last executing test programs: 4.985911726s ago: executing program 2 (id=2556): bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}}, 0x0, 0xfeffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x13, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000f00000018010000646c6c2500000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000000085000000"], 0x0, 0x1, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000340)=0xffffffffffffffff, 0x4) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000001b80)=ANY=[@ANYBLOB="0600000004000000080000000a"], 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000000980)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000b2e900007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b70400000000000085000000c3"], 0x0, 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback=0x22, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) sendmsg$tipc(r0, &(0x7f0000000240)={0x0, 0xfffffff5, &(0x7f0000000200)=[{&(0x7f0000000140)="a2", 0xfffffdef}], 0x1}, 0x0) 4.6905155s ago: executing program 1 (id=2559): perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x9, 0x0, 0x0, 0x1, 0x0, 0x0, 0x20882, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, @perf_bp={0x0, 0x8}, 0x0, 0xc8, 0x1, 0x4, 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe}, 0x0, 0x4, 0xffffffffffffffff, 0x0) socketpair(0x11, 0x2, 0x869, 0x0) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) recvmsg(r0, &(0x7f0000000500)={&(0x7f0000000040)=@hci, 0x80, &(0x7f0000000100)=[{&(0x7f0000000400)=""/248, 0x200105d0}], 0x1}, 0x1f00) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0f000000040000000800000008"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x15, 0xc, &(0x7f0000000440)=@framed={{0x18, 0x0, 0x0, 0x0, 0x1000}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x8}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x40, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @sk_reuseport=0x28, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x8000}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000800)={0x4, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={r2, 0x2000000, 0xe, 0x0, &(0x7f0000000200)="63eced8e46dc3f0adf33c9f7b986", 0x0, 0x7ffd, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) bpf$MAP_CREATE(0x300000000000000, &(0x7f00000006c0)=ANY=[@ANYBLOB="1800000004000000410000000000000001000000ba31bb41404b32101131b9d451e1095de16fac7124f648b1d4b06a15e2a5a3a620a9bf", @ANYRES32=0x1, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32], 0x48) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x50) bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="1600000000000004000000ff0000000000000000", @ANYRES32=0x1, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/27], 0x48) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f0000000300)='sched_switch\x00'}, 0x10) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000000001811", @ANYRES32], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f00000004c0)={0xffffffffffffffff, &(0x7f0000000340), &(0x7f00000005c0)=""/155}, 0x20) ioctl$SIOCSIFHWADDR(r3, 0x8914, &(0x7f0000000000)={'veth0_vlan\x00', @remote}) perf_event_open(&(0x7f0000000500)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000, 0x0, @perf_bp={0x0, 0x91b1400079c52c93}, 0x105c34, 0x8000, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r4, 0x8914, &(0x7f0000000000)={'veth0_vlan\x00', @random="0106002010ff"}) 4.131993195s ago: executing program 0 (id=2560): perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x9, 0x0, 0x0, 0x1, 0x0, 0x0, 0x20882, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, @perf_bp={0x0, 0x8}, 0x0, 0xc8, 0x1, 0x4, 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe}, 0x0, 0x4, 0xffffffffffffffff, 0x0) socketpair(0x11, 0x2, 0x869, 0x0) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) recvmsg(r0, &(0x7f0000000500)={&(0x7f0000000040)=@hci, 0x80, &(0x7f0000000100)=[{&(0x7f0000000400)=""/248, 0x200105d0}], 0x1}, 0x1f00) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0f000000040000000800000008"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x15, 0xc, &(0x7f0000000440)=@framed={{0x18, 0x0, 0x0, 0x0, 0x1000}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x8}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x40, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @sk_reuseport=0x28, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x8000}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000800)={0x4, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={r2, 0x2000000, 0xe, 0x0, &(0x7f0000000200)="63eced8e46dc3f0adf33c9f7b986", 0x0, 0x7ffd, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) bpf$MAP_CREATE(0x300000000000000, &(0x7f00000006c0)=ANY=[@ANYBLOB="1800000004000000410000000000000001000000ba31bb41404b32101131b9d451e1095de16fac7124f648b1d4b06a15e2a5a3a620a9bf", @ANYRES32=0x1, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32], 0x48) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x50) bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="1600000000000004000000ff0000000000000000", @ANYRES32=0x1, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/27], 0x48) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f0000000300)='sched_switch\x00'}, 0x10) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000000001811", @ANYRES32], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f00000004c0)={0xffffffffffffffff, &(0x7f0000000340), &(0x7f00000005c0)=""/155}, 0x20) ioctl$SIOCSIFHWADDR(r3, 0x8914, &(0x7f0000000000)={'veth0_vlan\x00', @remote}) perf_event_open(&(0x7f0000000500)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000, 0x0, @perf_bp={0x0, 0x91b1400079c52c93}, 0x105c34, 0x8000, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r4, 0x8914, &(0x7f0000000000)={'veth0_vlan\x00', @random="0106002010ff"}) 4.131641125s ago: executing program 3 (id=2561): bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}}, 0x0, 0xfeffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x13, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000f00000018010000646c6c2500000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb70200"], 0x0, 0x1, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000340)=0xffffffffffffffff, 0x4) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000001b80)=ANY=[@ANYBLOB="0600000004000000080000000a"], 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000000980)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000b2e900007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b70400000000000085000000c3"], 0x0, 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback=0x22, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) sendmsg$tipc(r0, &(0x7f0000000240)={0x0, 0xfffffff5, &(0x7f0000000200)=[{&(0x7f0000000140)="a2", 0xfffffdef}], 0x1}, 0x0) 4.104684228s ago: executing program 2 (id=2562): bpf$MAP_CREATE(0x0, &(0x7f0000000380)=ANY=[], 0x48) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xb, 0x4, &(0x7f0000000740)=ANY=[@ANYBLOB="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"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @fallback=0x32, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x4000000}, 0x8}, 0x94) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0xf, 0x4, 0x4, 0x12}, 0x48) bpf$BPF_PROG_DETACH(0x8, 0x0, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000000c0)={{r2}, 0x0, 0x0}, 0x20) recvmsg$unix(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001780)=""/4071, 0xfe7}], 0x1}, 0x40020000) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) close(0x3) sendmsg$inet(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f0000001740)=[{&(0x7f0000000280)='>', 0xfffe}], 0x1}, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000440)=@base={0x7, 0x4, 0x18, 0xa042, 0x0, 0xffffffffffffffff, 0x401}, 0x50) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xfffffffffffffffc}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000f40)={r3, 0x0, 0x0}, 0x20) 3.967083188s ago: executing program 2 (id=2563): socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x89f1, &(0x7f0000000080)) 3.820162711s ago: executing program 2 (id=2565): openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000001c0)={0xa, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="1800e000000000000000000000000000000080"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0xf}, 0x90) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000040)) r1 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) write$cgroup_pid(r2, &(0x7f0000000980), 0x20000992) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000600)=ANY=[@ANYBLOB="9feb0100180000000000000024000000240000000a000000080000000200000fffffff0a0e0000000000000003000000070000000300000007ffffff00000000000000002e"], &(0x7f0000000040)=""/249, 0x46, 0xf9, 0x6}, 0x28) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x11, 0x5, &(0x7f0000000dc0)=ANY=[@ANYRES16], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0xffffffffffffffc2}, 0x94) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000480)={@fallback=r1, 0x10, 0x1, 0x6, &(0x7f00000002c0)=[0x0], 0x1, 0x0, &(0x7f00000003c0)=[0x0, 0x0, 0x0, 0x0], &(0x7f0000000400)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000440)=[0x0, 0x0, 0x0]}, 0x40) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000e40)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x50) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000340)=ANY=[@ANYBLOB="1800000020000001000000000000000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b7080000010000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000820000009500000000000000"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2d, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000300)='fib_table_lookup\x00', r6}, 0x18) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8914, &(0x7f0000000040)={'sit0\x00', @dev={'\xaa\xaa\xaa\xaa\xaa', 0x3b}}) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r7, 0x8914, &(0x7f0000000040)={'sit0\x00', @random="4f33e363a4b1"}) openat$cgroup(r4, &(0x7f00000009c0)='syz1\x00', 0x200002, 0x0) bpf$MAP_LOOKUP_BATCH(0x18, &(0x7f00000006c0)={&(0x7f0000000780)="7568e520dfd9b62b1e8977b454b60204454c443783727788acf69afc1a97ddd6bdea265390bc0a59e20f708624e8926e954dcc0a8da6bd041660bead0902d5452b2e777da2bd493ade553c56844fad58a9ba6084eb00b2da79c53e4f019533c41af835f995804173b54cb3cb8d58743dd8ce7ec01ccdd1a763c5e9d400ea8819cd63b2fc1b3d069a3a92650ae6b740908517c74ca90c02ae2786433bf14753887ba7fca9c7cce8f3a4c753dcc96fff122e569cf31002c58e63173cb8c6357a571f804b2dccc11119d4bf158127191e2f50", &(0x7f00000004c0)=""/145, &(0x7f0000000680)="d7ff2fcb7072c4af8e01d84545e98824b7f2e5348c7d8671d53f379dbfa04d68bcef1b375075bbc731afceec", &(0x7f0000000880)="6cb8b19ec7575c282b827315d7fb57fc9876dcd9cf439184799380246c4ff02f9e3d9fe4484b6f4120eac47e1373e16099259ee50409059f2c2a4fdd7f5a37c5abbf1dd3bc857f3b7e8cfbae7c10bab12bc205974cd4c6cade60fff73e2066a637b74220eb94c203c45bcf3c96dd81c74d780afb75009e7576a5dfd5e534420de962592f9c41f61b8c62d2d301f3bc8dbe8620f946bf78f0d321a584eda5d5060ef84710a19f55f4d5b9dbb2ec2167107348cbeb2501b87dadaa56efff79b71f26a0a7eb865b37134930db5e694d5f1438ba77f69f7ae97b77a445faa20356c548a5ae8ab03bbc0ba2", 0xba6, 0xffffffffffffffff, 0x4}, 0x38) r8 = bpf$PROG_LOAD(0x5, &(0x7f0000001000)={0x11, 0xd, &(0x7f00000002c0)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000003000000650000000800000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000140)='kmem_cache_free\x00', r8}, 0x10) socketpair(0xa, 0x1, 0x0, &(0x7f0000000040)={0x0, 0x0}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00', r3}, 0x10) openat$tun(0xffffffffffffff9c, 0x0, 0x101040, 0x0) 3.801759532s ago: executing program 1 (id=2566): r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="1801000000000000000000004b84ffec850000006d000000850000002a00000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000400)='tlb_flush\x00', r0}, 0x10) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="170000000000000004000000ff"], 0x48) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="170000000000000004000000ff"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000058"], 0x0}, 0x90) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000140)='sched_switch\x00', r3}, 0x10) r4 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000740)=ANY=[@ANYBLOB="0300000004000000040000000a"], 0x48) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x3, 0x8, &(0x7f00000004c0)=ANY=[@ANYBLOB="1809000000000000000000000001000018120000", @ANYRES32=r4, @ANYBLOB="0000000000000000b703000000000000850000000c000000b70000000000000095"], &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sched_cls, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000005c0)={{r4}, &(0x7f0000000540), &(0x7f0000000580)=r5}, 0x20) bpf$MAP_DELETE_ELEM(0x3, &(0x7f00000007c0)={r4, &(0x7f0000000780)}, 0x20) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x3, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008001500b7040000000000008500000058"], 