last executing test programs: 11.288045093s ago: executing program 3 (id=2780): bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={0x0}, 0x18) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)) bpf$MAP_CREATE(0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="1200000035000000040000000200000000000000", @ANYRES32, @ANYBLOB="0040e886c67a01c8355f2f0d2e1006da350b58cd13be9ef35302ac0ff7000000", @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x50) r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="1e000000000000000500000006"], 0x48) bpf$MAP_LOOKUP_ELEM(0x2, &(0x7f0000001740)={r1, 0x0, &(0x7f0000001700)=""/53}, 0x20) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000500)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x37, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="18010000000000000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000000)='sched_switch\x00', r2}, 0x10) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1801000000000000000000004b64ffed850000006d000000a50000000500000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r3}, 0x10) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_bp={0x0}, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000300)) ioctl$TUNSETOFFLOAD(r0, 0xc004743e, 0x110c230000) ioctl$TUNSETOFFLOAD(r0, 0x8008743f, 0xf0ff1f00000000) 10.171828175s ago: executing program 3 (id=2791): perf_event_open(&(0x7f00000004c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x4}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x11, 0x5, &(0x7f00000002c0)=ANY=[@ANYBLOB="1805000000000000000000004b64ffec850000007d000000850000000700000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000080)='sched_switch\x00', r0}, 0x10) bpf$ITER_CREATE(0x21, &(0x7f00000000c0), 0x8) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000070000001801000020756c2500000000002020207b1af8ff00000000bfa10000000000"], 0x0, 0x0, 0x0, 0x0, 0x41100, 0x4, '\x00', 0x0, @fallback=0x34, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d0000001801000020696c2500000000002020097b1af8ff00000000bfa100000000000007010000b8ffffffb7020000"], 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffd47, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0xfffffffffffffe0c) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={0x0}, 0x18) syz_clone(0x0, 0x0, 0x11, 0x0, 0x0, 0x0) close(0xffffffffffffffff) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={0x0}, 0x18) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x5, 0x0, &(0x7f0000000140)='GPL\x00'}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000280)={{}, 0x0, &(0x7f0000000180)}, 0x20) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) syz_clone(0x64847000, 0x0, 0xb698cc431f1f4bf7, 0x0, 0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup/syz1\x00', 0x1ff) bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x20, 0x0, 0x0, &(0x7f0000000340)='GPL\x00', 0x2, 0x18, &(0x7f0000000380)=""/24, 0x41000, 0x2, '\x00', 0x0, @fallback=0x20, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000a00)={0x3, 0x2, 0xc, 0x85}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x8, &(0x7f0000000a40), &(0x7f0000000a80)=[{0x3, 0x1, 0x1, 0x9}, {0x3, 0x2, 0x8, 0x9}, {0x4, 0x2, 0xa, 0x7}, {0x2, 0x1, 0x2, 0x9}, {0x3, 0x2, 0xd, 0x5}, {0x3, 0x3, 0x2, 0x6}, {0x4, 0x2, 0x6}, {0x0, 0x5, 0x5, 0x7}], 0x10, 0x2}, 0x94) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000d40)={&(0x7f0000000cc0)=ANY=[@ANYBLOB="9feb010018000000001100000000000000000000000038004f04005f00"], &(0x7f0000000d00)=""/13, 0x2b, 0xd, 0x1, 0xfffff000, 0x10000}, 0x28) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000e00)={0xffffffffffffffff, 0x1, 0x8}, 0xc) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x9, 0x5, 0x9fd, 0x84, 0x0, 0xffffffffffffffff, 0xfffffffe}, 0x50) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000300)={0xffffffffffffffff, 0x0, &(0x7f00000000c0), &(0x7f0000000240), 0x800, r1}, 0x38) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f00000002c0)='hrtimer_start\x00'}, 0x3d) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) 7.288338391s ago: executing program 3 (id=2813): ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) r0 = bpf$MAP_CREATE(0x0, 0x0, 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001100)={{r0}, 0x0, 0x0}, 0x20) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f0000000540)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b702000003000000850000008600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x34, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000340)={&(0x7f0000000000)='sched_switch\x00', r2}, 0x10) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x201, 0x20, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x7}, 0x440, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = syz_clone(0x630c1100, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000340)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x21, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x4}, 0x9d1c, 0x0, 0x9, 0x0, 0x0, 0xffffffff, 0x4}, r3, 0xafffffffffffffff, 0xffffffffffffffff, 0xb) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0xfd, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x0, 0x401}, 0x0, 0xc8, 0x0, 0x7, 0x0, 0x0, 0x770a}, 0x0, 0x8000000000000000, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000009c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r5) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) r6 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000500)=ANY=[@ANYRES32, @ANYBLOB='\x00\b\x00'/20, @ANYRES32=0x0, @ANYRES32], 0x50) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000600)=@bpf_ext={0x1c, 0x14, &(0x7f0000000200)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, [@tail_call], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000000)='GPL\x00', 0xfffffffa, 0xa9, &(0x7f00000002c0)=""/169, 0x41100, 0x52, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f00000004c0)={0x0, 0x1, 0x5, 0x9}, 0x10, 0x143ac, 0xffffffffffffffff, 0x0, &(0x7f0000000580)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r6, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x0, 0x10, 0x6}, 0x94) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f00000011c0)={0x5, 0x0}, 0x8) bpf$PROG_LOAD(0x5, &(0x7f0000001200)={0x7, 0x3, &(0x7f0000001080)=@raw=[@map_fd={0x18, 0x5}, @alu={0x7, 0x1, 0xa, 0x7, 0xa, 0xfffffffffffffffe, 0xfffffffffffffffc}], &(0x7f00000010c0)='syzkaller\x00', 0x702, 0x0, 0x0, 0x40f00, 0x40, '\x00', 0x0, @fallback=0xe, 0xffffffffffffffff, 0x8, &(0x7f0000001140)={0x4, 0x2}, 0x8, 0x10, &(0x7f0000001180)={0x2, 0x4, 0x5, 0x8000}, 0x10, r7, r2, 0x0, 0x0, 0x0, 0x10, 0xda9}, 0x94) recvmsg$unix(r4, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r8, &(0x7f0000000140)=ANY=[@ANYBLOB="8fedcb790700117df37538e486dd6317ce22000000000000000000000000000000007fc5f603ff65ec5deb000071673fa79d93014b8e7781c2"], 0xfdef) syz_open_procfs$namespace(r3, &(0x7f0000001040)='ns/time_for_children\x00') mkdir(&(0x7f0000000000)='./cgroup/file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x0) r9 = gettid() syz_open_procfs$namespace(r9, 0x0) r10 = perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x6, 0x7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r10, 0x40082406, &(0x7f00000001c0)='cpu&00\t&&') syz_clone(0x638c1100, 0x0, 0x0, 0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.current\x00', 0x275a, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x14, 0x0, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2f, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_config_ext={0x0, 0xe62}, 0x0, 0xc8, 0x0, 0x6, 0x0, 0x0, 0xfffa, 0x0, 0x0, 0x0, 0x69}, 0x0, 0x10, 0xffffffffffffffff, 0x3) 6.008840653s ago: executing program 2 (id=2824): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="19000000040000000400000005"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_CREATE(0x0, 0x0, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000140)={0x10, 0x3, &(0x7f0000000000)=@framed, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24}, 0x94) r2 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r2}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=@base={0x2, 0x4, 0x4, 0x8, 0x1014}, 0x50) bpf$MAP_CREATE(0x0, 0x0, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, 0x0, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000000c0)={0xffffffffffffffff, &(0x7f0000000080), 0x0}, 0x20) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x2020, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000001c0)={0xe, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="1800000000000000000000000000000000006c"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0xf}, 0x90) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x4030582a, &(0x7f0000000040)) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x6, 0x4}, 0x0, 0x4, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x4030582a, &(0x7f0000000040)=0xc006000000000000) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000040)='task_newtask\x00', r6}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000040)='task_newtask\x00', r5}, 0x10) syz_clone(0x400, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000000)='mm_collapse_huge_page\x00', r1, 0x0, 0x6}, 0x18) 5.12021081s ago: executing program 2 (id=2828): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x3, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000003000000000000000efeff0095"], &(0x7f0000000400)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0xd, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000740)=ANY=[@ANYBLOB="0b0000000500000000"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x42, '\x00', 0x0, @cgroup_skb, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f00000004c0)={r1, &(0x7f0000000340), &(0x7f00000005c0)=""/155}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r1], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000000)='tlb_flush\x00', r2}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000000)='tlb_flush\x00', r0}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000140)={0x9, 0x4, &(0x7f0000000dc0)=ANY=[@ANYBLOB="18000000000000000000000000000000711219000000000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0xc}, 0x94) 4.980209979s ago: executing program 0 (id=2830): bpf$MAP_UPDATE_CONST_STR(0x2, 0x0, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0xfc, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x4}, 0x0, 0x0, 0x0, 0x7, 0x0, 0x9}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000008c0)=ANY=[@ANYBLOB="020000000400000008", @ANYBLOB], 0x48) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)=@base={0xe, 0x4, 0x4, 0x3}, 0x48) recvmsg$unix(0xffffffffffffffff, &(0x7f0000001ac0)={0x0, 0x0, 0x0}, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.swap.current\x00', 0x26e1, 0x0) write$cgroup_int(r1, &(0x7f0000000600), 0x12) perf_event_open(&(0x7f0000001080)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x7602, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_bp={&(0x7f0000000080), 0xd}, 0xc28}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0xfdef) syz_clone(0x42164000, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0a0000000400000008000000080000000000", @ANYBLOB], 0x48) perf_event_open(&(0x7f00000004c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000001c0)={0x6, 0xc, &(0x7f0000000440)=@framed={{0x18, 0x0, 0x0, 0x0, 0x100}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r2}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x84}}]}, 0x0, 0x0, 0x0, 0x0, 0x41100, 0x8, '\x00', 0x0, @xdp, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x52) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000700)='signal_generate\x00', r3}, 0x10) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x52) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000700)='signal_generate\x00', r4}, 0x10) syz_open_procfs$namespace(0x0, 0xfffffffffffffffe) r5 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240)={0x2, 0x4, 0x8, 0x1, 0x80, r0, 0x0, '\x00', 0x0, 0x0}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000000840)={0xb, 0x1c, &(0x7f0000000d80)=@ringbuf={{0x18, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, {{0x18, 0x1, 0x1, 0x0, r0}, {}, {}, {0x85, 0x0, 0x0, 0x5}}, {{0x5, 0x0, 0x3}, {0x95, 0x0, 0x0, 0x700}}, [@snprintf={{0x7, 0x0, 0xb, 0x2}, {0x3, 0x3, 0x3, 0xa, 0x9, 0xfe00}, {0x6, 0x0, 0x6, 0x9, 0x0, 0x0, 0x3}, {0x3, 0x3, 0x6, 0xa, 0xa, 0xfff0, 0x50}, {0x7, 0x1, 0xb, 0x6, 0x8}, {0x7, 0x0, 0x0, 0x8}, {}, {}, {0x7, 0x0, 0x6, 0x0}, {0x18, 0x9, 0x2, 0x0, r5}, {}, {0x46, 0x8, 0xfff0, 0x76}}], {{0x6, 0x1, 0x5, 0x2}, {0x6, 0x0, 0x5, 0x8, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x7}}}, &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0xd, '\x00', 0x0, @fallback=0xd, 0x0, 0xf00, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) 4.935892722s ago: executing program 2 (id=2832): bpf$MAP_UPDATE_CONST_STR(0x2, 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000580)={@fallback=0xffffffffffffffff, 0x10, 0x1, 0x9, &(0x7f00000002c0)=[0x0, 0x0], 0x2, 0x0, &(0x7f00000003c0)=[0x0, 0x0, 0x0], &(0x7f00000004c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000500)=[0x0], 0x0}, 0x40) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x18, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000500)={&(0x7f0000000080)='task_rename\x00', r2}, 0x10) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000880)={@fallback, 0xffffffffffffffff, 0x4, 0x2, 0xffffffffffffffff, @void, @value=r2, @void, @void, r1}, 0x20) socketpair$tipc(0x1e, 0x4, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x1b, 0x3, &(0x7f0000000080)=@framed={{0x18, 0x8, 0x0, 0x0, 0xffd0}}, &(0x7f0000000000)='GPL\x00', 0x2, 0xde, &(0x7f0000000340)=""/222, 0x0, 0x8}, 0x94) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB], 0x50) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000040)={r0, 0x58, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x0, 0x0, &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', r3, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[], 0x48) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000340)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x21, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x1}, 0x10100}, 0x0, 0xaffffffeffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000340)=@base={0x1, 0x5, 0x9fd, 0x84, 0x105}, 0x50) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000300)={0xffffffffffffffff, 0x0, &(0x7f00000000c0), &(0x7f0000000240), 0x800, r4, 0x0, 0x2000000}, 0x38) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) unlink(0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000140)='sched_switch\x00'}, 0x10) syz_clone(0x640c7000, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x9, 0x8}, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x1, 0xe, &(0x7f0000001880)=ANY=[@ANYBLOB="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"], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0xfffffffffffffd00}, 0x48) 3.759566307s ago: executing program 0 (id=2839): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0900000004000000ff0f000003"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000800)={0x1d, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r2 = bpf$MAP_CREATE(0x0, 0x0, 0x48) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x28, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x48) r5 = bpf$PROG_LOAD(0x5, 0x0, 0x0) r6 = bpf$MAP_CREATE_RINGBUF(0x0, 0x0, 0x0) write$cgroup_freezer_state(0xffffffffffffffff, 0x0, 0x0) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x3, 0x4, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, [@call={0x85, 0x0, 0x0, 0x61}]}, &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @sched_cls, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000240)={r7, 0x0, 0xe40, 0xe40, &(0x7f00000002c0)='\x00\x00\x00\x00\x00\x00\x00\x00', &(0x7f0000000300)=""/8, 0x320e, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x4c) r8 = bpf$PROG_LOAD(0x5, 0x0, 0x0) r9 = openat$cgroup_procs(r8, &(0x7f0000000180)='tasks\x00', 0x2, 0x0) r10 = syz_clone(0x630c1100, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000340)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x21, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x4}, 0x9d1c, 0x0, 0x9, 0x0, 0x0, 0xffffffff, 0x4}, r10, 0xafffffffffffffff, 0xffffffffffffffff, 0xb) write$cgroup_pid(r9, &(0x7f00000008c0)=r10, 0x12) r11 = syz_clone(0x40000, &(0x7f0000000540)="b767d4008b7a09e98833fce8dc0be566fdd74aa91649399fb2def98ad652f56a84c55fff1808c20aaf150d076ed27c7dff47a5ea78e48538930ac95539a4f650c974f809edac131bee5b855c793dd3683c1d0a06fef75b3385266ac8ca34093b3d69d5384e3cc502a48ab6594404c78e0b3f", 0x72, &(0x7f00000005c0), &(0x7f0000000600), &(0x7f0000000640)="2590e27cbb790dd900ebc1a6191fe3d073d048c72e0befdc326dcdb2549f719be290ab82c10501395985e9c7657a338b4477939054575ca3ffc86b") sendmsg$unix(0xffffffffffffffff, &(0x7f00000007c0)={&(0x7f0000000180)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000200)=[{&(0x7f0000000340)="2976b764cb44784f2fdbde93c0b833ec62ad2b7d3631d24e85c70280b5cf03bbfc010208f1a3089d9bc6d0a83552864e0b577d235f10c113ab8daf4177daafcfc8dbbe01e9e80e868d703c46b510360e8cbf3b47ae43179d0cd207ab6fb34046baabf843d0678560f9bcf4f5b29ceb5ccb4620553f991bea5088b8c2ea39390113cfc9f4538b53658de2094860eaa9838ccff76e281fc823f3123414bee276ab47e00a7e630e4d9d3c3d26f35e2f503234b10d538011abf72e479cf52662df4f4b62bbb58c9996ac9040ec32c9a0d96eef49bd19875c90fa17e03b0509", 0xdd}], 0x1, &(0x7f00000006c0)=[@rights={{0x1c, 0x1, 0x1, [r0, r5, 0xffffffffffffffff]}}, @rights={{0x1c, 0x1, 0x1, [r1, 0xffffffffffffffff, r5]}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xee00}}}, @rights={{0x24, 0x1, 0x1, [r7, r3, r2, r4, r4]}}, @cred={{0x1c, 0x1, 0x2, {r10}}}, @cred={{0x1c, 0x1, 0x2, {r11, 0xee00}}}], 0xc8, 0x20000000}, 0x40000) perf_event_open(&(0x7f00000002c0)={0x4, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x8}, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x8}, 0x0, 0xfeffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r12 = syz_open_procfs$namespace(0x0, &(0x7f0000000280)='ns/net\x00') bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000480)={@cgroup=r12, 0x11, 0x0, 0x0, 0x0, 0x1000000, 0x0, 0x0, 0x0, 0x0}, 0x40) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000480)={&(0x7f0000000680)='sys_exit\x00'}, 0x10) r13 = perf_event_open(&(0x7f0000001480)={0x2, 0x80, 0x83, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7ff}, 0x0, 0x0, 0x0, 0x9, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x0, 0x8}}, 0x0, 0xffffffffffffffff, r13, 0x0) syz_clone(0xe50c1700, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r14 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=ANY=[@ANYRES32=r6, @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="00000000000000000000000000000000000000000001000100000000"], 0x48) bpf$MAP_CREATE(0x0, &(0x7f0000000040)=@base={0xc, 0x4, 0x4, 0x3abe, 0x0, r14, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0xffffffff}, 0x48) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 2.889810004s ago: executing program 2 (id=2843): r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x34120, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f00000002c0), 0x7}, 0x4000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, 0x0, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="1b00000000000000000000000080000000000000", @ANYRES32, @ANYBLOB="00000000000000000000000000000000000000005b1cda9297877a27a461e11207db282289501754bb02d2e44b14736b44b56bbe1451d0fd34aa0a23aa2824e4d4bb9ef751296d03bb6c99745aa8f9763ea411e392b0332428a31547fb439ebbe746705847cd34531455047149adf7bd0fc29f55611cd0db6c42f8365bba6c36609978c472bb1687512728ca3428a2495ae67a86d0763f78f054a8929ceca9ce69d1345d3b6594439d6eb605c371ab65e625f8a8612769fcc5479f58cbde0da7f347aa428bcd70c4b753d18203135e9cebd56ca2438e", @ANYRES32=0x0, @ANYBLOB='\x00'/28], 0x50) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000003c0)='blkio.throttle.io_serviced\x00', 0x0, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x19, &(0x7f00000005c0)=ANY=[@ANYBLOB="1800000005000000000000000200000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000083000000bf090000000000005509010000000000950000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000ff0300007b8af8ff00000000bfa20094d9769440f8ffffffb703000008000000b704000000000000850000008200000085000000d0000000bf91000000000000b7020000020000008500000085000000b7000000000000009500"/118], &(0x7f0000000400)='GPL\x00', 0x8, 0x0, 0x0, 0x40efe, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0, 0x0, 0x0, 0x0}, 0x94) r4 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000000)='tlb_flush\x00', r3}, 0x10) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="0900000002000000040000000a"], 0x50) socketpair(0x26, 0x2, 0xfffffffb, &(0x7f0000000300)) bpf$PROG_LOAD(0x5, &(0x7f0000000900)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="580000000000fffffff300000000000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b7080000c80e00007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000030000009500000000000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000800)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d0000001801000020696c2500000000002020097b1af8ff00000000bfa100000000000007010000b8ffffffb702000000000000b7030000000000008500000070"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x32, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000000c0), &(0x7f0000000140), 0x1000, r5}, 0x38) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000080)={{}, 0x0, &(0x7f00000002c0)}, 0x20) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="1b000000000000000000002f", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f0000000540)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r6, @ANYBLOB="0000000000000000b702000003000000850000008600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000040)='fib6_table_lookup\x00', r7}, 0x18) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x14, &(0x7f00000006c0)=ANY=[@ANYBLOB="1800000000181100"/20, @ANYRESDEC=r4, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000010000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000020850000000400000095"], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x40, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x19, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000070000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000"], 0x0, 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @cgroup_sockopt=0x16, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20}, 0x94) perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb89, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000, 0x4, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x80000000, 0x0, 0x10000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback=0x15, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000580)={&(0x7f0000000540)='fib6_table_lookup\x00', r8}, 0x10) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'ip6tnl0\x00', 0x210}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r9, 0x89f1, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x101) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f00000001c0)) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000004000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb70300000e41621eb70400000000000085000000c300000095"], 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1a, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000086"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r10 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="1b000000000000000000"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r10], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x90) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x2, &(0x7f0000000480)=ANY=[@ANYBLOB="18020000000000000000"], 0x0, 0x4, 0x0, 0x0, 0x0, 0x40}, 0x94) 2.267665213s ago: executing program 1 (id=2848): r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x34120, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f00000002c0), 0x7}, 0x4000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, 