 [ 290.435686][T14582] should_fail_usercopy+0x1a/0x20 [ 290.440841][T14582] strncpy_from_user+0x24/0x2e0 [ 290.445720][T14582] bpf_prog_load+0x18c/0x14a0 [ 290.450464][T14582] ? avc_has_perm_noaudit+0x260/0x260 [ 290.455901][T14582] ? map_freeze+0x320/0x320 [ 290.460424][T14582] ? vfs_write+0xb27/0xdc0 [ 290.464872][T14582] ? selinux_bpf+0xc7/0xf0 [ 290.469446][T14582] ? security_bpf+0x82/0xa0 [ 290.473974][T14582] __se_sys_bpf+0x49a/0x740 [ 290.478505][T14582] ? __x64_sys_bpf+0x90/0x90 [ 290.483151][T14582] ? debug_smp_processor_id+0x17/0x20 [ 290.488772][T14582] __x64_sys_bpf+0x7b/0x90 [ 290.493354][T14582] do_syscall_64+0x31/0x40 [ 290.497822][T14582] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 290.503840][T14582] RIP: 0033:0x7f8b99939799 [ 290.508292][T14582] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 290.528279][T14582] RSP: 002b:00007f8b98394028 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 290.537014][T14582] RAX: ffffffffffffffda RBX: 00007f8b99bb2fa0 RCX: 00007f8b99939799 [ 290.546440][T14582] RDX: 0000000000000080 RSI: 0000200000000340 RDI: 0000000000000005 [ 290.554716][T14582] RBP: 00007f8b98394090 R08: 0000000000000000 R09: 0000000000000000 [ 290.562888][T14582] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 290.570979][T14582] R13: 00007f8b99bb3038 R14: 00007f8b99bb2fa0 R15: 00007fff0363e9b8 [ 290.781648][T14588] device wg2 left promiscuous mode [ 290.875159][T14588] device wg2 entered promiscuous mode [ 291.141933][T14603] device syzkaller0 entered promiscuous mode [ 291.186379][T14619] FAULT_INJECTION: forcing a failure. [ 291.186379][T14619] name failslab, interval 1, probability 0, space 0, times 0 [ 291.199389][T14619] CPU: 1 PID: 14619 Comm: syz.2.4177 Tainted: G W syzkaller #0 [ 291.208275][T14619] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 291.218599][T14619] Call Trace: [ 291.222043][T14619] __dump_stack+0x21/0x24 [ 291.226663][T14619] dump_stack_lvl+0x1a7/0x208 [ 291.231459][T14619] ? thaw_kernel_threads+0x220/0x220 [ 291.237105][T14619] ? show_regs_print_info+0x18/0x18 [ 291.242527][T14619] ? unwind_get_return_address+0x4d/0x90 [ 291.248187][T14619] ? stack_trace_save+0xf0/0xf0 [ 291.253576][T14619] dump_stack+0x15/0x1c [ 291.257766][T14619] should_fail+0x3c1/0x510 [ 291.262224][T14619] ? __get_vm_area_node+0x113/0x450 [ 291.267453][T14619] __should_failslab+0xa4/0xe0 [ 291.272229][T14619] should_failslab+0x9/0x20 [ 291.276835][T14619] kmem_cache_alloc_trace+0x3a/0x2e0 [ 291.282142][T14619] __get_vm_area_node+0x113/0x450 [ 291.287171][T14619] __vmalloc_node_range+0xe0/0x790 [ 291.292291][T14619] ? bpf_prog_alloc_no_stats+0x3b/0x250 [ 291.298003][T14619] ? _kstrtoull+0x3c0/0x4d0 [ 291.302531][T14619] ? bpf_prog_alloc_no_stats+0x3b/0x250 [ 291.308078][T14619] __vmalloc+0x79/0x90 [ 291.312156][T14619] ? bpf_prog_alloc_no_stats+0x3b/0x250 [ 291.317707][T14619] bpf_prog_alloc_no_stats+0x3b/0x250 [ 291.323084][T14619] ? bpf_prog_alloc+0x17/0x1f0 [ 291.327970][T14619] bpf_prog_alloc+0x21/0x1f0 [ 291.332569][T14619] bpf_prog_load+0x7c4/0x14a0 [ 291.337267][T14619] ? map_freeze+0x320/0x320 [ 291.341962][T14619] ? vfs_write+0xb27/0xdc0 [ 291.346390][T14619] ? selinux_bpf+0xc7/0xf0 [ 291.350811][T14619] ? security_bpf+0x82/0xa0 [ 291.355440][T14619] __se_sys_bpf+0x49a/0x740 [ 291.359956][T14619] ? __x64_sys_bpf+0x90/0x90 [ 291.364567][T14619] ? debug_smp_processor_id+0x17/0x20 [ 291.369943][T14619] __x64_sys_bpf+0x7b/0x90 [ 291.374389][T14619] do_syscall_64+0x31/0x40 [ 291.378811][T14619] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 291.384707][T14619] RIP: 0033:0x7f61888f1799 [ 291.389133][T14619] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 291.409104][T14619] RSP: 002b:00007f618734c028 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 291.417884][T14619] RAX: ffffffffffffffda RBX: 00007f6188b6afa0 RCX: 00007f61888f1799 [ 291.426333][T14619] RDX: 0000000000000080 RSI: 0000200000000340 RDI: 0000000000000005 [ 291.434594][T14619] RBP: 00007f618734c090 R08: 0000000000000000 R09: 0000000000000000 [ 291.442766][T14619] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 291.450755][T14619] R13: 00007f6188b6b038 R14: 00007f6188b6afa0 R15: 00007fffd9d011b8 [ 291.461126][T14619] syz.2.4177: vmalloc: allocation failure: 4096 bytes, mode:0x100dc0(GFP_USER|__GFP_ZERO), nodemask=(null),cpuset=syz2,mems_allowed=0 [ 291.476232][T14619] CPU: 0 PID: 14619 Comm: syz.2.4177 Tainted: G W syzkaller #0 [ 291.485116][T14619] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 291.495186][T14619] Call Trace: [ 291.498584][T14619] __dump_stack+0x21/0x24 [ 291.502927][T14619] dump_stack_lvl+0x1a7/0x208 [ 291.507617][T14619] ? show_regs_print_info+0x18/0x18 [ 291.512824][T14619] ? pr_cont_kernfs_name+0xe3/0xf0 [ 291.518050][T14619] dump_stack+0x15/0x1c [ 291.522212][T14619] warn_alloc+0x1dc/0x200 [ 291.526547][T14619] ? __get_vm_area_node+0x113/0x450 [ 291.531772][T14619] ? zone_watermark_ok_safe+0x250/0x250 [ 291.537349][T14619] ? __get_vm_area_node+0x345/0x450 [ 291.542561][T14619] __vmalloc_node_range+0x27d/0x790 [ 291.547783][T14619] ? _kstrtoull+0x3c0/0x4d0 [ 291.552309][T14619] ? bpf_prog_alloc_no_stats+0x3b/0x250 [ 291.557870][T14619] __vmalloc+0x79/0x90 [ 291.561949][T14619] ? bpf_prog_alloc_no_stats+0x3b/0x250 [ 291.567503][T14619] bpf_prog_alloc_no_stats+0x3b/0x250 [ 291.573142][T14619] ? bpf_prog_alloc+0x17/0x1f0 [ 291.577915][T14619] bpf_prog_alloc+0x21/0x1f0 [ 291.582629][T14619] bpf_prog_load+0x7c4/0x14a0 [ 291.587587][T14619] ? map_freeze+0x320/0x320 [ 291.592100][T14619] ? vfs_write+0xb27/0xdc0 [ 291.596529][T14619] ? selinux_bpf+0xc7/0xf0 [ 291.600967][T14619] ? security_bpf+0x82/0xa0 [ 291.605670][T14619] __se_sys_bpf+0x49a/0x740 [ 291.610189][T14619] ? __x64_sys_bpf+0x90/0x90 [ 291.614797][T14619] ? debug_smp_processor_id+0x17/0x20 [ 291.620203][T14619] __x64_sys_bpf+0x7b/0x90 [ 291.624629][T14619] do_syscall_64+0x31/0x40 [ 291.629150][T14619] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 291.635262][T14619] RIP: 0033:0x7f61888f1799 [ 291.639689][T14619] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 291.659477][T14619] RSP: 002b:00007f618734c028 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 291.667902][T14619] RAX: ffffffffffffffda RBX: 00007f6188b6afa0 RCX: 00007f61888f1799 [ 291.675882][T14619] RDX: 0000000000000080 RSI: 0000200000000340 RDI: 0000000000000005 [ 291.683864][T14619] RBP: 00007f618734c090 R08: 0000000000000000 R09: 0000000000000000 [ 291.691871][T14619] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 291.699951][T14619] R13: 00007f6188b6b038 R14: 00007f6188b6afa0 R15: 00007fffd9d011b8 [ 291.708752][T14619] Mem-Info: [ 291.712162][T14619] active_anon:38 inactive_anon:19978 isolated_anon:0 [ 291.712162][T14619] active_file:24695 inactive_file:3789 isolated_file:0 [ 291.712162][T14619] unevictable:0 dirty:51 writeback:0 [ 291.712162][T14619] slab_reclaimable:7617 slab_unreclaimable:78631 [ 291.712162][T14619] mapped:29285 shmem:163 pagetables:632 bounce:0 [ 291.712162][T14619] free:1542249 free_pcp:980 free_cma:0 [ 291.792202][T14619] Node 0 active_anon:152kB inactive_anon:79812kB active_file:98780kB