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) perf_event_open$cgroup(&(0x7f0000000180)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x8}, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 3.757915146s ago: executing program 1 (id=2567): bpf$PROG_LOAD(0x5, &(0x7f0000000600)={0x0, 0x10, &(0x7f0000000580)=ANY=[@ANYBLOB="18050000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32, @ANYBLOB="0000000000000000b704000008000000850000007800000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000e80)={0x11, 0x10, &(0x7f0000000580)=ANY=[], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x11, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000380)={r0, 0x0, 0x5b, 0xb1, &(0x7f0000000000)="d010fe11f44f289426b93a7be3199ddd3c93027283226af80c05025f270656507a55f73804ebaca80524aadd594468364c38e51ec546d855a09dd97cb0d5b6621d66f5e77279d00e85f7c5047bbc9806bcccae65eb99d5ca21a43f", &(0x7f00000000c0)=""/177, 0xff, 0x0, 0x2b, 0xe6, &(0x7f0000000200)="5863aa0590cd68fcfd1f96c4b17e79100714b1cf52ced43e38df91fda6a43439a50766e7e8728166197937", &(0x7f0000000280)="1764829f3e7081ac950f6ba06d63bed231fb685b56b34063cb36d335dfea6bfec8c9c70c41bc02faa71480b9d9a8e890167c7b6c8f397a20551605fccb5eedbba393891a3d67cb9c83914e8d735f750052bfafc47464812205232dccdbe41fdafc600727b6e827b6c77154808d44be5f8b679c144ea2e83750a1291f5a00a3a2f4ee160762ce8dc1c67b9cc49b4453f071d640e47ad30ce363310245e7a9a97182f52bb2e11b50611732e459a15b02002750c554875fb42985af2dd10e47216fe7ff84b083103e9237001d62f6a58de9d7bd67ced0770a13a11b277cc6c0de1f9711a67d09ac", 0x1}, 0x50) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r0}, 0x18) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000020000008500000082"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000140)='sched_switch\x00', r2}, 0x10) perf_event_open(0x0, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000080)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000000000), 0x0}, 0x20) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) r4 = bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={0xffffffffffffffff, 0x18000000000002a0, 0x0, 0x0, &(0x7f0000000100), 0x0, 0x2b, 0x60000000, 0x0, 0x0, &(0x7f0000000000), 0x0}, 0x50) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000180)='sched_switch\x00', r5}, 0x10) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x21, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000280), 0xbe9c06, 0x0) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x6, 0x13, 0x0, &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @xdp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000240)={r6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYBLOB='1-2:', @ANYRESOCT], 0x31) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000b00)={0x11, 0x21, &(0x7f0000000740)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0xb}, {{0x18, 0x1, 0x1, 0x0, r4}}, {}, [@alu={0x4, 0x0, 0xb, 0x7, 0x4, 0xffffffffffffffc0, 0x8}, @ringbuf_query={{0x18, 0x1, 0x1, 0x0, r3}}, @map_val={0x18, 0x4, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x9d}, @ldst={0x0, 0x2, 0x3, 0x0, 0x8, 0xffffffffffffffdb}, @jmp={0x5, 0x1, 0x4, 0x0, 0x1, 0xfffffffffffffffc, 0xfffffffffffffffc}, @tail_call={{0x18, 0x2, 0x1, 0x0, r1}}, @map_idx_val={0x18, 0x1, 0x6, 0x0, 0x1}, @btf_id={0x18, 0x4, 0x3, 0x0, 0x5}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000500)='GPL\x00', 0x100, 0xb7, &(0x7f0000000880)=""/183, 0x40f00, 0xc, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000a40)={0x5, 0x6, 0x3, 0x8}, 0x10, 0x0, 0x0, 0x2, &(0x7f0000000a80)=[r4, r1], &(0x7f0000000ac0)=[{0x4, 0x3, 0x8, 0x8}, {0x5, 0x5, 0x7, 0x5}]}, 0x94) syz_clone(0xc0000000, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x6, 0x0, 0x800, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 3.281873964s ago: executing program 3 (id=2568): bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f00000002c0)={&(0x7f0000000000), 0xffffffffffffffff, 0x0, 0x0, 0x8}, 0x38) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0}, 0x94) socketpair(0x1, 0x1, 0x0, 0x0) socketpair(0x1, 0x1, 0x1, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg(r0, &(0x7f0000000500)={&(0x7f0000000180)=@sco={0x1f, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x11}}, 0x80, &(0x7f00000004c0)=[{&(0x7f0000000300)="df5efb4a32e825ac342cb6ffe6894651b7ba6f676050cdebd415ef47c3ca02f5dde2e6a50e9ec82fee2c042bce202182ac59d15bfb19c9727cdecaa0c9099b8ccc4c203f93f494578e85386a24856f1baa3bb555136b1c391a64e3721345b4c99bfef1dba29aa1684ddc0f629dfb", 0x6e}, {&(0x7f0000000380)="08fbdc6c235528445943cc9f0e64ceae8eec4c9d0f972bafe44d8279be70142d14c23b7529373578847b00ab74a8bf630887e491606fad79f1b54536c0d8fbfb67b3983446bd8fc64e5b324e5ff29060249ebdf369016cea44c977662502ddb0d78873c9046956714f6a57b76aa2525af881181a7c46e86fac460222712dba28882081c53bf70d6413fe01aea7699f033a82383c46e2ff5e9eb6bd03d9dbe5e984302f228c097915857bd740d3e185b8e1d7d19e44df232941", 0xb9}, {&(0x7f0000000440)="88a89c795fb6e5df5387aa6a33462325eb3ae97d6d3d59e6358afc5167dfb562b39ced4575c1455a51fe8621208c43", 0x2f}, {&(0x7f0000000200)="d59ef453d74ee708ac2dc5029627c323e2e255d969cbd5d191165b16b5f69fcf3eed82df05a3", 0x26}], 0x4, &(0x7f00000009c0)=[{0xc0, 0x111, 0x1077, "9b22b01b70a5c5b965f45d84aef7843db28a322eb30ff5de69f46e9274dc4fe5dee5ef08e0a316ed17e5634815f25d8decd46bb48cfc50a3226788de2196bb1df0ad3a671662675be5a67012a49cb550e26948e85be13d4abf7ce27045e2a7ff5b9b070d5a3bcf32194253894e2833e4428440b23afe38cb22a171ad8e5a364497489acbf2e125666fb53bb7c8dc69888bce5b37307e1ddf9cebf9eea5ffe428a5aa1fea5a370fd406"}, {0xc0, 0x1, 0xdf780000, "50b49f87785d7a56ffd4e81d2950f62acd20edb264ef76d2c653baab5bab44b99f8e8da4fa73c866e0667999d66896acf0d85ba6776c337ea9f2c4583ccbfdc324b9459f54fc8fc82ce8e4e60dbb745544dd8654cdf14bf474b37164c7c9c30b139b44214c49b6e21200916e9dda099ca73618c50e151a688d5ba4c162bfa5c7509dd6eeee5b81e4a542428764fb638445d42eef63ad3d01b57294b6bbd837d1364359a8b9e3d5332c2458"}, {0xd8, 0x88, 0x6, "f1785dc493869dbb95ad82d0414e61886caf5f81015b3d505c9935afdcfc7f8f56fedff0e2d40ed9543ff24b14a6cf6eceb9d6e63b21b977d1e372d52e07b5af243570d60e50a7e8f47f4d08bba314633eb04a2b8bb5b85850740b069a7edb0008e48946f70d08633a74980b79d4e8efebc739a5091d5ef8988a2f60d3e7f5f9faea876ca91e5e4dbb9dcb1b4dd765511812d1add45733666e589151378a4f388085e6a8472c41abbc4721b8ae813648291976b5eb973a65be16e362834ccd7a0fb8783ac3"}], 0x258}, 0x41811) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f3, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='cpuset.memory_pressure\x00', 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.current\x00', 0x275a, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x9, 0x7, 0x8000, 0x1}, 0x48) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r2, 0x8927, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000001c0)={{r1, 0xffffffffffffffff}, &(0x7f00000002c0), 0x0}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000d00390000", @ANYRES32=r3], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xe}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000600)={{}, &(0x7f0000000580)=0x2, 0x0}, 0x20) r4 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240)={0x2, 0x4, 0x8, 0x1, 0x80, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000840)={0x16, 0x1c, &(0x7f0000000d80)=@ringbuf={{0x18, 0x8}, {{0x18, 0x1, 0x1, 0x0, r4}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x1ab92b}, {0x85, 0x0, 0x0, 0x8}, {0x4}}, {{0x5, 0x0, 0x4, 0x9, 0x0, 0x1, 0x2000}}, [@snprintf={{0x7, 0x0, 0xb, 0x2}, {0x3, 0x3, 0x3, 0xa, 0x9}, {0x5, 0x0, 0xb, 0x9, 0x0, 0x0, 0x40000000}, {0x3, 0x3, 0x3, 0xa, 0xa}, {0x7, 0x1, 0xb, 0x7, 0x2}, {0x7, 0x0, 0x0, 0x8, 0x0, 0x0, 0xfffffdff}, {}, {}, {0x4, 0x0, 0xc}, {0x18, 0x2, 0x2, 0x0, r4}, {}, {0x46, 0x8, 0xffef, 0x76}}], {{0x7, 0x1, 0xb, 0x8}, {0x6, 0x0, 0x5, 0x9}, {}, {0x7, 0x0, 0xb, 0x0, 0x0, 0xfe}}}, &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @flow_dissector, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) 3.271162225s ago: executing program 0 (id=2569): bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f00000002c0)={&(0x7f0000000000), 0xffffffffffffffff, 0x0, 0x0, 0x8}, 0x38) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0}, 0x94) socketpair(0x1, 0x1, 0x0, 0x0) socketpair(0x1, 0x1, 0x1, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg(r0, &(0x7f0000000500)={&(0x7f0000000180)=@sco={0x1f, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x11}}, 0x80, &(0x7f00000004c0)=[{&(0x7f0000000300)="df5efb4a32e825ac342cb6ffe6894651b7ba6f676050cdebd415ef47c3ca02f5dde2e6a50e9ec82fee2c042bce202182ac59d15bfb19c9727cdecaa0c9099b8ccc4c203f93f494578e85386a24856f1baa3bb555136b1c391a64e3721345b4c99bfef1dba29aa1684ddc0f629dfb", 0x6e}, {&(0x7f0000000380)="08fbdc6c235528445943cc9f0e64ceae8eec4c9d0f972bafe44d8279be70142d14c23b7529373578847b00ab74a8bf630887e491606fad79f1b54536c0d8fbfb67b3983446bd8fc64e5b324e5ff29060249ebdf369016cea44c977662502ddb0d78873c9046956714f6a57b76aa2525af881181a7c46e86fac460222712dba28882081c53bf70d6413fe01aea7699f033a82383c46e2ff5e9eb6bd03d9dbe5e984302f228c097915857bd740d3e185b8e1d7d19e44df232941", 0xb9}, {&(0x7f0000000440)="88a89c795fb6e5df5387aa6a33462325eb3ae97d6d3d59e6358afc5167dfb562b39ced4575c1455a51fe8621208c43", 0x2f}, {&(0x7f0000000200)="d59ef453d74ee708ac2dc5029627c323e2e255d969cbd5d191165b16b5f69fcf3eed82df05a3", 0x26}], 0x4, &(0x7f00000009c0)=[{0xc0, 0x111, 0x1077, "9b22b01b70a5c5b965f45d84aef7843db28a322eb30ff5de69f46e9274dc4fe5dee5ef08e0a316ed17e5634815f25d8decd46bb48cfc50a3226788de2196bb1df0ad3a671662675be5a67012a49cb550e26948e85be13d4abf7ce27045e2a7ff5b9b070d5a3bcf32194253894e2833e4428440b23afe38cb22a171ad8e5a364497489acbf2e125666fb53bb7c8dc69888bce5b37307e1ddf9cebf9eea5ffe428a5aa1fea5a370fd406"}, {0xc0, 0x1, 0xdf780000, "50b49f87785d7a56ffd4e81d2950f62acd20edb264ef76d2c653baab5bab44b99f8e8da4fa73c866e0667999d66896acf0d85ba6776c337ea9f2c4583ccbfdc324b9459f54fc8fc82ce8e4e60dbb745544dd8654cdf14bf474b37164c7c9c30b139b44214c49b6e21200916e9dda099ca73618c50e151a688d5ba4c162bfa5c7509dd6eeee5b81e4a542428764fb638445d42eef63ad3d01b57294b6bbd837d1364359a8b9e3d5332c2458"}, {0xd8, 0x88, 0x6, "f1785dc493869dbb95ad82d0414e61886caf5f81015b3d505c9935afdcfc7f8f56fedff0e2d40ed9543ff24b14a6cf6eceb9d6e63b21b977d1e372d52e07b5af243570d60e50a7e8f47f4d08bba314633eb04a2b8bb5b85850740b069a7edb0008e48946f70d08633a74980b79d4e8efebc739a5091d5ef8988a2f60d3e7f5f9faea876ca91e5e4dbb9dcb1b4dd765511812d1add45733666e589151378a4f388085e6a8472c41abbc4721b8ae813648291976b5eb973a65be16e362834ccd7a0fb8783ac3"}], 0x258}, 0x41811) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f3, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='cpuset.memory_pressure\x00', 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.current\x00', 0x275a, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800"/13, @ANYRES32], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x9, 0x7, 0x8000, 0x1}, 0x48) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r2, 0x8927, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000001c0)={{r1, 0xffffffffffffffff}, &(0x7f00000002c0), 0x0}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000d00390000", @ANYRES32=r3], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xe}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000600)={{}, &(0x7f0000000580)=0x2, 0x0}, 0x20) r4 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240)={0x2, 0x4, 0x8, 0x1, 0x80, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000840)={0x16, 0x1c, &(0x7f0000000d80)=@ringbuf={{0x18, 0x8}, {{0x18, 0x1, 0x1, 0x0, r4}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x1ab92b}, {0x85, 0x0, 0x0, 0x8}, {0x4}}, {{0x5, 0x0, 0x4, 0x9, 0x0, 0x1, 0x2000}}, [@snprintf={{0x7, 0x0, 0xb, 0x2}, {0x3, 0x3, 0x3, 0xa, 0x9}, {0x5, 0x0, 0xb, 0x9, 0x0, 0x0, 0x40000000}, {0x3, 0x3, 0x3, 0xa, 0xa}, {0x7, 0x1, 0xb, 0x7, 0x2}, {0x7, 0x0, 0x0, 0x8, 0x0, 0x0, 0xfffffdff}, {}, {}, {0x4, 0x0, 0xc}, {0x18, 0x2, 0x2, 0x0, r4}, {}, {0x46, 0x8, 0xffef, 0x76}}], {{0x7, 0x1, 0xb, 0x8}, {0x6, 0x0, 0x5, 0x9}, {}, {0x7, 0x0, 0xb, 0x0, 0x0, 0xfe}}}, &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @flow_dissector, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) 2.999059107s ago: executing program 4 (id=2570): getpid() bpf$MAP_CREATE(0x0, &(0x7f0000000380)=ANY=[], 0x48) r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x10, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4000000000000007910480000000000610400000000000095000000"], &(0x7f0000003ff6)='GPL\x00', 0x2, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @sk_msg}, 0x48) close(r0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r3, 0xffffffffffffffff, 0x26}, 0x10) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000000c0)={{r3}, &(0x7f0000000000), &(0x7f0000000080)=r0}, 0x20) recvmsg$unix(r1, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001780)=""/4071, 0xfe7}], 0x1}, 0x40020000) close(0x3) sendmsg$inet(r2, &(0x7f0000000500)={0x0, 0x0, &(0x7f0000001740)=[{&(0x7f0000000280)='>', 0xfffe}], 0x1}, 0x0) socketpair$nbd(0x1, 0x1, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000440)=@base={0x7, 0x4, 0x18, 0xa042, 0x0, 0xffffffffffffffff, 0x401}, 0x50) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xfffffffffffffffc}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000f40)={r4, 