0x0, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="1b00000000000000000000000080000000000000", @ANYRES32, @ANYBLOB="00000000000000000000000000000000000000005b1cda9297877a27a461e11207db282289501754bb02d2e44b14736b44b56bbe1451d0fd34aa0a23aa2824e4d4bb9ef751296d03bb6c99745aa8f9763ea411e392b0332428a31547fb439ebbe746705847cd34531455047149adf7bd0fc29f55611cd0db6c42f8365bba6c36609978c472bb1687512728ca3428a2495ae67a86d0763f78f054a8929ceca9ce69d1345d3b6594439d6eb605c371ab65e625f8a8612769fcc5479f58cbde0da7f347aa428bcd70c4b753d18203135e9cebd56ca2438e", @ANYRES32=0x0, @ANYBLOB='\x00'/28], 0x50) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000003c0)='blkio.throttle.io_serviced\x00', 0x0, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x19, &(0x7f00000005c0)=ANY=[@ANYBLOB="1800000005000000000000000200000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000083000000bf090000000000005509010000000000950000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000ff0300007b8af8ff00000000bfa20094d9769440f8ffffffb703000008000000b704000000000000850000008200000085000000d0000000bf91000000000000b7020000020000008500000085000000b7000000000000009500"/118], &(0x7f0000000400)='GPL\x00', 0x8, 0x0, 0x0, 0x40efe, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0, 0x0, 0x0, 0x0}, 0x94) r4 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000000)='tlb_flush\x00', r3}, 0x10) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="0900000002000000040000000a"], 0x50) socketpair(0x26, 0x2, 0xfffffffb, &(0x7f0000000300)) bpf$PROG_LOAD(0x5, &(0x7f0000000900)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="580000000000fffffff300000000000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b7080000c80e00007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000030000009500000000000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000800)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d0000001801000020696c2500000000002020097b1af8ff00000000bfa100000000000007010000b8ffffffb702000000000000b7030000000000008500000070"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x32, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000000c0), &(0x7f0000000140), 0x1000, r5}, 0x38) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000080)={{}, 0x0, &(0x7f00000002c0)}, 0x20) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="1b000000000000000000002f", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f0000000540)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r6, @ANYBLOB="0000000000000000b702000003000000850000008600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000040)='fib6_table_lookup\x00', r7}, 0x18) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x14, &(0x7f00000006c0)=ANY=[@ANYBLOB="1800000000181100"/20, @ANYRESDEC=r4, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000010000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000020850000000400000095"], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x40, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x19, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000070000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000"], 0x0, 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @cgroup_sockopt=0x16, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20}, 0x94) perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb89, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000, 0x4, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x80000000, 0x0, 0x10000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback=0x15, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000580)={&(0x7f0000000540)='fib6_table_lookup\x00', r8}, 0x10) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'ip6tnl0\x00', 0x210}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r9, 0x89f1, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x101) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f00000001c0)) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000004000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb70300000e41621eb70400000000000085000000c300000095"], 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1a, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000086"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r10 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="1b000000000000000000"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r10], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x90) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x2, &(0x7f0000000480)=ANY=[@ANYBLOB="18020000000000000000"], 0x0, 0x4, 0x0, 0x0, 0x0, 0x40}, 0x94) 1.86278521s ago: executing program 2 (id=2849): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00'], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r1, 0x89a1, &(0x7f0000000900)={'bridge0\x00', @broadcast}) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x6a) openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x700, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[], 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000180)=ANY=[@ANYRESHEX=r0, @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000f6000000850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="9feb010018000000000000003c0000003c00000002000000000000000100000d000000000000000003000000000000000000000105000000200000000000"], 0x0, 0x56}, 0x28) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="0a000000458050426aa6ba4364ba32275c0380044cf9363d513d13a657aaa94e080492251749e1018f6dfda856ab7997118e7c1283f35ada94be49d9c0b60ba52005e591de2487f4385fce71574e84630a4ac2223bc86170f6393c3b014e125bf876c49c8aa8ed0947c993f8", @ANYRES32, @ANYBLOB="373fc184fa4adc931d5ed1a435eb1b7b38afe748e389db5c209360af56905dd177b317ca82e8232bb92481d9b075f7408e76f00d883e04bc6ba51e7204bc2fb63dc391e2f09640d053", @ANYRES32=0x0, @ANYRES32=0xffffffffffffffff, @ANYBLOB="000000000000000000150000005ea4166684ff39bb4b56447779366896b91af7bd9e892d6f508c9112e1185b1821b9cbf3b74ff6b9594bad007d349bc4af2398f279298bc5d670361de6a3ff06a72525624488daa19ee2f00501c63700e091206458091a1a3978440471fcf2150d28c02ef683cb4232dc39ef15f94eac72fe7fefbc8131e8b8b23a2b7b0bdf616b3360afdcd48b14f567485532d9"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYRES32=r4, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x596, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x25, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000280)={{r4}, 0x0, 0x0}, 0x20) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000140)='sched_switch\x00', r6}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r7 = bpf$MAP_CREATE(0x2000000000000000, &(0x7f00000004c0)=ANY=[@ANYBLOB="0600000004000000060000000006"], 0x50) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x62a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x100000000}, 0x0, 0x1, 0x0, 0x0, 0x7fff}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_LOOKUP_BATCH(0x18, &(0x7f00000003c0)={0x0, 0x0, &(0x7f00000002c0), &(0x7f0000000100), 0x200df000, r7, 0x0, 0x80000fffe}, 0x38) bpf$PROG_LOAD(0x5, &(0x7f0000000a80)={0x20, 0xb, &(0x7f0000000200)=ANY=[@ANYRESOCT=r5], 0x0, 0xff, 0x0, 0x0, 0x0, 0x10, '\x00', 0x0, @fallback=0x2d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r3, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x94) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x22, '\x00', 0x0, @fallback=0x22, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r8}, 0x10) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000040)={0x0, 0x0}) socketpair$unix(0xa, 0x2, 0x11, &(0x7f0000000100)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x18, 0xc, &(0x7f0000000300)=ANY=[@ANYBLOB="18000000000000000000000000000000850000002a000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000000085000000b000000095"], 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x4}, 0x94) syz_clone(0x22023500, 0x0, 0x0, 0x0, 0x0, 0x0) 1.748575427s ago: executing program 0 (id=2850): bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={0x0}, 0x18) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)) bpf$MAP_CREATE(0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="1200000035000000040000000200000000000000", @ANYRES32, @ANYBLOB="0040e886c67a01c8355f2f0d2e1006da350b58cd13be9ef35302ac0ff7000000", @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x50) r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="1e000000000000000500000006"], 0x48) bpf$MAP_LOOKUP_ELEM(0x2, &(0x7f0000001740)={r1, 0x0, &(0x7f0000001700)=""/53}, 0x20) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000500)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x37, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="18010000000000000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_bp={0x0}, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TUNSETOFFLOAD(r0, 0xc004743e, 0x110c230000) ioctl$TUNSETOFFLOAD(r0, 0x8008743f, 0xf0ff1f00000000) 1.38840833s ago: executing program 4 (id=2853): bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d0000001801000020696c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000000085000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0xd, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000000008500000022000000180100002020702500000000002020207b0af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000000000008500000073"], 0x0, 0x0, 0x0, 0x0, 0x40e00, 0x10, '\x00', 0x0, @sock_ops=0x3, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x39, 0x0, 0x0, 0x0}, 0x94) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="0a00000004000000040000000a"], 0x50) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xa, 0x4, 0x2, 0x5, 0x2}, 0x50) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000004c0), &(0x7f00000004c0), 0x1000, r0}, 0x38) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18000000000000000000000000000000850000006d"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x36, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x11, 0x14, &(0x7f0000000400)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000003"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1d, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='tlb_flush\x00', r1}, 0x10) 1.306269245s ago: executing program 0 (id=2854): bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0xd, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000000008500000022000000180100002020702500000000002020207b0af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000000000008500000073"], 0x0, 0x0, 0x0, 0x0, 0x40e00, 0x10, '\x00', 0x0, @sock_ops=0x3, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x39, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000740)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x8, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="0a00000004000000040000000a"], 0x50) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000004c0), &(0x7f00000004c0), 0x1000, r0}, 0x38) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x11, 0x14, &(0x7f0000000400)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000003"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1d, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='tlb_flush\x00', r1}, 0x10) 1.202687872s ago: executing program 1 (id=2855): r0 = bpf$MAP_CREATE(0x300000000000000, &(0x7f0000000100)=@base={0x18, 0x4, 0x41, 0x0, 0x1, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x4002, 0x5}, 0x48) r1 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000000c0), 0x48) bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x15, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0xfffffffd}, 0x48) bpf$MAP_LOOKUP_ELEM(0x5, &(0x7f00000000c0)={r1, &(0x7f0000000000), &(0x7f0000000040)=""/73}, 0x70) r2 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000280)={0x2, 0x4, 0x8, 0x1, 0x80, r0, 0x3, '\x00', 0x0, 0xffffffffffffffff, 0x3}, 0x50) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000300)={&(0x7f0000000000)="071527d1618f24beb16880d6240a8be58acac5e84d", &(0x7f0000000180)=""/246, &(0x7f0000000040)="7ab51a6dc377fa0bc05c3ba9678f0f46c1cff9be9f09c29dc798", &(0x7f0000000080)="10e2a39fb255a7a98efc30d18a1ff7e744b2315340b736c164c045f00cf2de2b4a5f0adcb0023ba58fae11d5b39787b7d6790bb19435332dc00bfd68f12859498a874389e02d86f4768a0f2f5aa118128a9b00faca16f5a26b8bb386e00dc40029981bbd77c374533d5a499f1f", 0x900000, r2}, 0x38) 1.182481123s ago: executing program 3 (id=2856): r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x34120, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f00000002c0), 0x7}, 0x4000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, 0x0, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="1b00000000000000000000000080000000000000", @ANYRES32, @ANYBLOB="00000000000000000000000000000000000000005b1cda9297877a27a461e11207db282289501754bb02d2e44b14736b44b56bbe1451d0fd34aa0a23aa2824e4d4bb9ef751296d03bb6c99745aa8f9763ea411e392b0332428a31547fb439ebbe746705847cd34531455047149adf7bd0fc29f55611cd0db6c42f8365bba6c36609978c472bb1687512728ca3428a2495ae67a86d0763f78f054a8929ceca9ce69d1345d3b6594439d6eb605c371ab65e625f8a8612769fcc5479f58cbde0da7f347aa428bcd70c4b753d18203135e9cebd56ca2438e3cb53461a9ee866460f99e8251eb919fb80cba916f0a2423c3f5cfa5d4ee", @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x50) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000003c0)='blkio.throttle.io_serviced\x00', 0x0, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x19, &(0x7f00000005c0)=ANY=[@ANYBLOB="1800000005000000000000000200000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000083000000bf090000000000005509010000000000950000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000ff0300007b8af8ff00000000bfa20094d9769440f8ffffffb703000008000000b704000000000000850000008200000085000000d0000000bf91000000000000b7020000020000008500000085000000b7000000000000009500"/118], &(0x7f0000000400)='GPL\x00', 0x8, 0x0, 0x0, 0x40efe, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0, 0x0, 0x0, 0x0}, 0x94) r4 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000000)='tlb_flush\x00', r3}, 0x10) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="0900000002000000040000000a"], 0x50) socketpair(0x26, 0x2, 0xfffffffb, &(0x7f0000000300)) bpf$PROG_LOAD(0x5, &(0x7f0000000900)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="580000000000fffffff300000000000018110000", @ANYRES32=r5, @ANYBLOB], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000800)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d0000001801000020696c2500000000002020097b1af8ff00000000bfa100000000000007010000b8ffffffb702000000000000b7030000000000008500000070"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x32, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000000c0), &(0x7f0000000140), 0x1000, r5}, 0x38) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000080)={{}, 0x0, &(0x7f00000002c0)}, 0x20) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="1b000000000000000000002f", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f0000000540)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r6, @ANYBLOB="0000000000000000b702000003000000850000008600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000040)='fib6_table_lookup\x00', r7}, 0x18) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x14, &(0x7f00000006c0)=ANY=[@ANYBLOB="1800000000181100"/20, @ANYRESDEC=r4, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000010000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000020850000000400000095"], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x40, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x19, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000070000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000"], 0x0, 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @cgroup_sockopt=0x16, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20}, 0x94) perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb89, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000, 0x4, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x80000000, 0x0, 0x10000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback=0x15, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000580)={&(0x7f0000000540)='fib6_table_lookup\x00', r8}, 0x10) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'ip6tnl0\x00', 0x210}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r9, 0x89f1, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x101) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f00000001c0)) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000004000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb70300000e41621eb70400000000000085000000c300000095"], 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1a, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000086"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r10 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="1b000000000000000000"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r10], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x90) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x2, &(0x7f0000000480)=ANY=[@ANYBLOB="18020000000000000000"], 0x0, 0x4, 0x0, 0x0, 0x0, 0x40}, 0x94) 1.133225107s ago: executing program 4 (id=2857): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000500)=ANY=[@ANYBLOB="0600000004000000ff0f000007"], 0x39) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b70400000000000085000000c300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x800}, 0x94) recvmsg$unix(0xffffffffffffffff, 0x0, 0x0) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0xc004743e, 0x110e22fff6) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, 0x0, &(0x7f0000000340)='syzkaller\x00'}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000001300)={&(0x7f0000000c00)='net_dev_start_xmit\x00', r2}, 0x10) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x18000000000002a0, 0xe2c, 0x60000000, &(0x7f0000000100)="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", 0x0, 0x24, 0x60000000}, 0x2c) 1.132992367s ago: executing program 4 (id=2858): bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d0000001801000020696c2500000000002020207b1af8ff00"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0xd, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000000008500000022000000180100002020702500000000002020207b0af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000000000008500000073"], 0x0, 0x0, 0x0, 0x0, 0x40e00, 0x10, '\x00', 0x0, @sock_ops=0x3, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x39, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000740)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x8, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="0a00000004000000040000000a"], 0x50) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000004c0), &(0x7f00000004c0), 0x1000, r0}, 0x38) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18000000000000000000000000000000850000006d"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x36, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x11, 0x14, &(0x7f0000000400)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000003"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1d, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='tlb_flush\x00', r1}, 0x10) 1.132826357s ago: executing program 1 (id=2859): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000f00000018010000646c6c2500000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x25, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000"], 0x0, 0xfffffffe, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="1b000000000000000000"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r1}, 0x10) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0x19, &(0x7f0000000140)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x2}, {{0x18, 0x1, 0x1, 0x0, r2}}, {}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r2}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x3ff}}, @call={0x85, 0x0, 0x0, 0xd0}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x40efe, 0x0, '\x00', 0x0, @fallback=0x1b, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) 1.025597353s ago: executing program 1 (id=2860): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000000400000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="1e00000000000000fdff070008"], 0x50) bpf$MAP_LOOKUP_ELEM(0x2, &(0x7f0000000280)={r1, 0x0, &(0x7f0000000200)=""/76}, 0x20) r2 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000040)='sched_switch\x00', r0}, 0x18) openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) socketpair(0x1d, 0x2, 0x2, &(0x7f0000000300)={0x0, 0x0}) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000080)={r1, 0x58, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r4 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000002c0)={&(0x7f0000000440)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xdc, 0xdc, 0x3, [@array={0x0, 0x0, 0x0, 0x3, 0x0, {0x5, 0x3, 0x7}}, @union={0x3, 0x4, 0x0, 0x5, 0x0, 0x154, [{0x0, 0x5, 0x4}, {0x6, 0x4, 0x9}, {0x3, 0x3, 0xe20}, {0x4, 0x1, 0x9}]}, @enum={0xf, 0x5, 0x0, 0x6, 0x4, [{0xb, 0xffff662e}, {0x5, 0x7fffffff}, {0x4, 0x2}, {0x0, 0x2}, {0xe, 0xa}]}, @enum64={0x3, 0x6, 0x0, 0x13, 0x1, 0x5, [{0x7, 0x4, 0x5}, {0x4, 0xfffffff9, 0x6d10}, {0x3, 0x8, 0x1}, {0x10, 0x100, 0xdb}, {0xf, 0x9, 0xed4d}, {0x4, 0x7, 0x1}]}]}, {0x0, [0x2e]}}, &(0x7f0000000540)=""/107, 0xf7, 0x6b, 0x0, 0x800}, 0x28) r5 = openat$cgroup_ro(r2, &(0x7f0000000640)='blkio.throttle.io_service_bytes\x00', 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000005c0)=@base={0x20, 0x3, 0x3, 0x6, 0xc400, r1, 0x0, '\x00', r3, r4, 0x0, 0x2, 0x1, 0x0, @value=r5}, 0x50) 932.80522ms ago: executing program 1 (id=2861): bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[], 0x48) r0 = bpf$MAP_CREATE(0x0, 0x0, 0x48) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x11, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1801000021000000000000004bc311ec8500000075000000850000000800000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='signal_deliver\x00', r1}, 0x10) syz_open_procfs$namespace(0x0, 0xfffffffffffffffe) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, 0x0, &(0x7f0000000580)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000140)={0x10, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="1800"/13], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24}, 0x94) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xa, 0x4, 0x8, 0x8}, 0x48) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000800)={0x11, 0xc, &(0x7f00000008c0)=ANY=[], 0x0, 0x7f, 0x0, 0x0, 0x0, 0x8, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="06000000040000"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000021b70400000000000085000000c300000095"], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000140)='sched_switch\x00', r3}, 0x10) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x6, 0x5, 0x0, &(0x7f0000000040)={0x0, 0x0}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x19, &(0x7f00000002c0)={0x0, &(0x7f0000000680)=""/133, 0x0, &(0x7f00000004c0)="477c74516ee6166c51286af7bebfc42a0bedfab910c2f116289216492e2c9064da72765d06beb79e295f082fd1eabf7a16b3c9ea37cba6d915c7f5617299", 0x8, r0, 0x4}, 0x38) bpf$MAP_CREATE(0x0, 0x0, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[], &(0x7f0000000340)='syzkaller\x00'}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r4, 0xa002a0, 0xe, 0x18, &(0x7f0000000000)="5ae02efc441a80536af0d1d905c7", &(0x7f0000000040)=""/24, 0x6414}, 0x50) 853.617795ms ago: executing program 4 (id=2862): perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x28, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0, 0x8}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) 853.288085ms ago: executing program 4 (id=2863): r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x34120, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext, 0x4000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x50) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0x19, &(0x7f0000000140)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x2}, {{0x18, 0x1, 0x1, 0x0, r1}}, {}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x3ff}}, @call={0x85, 0x0, 0x0, 0xd0}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x40efe, 0x0, '\x00', 0x0, @fallback=0x1b, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000000)='tlb_flush\x00', r2}, 0x10) r3 = bpf$MAP_CREATE(0x8001000000000000, &(0x7f0000000280)=ANY=[@ANYBLOB="0900000002000000040000000a"], 