inactive_file:15156kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:116940kB dirty:204kB writeback:0kB shmem:652kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 0kB writeback_tmp:0kB kernel_stack:6976kB all_unreclaimable? no [ 291.821576][T14619] DMA32 free:2985148kB min:62644kB low:78304kB high:93964kB reserved_highatomic:0KB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:3145324kB managed:2986532kB mlocked:0kB pagetables:0kB bounce:0kB free_pcp:1384kB local_pcp:0kB free_cma:0kB [ 291.852196][T14619] lowmem_reserve[]: 0 3941 3941 [ 291.857208][T14619] Normal free:3186436kB min:84808kB low:106008kB high:127208kB reserved_highatomic:0KB active_anon:152kB inactive_anon:79812kB active_file:98780kB inactive_file:15156kB unevictable:0kB writepending:204kB present:5242880kB managed:4036112kB mlocked:0kB pagetables:2528kB bounce:0kB free_pcp:1684kB local_pcp:524kB free_cma:0kB [ 291.889441][T14619] lowmem_reserve[]: 0 0 0 [ 291.893902][T14619] DMA32: 7*4kB (UM) 4*8kB (M) 2*16kB (M) 7*32kB (UM) 8*64kB (UM) 5*128kB (UM) 7*256kB (UM) 6*512kB (M) 5*1024kB (UM) 4*2048kB (UM) 724*4096kB (M) = 2985148kB [ 291.961390][T14619] Normal: 908*4kB (UME) 530*8kB (UME) 1756*16kB (UME) 1158*32kB (UME) 998*64kB (UME) 606*128kB (UME) 173*256kB (UM) 57*512kB (UM) 24*1024kB (ME) 9*2048kB (UM) 697*4096kB (UM) = 3185856kB [ 291.987716][T14619] 28647 total pagecache pages [ 292.022266][T14619] 0 pages in swap cache [ 292.026481][T14619] Swap cache stats: add 0, delete 0, find 0/0 [ 292.083573][T14619] Free swap = 124996kB [ 292.087888][T14619] Total swap = 124996kB [ 292.134127][T14619] 2097051 pages RAM [ 292.138000][T14619] 0 pages HighMem/MovableOnly [ 292.143130][T14619] 341390 pages reserved [ 292.147403][T14619] 0 pages cma reserved [ 293.645269][T14755] device syzkaller0 entered promiscuous mode [ 293.662565][T14758] syzkaller0: create flow: hash 2957307496 index 0 [ 293.823268][ T1820] syzkaller0: tun_net_xmit 48 [ 293.980478][T14758] syzkaller0 (unregistered): delete flow: hash 2957307496 index 0 [ 294.018054][T14769] sock: sock_set_timeout: `syz.4.4222' (pid 14769) tries to set negative timeout [ 295.101635][T14850] device syzkaller0 entered promiscuous mode [ 295.593559][T14891] device veth1_to_team entered promiscuous mode [ 298.427516][T15018] syzkaller0: default qdisc (pfifo_fast) fail, fallback to noqueue [ 298.566556][T15018] device syzkaller0 entered promiscuous mode [ 300.203488][T15116] device syzkaller0 entered promiscuous mode [ 300.294630][T15125] syz.1.4326[15125] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 300.294697][T15125] syz.1.4326[15125] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 300.641626][T15162] sock: sock_set_timeout: `syz.1.4337' (pid 15162) tries to set negative timeout [ 302.968967][T15290] device syzkaller0 entered promiscuous mode [ 303.147725][T15330] device syzkaller0 entered promiscuous mode [ 303.330551][T15345] device syzkaller0 entered promiscuous mode [ 303.382924][T15347] tap0: tun_chr_ioctl cmd 1074025675 [ 303.388511][T15347] tap0: persist disabled [ 303.393278][T15347] tap0: tun_chr_ioctl cmd 1074025675 [ 303.399049][T15347] tap0: persist disabled [ 303.404359][T15347] tap0: tun_chr_ioctl cmd 2147767521 [ 305.448950][T15443] device syzkaller0 entered promiscuous mode [ 305.571203][T15448] bridge0: port 3(gretap0) entered disabled state [ 305.577773][T15448] bridge0: port 2(bridge_slave_1) entered disabled state [ 305.585178][T15448] bridge0: port 1(bridge_slave_0) entered disabled state [ 305.606613][T15448] bridge0: port 3(gretap0) entered blocking state [ 305.613138][T15448] bridge0: port 3(gretap0) entered forwarding state [ 305.619947][T15448] bridge0: port 2(bridge_slave_1) entered blocking state [ 305.627065][T15448] bridge0: port 2(bridge_slave_1) entered forwarding state [ 305.634826][T15448] bridge0: port 1(bridge_slave_0) entered blocking state [ 305.642012][T15448] bridge0: port 1(bridge_slave_0) entered forwarding state [ 305.650081][T15448] device bridge0 entered promiscuous mode [ 307.103075][T15498] IPv6: pim6reg1: Disabled Multicast RS [ 307.186592][ T24] audit: type=1400 audit(1774279931.810:176): avc: denied { create } for pid=15497 comm="syz.3.4431" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_crypto_socket permissive=1 [ 307.474272][ T24] audit: type=1400 audit(1774279932.100:177): avc: denied { create } for pid=15533 comm="syz.4.4444" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rxrpc_socket permissive=1 [ 307.992922][T15555] device syzkaller0 entered promiscuous mode [ 308.230656][T15559] device syzkaller0 entered promiscuous mode [ 308.367827][T15568] device syzkaller0 entered promiscuous mode [ 308.389967][T15559] syzkaller0: create flow: hash 3627982423 index 2 [ 308.407345][T15559] syzkaller0: delete flow: hash 3627982423 index 2 [ 309.446145][T15662] device syzkaller0 entered promiscuous mode [ 309.820610][T15710] device syzkaller0 entered promiscuous mode [ 310.272636][T15753] device sit0 entered promiscuous mode [ 310.305626][T15754] ªªªªªª: renamed from vlan0 [ 310.886118][T15835] device wg2 left promiscuous mode [ 311.075599][T15835] device wg2 entered promiscuous mode [ 311.406858][T15865] Â: renamed from pim6reg1 [ 313.227280][T15934] device wg2 left promiscuous mode [ 313.399701][T15930] device syzkaller0 entered promiscuous mode [ 313.994402][T15989] device syzkaller0 entered promiscuous mode [ 314.273550][T16007] device dummy0 entered promiscuous mode [ 314.996985][T16047] device syzkaller0 entered promiscuous mode [ 318.432112][T16221] device veth1_macvtap entered promiscuous mode [ 318.439624][T16221] device macsec0 entered promiscuous mode [ 318.452765][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 318.665447][T16229] device syzkaller0 entered promiscuous mode [ 319.493581][T16253] syzkaller0: default qdisc (pfifo_fast) fail, fallback to noqueue [ 319.518783][T16253] device syzkaller0 entered promiscuous mode [ 321.734844][ T24] audit: type=1400 audit(1774279946.350:178): avc: denied { create } for pid=16378 comm="syz.2.4693" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 323.183587][T16478] device syzkaller0 entered promiscuous mode [ 323.281092][T16485] device syzkaller0 entered promiscuous mode [ 323.978112][T16516] device syzkaller0 entered promiscuous mode [ 324.279420][T16518] device sit0 left promiscuous mode [ 324.658462][T16523] device sit0 entered promiscuous mode [ 324.837517][T16558] ip6_tunnel: non-ECT from db5b:6861:58bb:cfe8:875a:6596:9ff5:7b00 with DS=0x37 [ 326.098739][T16629] device syzkaller0 entered promiscuous mode [ 327.587529][T16725] device syzkaller0 entered promiscuous mode [ 328.212051][T16788] device syzkaller0 entered promiscuous mode [ 328.736426][T16811] device syzkaller0 entered promiscuous mode [ 329.185207][T16809] device syzkaller0 entered promiscuous mode [ 329.397498][T16820] device syzkaller0 entered promiscuous mode [ 330.232772][T16890] bridge0: port 2(bridge_slave_1) entered disabled state [ 330.239973][T16890] bridge0: port 1(bridge_slave_0) entered disabled state [ 330.247508][T16890] device bridge0 left promiscuous mode [ 330.300903][T16890] bridge0: port 2(bridge_slave_1) entered blocking state [ 330.308008][T16890] bridge0: port 2(bridge_slave_1) entered forwarding state [ 330.315456][T16890] bridge0: port 1(bridge_slave_0) entered blocking state [ 330.322658][T16890] bridge0: port 1(bridge_slave_0) entered forwarding state [ 330.332152][T16890] device bridge0 entered promiscuous mode [ 330.430485][T16905] @ÿ: renamed from bond_slave_0 [ 330.878040][T16954] device syzkaller0 entered promiscuous mode [ 330.990012][ T24] audit: type=1400 audit(1774279955.610:179): avc: denied { create } for pid=16969 comm="syz.4.4868" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_connector_socket permissive=1 [ 332.495844][T17047] device syzkaller0 entered promiscuous mode [ 333.081135][T17067] syzkaller0: tun_chr_ioctl cmd 2147767517 [ 333.251068][T17078] tap0: tun_chr_ioctl cmd 1074025675 [ 333.256551][T17078] tap0: persist enabled [ 333.274814][T17079] tap0: tun_chr_ioctl cmd 1074025675 [ 333.280466][T17079] tap0: persist enabled [ 333.285074][T17078] tap0: tun_chr_ioctl cmd 1074025675 [ 333.290757][T17078] tap0: persist enabled [ 333.539748][T17102] device syzkaller0 entered promiscuous mode [ 334.735887][T17154] device syzkaller0 entered promiscuous mode [ 334.770432][T17154] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 335.036667][T17179] device syzkaller0 entered promiscuous mode [ 337.293281][T17296] device syzkaller0 entered promiscuous mode [ 338.442385][T17360] tap0: tun_chr_ioctl cmd 1074025692 [ 339.427412][T17413] device syzkaller0 entered promiscuous mode [ 339.505014][T17421] device syzkaller0 entered promiscuous mode [ 340.197018][T17469] device syzkaller0 entered promiscuous mode [ 341.896816][T17637] device syzkaller0 entered promiscuous mode [ 342.524617][T17667] bridge0: port 2(bridge_slave_1) entered disabled state [ 342.531918][T17667] bridge0: port 1(bridge_slave_0) entered disabled state [ 342.549326][T17667] device bridge0 left promiscuous mode [ 342.569490][T17667] bridge0: port 2(bridge_slave_1) entered blocking state [ 342.576704][T17667] bridge0: port 2(bridge_slave_1) entered forwarding state [ 342.584064][T17667] bridge0: port 1(bridge_slave_0) entered blocking state [ 342.591137][T17667] bridge0: port 1(bridge_slave_0) entered forwarding state [ 342.605481][T17667] device bridge0 entered promiscuous mode [ 343.053175][T17703] device syzkaller0 entered promiscuous mode [ 343.484126][T17735] syzkaller1: tun_chr_ioctl cmd 21731 [ 343.518980][T17730] syzkaller1: tun_chr_ioctl cmd 2147767520 [ 343.552537][T17730] syzkaller1: tun_chr_ioctl cmd 2147767521 [ 344.045868][T17774] device syzkaller0 entered promiscuous mode [ 344.746622][T17809] tun0: tun_chr_ioctl cmd 2147767506 [ 345.656022][T17872] device syzkaller0 entered promiscuous mode [ 346.591207][T17896] syzkaller1: tun_chr_ioctl cmd 21731 [ 346.672143][T17894] syzkaller1: tun_chr_ioctl cmd 2147767520 [ 346.747677][T17901] device wg2 left promiscuous mode [ 346.756970][T17894] syzkaller1: tun_chr_ioctl cmd 2147767521 [ 346.866571][T17907] device wg2 entered promiscuous mode [ 347.429563][T17928] device syzkaller0 entered promiscuous mode [ 347.480318][T17926] device wg2 entered promiscuous mode [ 349.578912][T18051] device syzkaller0 entered promiscuous mode [ 351.088227][T18179] batadv0: tun_chr_ioctl cmd 1074025684 [ 352.101181][T18236] device veth1_macvtap left promiscuous mode [ 352.112046][T18236] device macsec0 left promiscuous mode [ 352.157628][T18236] device veth1_macvtap entered promiscuous mode [ 352.186950][T18236] device macsec0 entered promiscuous mode [ 352.196730][T18236] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 352.208170][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 352.271048][T18249] device sit0 entered promiscuous mode [ 353.108580][T18300] device syzkaller0 entered promiscuous mode [ 353.190064][T18304] tun0: tun_chr_ioctl cmd 1074025676 [ 353.195978][T18304] tun0: owner set to 0 [ 353.327598][T18304] device syzkaller0 entered promiscuous mode [ 353.423534][T18308] device syzkaller0 entered promiscuous mode [ 353.464819][ T1428] syzkaller0: tun_net_xmit 48 [ 353.478314][T18315] device pim6reg1 entered promiscuous mode [ 354.801857][T18372] syzkaller0: tun_net_xmit 1280 [ 354.870531][T18372] syzkaller0: create flow: hash 3710050135 index 3 [ 354.907146][T18375] Ÿë: port 1(veth0_to_team) entered blocking state [ 354.925228][T18375] Ÿë: port 1(veth0_to_team) entered disabled state [ 354.954087][T18375] device veth0_to_team entered promiscuous mode [ 355.007685][T18371] syzkaller0: delete flow: hash 3710050135 index 3 [ 357.074053][T18478] device wg2 left promiscuous mode [ 358.147393][T18519] device dummy0 entered promiscuous mode [ 359.889660][T18572] FAULT_INJECTION: forcing a failure. [ 359.889660][T18572] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 359.912650][T18572] CPU: 1 PID: 18572 Comm: syz.1.5368 Tainted: G W syzkaller #0 [ 359.921553][T18572] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 359.931637][T18572] Call Trace: [ 359.935059][T18572] __dump_stack+0x21/0x24 [ 359.939421][T18572] dump_stack_lvl+0x1a7/0x208 [ 359.944126][T18572] ? show_regs_print_info+0x18/0x18 [ 359.949502][T18572] ? slab_post_alloc_hook+0x5d/0x2f0 [ 359.954821][T18572] ? __alloc_skb+0x9e/0x520 [ 359.959353][T18572] ? alloc_skb_with_frags+0xa2/0x560 [ 359.964853][T18572] ? sock_alloc_send_pskb+0x87f/0x9a0 [ 359.970782][T18572] ? tun_chr_write_iter+0x1bf/0x270 [ 359.976193][T18572] dump_stack+0x15/0x1c [ 359.980833][T18572] should_fail+0x3c1/0x510 [ 359.985280][T18572] should_fail_alloc_page+0x4f/0x60 [ 359.990730][T18572] __alloc_pages_nodemask+0x119/0x620 [ 359.996136][T18572] ? gfp_pfmemalloc_allowed+0x130/0x130 [ 360.001703][T18572] kmalloc_order+0x4c/0x160 [ 360.006221][T18572] ? slab_post_alloc_hook+0x7d/0x2f0 [ 360.011984][T18572] kmalloc_order_trace+0x16/0x80 [ 360.017054][T18572] __kmalloc_track_caller+0x1d4/0x320 [ 360.022547][T18572] ? __alloc_skb+0x9e/0x520 [ 360.027164][T18572] ? alloc_skb_with_frags+0xa2/0x560 [ 360.032580][T18572] __alloc_skb+0xdc/0x520 [ 360.036944][T18572] alloc_skb_with_frags+0xa2/0x560 [ 360.042088][T18572] sock_alloc_send_pskb+0x87f/0x9a0 [ 360.047320][T18572] ? sock_kzfree_s+0x60/0x60 [ 360.051972][T18572] ? stack_trace_save+0xa6/0xf0 [ 360.057162][T18572] ? stack_trace_snprint+0xf0/0xf0 [ 360.062301][T18572] tun_get_user+0xb4e/0x3270 [ 360.066917][T18572] ? putname+0xfe/0x150 [ 360.071111][T18572] ? tun_do_read+0x1c70/0x1c70 [ 360.075903][T18572] ? kstrtouint_from_user+0x1c4/0x220 [ 360.081299][T18572] ? __fsnotify_parent+0x6d2/0x7c0 [ 360.086435][T18572] ? avc_policy_seqno+0x1b/0x70 [ 360.091584][T18572] ? selinux_file_permission+0x2a5/0x510 [ 360.097248][T18572] ? fsnotify_perm+0x66/0x4b0 [ 360.101956][T18572] tun_chr_write_iter+0x1bf/0x270 [ 360.107001][T18572] vfs_write+0x758/0xdc0 [ 360.111401][T18572] ? perf_trace_kmem_free+0x3f/0x110 [ 360.116925][T18572] ? kernel_write+0x3c0/0x3c0 [ 360.121808][T18572] ? __fget_files+0x2c4/0x320 [ 360.126513][T18572] ? __fdget_pos+0x1f7/0x380 [ 360.131135][T18572] ? ksys_write+0x71/0x250 [ 360.136021][T18572] ksys_write+0x149/0x250 [ 360.140392][T18572] ? __ia32_sys_read+0x90/0x90 [ 360.145189][T18572] ? debug_smp_processor_id+0x17/0x20 [ 360.150684][T18572] __x64_sys_write+0x7b/0x90 [ 360.155392][T18572] do_syscall_64+0x31/0x40 [ 360.159931][T18572] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 360.165868][T18572] RIP: 0033:0x7fb39c61e799 [ 360.170403][T18572] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 360.190179][T18572] RSP: 002b:00007fb39b079028 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 360.198726][T18572] RAX: ffffffffffffffda RBX: 00007fb39c897fa0 RCX: 00007fb39c61e799 [ 360.206867][T18572] RDX: 000000000000cfa4 RSI: 00002000000006c0 RDI: 00000000000000c8 [ 360.214884][T18572] RBP: 00007fb39b079090 R08: 0000000000000000 R09: 0000000000000000 [ 360.222880][T18572] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 360.230876][T18572] R13: 00007fb39c898038 R14: 00007fb39c897fa0 R15: 00007fff95fcaa58 [ 360.364352][T18584] device syzkaller0 entered promiscuous mode [ 360.971185][T18581] device syzkaller0 entered promiscuous mode [ 361.994707][T18643] device syzkaller0 entered promiscuous mode [ 363.491502][T18740] -: renamed from syzkaller0 [ 363.677056][T18745] device syzkaller0 entered promiscuous mode [ 363.757494][T18748] device wg2 left promiscuous mode [ 363.831625][T18753] device wg2 entered promiscuous mode [ 364.101577][T18768] syzkaller1: tun_chr_ioctl cmd 21731 [ 364.107423][T18768] syzkaller1: tun_chr_ioctl cmd 2147767520 [ 364.283662][T18777] device syzkaller0 entered promiscuous mode [ 364.804781][T18813] device pim6reg1 entered promiscuous mode [ 365.719285][T18871] device syzkaller0 entered promiscuous mode [ 366.768219][T18911] FAULT_INJECTION: forcing a failure. [ 366.768219][T18911] name failslab, interval 1, probability 0, space 0, times 0 [ 366.780923][T18911] CPU: 1 PID: 18911 Comm: syz.4.5467 Tainted: G W syzkaller #0 [ 366.789811][T18911] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 366.799907][T18911] Call Trace: [ 366.803224][T18911] __dump_stack+0x21/0x24 [ 366.807583][T18911] dump_stack_lvl+0x1a7/0x208 [ 366.812277][T18911] ? thaw_kernel_threads+0x220/0x220 [ 366.817660][T18911] ? show_regs_print_info+0x18/0x18 [ 366.822875][T18911] ? stack_trace_save+0xa6/0xf0 [ 366.827786][T18911] ? stack_trace_snprint+0xf0/0xf0 [ 366.832923][T18911] dump_stack+0x15/0x1c [ 366.837091][T18911] should_fail+0x3c1/0x510 [ 366.841528][T18911] ? __alloc_skb+0x9e/0x520 [ 366.846047][T18911] __should_failslab+0xa4/0xe0 [ 366.850844][T18911] should_failslab+0x9/0x20 [ 366.855371][T18911] kmem_cache_alloc+0x3d/0x2d0 [ 366.860146][T18911] ? ip6_input+0xda/0x210 [ 366.864489][T18911] __alloc_skb+0x9e/0x520 [ 366.868833][T18911] ? ipv6_get_lladdr+0x1be/0x200 [ 366.873877][T18911] ndisc_send_ns+0x34b/0xb00 [ 366.878575][T18911] ? ndisc_send_skb+0xbe0/0xbe0 [ 366.883576][T18911] ? ipv6_chk_addr_and_flags+0x3e/0x60 [ 366.889054][T18911] ndisc_solicit+0x312/0x450 [ 366.893664][T18911] ? ndisc_cleanup+0x40/0x40 [ 366.898454][T18911] ? skb_clone+0x21c/0x380 [ 366.902885][T18911] ? ndisc_cleanup+0x40/0x40 [ 366.907512][T18911] __neigh_event_send+0xc3b/0x1100 [ 366.912747][T18911] ? __kmalloc_track_caller+0x17e/0x320 [ 366.918317][T18911] neigh_resolve_output+0x1e1/0x770 [ 366.923626][T18911] ? __kasan_check_read+0x11/0x20 [ 366.928671][T18911] ? selinux_ip_postroute+0x2b9/0xe90 [ 366.934074][T18911] ? selinux_ipv6_output+0x10/0x10 [ 366.939493][T18911] ip6_finish_output2+0xef7/0x1560 [ 366.944636][T18911] ? __ip6_finish_output+0x790/0x790 [ 366.950035][T18911] ? __cgroup_bpf_run_filter_skb+0xedd/0x10a0 [ 366.956139][T18911] __ip6_finish_output+0x5ff/0x790 [ 366.961289][T18911] ip6_finish_output+0x33/0x1f0 [ 366.966166][T18911] ip6_output+0x1fa/0x420 [ 366.970544][T18911] ? ac6_seq_show+0xf0/0xf0 [ 366.975085][T18911] ? ip6_output+0x420/0x420 [ 366.979665][T18911] ? ip6table_filter_table_init+0xf0/0xf0 [ 366.985501][T18911] ip6_local_out+0x1fe/0x3d0 [ 366.990112][T18911] ? dst_output+0x80/0x80 [ 366.994459][T18911] ? __ip6_local_out+0x3a0/0x3a0 [ 366.999431][T18911] ip6_push_pending_frames+0x142/0x280 [ 367.005107][T18911] icmpv6_push_pending_frames+0x29f/0x440 [ 367.010846][T18911] icmp6_send+0x122d/0x1830 [ 367.015377][T18911] ? icmpv6_push_pending_frames+0x440/0x440 [ 367.021302][T18911] ? gre_parse_header+0xbdd/0x1470 [ 367.026531][T18911] ? __iptunnel_pull_header+0x7c2/0x800 [ 367.032359][T18911] gre_rcv+0xb5b/0x1110 [ 367.036691][T18911] ? erspan_build_header_v2+0x4c0/0x4c0 [ 367.042357][T18911] ? rawv6_mh_filter_unregister+0x20/0x20 [ 367.048103][T18911] ? ip6t_alloc_initial_table+0x660/0x660 [ 367.053855][T18911] ip6_protocol_deliver_rcu+0x878/0x1340 [ 367.059520][T18911] ip6_input+0xda/0x210 [ 367.063703][T18911] ? ip6_protocol_deliver_rcu+0x1340/0x1340 [ 367.069700][T18911] ? ip6_input+0x210/0x210 [ 367.074143][T18911] ? ip6table_raw_hook+0x6a/0x80 [ 367.079098][T18911] ? ip6table_mangle_net_exit+0x80/0x80 [ 367.084666][T18911] ip6_rcv_finish+0x18c/0x360 [ 367.089446][T18911] ipv6_rcv+0xf0/0x230 [ 367.093533][T18911] ? ip6_rcv_finish+0x360/0x360 [ 367.098524][T18911] ? refcount_add+0x80/0x80 [ 367.103066][T18911] ? ip6_rcv_finish+0x360/0x360 [ 367.107953][T18911] __netif_receive_skb+0xc8/0x280 [ 367.113036][T18911] ? asm_exc_page_fault+0x1e/0x30 [ 367.118068][T18911] netif_receive_skb+0x9b/0x3f0 [ 367.122926][T18911] ? netif_receive_skb_core+0x100/0x100 [ 367.128599][T18911] ? virtio_net_hdr_to_skb+0x6de/0x10d0 [ 367.134239][T18911] tun_rx_batched+0x5f6/0x730 [ 367.138921][T18911] ? local_bh_enable+0x30/0x30 [ 367.143692][T18911] ? stack_trace_save+0xa6/0xf0 [ 367.148561][T18911] tun_get_user+0x277a/0x3270 [ 367.153505][T18911] ? putname+0xfe/0x150 [ 367.157670][T18911] ? tun_do_read+0x1c70/0x1c70 [ 367.162443][T18911] ? kstrtouint_from_user+0x1c4/0x220 [ 367.167992][T18911] ? __fsnotify_parent+0x6d2/0x7c0 [ 367.173114][T18911] ? avc_policy_seqno+0x1b/0x70 [ 367.177986][T18911] ? selinux_file_permission+0x2a5/0x510 [ 367.183644][T18911] ? fsnotify_perm+0x66/0x4b0 [ 367.188438][T18911] tun_chr_write_iter+0x1bf/0x270 [ 367.193477][T18911] vfs_write+0x758/0xdc0 [ 367.197731][T18911] ? kernel_write+0x3c0/0x3c0 [ 367.202414][T18911] ? __fget_files+0x2c4/0x320 [ 367.207203][T18911] ? __fdget_pos+0x1f7/0x380 [ 367.211822][T18911] ? ksys_write+0x71/0x250 [ 367.216244][T18911] ksys_write+0x149/0x250 [ 367.220579][T18911] ? __ia32_sys_read+0x90/0x90 [ 367.225348][T18911] ? debug_smp_processor_id+0x17/0x20 [ 367.230730][T18911] __x64_sys_write+0x7b/0x90 [ 367.235450][T18911] do_syscall_64+0x31/0x40 [ 367.239968][T18911] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 367.245893][T18911] RIP: 0033:0x7fae8e4af799 [ 367.250318][T18911] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 367.269935][T18911] RSP: 002b:00007fae8cf0a028 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 367.278617][T18911] RAX: ffffffffffffffda RBX: 00007fae8e728fa0 RCX: 00007fae8e4af799 [ 367.286709][T18911] RDX: 000000000000cfa4 RSI: 00002000000006c0 RDI: 00000000000000c8 [ 367.294991][T18911] RBP: 00007fae8cf0a090 R08: 0000000000000000 R09: 0000000000000000 [ 367.303065][T18911] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 367.311139][T18911] R13: 