0x0, 0x0}, 0x20) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002ac0)={0x1a, 0x3, &(0x7f0000000180)=ANY=[@ANYBLOB="1800009500000000000000"], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x18, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x2000}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={0x0, r5}, 0x10) bpf$MAP_CREATE(0x0, 0x0, 0x48) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="020000000400001030fe31a9672cde0080000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000002c0)={0x0, 0x0}, 0x28) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000540)=ANY=[@ANYBLOB="0200000004000000080000000100000080000000", @ANYRES32=0x0, @ANYBLOB="0000000000000000000000000000000000000000f12304f76d14957e945fffb0e18b8139071dc456dd312f07db59b6f54c821c18ef1b78d29803c3be5d2528bdd6b4d0c1c1f52af5671da80b25876d153872e426649b5d6bb8372bb1e33f143adf008659c646c05e9e13173e5f9ae92f814dc328d2e79383d40eca820a126a0dc4a54736a1de50066d83769355b4e234826c772b54d34ef30d3f8bad32ad845a6aecf99ed3a6998a0cbe2a3e95a5cc031695c96858da5c1ffbb926844a2011c2", @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) 2.835957841s ago: executing program 2 (id=2571): bpf$PROG_LOAD(0x5, &(0x7f0000000600)={0x0, 0x10, &(0x7f0000000580)=ANY=[@ANYBLOB="18050000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32, @ANYBLOB="0000000000000000b704000008000000850000007800000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000e80)={0x11, 0x10, &(0x7f0000000580)=ANY=[], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x11, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000380)={r0, 0x0, 0x5b, 0xb1, &(0x7f0000000000)="d010fe11f44f289426b93a7be3199ddd3c93027283226af80c05025f270656507a55f73804ebaca80524aadd594468364c38e51ec546d855a09dd97cb0d5b6621d66f5e77279d00e85f7c5047bbc9806bcccae65eb99d5ca21a43f", &(0x7f00000000c0)=""/177, 0xff, 0x0, 0x2b, 0xe6, &(0x7f0000000200)="5863aa0590cd68fcfd1f96c4b17e79100714b1cf52ced43e38df91fda6a43439a50766e7e8728166197937", &(0x7f0000000280)="1764829f3e7081ac950f6ba06d63bed231fb685b56b34063cb36d335dfea6bfec8c9c70c41bc02faa71480b9d9a8e890167c7b6c8f397a20551605fccb5eedbba393891a3d67cb9c83914e8d735f750052bfafc47464812205232dccdbe41fdafc600727b6e827b6c77154808d44be5f8b679c144ea2e83750a1291f5a00a3a2f4ee160762ce8dc1c67b9cc49b4453f071d640e47ad30ce363310245e7a9a97182f52bb2e11b50611732e459a15b02002750c554875fb42985af2dd10e47216fe7ff84b083103e9237001d62f6a58de9d7bd67ced0770a13a11b277cc6c0de1f9711a67d09ac", 0x1}, 0x50) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r0}, 0x18) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000020000008500000082"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000140)='sched_switch\x00', r2}, 0x10) perf_event_open(0x0, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000080)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000000000), 0x0}, 0x20) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) r4 = bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={0xffffffffffffffff, 0x18000000000002a0, 0x0, 0x0, &(0x7f0000000100), 0x0, 0x2b, 0x60000000, 0x0, 0x0, &(0x7f0000000000), 0x0}, 0x50) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000180)='sched_switch\x00', r5}, 0x10) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x21, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000280), 0xbe9c06, 0x0) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x6, 0x13, 0x0, &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @xdp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000240)={r6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYBLOB='1-2:', @ANYRESOCT], 0x31) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000b00)={0x11, 0x21, &(0x7f0000000740)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0xb}, {{0x18, 0x1, 0x1, 0x0, r4}}, {}, [@alu={0x4, 0x0, 0xb, 0x7, 0x4, 0xffffffffffffffc0, 0x8}, @ringbuf_query={{0x18, 0x1, 0x1, 0x0, r3}}, @map_val={0x18, 0x4, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x9d}, @ldst={0x0, 0x2, 0x3, 0x0, 0x8, 0xffffffffffffffdb}, @jmp={0x5, 0x1, 0x4, 0x0, 0x1, 0xfffffffffffffffc, 0xfffffffffffffffc}, @tail_call={{0x18, 0x2, 0x1, 0x0, r1}}, @map_idx_val={0x18, 0x1, 0x6, 0x0, 0x1}, @btf_id={0x18, 0x4, 0x3, 0x0, 0x5}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000500)='GPL\x00', 0x100, 0xb7, &(0x7f0000000880)=""/183, 0x40f00, 0xc, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000a40)={0x5, 0x6, 0x3, 0x8}, 0x10, 0x0, 0x0, 0x2, &(0x7f0000000a80)=[r4, r1], &(0x7f0000000ac0)=[{0x4, 0x3, 0x8, 0x8}, {0x5, 0x5, 0x7, 0x5}]}, 0x94) syz_clone(0xc0000000, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x6, 0x0, 0x800, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 2.537651944s ago: executing program 4 (id=2572): bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}}, 0x0, 0xfeffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x13, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000f00000018010000646c6c2500000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000000085000000"], 0x0, 0x1, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000340)=0xffffffffffffffff, 0x4) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000001b80)=ANY=[@ANYBLOB="0600000004000000080000000a"], 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000000980)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000b2e900007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b70400000000000085000000c3"], 0x0, 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback=0x22, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) sendmsg$tipc(r0, &(0x7f0000000240)={0x0, 0xfffffff5, &(0x7f0000000200)=[{&(0x7f0000000140)="a2", 0xfffffdef}], 0x1}, 0x0) 2.415106024s ago: executing program 0 (id=2573): r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000001c0)={0xa, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="1800e000"/18], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0xf}, 0x94) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000040)) r2 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) write$cgroup_pid(r3, &(0x7f0000000980), 0x20000992) r4 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={0x0, &(0x7f0000000040)=""/249, 0x46, 0xf9, 0x6}, 0x28) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x11, 0x5, &(0x7f0000000dc0)=ANY=[@ANYRES16], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0xffffffffffffffc2}, 0x94) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000480)={@fallback=r2, 0x10, 0x1, 0x6, &(0x7f00000002c0)=[0x0], 0x1, 0x0, 0x0, 0x0, &(0x7f0000000440)=[0x0, 0x0, 0x0]}, 0x40) r8 = bpf$MAP_CREATE(0x0, &(0x7f0000000e40)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x50) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000002100)=@bpf_lsm={0x1d, 0xd, &(0x7f0000000a40)=ANY=[@ANYBLOB="18190000", @ANYRES32=r0, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\b\x00\x00\x00\x00', @ANYRES32, @ANYBLOB="0000000000000000b7080000050000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000200000085000000820000009500000000000000bd734000ffffffff"], &(0x7f0000000ac0)='GPL\x00', 0x3, 0xe4, &(0x7f0000000b00)=""/228, 0x40f00, 0x77, '\x00', 0x0, 0x1b, r4, 0x8, &(0x7f0000000c00)={0x8, 0x5}, 0x8, 0x10, &(0x7f0000000c40)={0x0, 0x8, 0x0, 0xef4f}, 0x10, 0x0, 0x0, 0x1, &(0x7f0000000c80)=[r3], &(0x7f0000000cc0)=[{0x3, 0x5, 0x6, 0x7}], 0x10, 0x800}, 0x94) r9 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000340)=ANY=[@ANYBLOB="1800000020000001000000000000000018110000", @ANYRES32=r8, @ANYBLOB="0000000000000000b7080000010000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000820000009500000000000000"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2d, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000300)='fib_table_lookup\x00', r9}, 0x18) ioctl$SIOCSIFHWADDR(r6, 0x8914, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r10, 0x8914, &(0x7f0000000040)={'sit0\x00', @random="4f33e363a4b1"}) openat$cgroup(r7, &(0x7f00000009c0)='syz1\x00', 0x200002, 0x0) bpf$MAP_LOOKUP_BATCH(0x18, &(0x7f00000006c0)={&(0x7f0000000780)="7568e520dfd9b62b1e8977b454b60204454c443783727788acf69afc1a97ddd6bdea265390bc0a59e20f708624e8926e954dcc0a8da6bd041660bead0902d5452b2e777da2bd493ade553c56844fad58a9ba6084eb00b2da79c53e4f019533c41af835f995804173b54cb3cb8d58743dd8ce7ec01ccdd1a763c5e9d400ea8819cd63b2fc1b3d069a3a92650ae6b740908517c74ca90c02ae2786433bf14753887ba7fca9c7cce8f3a4c753dcc96fff122e569cf31002c58e63173cb8c6357a571f804b2dccc11119d4bf158127191e2f50", &(0x7f00000004c0)=""/145, &(0x7f0000000680)="d7ff2fcb7072c4af8e01d84545e98824b7f2e5348c7d8671d53f379dbfa04d68bcef1b375075bbc731afceec", &(0x7f0000000880)="6cb8b19ec7575c282b827315d7fb57fc9876dcd9cf439184799380246c4ff02f9e3d9fe4484b6f4120eac47e1373e16099259ee50409059f2c2a4fdd7f5a37c5abbf1dd3bc857f3b7e8cfbae7c10bab12bc205974cd4c6cade60fff73e2066a637b74220eb94c203c45bcf3c96dd81c74d780afb75009e7576a5dfd5e534420de962592f9c41f61b8c62d2d301f3bc8dbe8620f946bf78f0d321a584eda5d5060ef84710a19f55f4d5b9dbb2ec2167107348cbeb2501b87dadaa56efff79b71f26a0a7eb865b37134930db5e694d5f1438ba77f69f7ae97b77a445faa20356c548a5ae8ab03bbc0ba2", 0xba6, 0xffffffffffffffff, 0x4}, 0x38) r11 = bpf$PROG_LOAD(0x5, &(0x7f0000001000)={0x11, 0xd, &(0x7f00000002c0)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000003000000650000000800000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000140)='kmem_cache_free\x00', r11}, 0x10) socketpair(0xa, 0x1, 0x0, &(0x7f0000000040)={0x0, 0x0}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00', r5}, 0x10) openat$tun(0xffffffffffffff9c, 0x0, 0x101040, 0x0) 2.329289891s ago: executing program 3 (id=2574): perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x9, 0x0, 0x0, 0x1, 0x0, 0x0, 0x20882, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, @perf_bp={0x0, 0x8}, 0x0, 0xc8, 0x1, 0x4, 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe}, 0x0, 0x4, 0xffffffffffffffff, 0x0) socketpair(0x11, 0x2, 0x869, 0x0) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) recvmsg(r0, &(0x7f0000000500)={&(0x7f0000000040)=@hci, 0x80, &(0x7f0000000100)=[{&(0x7f0000000400)=""/248, 0x200105d0}], 0x1}, 0x1f00) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0f000000040000000800000008"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x15, 0xc, &(0x7f0000000440)=@framed={{0x18, 0x0, 0x0, 0x0, 0x1000}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x8}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x40, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @sk_reuseport=0x28, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x8000}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000800)={0x4, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={r2, 0x2000000, 0xe, 0x0, &(0x7f0000000200)="63eced8e46dc3f0adf33c9f7b986", 0x0, 0x7ffd, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) bpf$MAP_CREATE(0x300000000000000, &(0x7f00000006c0)=ANY=[@ANYBLOB="1800000004000000410000000000000001000000ba31bb41404b32101131b9d451e1095de16fac7124f648b1d4b06a15e2a5a3a620a9bf", @ANYRES32=0x1, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32], 0x48) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x50) bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="1600000000000004000000ff0000000000000000", @ANYRES32=0x1, @ANYBLOB='\x00'/20, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f0000000300)='sched_switch\x00'}, 0x10) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000000001811", @ANYRES32], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f00000004c0)={0xffffffffffffffff, &(0x7f0000000340), &(0x7f00000005c0)=""/155}, 0x20) ioctl$SIOCSIFHWADDR(r3, 0x8914, &(0x7f0000000000)={'veth0_vlan\x00', @remote}) perf_event_open(&(0x7f0000000500)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000, 0x0, @perf_bp={0x0, 0x91b1400079c52c93}, 0x105c34, 0x8000, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r4, 0x8914, &(0x7f0000000000)={'veth0_vlan\x00', @random="0106002010ff"}) 1.657046126s ago: executing program 4 (id=2575): r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="1801000000000000000000004b84ffec850000006d000000850000002a00000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000400)='tlb_flush\x00', r0}, 0x10) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="170000000000000004000000ff"], 0x48) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="170000000000000004000000ff"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000058"], 0x0}, 0x90) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000140)='sched_switch\x00', r3}, 0x10) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0}, 0x90) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x3, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00', r4}, 0x10) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008001500b7040000000000008500000058"], 0x0}, 0x94) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000080)='contention_end\x00', r5}, 0x18) perf_event_open$cgroup(&(0x7f0000000180)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x8}, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 1.513218537s ago: executing program 4 (id=2576): bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f00000002c0)={&(0x7f0000000000), 