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000000900)={0x11, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r3}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0xec8}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000800)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d0000001801000020696c2500000000002020097b1af8ff00000000bfa100000000000007010000b8ffffffb702000000000000b7030000000000008500000070"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x32, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000000c0), &(0x7f0000000140), 0x1000, r3}, 0x38) ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x101) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f00000001c0)) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x14, &(0x7f0000000400)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000003"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1d, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='tlb_flush\x00', r4}, 0x10) 850.872425ms ago: executing program 0 (id=2864): bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={0x0}, 0x18) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)) bpf$MAP_CREATE(0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="1200000035000000040000000200000000000000", @ANYRES32, @ANYBLOB="0040e886c67a01c8355f2f0d2e1006da350b58cd13be9ef35302ac0ff7000000", @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x50) r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="1e000000000000000500000006"], 0x48) bpf$MAP_LOOKUP_ELEM(0x2, &(0x7f0000001740)={r1, 0x0, &(0x7f0000001700)=""/53}, 0x20) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000500)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x37, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="18010000000000000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_bp={0x0}, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TUNSETOFFLOAD(r0, 0xc004743e, 0x110c230000) ioctl$TUNSETOFFLOAD(r0, 0x8008743f, 0xf0ff1f00000000) 847.861825ms ago: executing program 2 (id=2865): bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002ac0)={0x1a, 0x3, &(0x7f0000000280)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x18, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x2000}, 0x94) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b7030000e8ffffff850000000400000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback=0x21, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000280)='tlb_flush\x00', r0}, 0x18) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="020000000400000006"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000001"], 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x25, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x16, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x2, '\x00', 0x0, @flow_dissector, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0e00000004000000080000000800000000000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="00020000000000000000000000000000000000000000fc31a55a0000"], 0x48) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x28, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_CREATE(0x300000000000000, &(0x7f0000000100)=ANY=[@ANYBLOB="1800000004000000410000000000000001000000", @ANYRES32=0x1, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="024000000500000000a934f5fd1600ff0100"/28], 0x48) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x50) bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16, 0x0, 0x4, 0xff, 0x0, 0x1}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x42, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0xcd) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f0000000300)='sched_switch\x00', r1}, 0x10) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000080)) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @cgroup_skb, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f00000004c0)={0xffffffffffffffff, &(0x7f0000000340), &(0x7f00000005c0)=""/155}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r2 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={0x0, r2}, 0x18) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8914, &(0x7f0000000480)={'ip6tnl0\x00', @local}) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r3, 0x8914, &(0x7f0000000000)={'veth0_vlan\x00', @random="0106002010ff"}) syz_clone(0xc0126080, 0x0, 0x0, 0x0, 0x0, 0x0) r4 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1801000021000000000000003b810000850000006d000000850000000800000095"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x31) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000680)={&(0x7f0000000000)='tlb_flush\x00', r4}, 0x10) unlink(&(0x7f0000000140)='./cgroup/../file0/file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00') syz_clone(0x400, 0x0, 0x0, 0x0, 0x0, 0x0) 296.33384ms ago: executing program 3 (id=2866): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="160000000000000004000000ff"], 0x48) r1 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000080), 0x4) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000000c0)={0x1b, 0x0, 0x0, 0x0, 0x0, r0, 0x6, '\x00', 0x0, r1, 0x4, 0x3, 0x1}, 0x50) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000740)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x10}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000800)={0x6, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x4, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) socketpair(0xa, 0x3, 0x87, &(0x7f0000000040)) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={r2, 0x2000000, 0xe, 0x0, &(0x7f00000004c0)="630b008646dc3f0adf33c9f7b986", 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x2}, 0x50) 231.843075ms ago: executing program 4 (id=2867): bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d0000001801000020696c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000000085000000710000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0xd, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000000008500000022000000180100002020702500000000002020207b0af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000000000008500000073"], 0x0, 0x0, 0x0, 0x0, 0x40e00, 0x10, '\x00', 0x0, @sock_ops=0x3, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x39, 0x0, 0x0, 0x0}, 0x94) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="0a00000004000000040000000a"], 0x50) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xa, 0x4, 0x2, 0x5, 0x2}, 0x50) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000004c0), &(0x7f00000004c0), 0x1000, r0}, 0x38) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18000000000000000000000000000000850000006d"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x36, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x11, 0x14, &(0x7f0000000400)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000003"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1d, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='tlb_flush\x00', r1}, 0x10) 49.175836ms ago: executing program 1 (id=2868): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000500)=ANY=[@ANYBLOB="0600000004000000ff0f000007"], 0x39) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b70400000000000085000000c300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x800}, 0x94) recvmsg$unix(0xffffffffffffffff, 0x0, 0x0) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0xc004743e, 0x110e22fff6) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, 0x0, &(0x7f0000000340)='syzkaller\x00'}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000001300)={&(0x7f0000000c00)='net_dev_start_xmit\x00', r2}, 0x10) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x18000000000002a0, 0xe2c, 0x60000000, &(0x7f0000000100)="b9ff03316844268cb89e14f0080047e0ffff00124000632f77fbac14fe16e000030a07080403fe80000020006558845013f2325f1a3901050b038da1880b25181aa59d943be3f4aed50ea5a6b8686731cb89ef77123c899b699eeaa8eaa0073461119663906400f30c0600000000000059b6d3296e8ca31bce1d8392078b72f24996ae17dffc2e43c8174b54b620636894aaacf28ff62616363c70a440aec4014caf28c0adc043084617d7ecf41e9d134589d46e5dfc4ca5780d38cae870b9a1df48b238190da450296b0ac01496ace23eefc9d4246dd14afbf79a2283a0bb7e1d235f3df126c3acc240d75a058f6efa6d1f5f7ff4000000000000000000", 0x0, 0x24, 0x60000000}, 0x2c) 444.199µs ago: executing program 0 (id=2869): socketpair$unix(0x1, 0x1, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000100)=ANY=[@ANYBLOB="180000000900000000000000213f0000c50000000e800000850000000e00000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) r1 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='mmap_lock_acquire_returned\x00', r0}, 0x10) r2 = bpf$ITER_CREATE(0xb, &(0x7f0000000100)={r1}, 0x8) r3 = perf_event_open$cgroup(&(0x7f0000000180)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x8}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r3, 0x4008240b, &(0x7f0000000000)={0x5, 0x80, 0x0, 0x9, 0x5, 0xb, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf6c, 0x2, @perf_bp={0x0, 0x5}, 0x8884, 0x0, 0x0, 0x5, 0x8, 0x0, 0x0, 0x0, 0x44, 0x0, 0xfffffffffffffffd}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000040b70400000000000085000000009500"/72], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f0000000300)='sched_switch\x00', r5}, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r8 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="0f00000004000000040000001200000000000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="0000000000000000000000000000000000000000000000000000000064545d41e499ca47445c7999ef4f5596a28d76f318645bda672e0d7bef0c0ee1c384546427b2950d45cac070cddf2f81e6b0a303873504539b59f6b28be32f08daad1a19201b6c7438736ab878165fe85b4f6c"], 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000740)={{r8}, &(0x7f00000006c0), &(0x7f0000000700)=r7}, 0x20) recvmsg(r7, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000540)=""/229, 0xe5}], 0x1}, 0x40010002) write$cgroup_pid(r6, 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r10, 0x8914, &(0x7f0000000040)={'sit0\x00', @local}) recvmsg(r9, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000bc0)=""/249, 0xf9}, 0x3) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000e00)) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SIOCSIFHWADDR(r2, 0x8914, &(0x7f0000000480)={'sit0\x00', @dev={'\xaa\xaa\xaa\xaa\xaa', 0x20}}) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000001040)={0x10, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @sk_msg, r2, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x2}, 0x94) bpf$MAP_CREATE(0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="160000000000000004000000ff0000", @ANYRES32=0x1, @ANYBLOB='\x00\x00\x00\x00\x00', @ANYRES32=0x0, @ANYRES32, @ANYBLOB="0000000000000053d485"], 0x48) bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[], 0x48) r11 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="1800000000000000000000000000000a850000000f000000850000009e00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f00000000c0)='sched_switch\x00', r11}, 0x10) 0s ago: executing program 3 (id=2870): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000f00000018010000646c6c2500000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x25, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000"], 0x0, 0xfffffffe, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="1b000000000000000000"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r1}, 0x10) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0x19, &(0x7f0000000140)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x2}, {{0x18, 0x1, 0x1, 0x0, r2}}, {}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r2}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x3ff}}, @call={0x85, 0x0, 0x0, 0xd0}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x40efe, 0x0, '\x00', 0x0, @fallback=0x1b, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) kernel console output (not intermixed with test programs): Warning: Permanently added '10.128.1.163' (ED25519) to the list of known hosts. [ 21.680667][ T28] audit: type=1400 audit(1761675644.120:64): avc: denied { mounton } for pid=275 comm="syz-executor" path="/syzcgroup/unified" dev="sda1" ino=2022 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 21.681831][ T275] cgroup: Unknown subsys name 'net' [ 21.704548][ T28] audit: type=1400 audit(1761675644.120:65): avc: denied { mount } for pid=275 comm="syz-executor" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 21.733203][ T28] audit: type=1400 audit(1761675644.160:66): avc: denied { unmount } for pid=275 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 21.733759][ T275] cgroup: Unknown subsys name 'devices' [ 21.877768][ T275] cgroup: Unknown subsys name 'hugetlb' [ 21.883776][ T275] cgroup: Unknown subsys name 'rlimit' [ 21.986108][ T28] audit: type=1400 audit(1761675644.430:67): avc: denied { setattr } for pid=275 comm="syz-executor" name="raw-gadget" dev="devtmpfs" ino=258 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 22.004309][ T277] SELinux: Context root:object_r:swapfile_t is not valid (left unmapped). [ 22.010777][ T28] audit: type=1400 audit(1761675644.430:68): avc: denied { mounton } for pid=275 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1 [ 22.045763][ T28] audit: type=1400 audit(1761675644.430:69): avc: denied { mount } for pid=275 comm="syz-executor" name="/" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=filesystem permissive=1 Setting up swapspace version 1, size = 127995904 bytes [ 22.069878][ T28] audit: type=1400 audit(1761675644.470:70): avc: denied { relabelto } for pid=277 comm="mkswap" name="swap-file" dev="sda1" ino=2025 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 22.094755][ T275] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 22.096340][ T28] audit: type=1400 audit(1761675644.470:71): avc: denied { write } for pid=277 comm="mkswap" path="/root/swap-file" dev="sda1" ino=2025 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 22.131265][ T28] audit: type=1400 audit(1761675644.520:72): avc: denied { read } for pid=275 comm="syz-executor" name="swap-file" dev="sda1" ino=2025 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 22.157970][ T28] audit: type=1400 audit(1761675644.520:73): avc: denied { open } for pid=275 comm="syz-executor" path="/root/swap-file" dev="sda1" ino=2025 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 23.004001][ T284] bridge0: port 1(bridge_slave_0) entered blocking state [ 23.011896][ T284] bridge0: port 1(bridge_slave_0) entered disabled state [ 23.020070][ T284] device bridge_slave_0 entered promiscuous mode [ 23.035363][ T285] bridge0: port 1(bridge_slave_0) entered blocking state [ 23.042555][ T285] bridge0: port 1(bridge_slave_0) entered disabled state [ 23.049979][ T285] device bridge_slave_0 entered promiscuous mode [ 23.056942][ T284] bridge0: port 2(bridge_slave_1) entered blocking state [ 23.064315][ T284] bridge0: port 2(bridge_slave_1) entered disabled state [ 23.072562][ T284] device bridge_slave_1 entered promiscuous mode [ 23.094943][ T285] bridge0: port 2(bridge_slave_1) entered blocking state [ 23.102871][ T285] bridge0: port 2(bridge_slave_1) entered disabled state [ 23.111583][ T285] device bridge_slave_1 entered promiscuous mode [ 23.180643][ T286] bridge0: port 1(bridge_slave_0) entered blocking state [ 23.188188][ T286] bridge0: port 1(bridge_slave_0) entered disabled state [ 23.196462][ T286] device bridge_slave_0 entered promiscuous mode [ 23.205001][ T286] bridge0: port 2(bridge_slave_1) entered blocking state [ 23.212602][ T286] bridge0: port 2(bridge_slave_1) entered disabled state [ 23.220842][ T286] device bridge_slave_1 entered promiscuous mode [ 23.234772][ T283] bridge0: port 1(bridge_slave_0) entered blocking state [ 23.242263][ T283] bridge0: port 1(bridge_slave_0) entered disabled state [ 23.250054][ T283] device bridge_slave_0 entered promiscuous mode [ 23.260766][ T283] bridge0: port 2(bridge_slave_1) entered blocking state [ 23.268222][ T283] bridge0: port 2(bridge_slave_1) entered disabled state [ 23.276140][ T283] device bridge_slave_1 entered promiscuous mode [ 23.356647][ T287] bridge0: port 1(bridge_slave_0) entered blocking state [ 23.364303][ T287] bridge0: port 1(bridge_slave_0) entered disabled state [ 23.371909][ T287] device bridge_slave_0 entered promiscuous mode [ 23.399210][ T287] bridge0: port 2(bridge_slave_1) entered blocking state [ 23.406792][ T287] bridge0: port 2(bridge_slave_1) entered disabled state [ 23.414540][ T287] device bridge_slave_1 entered promiscuous mode [ 23.490354][ T284] bridge0: port 2(bridge_slave_1) entered blocking state [ 23.498015][ T284] bridge0: port 2(bridge_slave_1) entered forwarding state [ 23.505593][ T284] bridge0: port 1(bridge_slave_0) entered blocking state [ 23.512882][ T284] bridge0: port 1(bridge_slave_0) entered forwarding state [ 23.561840][ T8] bridge0: port 1(bridge_slave_0) entered disabled state [ 23.569637][ T8] bridge0: port 2(bridge_slave_1) entered disabled state [ 23.578615][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 23.586632][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 23.618991][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 23.627966][ T8] bridge0: port 1(bridge_slave_0) entered blocking state [ 23.635352][ T8] bridge0: port 1(bridge_slave_0) entered forwarding state [ 23.643870][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 23.653222][ T8] bridge0: port 2(bridge_slave_1) entered blocking state [ 23.660632][ T8] bridge0: port 2(bridge_slave_1) entered forwarding state [ 23.678506][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 23.698767][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 23.720867][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 23.733587][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 23.742585][ T8] bridge0: port 1(bridge_slave_0) entered blocking state [ 23.750458][ T8] bridge0: port 1(bridge_slave_0) entered forwarding state [ 23.758807][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 23.768124][ T8] bridge0: port 2(bridge_slave_1) entered blocking state [ 23.775809][ T8] bridge0: port 2(bridge_slave_1) entered forwarding state [ 23.803918][ T284] device veth0_vlan entered promiscuous mode [ 23.811237][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 23.820271][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 23.829351][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 23.838509][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 23.847925][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 23.855972][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 23.863596][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 23.871587][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 23.879471][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 23.888226][ T8] bridge0: port 1(bridge_slave_0) entered blocking state [ 23.895704][ T8] bridge0: port 1(bridge_slave_0) entered forwarding state [ 23.903411][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 23.912338][ T8] bridge0: port 2(bridge_slave_1) entered blocking state [ 23.920010][ T8] bridge0: port 2(bridge_slave_1) entered forwarding state [ 23.928569][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 23.937309][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 23.945367][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 23.964409][ T285] device veth0_vlan entered promiscuous mode [ 23.971571][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 23.980039][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 23.988242][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 23.996480][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 24.006425][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 24.014213][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 24.042066][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 24.051318][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 24.060173][ T8] bridge0: port 1(bridge_slave_0) entered blocking state [ 24.067502][ T8] bridge0: port 1(bridge_slave_0) entered forwarding state [ 24.075343][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 24.084738][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 24.093333][ T8] bridge0: port 2(bridge_slave_1) entered blocking state [ 24.100899][ T8] bridge0: port 2(bridge_slave_1) entered forwarding state [ 24.109087][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 24.118503][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 24.127160][ T8] bridge0: port 1(bridge_slave_0) entered blocking state [ 24.134878][ T8] bridge0: port 1(bridge_slave_0) entered forwarding state [ 24.142823][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 24.151619][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 24.160062][ T8] bridge0: port 2(bridge_slave_1) entered blocking state [ 24.167193][ T8] bridge0: port 2(bridge_slave_1) entered forwarding state [ 24.174898][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 24.183365][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 24.191933][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 24.200242][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 24.209194][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 24.217074][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 24.232254][ T284] device veth1_macvtap entered promiscuous mode [ 24.245842][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 24.254697][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 24.263398][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 24.272255][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 24.281336][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 24.289664][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 24.298486][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 24.306858][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 24.315890][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 24.324413][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 24.333062][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 24.347121][ T285] device veth1_macvtap entered promiscuous mode [ 24.360405][ T287] device veth0_vlan entered promiscuous mode [ 24.366964][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 24.375259][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 24.384005][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 24.392534][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 24.401693][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 24.411056][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 24.419940][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 24.428860][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 24.437261][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 24.445871][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 24.454580][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 24.463719][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 24.471428][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 24.484126][ T286] device veth0_vlan entered promiscuous mode [ 24.490979][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 24.499713][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 24.508833][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 24.517675][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 24.526453][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 24.535932][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 24.552678][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 24.561001][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 24.569011][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 24.577829][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 24.600882][ T285] request_module fs-gadgetfs succeeded, but still no fs? [ 24.609921][ T200] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 24.619507][ T200] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 24.628211][ T200] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 24.636618][ T200] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 24.646530][ T200] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 24.654944][ T200] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 24.664137][ T283] device veth0_vlan entered promiscuous mode [ 24.677182][ T283] device veth1_macvtap entered promiscuous mode [ 24.686261][ T200] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 24.710878][ C1] hrtimer: interrupt took 16971 ns [ 24.723185][ T200] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 24.737615][ T200] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 