00007fae8e729038 R14: 00007fae8e728fa0 R15: 00007ffd07183eb8 [ 367.936732][T18946] device syzkaller0 entered promiscuous mode [ 368.541240][T18996] syzkaller0: tun_chr_ioctl cmd 2147767519 [ 368.605491][T19000] -: renamed from syzkaller0 [ 368.866933][T19034] device syzkaller0 entered promiscuous mode [ 368.980631][T19048] bridge0: port 2(bridge_slave_1) entered disabled state [ 368.988012][T19048] bridge0: port 1(bridge_slave_0) entered disabled state [ 369.054084][T19049] bridge0: port 2(bridge_slave_1) entered blocking state [ 369.061227][T19049] bridge0: port 2(bridge_slave_1) entered forwarding state [ 369.068677][T19049] bridge0: port 1(bridge_slave_0) entered blocking state [ 369.075765][T19049] bridge0: port 1(bridge_slave_0) entered forwarding state [ 369.110742][T19049] device bridge0 entered promiscuous mode [ 369.974936][T19105] device syzkaller0 entered promiscuous mode [ 370.643090][T19141] syzkaller0: default qdisc (pfifo_fast) fail, fallback to noqueue [ 370.704473][T19141] device syzkaller0 entered promiscuous mode [ 370.986887][T19150] syzkaller0: tun_chr_ioctl cmd 1074025677 [ 370.996062][T19150] syzkaller0: linktype set to 773 [ 371.271720][T19191] batadv0: tun_chr_ioctl cmd 1074025673 [ 371.286629][T19190] batadv0: tun_chr_ioctl cmd 1074025677 [ 371.298895][T19190] batadv0: linktype set to 776 [ 371.308338][T19191] batadv0: tun_chr_ioctl cmd 1074025677 [ 371.325139][T19191] batadv0: linktype set to 776 [ 371.404631][T19203] device sit0 left promiscuous mode [ 372.311517][T19263] device sit0 left promiscuous mode [ 372.352975][T19262] device sit0 entered promiscuous mode [ 373.616448][T19331] device syzkaller0 entered promiscuous mode [ 375.630334][T19479] syzkaller0: tun_chr_ioctl cmd 1074812117 [ 376.430913][T19479] device syzkaller0 entered promiscuous mode [ 376.460554][T19490] Â: renamed from pim6reg1 [ 376.485435][T19509] device syzkaller0 entered promiscuous mode [ 376.497167][ T2325] syzkaller0: tun_net_xmit 48 [ 377.068871][T19584] bridge0: port 2(bridge_slave_1) entered disabled state [ 377.076094][T19584] bridge0: port 1(bridge_slave_0) entered disabled state [ 377.090005][T19584] device bridge0 left promiscuous mode [ 377.099160][T19588] device bridge_slave_1 left promiscuous mode [ 377.106905][T19588] bridge0: port 2(bridge_slave_1) entered disabled state [ 377.114791][T19588] bridge0: port 1(bridge_slave_0) entered disabled state [ 377.230433][T19599] device syzkaller0 entered promiscuous mode [ 378.348687][T19652] device syzkaller0 entered promiscuous mode [ 378.888415][T19687] device syzkaller0 entered promiscuous mode [ 379.011100][ T24] audit: type=1400 audit(1774280003.640:180): avc: denied { create } for pid=19690 comm="syz.2.5703" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 379.070851][T19707] device syzkaller0 entered promiscuous mode [ 379.780940][T19736] device dummy0 entered promiscuous mode [ 379.819295][T19744] device syzkaller0 entered promiscuous mode [ 380.022286][T19765] device syzkaller0 entered promiscuous mode [ 380.302527][T19790] device syzkaller0 entered promiscuous mode [ 380.822492][T19812] device wg2 left promiscuous mode [ 381.132696][T19841] device syzkaller0 entered promiscuous mode [ 381.381148][T19864] syz.0.5761[19864] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 381.381211][T19864] syz.0.5761[19864] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 381.832897][T19898] syzkaller1: tun_chr_ioctl cmd 21731 [ 381.930515][T19900] device syzkaller0 entered promiscuous mode [ 381.946474][T19898] syzkaller1: tun_chr_ioctl cmd 2147767520 [ 382.284983][T19927] device sit0 left promiscuous mode [ 382.358336][T19929] device syzkaller0 entered promiscuous mode [ 382.487766][T19927] device sit0 entered promiscuous mode [ 383.232835][T19960] device sit0 entered promiscuous mode [ 386.025773][ T24] audit: type=1400 audit(1774280010.650:181): avc: denied { create } for pid=20138 comm="syz.0.5842" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_nflog_socket permissive=1 [ 386.265974][T20115] bridge0: port 1(bridge_slave_0) entered blocking state [ 386.290259][T20115] bridge0: port 1(bridge_slave_0) entered disabled state [ 386.360668][T20115] device bridge_slave_0 entered promiscuous mode [ 386.395460][T20115] bridge0: port 2(bridge_slave_1) entered blocking state [ 386.432175][T20115] bridge0: port 2(bridge_slave_1) entered disabled state [ 386.480720][T20115] device bridge_slave_1 entered promiscuous mode [ 386.981322][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 387.000555][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 387.008249][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 387.018286][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 387.026894][ T9] bridge0: port 1(bridge_slave_0) entered blocking state [ 387.033995][ T9] bridge0: port 1(bridge_slave_0) entered forwarding state [ 387.044922][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 387.103279][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 387.140900][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 387.167699][ T9] bridge0: port 2(bridge_slave_1) entered blocking state [ 387.174821][ T9] bridge0: port 2(bridge_slave_1) entered forwarding state [ 387.244905][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 387.253773][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 387.279328][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 387.287639][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 387.438120][T20115] device veth0_vlan entered promiscuous mode [ 387.453207][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 387.461787][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 387.470749][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 387.478862][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 387.487539][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 387.495492][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 387.565020][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 387.573640][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 387.593990][T20115] device veth1_macvtap entered promiscuous mode [ 387.632637][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 387.643707][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 387.653210][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 387.735186][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 387.747203][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 388.191082][T20248] ªªªªªª™™: renamed from vlan0 [ 388.458341][T20261] device syzkaller0 entered promiscuous mode [ 388.523772][ T7] device veth1_macvtap left promiscuous mode [ 390.387320][T20363] device wg2 left promiscuous mode [ 390.802715][T20410] device syzkaller0 entered promiscuous mode [ 390.911370][T20412] device syzkaller0 entered promiscuous mode [ 392.675780][T20465] device syzkaller0 entered promiscuous mode [ 393.581291][T20494] syzkaller0: default qdisc (pfifo_fast) fail, fallback to noqueue [ 393.592023][T20494] device syzkaller0 entered promiscuous mode [ 394.331665][T20542] ³þ: renamed from bond_slave_0 [ 394.439359][T20545] device