0xffffffffffffffff, 0x0, 0x0, 0x8}, 0x38) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0}, 0x94) socketpair(0x1, 0x1, 0x0, 0x0) socketpair(0x1, 0x1, 0x1, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg(r0, &(0x7f0000000500)={&(0x7f0000000180)=@sco={0x1f, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x11}}, 0x80, &(0x7f00000004c0)=[{&(0x7f0000000300)="df5efb4a32e825ac342cb6ffe6894651b7ba6f676050cdebd415ef47c3ca02f5dde2e6a50e9ec82fee2c042bce202182ac59d15bfb19c9727cdecaa0c9099b8ccc4c203f93f494578e85386a24856f1baa3bb555136b1c391a64e3721345b4c99bfef1dba29aa1684ddc0f629dfb", 0x6e}, {&(0x7f0000000380)="08fbdc6c235528445943cc9f0e64ceae8eec4c9d0f972bafe44d8279be70142d14c23b7529373578847b00ab74a8bf630887e491606fad79f1b54536c0d8fbfb67b3983446bd8fc64e5b324e5ff29060249ebdf369016cea44c977662502ddb0d78873c9046956714f6a57b76aa2525af881181a7c46e86fac460222712dba28882081c53bf70d6413fe01aea7699f033a82383c46e2ff5e9eb6bd03d9dbe5e984302f228c097915857bd740d3e185b8e1d7d19e44df232941", 0xb9}, {&(0x7f0000000440)="88a89c795fb6e5df5387aa6a33462325eb3ae97d6d3d59e6358afc5167dfb562b39ced4575c1455a51fe8621208c43", 0x2f}, {&(0x7f0000000200)="d59ef453d74ee708ac2dc5029627c323e2e255d969cbd5d191165b16b5f69fcf3eed82df05a3", 0x26}], 0x4, &(0x7f00000009c0)=[{0xc0, 0x111, 0x1077, "9b22b01b70a5c5b965f45d84aef7843db28a322eb30ff5de69f46e9274dc4fe5dee5ef08e0a316ed17e5634815f25d8decd46bb48cfc50a3226788de2196bb1df0ad3a671662675be5a67012a49cb550e26948e85be13d4abf7ce27045e2a7ff5b9b070d5a3bcf32194253894e2833e4428440b23afe38cb22a171ad8e5a364497489acbf2e125666fb53bb7c8dc69888bce5b37307e1ddf9cebf9eea5ffe428a5aa1fea5a370fd406"}, {0xc0, 0x1, 0xdf780000, "50b49f87785d7a56ffd4e81d2950f62acd20edb264ef76d2c653baab5bab44b99f8e8da4fa73c866e0667999d66896acf0d85ba6776c337ea9f2c4583ccbfdc324b9459f54fc8fc82ce8e4e60dbb745544dd8654cdf14bf474b37164c7c9c30b139b44214c49b6e21200916e9dda099ca73618c50e151a688d5ba4c162bfa5c7509dd6eeee5b81e4a542428764fb638445d42eef63ad3d01b57294b6bbd837d1364359a8b9e3d5332c2458"}, {0xd8, 0x88, 0x6, "f1785dc493869dbb95ad82d0414e61886caf5f81015b3d505c9935afdcfc7f8f56fedff0e2d40ed9543ff24b14a6cf6eceb9d6e63b21b977d1e372d52e07b5af243570d60e50a7e8f47f4d08bba314633eb04a2b8bb5b85850740b069a7edb0008e48946f70d08633a74980b79d4e8efebc739a5091d5ef8988a2f60d3e7f5f9faea876ca91e5e4dbb9dcb1b4dd765511812d1add45733666e589151378a4f388085e6a8472c41abbc4721b8ae813648291976b5eb973a65be16e362834ccd7a0fb8783ac3"}], 0x258}, 0x41811) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f3, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='cpuset.memory_pressure\x00', 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.current\x00', 0x275a, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x9, 0x7, 0x8000, 0x1}, 0x48) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r2, 0x8927, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000001c0)={{r1, 0xffffffffffffffff}, &(0x7f00000002c0), 0x0}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000d00390000", @ANYRES32=r3], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xe}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000600)={{}, &(0x7f0000000580)=0x2, 0x0}, 0x20) r4 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240)={0x2, 0x4, 0x8, 0x1, 0x80, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000840)={0x16, 0x1c, &(0x7f0000000d80)=@ringbuf={{0x18, 0x8}, {{0x18, 0x1, 0x1, 0x0, r4}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x1ab92b}, {0x85, 0x0, 0x0, 0x8}, {0x4}}, {{0x5, 0x0, 0x4, 0x9, 0x0, 0x1, 0x2000}}, [@snprintf={{0x7, 0x0, 0xb, 0x2}, {0x3, 0x3, 0x3, 0xa, 0x9}, {0x5, 0x0, 0xb, 0x9, 0x0, 0x0, 0x40000000}, {0x3, 0x3, 0x3, 0xa, 0xa}, {0x7, 0x1, 0xb, 0x7, 0x2}, {0x7, 0x0, 0x0, 0x8, 0x0, 0x0, 0xfffffdff}, {}, {}, {0x4, 0x0, 0xc}, {0x18, 0x2, 0x2, 0x0, r4}, {}, {0x46, 0x8, 0xffef, 0x76}}], {{0x7, 0x1, 0xb, 0x8}, {0x6, 0x0, 0x5, 0x9}, {}, {0x7, 0x0, 0xb, 0x0, 0x0, 0xfe}}}, &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @flow_dissector, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) 1.4855958s ago: executing program 0 (id=2577): r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="1801000000000000000000004b84ffec850000006d000000850000002a00000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000400)='tlb_flush\x00', r0}, 0x10) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="170000000000000004000000ff"], 0x48) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="170000000000000004000000ff"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000058"], 0x0}, 0x90) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000140)='sched_switch\x00', r3}, 0x10) r4 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000740)=ANY=[@ANYBLOB="0300000004000000040000000a"], 0x48) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x3, 0x8, &(0x7f00000004c0)=ANY=[@ANYBLOB="1809000000000000000000000001000018120000", @ANYRES32=r4, @ANYBLOB="0000000000000000b703000000000000850000000c000000b70000000000000095"], &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sched_cls, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000005c0)={{r4}, &(0x7f0000000540), &(0x7f0000000580)=r5}, 0x20) bpf$MAP_DELETE_ELEM(0x3, &(0x7f00000007c0)={r4, &(0x7f0000000780)}, 0x20) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x3, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008001500b7040000000000008500000058"], 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) perf_event_open$cgroup(&(0x7f0000000180)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x8}, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 1.339660071s ago: executing program 1 (id=2578): bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}}, 0x0, 0xfeffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x13, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000f00000018010000646c6c2500000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb70200"], 0x0, 0x1, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000340)=0xffffffffffffffff, 0x4) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000001b80)=ANY=[@ANYBLOB="0600000004000000080000000a"], 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000000980)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000b2e900007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b70400000000000085000000c3"], 0x0, 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback=0x22, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) sendmsg$tipc(r0, &(0x7f0000000240)={0x0, 0xfffffff5, &(0x7f0000000200)=[{&(0x7f0000000140)="a2", 0xfffffdef}], 0x1}, 0x0) 1.339234491s ago: executing program 3 (id=2579): getpid() bpf$MAP_CREATE(0x0, &(0x7f0000000380)=ANY=[], 0x48) r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x10, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4000000000000007910480000000000610400000000000095000000"], &(0x7f0000003ff6)='GPL\x00', 0x2, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @sk_msg}, 0x48) close(r0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r3, 0xffffffffffffffff, 0x26}, 0x10) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000000c0)={{r3}, &(0x7f0000000000), &(0x7f0000000080)=r0}, 0x20) recvmsg$unix(r1, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001780)=""/4071, 0xfe7}], 0x1}, 0x40020000) close(0x3) sendmsg$inet(r2, &(0x7f0000000500)={0x0, 0x0, &(0x7f0000001740)=[{&(0x7f0000000280)='>', 0xfffe}], 0x1}, 0x0) socketpair$nbd(0x1, 0x1, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000440)=@base={0x7, 0x4, 0x18, 0xa042, 0x0, 0xffffffffffffffff, 0x401}, 0x50) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xfffffffffffffffc}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000f40)={r4, 0x0, 0x0}, 0x20) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002ac0)={0x1a, 0x3, &(0x7f0000000180)=ANY=[@ANYBLOB="1800009500000000000000"], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x18, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x2000}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={0x0, r5}, 0x10) bpf$MAP_CREATE(0x0, 0x0, 0x48) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="020000000400001030fe31a9672cde0080000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000002c0)={0x0, 0x0}, 0x28) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000540)=ANY=[@ANYBLOB="0200000004000000080000000100000080000000", @ANYRES32=0x0, @ANYBLOB="0000000000000000000000000000000000000000f12304f76d14957e945fffb0e18b8139071dc456dd312f07db59b6f54c821c18ef1b78d29803c3be5d2528bdd6b4d0c1c1f52af5671da80b25876d153872e426649b5d6bb8372bb1e33f143adf008659c646c05e9e13173e5f9ae92f814dc328d2e79383d40eca820a126a0dc4a54736a1de50066d83769355b4e234826c772b54d34ef30d3f8bad32ad845a6aecf99ed3a6998a0cbe2a3e95a5cc031695c96858da5c1ffbb926844a2011c2", @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) 1.335165492s ago: executing program 0 (id=2580): openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000001c0)={0xa, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="1800e000000000000000000000000000000080"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0xf}, 0x90) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000040)) r1 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) write$cgroup_pid(r2, &(0x7f0000000980), 0x20000992) r3 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000600)=ANY=[@ANYBLOB="9feb0100180000000000000024000000240000000a000000080000000200000fffffff0a0e0000000000000003000000070000000300000007ffffff00000000000000002e"], &(0x7f0000000040)=""/249, 0x46, 0xf9, 0x6}, 0x28) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x11, 0x5, &(0x7f0000000dc0)=ANY=[@ANYRES16], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0xffffffffffffffc2}, 0x94) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000480)={@fallback=r1, 0x10, 0x1, 0x6, &(0x7f00000002c0)=[0x0], 0x1, 0x0, &(0x7f00000003c0)=[0x0, 0x0, 0x0, 0x0], &(0x7f0000000400)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000440)=[0x0, 0x0, 0x0]}, 0x40) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000e40)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000006c0)={0x8, 0xb, &(0x7f0000000180)=@framed={{0x18, 0x0, 0x0, 0x0, 0xfffffffd, 0x0, 0x0, 0x0, 0x1a89}, [@ringbuf_query, @map_idx_val={0x18, 0xb, 0x6, 0x0, 0x1, 0x0, 0x0, 0x0, 0x8}, @map_val={0x18, 0x5, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0xfffffff9}]}, &(0x7f0000000200)='syzkaller\x00', 0xad2, 0x1000, &(0x7f0000001100)=""/4096, 0x41100, 0x8, '\x00', 0x0, @cgroup_skb=0x1, 0xffffffffffffffff, 0x8, &(0x7f00000002c0)={0x1, 0x1}, 0x8, 0x10, &(0x7f0000000400)={0x1, 0x2, 0x7, 0x3}, 0x10, 0x0, 0xffffffffffffffff, 0x4, 0x0, &(0x7f0000000680)=[{0x5, 0x2, 0x10, 0x9}, {0x2, 0x10000, 0x10, 0x5}, {0x0, 0x4, 0x1}, {0x0, 0x1, 0x6, 0x3}], 0x10, 0x9}, 0x94) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000002100)=@bpf_lsm={0x1d, 0xd, &(0x7f0000000a40)=ANY=[], &(0x7f0000000ac0)='GPL\x00', 0x3, 0xe4, &(0x7f0000000b00)=""/228, 0x40f00, 0x77, '\x00', 0x0, 0x1b, r3, 0x8, &(0x7f0000000c00)={0x8, 0x5}, 0x8, 0x10, &(0x7f0000000c40)={0x0, 0x8, 0x0, 0xef4f}, 0x10, 0x0, 0x0, 0x1, &(0x7f0000000c80)=[r2], &(0x7f0000000cc0)=[{0x3, 0x5, 0x6, 0x7}], 0x10, 0x800}, 0x94) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000340)=ANY=[@ANYBLOB="18000000200000010000", @ANYRES32=r5, @ANYBLOB="0000000000000000b7080000010000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000820000009500000000000000"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2d, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000300)='fib_table_lookup\x00', r6}, 0x18) ioctl$SIOCSIFHWADDR(r4, 0x8914, &(0x7f0000000040)={'sit0\x00', @dev={'\xaa\xaa\xaa\xaa\xaa', 0x3b}}) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r7, 0x8914, &(0x7f0000000040)={'sit0\x00', @random="4f33e363a4b1"}) 1.006960369s ago: executing program 3 (id=2581): r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000001c0)={0xa, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="1800e000000000000000000000000000000080"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0xf}, 0x90) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000040)) r2 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) write$cgroup_pid(r3, &(0x7f0000000980), 0x20000992) r4 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000600)=ANY=[@ANYBLOB="9feb0100180000000000000024000000240000000a000000080000000200000fffffff0a0e0000000000000003000000070000000300000007ffffff00000000000000002e"], &(0x7f0000000040)=""/249, 0x46, 0xf9, 0x6}, 0x28) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x11, 0x5, &(0x7f0000000dc0)=ANY=[@ANYRES16], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0xffffffffffffffc2}, 0x94) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000480)={@fallback=r2, 0x10, 0x1, 0x6, &(0x7f00000002c0)=[0x0], 0x1, 0x0, &(0x7f00000003c0)=[0x0, 0x0, 0x0, 0x0], &(0x7f0000000400)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000440)=[0x0, 0x0, 0x0]}, 0x40) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000002100)=@bpf_lsm={0x1d, 