24.748282][ T287] device veth1_macvtap entered promiscuous mode [ 24.758057][ T286] device veth1_macvtap entered promiscuous mode [ 24.792915][ T200] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 24.801189][ T200] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 24.821081][ T200] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 24.836983][ T200] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 24.845136][ T200] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 24.854499][ T200] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 24.885488][ T200] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 24.916374][ T200] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 24.971912][ T200] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 24.989903][ T200] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 25.005944][ T200] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 25.021662][ T200] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 25.036080][ T200] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 25.053696][ T200] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 25.072307][ T200] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 25.091305][ T200] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 25.642140][ T371] device sit0 entered promiscuous mode [ 26.766364][ T410] Driver unsupported XDP return value 0 on prog (id 22) dev N/A, expect packet loss! [ 26.837229][ T405] bridge0: port 3(veth0) entered blocking state [ 26.905689][ T405] bridge0: port 3(veth0) entered disabled state [ 27.008685][ T405] device veth0 entered promiscuous mode [ 27.065214][ T405] bridge0: port 3(veth0) entered blocking state [ 27.072277][ T405] bridge0: port 3(veth0) entered forwarding state [ 27.915222][ T455] bridge0: port 3(veth0) entered blocking state [ 27.923172][ T455] bridge0: port 3(veth0) entered disabled state [ 28.136597][ T455] device veth0 entered promiscuous mode [ 28.256365][ T455] bridge0: port 3(veth0) entered blocking state [ 28.264911][ T455] bridge0: port 3(veth0) entered forwarding state [ 28.914333][ T497] bridge0: port 3(veth0) entered blocking state [ 28.956008][ T497] bridge0: port 3(veth0) entered disabled state [ 29.022064][ T497] device veth0 entered promiscuous mode [ 29.074563][ T497] bridge0: port 3(veth0) entered blocking state [ 29.081844][ T497] bridge0: port 3(veth0) entered forwarding state [ 37.350316][ T744] bridge0: port 3(veth0) entered blocking state [ 37.360355][ T744] bridge0: port 3(veth0) entered disabled state [ 37.375227][ T744] device veth0 entered promiscuous mode [ 37.452201][ T28] kauditd_printk_skb: 36 callbacks suppressed [ 37.452215][ T28] audit: type=1400 audit(1761675659.890:110): avc: denied { tracepoint } for pid=761 comm="syz.1.144" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=1 [ 37.454538][ T744] bridge0: port 3(veth0) entered blocking state [ 37.485696][ T744] bridge0: port 3(veth0) entered forwarding state [ 38.020839][ T777] bridge0: port 3(veth0) entered blocking state [ 38.097311][ T777] bridge0: port 3(veth0) entered disabled state [ 38.216942][ T777] device veth0 entered promiscuous mode [ 38.295969][ T777] bridge0: port 3(veth0) entered blocking state [ 38.302451][ T777] bridge0: port 3(veth0) entered forwarding state [ 38.856797][ T788] device veth1_macvtap left promiscuous mode [ 42.992412][ T959] device wg2 entered promiscuous mode [ 43.870068][ T28] audit: type=1400 audit(1761675666.300:111): avc: denied { create } for pid=991 comm="syz.4.221" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=pppox_socket permissive=1 [ 47.600969][ T1080] syz.4.250 uses obsolete (PF_INET,SOCK_PACKET) [ 47.612245][ T28] audit: type=1400 audit(1761675670.050:112): avc: denied { create } for pid=1079 comm="syz.4.250" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 50.626316][ T28] audit: type=1400 audit(1761675673.060:113): avc: denied { read } for pid=1154 comm="syz.2.279" name="ppp" dev="devtmpfs" ino=158 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ppp_device_t tclass=chr_file permissive=1 [ 50.665921][ T28] audit: type=1400 audit(1761675673.070:114): avc: denied { open } for pid=1154 comm="syz.2.279" path="/dev/ppp" dev="devtmpfs" ino=158 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ppp_device_t tclass=chr_file permissive=1 [ 50.732834][ T28] audit: type=1400 audit(1761675673.090:115): avc: denied { ioctl } for pid=1154 comm="syz.2.279" path="/dev/ppp" dev="devtmpfs" ino=158 ioctlcmd=0x743e scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ppp_device_t tclass=chr_file permissive=1 [ 51.066770][ T28] audit: type=1400 audit(1761675673.510:116): avc: denied { setopt } for pid=1170 comm="syz.3.286" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 51.617280][ T1173] syz.3.286 (1173) used greatest stack depth: 21320 bytes left [ 55.607103][ T1329] bond_slave_1: mtu less than device minimum [ 55.802135][ T1332] bond_slave_1: mtu less than device minimum [ 56.208733][ T28] audit: type=1400 audit(1761675678.650:117): avc: denied { write } for pid=1365 comm="syz.3.353" name="ppp" dev="devtmpfs" ino=158 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ppp_device_t tclass=chr_file permissive=1 [ 57.391510][ T28] audit: type=1400 audit(1761675679.830:118): avc: denied { read } for pid=1402 comm="syz.4.367" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 57.957288][ T1423] device veth0_vlan left promiscuous mode [ 58.007914][ T1423] device veth0_vlan entered promiscuous mode [ 58.123556][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 58.145135][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 58.178950][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 58.275871][ T1427] FAULT_INJECTION: forcing a failure. [ 58.275871][ T1427] name fail_usercopy, interval 1, probability 0, space 0, times 1 [ 58.295558][ T1427] CPU: 0 PID: 1427 Comm: syz.3.371 Not tainted syzkaller #0 [ 58.303836][ T1427] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 58.314470][ T1427] Call Trace: [ 58.317884][ T1427] [ 58.321436][ T1427] __dump_stack+0x21/0x24 [ 58.325908][ T1427] dump_stack_lvl+0xee/0x150 [ 58.330875][ T1427] ? __cfi_dump_stack_lvl+0x8/0x8 [ 58.336165][ T1427] ? __kmalloc_node+0xb2/0x1e0 [ 58.341067][ T1427] dump_stack+0x15/0x24 [ 58.345666][ T1427] should_fail_ex+0x3d4/0x520 [ 58.351021][ T1427] should_fail+0xb/0x10 [ 58.355380][ T1427] should_fail_usercopy+0x1a/0x20 [ 58.360702][ T1427] _copy_to_user+0x1e/0x90 [ 58.365581][ T1427] map_get_next_key+0x3a6/0x4d0 [ 58.370635][ T1427] __sys_bpf+0x3cc/0x780 [ 58.375152][ T1427] ? bpf_link_show_fdinfo+0x320/0x320 [ 58.380712][ T1427] ? __cfi_ksys_write+0x10/0x10 [ 58.385687][ T1427] ? debug_smp_processor_id+0x17/0x20 [ 58.391281][ T1427] __x64_sys_bpf+0x7c/0x90 [ 58.396669][ T1427] x64_sys_call+0x488/0x9a0 [ 58.401458][ T1427] do_syscall_64+0x4c/0xa0 [ 58.406161][ T1427] ? clear_bhb_loop+0x30/0x80 [ 58.411128][ T1427] ? clear_bhb_loop+0x30/0x80 [ 58.415836][ T1427] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 58.422169][ T1427] RIP: 0033:0x7f0eb718efc9 [ 58.426926][ T1427] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 58.447587][ T1427] RSP: 002b:00007f0eb80ae038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 58.456496][ T1427] RAX: ffffffffffffffda RBX: 00007f0eb73e5fa0 RCX: 00007f0eb718efc9 [ 58.464975][ T1427] RDX: 0000000000000020 RSI: 0000200000000300 RDI: 0000000000000004 [ 58.473145][ T1427] RBP: 00007f0eb80ae090 R08: 0000000000000000 R09: 0000000000000000 [ 58.481640][ T1427] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 58.490490][ T1427] R13: 00007f0eb73e6038 R14: 00007f0eb73e5fa0 R15: 00007ffd2deb1888 [ 58.499263][ T1427] [ 58.670578][ T28] audit: type=1400 audit(1761675681.110:119): avc: denied { cpu } for pid=1428 comm="syz.3.372" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=1 [ 58.847040][ T1430] device sit0 entered promiscuous mode [ 62.865355][ T1529] device sit0 entered promiscuous mode [ 64.554768][ T1557] FAULT_INJECTION: forcing a failure. [ 64.554768][ T1557] name failslab, interval 1, probability 0, space 0, times 1 [ 64.575772][ T1557] CPU: 0 PID: 1557 Comm: syz.3.416 Not tainted syzkaller #0 [ 64.584146][ T1557] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 64.595840][ T1557] Call Trace: [ 64.599883][ T1557] [ 64.603006][ T1557] __dump_stack+0x21/0x24 [ 64.607716][ T1557] dump_stack_lvl+0xee/0x150 [ 64.612393][ T1557] ? __cfi_dump_stack_lvl+0x8/0x8 [ 64.617852][ T1557] dump_stack+0x15/0x24 [ 64.622631][ T1557] should_fail_ex+0x3d4/0x520 [ 64.628935][ T1557] ? security_file_alloc+0x33/0x130 [ 64.634501][ T1557] __should_failslab+0xac/0xf0 [ 64.639971][ T1557] should_failslab+0x9/0x20 [ 64.644792][ T1557] kmem_cache_alloc+0x3b/0x330 [ 64.649909][ T1557] ? __alloc_file+0x28/0x2a0 [ 64.654904][ T1557] security_file_alloc+0x33/0x130 [ 64.660490][ T1557] __alloc_file+0xb5/0x2a0 [ 64.665562][ T1557] alloc_empty_file+0x97/0x180 [ 64.670506][ T1557] path_openat+0xf4/0x2f50 [ 64.675019][ T1557] ? kasan_set_track+0x4b/0x70 [ 64.680052][ T1557] ? kasan_save_alloc_info+0x25/0x30 [ 64.686136][ T1557] ? __kasan_slab_alloc+0x72/0x80 [ 64.692144][ T1557] ? kmem_cache_alloc+0x16e/0x330 [ 64.697997][ T1557] ? getname_flags+0xb9/0x500 [ 64.703385][ T1557] ? getname+0x19/0x20 [ 64.707979][ T1557] ? do_sys_openat2+0xcb/0x7e0 [ 64.713828][ T1557] ? __x64_sys_openat+0x136/0x160 [ 64.719667][ T1557] ? x64_sys_call+0x783/0x9a0 [ 64.725590][ T1557] ? do_syscall_64+0x4c/0xa0 [ 64.730557][ T1557] ? entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 64.737344][ T1557] ? do_filp_open+0x3c0/0x3c0 [ 64.742784][ T1557] do_filp_open+0x1c1/0x3c0 [ 64.748241][ T1557] ? __cfi_do_filp_open+0x10/0x10 [ 64.753944][ T1557] ? alloc_fd+0x4e6/0x590 [ 64.759189][ T1557] do_sys_openat2+0x185/0x7e0 [ 64.765123][ T1557] ? do_sys_open+0xe0/0xe0 [ 64.769562][ T1557] ? asm_sysvec_apic_timer_interrupt+0x1b/0x20 [ 64.776184][ T1557] __x64_sys_openat+0x136/0x160 [ 64.781673][ T1557] x64_sys_call+0x783/0x9a0 [ 64.786845][ T1557] do_syscall_64+0x4c/0xa0 [ 64.791450][ T1557] ? clear_bhb_loop+0x30/0x80 [ 64.796584][ T1557] ? clear_bhb_loop+0x30/0x80 [ 64.801417][ T1557] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 64.807694][ T1557] RIP: 0033:0x7f0eb718efc9 [ 64.812685][ T1557] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 64.835039][ T1557] RSP: 002b:00007f0eb80ae038 EFLAGS: 00000246 ORIG_RAX: 0000000000000101 [ 64.845155][ T1557] RAX: ffffffffffffffda RBX: 00007f0eb73e5fa0 RCX: 00007f0eb718efc9 [ 64.853837][ T1557] RDX: 0000000000000000 RSI: 0000200000000280 RDI: ffffffffffffff9c [ 64.862843][ T1557] RBP: 00007f0eb80ae090 R08: 0000000000000000 R09: 0000000000000000 [ 64.872035][ T1557] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 64.882368][ T1557] R13: 00007f0eb73e6038 R14: 00007f0eb73e5fa0 R15: 00007ffd2deb1888 [ 64.892991][ T1557] [ 65.691735][ T28] audit: type=1400 audit(1761675688.130:120): avc: denied { write } for pid=1595 comm="syz.2.429" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 65.778666][ T1582] ip6_vti0: mtu greater than device maximum [ 67.279114][ T1643] FAULT_INJECTION: forcing a failure. [ 67.279114][ T1643] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 67.299119][ T1643] CPU: 0 PID: 1643 Comm: syz.0.447 Not tainted syzkaller #0 [ 67.309662][ T1643] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 67.323435][ T1643] Call Trace: [ 67.326828][ T1643] [ 67.330393][ T1643] __dump_stack+0x21/0x24 [ 67.336019][ T1643] dump_stack_lvl+0xee/0x150 [ 67.341947][ T1643] ? __cfi_dump_stack_lvl+0x8/0x8 [ 67.348738][ T1643] dump_stack+0x15/0x24 [ 67.353864][ T1643] should_fail_ex+0x3d4/0x520 [ 67.359357][ T1643] should_fail+0xb/0x10 [ 67.364445][ T1643] should_fail_usercopy+0x1a/0x20 [ 67.370651][ T1643] _copy_from_user+0x1e/0xc0 [ 67.376595][ T1643] bpf_prog_test_run_skb+0x286/0x1290 [ 67.383489][ T1643] ? __fget_files+0x2d5/0x330 [ 67.388971][ T1643] ? __cfi_bpf_prog_test_run_skb+0x10/0x10 [ 67.395332][ T1643] bpf_prog_test_run+0x3e3/0x630 [ 67.400738][ T1643] ? slab_free_freelist_hook+0xc2/0x190 [ 67.407638][ T1643] ? bpf_prog_query+0x270/0x270 [ 67.413936][ T1643] ? selinux_bpf+0xce/0xf0 [ 67.419345][ T1643] ? security_bpf+0x93/0xb0 [ 67.424344][ T1643] __sys_bpf+0x56d/0x780 [ 67.429837][ T1643] ? bpf_link_show_fdinfo+0x320/0x320 [ 67.436269][ T1643] ? __cfi_ksys_write+0x10/0x10 [ 67.442772][ T1643] ? debug_smp_processor_id+0x17/0x20 [ 67.450029][ T1643] __x64_sys_bpf+0x7c/0x90 [ 67.455439][ T1643] x64_sys_call+0x488/0x9a0 [ 67.460561][ T1643] do_syscall_64+0x4c/0xa0 [ 67.465858][ T1643] ? clear_bhb_loop+0x30/0x80 [ 67.471043][ T1643] ? clear_bhb_loop+0x30/0x80 [ 67.476328][ T1643] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 67.482565][ T1643] RIP: 0033:0x7f5d9238efc9 [ 67.487317][ T1643] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 67.510588][ T1643] RSP: 002b:00007f5d931d0038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 67.521027][ T1643] RAX: ffffffffffffffda RBX: 00007f5d925e5fa0 RCX: 00007f5d9238efc9 [ 67.531996][ T1643] RDX: 0000000000000050 RSI: 00002000000002c0 RDI: 000000000000000a [ 67.541667][ T1643] RBP: 00007f5d931d0090 R08: 0000000000000000 R09: 0000000000000000 [ 67.551383][ T1643] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 67.560845][ T1643] R13: 00007f5d925e6038 R14: 00007f5d925e5fa0 R15: 00007ffe76cca8d8 [ 67.570037][ T1643] [ 67.585343][ T1648] FAULT_INJECTION: forcing a failure. [ 67.585343][ T1648] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 67.623156][ T1648] CPU: 0 PID: 1648 Comm: syz.2.449 Not tainted syzkaller #0 [ 67.631623][ T1648] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 67.642281][ T1648] Call Trace: [ 67.646469][ T1648] [ 67.650542][ T1648] __dump_stack+0x21/0x24 [ 67.656567][ T1648] dump_stack_lvl+0xee/0x150 [ 67.662557][ T1648] ? __cfi_dump_stack_lvl+0x8/0x8 [ 67.667967][ T1648] ? memcpy+0x56/0x70 [ 67.673901][ T1648] dump_stack+0x15/0x24 [ 67.678450][ T1648] should_fail_ex+0x3d4/0x520 [ 67.686427][ T1648] should_fail+0xb/0x10 [ 67.691818][ T1648] should_fail_usercopy+0x1a/0x20 [ 67.697261][ T1648] strncpy_from_user+0x24/0x2d0 [ 67.702841][ T1648] bpf_prog_load+0x1bb/0x15a0 [ 67.709807][ T1648] ? map_freeze+0x390/0x390 [ 67.714524][ T1648] ? selinux_bpf+0xc7/0xf0 [ 67.719367][ T1648] ? security_bpf+0x93/0xb0 [ 67.724476][ T1648] __sys_bpf+0x504/0x780 [ 67.729209][ T1648] ? bpf_link_show_fdinfo+0x320/0x320 [ 67.734675][ T1648] ? __cfi_ksys_write+0x10/0x10 [ 67.740484][ T1648] ? debug_smp_processor_id+0x17/0x20 [ 67.746293][ T1648] __x64_sys_bpf+0x7c/0x90 [ 67.751480][ T1648] x64_sys_call+0x488/0x9a0 [ 67.756940][ T1648] do_syscall_64+0x4c/0xa0 [ 67.762678][ T1648] ? clear_bhb_loop+0x30/0x80 [ 67.768190][ T1648] ? clear_bhb_loop+0x30/0x80 [ 67.773494][ T1648] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 67.780176][ T1648] RIP: 0033:0x7f5676f8efc9 [ 67.785145][ T1648] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 67.806738][ T1648] RSP: 002b:00007f5677ee7038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 67.816052][ T1648] RAX: ffffffffffffffda RBX: 00007f56771e5fa0 RCX: 00007f5676f8efc9 [ 67.824846][ T1648] RDX: 0000000000000094 RSI: 00002000000007c0 RDI: 0000000000000005 [ 67.834497][ T1648] RBP: 00007f5677ee7090 R08: 0000000000000000 R09: 0000000000000000 [ 67.844085][ T1648] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 67.854334][ T1648] R13: 00007f56771e6038 R14: 00007f56771e5fa0 R15: 00007ffe1faf5668 [ 67.863238][ T1648] [ 71.157194][ T1782] device pim6reg1 entered promiscuous mode [ 71.975198][ T1834] FAULT_INJECTION: forcing a failure. [ 71.975198][ T1834] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 71.992401][ T1834] CPU: 0 PID: 1834 Comm: syz.4.513 Not tainted syzkaller #0 [ 72.001298][ T1834] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 72.012628][ T1834] Call Trace: [ 72.016173][ T1834] [ 72.019377][ T1834] __dump_stack+0x21/0x24 [ 72.024520][ T1834] dump_stack_lvl+0xee/0x150 [ 72.029807][ T1834] ? __cfi_dump_stack_lvl+0x8/0x8 [ 72.036101][ T1834] ? asm_sysvec_apic_timer_interrupt+0x1b/0x20 [ 72.043149][ T1834] dump_stack+0x15/0x24 [ 72.047671][ T1834] should_fail_ex+0x3d4/0x520 [ 72.053074][ T1834] should_fail+0xb/0x10 [ 72.057249][ T1834] should_fail_usercopy+0x1a/0x20 [ 72.064303][ T1834] _copy_to_user+0x1e/0x90 [ 72.069094][ T1834] generic_map_lookup_batch+0x6c8/0xa90 [ 72.074863][ T1834] ? __cfi_generic_map_lookup_batch+0x10/0x10 [ 72.081255][ T1834] ? __fdget+0x19c/0x220 [ 72.086226][ T1834] ? __cfi_generic_map_lookup_batch+0x10/0x10 [ 72.093277][ T1834] bpf_map_do_batch+0x2e8/0x620 [ 72.098675][ T1834] __sys_bpf+0x624/0x780 [ 72.103397][ T1834] ? bpf_link_show_fdinfo+0x320/0x320 [ 72.109092][ T1834] ? irqentry_exit+0x37/0x40 [ 72.113970][ T1834] ? sysvec_apic_timer_interrupt+0x64/0xc0 [ 72.120062][ T1834] ? asm_sysvec_apic_timer_interrupt+0x1b/0x20 [ 72.126582][ T1834] __x64_sys_bpf+0x7c/0x90 [ 72.131020][ T1834] x64_sys_call+0x488/0x9a0 [ 72.135804][ T1834] do_syscall_64+0x4c/0xa0 [ 72.140696][ T1834] ? clear_bhb_loop+0x30/0x80 [ 72.145730][ T1834] ? clear_bhb_loop+0x30/0x80 [ 72.150693][ T1834] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 72.157590][ T1834] RIP: 0033:0x7fbf7e38efc9 [ 72.162802][ T1834] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 72.183904][ T1834] RSP: 002b:00007fbf7f1dd038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 72.193142][ T1834] RAX: ffffffffffffffda RBX: 00007fbf7e5e5fa0 RCX: 00007fbf7e38efc9 [ 72.201534][ T1834] RDX: 0000000000000038 RSI: 00002000000004c0 RDI: 0000000000000018 [ 72.209816][ T1834] RBP: 00007fbf7f1dd090 R08: 0000000000000000 R09: 0000000000000000 [ 72.220061][ T1834] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 72.230320][ T1834] R13: 00007fbf7e5e6038 R14: 00007fbf7e5e5fa0 R15: 00007fff4d946168 [ 72.239751][ T1834] [ 72.247908][ T1830] device wg2 entered promiscuous mode [ 72.315269][ T1828] device sit0 left promiscuous mode [ 73.001445][ T1884] FAULT_INJECTION: forcing a failure. [ 73.001445][ T1884] name failslab, interval 1, probability 0, space 0, times 0 [ 73.036186][ T1884] CPU: 1 PID: 1884 Comm: syz.0.531 Not tainted syzkaller #0 [ 73.044301][ T1884] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 73.055497][ T1884] Call Trace: [ 73.059323][ T1884] [ 73.064546][ T1884] __dump_stack+0x21/0x24 [ 73.070773][ T1884] dump_stack_lvl+0xee/0x150 [ 73.075376][ T1884] ? __cfi_dump_stack_lvl+0x8/0x8 [ 73.080783][ T1884] dump_stack+0x15/0x24 [ 73.085467][ T1884] should_fail_ex+0x3d4/0x520 [ 73.090463][ T1884] __should_failslab+0xac/0xf0 [ 73.096870][ T1884] ? selinux_sk_alloc_security+0x7e/0x1a0 [ 73.103748][ T1884] should_failslab+0x9/0x20 [ 73.108971][ T1884] __kmem_cache_alloc_node+0x3d/0x2c0 [ 73.114775][ T1884] ? selinux_sk_alloc_security+0x7e/0x1a0 [ 73.120875][ T1884] kmalloc_trace+0x29/0xb0 [ 73.125515][ T1884] selinux_sk_alloc_security+0x7e/0x1a0 [ 73.131596][ T1884] security_sk_alloc+0x83/0xb0 [ 73.136539][ T1884] sk_prot_alloc+0x108/0x320 [ 73.141704][ T1884] sk_alloc+0x3b/0x460 [ 73.146400][ T1884] ? __kasan_check_write+0x14/0x20 [ 73.153875][ T1884] bpf_prog_test_run_skb+0x37e/0x1290 [ 73.160283][ T1884] ? __fget_files+0x2d5/0x330 [ 73.165415][ T1884] ? __cfi_bpf_prog_test_run_skb+0x10/0x10 [ 73.172131][ T1884] bpf_prog_test_run+0x3e3/0x630 [ 73.178399][ T1884] ? slab_free_freelist_hook+0xc2/0x190 [ 73.185114][ T1884] ? bpf_prog_query+0x270/0x270 [ 73.190628][ T1884] ? selinux_bpf+0xce/0xf0 [ 73.195432][ T1884] ? security_bpf+0x93/0xb0 [ 73.195943][ T28] audit: type=1400 audit(1761675695.540:121): avc: denied { ioctl } for pid=1877 comm="syz.1.530" path="socket:[20771]" dev="sockfs" ino=20771 ioctlcmd=0x8912 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 73.200569][ T1884] __sys_bpf+0x56d/0x780 [ 73.233269][ T1884] ? bpf_link_show_fdinfo+0x320/0x320 [ 73.238928][ T1884] ? __cfi_ksys_write+0x10/0x10 [ 73.244057][ T1884] ? debug_smp_processor_id+0x17/0x20 [ 73.249536][ T1884] __x64_sys_bpf+0x7c/0x90 [ 73.254065][ T1884] x64_sys_call+0x488/0x9a0 [ 73.258960][ T1884] do_syscall_64+0x4c/0xa0 [ 73.263639][ T1884] ? clear_bhb_loop+0x30/0x80 [ 73.268450][ T1884] ? clear_bhb_loop+0x30/0x80 [ 73.273393][ T1884] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 73.279371][ T1884] RIP: 0033:0x7f5d9238efc9 [ 73.283968][ T1884] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 73.304627][ T1884] RSP: 002b:00007f5d931d0038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 73.314082][ T1884] RAX: ffffffffffffffda RBX: 00007f5d925e5fa0 RCX: 00007f5d9238efc9 [ 73.322553][ T1884] RDX: 000000000000002c RSI: 0000200000000080 RDI: 000000000000000a [ 73.331499][ T1884] RBP: 00007f5d931d0090 R08: 0000000000000000 R09: 0000000000000000 [ 73.340175][ T1884] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 73.348739][ T1884] R13: 00007f5d925e6038 R14: 00007f5d925e5fa0 R15: 00007ffe76cca8d8 [ 73.357501][ T1884] [ 76.671623][ T2023] FAULT_INJECTION: forcing a failure. [ 76.671623][ T2023] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 76.726044][ T2023] CPU: 1 PID: 2023 Comm: syz.4.576 Not tainted syzkaller #0 [ 76.734073][ T2023] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 76.744672][ T2023] Call Trace: [ 76.748223][ T2023] [ 76.751253][ T2023] __dump_stack+0x21/0x24 [ 76.755725][ T2023] dump_stack_lvl+0xee/0x150 [ 76.761524][ T2023] ? __cfi_dump_stack_lvl+0x8/0x8 [ 76.767355][ T2023] dump_stack+0x15/0x24 [ 76.771965][ T2023] should_fail_ex+0x3d4/0x520 [ 76.777009][ T2023] should_fail+0xb/0x10 [ 76.781629][ T2023] should_fail_usercopy+0x1a/0x20 [ 76.787023][ T2023] _copy_from_user+0x1e/0xc0 [ 76.791991][ T2023] bpf_prog_test_run_skb+0x286/0x1290 [ 76.797912][ T2023] ? __fget_files+0x2d5/0x330 [ 76.803034][ T2023] ? __cfi_bpf_prog_test_run_skb+0x10/0x10 [ 76.808874][ T2023] bpf_prog_test_run+0x3e3/0x630 [ 76.814079][ T2023] ? slab_free_freelist_hook+0xc2/0x190 [ 76.819892][ T2023] ? bpf_prog_query+0x270/0x270 [ 76.824908][ T2023] ? selinux_bpf+0xce/0xf0 [ 76.829500][ T2023] ? security_bpf+0x93/0xb0 [ 76.834735][ T2023] __sys_bpf+0x56d/0x780 [ 76.839509][ T2023] ? bpf_link_show_fdinfo+0x320/0x320 [ 76.845486][ T2023] ? __cfi_ksys_write+0x10/0x10 [ 76.850610][ T2023] ? debug_smp_processor_id+0x17/0x20 [ 76.856475][ T2023] __x64_sys_bpf+0x7c/0x90 [ 76.861328][ T2023] x64_sys_call+0x488/0x9a0 [ 76.866300][ T2023] do_syscall_64+0x4c/0xa0 [ 76.871442][ T2023] ? clear_bhb_loop+0x30/0x80 [ 76.876911][ T2023] ? clear_bhb_loop+0x30/0x80 [ 76.882273][ T2023] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 76.888944][ T2023] RIP: 0033:0x7fbf7e38efc9 [ 76.893558][ T2023] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 76.916292][ T2023] RSP: 002b:00007fbf7f1dd038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 76.925674][ T2023] RAX: ffffffffffffffda RBX: 00007fbf7e5e5fa0 RCX: 00007fbf7e38efc9 [ 76.934087][ T2023] RDX: 000000000000001e RSI: 0000200000000080 RDI: 000000000000000a [ 76.942342][ T2023] RBP: 00007fbf7f1dd090 R08: 0000000000000000 R09: 0000000000000000 [ 76.950844][ T2023] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 76.959505][ T2023] R13: 00007fbf7e5e6038 R14: 00007fbf7e5e5fa0 R15: 00007fff4d946168 [ 76.967817][ T2023] [ 79.101572][ T28] audit: type=1400 audit(1761675701.540:122): avc: denied { ioctl } for pid=2047 comm="syz.4.585" path="pid:[4026532542]" dev="nsfs" ino=4026532542 ioctlcmd=0xb702 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 81.582317][ T28] audit: type=1400 audit(1761675704.020:123): avc: denied { relabelfrom } for pid=2110 comm="syz.1.600" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tun_socket permissive=1 [ 81.660983][ T28] audit: type=1400 audit(1761675704.050:124): avc: denied { relabelto } for pid=2110 comm="syz.1.600" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tun_socket permissive=1 [ 82.288177][ T28] audit: type=1400 audit(1761675704.720:125): avc: denied { create } for pid=2133 comm="syz.1.609" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 83.269126][ T2164] bridge0: port 1(bridge_slave_0) entered disabled state [ 85.301349][ T28] audit: type=1400 audit(1761675707.740:126): avc: denied { create } for pid=2208 comm="syz.2.635" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=phonet_socket permissive=1 [ 85.678318][ T2223] device sit0 left promiscuous mode [ 85.785734][ T2226] device sit0 entered promiscuous mode [ 86.907707][ T2215] ip6_vti0: mtu greater than device maximum [ 87.232705][ T2245] syz.1.642[2245] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 87.232800][ T2245] syz.1.642[2245] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 88.970590][ T2296] device sit0 entered promiscuous mode [ 89.659579][ T2301] ip6_vti0: mtu greater than device maximum [ 103.270600][ T2653] device pim6reg1 entered promiscuous mode [ 106.926626][ T2781] FAULT_INJECTION: forcing a failure. [ 106.926626][ T2781] name failslab, interval 1, probability 0, space 0, times 0 [ 106.955189][ T2781] CPU: 0 PID: 2781 Comm: syz.1.813 Not tainted syzkaller #0 [ 106.963387][ T2781] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 106.974060][ T2781] Call Trace: [ 106.977634][ T2781] [ 106.980758][ T2781] __dump_stack+0x21/0x24 [ 106.985315][ T2781] dump_stack_lvl+0xee/0x150 [ 106.990390][ T2781] ? __cfi_dump_stack_lvl+0x8/0x8 [ 106.995961][ T2781] dump_stack+0x15/0x24 [ 107.000753][ T2781] should_fail_ex+0x3d4/0x520 [ 107.006002][ T2781] __should_failslab+0xac/0xf0 [ 107.011227][ T2781] ? alloc_fdtable+0xcd/0x2e0 [ 107.016226][ T2781] should_failslab+0x9/0x20 [ 107.021048][ T2781] __kmem_cache_alloc_node+0x3d/0x2c0 [ 107.026965][ T2781] ? alloc_fdtable+0xcd/0x2e0 [ 107.031840][ T2781] kmalloc_trace+0x29/0xb0 [ 107.036632][ T2781] alloc_fdtable+0xcd/0x2e0 [ 107.041162][ T2781] ? _find_last_bit+0x7c/0x120 [ 107.046369][ T2781] dup_fd+0x661/0x880 [ 107.050633][ T2781] ? __mutex_init+0xcd/0x1a0 [ 107.055387][ T2781] copy_files+0x76/0xe0 [ 107.060194][ T2781] copy_process+0x11ff/0x3480 [ 107.065162][ T2781] ? idle_dummy+0x10/0x10 [ 107.069677][ T2781] kernel_clone+0x23a/0x810 [ 107.074451][ T2781] ? __cfi_kernel_clone+0x10/0x10 [ 107.079926][ T2781] ? __kasan_check_write+0x14/0x20 [ 107.085051][ T2781] ? mutex_unlock+0x89/0x220 [ 107.089731][ T2781] __x64_sys_clone+0x168/0x1b0 [ 107.094812][ T2781] ? __cfi___x64_sys_clone+0x10/0x10 [ 107.100592][ T2781] ? fpregs_assert_state_consistent+0xb1/0xe0 [ 107.106931][ T2781] x64_sys_call+0x990/0x9a0 [ 107.111622][ T2781] do_syscall_64+0x4c/0xa0 [ 107.116653][ T2781] ? clear_bhb_loop+0x30/0x80 [ 107.121505][ T2781] ? clear_bhb_loop+0x30/0x80 [ 107.126357][ T2781] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 107.132337][ T2781] RIP: 0033:0x7f99cdd8efc9 [ 107.136850][ T2781] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 107.157285][ T2781] RSP: 002b:00007f99ceb61fe8 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 107.166421][ T2781] RAX: ffffffffffffffda RBX: 00007f99cdfe5fa0 RCX: 00007f99cdd8efc9 [ 107.175562][ T2781] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00000000638c1000 [ 107.184234][ T2781] RBP: 00007f99ceb62090 R08: 0000000000000000 R09: 0000000000000000 [ 107.192332][ T2781] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000002 [ 107.200579][ T2781] R13: 00007f99cdfe6038 R14: 00007f99cdfe5fa0 R15: 00007ffc09c69558 [ 107.209009][ T2781] [ 107.275137][ T2789] bridge0: port 3(veth0) entered disabled state [ 107.281992][ T2789] bridge0: port 2(bridge_slave_1) entered disabled state [ 107.289627][ T2789] bridge0: port 1(bridge_slave_0) entered disabled state [ 107.317797][ T2792] FAULT_INJECTION: forcing a failure. [ 107.317797][ T2792] name fail_page_alloc, interval 1, probability 0, space 0, times 1 [ 107.490864][ T2792] CPU: 0 PID: 2792 Comm: syz.1.815 Not tainted syzkaller #0 [ 107.498284][ T2792] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 107.508692][ T2792] Call Trace: [ 107.512326][ T2792] [ 107.515264][ T2792] __dump_stack+0x21/0x24 [ 107.519955][ T2792] dump_stack_lvl+0xee/0x150 [ 107.524727][ T2792] ? __cfi_dump_stack_lvl+0x8/0x8 [ 107.530119][ T2792] dump_stack+0x15/0x24 [ 107.535069][ T2792] should_fail_ex+0x3d4/0x520 [ 107.540065][ T2792] should_fail_alloc_page+0x61/0x90 [ 107.545637][ T2792] prepare_alloc_pages+0x148/0x5f0 [ 107.550867][ T2792] ? __alloc_pages_bulk+0x9c0/0x9c0 [ 107.556183][ T2792] ? slab_post_alloc_hook+0x4f/0x2d0 [ 107.561747][ T2792] ? alloc_vmap_area+0x17b/0x1870 [ 107.566951][ T2792] ? __get_vm_area_node+0x160/0x360 [ 107.572252][ T2792] ? __vmalloc_node_range+0x326/0x13d0 [ 107.578623][ T2792] __alloc_pages+0x124/0x450 [ 107.583235][ T2792] ? __cfi___alloc_pages+0x10/0x10 [ 107.588366][ T2792] ? __kasan_check_write+0x14/0x20 [ 107.593479][ T2792] ? _raw_spin_lock+0x8e/0xe0 [ 107.598186][ T2792] ? __cfi__raw_spin_lock+0x10/0x10 [ 107.603476][ T2792] __get_free_pages+0xe/0x30 [ 107.608348][ T2792] kasan_populate_vmalloc_pte+0x29/0x120 [ 107.614081][ T2792] __apply_to_page_range+0x8de/0xc80 [ 107.619471][ T2792] ? __cfi_kasan_populate_vmalloc_pte+0x10/0x10 [ 107.626335][ T2792] ? __cfi_kasan_populate_vmalloc_pte+0x10/0x10 [ 107.633288][ T2792] apply_to_page_range+0x3b/0x50 [ 107.638523][ T2792] kasan_populate_vmalloc+0x60/0x70 [ 107.644021][ T2792] alloc_vmap_area+0x173e/0x1870 [ 107.649411][ T2792] ? vm_map_ram+0x930/0x930 [ 107.654132][ T2792] ? __kasan_kmalloc+0x95/0xb0 [ 107.659261][ T2792] ? kmalloc_node_trace+0x3d/0xb0 [ 107.665181][ T2792] __get_vm_area_node+0x160/0x360 [ 107.670480][ T2792] ? x64_sys_call+0x488/0x9a0 [ 107.675758][ T2792] __vmalloc_node_range+0x326/0x13d0 [ 107.681841][ T2792] ? sock_hash_alloc+0x297/0x510 [ 107.687167][ T2792] ? __cfi___vmalloc_node_range+0x10/0x10 [ 107.692996][ T2792] ? kasan_save_alloc_info+0x25/0x30 [ 107.698563][ T2792] ? bpf_map_area_alloc+0x4b/0xe0 [ 107.704308][ T2792] ? __kmalloc_node+0xb2/0x1e0 [ 107.709800][ T2792] bpf_map_area_alloc+0xd7/0xe0 [ 107.714842][ T2792] ? sock_hash_alloc+0x297/0x510 [ 107.719880][ T2792] sock_hash_alloc+0x297/0x510 [ 107.725232][ T2792] map_create+0x49c/0xd80 [ 107.729750][ T2792] __sys_bpf+0x30b/0x780 [ 107.734320][ T2792] ? bpf_link_show_fdinfo+0x320/0x320 [ 107.739870][ T2792] ? __cfi_ksys_write+0x10/0x10 [ 107.744838][ T2792] ? do_user_addr_fault+0x9ac/0x1050 [ 107.750230][ T2792] ? debug_smp_processor_id+0x17/0x20 [ 107.756330][ T2792] __x64_sys_bpf+0x7c/0x90 [ 107.760942][ T2792] x64_sys_call+0x488/0x9a0 [ 107.765631][ T2792] do_syscall_64+0x4c/0xa0 [ 107.770132][ T2792] ? clear_bhb_loop+0x30/0x80 [ 107.775519][ T2792] ? clear_bhb_loop+0x30/0x80 [ 107.780206][ T2792] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 107.786567][ T2792] RIP: 0033:0x7f99cdd8efc9 [ 107.791179][ T2792] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 107.812012][ T2792] RSP: 002b:00007f99ceb62038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 107.820807][ T2792] RAX: ffffffffffffffda RBX: 00007f99cdfe5fa0 RCX: 00007f99cdd8efc9 [ 107.828963][ T2792] RDX: 0000000000000050 RSI: 0000200000000600 RDI: 0000000000000000 [ 107.837472][ T2792] RBP: 00007f99ceb62090 R08: 0000000000000000 R09: 0000000000000000 [ 107.845984][ T2792] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 107.854488][ T2792] R13: 00007f99cdfe6038 R14: 00007f99cdfe5fa0 R15: 00007ffc09c69558 [ 107.862575][ T2792] [ 109.606951][ T2847] device veth0_vlan left promiscuous mode [ 109.715685][ T2847] device veth0_vlan entered promiscuous mode [ 109.867223][ T2853] bridge0: port 3(veth0) entered disabled state [ 109.878179][ T2853] bridge0: port 2(bridge_slave_1) entered disabled state [ 109.889626][ T2853] bridge0: port 1(bridge_slave_0) entered disabled state [ 109.942532][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 109.976244][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 110.011999][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 110.882567][ T2900] device sit0 entered promiscuous mode [ 113.029894][ T2958] device syzkaller0 entered promiscuous mode [ 113.113174][ T2959] device pim6reg1 entered promiscuous mode [ 114.477949][ T2988] device syzkaller0 entered promiscuous mode [ 114.689371][ T2994] device pim6reg1 entered promiscuous mode [ 114.791806][ T28] audit: type=1400 audit(1761675737.220:127): avc: denied { create } for pid=3003 comm="syz.1.885" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 115.564236][ T3036] device pim6reg1 entered promiscuous mode [ 115.930384][ T3051] FAULT_INJECTION: forcing a failure. [ 115.930384][ T3051] name failslab, interval 1, probability 0, space 0, times 0 [ 115.985757][ T3051] CPU: 1 PID: 3051 Comm: syz.2.901 Not tainted syzkaller #0 [ 115.993891][ T3051] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 116.004470][ T3051] Call Trace: [ 116.007853][ T3051] [ 116.010988][ T3051] __dump_stack+0x21/0x24 [ 116.015621][ T3051] dump_stack_lvl+0xee/0x150 [ 116.020300][ T3051] ? __cfi_dump_stack_lvl+0x8/0x8 [ 116.025418][ T3051] dump_stack+0x15/0x24 [ 116.029825][ T3051] should_fail_ex+0x3d4/0x520 [ 116.034697][ T3051] ? __alloc_file+0x28/0x2a0 [ 116.039473][ T3051] __should_failslab+0xac/0xf0 [ 116.044414][ T3051] should_failslab+0x9/0x20 [ 116.049269][ T3051] kmem_cache_alloc+0x3b/0x330 [ 116.054096][ T3051] ? __cfi__raw_spin_lock+0x10/0x10 [ 116.059423][ T3051] __alloc_file+0x28/0x2a0 [ 116.063937][ T3051] alloc_empty_file+0x97/0x180 [ 116.068884][ T3051] alloc_file+0x59/0x640 [ 116.073306][ T3051] alloc_file_pseudo+0x17a/0x1f0 [ 116.078341][ T3051] ? __cfi_alloc_file_pseudo+0x10/0x10 [ 116.084152][ T3051] ? alloc_fd+0x4e6/0x590 [ 116.088834][ T3051] anon_inode_getfd+0xd6/0x1d0 [ 116.093817][ T3051] btf_new_fd+0x62e/0x7d0 [ 116.098188][ T3051] bpf_btf_load+0x6f/0x90 [ 116.102735][ T3051] __sys_bpf+0x556/0x780 [ 116.107253][ T3051] ? bpf_link_show_fdinfo+0x320/0x320 [ 116.112631][ T3051] ? __cfi_ksys_write+0x10/0x10 [ 116.117672][ T3051] ? debug_smp_processor_id+0x17/0x20 [ 116.123058][ T3051] __x64_sys_bpf+0x7c/0x90 [ 116.127748][ T3051] x64_sys_call+0x488/0x9a0 [ 116.132269][ T3051] do_syscall_64+0x4c/0xa0 [ 116.136945][ T3051] ? clear_bhb_loop+0x30/0x80 [ 116.142059][ T3051] ? clear_bhb_loop+0x30/0x80 [ 116.147379][ T3051] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 116.154110][ T3051] RIP: 0033:0x7f5676f8efc9 [ 116.158886][ T3051] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 116.179702][ T3051] RSP: 002b:00007f5677ee7038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 116.188990][ T3051] RAX: ffffffffffffffda RBX: 00007f56771e5fa0 RCX: 00007f5676f8efc9 [ 116.197134][ T3051] RDX: 0000000000000028 RSI: 0000200000000280 RDI: 0000000000000012 [ 116.205177][ T3051] RBP: 00007f5677ee7090 R08: 0000000000000000 R09: 0000000000000000 [ 116.213216][ T3051] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 116.221666][ T3051] R13: 00007f56771e6038 R14: 00007f56771e5fa0 R15: 00007ffe1faf5668 [ 116.229732][ T3051] [ 116.455822][ T3066] device pim6reg1 entered promiscuous mode [ 116.537717][ T3076] device veth0 left promiscuous mode [ 116.543303][ T3076] bridge0: port 3(veth0) entered disabled state [ 116.572127][ T3076] device bridge_slave_1 left promiscuous mode [ 116.589944][ T3076] bridge0: port 2(bridge_slave_1) entered disabled state [ 116.679439][ T3076] device bridge_slave_0 left promiscuous mode [ 116.694713][ T3076] bridge0: port 1(bridge_slave_0) entered disabled state [ 116.853697][ T3082] bridge0: port 3(veth0) entered disabled state [ 116.860419][ T3082] bridge0: port 2(bridge_slave_1) entered disabled state [ 116.867718][ T3082] bridge0: port 1(bridge_slave_0) entered disabled state [ 116.903939][ T3085] bridge0: port 3(veth0) entered blocking state [ 116.910551][ T3085] bridge0: port 3(veth0) entered forwarding state [ 116.917624][ T3085] bridge0: port 2(bridge_slave_1) entered blocking state [ 116.924913][ T3085] bridge0: port 2(bridge_slave_1) entered forwarding state [ 116.932549][ T3085] bridge0: port 1(bridge_slave_0) entered blocking state [ 116.939876][ T3085] bridge0: port 1(bridge_slave_0) entered forwarding state [ 117.021045][ T3085] device bridge0 entered promiscuous mode [ 117.466067][ T3109] device pim6reg1 entered promiscuous mode [ 118.229004][ T3147] device pim6reg1 entered promiscuous mode [ 118.880760][ T3156] device sit0 left promiscuous mode [ 118.920203][ T3156] device sit0 entered promiscuous mode [ 120.664970][ T3184] bond_slave_1: mtu less than device minimum [ 121.160740][ T28] audit: type=1400 audit(1761675743.600:128): avc: denied { create } for pid=3188 comm="syz.0.949" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 121.538757][ T3207] FAULT_INJECTION: forcing a failure. [ 121.538757][ T3207] name failslab, interval 1, probability 0, space 0, times 0 [ 121.796252][ T3207] CPU: 0 PID: 3207 Comm: syz.4.956 Not tainted syzkaller #0 [ 121.804546][ T3207] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 121.815406][ T3207] Call Trace: [ 121.818705][ T3207] [ 121.821892][ T3207] __dump_stack+0x21/0x24 [ 121.826460][ T3207] dump_stack_lvl+0xee/0x150 [ 121.831436][ T3207] ? __cfi_dump_stack_lvl+0x8/0x8 [ 121.836819][ T3207] dump_stack+0x15/0x24 [ 121.841246][ T3207] should_fail_ex+0x3d4/0x520 [ 121.846634][ T3207] __should_failslab+0xac/0xf0 [ 121.851869][ T3207] ? bpf_test_init+0xce/0x160 [ 121.857430][ T3207] should_failslab+0x9/0x20 [ 121.862115][ T3207] __kmem_cache_alloc_node+0x3d/0x2c0 [ 121.869122][ T3207] ? bpf_test_init+0xce/0x160 [ 121.874011][ T3207] __kmalloc+0xa1/0x1e0 [ 121.878516][ T3207] bpf_test_init+0xce/0x160 [ 121.883350][ T3207] bpf_prog_test_run_xdp+0x359/0xe50 [ 121.888804][ T3207] ? __cfi_bpf_prog_test_run_xdp+0x10/0x10 [ 121.895103][ T3207] ? __kasan_check_write+0x14/0x20 [ 121.900383][ T3207] ? __cfi_bpf_prog_test_run_xdp+0x10/0x10 [ 121.906483][ T3207] bpf_prog_test_run+0x3e3/0x630 [ 121.912639][ T3207] ? slab_free_freelist_hook+0xc2/0x190 [ 121.919515][ T3207] ? bpf_prog_query+0x270/0x270 [ 121.924857][ T3207] ? selinux_bpf+0xce/0xf0 [ 121.929446][ T3207] ? security_bpf+0x93/0xb0 [ 121.934720][ T3207] __sys_bpf+0x56d/0x780 [ 121.939243][ T3207] ? bpf_link_show_fdinfo+0x320/0x320 [ 121.944786][ T3207] ? __cfi_ksys_write+0x10/0x10 [ 121.950250][ T3207] ? debug_smp_processor_id+0x17/0x20 [ 121.956263][ T3207] __x64_sys_bpf+0x7c/0x90 [ 121.960790][ T3207] x64_sys_call+0x488/0x9a0 [ 121.965829][ T3207] do_syscall_64+0x4c/0xa0 [ 121.970856][ T3207] ? clear_bhb_loop+0x30/0x80 [ 121.975978][ T3207] ? clear_bhb_loop+0x30/0x80 [ 121.981914][ T3207] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 121.988194][ T3207] RIP: 0033:0x7fbf7e38efc9 [ 121.993024][ T3207] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 122.016561][ T3207] RSP: 002b:00007fbf7f1dd038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 122.026214][ T3207] RAX: ffffffffffffffda RBX: 00007fbf7e5e5fa0 RCX: 00007fbf7e38efc9 [ 122.035066][ T3207] RDX: 0000000000000050 RSI: 0000200000000600 RDI: 000000000000000a [ 122.044010][ T3207] RBP: 00007fbf7f1dd090 R08: 0000000000000000 R09: 0000000000000000 [ 122.052591][ T3207] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 122.061427][ T3207] R13: 00007fbf7e5e6038 R14: 00007fbf7e5e5fa0 R15: 00007fff4d946168 [ 122.069841][ T3207] [ 122.075875][ T28] audit: type=1400 audit(1761675744.520:129): avc: denied { create } for pid=3212 comm="syz.3.958" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 122.126874][ T3213] device sit0 left promiscuous mode [ 122.201899][ T3214] device sit0 entered promiscuous mode [ 123.528550][ T3253] device pim6reg1 entered promiscuous mode [ 123.637095][ T3257] device sit0 entered promiscuous mode [ 127.097343][ T3323] FAULT_INJECTION: forcing a failure. [ 127.097343][ T3323] name failslab, interval 1, probability 0, space 0, times 0 [ 127.298082][ T3323] CPU: 1 PID: 3323 Comm: syz.1.995 Not tainted syzkaller #0 [ 127.305902][ T3323] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 127.316843][ T3323] Call Trace: [ 127.320274][ T3323] [ 127.323290][ T3323] __dump_stack+0x21/0x24 [ 127.327906][ T3323] dump_stack_lvl+0xee/0x150 [ 127.332520][ T3323] ? __cfi_dump_stack_lvl+0x8/0x8 [ 127.337939][ T3323] dump_stack+0x15/0x24 [ 127.342289][ T3323] should_fail_ex+0x3d4/0x520 [ 127.347419][ T3323] ? vm_area_dup+0x27/0x280 [ 127.352841][ T3323] __should_failslab+0xac/0xf0 [ 127.357896][ T3323] should_failslab+0x9/0x20 [ 127.363215][ T3323] kmem_cache_alloc+0x3b/0x330 [ 127.368818][ T3323] vm_area_dup+0x27/0x280 [ 127.373702][ T3323] ? copy_mm+0xac8/0x1a10 [ 127.378229][ T3323] copy_mm+0xb45/0x1a10 [ 127.382392][ T3323] ? copy_signal+0x630/0x630 [ 127.387274][ T3323] ? _raw_spin_lock+0x8e/0xe0 [ 127.392531][ T3323] ? __cfi__raw_spin_lock+0x10/0x10 [ 127.398698][ T3323] ? __init_rwsem+0x12c/0x240 [ 127.404901][ T3323] ? copy_signal+0x4ea/0x630 [ 127.409988][ T3323] copy_process+0x12b4/0x3480 [ 127.415637][ T3323] ? idle_dummy+0x10/0x10 [ 127.420325][ T3323] kernel_clone+0x23a/0x810 [ 127.425284][ T3323] ? __cfi_kernel_clone+0x10/0x10 [ 127.430748][ T3323] ? __kasan_check_write+0x14/0x20 [ 127.436825][ T3323] ? mutex_unlock+0x89/0x220 [ 127.442642][ T3323] __x64_sys_clone+0x168/0x1b0 [ 127.447658][ T3323] ? __cfi___x64_sys_clone+0x10/0x10 [ 127.453078][ T3323] ? fpregs_assert_state_consistent+0xb1/0xe0 [ 127.459546][ T3323] x64_sys_call+0x990/0x9a0 [ 127.464577][ T3323] do_syscall_64+0x4c/0xa0 [ 127.469094][ T3323] ? clear_bhb_loop+0x30/0x80 [ 127.473857][ T3323] ? clear_bhb_loop+0x30/0x80 [ 127.479071][ T3323] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 127.485232][ T3323] RIP: 0033:0x7f99cdd8efc9 [ 127.489901][ T3323] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 127.511001][ T3323] RSP: 002b:00007f99ceb61fe8 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 127.520222][ T3323] RAX: ffffffffffffffda RBX: 00007f99cdfe5fa0 RCX: 00007f99cdd8efc9 [ 127.528299][ T3323] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000042000000 [ 127.537092][ T3323] RBP: 00007f99ceb62090 R08: 0000000000000000 R09: 0000000000000000 [ 127.546997][ T3323] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000002 [ 127.555665][ T3323] R13: 00007f99cdfe6038 R14: 00007f99cdfe5fa0 R15: 00007ffc09c69558 [ 127.564583][ T3323] [ 127.716659][ T3341] device veth0 left promiscuous mode [ 127.792842][ T3341] bridge0: port 3(veth0) entered disabled state [ 128.075859][ T3341] device bridge_slave_1 left promiscuous mode [ 128.212494][ T3341] bridge0: port 2(bridge_slave_1) entered disabled state [ 128.308346][ T3341] device bridge_slave_0 left promiscuous mode [ 128.314762][ T3341] bridge0: port 1(bridge_slave_0) entered disabled state [ 136.996198][ T3511] device syzkaller0 entered promiscuous mode [ 137.008294][ T3519] device sit0 left promiscuous mode [ 137.021337][ T3521] device sit0 entered promiscuous mode [ 137.087542][ T3530] device sit0 left promiscuous mode [ 137.100224][ T3532] device sit0 entered promiscuous mode [ 139.264504][ T3588] bridge0: port 1(bridge_slave_0) entered disabled state [ 139.638185][ T3595] device syzkaller0 entered promiscuous mode [ 140.436163][ T3610] device sit0 left promiscuous mode [ 140.513283][ T3610] device sit0 entered promiscuous mode [ 140.798341][ T3615] device sit0 left promiscuous mode [ 140.824241][ T3619] device sit0 entered promiscuous mode [ 141.592010][ T28] audit: type=1400 audit(1761675764.030:130): avc: denied { create } for pid=3632 comm="syz.2.1098" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 143.316227][ T3672] device sit0 left promiscuous mode [ 143.382774][ T3673] device sit0 entered promiscuous mode [ 148.205596][ T3782] device veth1_to_bridge entered promiscuous mode [ 154.968779][ T3900] device sit0 left promiscuous mode [ 155.216890][ T3900] device sit0 entered promiscuous mode [ 156.259899][ T3924] device syzkaller0 entered promiscuous mode [ 157.131438][ T3945] FAULT_INJECTION: forcing a failure. [ 157.131438][ T3945] name failslab, interval 1, probability 0, space 0, times 0 [ 157.315675][ T3945] CPU: 1 PID: 3945 Comm: syz.3.1197 Not tainted syzkaller #0 [ 157.323552][ T3945] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 157.333883][ T3945] Call Trace: [ 157.337256][ T3945] [ 157.340543][ T3945] __dump_stack+0x21/0x24 [ 157.345155][ T3945] dump_stack_lvl+0xee/0x150 [ 157.349941][ T3945] ? __cfi_dump_stack_lvl+0x8/0x8 [ 157.355331][ T3945] dump_stack+0x15/0x24 [ 157.359894][ T3945] should_fail_ex+0x3d4/0x520 [ 157.364861][ T3945] __should_failslab+0xac/0xf0 [ 157.370179][ T3945] ? bpf_trampoline_update+0x617/0x13f0 [ 157.375833][ T3945] should_failslab+0x9/0x20 [ 157.380605][ T3945] __kmem_cache_alloc_node+0x3d/0x2c0 [ 157.386626][ T3945] ? kasan_save_alloc_info+0x25/0x30 [ 157.392546][ T3945] ? bpf_trampoline_update+0x617/0x13f0 [ 157.398445][ T3945] kmalloc_trace+0x29/0xb0 [ 157.403347][ T3945] bpf_trampoline_update+0x617/0x13f0 [ 157.408920][ T3945] bpf_trampoline_link_prog+0x4f8/0x6f0 [ 157.414916][ T3945] bpf_tracing_prog_attach+0x833/0xfa0 [ 157.420657][ T3945] ? bpf_raw_tp_link_attach+0x550/0x550 [ 157.427028][ T3945] ? memcpy+0x56/0x70 [ 157.431126][ T3945] ? avc_has_perm_noaudit+0x2f4/0x460 [ 157.436962][ T3945] bpf_raw_tp_link_attach+0x3a5/0x550 [ 157.442619][ T3945] ? bpf_insn_prepare_dump+0x840/0x840 [ 157.448547][ T3945] ? __kasan_check_write+0x14/0x20 [ 157.453897][ T3945] bpf_raw_tracepoint_open+0x258/0x480 [ 157.459465][ T3945] ? slab_free_freelist_hook+0xc2/0x190 [ 157.465132][ T3945] ? bpf_obj_get_info_by_fd+0x2b10/0x2b10 [ 157.471041][ T3945] ? selinux_bpf+0xce/0xf0 [ 157.475637][ T3945] ? security_bpf+0x93/0xb0 [ 157.480237][ T3945] __sys_bpf+0x4d1/0x780 [ 157.484604][ T3945] ? bpf_link_show_fdinfo+0x320/0x320 [ 157.490446][ T3945] ? __cfi_ksys_write+0x10/0x10 [ 157.495755][ T3945] ? debug_smp_processor_id+0x17/0x20 [ 157.501418][ T3945] __x64_sys_bpf+0x7c/0x90 [ 157.506988][ T3945] x64_sys_call+0x488/0x9a0 [ 157.511784][ T3945] do_syscall_64+0x4c/0xa0 [ 157.516502][ T3945] ? clear_bhb_loop+0x30/0x80 [ 157.521207][ T3945] ? clear_bhb_loop+0x30/0x80 [ 157.526013][ T3945] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 157.532447][ T3945] RIP: 0033:0x7f0eb718efc9 [ 157.536860][ T3945] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 157.557511][ T3945] RSP: 002b:00007f0eb80ae038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 157.566451][ T3945] RAX: ffffffffffffffda RBX: 00007f0eb73e5fa0 RCX: 00007f0eb718efc9 [ 157.574764][ T3945] RDX: 0000000000000010 RSI: 0000200000000040 RDI: 0000000000000011 [ 157.582943][ T3945] RBP: 00007f0eb80ae090 R08: 0000000000000000 R09: 0000000000000000 [ 157.591334][ T3945] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 157.599736][ T3945] R13: 00007f0eb73e6038 R14: 00007f0eb73e5fa0 R15: 00007ffd2deb1888 [ 157.608416][ T3945] [ 158.817945][ T3980] device sit0 left promiscuous mode [ 159.036685][ T3981] device sit0 entered promiscuous mode [ 159.112002][ T3984] FAULT_INJECTION: forcing a failure. [ 159.112002][ T3984] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 159.476358][ T3984] CPU: 0 PID: 3984 Comm: syz.3.1208 Not tainted syzkaller #0 [ 159.484388][ T3984] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 159.495069][ T3984] Call Trace: [ 159.498448][ T3984] [ 159.501651][ T3984] __dump_stack+0x21/0x24 [ 159.506172][ T3984] dump_stack_lvl+0xee/0x150 [ 159.511244][ T3984] ? __cfi_dump_stack_lvl+0x8/0x8 [ 159.516669][ T3984] ? bpf_probe_read_compat+0x105/0x180 [ 159.522600][ T3984] dump_stack+0x15/0x24 [ 159.526984][ T3984] should_fail_ex+0x3d4/0x520 [ 159.531860][ T3984] should_fail+0xb/0x10 [ 159.536156][ T3984] should_fail_usercopy+0x1a/0x20 [ 159.541466][ T3984] _copy_from_iter+0x190/0xfd0 [ 159.546401][ T3984] ? __cfi_gfp_zone+0x10/0x10 [ 159.551441][ T3984] ? __cfi__copy_from_iter+0x10/0x10 [ 159.557113][ T3984] ? __alloc_pages+0x439/0x450 [ 159.562295][ T3984] ? __cfi___alloc_pages+0x10/0x10 [ 159.567942][ T3984] ? __kasan_check_write+0x14/0x20 [ 159.573246][ T3984] ? _raw_spin_lock_irq+0x8f/0xe0 [ 159.578380][ T3984] ? __cfi__raw_spin_lock_irq+0x10/0x10 [ 159.583947][ T3984] copy_page_from_iter+0x1d2/0x2b0 [ 159.589201][ T3984] pipe_write+0x7da/0x1950 [ 159.593927][ T3984] ? __cfi_pipe_write+0x10/0x10 [ 159.598965][ T3984] ? selinux_file_permission+0x3ef/0x510 [ 159.604958][ T3984] ? fsnotify_perm+0x67/0x5b0 [ 159.609738][ T3984] ? security_file_permission+0x8a/0xb0 [ 159.615391][ T3984] vfs_write+0x5db/0xca0 [ 159.619653][ T3984] ? slab_free_freelist_hook+0xc2/0x190 [ 159.625496][ T3984] ? __cfi_vfs_write+0x10/0x10 [ 159.630722][ T3984] ? __fget_files+0x2d5/0x330 [ 159.635678][ T3984] ? __fdget_pos+0x1f2/0x380 [ 159.641057][ T3984] ? ksys_write+0x71/0x240 [ 159.645752][ T3984] ksys_write+0x140/0x240 [ 159.650262][ T3984] ? __cfi_ksys_write+0x10/0x10 [ 159.655401][ T3984] ? debug_smp_processor_id+0x17/0x20 [ 159.661040][ T3984] ? perf_trace_sys_enter+0x30/0x150 [ 159.666633][ T3984] __x64_sys_write+0x7b/0x90 [ 159.671575][ T3984] x64_sys_call+0x27b/0x9a0 [ 159.676529][ T3984] do_syscall_64+0x4c/0xa0 [ 159.681208][ T3984] ? clear_bhb_loop+0x30/0x80 [ 159.685891][ T3984] ? clear_bhb_loop+0x30/0x80 [ 