syzkaller0 entered promiscuous mode [ 394.486520][T20531] device syzkaller0 left promiscuous mode [ 395.823743][T20634] device syzkaller0 entered promiscuous mode [ 395.878259][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 396.218652][T20660] bridge0: port 1(bridge_slave_0) entered blocking state [ 396.270185][T20660] bridge0: port 1(bridge_slave_0) entered disabled state [ 396.280989][T20660] device bridge_slave_0 entered promiscuous mode [ 396.343433][T20660] bridge0: port 2(bridge_slave_1) entered blocking state [ 396.360793][T20660] bridge0: port 2(bridge_slave_1) entered disabled state [ 396.370952][T20660] device bridge_slave_1 entered promiscuous mode [ 396.533880][T20695] device syzkaller0 entered promiscuous mode [ 396.992564][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 397.005535][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 397.063261][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 397.088607][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 397.120195][ T332] bridge0: port 1(bridge_slave_0) entered blocking state [ 397.127308][ T332] bridge0: port 1(bridge_slave_0) entered forwarding state [ 397.190594][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 397.222767][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 397.284020][ T332] bridge0: port 2(bridge_slave_1) entered blocking state [ 397.291356][ T332] bridge0: port 2(bridge_slave_1) entered forwarding state [ 397.360191][T20727] device veth1_macvtap left promiscuous mode [ 397.391106][T20733] device veth1_macvtap entered promiscuous mode [ 397.397417][T20733] device macsec0 entered promiscuous mode [ 397.496087][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 397.515096][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 397.581617][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 397.611004][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 397.636400][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 397.659321][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 397.690874][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 397.753063][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 397.767188][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 397.811886][T20660] device veth0_vlan entered promiscuous mode [ 397.822004][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 397.881002][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 398.014176][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 398.042184][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 398.068672][T20660] device veth1_macvtap entered promiscuous mode [ 398.080670][ T7] device bridge_slave_1 left promiscuous mode [ 398.089127][ T7] bridge0: port 2(bridge_slave_1) entered disabled state [ 398.105570][ T7] device bridge_slave_0 left promiscuous mode [ 398.118449][ T7] bridge0: port 1(bridge_slave_0) entered disabled state [ 398.819402][ T300] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 398.836658][ T300] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 398.846874][ T300] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 398.856414][ T300] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 399.312772][T20783] device syzkaller0 entered promiscuous mode [ 399.598940][T20808] device syzkaller0 entered promiscuous mode [ 399.674625][T20809] bridge0: port 1(bridge_slave_0) entered blocking state [ 399.682565][T20809] bridge0: port 1(bridge_slave_0) entered disabled state [ 399.691266][T20809] device bridge_slave_0 entered promiscuous mode [ 399.698545][T20809] bridge0: port 2(bridge_slave_1) entered blocking state [ 399.706108][T20809] bridge0: port 2(bridge_slave_1) entered disabled state [ 399.714508][T20809] device bridge_slave_1 entered promiscuous mode [ 400.001786][T20809] bridge0: port 2(bridge_slave_1) entered blocking state [ 400.009108][T20809] bridge0: port 2(bridge_slave_1) entered forwarding state [ 400.016450][T20809] bridge0: port 1(bridge_slave_0) entered blocking state [ 400.023696][T20809] bridge0: port 1(bridge_slave_0) entered forwarding state [ 400.114330][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 400.126105][ T49] bridge0: port 1(bridge_slave_0) entered disabled state [ 400.141487][ T49] bridge0: port 2(bridge_slave_1) entered disabled state [ 400.184159][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 400.195883][ T49] bridge0: port 1(bridge_slave_0) entered blocking state [ 400.203296][ T49] bridge0: port 1(bridge_slave_0) entered forwarding state [ 400.251741][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 400.260218][ T49] bridge0: port 2(bridge_slave_1) entered blocking state [ 400.267371][ T49] bridge0: port 2(bridge_slave_1) entered forwarding state [ 400.274933][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 400.283139][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 400.311781][T20809] device veth0_vlan entered promiscuous mode [ 400.322285][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 400.379896][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 400.423667][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 400.442982][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 400.477603][T20809] device veth1_macvtap entered promiscuous mode [ 400.546603][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 400.577910][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 400.641646][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 400.683780][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 400.692515][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 401.137698][ T7] device bridge_slave_1 left promiscuous mode [ 401.158796][ T7] bridge0: port 2(bridge_slave_1) entered disabled state [ 401.230462][ T7] device bridge_slave_0 left promiscuous mode [ 401.266732][ T7] bridge0: port 1(bridge_slave_0) entered disabled state [ 401.344547][ T7] device veth1_macvtap left promiscuous mode [ 401.916738][T20887] device macsec0 entered promiscuous mode [ 403.801475][T20998] device syzkaller0 entered promiscuous mode [ 404.006171][T21025] bridge0: port 3(gretap0) entered blocking state [ 404.023204][T21025] bridge0: port 3(gretap0) entered disabled state [ 404.044684][T21025] device gretap0 entered promiscuous mode [ 404.066611][T21025] bridge0: port 3(gretap0) entered blocking state [ 404.073234][T21025] bridge0: port 3(gretap0) entered forwarding state [ 404.100726][T21030] bridge0: port 3(veth1) entered blocking state [ 404.123490][T21030] bridge0: port 3(veth1) entered disabled state [ 404.162854][T21030] device veth1 entered promiscuous mode [ 404.168566][T21030] bridge0: port 3(veth1) entered blocking state [ 404.174891][T21030] bridge0: port 3(veth1) entered forwarding state [ 404.289749][T21034] device syzkaller0 entered promiscuous mode [ 404.585994][T21067] ³þ: renamed from bond_slave_0 [ 409.208626][T21327] device syzkaller0 entered promiscuous mode [ 410.208906][T21375] bridge0: port 1(bridge_slave_0) entered blocking state [ 410.219789][T21375] bridge0: port 1(bridge_slave_0) entered disabled state [ 410.228449][T21375] device bridge_slave_0 entered promiscuous mode [ 410.235645][T21375] bridge0: port 2(bridge_slave_1) entered blocking state [ 410.242930][T21375] bridge0: port 2(bridge_slave_1) entered disabled state [ 410.260603][T21375] device bridge_slave_1 entered promiscuous mode [ 410.437916][T21375] bridge0: port 2(bridge_slave_1) entered blocking state [ 410.445129][T21375] bridge0: port 2(bridge_slave_1) entered forwarding state [ 410.452446][T21375] bridge0: port 1(bridge_slave_0) entered blocking state [ 410.459506][T21375] bridge0: port 1(bridge_slave_0) entered forwarding state [ 410.576295][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 410.590696][ T49] bridge0: port 1(bridge_slave_0) entered disabled state [ 410.608412][ T49] bridge0: port 2(bridge_slave_1) entered disabled state [ 410.651560][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 410.677071][ T49] bridge0: port 1(bridge_slave_0) entered blocking state [ 410.684346][ T49] bridge0: port 1(bridge_slave_0) entered forwarding state [ 410.717116][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 410.725565][ T49] bridge0: port 2(bridge_slave_1) entered blocking state [ 410.732670][ T49] bridge0: port 2(bridge_slave_1) entered forwarding state [ 410.757525][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 410.778450][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 410.787071][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 410.808587][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 410.819812][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 410.827571][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 410.840205][T21375] device veth0_vlan entered promiscuous mode [ 410.866483][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 410.897630][T21375] device veth1_macvtap entered promiscuous mode [ 410.911123][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 410.960630][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 411.100086][T21421] bridge0: port 2(bridge_slave_1) entered disabled state [ 411.107435][T21421] bridge0: port 1(bridge_slave_0) entered disabled state [ 411.170676][T21420] device bridge_slave_1 left promiscuous mode [ 411.178955][T21420] bridge0: port 2(bridge_slave_1) entered disabled state [ 411.196008][T21420] device bridge_slave_0 left promiscuous mode [ 411.204233][T21420] bridge0: port 1(bridge_slave_0) entered disabled state [ 411.411765][ T300] bridge0: port 3(gretap0) entered disabled state [ 411.419601][ T300] device gretap0 left promiscuous mode [ 411.425415][ T300] bridge0: port 3(gretap0) entered disabled state [ 411.532540][ T300] device veth0_to_team left promiscuous mode [ 411.538723][ T300] Ÿë: port 1(veth0_to_team) entered disabled state [ 411.547574][ T300] device bridge_slave_1 left promiscuous mode [ 411.554136][ T300] bridge0: port 2(bridge_slave_1) entered disabled state [ 411.561830][ T300] device bridge_slave_0 left promiscuous mode [ 411.568091][ T300] bridge0: port 1(bridge_slave_0) entered disabled state [ 411.576240][ T300] device veth1_macvtap left promiscuous mode [ 411.993142][T21518] device syzkaller0 entered promiscuous mode [ 412.255688][T21534] device syzkaller0 entered promiscuous mode [ 413.055044][T21575] device syzkaller0 entered promiscuous mode [ 414.559442][T21666] device syzkaller0 entered promiscuous mode [ 416.370200][T21766] device veth0_vlan left promiscuous mode [ 416.391676][T21766] device veth0_vlan entered promiscuous mode [ 417.639010][T21860] device syzkaller0 entered promiscuous mode [ 417.794668][T21874] device veth0_vlan left promiscuous mode [ 417.818281][T21874] device veth0_vlan entered promiscuous mode [ 417.876122][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 418.331596][T21945] device syzkaller0 entered promiscuous mode [ 418.454205][T21959] device wg2 entered promiscuous mode [ 418.889721][T21985] device veth0_vlan left promiscuous mode [ 418.906570][T21985] device veth0_vlan entered promiscuous mode [ 420.783533][T22081] device syzkaller0 entered promiscuous mode [ 422.372059][T22148] device pim6reg1 entered promiscuous mode [ 422.841670][T22171] device syzkaller0 entered promiscuous mode [ 422.872208][T22173] bridge0: port 1(bridge_slave_0) entered disabled state [ 422.890747][T22172] bridge0: port 1(bridge_slave_0) entered blocking state [ 422.898277][T22172] bridge0: port 1(bridge_slave_0) entered forwarding state [ 423.097841][T22197] syzkaller0: tun_chr_ioctl cmd 1074025677 [ 423.129293][T22197] syzkaller0: linktype set to 825 [ 423.181844][T22205] syzkaller0: default qdisc (pfifo_fast) fail, fallback to noqueue [ 423.189903][T22205] device syzkaller0 entered promiscuous mode [ 423.215964][T22208] device syzkaller0 entered promiscuous mode [ 423.348816][T22209] device wg2 entered promiscuous mode [ 423.947574][T22260] device syzkaller0 entered promiscuous mode [ 424.453808][T22308] lo: mtu less than device minimum [ 424.554483][T22315] device team_slave_1 entered promiscuous mode [ 424.605454][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 424.625751][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 424.665623][T22321] device syzkaller0 entered promiscuous mode [ 425.205181][T22329] batadv0: tun_chr_ioctl cmd 2148553947 [ 427.684683][T22407] device sit0 entered promiscuous mode [ 428.225196][T22421] device veth0_to_bridge entered promiscuous mode [ 429.172225][T22462] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 429.579027][T22469] device syzkaller0 entered promiscuous mode [ 431.122204][T22550] device syzkaller0 entered promiscuous mode [ 431.141048][T22550] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 432.220338][T22634] device syzkaller0 entered promiscuous mode [ 432.775296][T22694] device syzkaller0 entered promiscuous mode [ 433.023808][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 434.509019][T22786] @ÿ: renamed from bond_slave_0 [ 436.512054][T22856] device syzkaller0 entered promiscuous mode [ 436.593330][T22873] device syzkaller0 entered promiscuous mode [ 438.122827][T22933] device pimreg0 entered promiscuous mode [ 440.985652][T23054] device wg2 entered promiscuous mode [ 443.506478][T23148] bridge0: port 1(bridge_slave_0) entered blocking state [ 443.573058][T23148] bridge0: port 1(bridge_slave_0) entered disabled state [ 443.581924][T23148] device bridge_slave_0 entered promiscuous mode [ 443.670680][T23148] bridge0: port 2(bridge_slave_1) entered blocking state [ 443.678319][T23148] bridge0: port 2(bridge_slave_1) entered disabled state [ 443.724135][T23148] device bridge_slave_1 entered promiscuous mode [ 444.050978][T23188] device veth0_vlan left promiscuous mode [ 444.092621][T23188] device veth0_vlan entered promiscuous mode [ 444.307920][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 444.322159][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 444.356616][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 444.381263][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 444.403838][ T332] bridge0: port 1(bridge_slave_0) entered blocking state [ 444.410984][ T332] bridge0: port 1(bridge_slave_0) entered forwarding state [ 444.507440][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 