0xd, &(0x7f0000000a40)=ANY=[@ANYBLOB="18190000", @ANYRES32=r0, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\b\x00\x00\x00\x00', @ANYRES32, @ANYBLOB="0000000000000000b7080000050000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000200000085000000820000009500000000000000bd734000ffffffff"], 0x0, 0x3, 0xe4, &(0x7f0000000b00)=""/228, 0x40f00, 0x77, '\x00', 0x0, 0x1b, r4, 0x8, &(0x7f0000000c00)={0x8, 0x5}, 0x8, 0x10, &(0x7f0000000c40)={0x0, 0x8, 0x0, 0xef4f}, 0x10, 0x0, 0x0, 0x1, &(0x7f0000000c80)=[r3], &(0x7f0000000cc0)=[{0x3, 0x5, 0x6, 0x7}], 0x10, 0x800}, 0x94) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000340)=ANY=[@ANYBLOB="1800000020000001000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000010000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000820000009500000000000000"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2d, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000300)='fib_table_lookup\x00', r8}, 0x18) ioctl$SIOCSIFHWADDR(r6, 0x8914, &(0x7f0000000040)={'sit0\x00', @dev={'\xaa\xaa\xaa\xaa\xaa', 0x3b}}) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r9, 0x8914, &(0x7f0000000040)={'sit0\x00', @random="4f33e363a4b1"}) openat$cgroup(r7, &(0x7f00000009c0)='syz1\x00', 0x200002, 0x0) bpf$MAP_LOOKUP_BATCH(0x18, &(0x7f00000006c0)={&(0x7f0000000780)="7568e520dfd9b62b1e8977b454b60204454c443783727788acf69afc1a97ddd6bdea265390bc0a59e20f708624e8926e954dcc0a8da6bd041660bead0902d5452b2e777da2bd493ade553c56844fad58a9ba6084eb00b2da79c53e4f019533c41af835f995804173b54cb3cb8d58743dd8ce7ec01ccdd1a763c5e9d400ea8819cd63b2fc1b3d069a3a92650ae6b740908517c74ca90c02ae2786433bf14753887ba7fca9c7cce8f3a4c753dcc96fff122e569cf31002c58e63173cb8c6357a571f804b2dccc11119d4bf158127191e2f50", &(0x7f00000004c0)=""/145, &(0x7f0000000680)="d7ff2fcb7072c4af8e01d84545e98824b7f2e5348c7d8671d53f379dbfa04d68bcef1b375075bbc731afceec", &(0x7f0000000880)="6cb8b19ec7575c282b827315d7fb57fc9876dcd9cf439184799380246c4ff02f9e3d9fe4484b6f4120eac47e1373e16099259ee50409059f2c2a4fdd7f5a37c5abbf1dd3bc857f3b7e8cfbae7c10bab12bc205974cd4c6cade60fff73e2066a637b74220eb94c203c45bcf3c96dd81c74d780afb75009e7576a5dfd5e534420de962592f9c41f61b8c62d2d301f3bc8dbe8620f946bf78f0d321a584eda5d5060ef84710a19f55f4d5b9dbb2ec2167107348cbeb2501b87dadaa56efff79b71f26a0a7eb865b37134930db5e694d5f1438ba77f69f7ae97b77a445faa20356c548a5ae8ab03bbc0ba2", 0xba6, 0xffffffffffffffff, 0x4}, 0x38) r10 = bpf$PROG_LOAD(0x5, &(0x7f0000001000)={0x11, 0xd, &(0x7f00000002c0)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000003000000650000000800000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000140)='kmem_cache_free\x00', r10}, 0x10) socketpair(0xa, 0x1, 0x0, &(0x7f0000000040)={0x0, 0x0}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00', r5}, 0x10) openat$tun(0xffffffffffffff9c, 0x0, 0x101040, 0x0) 608.391071ms ago: executing program 4 (id=2582): bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={0xffffffffffffffff, 0x18000000000002a0, 0x0, 0x0, &(0x7f0000000100), 0x0, 0xfe, 0x60000000, 0x0, 0x0, 0x0, 0x0}, 0x50) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="12"], 0x50) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000000c0), &(0x7f0000000140), 0x5}, 0x38) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000810018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x4, '\x00', 0x0, @fallback=0x1f, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240)={0x2, 0x4, 0x8, 0x1, 0x80, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r0}, 0x10) syz_clone(0xc2002000, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000200)={{}, &(0x7f0000000180), &(0x7f00000001c0)}, 0x20) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000200)='cpuset.mem_hardwall\x00', 0x2, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'ip6tnl0\x00', 0x210}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x89f1, &(0x7f0000000080)) 457.718633ms ago: executing program 1 (id=2583): bpf$MAP_CREATE(0x0, &(0x7f0000000380)=ANY=[], 0x48) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xb, 0x4, &(0x7f0000000740)=ANY=[@ANYBLOB="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"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @fallback=0x32, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x4000000}, 0x8}, 0x94) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0xf, 0x4, 0x4, 0x12}, 0x48) bpf$BPF_PROG_DETACH(0x8, 0x0, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000000c0)={{r2}, 0x0, 0x0}, 0x20) recvmsg$unix(r0, 0x0, 0x40020000) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) close(0x3) sendmsg$inet(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f0000001740)=[{&(0x7f0000000280)='>', 0xfffe}], 0x1}, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000440)=@base={0x7, 0x4, 0x18, 0xa042, 0x0, 0xffffffffffffffff, 0x401}, 0x50) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xfffffffffffffffc}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000f40)={r3, 0x0, 0x0}, 0x20) 424.370776ms ago: executing program 0 (id=2584): bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f00000002c0)={&(0x7f0000000000), 0xffffffffffffffff, 0x0, 0x0, 0x8}, 0x38) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0}, 0x94) socketpair(0x1, 0x1, 0x0, 0x0) socketpair(0x1, 0x1, 0x1, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg(r0, &(0x7f0000000500)={&(0x7f0000000180)=@sco={0x1f, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x11}}, 0x80, &(0x7f00000004c0)=[{&(0x7f0000000300)="df5efb4a32e825ac342cb6ffe6894651b7ba6f676050cdebd415ef47c3ca02f5dde2e6a50e9ec82fee2c042bce202182ac59d15bfb19c9727cdecaa0c9099b8ccc4c203f93f494578e85386a24856f1baa3bb555136b1c391a64e3721345b4c99bfef1dba29aa1684ddc0f629dfb", 0x6e}, {&(0x7f0000000380)="08fbdc6c235528445943cc9f0e64ceae8eec4c9d0f972bafe44d8279be70142d14c23b7529373578847b00ab74a8bf630887e491606fad79f1b54536c0d8fbfb67b3983446bd8fc64e5b324e5ff29060249ebdf369016cea44c977662502ddb0d78873c9046956714f6a57b76aa2525af881181a7c46e86fac460222712dba28882081c53bf70d6413fe01aea7699f033a82383c46e2ff5e9eb6bd03d9dbe5e984302f228c097915857bd740d3e185b8e1d7d19e44df232941", 0xb9}, {&(0x7f0000000440)="88a89c795fb6e5df5387aa6a33462325eb3ae97d6d3d59e6358afc5167dfb562b39ced4575c1455a51fe8621208c43", 0x2f}, {&(0x7f0000000200)="d59ef453d74ee708ac2dc5029627c323e2e255d969cbd5d191165b16b5f69fcf3eed82df05a3", 0x26}], 0x4, &(0x7f00000009c0)=[{0xc0, 0x111, 0x1077, "9b22b01b70a5c5b965f45d84aef7843db28a322eb30ff5de69f46e9274dc4fe5dee5ef08e0a316ed17e5634815f25d8decd46bb48cfc50a3226788de2196bb1df0ad3a671662675be5a67012a49cb550e26948e85be13d4abf7ce27045e2a7ff5b9b070d5a3bcf32194253894e2833e4428440b23afe38cb22a171ad8e5a364497489acbf2e125666fb53bb7c8dc69888bce5b37307e1ddf9cebf9eea5ffe428a5aa1fea5a370fd406"}, {0xc0, 0x1, 0xdf780000, "50b49f87785d7a56ffd4e81d2950f62acd20edb264ef76d2c653baab5bab44b99f8e8da4fa73c866e0667999d66896acf0d85ba6776c337ea9f2c4583ccbfdc324b9459f54fc8fc82ce8e4e60dbb745544dd8654cdf14bf474b37164c7c9c30b139b44214c49b6e21200916e9dda099ca73618c50e151a688d5ba4c162bfa5c7509dd6eeee5b81e4a542428764fb638445d42eef63ad3d01b57294b6bbd837d1364359a8b9e3d5332c2458"}, {0xd8, 0x88, 0x6, "f1785dc493869dbb95ad82d0414e61886caf5f81015b3d505c9935afdcfc7f8f56fedff0e2d40ed9543ff24b14a6cf6eceb9d6e63b21b977d1e372d52e07b5af243570d60e50a7e8f47f4d08bba314633eb04a2b8bb5b85850740b069a7edb0008e48946f70d08633a74980b79d4e8efebc739a5091d5ef8988a2f60d3e7f5f9faea876ca91e5e4dbb9dcb1b4dd765511812d1add45733666e589151378a4f388085e6a8472c41abbc4721b8ae813648291976b5eb973a65be16e362834ccd7a0fb8783ac3"}], 0x258}, 0x41811) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f3, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='cpuset.memory_pressure\x00', 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.current\x00', 0x275a, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800"/13, @ANYRES32], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x9, 0x7, 0x8000, 0x1}, 0x48) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r2, 0x8927, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000001c0)={{r1, 0xffffffffffffffff}, &(0x7f00000002c0), 0x0}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000d00390000", @ANYRES32=r3], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xe}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000600)={{}, &(0x7f0000000580)=0x2, 0x0}, 0x20) r4 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240)={0x2, 0x4, 0x8, 0x1, 0x80, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000840)={0x16, 0x1c, &(0x7f0000000d80)=@ringbuf={{0x18, 0x8}, {{0x18, 0x1, 0x1, 0x0, r4}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x1ab92b}, {0x85, 0x0, 0x0, 0x8}, {0x4}}, {{0x5, 0x0, 0x4, 0x9, 0x0, 0x1, 0x2000}}, [@snprintf={{0x7, 0x0, 0xb, 0x2}, {0x3, 0x3, 0x3, 0xa, 0x9}, {0x5, 0x0, 0xb, 0x9, 0x0, 0x0, 0x40000000}, {0x3, 0x3, 0x3, 0xa, 0xa}, {0x7, 0x1, 0xb, 0x7, 0x2}, {0x7, 0x0, 0x0, 0x8, 0x0, 0x0, 0xfffffdff}, {}, {}, {0x4, 0x0, 0xc}, {0x18, 0x2, 0x2, 0x0, r4}, {}, {0x46, 0x8, 0xffef, 0x76}}], {{0x7, 0x1, 0xb, 0x8}, {0x6, 0x0, 0x5, 0x9}, {}, {0x7, 0x0, 0xb, 0x0, 0x0, 0xfe}}}, &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @flow_dissector, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) 189.705394ms ago: executing program 1 (id=2585): openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000001c0)={0xa, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="1800e000000000000000000000000000000080"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0xf}, 0x90) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000040)) r1 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) write$cgroup_pid(r2, &(0x7f0000000980), 0x20000992) r3 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000600)=ANY=[@ANYBLOB="9feb0100180000000000000024000000240000000a000000080000000200000fffffff0a0e0000000000000003000000070000000300000007ffffff00000000000000002e"], &(0x7f0000000040)=""/249, 0x46, 0xf9, 0x6}, 0x28) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x11, 0x5, &(0x7f0000000dc0)=ANY=[@ANYRES16], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0xffffffffffffffc2}, 0x94) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000480)={@fallback=r1, 0x10, 0x1, 0x6, &(0x7f00000002c0)=[0x0], 0x1, 0x0, &(0x7f00000003c0)=[0x0, 0x0, 0x0, 0x0], &(0x7f0000000400)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000440)=[0x0, 0x0, 0x0]}, 0x40) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000e40)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000006c0)={0x8, 0xb, &(0x7f0000000180)=@framed={{0x18, 0x0, 0x0, 0x0, 0xfffffffd, 0x0, 0x0, 0x0, 0x1a89}, [@ringbuf_query, @map_idx_val={0x18, 0xb, 0x6, 0x0, 0x1, 0x0, 0x0, 0x0, 0x8}, @map_val={0x18, 0x5, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0xfffffff9}]}, &(0x7f0000000200)='syzkaller\x00', 0xad2, 0x1000, &(0x7f0000001100)=""/4096, 0x41100, 0x8, '\x00', 0x0, @cgroup_skb=0x1, 0xffffffffffffffff, 0x8, &(0x7f00000002c0)={0x1, 0x1}, 0x8, 0x10, &(0x7f0000000400)={0x1, 0x2, 0x7, 0x3}, 0x10, 0x0, 0xffffffffffffffff, 0x4, 0x0, &(0x7f0000000680)=[{0x5, 0x2, 0x10, 0x9}, {0x2, 0x10000, 0x10, 0x5}, {0x0, 0x4, 0x1}, {0x0, 0x1, 0x6, 0x3}], 0x10, 0x9}, 0x94) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000002100)=@bpf_lsm={0x1d, 0xd, &(0x7f0000000a40)=ANY=[], &(0x7f0000000ac0)='GPL\x00', 0x3, 0xe4, &(0x7f0000000b00)=""/228, 0x40f00, 0x77, '\x00', 0x0, 0x1b, r3, 0x8, &(0x7f0000000c00)={0x8, 0x5}, 0x8, 0x10, &(0x7f0000000c40)={0x0, 0x8, 0x0, 0xef4f}, 0x10, 0x0, 0x0, 0x1, &(0x7f0000000c80)=[r2], &(0x7f0000000cc0)=[{0x3, 0x5, 0x6, 0x7}], 0x10, 0x800}, 0x94) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000340)=ANY=[@ANYBLOB, @ANYRES32=r5, @ANYBLOB="0000000000000000b7080000010000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000820000009500000000000000"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2d, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000300)='fib_table_lookup\x00', r6}, 0x18) ioctl$SIOCSIFHWADDR(r4, 0x8914, &(0x7f0000000040)={'sit0\x00', @dev={'\xaa\xaa\xaa\xaa\xaa', 0x3b}}) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r7, 0x8914, &(0x7f0000000040)={'sit0\x00', @random="4f33e363a4b1"}) 140.626059ms ago: executing program 2 (id=2586): bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}}, 0x0, 0xfeffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x13, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000f00000018010000646c6c2500000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000000085000000"], 0x0, 0x1, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000340)=0xffffffffffffffff, 0x4) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000001b80)=ANY=[@ANYBLOB="0600000004000000080000000a"], 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000000980)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000b2e900007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b70400000000000085000000c3"], 0x0, 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback=0x22, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) sendmsg$tipc(r0, &(0x7f0000000240)={0x0, 0xfffffff5, &(0x7f0000000200)=[{&(0x7f0000000140)="a2", 0xfffffdef}], 0x1}, 0x0) 43.296476ms ago: executing program 3 (id=2587): r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000001c0)={0xa, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="1800e000"/18], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0xf}, 0x94) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000040)) r2 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) write$cgroup_pid(r3, &(0x7f0000000980), 0x20000992) r4 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={0x0, &(0x7f0000000040)=""/249, 0x46, 0xf9, 0x6}, 0x28) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x11, 0x5, &(0x7f0000000dc0)=ANY=[@ANYRES16], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0xffffffffffffffc2}, 0x94) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000480)={@fallback=r2, 0x10, 0x1, 0x6, &(0x7f00000002c0)=[0x0], 0x1, 0x0, 0x0, 0x0, &(0x7f0000000440)=[0x0, 0x0, 0x0]}, 0x40) r8 = bpf$MAP_CREATE(0x0, &(0x7f0000000e40)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x50) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000002100)=@bpf_lsm={0x1d, 0xd, &(0x7f0000000a40)=ANY=[@ANYBLOB="18190000", @ANYRES32=r0, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\b\x00\x00\x00\x00', @ANYRES32, @ANYBLOB="0000000000000000b7080000050000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000200000085000000820000009500000000000000bd734000ffffffff"], &(0x7f0000000ac0)='GPL\x00', 0x3, 0xe4, &(0x7f0000000b00)=""/228, 0x40f00, 0x77, '\x00', 0x0, 0x1b, r4, 0x8, &(0x7f0000000c00)={0x8, 0x5}, 0x8, 0x10, &(0x7f0000000c40)={0x0, 0x8, 0x0, 0xef4f}, 0x10, 0x0, 0x0, 0x1, &(0x7f0000000c80)=[r3], &(0x7f0000000cc0)=[{0x3, 0x5, 0x6, 0x7}], 0x10, 0x800}, 0x94) r9 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000340)=ANY=[@ANYBLOB="1800000020000001000000000000000018110000", @ANYRES32=r8, @ANYBLOB="0000000000000000b7080000010000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000820000009500000000000000"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2d, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000300)='fib_table_lookup\x00', r9}, 0x18) ioctl$SIOCSIFHWADDR(r6, 0x8914, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r10, 0x8914, &(0x7f0000000040)={'sit0\x00', @random="4f33e363a4b1"}) openat$cgroup(r7, &(0x7f00000009c0)='syz1\x00', 0x200002, 0x0) bpf$MAP_LOOKUP_BATCH(0x18, &(0x7f00000006c0)={&(0x7f0000000780)="7568e520dfd9b62b1e8977b454b60204454c443783727788acf69afc1a97ddd6bdea265390bc0a59e20f708624e8926e954dcc0a8da6bd041660bead0902d5452b2e777da2bd493ade553c56844fad58a9ba6084eb00b2da79c53e4f019533c41af835f995804173b54cb3cb8d58743dd8ce7ec01ccdd1a763c5e9d400ea8819cd63b2fc1b3d069a3a92650ae6b740908517c74ca90c02ae2786433bf14753887ba7fca9c7cce8f3a4c753dcc96fff122e569cf31002c58e63173cb8c6357a571f804b2dccc11119d4bf158127191e2f50", &(0x7f00000004c0)=""/145, &(0x7f0000000680)="d7ff2fcb7072c4af8e01d84545e98824b7f2e5348c7d8671d53f379dbfa04d68bcef1b375075bbc731afceec", &(0x7f0000000880)="6cb8b19ec7575c282b827315d7fb57fc9876dcd9cf439184799380246c4ff02f9e3d9fe4484b6f4120eac47e1373e16099259ee50409059f2c2a4fdd7f5a37c5abbf1dd3bc857f3b7e8cfbae7c10bab12bc205974cd4c6cade60fff73e2066a637b74220eb94c203c45bcf3c96dd81c74d780afb75009e7576a5dfd5e534420de962592f9c41f61b8c62d2d301f3bc8dbe8620f946bf78f0d321a584eda5d5060ef84710a19f55f4d5b9dbb2ec2167107348cbeb2501b87dadaa56efff79b71f26a0a7eb865b37134930db5e694d5f1438ba77f69f7ae97b77a445faa20356c548a5ae8ab03bbc0ba2", 0xba6, 0xffffffffffffffff, 0x4}, 0x38) r11 = bpf$PROG_LOAD(0x5, &(0x7f0000001000)={0x11, 0xd, &(0x7f00000002c0)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000003000000650000000800000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000140)='kmem_cache_free\x00', r11}, 0x10) socketpair(0xa, 0x1, 0x0, &(0x7f0000000040)={0x0, 0x0}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00', r5}, 0x10) openat$tun(0xffffffffffffff9c, 0x0, 0x101040, 0x0) 0s ago: executing program 4 (id=2588): r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="1801000000000000000000004b84ffec850000006d000000850000002a00000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000400)='tlb_flush\x00', r0}, 0x10) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="170000000000000004000000ff"], 0x48) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="170000000000000004000000ff"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000058"], 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0}, 0x90) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x3, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00', r3}, 0x10) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008001500b7040000000000008500000058"], 0x0}, 0x94) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000080)='contention_end\x00', r4}, 0x18) perf_event_open$cgroup(&(0x7f0000000180)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x8}, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) kernel console output (not intermixed with test programs): ode [ 290.626353][ T4941] device sit0 entered promiscuous mode [ 291.464080][ T4950] FAULT_INJECTION: forcing a failure. [ 291.464080][ T4950] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 291.517068][ T4950] CPU: 0 PID: 4950 Comm: syz.3.1211 Not tainted syzkaller #0 [ 291.524695][ T4950] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 291.534777][ T4950] Call Trace: [ 291.538154][ T4950] [ 291.541174][ T4950] __dump_stack+0x21/0x24 [ 291.545689][ T4950] dump_stack_lvl+0xee/0x150 [ 291.550397][ T4950] ? __cfi_dump_stack_lvl+0x8/0x8 [ 291.555446][ T4950] dump_stack+0x15/0x24 [ 291.559618][ T4950] should_fail_ex+0x3d4/0x520 [ 291.564304][ T4950] should_fail+0xb/0x10 [ 291.568464][ T4950] should_fail_usercopy+0x1a/0x20 [ 291.573506][ T4950] _copy_from_user+0x1e/0xc0 [ 291.578185][ T4950] __sys_bpf+0x277/0x780 [ 291.582523][ T4950] ? bpf_link_show_fdinfo+0x320/0x320 [ 291.587990][ T4950] ? __cfi_ksys_write+0x10/0x10 [ 291.592966][ T4950] ? debug_smp_processor_id+0x17/0x20 [ 291.598434][ T4950] __x64_sys_bpf+0x7c/0x90 [ 291.603009][ T4950] x64_sys_call+0x488/0x9a0 [ 291.607529][ T4950] do_syscall_64+0x4c/0xa0 [ 291.611963][ T4950] ? clear_bhb_loop+0x30/0x80 [ 291.616827][ T4950] ? clear_bhb_loop+0x30/0x80 [ 291.621616][ T4950] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 291.627608][ T4950] RIP: 0033:0x7f17af58ebe9 [ 291.632106][ T4950] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 291.651897][ T4950] RSP: 002b:00007f17b0427038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 291.660425][ T4950] RAX: ffffffffffffffda RBX: 00007f17af7b5fa0 RCX: 00007f17af58ebe9 [ 291.668756][ T4950] RDX: 0000000000000048 RSI: 0000200000000600 RDI: 0000000000000000 [ 291.676738][ T4950] RBP: 00007f17b0427090 R08: 0000000000000000 R09: 0000000000000000 [ 291.684714][ T4950] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 291.692772][ T4950] R13: 00007f17af7b6038 R14: 00007f17af7b5fa0 R15: 00007ffc9c6148f8 [ 291.700762][ T4950] [ 292.647321][ T4956] device veth0_vlan left promiscuous mode [ 292.654039][ T4956] device veth0_vlan entered promiscuous mode [ 292.759792][ T334] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 292.769287][ T334] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 292.777317][ T334] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 294.066217][ T4964] device sit0 left promiscuous mode [ 294.085480][ T4978] device veth0_vlan left promiscuous mode [ 294.143776][ T4978] device veth0_vlan entered promiscuous mode [ 294.226968][ T4973] device veth0_vlan left promiscuous mode [ 294.239092][ T4973] device veth0_vlan entered promiscuous mode [ 294.262214][ T4970] device sit0 entered promiscuous mode [ 294.312273][ T713] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 294.335089][ T713] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 294.357232][ T713] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 295.060529][ T4994] FAULT_INJECTION: forcing a failure. [ 295.060529][ T4994] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 295.206760][ T4994] CPU: 0 PID: 4994 Comm: syz.4.1224 Not tainted syzkaller #0 [ 295.214190][ T4994] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 295.224344][ T4994] Call Trace: [ 295.227712][ T4994] [ 295.230727][ T4994] __dump_stack+0x21/0x24 [ 295.235294][ T4994] dump_stack_lvl+0xee/0x150 [ 295.239998][ T4994] ? __cfi_dump_stack_lvl+0x8/0x8 [ 295.245145][ T4994] dump_stack+0x15/0x24 [ 295.249326][ T4994] should_fail_ex+0x3d4/0x520 [ 295.254103][ T4994] should_fail+0xb/0x10 [ 295.258347][ T4994] should_fail_usercopy+0x1a/0x20 [ 295.263578][ T4994] _copy_from_user+0x1e/0xc0 [ 295.268220][ T4994] __sys_bpf+0x277/0x780 [ 295.272472][ T4994] ? bpf_link_show_fdinfo+0x320/0x320 [ 295.277852][ T4994] ? __cfi_ksys_write+0x10/0x10 [ 295.282974][ T4994] ? debug_smp_processor_id+0x17/0x20 [ 295.288366][ T4994] __x64_sys_bpf+0x7c/0x90 [ 295.292880][ T4994] x64_sys_call+0x488/0x9a0 [ 295.297394][ T4994] do_syscall_64+0x4c/0xa0 [ 295.301826][ T4994] ? clear_bhb_loop+0x30/0x80 [ 295.306553][ T4994] ? clear_bhb_loop+0x30/0x80 [ 295.311244][ T4994] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 295.317326][ T4994] RIP: 0033:0x7f65e818ebe9 [ 295.321947][ T4994] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 295.341819][ T4994] RSP: 002b:00007f65e9095038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 295.350252][ T4994] RAX: ffffffffffffffda RBX: 00007f65e83b5fa0 RCX: 00007f65e818ebe9 [ 295.358238][ T4994] RDX: 0000000000000048 RSI: 00002000000010c0 RDI: 0000000000000000 [ 295.366376][ T4994] RBP: 00007f65e9095090 R08: 0000000000000000 R09: 0000000000000000 [ 295.374528][ T4994] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 295.382574][ T4994] R13: 00007f65e83b6038 R14: 00007f65e83b5fa0 R15: 00007ffefe8cfdd8 [ 295.390649][ T4994] [ 296.503716][ T5012] device sit0 left promiscuous mode [ 296.521866][ T5015] device sit0 entered promiscuous mode [ 296.802620][ T5019] device veth0_vlan left promiscuous mode [ 296.821214][ T5019] device veth0_vlan entered promiscuous mode [ 296.900646][ T334] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 296.909591][ T334] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 296.919862][ T334] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 298.268790][ T5028] device veth0_vlan left promiscuous mode [ 298.294523][ T5028] device veth0_vlan entered promiscuous mode [ 298.303303][ T5029] device veth0_vlan left promiscuous mode [ 298.337810][ T5029] device veth0_vlan entered promiscuous mode [ 298.412880][ T334] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 298.422376][ T334] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 298.430961][ T334] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 298.498195][ T5038] device veth0_vlan left promiscuous mode [ 298.518283][ T5038] device veth0_vlan entered promiscuous mode [ 298.557021][ T5035] device veth0_vlan left promiscuous mode [ 298.568756][ T5035] device veth0_vlan entered promiscuous mode [ 298.670420][ T5044] device sit0 left promiscuous mode [ 298.761374][ T5044] device sit0 entered promiscuous mode [ 298.875097][ T5048] device sit0 left promiscuous mode [ 298.933447][ T5049] device sit0 entered promiscuous mode [ 300.185366][ T5069] device sit0 left promiscuous mode [ 300.402143][ T5069] device sit0 entered promiscuous mode [ 301.422362][ T5080] FAULT_INJECTION: forcing a failure. [ 301.422362][ T5080] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 301.586889][ T5080] CPU: 0 PID: 5080 Comm: syz.1.1247 Not tainted syzkaller #0 [ 301.594391][ T5080] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 301.604541][ T5080] Call Trace: [ 301.607825][ T5080] [ 301.610753][ T5080] __dump_stack+0x21/0x24 [ 301.615091][ T5080] dump_stack_lvl+0xee/0x150 [ 301.619690][ T5080] ? __cfi_dump_stack_lvl+0x8/0x8 [ 301.625043][ T5080] dump_stack+0x15/0x24 [ 301.629217][ T5080] should_fail_ex+0x3d4/0x520 [ 301.633902][ T5080] should_fail+0xb/0x10 [ 301.638104][ T5080] should_fail_usercopy+0x1a/0x20 [ 301.643130][ T5080] _copy_from_user+0x1e/0xc0 [ 301.647743][ T5080] __sys_bpf+0x277/0x780 [ 301.652014][ T5080] ? bpf_link_show_fdinfo+0x320/0x320 [ 301.657407][ T5080] ? __cfi_ksys_write+0x10/0x10 [ 301.662978][ T5080] ? debug_smp_processor_id+0x17/0x20 [ 301.668448][ T5080] __x64_sys_bpf+0x7c/0x90 [ 301.672933][ T5080] x64_sys_call+0x488/0x9a0 [ 301.677432][ T5080] do_syscall_64+0x4c/0xa0 [ 301.681851][ T5080] ? clear_bhb_loop+0x30/0x80 [ 301.686528][ T5080] ? clear_bhb_loop+0x30/0x80 [ 301.691216][ T5080] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 301.697110][ T5080] RIP: 0033:0x7f084d98ebe9 [ 301.701641][ T5080] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 301.721511][ T5080] RSP: 002b:00007f084e809038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 301.730115][ T5080] RAX: ffffffffffffffda RBX: 00007f084dbb5fa0 RCX: 00007f084d98ebe9 [ 301.738176][ T5080] RDX: 0000000000000048 RSI: 0000200000000840 RDI: 0000000000000000 [ 301.746148][ T5080] RBP: 00007f084e809090 R08: 0000000000000000 R09: 0000000000000000 [ 301.754126][ T5080] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 301.762196][ T5080] R13: 00007f084dbb6038 R14: 00007f084dbb5fa0 R15: 00007ffca6b5d3a8 [ 301.770187][ T5080] [ 301.784188][ T5083] device veth0_vlan left promiscuous mode [ 301.862381][ T5083] device