159.690749][ T3984] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 159.696905][ T3984] RIP: 0033:0x7f0eb718efc9 [ 159.701760][ T3984] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 159.721732][ T3984] RSP: 002b:00007f0eb808d038 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 159.730338][ T3984] RAX: ffffffffffffffda RBX: 00007f0eb73e6090 RCX: 00007f0eb718efc9 [ 159.738892][ T3984] RDX: 000000000000fdef RSI: 0000200000000000 RDI: 0000000000000000 [ 159.747180][ T3984] RBP: 00007f0eb808d090 R08: 0000000000000000 R09: 0000000000000000 [ 159.755286][ T3984] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 159.763712][ T3984] R13: 00007f0eb73e6128 R14: 00007f0eb73e6090 R15: 00007ffd2deb1888 [ 159.772247][ T3984] [ 160.752048][ T4000] device syzkaller0 entered promiscuous mode [ 162.603673][ T4037] device sit0 left promiscuous mode [ 162.677747][ T4032] device sit0 entered promiscuous mode [ 163.786057][ T28] audit: type=1400 audit(1761675786.230:131): avc: denied { write } for pid=4066 comm="syz.4.1239" name="cgroup.subtree_control" dev="cgroup2" ino=170 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 [ 164.037576][ T28] audit: type=1400 audit(1761675786.250:132): avc: denied { open } for pid=4066 comm="syz.4.1239" path="" dev="cgroup2" ino=170 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 [ 164.257981][ T28] audit: type=1400 audit(1761675786.250:133): avc: denied { ioctl } for pid=4066 comm="syz.4.1239" path="" dev="cgroup2" ino=170 ioctlcmd=0x54c8 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 [ 164.489898][ T28] audit: type=1400 audit(1761675786.350:134): avc: denied { create } for pid=4066 comm="syz.4.1239" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bluetooth_socket permissive=1 [ 165.791244][ T4111] device sit0 left promiscuous mode [ 166.097614][ T4113] device sit0 entered promiscuous mode [ 169.693870][ T4188] device syzkaller0 entered promiscuous mode [ 171.143533][ T4209] device pim6reg1 entered promiscuous mode [ 171.456370][ T4217] device sit0 left promiscuous mode [ 171.654421][ T4221] device sit0 entered promiscuous mode [ 173.270424][ T4252] device syzkaller0 entered promiscuous mode [ 174.682938][ T4290] device syzkaller0 entered promiscuous mode [ 175.809381][ T4324] device syzkaller0 entered promiscuous mode [ 176.335919][ T4342] device sit0 left promiscuous mode [ 176.481805][ T4345] device sit0 entered promiscuous mode [ 178.195148][ T4376] device syzkaller0 entered promiscuous mode [ 179.222055][ T4388] device sit0 left promiscuous mode [ 179.241907][ T4391] device sit0 entered promiscuous mode [ 180.243143][ T4418] device syzkaller0 entered promiscuous mode [ 180.666783][ T4428] device pim6reg1 entered promiscuous mode [ 182.074284][ T28] audit: type=1400 audit(1761675804.510:135): avc: denied { create } for pid=4484 comm="syz.3.1381" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 182.690060][ T4503] FAULT_INJECTION: forcing a failure. [ 182.690060][ T4503] name failslab, interval 1, probability 0, space 0, times 0 [ 182.907536][ T4503] CPU: 1 PID: 4503 Comm: syz.2.1386 Not tainted syzkaller #0 [ 182.914977][ T4503] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 182.925647][ T4503] Call Trace: [ 182.929037][ T4503] [ 182.931982][ T4503] __dump_stack+0x21/0x24 [ 182.936776][ T4503] dump_stack_lvl+0xee/0x150 [ 182.941948][ T4503] ? __cfi_dump_stack_lvl+0x8/0x8 [ 182.947509][ T4503] ? do_syscall_64+0x4c/0xa0 [ 182.952193][ T4503] dump_stack+0x15/0x24 [ 182.956479][ T4503] should_fail_ex+0x3d4/0x520 [ 182.961182][ T4503] __should_failslab+0xac/0xf0 [ 182.966053][ T4503] ? sk_prot_alloc+0xed/0x320 [ 182.971018][ T4503] should_failslab+0x9/0x20 [ 182.976337][ T4503] __kmem_cache_alloc_node+0x3d/0x2c0 [ 182.982077][ T4503] ? sk_prot_alloc+0xed/0x320 [ 182.987373][ T4503] __kmalloc+0xa1/0x1e0 [ 182.991746][ T4503] sk_prot_alloc+0xed/0x320 [ 182.996873][ T4503] sk_alloc+0x3b/0x460 [ 183.001211][ T4503] ? __kasan_check_write+0x14/0x20 [ 183.006683][ T4503] bpf_prog_test_run_skb+0x37e/0x1290 [ 183.012347][ T4503] ? __fget_files+0x2d5/0x330 [ 183.017548][ T4503] ? __cfi_bpf_prog_test_run_skb+0x10/0x10 [ 183.023730][ T4503] bpf_prog_test_run+0x3e3/0x630 [ 183.028776][ T4503] ? slab_free_freelist_hook+0xc2/0x190 [ 183.034441][ T4503] ? bpf_prog_query+0x270/0x270 [ 183.039658][ T4503] ? selinux_bpf+0xce/0xf0 [ 183.044200][ T4503] ? security_bpf+0x93/0xb0 [ 183.048812][ T4503] __sys_bpf+0x56d/0x780 [ 183.053084][ T4503] ? bpf_link_show_fdinfo+0x320/0x320 [ 183.058637][ T4503] ? __cfi_ksys_write+0x10/0x10 [ 183.063596][ T4503] ? debug_smp_processor_id+0x17/0x20 [ 183.069087][ T4503] __x64_sys_bpf+0x7c/0x90 [ 183.073612][ T4503] x64_sys_call+0x488/0x9a0 [ 183.078209][ T4503] do_syscall_64+0x4c/0xa0 [ 183.082733][ T4503] ? clear_bhb_loop+0x30/0x80 [ 183.087682][ T4503] ? clear_bhb_loop+0x30/0x80 [ 183.092455][ T4503] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 183.098962][ T4503] RIP: 0033:0x7f5676f8efc9 [ 183.103467][ T4503] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 183.123679][ T4503] RSP: 002b:00007f5677ee7038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 183.132630][ T4503] RAX: ffffffffffffffda RBX: 00007f56771e5fa0 RCX: 00007f5676f8efc9 [ 183.140786][ T4503] RDX: 000000000000001e RSI: 0000200000000080 RDI: 000000000000000a [ 183.148937][ T4503] RBP: 00007f5677ee7090 R08: 0000000000000000 R09: 0000000000000000 [ 183.157267][ T4503] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 183.165875][ T4503] R13: 00007f56771e6038 R14: 00007f56771e5fa0 R15: 00007ffe1faf5668 [ 183.174208][ T4503] [ 186.246028][ T4586] device sit0 left promiscuous mode [ 186.342296][ T4586] device sit0 entered promiscuous mode [ 189.351682][ T4628] @ÿ: renamed from bond_slave_0 [ 189.361106][ T4644] bond_slave_1: mtu less than device minimum [ 191.886917][ T4687] bridge0: port 3(veth0) entered disabled state [ 191.897882][ T4687] bridge0: port 2(bridge_slave_1) entered disabled state [ 191.908792][ T4687] bridge0: port 1(bridge_slave_0) entered disabled state [ 191.949955][ T4687] device bridge0 left promiscuous mode [ 191.975344][ T28] audit: type=1400 audit(1761675814.410:136): avc: denied { create } for pid=4688 comm="syz.1.1441" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 192.085421][ T4689] device veth0_vlan left promiscuous mode [ 192.098045][ T4689] device veth0_vlan entered promiscuous mode [ 192.130983][ T4692] device veth0 left promiscuous mode [ 192.164670][ T4692] bridge0: port 3(veth0) entered disabled state [ 192.245540][ T4692] device bridge_slave_1 left promiscuous mode [ 192.270469][ T4692] bridge0: port 2(bridge_slave_1) entered disabled state [ 192.309891][ T4692] device bridge_slave_0 left promiscuous mode [ 192.322755][ T4692] bridge0: port 1(bridge_slave_0) entered disabled state [ 192.603561][ T4690] device syzkaller0 entered promiscuous mode [ 192.637822][ T200] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 192.652905][ T200] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 192.682267][ T200] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 194.207178][ T4752] device sit0 left promiscuous mode [ 194.228425][ T4754] device sit0 left promiscuous mode [ 194.387776][ T4752] device sit0 entered promiscuous mode [ 195.094343][ T4754] device sit0 entered promiscuous mode [ 195.421837][ T4778] device syzkaller0 entered promiscuous mode [ 196.281172][ T28] audit: type=1400 audit(1761675818.720:137): avc: denied { create } for pid=4814 comm="syz.3.1485" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rxrpc_socket permissive=1 [ 198.615667][ T4867] device sit0 left promiscuous mode [ 198.964390][ T4867] device sit0 entered promiscuous mode [ 199.568052][ T4872] device sit0 left promiscuous mode [ 199.697305][ T4877] device sit0 entered promiscuous mode [ 201.684409][ T4905] device syzkaller0 entered promiscuous mode [ 202.902350][ T4955] device syzkaller0 entered promiscuous mode [ 202.918731][ T4960] device sit0 left promiscuous mode [ 203.080518][ T4960] device sit0 entered promiscuous mode [ 203.920291][ T4976] gretap0: refused to change device tx_queue_len [ 204.866047][ T5041] FAULT_INJECTION: forcing a failure. [ 204.866047][ T5041] name failslab, interval 1, probability 0, space 0, times 0 [ 204.905086][ T5041] CPU: 0 PID: 5041 Comm: syz.4.1563 Not tainted syzkaller #0 [ 204.912917][ T5041] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 204.923414][ T5041] Call Trace: [ 204.926988][ T5041] [ 204.929932][ T5041] __dump_stack+0x21/0x24 [ 204.934349][ T5041] dump_stack_lvl+0xee/0x150 [ 204.939289][ T5041] ? __cfi_dump_stack_lvl+0x8/0x8 [ 204.944896][ T5041] dump_stack+0x15/0x24 [ 204.950030][ T5041] should_fail_ex+0x3d4/0x520 [ 204.955279][ T5041] ? security_file_alloc+0x33/0x130 [ 204.960759][ T5041] __should_failslab+0xac/0xf0 [ 204.965537][ T5041] should_failslab+0x9/0x20 [ 204.970073][ T5041] kmem_cache_alloc+0x3b/0x330 [ 204.975213][ T5041] ? __alloc_file+0x28/0x2a0 [ 204.979915][ T5041] security_file_alloc+0x33/0x130 [ 204.985099][ T5041] __alloc_file+0xb5/0x2a0 [ 204.990969][ T5041] alloc_empty_file+0x97/0x180 [ 204.995866][ T5041] alloc_file+0x59/0x640 [ 205.000176][ T5041] alloc_file_pseudo+0x17a/0x1f0 [ 205.005304][ T5041] ? __cfi_alloc_file_pseudo+0x10/0x10 [ 205.010940][ T5041] ? alloc_fd+0x4e6/0x590 [ 205.015426][ T5041] anon_inode_getfd+0xd6/0x1d0 [ 205.020543][ T5041] btf_new_fd+0x62e/0x7d0 [ 205.024887][ T5041] bpf_btf_load+0x6f/0x90 [ 205.029518][ T5041] __sys_bpf+0x556/0x780 [ 205.033771][ T5041] ? bpf_link_show_fdinfo+0x320/0x320 [ 205.039590][ T5041] ? __cfi_ksys_write+0x10/0x10 [ 205.044782][ T5041] ? debug_smp_processor_id+0x17/0x20 [ 205.050435][ T5041] __x64_sys_bpf+0x7c/0x90 [ 205.054958][ T5041] x64_sys_call+0x488/0x9a0 [ 205.059662][ T5041] do_syscall_64+0x4c/0xa0 [ 205.064173][ T5041] ? clear_bhb_loop+0x30/0x80 [ 205.069044][ T5041] ? clear_bhb_loop+0x30/0x80 [ 205.073940][ T5041] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 205.079871][ T5041] RIP: 0033:0x7fbf7e38efc9 [ 205.084310][ T5041] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 205.105572][ T5041] RSP: 002b:00007fbf7f1bc038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 205.114276][ T5041] RAX: ffffffffffffffda RBX: 00007fbf7e5e6090 RCX: 00007fbf7e38efc9 [ 205.123222][ T5041] RDX: 0000000000000028 RSI: 0000200000000280 RDI: 0000000000000012 [ 205.132369][ T5041] RBP: 00007fbf7f1bc090 R08: 0000000000000000 R09: 0000000000000000 [ 205.141571][ T5041] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 205.149645][ T5041] R13: 00007fbf7e5e6128 R14: 00007fbf7e5e6090 R15: 00007fff4d946168 [ 205.158333][ T5041] [ 205.684556][ T5082] device sit0 left promiscuous mode [ 205.780088][ T5082] device sit0 entered promiscuous mode [ 207.187535][ T5119] device syzkaller0 entered promiscuous mode [ 208.444376][ T5142] device syzkaller0 entered promiscuous mode [ 208.871193][ T5157] FAULT_INJECTION: forcing a failure. [ 208.871193][ T5157] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 208.966842][ T5157] CPU: 0 PID: 5157 Comm: syz.1.1600 Not tainted syzkaller #0 [ 208.975093][ T5157] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 208.985682][ T5157] Call Trace: [ 208.988969][ T5157] [ 208.991985][ T5157] __dump_stack+0x21/0x24 [ 208.996841][ T5157] dump_stack_lvl+0xee/0x150 [ 209.001529][ T5157] ? __cfi_dump_stack_lvl+0x8/0x8 [ 209.006663][ T5157] ? migrate_enable+0x19c/0x280 [ 209.011706][ T5157] dump_stack+0x15/0x24 [ 209.016234][ T5157] should_fail_ex+0x3d4/0x520 [ 209.021048][ T5157] should_fail+0xb/0x10 [ 209.025589][ T5157] should_fail_usercopy+0x1a/0x20 [ 209.030880][ T5157] _copy_from_user+0x1e/0xc0 [ 209.035561][ T5157] generic_map_update_batch+0x458/0x780 [ 209.041116][ T5157] ? __cfi_generic_map_update_batch+0x10/0x10 [ 209.047211][ T5157] ? __fdget+0x19c/0x220 [ 209.051629][ T5157] ? __cfi_generic_map_update_batch+0x10/0x10 [ 209.057775][ T5157] bpf_map_do_batch+0x48c/0x620 [ 209.062703][ T5157] __sys_bpf+0x624/0x780 [ 209.067051][ T5157] ? bpf_link_show_fdinfo+0x320/0x320 [ 209.072564][ T5157] ? __cfi_ksys_write+0x10/0x10 [ 209.077774][ T5157] ? debug_smp_processor_id+0x17/0x20 [ 209.083415][ T5157] __x64_sys_bpf+0x7c/0x90 [ 209.087963][ T5157] x64_sys_call+0x488/0x9a0 [ 209.092738][ T5157] do_syscall_64+0x4c/0xa0 [ 209.097493][ T5157] ? clear_bhb_loop+0x30/0x80 [ 209.102167][ T5157] ? clear_bhb_loop+0x30/0x80 [ 209.106836][ T5157] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 209.113007][ T5157] RIP: 0033:0x7f99cdd8efc9 [ 209.118106][ T5157] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 209.139438][ T5157] RSP: 002b:00007f99ceb62038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 209.148614][ T5157] RAX: ffffffffffffffda RBX: 00007f99cdfe5fa0 RCX: 00007f99cdd8efc9 [ 209.156844][ T5157] RDX: 0000000000000038 RSI: 0000200000000200 RDI: 000000000000001a [ 209.165072][ T5157] RBP: 00007f99ceb62090 R08: 0000000000000000 R09: 0000000000000000 [ 209.173317][ T5157] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 209.182428][ T5157] R13: 00007f99cdfe6038 R14: 00007f99cdfe5fa0 R15: 00007ffc09c69558 [ 209.191017][ T5157] [ 210.295440][ C0] sched: RT throttling activated [ 211.214221][ T5184] FAULT_INJECTION: forcing a failure. [ 211.214221][ T5184] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 211.682765][ T5184] CPU: 1 PID: 5184 Comm: syz.0.1608 Not tainted syzkaller #0 [ 211.690557][ T5184] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 211.700977][ T5184] Call Trace: [ 211.705047][ T5184] [ 211.708257][ T5184] __dump_stack+0x21/0x24 [ 211.712684][ T5184] dump_stack_lvl+0xee/0x150 [ 211.717634][ T5184] ? __cfi_dump_stack_lvl+0x8/0x8 [ 211.722842][ T5184] dump_stack+0x15/0x24 [ 211.727476][ T5184] should_fail_ex+0x3d4/0x520 [ 211.732339][ T5184] should_fail+0xb/0x10 [ 211.736524][ T5184] should_fail_usercopy+0x1a/0x20 [ 211.742072][ T5184] _copy_to_user+0x1e/0x90 [ 211.746486][ T5184] simple_read_from_buffer+0xe9/0x160 [ 211.752379][ T5184] proc_fail_nth_read+0x19a/0x210 [ 211.757666][ T5184] ? __cfi_proc_fail_nth_read+0x10/0x10 [ 211.763596][ T5184] ? security_file_permission+0x94/0xb0 [ 211.769419][ T5184] ? __cfi_proc_fail_nth_read+0x10/0x10 [ 211.775067][ T5184] vfs_read+0x26e/0x8c0 [ 211.779852][ T5184] ? __cfi_vfs_read+0x10/0x10 [ 211.784730][ T5184] ? __kasan_check_write+0x14/0x20 [ 211.790196][ T5184] ? mutex_lock+0x8d/0x1a0 [ 211.795314][ T5184] ? __cfi_mutex_lock+0x10/0x10 [ 211.800352][ T5184] ? __fdget_pos+0x2cd/0x380 [ 211.804938][ T5184] ? ksys_read+0x71/0x240 [ 211.809881][ T5184] ksys_read+0x140/0x240 [ 211.814229][ T5184] ? __cfi_ksys_read+0x10/0x10 [ 211.819181][ T5184] ? debug_smp_processor_id+0x17/0x20 [ 211.824824][ T5184] __x64_sys_read+0x7b/0x90 [ 211.829411][ T5184] x64_sys_call+0x2f/0x9a0 [ 211.833939][ T5184] do_syscall_64+0x4c/0xa0 [ 211.838892][ T5184] ? clear_bhb_loop+0x30/0x80 [ 211.843921][ T5184] ? clear_bhb_loop+0x30/0x80 [ 211.848874][ T5184] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 211.854776][ T5184] RIP: 0033:0x7f5d9238d9dc [ 211.859462][ T5184] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 93 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 ef 93 02 00 48 [ 211.879293][ T5184] RSP: 002b:00007f5d9318e030 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 211.888518][ T5184] RAX: ffffffffffffffda RBX: 00007f5d925e6180 RCX: 00007f5d9238d9dc [ 211.896938][ T5184] RDX: 000000000000000f RSI: 00007f5d9318e0a0 RDI: 0000000000000007 [ 211.905523][ T5184] RBP: 00007f5d9318e090 R08: 0000000000000000 R09: 0000000000000000 [ 211.914188][ T5184] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 211.922422][ T5184] R13: 00007f5d925e6218 R14: 00007f5d925e6180 R15: 00007ffe76cca8d8 [ 211.931013][ T5184] [ 214.478035][ T102] udevd[102]: worker [5192] terminated by signal 33 (Unknown signal 33) [ 214.512627][ T102] udevd[102]: worker [5192] failed while handling '/devices/virtual/block/loop1' [ 214.597816][ T102] udevd (102) used greatest stack depth: 21088 bytes left [ 215.048876][ T5250] device sit0 left promiscuous mode [ 215.132176][ T5250] device sit0 entered promiscuous mode [ 217.623952][ T5358] device sit0 left promiscuous mode [ 217.895887][ T5365] device sit0 entered promiscuous mode [ 218.644216][ T5375] device sit0 left promiscuous mode [ 218.693829][ T5376] device sit0 entered promiscuous mode [ 220.747229][ T5407] O3ãc¤±: renamed from bridge_slave_0 [ 226.414750][ T5593] device sit0 left promiscuous mode [ 226.624601][ T28] audit: type=1400 audit(1761675849.060:138): avc: denied { create } for pid=5580 comm="syz.1.1739" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 226.703119][ T5597] device sit0 entered promiscuous mode [ 226.820254][ T28] audit: type=1400 audit(1761675849.260:139): avc: denied { create } for pid=5595 comm="syz.3.1746" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 227.449359][ T5605] tun0: tun_chr_ioctl cmd 1074025680 [ 228.181114][ T5628] FAULT_INJECTION: forcing a failure. [ 228.181114][ T5628] name failslab, interval 1, probability 0, space 0, times 0 [ 228.235485][ T5628] CPU: 1 PID: 5628 Comm: syz.0.1753 Not tainted syzkaller #0 [ 228.243172][ T5628] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 228.253762][ T5628] Call Trace: [ 228.257136][ T5628] [ 228.260066][ T5628] __dump_stack+0x21/0x24 [ 228.264487][ T5628] dump_stack_lvl+0xee/0x150 [ 228.269371][ T5628] ? __cfi_dump_stack_lvl+0x8/0x8 [ 228.275013][ T5628] ? do_syscall_64+0x4c/0xa0 [ 228.279694][ T5628] dump_stack+0x15/0x24 [ 228.284103][ T5628] should_fail_ex+0x3d4/0x520 [ 228.289069][ T5628] __should_failslab+0xac/0xf0 [ 228.293866][ T5628] ? sk_prot_alloc+0xed/0x320 [ 228.298562][ T5628] should_failslab+0x9/0x20 [ 228.303097][ T5628] __kmem_cache_alloc_node+0x3d/0x2c0 [ 228.308665][ T5628] ? sk_prot_alloc+0xed/0x320 [ 228.313529][ T5628] __kmalloc+0xa1/0x1e0 [ 228.318051][ T5628] sk_prot_alloc+0xed/0x320 [ 228.322765][ T5628] sk_alloc+0x3b/0x460 [ 228.326845][ T5628] ? __kasan_check_write+0x14/0x20 [ 228.332254][ T5628] bpf_prog_test_run_skb+0x37e/0x1290 [ 228.337740][ T5628] ? __fget_files+0x2d5/0x330 [ 228.342439][ T5628] ? __cfi_bpf_prog_test_run_skb+0x10/0x10 [ 228.348265][ T5628] bpf_prog_test_run+0x3e3/0x630 [ 228.354263][ T5628] ? slab_free_freelist_hook+0xc2/0x190 [ 228.360038][ T5628] ? bpf_prog_query+0x270/0x270 [ 228.365040][ T5628] ? selinux_bpf+0xce/0xf0 [ 228.369471][ T5628] ? security_bpf+0x93/0xb0 [ 228.374172][ T5628] __sys_bpf+0x56d/0x780 [ 228.378554][ T5628] ? bpf_link_show_fdinfo+0x320/0x320 [ 228.383941][ T5628] ? __cfi_ksys_write+0x10/0x10 [ 228.389259][ T5628] ? debug_smp_processor_id+0x17/0x20 [ 228.394746][ T5628] __x64_sys_bpf+0x7c/0x90 [ 228.399397][ T5628] x64_sys_call+0x488/0x9a0 [ 228.404351][ T5628] do_syscall_64+0x4c/0xa0 [ 228.408952][ T5628] ? clear_bhb_loop+0x30/0x80 [ 228.413821][ T5628] ? clear_bhb_loop+0x30/0x80 [ 228.418609][ T5628] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 228.424832][ T5628] RIP: 0033:0x7f5d9238efc9 [ 228.429630][ T5628] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 228.450545][ T5628] RSP: 002b:00007f5d931d0038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 228.459402][ T5628] RAX: ffffffffffffffda RBX: 00007f5d925e5fa0 RCX: 00007f5d9238efc9 [ 228.467570][ T5628] RDX: 000000000000001e RSI: 0000200000000080 RDI: 000000000000000a [ 228.476135][ T5628] RBP: 00007f5d931d0090 R08: 0000000000000000 R09: 0000000000000000 [ 228.484093][ T5628] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 228.492404][ T5628] R13: 00007f5d925e6038 R14: 00007f5d925e5fa0 R15: 00007ffe76cca8d8 [ 228.500636][ T5628] [ 229.208144][ T5636] device syzkaller0 entered promiscuous mode [ 232.703689][ T5718] device pim6reg1 entered promiscuous mode [ 233.349205][ T5736] device wg2 left promiscuous mode [ 233.485953][ T28] audit: type=1400 audit(1761675855.920:140): avc: denied { setattr } for pid=5735 comm="syz.1.1786" path="/net/tun" dev="devtmpfs" ino=155 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tun_tap_device_t tclass=chr_file permissive=1 [ 234.284493][ T5758] device sit0 left promiscuous mode [ 238.939789][ T5800] device sit0 left promiscuous mode [ 239.199460][ T5800] device sit0 entered promiscuous mode [ 239.748444][ T28] audit: type=1400 audit(1761675862.190:141): avc: denied { associate } for pid=5824 comm="syz.1.1812" name="cgroup.freeze" scontext=root:object_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 [ 241.002827][ T5852] device veth1_macvtap left promiscuous mode [ 242.141148][ T5883] device syzkaller0 entered promiscuous mode [ 246.670296][ T5988] device syzkaller0 entered promiscuous mode [ 247.655801][ T6011] device wg2 left promiscuous mode [ 247.849586][ T6010] device wg2 entered promiscuous mode [ 249.855975][ T6071] device syzkaller0 entered promiscuous mode [ 258.143543][ T6294] device sit0 left promiscuous mode [ 258.288876][ T6298] device sit0 entered promiscuous mode [ 259.338425][ T6328] device syzkaller0 entered promiscuous mode [ 260.384402][ T6383] device syzkaller0 entered promiscuous mode [ 262.536763][ T28] audit: type=1400 audit(1761675884.980:142): avc: denied { create } for pid=6432 comm="syz.0.2032" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1 [ 266.832238][ T6569] device syzkaller0 entered promiscuous mode [ 268.514043][ T6609] device syzkaller0 entered promiscuous mode [ 269.611643][ T6664] device sit0 left promiscuous mode [ 269.707110][ T6671] device sit0 entered promiscuous mode [ 269.896003][ T6668] device syzkaller0 entered promiscuous mode [ 270.021052][ T6679] device syzkaller0 entered promiscuous mode [ 271.050800][ T6712] device syzkaller0 entered promiscuous mode [ 271.580203][ T6724] device sit0 left promiscuous mode [ 271.700202][ T6727] device sit0 entered promiscuous mode [ 272.487247][ T6758] device syzkaller0 entered promiscuous mode [ 274.504202][ T6795] FAULT_INJECTION: forcing a failure. [ 274.504202][ T6795] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 274.702664][ T6795] CPU: 0 PID: 6795 Comm: syz.3.2161 Not tainted syzkaller #0 [ 274.711055][ T6795] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 274.721660][ T6795] Call Trace: [ 274.725841][ T6795] [ 274.730014][ T6795] __dump_stack+0x21/0x24 [ 274.734622][ T6795] dump_stack_lvl+0xee/0x150 [ 274.739797][ T6795] ? __cfi_dump_stack_lvl+0x8/0x8 [ 274.746334][ T6795] ? dump_stack+0x9/0x24 [ 274.750779][ T6795] ? dump_stack_lvl+0x1/0x150 [ 274.756967][ T6795] dump_stack+0x15/0x24 [ 274.761485][ T6795] should_fail_ex+0x3d4/0x520 [ 274.766982][ T6795] should_fail+0xb/0x10 [ 274.772461][ T6795] should_fail_usercopy+0x1a/0x20 [ 274.777602][ T6795] _copy_to_user+0x1e/0x90 [ 274.782306][ T6795] generic_map_lookup_batch+0x6c8/0xa90 [ 274.788372][ T6795] ? __cfi_generic_map_lookup_batch+0x10/0x10 [ 274.795517][ T6795] ? bpf_map_do_batch+0x2cd/0x620 [ 274.800986][ T6795] ? __cfi_generic_map_lookup_batch+0x10/0x10 [ 274.807577][ T6795] bpf_map_do_batch+0x2e8/0x620 [ 274.813858][ T6795] __sys_bpf+0x624/0x780 [ 274.818997][ T6795] ? bpf_link_show_fdinfo+0x320/0x320 [ 274.825067][ T6795] ? __cfi_sched_clock_cpu+0x10/0x10 [ 274.831237][ T6795] __x64_sys_bpf+0x7c/0x90 [ 274.835676][ T6795] x64_sys_call+0x488/0x9a0 [ 274.840196][ T6795] do_syscall_64+0x4c/0xa0 [ 274.845131][ T6795] ? clear_bhb_loop+0x30/0x80 [ 274.850785][ T6795] ? clear_bhb_loop+0x30/0x80 [ 274.855805][ T6795] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 274.861954][ T6795] RIP: 0033:0x7f0eb718efc9 [ 274.866661][ T6795] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 274.889050][ T6795] RSP: 002b:00007f0eb80ae038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 274.900287][ T6795] RAX: ffffffffffffffda RBX: 00007f0eb73e5fa0 RCX: 00007f0eb718efc9 [ 274.909494][ T6795] RDX: 0000000000000038 RSI: 00002000000004c0 RDI: 0000000000000018 [ 274.918435][ T6795] RBP: 00007f0eb80ae090 R08: 0000000000000000 R09: 0000000000000000 [ 274.927460][ T6795] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 274.936702][ T6795] R13: 00007f0eb73e6038 R14: 00007f0eb73e5fa0 R15: 00007ffd2deb1888 [ 274.945656][ T6795] [ 275.517498][ T6817] FAULT_INJECTION: forcing a failure. [ 275.517498][ T6817] name failslab, interval 1, probability 0, space 0, times 0 [ 275.672872][ T6817] CPU: 1 PID: 6817 Comm: syz.4.2168 Not tainted syzkaller #0 [ 275.680570][ T6817] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 275.690984][ T6817] Call Trace: [ 275.694281][ T6817] [ 275.697576][ T6817] __dump_stack+0x21/0x24 [ 275.702280][ T6817] dump_stack_lvl+0xee/0x150 [ 275.707088][ T6817] ? __cfi_dump_stack_lvl+0x8/0x8 [ 275.712227][ T6817] dump_stack+0x15/0x24 [ 275.717033][ T6817] should_fail_ex+0x3d4/0x520 [ 275.721821][ T6817] ? skb_clone+0x1f5/0x380 [ 275.726539][ T6817] __should_failslab+0xac/0xf0 [ 275.731946][ T6817] should_failslab+0x9/0x20 [ 275.736698][ T6817] kmem_cache_alloc+0x3b/0x330 [ 275.741755][ T6817] ? arch_stack_walk+0xfc/0x150 [ 275.747333][ T6817] skb_clone+0x1f5/0x380 [ 275.751640][ T6817] bpf_clone_redirect+0xa7/0x3c0 [ 275.757039][ T6817] ? __stack_depot_save+0x36/0x480 [ 275.762423][ T6817] bpf_prog_6893982b85ceadf7+0x56/0x5b [ 275.768069][ T6817] ? kasan_set_track+0x60/0x70 [ 275.773108][ T6817] ? kasan_set_track+0x4b/0x70 [ 275.777885][ T6817] ? kasan_save_alloc_info+0x25/0x30 [ 275.783451][ T6817] ? __kasan_slab_alloc+0x72/0x80 [ 275.788746][ T6817] ? slab_post_alloc_hook+0x4f/0x2d0 [ 275.794323][ T6817] ? kmem_cache_alloc+0x16e/0x330 [ 275.799633][ T6817] ? build_skb+0x2a/0x220 [ 275.804151][ T6817] ? bpf_prog_test_run_skb+0x39f/0x1290 [ 275.809972][ T6817] ? bpf_prog_test_run+0x3e3/0x630 [ 275.815505][ T6817] ? __sys_bpf+0x56d/0x780 [ 275.820106][ T6817] ? __x64_sys_bpf+0x7c/0x90 [ 275.824889][ T6817] ? x64_sys_call+0x488/0x9a0 [ 275.829676][ T6817] ? do_syscall_64+0x4c/0xa0 [ 275.835077][ T6817] ? entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 275.841697][ T6817] ? ktime_get+0x141/0x170 [ 275.846296][ T6817] bpf_test_run+0x349/0x8d0 [ 275.850922][ T6817] ? __kasan_slab_alloc+0x72/0x80 [ 275.857017][ T6817] ? convert___skb_to_skb+0x5b0/0x5b0 [ 275.862487][ T6817] ? __cfi_eth_type_trans+0x10/0x10 [ 275.867977][ T6817] ? convert___skb_to_skb+0x40/0x5b0 [ 275.873626][ T6817] bpf_prog_test_run_skb+0xaec/0x1290 [ 275.879274][ T6817] ? __cfi_bpf_prog_test_run_skb+0x10/0x10 [ 275.885433][ T6817] bpf_prog_test_run+0x3e3/0x630 [ 275.890814][ T6817] ? slab_free_freelist_hook+0xc2/0x190 [ 275.897050][ T6817] ? bpf_prog_query+0x270/0x270 [ 275.902434][ T6817] ? selinux_bpf+0xce/0xf0 [ 275.907094][ T6817] ? security_bpf+0x93/0xb0 [ 275.911668][ T6817] __sys_bpf+0x56d/0x780 [ 275.916068][ T6817] ? bpf_link_show_fdinfo+0x320/0x320 [ 275.921690][ T6817] ? __cfi_ksys_write+0x10/0x10 [ 275.927154][ T6817] ? debug_smp_processor_id+0x17/0x20 [ 275.932984][ T6817] __x64_sys_bpf+0x7c/0x90 [ 275.937673][ T6817] x64_sys_call+0x488/0x9a0 [ 275.942452][ T6817] do_syscall_64+0x4c/0xa0 [ 275.947149][ T6817] ? clear_bhb_loop+0x30/0x80 [ 275.952089][ T6817] ? clear_bhb_loop+0x30/0x80 [ 275.957186][ T6817] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 275.963515][ T6817] RIP: 0033:0x7fbf7e38efc9 [ 275.968101][ T6817] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 275.988489][ T6817] RSP: 002b:00007fbf7f1dd038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 275.996984][ T6817] RAX: ffffffffffffffda RBX: 00007fbf7e5e5fa0 RCX: 00007fbf7e38efc9 [ 276.005304][ T6817] RDX: 000000000000002c RSI: 0000200000000080 RDI: 000000000000000a [ 276.013625][ T6817] RBP: 00007fbf7f1dd090 R08: 0000000000000000 R09: 0000000000000000 [ 276.022728][ T6817] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 276.031153][ T6817] R13: 00007fbf7e5e6038 R14: 00007fbf7e5e5fa0 R15: 00007fff4d946168 [ 276.039503][ T6817] [ 277.250155][ T6844] device veth0_vlan left promiscuous mode [ 277.310091][ T6844] device veth0_vlan entered promiscuous mode [ 277.406227][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 277.427050][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 277.483800][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 277.524706][ T6852] device pim6reg1 entered promiscuous mode [ 277.764514][ T6864] device sit0 entered promiscuous mode [ 279.969437][ T6896] device wg2 entered promiscuous mode [ 280.540318][ T6904] device syzkaller0 entered promiscuous mode [ 282.497442][ T6957] bond_slave_1: mtu less than device minimum [ 284.961512][ T7055] device pim6reg1 entered promiscuous mode [ 290.450806][ T7191] device sit0 left promiscuous mode [ 290.738524][ T7193] device sit0 entered promiscuous mode [ 291.810687][ T7234] device sit0 left promiscuous mode [ 291.837894][ T7234] device sit0 entered promiscuous mode [ 294.206652][ T7310] bond_slave_1: mtu less than device minimum [ 295.720666][ T7350] FAULT_INJECTION: forcing a failure. [ 295.720666][ T7350] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 295.746838][ T7350] CPU: 0 PID: 7350 Comm: syz.4.2351 Not tainted syzkaller #0 [ 295.754506][ T7350] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 295.764913][ T7350] Call Trace: [ 295.768366][ T7350] [ 295.771394][ T7350] __dump_stack+0x21/0x24 [ 295.775738][ T7350] dump_stack_lvl+0xee/0x150 [ 295.780819][ T7350] ? __cfi_dump_stack_lvl+0x8/0x8 [ 295.786111][ T7350] dump_stack+0x15/0x24 [ 295.790360][ T7350] should_fail_ex+0x3d4/0x520 [ 295.795224][ T7350] should_fail+0xb/0x10 [ 295.799463][ T7350] should_fail_usercopy+0x1a/0x20 [ 295.804571][ T7350] _copy_to_user+0x1e/0x90 [ 295.809161][ T7350] simple_read_from_buffer+0xe9/0x160 [ 295.814803][ T7350] proc_fail_nth_read+0x19a/0x210 [ 295.820349][ T7350] ? __cfi_proc_fail_nth_read+0x10/0x10 [ 295.826071][ T7350] ? security_file_permission+0x94/0xb0 [ 295.831884][ T7350] ? __cfi_proc_fail_nth_read+0x10/0x10 [ 295.837616][ T7350] vfs_read+0x26e/0x8c0 [ 295.841891][ T7350] ? __cfi_vfs_read+0x10/0x10 [ 295.847278][ T7350] ? __kasan_check_write+0x14/0x20 [ 295.852588][ T7350] ? mutex_lock+0x8d/0x1a0 [ 295.857200][ T7350] ? __cfi_mutex_lock+0x10/0x10 [ 295.862340][ T7350] ? __fdget_pos+0x2cd/0x380 [ 295.867105][ T7350] ? ksys_read+0x71/0x240 [ 295.871533][ T7350] ksys_read+0x140/0x240 [ 295.875873][ T7350] ? __cfi_ksys_read+0x10/0x10 [ 295.880911][ T7350] ? debug_smp_processor_id+0x17/0x20 [ 295.886652][ T7350] __x64_sys_read+0x7b/0x90 [ 295.891525][ T7350] x64_sys_call+0x2f/0x9a0 [ 295.896376][ T7350] do_syscall_64+0x4c/0xa0 [ 295.900972][ T7350] ? clear_bhb_loop+0x30/0x80 [ 295.906093][ T7350] ? clear_bhb_loop+0x30/0x80 [ 295.910950][ T7350] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 295.917036][ T7350] RIP: 0033:0x7fbf7e38d9dc [ 295.921615][ T7350] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 93 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 ef 93 02 00 48 [ 295.942002][ T7350] RSP: 002b:00007fbf7f1dd030 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 295.951039][ T7350] RAX: ffffffffffffffda RBX: 00007fbf7e5e5fa0 RCX: 00007fbf7e38d9dc [ 295.959267][ T7350] RDX: 000000000000000f RSI: 00007fbf7f1dd0a0 RDI: 0000000000000006 [ 295.967593][ T7350] RBP: 00007fbf7f1dd090 R08: 0000000000000000 R09: 0000000000000000 [ 295.975834][ T7350] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 295.984264][ T7350] R13: 00007fbf7e5e6038 R14: 00007fbf7e5e5fa0 R15: 00007fff4d946168 [ 295.992514][ T7350] [ 296.006846][ T7353] device sit0 left promiscuous mode [ 296.118426][ T7353] device sit0 entered promiscuous mode [ 296.717041][ T7367] device wg2 left promiscuous mode [ 296.733592][ T7373] device wg2 entered promiscuous mode [ 297.213869][ T28] audit: type=1400 audit(1761675919.650:143): avc: denied { getattr } for pid=7406 comm="syz.4.2370" path="net:[4026532655]" dev="nsfs" ino=4026532655 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 299.800725][ T7496] device sit0 left promiscuous mode [ 301.008318][ T7519] bond_slave_1: mtu greater than device maximum [ 302.928233][ T7559] FAULT_INJECTION: forcing a failure. [ 302.928233][ T7559] name failslab, interval 1, probability 0, space 0, times 0 [ 303.091158][ T7559] CPU: 0 PID: 7559 Comm: syz.4.2418 Not tainted syzkaller #0 [ 303.099195][ T7559] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 303.110264][ T7559] Call Trace: [ 303.113653][ T7559] [ 303.116898][ T7559] __dump_stack+0x21/0x24 [ 303.121928][ T7559] dump_stack_lvl+0xee/0x150 [ 303.126873][ T7559] ? __cfi_dump_stack_lvl+0x8/0x8 [ 303.132462][ T7559] ? __cfi_kvmalloc_node+0x10/0x10 [ 303.137874][ T7559] dump_stack+0x15/0x24 [ 303.142396][ T7559] should_fail_ex+0x3d4/0x520 [ 303.147188][ T7559] ? copy_fs_struct+0x4c/0x220 [ 303.152139][ T7559] __should_failslab+0xac/0xf0 [ 303.157026][ T7559] should_failslab+0x9/0x20 [ 303.162430][ T7559] kmem_cache_alloc+0x3b/0x330 [ 303.168103][ T7559] copy_fs_struct+0x4c/0x220 [ 303.173060][ T7559] copy_fs+0x6f/0x140 [ 303.177062][ T7559] copy_process+0x122b/0x3480 [ 303.181812][ T7559] ? idle_dummy+0x10/0x10 [ 303.186325][ T7559] kernel_clone+0x23a/0x810 [ 303.190930][ T7559] ? __cfi_kernel_clone+0x10/0x10 [ 303.196526][ T7559] ? __kasan_check_write+0x14/0x20 [ 303.202091][ T7559] ? mutex_unlock+0x89/0x220 [ 303.207030][ T7559] __x64_sys_clone+0x168/0x1b0 [ 303.211806][ T7559] ? __cfi___x64_sys_clone+0x10/0x10 [ 303.217100][ T7559] ? fpregs_assert_state_consistent+0xb1/0xe0 [ 303.223346][ T7559] x64_sys_call+0x990/0x9a0 [ 303.227936][ T7559] do_syscall_64+0x4c/0xa0 [ 303.232352][ T7559] ? clear_bhb_loop+0x30/0x80 [ 303.237379][ T7559] ? clear_bhb_loop+0x30/0x80 [ 303.242152][ T7559] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 303.248487][ T7559] RIP: 0033:0x7fbf7e38efc9 [ 303.253008][ T7559] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 303.273545][ T7559] RSP: 002b:00007fbf7f1dcfe8 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 303.282592][ T7559] RAX: ffffffffffffffda RBX: 00007fbf7e5e5fa0 RCX: 00007fbf7e38efc9 [ 303.290779][ T7559] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000042000000 [ 303.299020][ T7559] RBP: 00007fbf7f1dd090 R08: 0000000000000000 R09: 0000000000000000 [ 303.307166][ T7559] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000002 [ 303.315664][ T7559] R13: 00007fbf7e5e6038 R14: 00007fbf7e5e5fa0 R15: 00007fff4d946168 [ 303.324078][ T7559] [ 303.421206][ T7562] device pim6reg1 entered promiscuous mode [ 304.093479][ T7583] device sit0 entered promiscuous mode [ 305.915460][ T7634] device sit0 left promiscuous mode [ 306.062699][ T7638] device sit0 entered promiscuous mode [ 307.150397][ T7675] device pim6reg1 entered promiscuous mode [ 309.242317][ T7763] FAULT_INJECTION: forcing a failure. [ 309.242317][ T7763] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 309.283841][ T7763] CPU: 1 PID: 7763 Comm: syz.0.2487 Not tainted syzkaller #0 [ 309.291514][ T7763] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 309.301912][ T7763] Call Trace: [ 309.305282][ T7763] [ 309.308586][ T7763] __dump_stack+0x21/0x24 [ 309.313094][ T7763] dump_stack_lvl+0xee/0x150 [ 309.317682][ T7763] ? __cfi_dump_stack_lvl+0x8/0x8 [ 309.322704][ T7763] dump_stack+0x15/0x24 [ 309.327206][ T7763] should_fail_ex+0x3d4/0x520 [ 309.332030][ T7763] should_fail_alloc_page+0x61/0x90 [ 309.338051][ T7763] prepare_alloc_pages+0x148/0x5f0 [ 309.343587][ T7763] ? __alloc_pages_bulk+0x9c0/0x9c0 [ 309.349503][ T7763] ? slab_post_alloc_hook+0x4f/0x2d0 [ 309.355165][ T7763] ? alloc_vmap_area+0x17b/0x1870 [ 309.360417][ T7763] ? __get_vm_area_node+0x160/0x360 [ 309.366235][ T7763] ? __vmalloc_node_range+0x326/0x13d0 [ 309.371788][ T7763] __alloc_pages+0x124/0x450 [ 309.376376][ T7763] ? __cfi___alloc_pages+0x10/0x10 [ 309.381668][ T7763] ? __kasan_check_write+0x14/0x20 [ 309.387139][ T7763] ? _raw_spin_lock+0x8e/0xe0 [ 309.392018][ T7763] ? __cfi__raw_spin_lock+0x10/0x10 [ 309.397673][ T7763] __get_free_pages+0xe/0x30 [ 309.403037][ T7763] kasan_populate_vmalloc_pte+0x29/0x120 [ 309.409043][ T7763] __apply_to_page_range+0x8de/0xc80 [ 309.414690][ T7763] ? __cfi_kasan_populate_vmalloc_pte+0x10/0x10 [ 309.422131][ T7763] ? __cfi_kasan_populate_vmalloc_pte+0x10/0x10 [ 309.428639][ T7763] apply_to_page_range+0x3b/0x50 [ 309.433692][ T7763] kasan_populate_vmalloc+0x60/0x70 [ 309.439240][ T7763] alloc_vmap_area+0x173e/0x1870 [ 309.444620][ T7763] ? vm_map_ram+0x930/0x930 [ 309.449295][ T7763] ? __kasan_kmalloc+0x95/0xb0 [ 309.454322][ T7763] ? kmalloc_node_trace+0x3d/0xb0 [ 309.459455][ T7763] __get_vm_area_node+0x160/0x360 [ 309.464755][ T7763] ? x64_sys_call+0x488/0x9a0 [ 309.469548][ T7763] __vmalloc_node_range+0x326/0x13d0 [ 309.475012][ T7763] ? sock_hash_alloc+0x297/0x510 [ 309.480239][ T7763] ? __cfi___vmalloc_node_range+0x10/0x10 [ 309.486044][ T7763] ? kasan_save_alloc_info+0x25/0x30 [ 309.491586][ T7763] ? bpf_map_area_alloc+0x4b/0xe0 [ 309.497164][ T7763] ? __kmalloc_node+0xb2/0x1e0 [ 309.502105][ T7763] bpf_map_area_alloc+0xd7/0xe0 [ 309.507116][ T7763] ? sock_hash_alloc+0x297/0x510 [ 309.512215][ T7763] sock_hash_alloc+0x297/0x510 [ 309.517244][ T7763] map_create+0x49c/0xd80 [ 309.521751][ T7763] __sys_bpf+0x30b/0x780 [ 309.526065][ T7763] ? bpf_link_show_fdinfo+0x320/0x320 [ 309.531514][ T7763] ? __cfi_ksys_write+0x10/0x10 [ 309.536466][ T7763] ? __bpf_trace_sys_enter+0x62/0x70 [ 309.542048][ T7763] __x64_sys_bpf+0x7c/0x90 [ 309.546812][ T7763] x64_sys_call+0x488/0x9a0 [ 309.551504][ T7763] do_syscall_64+0x4c/0xa0 [ 309.556082][ T7763] ? clear_bhb_loop+0x30/0x80 [ 309.560844][ T7763] ? clear_bhb_loop+0x30/0x80 [ 309.566071][ T7763] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 309.572000][ T7763] RIP: 0033:0x7f5d9238efc9 [ 309.576409][ T7763] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 309.597681][ T7763] RSP: 002b:00007f5d931d0038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 309.606789][ T7763] RAX: ffffffffffffffda RBX: 00007f5d925e5fa0 RCX: 00007f5d9238efc9 [ 309.614923][ T7763] RDX: 0000000000000050 RSI: 0000200000000600 RDI: 0000000000000000 [ 309.623398][ T7763] RBP: 00007f5d931d0090 R08: 0000000000000000 R09: 0000000000000000 [ 309.632136][ T7763] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 309.640458][ T7763] R13: 00007f5d925e6038 R14: 00007f5d925e5fa0 R15: 00007ffe76cca8d8 [ 309.649055][ T7763] [ 309.754978][ T7775] device sit0 left promiscuous mode [ 311.511807][ T7822] FAULT_INJECTION: forcing a failure. [ 311.511807][ T7822] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 311.617231][ T7822] CPU: 1 PID: 7822 Comm: syz.1.2503 Not tainted syzkaller #0 [ 311.624656][ T7822] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 311.635260][ T7822] Call Trace: [ 311.638731][ T7822] [ 311.641764][ T7822] __dump_stack+0x21/0x24 [ 311.646562][ T7822] dump_stack_lvl+0xee/0x150 [ 311.651346][ T7822] ? __cfi_dump_stack_lvl+0x8/0x8 [ 311.656393][ T7822] dump_stack+0x15/0x24 [ 311.660564][ T7822] should_fail_ex+0x3d4/0x520 [ 311.665431][ T7822] should_fail+0xb/0x10 [ 311.669766][ T7822] should_fail_usercopy+0x1a/0x20 [ 311.674946][ T7822] _copy_to_user+0x1e/0x90 [ 311.679889][ T7822] bpf_prog_test_run_raw_tp+0x4e0/0x670 [ 311.685621][ T7822] ? __cfi_bpf_prog_test_run_raw_tp+0x10/0x10 [ 311.691786][ T7822] ? __kasan_check_write+0x14/0x20 [ 311.697174][ T7822] ? __cfi_bpf_prog_test_run_raw_tp+0x10/0x10 [ 311.703530][ T7822] bpf_prog_test_run+0x3e3/0x630 [ 311.708829][ T7822] ? slab_free_freelist_hook+0xc2/0x190 [ 311.714575][ T7822] ? bpf_prog_query+0x270/0x270 [ 311.719626][ T7822] ? selinux_bpf+0xce/0xf0 [ 311.724325][ T7822] ? security_bpf+0x93/0xb0 [ 311.729119][ T7822] __sys_bpf+0x56d/0x780 [ 311.733689][ T7822] ? bpf_link_show_fdinfo+0x320/0x320 [ 311.739160][ T7822] ? __cfi_ksys_write+0x10/0x10 [ 311.744469][ T7822] ? debug_smp_processor_id+0x17/0x20 [ 311.749959][ T7822] __x64_sys_bpf+0x7c/0x90 [ 311.754496][ T7822] x64_sys_call+0x488/0x9a0 [ 311.759019][ T7822] do_syscall_64+0x4c/0xa0 [ 311.763450][ T7822] ? clear_bhb_loop+0x30/0x80 [ 311.768318][ T7822] ? clear_bhb_loop+0x30/0x80 [ 311.773110][ T7822] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 311.779196][ T7822] RIP: 0033:0x7f99cdd8efc9 [ 311.783765][ T7822] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 311.804166][ T7822] RSP: 002b:00007f99ceb62038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 311.812853][ T7822] RAX: ffffffffffffffda RBX: 00007f99cdfe5fa0 RCX: 00007f99cdd8efc9 [ 311.820862][ T7822] RDX: 000000000000000c RSI: 0000200000000680 RDI: 000000000000000a [ 311.828927][ T7822] RBP: 00007f99ceb62090 R08: 0000000000000000 R09: 0000000000000000 [ 311.837256][ T7822] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 311.845251][ T7822] R13: 00007f99cdfe6038 R14: 00007f99cdfe5fa0 R15: 00007ffc09c69558 [ 311.853332][ T7822] [ 312.557778][ T7857] device sit0 left promiscuous mode [ 312.652630][ T7864] device sit0 entered promiscuous mode [ 314.706967][ T7903] FAULT_INJECTION: forcing a failure. [ 314.706967][ T7903] name failslab, interval 1, probability 0, space 0, times 0 [ 314.940519][ T7903] CPU: 0 PID: 7903 Comm: syz.3.2528 Not tainted syzkaller #0 [ 314.948810][ T7903] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 314.959487][ T7903] Call Trace: [ 314.963214][ T7903] [ 314.966243][ T7903] __dump_stack+0x21/0x24 [ 314.970669][ T7903] dump_stack_lvl+0xee/0x150 [ 314.975439][ T7903] ? __cfi_dump_stack_lvl+0x8/0x8 [ 314.980837][ T7903] ? do_syscall_64+0x4c/0xa0 [ 314.985618][ T7903] dump_stack+0x15/0x24 [ 314.990464][ T7903] should_fail_ex+0x3d4/0x520 [ 314.995392][ T7903] __should_failslab+0xac/0xf0 [ 315.000416][ T7903] ? sk_prot_alloc+0xed/0x320 [ 315.005110][ T7903] should_failslab+0x9/0x20 [ 315.009700][ T7903] __kmem_cache_alloc_node+0x3d/0x2c0 [ 315.015987][ T7903] ? sk_prot_alloc+0xed/0x320 [ 315.020849][ T7903] __kmalloc+0xa1/0x1e0 [ 315.025386][ T7903] sk_prot_alloc+0xed/0x320 [ 315.030152][ T7903] sk_alloc+0x3b/0x460 [ 315.034246][ T7903] ? __kasan_check_write+0x14/0x20 [ 315.040135][ T7903] bpf_prog_test_run_skb+0x37e/0x1290 [ 315.045850][ T7903] ? __fget_files+0x2d5/0x330 [ 315.050606][ T7903] ? __cfi_bpf_prog_test_run_skb+0x10/0x10 [ 315.056833][ T7903] bpf_prog_test_run+0x3e3/0x630 [ 315.061845][ T7903] ? slab_free_freelist_hook+0xc2/0x190 [ 315.067749][ T7903] ? bpf_prog_query+0x270/0x270 [ 315.073021][ T7903] ? selinux_bpf+0xce/0xf0 [ 315.077511][ T7903] ? security_bpf+0x93/0xb0 [ 315.082176][ T7903] __sys_bpf+0x56d/0x780 [ 315.086841][ T7903] ? bpf_link_show_fdinfo+0x320/0x320 [ 315.092616][ T7903] ? __cfi_ksys_write+0x10/0x10 [ 315.097894][ T7903] ? debug_smp_processor_id+0x17/0x20 [ 315.103556][ T7903] __x64_sys_bpf+0x7c/0x90 [ 315.108246][ T7903] x64_sys_call+0x488/0x9a0 [ 315.112738][ T7903] do_syscall_64+0x4c/0xa0 [ 315.117232][ T7903] ? clear_bhb_loop+0x30/0x80 [ 315.122079][ T7903] ? clear_bhb_loop+0x30/0x80 [ 315.126854][ T7903] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 315.133084][ T7903] RIP: 0033:0x7f0eb718efc9 [ 315.137589][ T7903] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 315.159263][ T7903] RSP: 002b:00007f0eb80ae038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 315.168019][ T7903] RAX: ffffffffffffffda RBX: 00007f0eb73e5fa0 RCX: 00007f0eb718efc9 [ 315.176507][ T7903] RDX: 000000000000001e RSI: 0000200000000080 RDI: 000000000000000a [ 315.185006][ T7903] RBP: 00007f0eb80ae090 R08: 0000000000000000 R09: 0000000000000000 [ 315.193507][ T7903] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 315.201744][ T7903] R13: 00007f0eb73e6038 R14: 00007f0eb73e5fa0 R15: 00007ffd2deb1888 [ 315.209805][ T7903] [ 315.578267][ T7899] device veth0_vlan left promiscuous mode [ 315.766846][ T7899] device veth0_vlan entered promiscuous mode [ 315.774084][ T200] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 315.803287][ T200] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 315.873896][ T200] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 315.893541][ T7923] device sit0 left promiscuous mode [ 315.946530][ T7926] device sit0 entered promiscuous mode [ 316.747727][ T7944] device sit0 left promiscuous mode [ 317.948483][ T7966] FAULT_INJECTION: forcing a failure. [ 317.948483][ T7966] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 317.987361][ T7978] FAULT_INJECTION: forcing a failure. [ 317.987361][ T7978] name failslab, interval 1, probability 0, space 0, times 0 [ 318.011428][ T7966] CPU: 0 PID: 7966 Comm: syz.4.2548 Not tainted syzkaller #0 [ 318.019222][ T7966] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 318.029291][ T7966] Call Trace: [ 318.032687][ T7966] [ 318.035622][ T7966] __dump_stack+0x21/0x24 [ 318.040047][ T7966] dump_stack_lvl+0xee/0x150 [ 318.044821][ T7966] ? __cfi_dump_stack_lvl+0x8/0x8 [ 318.050022][ T7966] dump_stack+0x15/0x24 [ 318.054186][ T7966] should_fail_ex+0x3d4/0x520 [ 318.058982][ T7966] should_fail+0xb/0x10 [ 318.063139][ T7966] should_fail_usercopy+0x1a/0x20 [ 318.068515][ T7966] _copy_to_user+0x1e/0x90 [ 318.072931][ T7966] simple_read_from_buffer+0xe9/0x160 [ 318.078404][ T7966] proc_fail_nth_read+0x19a/0x210 [ 318.083705][ T7966] ? __cfi_proc_fail_nth_read+0x10/0x10 [ 318.089606][ T7966] ? security_file_permission+0x94/0xb0 [ 318.095447][ T7966] ? __cfi_proc_fail_nth_read+0x10/0x10 [ 318.101111][ T7966] vfs_read+0x26e/0x8c0 [ 318.105296][ T7966] ? __cfi_vfs_read+0x10/0x10 [ 318.110154][ T7966] ? __kasan_check_write+0x14/0x20 [ 318.115524][ T7966] ? mutex_lock+0x8d/0x1a0 [ 318.120173][ T7966] ? __cfi_mutex_lock+0x10/0x10 [ 318.125306][ T7966] ? __fdget_pos+0x2cd/0x380 [ 318.129923][ T7966] ? ksys_read+0x71/0x240 [ 318.134276][ T7966] ksys_read+0x140/0x240 [ 318.138614][ T7966] ? __cfi_ksys_read+0x10/0x10 [ 318.143565][ T7966] ? debug_smp_processor_id+0x17/0x20 [ 318.149377][ T7966] __x64_sys_read+0x7b/0x90 [ 318.154427][ T7966] x64_sys_call+0x2f/0x9a0 [ 318.158969][ T7966] do_syscall_64+0x4c/0xa0 [ 318.164027][ T7966] ? clear_bhb_loop+0x30/0x80 [ 318.168807][ T7966] ? clear_bhb_loop+0x30/0x80 [ 318.173778][ T7966] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 318.180471][ T7966] RIP: 0033:0x7fbf7e38d9dc [ 318.185075][ T7966] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 93 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 ef 93 02 00 48 [ 318.205212][ T7966] RSP: 002b:00007fbf7f1dd030 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 318.213903][ T7966] RAX: ffffffffffffffda RBX: 00007fbf7e5e5fa0 RCX: 00007fbf7e38d9dc [ 318.222137][ T7966] RDX: 000000000000000f RSI: 00007fbf7f1dd0a0 RDI: 0000000000000008 [ 318.230821][ T7966] RBP: 00007fbf7f1dd090 R08: 0000000000000000 R09: 0000000000000000 [ 318.239161][ T7966] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 318.247320][ T7966] R13: 00007fbf7e5e6038 R14: 00007fbf7e5e5fa0 R15: 00007fff4d946168 [ 318.256524][ T7966] [ 318.379982][ T7978] CPU: 0 PID: 7978 Comm: syz.2.2551 Not tainted syzkaller #0 [ 318.387924][ T7978] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 318.398431][ T7978] Call Trace: [ 318.401915][ T7978] [ 318.405125][ T7978] __dump_stack+0x21/0x24 [ 318.409900][ T7978] dump_stack_lvl+0xee/0x150 [ 318.414864][ T7978] ? __cfi_dump_stack_lvl+0x8/0x8 [ 318.420089][ T7978] ? stack_trace_save+0x98/0xe0 [ 318.425650][ T7978] dump_stack+0x15/0x24 [ 318.430092][ T7978] should_fail_ex+0x3d4/0x520 [ 318.434887][ T7978] __should_failslab+0xac/0xf0 [ 318.440209][ T7978] ? __get_vm_area_node+0x12c/0x360 [ 318.445591][ T7978] should_failslab+0x9/0x20 [ 318.450123][ T7978] __kmem_cache_alloc_node+0x3d/0x2c0 [ 318.455770][ T7978] ? __x64_sys_clone+0x168/0x1b0 [ 318.460908][ T7978] ? x64_sys_call+0x990/0x9a0 [ 318.465855][ T7978] ? do_syscall_64+0x4c/0xa0 [ 318.470728][ T7978] ? __get_vm_area_node+0x12c/0x360 [ 318.476026][ T7978] kmalloc_node_trace+0x26/0xb0 [ 318.480885][ T7978] __get_vm_area_node+0x12c/0x360 [ 318.486547][ T7978] __vmalloc_node_range+0x326/0x13d0 [ 318.491968][ T7978] ? copy_process+0x5b8/0x3480 [ 318.497302][ T7978] ? kasan_save_alloc_info+0x25/0x30 [ 318.502868][ T7978] ? __cfi___vmalloc_node_range+0x10/0x10 [ 318.509030][ T7978] ? memcpy+0x56/0x70 [ 318.513111][ T7978] dup_task_struct+0x3ae/0x790 [ 318.518069][ T7978] ? copy_process+0x5b8/0x3480 [ 318.523025][ T7978] ? __kasan_check_write+0x14/0x20 [ 318.528235][ T7978] ? recalc_sigpending+0x168/0x1c0 [ 318.534159][ T7978] copy_process+0x5b8/0x3480 [ 318.539026][ T7978] ? __cfi_kstrtouint_from_user+0x10/0x10 [ 318.544953][ T7978] ? __kasan_check_write+0x14/0x20 [ 318.550611][ T7978] ? __kasan_check_write+0x14/0x20 [ 318.555912][ T7978] ? idle_dummy+0x10/0x10 [ 318.560347][ T7978] kernel_clone+0x23a/0x810 [ 318.565108][ T7978] ? __cfi_kernel_clone+0x10/0x10 [ 318.570405][ T7978] ? __kasan_check_write+0x14/0x20 [ 318.575612][ T7978] ? mutex_unlock+0x89/0x220 [ 318.580570][ T7978] __x64_sys_clone+0x168/0x1b0 [ 318.585618][ T7978] ? __cfi___x64_sys_clone+0x10/0x10 [ 318.591564][ T7978] ? fpregs_assert_state_consistent+0xb1/0xe0 [ 318.598090][ T7978] x64_sys_call+0x990/0x9a0 [ 318.602987][ T7978] do_syscall_64+0x4c/0xa0 [ 318.607504][ T7978] ? clear_bhb_loop+0x30/0x80 [ 318.612574][ T7978] ? clear_bhb_loop+0x30/0x80 [ 318.617684][ T7978] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 318.623658][ T7978] RIP: 0033:0x7f5676f8efc9 [ 318.628261][ T7978] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 318.648676][ T7978] RSP: 002b:00007f5677ee6fe8 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 318.657432][ T7978] RAX: ffffffffffffffda RBX: 00007f56771e5fa0 RCX: 00007f5676f8efc9 [ 318.666096][ T7978] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00000000403ac400 [ 318.674575][ T7978] RBP: 00007f5677ee7090 R08: 0000000000000000 R09: 0000000000000000 [ 318.683165][ T7978] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000001 [ 318.691398][ T7978] R13: 00007f56771e6038 R14: 00007f56771e5fa0 R15: 00007ffe1faf5668 [ 318.699539][ T7978] [ 318.719985][ T7987] device sit0 entered promiscuous mode [ 318.726225][ T7978] syz.2.2551: vmalloc error: size 32768, vm_struct allocation failed, mode:0xdc0(GFP_KERNEL|__GFP_ZERO), nodemask=(null),cpuset=syz2,mems_allowed=0 [ 319.223352][ T7999] device sit0 left promiscuous mode [ 319.276013][ T7999] device sit0 entered promiscuous mode [ 319.279723][ T7978] CPU: 1 PID: 7978 Comm: syz.2.2551 Not tainted syzkaller #0 [ 319.292163][ T7978] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 319.302670][ T7978] Call Trace: [ 319.306659][ T7978] [ 319.310582][ T7978] __dump_stack+0x21/0x24 [ 319.315025][ T7978] dump_stack_lvl+0xee/0x150 [ 319.319992][ T7978] ? __cfi_dump_stack_lvl+0x8/0x8 [ 319.325313][ T7978] ? pr_cont_kernfs_name+0x133/0x160 [ 319.330794][ T7978] dump_stack+0x15/0x24 [ 319.335580][ T7978] warn_alloc+0x1b0/0x1d0 [ 319.340284][ T7978] ? should_failslab+0x9/0x20 [ 319.345245][ T7978] ? __cfi_warn_alloc+0x10/0x10 [ 319.350668][ T7978] ? kmalloc_node_trace+0x3d/0xb0 [ 319.356783][ T7978] ? __get_vm_area_node+0x353/0x360 [ 319.362468][ T7978] __vmalloc_node_range+0x34b/0x13d0 [ 319.367934][ T7978] ? kasan_save_alloc_info+0x25/0x30 [ 319.373427][ T7978] ? __cfi___vmalloc_node_range+0x10/0x10 [ 319.379427][ T7978] ? memcpy+0x56/0x70 [ 319.383426][ T7978] dup_task_struct+0x3ae/0x790 [ 319.388807][ T7978] ? copy_process+0x5b8/0x3480 [ 319.393935][ T7978] ? __kasan_check_write+0x14/0x20 [ 319.399409][ T7978] ? recalc_sigpending+0x168/0x1c0 [ 319.404962][ T7978] copy_process+0x5b8/0x3480 [ 319.409929][ T7978] ? __cfi_kstrtouint_from_user+0x10/0x10 [ 319.415935][ T7978] ? __kasan_check_write+0x14/0x20 [ 319.421244][ T7978] ? __kasan_check_write+0x14/0x20 [ 319.426636][ T7978] ? idle_dummy+0x10/0x10 [ 319.431255][ T7978] kernel_clone+0x23a/0x810 [ 319.436059][ T7978] ? __cfi_kernel_clone+0x10/0x10 [ 319.441779][ T7978] ? __kasan_check_write+0x14/0x20 [ 319.447092][ T7978] ? mutex_unlock+0x89/0x220 [ 319.451946][ T7978] __x64_sys_clone+0x168/0x1b0 [ 319.457343][ T7978] ? __cfi___x64_sys_clone+0x10/0x10 [ 319.463264][ T7978] ? fpregs_assert_state_consistent+0xb1/0xe0 [ 319.469800][ T7978] x64_sys_call+0x990/0x9a0 [ 319.474768][ T7978] do_syscall_64+0x4c/0xa0 [ 319.479495][ T7978] ? clear_bhb_loop+0x30/0x80 [ 319.484453][ T7978] ? clear_bhb_loop+0x30/0x80 [ 319.489495][ T7978] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 319.495871][ T7978] RIP: 0033:0x7f5676f8efc9 [ 319.500387][ T7978] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 319.522615][ T7978] RSP: 002b:00007f5677ee6fe8 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 319.532002][ T7978] RAX: ffffffffffffffda RBX: 00007f56771e5fa0 RCX: 00007f5676f8efc9 [ 319.540661][ T7978] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00000000403ac400 [ 319.549672][ T7978] RBP: 00007f5677ee7090 R08: 0000000000000000 R09: 0000000000000000 [ 319.558581][ T7978] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000001 [ 319.567949][ T7978] R13: 00007f56771e6038 R14: 00007f56771e5fa0 R15: 00007ffe1faf5668 [ 319.576288][ T7978] [ 319.581353][ T7978] Mem-Info: [ 319.585121][ T7978] active_anon:23926 inactive_anon:0 isolated_anon:0 [ 319.585121][ T7978] active_file:26578 inactive_file:2343 isolated_file:0 [ 319.585121][ T7978] unevictable:0 dirty:339 writeback:0 [ 319.585121][ T7978] slab_reclaimable:8258 slab_unreclaimable:72758 [ 319.585121][ T7978] mapped:31447 shmem:16552 pagetables:578 [ 319.585121][ T7978] sec_pagetables:0 bounce:0 [ 319.585121][ T7978] kernel_misc_reclaimable:0 [ 319.585121][ T7978] free:1502612 free_pcp:7842 free_cma:0 [ 319.979408][ T7978] Node 0 active_anon:95668kB inactive_anon:0kB active_file:106312kB inactive_file:9372kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:125784kB dirty:1356kB writeback:0kB shmem:66144kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 0kB writeback_tmp:0kB kernel_stack:5612kB pagetables:2472kB sec_pagetables:0kB all_unreclaimable? no [ 320.013616][ T7978] DMA32 free:2968532kB boost:0kB min:31288kB low:39108kB high:46928kB reserved_highatomic:0KB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:3145324kB managed:2974192kB mlocked:0kB bounce:0kB free_pcp:5660kB local_pcp:5660kB free_cma:0kB [ 320.218737][ T7978] lowmem_reserve[]: 0 3932 3932 3932 [ 320.224262][ T7978] Normal free:3041676kB boost:0kB min:42436kB low:53044kB high:63652kB reserved_highatomic:0KB active_anon:95668kB inactive_anon:0kB active_file:106312kB inactive_file:9372kB unevictable:0kB writepending:1356kB present:5242880kB managed:4026656kB mlocked:0kB bounce:0kB free_pcp:25808kB local_pcp:2432kB free_cma:0kB [ 320.401341][ T7978] lowmem_reserve[]: 0 0 0 0 [ 320.479746][ T7978] DMA32: 3*4kB (M) 1*8kB (M) 2*16kB (M) 3*32kB (M) 3*64kB (M) 3*128kB (M) 3*256kB (M) 3*512kB (M) 4*1024kB (UM) 2*2048kB (M) 722*4096kB (M) = 2968532kB [ 320.510272][ T7978] Normal: 111*4kB (UM) 231*8kB (UME) 860*16kB (UM) 1105*32kB (UME) 274*64kB (UM) 230*128kB (UM) 108*256kB (UME) 90*512kB (UME) 48*1024kB (UM) 7*2048kB (UME) 685*4096kB (UM) = 3041364kB [ 320.541578][ T7978] 45445 total pagecache pages [ 320.546399][ T7978] 0 pages in swap cache [ 320.550905][ T7978] Free swap = 124996kB [ 320.555255][ T7978] Total swap = 124996kB [ 320.560025][ T7978] 2097051 pages RAM [ 320.565926][ T7978] 0 pages HighMem/MovableOnly [ 320.570930][ T7978] 346839 pages reserved [ 320.575139][ T7978] 0 pages cma reserved [ 320.682814][ T28] audit: type=1400 audit(1761675943.120:144): avc: denied { create } for pid=8032 comm="syz.2.2567" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 320.967382][ T8042] device sit0 left promiscuous mode [ 321.148733][ T8053] device sit0 entered promiscuous mode [ 321.967736][ T8068] FAULT_INJECTION: forcing a failure. [ 321.967736][ T8068] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 321.989652][ T8068] CPU: 0 PID: 8068 Comm: syz.0.2579 Not tainted syzkaller #0 [ 321.997521][ T8068] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 322.007680][ T8068] Call Trace: [ 322.010989][ T8068] [ 322.014057][ T8068] __dump_stack+0x21/0x24 [ 322.018757][ T8068] dump_stack_lvl+0xee/0x150 [ 322.023732][ T8068] ? __cfi_dump_stack_lvl+0x8/0x8 [ 322.028862][ T8068] dump_stack+0x15/0x24 [ 322.033040][ T8068] should_fail_ex+0x3d4/0x520 [ 322.037726][ T8068] should_fail+0xb/0x10 [ 322.042062][ T8068] should_fail_usercopy+0x1a/0x20 [ 322.047090][ T8068] _copy_to_user+0x1e/0x90 [ 322.051592][ T8068] simple_read_from_buffer+0xe9/0x160 [ 322.057053][ T8068] proc_fail_nth_read+0x19a/0x210 [ 322.062258][ T8068] ? __cfi_proc_fail_nth_read+0x10/0x10 [ 322.067813][ T8068] ? security_file_permission+0x94/0xb0 [ 322.073366][ T8068] ? __cfi_proc_fail_nth_read+0x10/0x10 [ 322.079260][ T8068] vfs_read+0x26e/0x8c0 [ 322.083519][ T8068] ? __cfi_vfs_read+0x10/0x10 [ 322.088291][ T8068] ? __kasan_check_write+0x14/0x20 [ 322.093490][ T8068] ? mutex_lock+0x8d/0x1a0 [ 322.097910][ T8068] ? __cfi_mutex_lock+0x10/0x10 [ 322.103111][ T8068] ? __fdget_pos+0x2cd/0x380 [ 322.107718][ T8068] ? ksys_read+0x71/0x240 [ 322.112428][ T8068] ksys_read+0x140/0x240 [ 322.116767][ T8068] ? __cfi_ksys_read+0x10/0x10 [ 322.122063][ T8068] ? debug_smp_processor_id+0x17/0x20 [ 322.127534][ T8068] __x64_sys_read+0x7b/0x90 [ 322.132046][ T8068] x64_sys_call+0x2f/0x9a0 [ 322.136487][ T8068] do_syscall_64+0x4c/0xa0 [ 322.141165][ T8068] ? clear_bhb_loop+0x30/0x80 [ 322.145857][ T8068] ? clear_bhb_loop+0x30/0x80 [ 322.150550][ T8068] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 322.156453][ T8068] RIP: 0033:0x7f5d9238d9dc [ 322.161078][ T8068] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 93 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 ef 93 02 00 48 [ 322.181301][ T8068] RSP: 002b:00007f5d931d0030 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 322.189990][ T8068] RAX: ffffffffffffffda RBX: 00007f5d925e5fa0 RCX: 00007f5d9238d9dc [ 322.198322][ T8068] RDX: 000000000000000f RSI: 00007f5d931d00a0 RDI: 0000000000000004 [ 322.206504][ T8068] RBP: 00007f5d931d0090 R08: 0000000000000000 R09: 0000000000000000 [ 322.214868][ T8068] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 322.223019][ T8068] R13: 00007f5d925e6038 R14: 00007f5d925e5fa0 R15: 00007ffe76cca8d8 [ 322.231287][ T8068] [ 324.897526][ T8120] device sit0 left promiscuous mode [ 325.042715][ T8121] device sit0 entered promiscuous mode [ 325.900931][ T8137] device sit0 left promiscuous mode [ 326.046457][ T8139] device sit0 entered promiscuous mode [ 328.756285][ T8232] device sit0 left promiscuous mode [ 329.052583][ T8240] FAULT_INJECTION: forcing a failure. [ 329.052583][ T8240] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 329.115477][ T8240] CPU: 0 PID: 8240 Comm: syz.0.2636 Not tainted syzkaller #0 [ 329.123073][ T8240] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 329.133667][ T8240] Call Trace: [ 329.137562][ T8240] [ 329.140693][ T8240] __dump_stack+0x21/0x24 [ 329.145320][ T8240] dump_stack_lvl+0xee/0x150 [ 329.149920][ T8240] ? __cfi_dump_stack_lvl+0x8/0x8 [ 329.155215][ T8240] dump_stack+0x15/0x24 [ 329.159642][ T8240] should_fail_ex+0x3d4/0x520 [ 329.164419][ T8240] should_fail_alloc_page+0x61/0x90 [ 329.169930][ T8240] prepare_alloc_pages+0x148/0x5f0 [ 329.175532][ T8240] ? __alloc_pages_bulk+0x9c0/0x9c0 [ 329.181090][ T8240] __alloc_pages+0x124/0x450 [ 329.185776][ T8240] ? __cfi___alloc_pages+0x10/0x10 [ 329.190981][ T8240] ? __cfi__raw_spin_lock_irq+0x10/0x10 [ 329.196797][ T8240] ? copy_page_from_iter+0x235/0x2b0 [ 329.202276][ T8240] pipe_write+0x592/0x1950 [ 329.207002][ T8240] ? __cfi_pipe_write+0x10/0x10 [ 329.212087][ T8240] ? selinux_file_permission+0x3ef/0x510 [ 329.217731][ T8240] ? fsnotify_perm+0x67/0x5b0 [ 329.222850][ T8240] ? security_file_permission+0x8a/0xb0 [ 329.228758][ T8240] vfs_write+0x5db/0xca0 [ 329.233209][ T8240] ? slab_free_freelist_hook+0xc2/0x190 [ 329.239292][ T8240] ? __cfi_vfs_write+0x10/0x10 [ 329.244693][ T8240] ? __fget_files+0x2d5/0x330 [ 329.249609][ T8240] ? __fdget_pos+0x1f2/0x380 [ 329.254216][ T8240] ? ksys_write+0x71/0x240 [ 329.258906][ T8240] ksys_write+0x140/0x240 [ 329.263612][ T8240] ? __cfi_ksys_write+0x10/0x10 [ 329.269211][ T8240] ? __bpf_trace_sys_enter+0x62/0x70 [ 329.275291][ T8240] __x64_sys_write+0x7b/0x90 [ 329.280043][ T8240] x64_sys_call+0x27b/0x9a0 [ 329.284908][ T8240] do_syscall_64+0x4c/0xa0 [ 329.290031][ T8240] ? clear_bhb_loop+0x30/0x80 [ 329.294919][ T8240] ? clear_bhb_loop+0x30/0x80 [ 329.299713][ T8240] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 329.306058][ T8240] RIP: 0033:0x7f5d9238efc9 [ 329.310743][ T8240] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 329.331232][ T8240] RSP: 002b:00007f5d931d0038 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 329.342344][ T8240] RAX: ffffffffffffffda RBX: 00007f5d925e5fa0 RCX: 00007f5d9238efc9 [ 329.351464][ T8240] RDX: 000000000000fdef RSI: 0000200000000000 RDI: 0000000000000000 [ 329.359714][ T8240] RBP: 00007f5d931d0090 R08: 0000000000000000 R09: 0000000000000000 [ 329.367926][ T8240] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 329.376516][ T8240] R13: 00007f5d925e6038 R14: 00007f5d925e5fa0 R15: 00007ffe76cca8d8 [ 329.385845][ T8240] [ 330.122400][ T8256] device syzkaller0 entered promiscuous mode [ 330.132680][ T8266] device sit0 entered promiscuous mode [ 334.090920][ T8415] FAULT_INJECTION: forcing a failure. [ 334.090920][ T8415] name failslab, interval 1, probability 0, space 0, times 0 [ 334.104924][ T8415] CPU: 1 PID: 8415 Comm: syz.4.2699 Not tainted syzkaller #0 [ 334.112705][ T8415] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 334.123385][ T8415] Call Trace: [ 334.127044][ T8415] [ 334.130243][ T8415] __dump_stack+0x21/0x24 [ 334.134767][ T8415] dump_stack_lvl+0xee/0x150 [ 334.140042][ T8415] ? __cfi_dump_stack_lvl+0x8/0x8 [ 334.145543][ T8415] ? __kasan_kmalloc+0x95/0xb0 [ 334.151118][ T8415] dump_stack+0x15/0x24 [ 334.155384][ T8415] should_fail_ex+0x3d4/0x520 [ 334.160357][ T8415] ? build_skb+0x2a/0x220 [ 334.165165][ T8415] __should_failslab+0xac/0xf0 [ 334.170219][ T8415] should_failslab+0x9/0x20 [ 334.175257][ T8415] kmem_cache_alloc+0x3b/0x330 [ 334.180131][ T8415] build_skb+0x2a/0x220 [ 334.184464][ T8415] bpf_prog_test_run_skb+0x39f/0x1290 [ 334.189932][ T8415] ? __fget_files+0x2d5/0x330 [ 334.194798][ T8415] ? __cfi_bpf_prog_test_run_skb+0x10/0x10 [ 334.201056][ T8415] bpf_prog_test_run+0x3e3/0x630 [ 334.206191][ T8415] ? slab_free_freelist_hook+0xc2/0x190 [ 334.212362][ T8415] ? bpf_prog_query+0x270/0x270 [ 334.217619][ T8415] ? selinux_bpf+0xce/0xf0 [ 334.222487][ T8415] ? security_bpf+0x93/0xb0 [ 334.227453][ T8415] __sys_bpf+0x56d/0x780 [ 334.231955][ T8415] ? bpf_link_show_fdinfo+0x320/0x320 [ 334.237608][ T8415] ? __cfi_ksys_write+0x10/0x10 [ 334.242741][ T8415] ? debug_smp_processor_id+0x17/0x20 [ 334.248135][ T8415] __x64_sys_bpf+0x7c/0x90 [ 334.252659][ T8415] x64_sys_call+0x488/0x9a0 [ 334.257607][ T8415] do_syscall_64+0x4c/0xa0 [ 334.262283][ T8415] ? clear_bhb_loop+0x30/0x80 [ 334.267061][ T8415] ? clear_bhb_loop+0x30/0x80 [ 334.271992][ T8415] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 334.278135][ T8415] RIP: 0033:0x7fbf7e38efc9 [ 334.282706][ T8415] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 334.303633][ T8415] RSP: 002b:00007fbf7f1dd038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 334.312759][ T8415] RAX: ffffffffffffffda RBX: 00007fbf7e5e5fa0 RCX: 00007fbf7e38efc9 [ 334.321002][ T8415] RDX: 000000000000001e RSI: 0000200000000080 RDI: 000000000000000a [ 334.329580][ T8415] RBP: 00007fbf7f1dd090 R08: 0000000000000000 R09: 0000000000000000 [ 334.337628][ T8415] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 334.346115][ T8415] R13: 00007fbf7e5e6038 R14: 00007fbf7e5e5fa0 R15: 00007fff4d946168 [ 334.354622][ T8415] [ 336.780075][ T8442] device sit0 left promiscuous mode [ 336.862994][ T8442] device sit0 entered promiscuous mode [ 337.898812][ T8471] syz.4.2717[8471] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 337.898886][ T8471] syz.4.2717[8471] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 338.037649][ T8471] device pim6reg1 entered promiscuous mode [ 341.131969][ T8554] device sit0 left promiscuous mode [ 341.193530][ T8558] device sit0 left promiscuous mode [ 341.241984][ T8554] device sit0 entered promiscuous mode [ 341.700601][ T28] audit: type=1400 audit(1761675964.140:145): avc: denied { create } for pid=8572 comm="syz.0.2751" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_fib_lookup_socket permissive=1 [ 341.974239][ T8558] device sit0 entered promiscuous mode [ 342.349086][ T8583] FAULT_INJECTION: forcing a failure. [ 342.349086][ T8583] name failslab, interval 1, probability 0, space 0, times 0 [ 342.458151][ T8583] CPU: 1 PID: 8583 Comm: syz.2.2755 Not tainted syzkaller #0 [ 342.465837][ T8583] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 342.475899][ T8583] Call Trace: [ 342.479175][ T8583] [ 342.482107][ T8583] __dump_stack+0x21/0x24 [ 342.486439][ T8583] dump_stack_lvl+0xee/0x150 [ 342.491339][ T8583] ? __cfi_dump_stack_lvl+0x8/0x8 [ 342.496651][ T8583] dump_stack+0x15/0x24 [ 342.500916][ T8583] should_fail_ex+0x3d4/0x520 [ 342.505778][ T8583] __should_failslab+0xac/0xf0 [ 342.510741][ T8583] ? kvmalloc_node+0x294/0x480 [ 342.515668][ T8583] should_failslab+0x9/0x20 [ 342.520325][ T8583] __kmem_cache_alloc_node+0x3d/0x2c0 [ 342.525882][ T8583] ? kasan_save_alloc_info+0x25/0x30 [ 342.531706][ T8583] ? kvmalloc_node+0x294/0x480 [ 342.536819][ T8583] __kmalloc_node+0xa1/0x1e0 [ 342.541594][ T8583] kvmalloc_node+0x294/0x480 [ 342.546195][ T8583] ? __cfi_kvmalloc_node+0x10/0x10 [ 342.551638][ T8583] ? __kasan_record_aux_stack+0x90/0xc0 [ 342.557313][ T8583] ? alloc_fdtable+0xcd/0x2e0 [ 342.562098][ T8583] ? kmalloc_trace+0x40/0xb0 [ 342.566879][ T8583] alloc_fdtable+0x17b/0x2e0 [ 342.571715][ T8583] dup_fd+0x661/0x880 [ 342.575976][ T8583] ? __mutex_init+0xcd/0x1a0 [ 342.580923][ T8583] copy_files+0x76/0xe0 [ 342.585136][ T8583] copy_process+0x11ff/0x3480 [ 342.590129][ T8583] ? idle_dummy+0x10/0x10 [ 342.594646][ T8583] kernel_clone+0x23a/0x810 [ 342.599396][ T8583] ? __cfi_kernel_clone+0x10/0x10 [ 342.605261][ T8583] ? __kasan_check_write+0x14/0x20 [ 342.610730][ T8583] ? mutex_unlock+0x89/0x220 [ 342.615751][ T8583] __x64_sys_clone+0x168/0x1b0 [ 342.621467][ T8583] ? __cfi___x64_sys_clone+0x10/0x10 [ 342.627831][ T8583] ? fpregs_assert_state_consistent+0xb1/0xe0 [ 342.634726][ T8583] x64_sys_call+0x990/0x9a0 [ 342.639679][ T8583] do_syscall_64+0x4c/0xa0 [ 342.644859][ T8583] ? clear_bhb_loop+0x30/0x80 [ 342.649900][ T8583] ? clear_bhb_loop+0x30/0x80 [ 342.655025][ T8583] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 342.660993][ T8583] RIP: 0033:0x7f5676f8efc9 [ 342.665927][ T8583] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 342.686155][ T8583] RSP: 002b:00007f5677ee6fe8 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 342.694971][ T8583] RAX: ffffffffffffffda RBX: 00007f56771e5fa0 RCX: 00007f5676f8efc9 [ 342.703368][ T8583] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00000000638c1000 [ 342.711498][ T8583] RBP: 00007f5677ee7090 R08: 0000000000000000 R09: 0000000000000000 [ 342.719810][ T8583] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000002 [ 342.727859][ T8583] R13: 00007f56771e6038 R14: 00007f56771e5fa0 R15: 00007ffe1faf5668 [ 342.736190][ T8583] [ 342.989123][ T8611] device sit0 left promiscuous mode [ 343.060220][ T8611] device sit0 entered promiscuous mode [ 343.928202][ T8624] device sit0 left promiscuous mode [ 343.944930][ T8625] device sit0 entered promiscuous mode [ 344.514469][ T8638] FAULT_INJECTION: forcing a failure. [ 344.514469][ T8638] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 344.645506][ T8638] CPU: 1 PID: 8638 Comm: syz.4.2773 Not tainted syzkaller #0 [ 344.653265][ T8638] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 344.663703][ T8638] Call Trace: [ 344.666987][ T8638] [ 344.670129][ T8638] __dump_stack+0x21/0x24 [ 344.674550][ T8638] dump_stack_lvl+0xee/0x150 [ 344.679310][ T8638] ? __cfi_dump_stack_lvl+0x8/0x8 [ 344.684484][ T8638] ? _parse_integer+0x2a/0x40 [ 344.689349][ T8638] dump_stack+0x15/0x24 [ 344.693683][ T8638] should_fail_ex+0x3d4/0x520 [ 344.698545][ T8638] should_fail+0xb/0x10 [ 344.702831][ T8638] should_fail_usercopy+0x1a/0x20 [ 344.707969][ T8638] _copy_from_user+0x1e/0xc0 [ 344.712767][ T8638] ___sys_sendmsg+0x155/0x290 [ 344.717446][ T8638] ? __sys_sendmsg+0x270/0x270 [ 344.722385][ T8638] ? __kasan_check_write+0x14/0x20 [ 344.727691][ T8638] ? _raw_spin_lock_irqsave+0xb0/0x110 [ 344.733422][ T8638] ? _raw_spin_unlock_irqrestore+0x5a/0x80 [ 344.739436][ T8638] ? __fdget+0x19c/0x220 [ 344.743703][ T8638] __x64_sys_sendmsg+0x1f0/0x2c0 [ 344.748919][ T8638] ? __cfi___x64_sys_sendmsg+0x10/0x10 [ 344.754573][ T8638] ? __bpf_trace_sys_enter+0x62/0x70 [ 344.760382][ T8638] ? trace_sys_enter+0x3d/0x50 [ 344.765330][ T8638] x64_sys_call+0x171/0x9a0 [ 344.769841][ T8638] do_syscall_64+0x4c/0xa0 [ 344.774523][ T8638] ? clear_bhb_loop+0x30/0x80 [ 344.779204][ T8638] ? clear_bhb_loop+0x30/0x80 [ 344.784132][ T8638] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 344.790297][ T8638] RIP: 0033:0x7fbf7e38efc9 [ 344.795271][ T8638] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 344.816026][ T8638] RSP: 002b:00007fbf7f1dd038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 344.824874][ T8638] RAX: ffffffffffffffda RBX: 00007fbf7e5e5fa0 RCX: 00007fbf7e38efc9 [ 344.833643][ T8638] RDX: 0000000000000000 RSI: 0000200000000980 RDI: 0000000000000004 [ 344.842467][ T8638] RBP: 00007fbf7f1dd090 R08: 0000000000000000 R09: 0000000000000000 [ 344.850684][ T8638] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 344.859085][ T8638] R13: 00007fbf7e5e6038 R14: 00007fbf7e5e5fa0 R15: 00007fff4d946168 [ 344.867133][ T8638] [ 345.617232][ T8666] device sit0 left promiscuous mode [ 345.670988][ T8671] device sit0 entered promiscuous mode [ 346.826623][ T8698] device pim6reg1 entered promiscuous mode [ 348.183713][ T8738] device sit0 entered promiscuous mode [ 352.382337][ T8843] FAULT_INJECTION: forcing a failure. [ 352.382337][ T8843] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 352.509202][ T8843] CPU: 1 PID: 8843 Comm: syz.4.2837 Not tainted syzkaller #0 [ 352.517049][ T8843] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 352.527377][ T8843] Call Trace: [ 352.530943][ T8843] [ 352.534061][ T8843] __dump_stack+0x21/0x24 [ 352.538790][ T8843] dump_stack_lvl+0xee/0x150 [ 352.543754][ T8843] ? __cfi_dump_stack_lvl+0x8/0x8 [ 352.549063][ T8843] ? migrate_enable+0x19c/0x280 [ 352.554103][ T8843] dump_stack+0x15/0x24 [ 352.558271][ T8843] should_fail_ex+0x3d4/0x520 [ 352.563047][ T8843] should_fail+0xb/0x10 [ 352.567228][ T8843] should_fail_usercopy+0x1a/0x20 [ 352.572448][ T8843] _copy_from_user+0x1e/0xc0 [ 352.577250][ T8843] generic_map_update_batch+0x458/0x780 [ 352.582995][ T8843] ? __cfi_generic_map_update_batch+0x10/0x10 [ 352.589180][ T8843] ? __fdget+0x19c/0x220 [ 352.593606][ T8843] ? __cfi_generic_map_update_batch+0x10/0x10 [ 352.600905][ T8843] bpf_map_do_batch+0x48c/0x620 [ 352.605864][ T8843] __sys_bpf+0x624/0x780 [ 352.610518][ T8843] ? bpf_link_show_fdinfo+0x320/0x320 [ 352.616262][ T8843] ? __cfi_ksys_write+0x10/0x10 [ 352.621405][ T8843] ? debug_smp_processor_id+0x17/0x20 [ 352.627396][ T8843] __x64_sys_bpf+0x7c/0x90 [ 352.632943][ T8843] x64_sys_call+0x488/0x9a0 [ 352.638106][ T8843] do_syscall_64+0x4c/0xa0 [ 352.642809][ T8843] ? clear_bhb_loop+0x30/0x80 [ 352.648891][ T8843] ? clear_bhb_loop+0x30/0x80 [ 352.654731][ T8843] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 352.660826][ T8843] RIP: 0033:0x7fbf7e38efc9 [ 352.665431][ T8843] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 352.685742][ T8843] RSP: 002b:00007fbf7f1bc038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 352.694168][ T8843] RAX: ffffffffffffffda RBX: 00007fbf7e5e6090 RCX: 00007fbf7e38efc9 [ 352.702152][ T8843] RDX: 0000000000000038 RSI: 0000200000000200 RDI: 000000000000001a [ 352.710758][ T8843] RBP: 00007fbf7f1bc090 R08: 0000000000000000 R09: 0000000000000000 [ 352.719350][ T8843] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 352.727667][ T8843] R13: 00007fbf7e5e6128 R14: 00007fbf7e5e6090 R15: 00007fff4d946168 [ 352.736334][ T8843] [ 356.531177][ T8924] device veth0_vlan left promiscuous mode [ 356.610171][ T8924] device veth0_vlan entered promiscuous mode [ 356.844898][ T200] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 356.856689][ T200] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 356.875796][ T200] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 357.596029][ T200] device veth0 left promiscuous mode [ 357.601617][ T200] bridge0: port 3(veth0) entered disabled state [ 357.608972][ T200] device bridge_slave_1 left promiscuous mode [ 357.616059][ T200] bridge0: port 2(bridge_slave_1) entered disabled state [ 357.623693][ T200] device bridge_slave_0 left promiscuous mode [ 357.630656][ T200] bridge0: port 1(bridge_slave_0) entered disabled state [ 357.638665][ T200] device veth1_macvtap left promiscuous mode [ 358.517067][ T200] device veth0 left promiscuous mode [ 358.522525][ T200] bridge0: port 3(veth0) entered disabled state [ 358.529505][ T200] device bridge_slave_1 left promiscuous mode [ 358.535856][ T200] bridge0: port 2(bridge_slave_1) entered disabled state [ 358.543308][ T200] device bridge_slave_0 left promiscuous mode [ 358.549772][ T200] bridge0: port 1(bridge_slave_0) entered disabled state [ 358.558564][ T200] device veth0_vlan left promiscuous mode [ 358.564819][ T200] device veth1_macvtap left promiscuous mode [ 358.571204][ T200] device veth0_vlan left promiscuous mode [ 358.577593][ T200] device veth1_macvtap left promiscuous mode