444.515374][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 444.545680][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 444.564780][ T332] bridge0: port 2(bridge_slave_1) entered blocking state [ 444.571909][ T332] bridge0: port 2(bridge_slave_1) entered forwarding state [ 444.658368][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 444.710953][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 444.729829][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 444.737611][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 444.796923][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 444.836814][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 444.877744][T23148] device veth0_vlan entered promiscuous mode [ 444.948182][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 444.978376][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 445.004204][T23148] device veth1_macvtap entered promiscuous mode [ 445.057131][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 445.065350][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 445.091817][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 445.182300][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 445.241510][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 446.309132][T23292] device syzkaller0 entered promiscuous mode [ 446.467007][T23306] device syzkaller0 entered promiscuous mode [ 447.894677][T23395] device dummy0 entered promiscuous mode [ 448.583985][T23444] device syzkaller0 entered promiscuous mode [ 448.677096][T23451] device veth1_macvtap left promiscuous mode [ 448.683780][T23451] device macsec0 left promiscuous mode [ 448.694918][T23451] device veth1_macvtap entered promiscuous mode [ 448.701471][T23451] device macsec0 entered promiscuous mode [ 448.900726][T23470] device syzkaller0 entered promiscuous mode [ 448.913665][T23472] device pim6reg1 entered promiscuous mode [ 450.801496][T23552] device syzkaller0 entered promiscuous mode [ 450.808241][T23552] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 453.006049][T23654] device syzkaller0 entered promiscuous mode [ 453.371537][T23666] IPv6: pim6reg1: Disabled Multicast RS [ 453.849780][T23709] device syzkaller0 entered promiscuous mode [ 454.524988][ T24] audit: type=1400 audit(1774280079.150:182): avc: denied { setattr } for pid=23785 comm="syz.3.6916" path="pipe:[88946]" dev="pipefs" ino=88946 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=fifo_file permissive=1 [ 456.858270][T23925] device syzkaller0 entered promiscuous mode [ 456.937440][T23930] aaaaaaaaa: renamed from bond_slave_0 [ 457.489749][T23951] device syzkaller0 entered promiscuous mode [ 458.360649][T24000] bridge0: port 3(veth1) entered disabled state [ 458.367050][T24000] bridge0: port 2(bridge_slave_1) entered disabled state [ 458.374278][T24000] bridge0: port 1(bridge_slave_0) entered disabled state [ 458.411035][T24004] ------------[ cut here ]------------ [ 458.481155][T24004] kernel BUG at kernel/bpf/arraymap.c:980! [ 458.540220][T24004] invalid opcode: 0000 [#1] PREEMPT SMP KASAN [ 458.546482][T24004] CPU: 0 PID: 24004 Comm: syz.1.6980 Tainted: G W syzkaller #0 [ 458.555348][T24004] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 458.565444][T24004] RIP: 0010:prog_array_map_poke_run+0x6f4/0x710 [ 458.571704][T24004] Code: 63 e9 ff eb 05 e8 ec 63 e9 ff 48 83 c4 58 5b 41 5c 41 5d 41 5e 41 5f 5d c3 e8 d8 63 e9 ff 0f 0b e9 78 f9 ff ff e8 cc 63 e9 ff <0f> 0b e8 c5 63 e9 ff 0f 0b e8 be 63 e9 ff 0f 0b e8 b7 63 e9 ff 0f [ 458.591440][T24004] RSP: 0018:ffffc900011afc10 EFLAGS: 00010293 [ 458.597623][T24004] RAX: ffffffff817b4f84 RBX: ffff888105ddbad0 RCX: ffff88810f888000 [ 458.605611][T24004] RDX: 0000000000000000 RSI: 00000000fffffff0 RDI: 00000000ffffffea [ 458.613723][T24004] RBP: ffffc900011afc90 R08: ffffffff864ea647 R09: 1ffffffff0c9d4c8 [ 458.621723][T24004] R10: dffffc0000000000 R11: fffffbfff0c9d4c9 R12: ffffffffa0046000 [ 458.629859][T24004] R13: ffff888101b82600 R14: 0000000000000001 R15: 00000000fffffff0 [ 458.637870][T24004] FS: 00007faa2ed376c0(0000) GS:ffff8881f7000000(0000) knlGS:0000000000000000 [ 458.646995][T24004] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 458.653951][T24004] CR2: 00002000000009c0 CR3: 00000001297e9000 CR4: 00000000003506b0 [ 458.661960][T24004] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000200000000300 [ 458.669952][T24004] DR3: 0000200000000300 DR6: 00000000ffff0ff0 DR7: 0000000000000600 [ 458.677945][T24004] Call Trace: [ 458.681265][T24004] ? bpf_prog_d9ca681d6adf0417+0xb/0x670 [ 458.686910][T24004] bpf_fd_array_map_update_elem+0x21f/0x330 [ 458.692823][T24004] bpf_map_update_value+0xb4/0x430 [ 458.697963][T24004] map_update_elem+0x4a1/0x5e0 [ 458.702974][T24004] __se_sys_bpf+0x3e0/0x740 [ 458.707782][T24004] ? __x64_sys_bpf+0x90/0x90 [ 458.712505][T24004] ? __kasan_check_read+0x11/0x20 [ 458.717546][T24004] __x64_sys_bpf+0x7b/0x90 [ 458.721990][T24004] do_syscall_64+0x31/0x40 [ 458.726526][T24004] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 458.732437][T24004] RIP: 0033:0x7faa302fd799 [ 458.736874][T24004] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 458.756658][T24004] RSP: 002b:00007faa2ed37028 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 458.765385][T24004] RAX: ffffffffffffffda RBX: 00007faa30577090 RCX: 00007faa302fd799 [ 458.773396][T24004] RDX: 0000000000000020 RSI: 0000200000000180 RDI: 0000000000000002 [ 458.781394][T24004] RBP: 00007faa30393c99 R08: 0000000000000000 R09: 0000000000000000 [ 458.789569][T24004] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 458.797573][T24004] R13: 00007faa30577128 R14: 00007faa30577090 R15: 00007ffc7e958aa8 [ 458.805575][T24004] Modules linked in: [ 459.320029][T24004] ---[ end trace b9ae90346f2e36da ]--- [ 459.343297][T24004] RIP: 0010:prog_array_map_poke_run+0x6f4/0x710 [ 459.362814][T24004] Code: 63 e9 ff eb 05 e8 ec 63 e9 ff 48 83 c4 58 5b 41 5c 41 5d 41 5e 41 5f 5d c3 e8 d8 63 e9 ff 0f 0b e9 78 f9 ff ff e8 cc 63 e9 ff <0f> 0b e8 c5 63 e9 ff 0f 0b e8 be 63 e9 ff 0f 0b e8 b7 63 e9 ff 0f [ 459.430164][T24004] RSP: 0018:ffffc900011afc10 EFLAGS: 00010293 [ 459.436439][T24004] RAX: ffffffff817b4f84 RBX: ffff888105ddbad0 RCX: ffff88810f888000 [ 459.451789][T24004] RDX: 0000000000000000 RSI: 00000000fffffff0 RDI: 00000000ffffffea [ 459.459822][T24004] RBP: ffffc900011afc90 R08: ffffffff864ea647 R09: 1ffffffff0c9d4c8 [ 459.468626][T24004] R10: dffffc0000000000 R11: fffffbfff0c9d4c9 R12: ffffffffa0046000 [ 459.478053][T24004] R13: ffff888101b82600 R14: 0000000000000001 R15: 00000000fffffff0 [ 459.486662][T24004] FS: 00007faa2ed376c0(0000) GS:ffff8881f7100000(0000) knlGS:0000000000000000 [ 459.496694][T24004] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 459.504265][T24004] CR2: 00007ff47bedf2f8 CR3: 00000001297e9000 CR4: 00000000003506a0 [ 459.512730][T24004] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 459.520944][T24004] DR3: 0000000000000000 DR6: 00000000ffff0ff0 DR7: 0000000000000600 [ 459.529057][T24004] Kernel panic - not syncing: Fatal exception [ 459.535387][T24004] Kernel Offset: disabled [ 459.539730][T24004] Rebooting in 86400 seconds..