veth0_vlan entered promiscuous mode [ 301.998996][ T713] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 302.037477][ T713] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 302.082097][ T713] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 302.151088][ T5089] device veth0_vlan left promiscuous mode [ 302.159269][ T5089] device veth0_vlan entered promiscuous mode [ 302.171531][ T334] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 302.191178][ T334] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 302.199131][ T334] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 302.282706][ T5099] device sit0 left promiscuous mode [ 302.475190][ T5102] device sit0 entered promiscuous mode [ 302.767109][ T5104] device sit0 left promiscuous mode [ 302.889246][ T5108] device sit0 entered promiscuous mode [ 303.129590][ T5112] device pim6reg1 entered promiscuous mode [ 303.212181][ T5114] device veth1_macvtap left promiscuous mode [ 303.282598][ T28] audit: type=1400 audit(1755847322.045:114): avc: denied { write } for pid=5113 comm="syz.0.1256" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=1 [ 303.352514][ T5114] device veth1_macvtap entered promiscuous mode [ 303.385754][ T5114] device macsec0 entered promiscuous mode [ 303.526262][ T28] audit: type=1400 audit(1755847322.075:115): avc: denied { create } for pid=5113 comm="syz.0.1256" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 304.478783][ T5138] FAULT_INJECTION: forcing a failure. [ 304.478783][ T5138] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 304.560704][ T5138] CPU: 0 PID: 5138 Comm: syz.1.1264 Not tainted syzkaller #0 [ 304.568210][ T5138] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 304.578266][ T5138] Call Trace: [ 304.581543][ T5138] [ 304.584469][ T5138] __dump_stack+0x21/0x24 [ 304.588980][ T5138] dump_stack_lvl+0xee/0x150 [ 304.593678][ T5138] ? __cfi_dump_stack_lvl+0x8/0x8 [ 304.598968][ T5138] dump_stack+0x15/0x24 [ 304.603142][ T5138] should_fail_ex+0x3d4/0x520 [ 304.607822][ T5138] should_fail+0xb/0x10 [ 304.612671][ T5138] should_fail_usercopy+0x1a/0x20 [ 304.617700][ T5138] _copy_from_user+0x1e/0xc0 [ 304.622292][ T5138] __sys_bpf+0x277/0x780 [ 304.626535][ T5138] ? bpf_link_show_fdinfo+0x320/0x320 [ 304.631998][ T5138] ? __cfi_ksys_write+0x10/0x10 [ 304.636865][ T5138] ? debug_smp_processor_id+0x17/0x20 [ 304.642254][ T5138] __x64_sys_bpf+0x7c/0x90 [ 304.646694][ T5138] x64_sys_call+0x488/0x9a0 [ 304.651638][ T5138] do_syscall_64+0x4c/0xa0 [ 304.656066][ T5138] ? clear_bhb_loop+0x30/0x80 [ 304.660765][ T5138] ? clear_bhb_loop+0x30/0x80 [ 304.665443][ T5138] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 304.671511][ T5138] RIP: 0033:0x7f084d98ebe9 [ 304.675928][ T5138] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 304.696143][ T5138] RSP: 002b:00007f084e809038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 304.704641][ T5138] RAX: ffffffffffffffda RBX: 00007f084dbb5fa0 RCX: 00007f084d98ebe9 [ 304.712974][ T5138] RDX: 0000000000000020 RSI: 0000200000000080 RDI: 0000000000000004 [ 304.721123][ T5138] RBP: 00007f084e809090 R08: 0000000000000000 R09: 0000000000000000 [ 304.729089][ T5138] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 304.737135][ T5138] R13: 00007f084dbb6038 R14: 00007f084dbb5fa0 R15: 00007ffca6b5d3a8 [ 304.745183][ T5138] [ 305.059789][ T5141] device sit0 left promiscuous mode [ 305.215506][ T5142] device sit0 entered promiscuous mode [ 306.148029][ T5147] device veth0_vlan left promiscuous mode [ 306.210847][ T5147] device veth0_vlan entered promiscuous mode [ 306.220460][ T5151] device sit0 left promiscuous mode [ 306.278660][ T5152] device sit0 entered promiscuous mode [ 306.433250][ T334] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 306.463039][ T334] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 306.524978][ T334] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 306.645636][ T5161] device sit0 left promiscuous mode [ 307.363122][ T5169] device pim6reg1 entered promiscuous mode [ 307.703799][ T5174] FAULT_INJECTION: forcing a failure. [ 307.703799][ T5174] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 307.976274][ T5174] CPU: 1 PID: 5174 Comm: syz.0.1274 Not tainted syzkaller #0 [ 307.983691][ T5174] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 307.993747][ T5174] Call Trace: [ 307.997025][ T5174] [ 307.999952][ T5174] __dump_stack+0x21/0x24 [ 308.004325][ T5174] dump_stack_lvl+0xee/0x150 [ 308.009002][ T5174] ? __cfi_dump_stack_lvl+0x8/0x8 [ 308.014028][ T5174] dump_stack+0x15/0x24 [ 308.018192][ T5174] should_fail_ex+0x3d4/0x520 [ 308.022883][ T5174] should_fail+0xb/0x10 [ 308.027051][ T5174] should_fail_usercopy+0x1a/0x20 [ 308.032179][ T5174] _copy_from_user+0x1e/0xc0 [ 308.036871][ T5174] sock_do_ioctl+0x186/0x310 [ 308.041549][ T5174] ? sock_show_fdinfo+0xb0/0xb0 [ 308.046402][ T5174] ? selinux_file_ioctl+0x377/0x480 [ 308.051604][ T5174] sock_ioctl+0x4d8/0x6e0 [ 308.055937][ T5174] ? __cfi_sock_ioctl+0x10/0x10 [ 308.060802][ T5174] ? __fget_files+0x2d5/0x330 [ 308.065487][ T5174] ? security_file_ioctl+0x95/0xc0 [ 308.070771][ T5174] ? __cfi_sock_ioctl+0x10/0x10 [ 308.075627][ T5174] __se_sys_ioctl+0x12f/0x1b0 [ 308.080309][ T5174] __x64_sys_ioctl+0x7b/0x90 [ 308.084958][ T5174] x64_sys_call+0x58b/0x9a0 [ 308.089485][ T5174] do_syscall_64+0x4c/0xa0 [ 308.093912][ T5174] ? clear_bhb_loop+0x30/0x80 [ 308.098595][ T5174] ? clear_bhb_loop+0x30/0x80 [ 308.103420][ T5174] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 308.109421][ T5174] RIP: 0033:0x7fd31a58ebe9 [ 308.113847][ T5174] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 308.133558][ T5174] RSP: 002b:00007fd31b36f038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 308.142076][ T5174] RAX: ffffffffffffffda RBX: 00007fd31a7b5fa0 RCX: 00007fd31a58ebe9 [ 308.150057][ T5174] RDX: 0000200000000100 RSI: 0000000000008914 RDI: 000000000000000a [ 308.158197][ T5174] RBP: 00007fd31b36f090 R08: 0000000000000000 R09: 0000000000000000 [ 308.166259][ T5174] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 308.174318][ T5174] R13: 00007fd31a7b6038 R14: 00007fd31a7b5fa0 R15: 00007ffe24e1b7c8 [ 308.182388][ T5174] [ 308.813623][ T5190] device sit0 left promiscuous mode [ 308.960757][ T5194] device sit0 entered promiscuous mode [ 309.276036][ T5200] device sit0 left promiscuous mode [ 309.430869][ T5197] device sit0 entered promiscuous mode [ 309.631499][ T5209] device sit0 left promiscuous mode [ 309.790030][ T5193] device sit0 entered promiscuous mode [ 309.831047][ T5214] device sit0 entered promiscuous mode [ 310.053337][ T5227] FAULT_INJECTION: forcing a failure. [ 310.053337][ T5227] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 310.266322][ T5227] CPU: 0 PID: 5227 Comm: syz.0.1289 Not tainted syzkaller #0 [ 310.273840][ T5227] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 310.283998][ T5227] Call Trace: [ 310.287284][ T5227] [ 310.290222][ T5227] __dump_stack+0x21/0x24 [ 310.294564][ T5227] dump_stack_lvl+0xee/0x150 [ 310.299257][ T5227] ? __cfi_dump_stack_lvl+0x8/0x8 [ 310.304303][ T5227] dump_stack+0x15/0x24 [ 310.308470][ T5227] should_fail_ex+0x3d4/0x520 [ 310.313156][ T5227] should_fail+0xb/0x10 [ 310.317321][ T5227] should_fail_usercopy+0x1a/0x20 [ 310.322347][ T5227] _copy_from_user+0x1e/0xc0 [ 310.326949][ T5227] br_ioctl_stub+0x358/0x880 [ 310.331572][ T5227] ? __cfi_br_ioctl_stub+0x10/0x10 [ 310.336704][ T5227] ? vfs_write+0x9d6/0xca0 [ 310.341499][ T5227] ? slab_free_freelist_hook+0xc2/0x190 [ 310.347125][ T5227] ? __kasan_check_write+0x14/0x20 [ 310.352264][ T5227] ? mutex_lock+0x8d/0x1a0 [ 310.356696][ T5227] ? __cfi_mutex_lock+0x10/0x10 [ 310.361647][ T5227] ? selinux_file_ioctl+0x377/0x480 [ 310.366951][ T5227] ? __cfi_br_ioctl_stub+0x10/0x10 [ 310.372081][ T5227] sock_ioctl+0x304/0x6e0 [ 310.376504][ T5227] ? __cfi_sock_ioctl+0x10/0x10 [ 310.381364][ T5227] ? __fget_files+0x2d5/0x330 [ 310.386055][ T5227] ? security_file_ioctl+0x95/0xc0 [ 310.391191][ T5227] ? __cfi_sock_ioctl+0x10/0x10 [ 310.396062][ T5227] __se_sys_ioctl+0x12f/0x1b0 [ 310.400754][ T5227] __x64_sys_ioctl+0x7b/0x90 [ 310.405438][ T5227] x64_sys_call+0x58b/0x9a0 [ 310.409962][ T5227] do_syscall_64+0x4c/0xa0 [ 310.414479][ T5227] ? clear_bhb_loop+0x30/0x80 [ 310.419249][ T5227] ? clear_bhb_loop+0x30/0x80 [ 310.423929][ T5227] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 310.429829][ T5227] RIP: 0033:0x7fd31a58ebe9 [ 310.434236][ T5227] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 310.453929][ T5227] RSP: 002b:00007fd31b36f038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 310.462394][ T5227] RAX: ffffffffffffffda RBX: 00007fd31a7b5fa0 RCX: 00007fd31a58ebe9 [ 310.470371][ T5227] RDX: 0000200000000900 RSI: 00000000000089a1 RDI: 0000000000000009 [ 310.478344][ T5227] RBP: 00007fd31b36f090 R08: 0000000000000000 R09: 0000000000000000 [ 310.486403][ T5227] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 310.494439][ T5227] R13: 00007fd31a7b6038 R14: 00007fd31a7b5fa0 R15: 00007ffe24e1b7c8 [ 310.502423][ T5227] [ 310.551621][ T5213] device sit0 left promiscuous mode [ 310.768723][ T5219] device sit0 entered promiscuous mode [ 311.088637][ T5236] device veth1_macvtap left promiscuous mode [ 311.267948][ T5237] device veth1_macvtap entered promiscuous mode [ 311.309498][ T5237] device macsec0 entered promiscuous mode [ 311.333403][ T713] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 311.382888][ T5238] device veth1_macvtap left promiscuous mode [ 311.403371][ T5238] device macsec0 left promiscuous mode [ 311.658292][ T5247] device sit0 left promiscuous mode [ 311.811959][ T5250] device sit0 entered promiscuous mode [ 312.551685][ T28] audit: type=1400 audit(1755847331.315:116): avc: denied { create } for pid=5261 comm="syz.4.1298" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=qipcrtr_socket permissive=1 [ 312.758789][ T5256] device sit0 left promiscuous mode [ 312.965701][ T5257] device sit0 entered promiscuous mode [ 313.541055][ T5272] device veth0_vlan left promiscuous mode [ 313.556273][ T5272] device veth0_vlan entered promiscuous mode [ 313.616122][ T5278] device sit0 left promiscuous mode [ 313.651531][ T5274] device veth0_vlan left promiscuous mode [ 313.677644][ T5274] device veth0_vlan entered promiscuous mode [ 313.694885][ T334] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 313.765513][ T334] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 313.775404][ T334] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 313.791252][ T334] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 313.803449][ T334] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 313.811842][ T334] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 313.838929][ T5278] device sit0 entered promiscuous mode [ 314.183077][ T5285] device veth0_vlan left promiscuous mode [ 314.308465][ T5285] device veth0_vlan entered promiscuous mode [ 316.073312][ T5304] device sit0 left promiscuous mode [ 316.192133][ T5309] device sit0 entered promiscuous mode [ 316.359954][ T5314] device sit0 left promiscuous mode [ 316.578680][ T5306] device sit0 left promiscuous mode [ 316.686705][ T5312] device sit0 entered promiscuous mode [ 316.700703][ T5315] device sit0 entered promiscuous mode [ 317.220458][ T5320] device sit0 left promiscuous mode [ 317.506368][ T5331] device sit0 left promiscuous mode [ 317.652554][ T5325] device veth0_vlan left promiscuous mode [ 317.668301][ T5325] device veth0_vlan entered promiscuous mode [ 317.724759][ T5328] device sit0 entered promiscuous mode [ 318.271568][ T5339] device veth0_vlan left promiscuous mode [ 318.438182][ T5339] device veth0_vlan entered promiscuous mode [ 318.687141][ T5348] device sit0 left promiscuous mode [ 318.958234][ T5356] device sit0 entered promiscuous mode [ 319.335312][ T5349] device sit0 entered promiscuous mode [ 320.258686][ T5370] device sit0 left promiscuous mode [ 320.376398][ T5371] device sit0 entered promiscuous mode [ 320.679384][ T5377] device sit0 left promiscuous mode [ 320.770723][ T5380] device sit0 entered promiscuous mode [ 321.230289][ T5379] device veth0_vlan left promiscuous mode [ 321.236787][ T5379] device veth0_vlan entered promiscuous mode [ 321.283209][ T5387] device sit0 left promiscuous mode [ 321.447569][ T5390] device sit0 entered promiscuous mode [ 321.595964][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 321.630798][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 321.765610][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 321.842543][ T5404] device sit0 left promiscuous mode [ 321.998701][ T5399] device sit0 entered promiscuous mode [ 323.779738][ T5426] FAULT_INJECTION: forcing a failure. [ 323.779738][ T5426] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 324.032471][ T5426] CPU: 0 PID: 5426 Comm: syz.4.1340 Not tainted syzkaller #0 [ 324.039898][ T5426] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 324.050066][ T5426] Call Trace: [ 324.053440][ T5426] [ 324.056378][ T5426] __dump_stack+0x21/0x24 [ 324.060729][ T5426] dump_stack_lvl+0xee/0x150 [ 324.065316][ T5426] ? __cfi_dump_stack_lvl+0x8/0x8 [ 324.070343][ T5426] dump_stack+0x15/0x24 [ 324.074498][ T5426] should_fail_ex+0x3d4/0x520 [ 324.079174][ T5426] should_fail+0xb/0x10 [ 324.083336][ T5426] should_fail_usercopy+0x1a/0x20 [ 324.088356][ T5426] _copy_from_user+0x1e/0xc0 [ 324.093040][ T5426] __sys_bpf+0x277/0x780 [ 324.097290][ T5426] ? bpf_link_show_fdinfo+0x320/0x320 [ 324.103103][ T5426] ? __cfi_ksys_write+0x10/0x10 [ 324.107959][ T5426] ? debug_smp_processor_id+0x17/0x20 [ 324.113325][ T5426] __x64_sys_bpf+0x7c/0x90 [ 324.117785][ T5426] x64_sys_call+0x488/0x9a0 [ 324.122400][ T5426] do_syscall_64+0x4c/0xa0 [ 324.126825][ T5426] ? clear_bhb_loop+0x30/0x80 [ 324.131776][ T5426] ? clear_bhb_loop+0x30/0x80 [ 324.136448][ T5426] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 324.142340][ T5426] RIP: 0033:0x7f65e818ebe9 [ 324.146760][ T5426] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 324.167152][ T5426] RSP: 002b:00007f65e9074038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 324.175848][ T5426] RAX: ffffffffffffffda RBX: 00007f65e83b6090 RCX: 00007f65e818ebe9 [ 324.183909][ T5426] RDX: 0000000000000010 RSI: 0000200000000040 RDI: 0000000000000011 [ 324.191897][ T5426] RBP: 00007f65e9074090 R08: 0000000000000000 R09: 0000000000000000 [ 324.199975][ T5426] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 324.207955][ T5426] R13: 00007f65e83b6128 R14: 00007f65e83b6090 R15: 00007ffefe8cfdd8 [ 324.215942][ T5426] [ 324.268325][ T5418] device sit0 left promiscuous mode [ 324.389478][ T5419] device sit0 entered promiscuous mode [ 326.347353][ T5445] device sit0 left promiscuous mode [ 326.794764][ T5459] device veth0_vlan left promiscuous mode [ 326.808376][ T5459] device veth0_vlan entered promiscuous mode [ 326.970395][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 326.987016][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 327.140997][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 327.207398][ T5471] device sit0 entered promiscuous mode [ 327.394534][ T5472] device sit0 left promiscuous mode [ 327.518302][ T5456] device veth1_macvtap left promiscuous mode [ 327.525528][ T5456] device macsec0 left promiscuous mode [ 327.611770][ T5474] device sit0 entered promiscuous mode [ 327.894686][ T5463] device sit0 left promiscuous mode [ 328.010022][ T5473] device sit0 entered promiscuous mode [ 330.407533][ T28] audit: type=1400 audit(1755847349.175:117): avc: denied { cpu } for pid=5496 comm="syz.1.1360" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=1 [ 331.903804][ T5516] device sit0 left promiscuous mode [ 332.653215][ T5529] device veth0_vlan left promiscuous mode [ 332.691834][ T5529] device veth0_vlan entered promiscuous mode [ 332.840006][ T5535] FAULT_INJECTION: forcing a failure. [ 332.840006][ T5535] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 332.853406][ T5535] CPU: 0 PID: 5535 Comm: syz.4.1368 Not tainted syzkaller #0 [ 332.860791][ T5535] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 332.870853][ T5535] Call Trace: [ 332.874134][ T5535] [ 332.877069][ T5535] __dump_stack+0x21/0x24 [ 332.881403][ T5535] dump_stack_lvl+0xee/0x150 [ 332.886032][ T5535] ? __cfi_dump_stack_lvl+0x8/0x8 [ 332.891152][ T5535] dump_stack+0x15/0x24 [ 332.895327][ T5535] should_fail_ex+0x3d4/0x520 [ 332.900117][ T5535] should_fail+0xb/0x10 [ 332.904500][ T5535] should_fail_usercopy+0x1a/0x20 [ 332.909537][ T5535] _copy_from_user+0x1e/0xc0 [ 332.914138][ T5535] update_filter+0x93/0x6d0 [ 332.918662][ T5535] ? set_offload+0x170/0x170 [ 332.923268][ T5535] ? vfs_write+0x9d6/0xca0 [ 332.927704][ T5535] __tun_chr_ioctl+0x1177/0x1e70 [ 332.932653][ T5535] ? tun_flow_create+0x320/0x320 [ 332.937671][ T5535] ? irqentry_exit+0x37/0x40 [ 332.942277][ T5535] ? __cfi_tun_chr_ioctl+0x10/0x10 [ 332.947401][ T5535] tun_chr_ioctl+0x2a/0x40 [ 332.951842][ T5535] ? __cfi_tun_chr_ioctl+0x10/0x10 [ 332.957087][ T5535] __se_sys_ioctl+0x12f/0x1b0 [ 332.961780][ T5535] __x64_sys_ioctl+0x7b/0x90 [ 332.966390][ T5535] x64_sys_call+0x58b/0x9a0 [ 332.970986][ T5535] do_syscall_64+0x4c/0xa0 [ 332.975418][ T5535] ? clear_bhb_loop+0x30/0x80 [ 332.980104][ T5535] ? clear_bhb_loop+0x30/0x80 [ 332.984789][ T5535] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 332.990701][ T5535] RIP: 0033:0x7f65e818ebe9 [ 332.995120][ T5535] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 333.014817][ T5535] RSP: 002b:00007f65e9074038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 333.023327][ T5535] RAX: ffffffffffffffda RBX: 00007f65e83b6090 RCX: 00007f65e818ebe9 [ 333.031389][ T5535] RDX: 00002000000000c0 RSI: 00000000400454d1 RDI: 0000000000000003 [ 333.039363][ T5535] RBP: 00007f65e9074090 R08: 0000000000000000 R09: 0000000000000000 [ 333.047396][ T5535] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 333.055546][ T5535] R13: 00007f65e83b6128 R14: 00007f65e83b6090 R15: 00007ffefe8cfdd8 [ 333.063583][ T5535] [ 333.370925][ T5542] FAULT_INJECTION: forcing a failure. [ 333.370925][ T5542] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 333.444172][ T5542] CPU: 1 PID: 5542 Comm: syz.4.1371 Not tainted syzkaller #0 [ 333.451585][ T5542] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 333.461659][ T5542] Call Trace: [ 333.464940][ T5542] [ 333.467903][ T5542] __dump_stack+0x21/0x24 [ 333.472242][ T5542] dump_stack_lvl+0xee/0x150 [ 333.476939][ T5542] ? __cfi_dump_stack_lvl+0x8/0x8 [ 333.482068][ T5542] dump_stack+0x15/0x24 [ 333.486250][ T5542] should_fail_ex+0x3d4/0x520 [ 333.491049][ T5542] should_fail+0xb/0x10 [ 333.495298][ T5542] should_fail_usercopy+0x1a/0x20 [ 333.500323][ T5542] _copy_from_user+0x1e/0xc0 [ 333.504998][ T5542] ___sys_recvmsg+0x12b/0x510 [ 333.509682][ T5542] ? __sys_recvmsg+0x270/0x270 [ 333.514445][ T5542] ? security_file_permission+0x94/0xb0 [ 333.519996][ T5542] ? __fget_files+0x2d5/0x330 [ 333.524688][ T5542] ? __fdget+0x19c/0x220 [ 333.528929][ T5542] __x64_sys_recvmsg+0x1ed/0x2c0 [ 333.533872][ T5542] ? __cfi___x64_sys_recvmsg+0x10/0x10 [ 333.539331][ T5542] ? fpregs_assert_state_consistent+0xb1/0xe0 [ 333.545394][ T5542] x64_sys_call+0x75/0x9a0 [ 333.549805][ T5542] do_syscall_64+0x4c/0xa0 [ 333.554222][ T5542] ? clear_bhb_loop+0x30/0x80 [ 333.558890][ T5542] ? clear_bhb_loop+0x30/0x80 [ 333.563562][ T5542] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 333.569708][ T5542] RIP: 0033:0x7f65e818ebe9 [ 333.574220][ T5542] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 333.594107][ T5542] RSP: 002b:00007f65e9095038 EFLAGS: 00000246 ORIG_RAX: 000000000000002f [ 333.602719][ T5542] RAX: ffffffffffffffda RBX: 00007f65e83b5fa0 RCX: 00007f65e818ebe9 [ 333.610699][ T5542] RDX: 0000000000001f00 RSI: 0000200000000500 RDI: 0000000000000004 [ 333.618680][ T5542] RBP: 00007f65e9095090 R08: 0000000000000000 R09: 0000000000000000 [ 333.626920][ T5542] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 333.634908][ T5542] R13: 00007f65e83b6038 R14: 00007f65e83b5fa0 R15: 00007ffefe8cfdd8 [ 333.642882][ T5542] [ 333.777815][ T5545] device sit0 left promiscuous mode [ 333.840625][ T5545] device sit0 entered promiscuous mode [ 335.241951][ T5567] device sit0 left promiscuous mode [ 338.945207][ T5602] device veth0_vlan left promiscuous mode [ 338.964291][ T5602] device veth0_vlan entered promiscuous mode [ 338.974256][ T713] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 338.985717][ T713] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 338.993447][ T713] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 339.978659][ T5605] device veth0_vlan left promiscuous mode [ 340.034995][ T5605] device veth0_vlan entered promiscuous mode [ 340.297231][ T5613] device sit0 left promiscuous mode [ 340.404981][ T5615] device sit0 entered promiscuous mode [ 340.496409][ T5623] device sit0 entered promiscuous mode [ 342.710718][ T5647] device sit0 left promiscuous mode [ 342.823137][ T5648] device sit0 entered promiscuous mode [ 343.953105][ T5662] device veth0_vlan left promiscuous mode [ 344.067811][ T5662] device veth0_vlan entered promiscuous mode [ 344.267451][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 344.294647][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 344.368476][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 344.384301][ T5653] device veth0_vlan left promiscuous mode [ 344.392050][ T5653] device veth0_vlan entered promiscuous mode [ 344.449035][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 344.462568][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 344.470519][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 345.460778][ T5666] device sit0 entered promiscuous mode [ 345.711234][ T5684] device veth0_vlan left promiscuous mode [ 345.771359][ T5684] device veth0_vlan entered promiscuous mode [ 346.156921][ T5697] device veth0_vlan left promiscuous mode [ 346.227880][ T5697] device veth0_vlan entered promiscuous mode [ 346.305607][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 346.330105][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 346.338259][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 346.345986][ T5698] device sit0 left promiscuous mode [ 346.368224][ T5699] device sit0 entered promiscuous mode [ 346.452263][ T5700] device veth0_vlan left promiscuous mode [ 346.509485][ T5700] device veth0_vlan entered promiscuous mode [ 346.686977][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 346.715702][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 346.883982][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 347.889613][ T5720] device veth0_vlan left promiscuous mode [ 347.897813][ T5720] device veth0_vlan entered promiscuous mode [ 347.921600][ T5722] device veth0_vlan left promiscuous mode [ 347.950912][ T5722] device veth0_vlan entered promiscuous mode [ 348.056341][ T713] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 348.071123][ T713] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 348.108640][ T713] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 348.122694][ T713] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 348.131333][ T713] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 348.140358][ T713] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 348.583174][ T5736] device sit0 left promiscuous mode [ 349.835824][ T5750] device sit0 left promiscuous mode [ 349.881729][ T5752] device sit0 entered promiscuous mode [ 349.940880][ T5751] device veth0_vlan left promiscuous mode [ 349.976602][ T5751] device veth0_vlan entered promiscuous mode [ 351.361761][ T5769] device veth0_vlan left promiscuous mode [ 351.512016][ T5769] device veth0_vlan entered promiscuous mode [ 351.593511][ T713] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 351.602662][ T713] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 351.610452][ T713] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 351.711443][ T5780] device sit0 left promiscuous mode [ 352.079287][ T5787] device sit0 entered promiscuous mode [ 352.858454][ T5799] device sit0 left promiscuous mode [ 353.397430][ T5801] device sit0 entered promiscuous mode [ 354.077220][ T5804] device sit0 entered promiscuous mode [ 355.028241][ T5829] device veth0_vlan left promiscuous mode [ 355.103678][ T5829] device veth0_vlan entered promiscuous mode [ 355.202223][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 355.230915][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 355.293310][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 356.209102][ T5847] device veth0_vlan left promiscuous mode [ 356.284378][ T5847] device veth0_vlan entered promiscuous mode [ 356.328793][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 356.420926][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 356.504372][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 356.598475][ T5858] device sit0 left promiscuous mode [ 357.671575][ T5866] device sit0 entered promiscuous mode [ 358.001529][ T5867] device veth0_vlan left promiscuous mode [ 358.108005][ T5867] device veth0_vlan entered promiscuous mode [ 360.510799][ T5913] device sit0 left promiscuous mode [ 360.746515][ T5914] device sit0 entered promiscuous mode [ 364.663185][ T5959] device sit0 left promiscuous mode [ 365.206274][ T5957] device sit0 entered promiscuous mode [ 365.450535][ T5970] device sit0 left promiscuous mode [ 365.640192][ T5971] device sit0 entered promiscuous mode [ 368.249079][ T6003] FAULT_INJECTION: forcing a failure. [ 368.249079][ T6003] name fail_page_alloc, interval 1, probability 0, space 0, times 1 [ 368.356271][ T6003] CPU: 1 PID: 6003 Comm: syz.2.1499 Not tainted syzkaller #0 [ 368.363684][ T6003] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 368.373847][ T6003] Call Trace: [ 368.377262][ T6003] [ 368.380471][ T6003] __dump_stack+0x21/0x24 [ 368.384861][ T6003] dump_stack_lvl+0xee/0x150 [ 368.389467][ T6003] ? __cfi_dump_stack_lvl+0x8/0x8 [ 368.394595][ T6003] ? __cfi_perf_output_begin_forward+0x10/0x10 [ 368.400764][ T6003] dump_stack+0x15/0x24 [ 368.404923][ T6003] should_fail_ex+0x3d4/0x520 [ 368.409604][ T6003] should_fail_alloc_page+0x61/0x90 [ 368.414808][ T6003] prepare_alloc_pages+0x148/0x5f0 [ 368.419929][ T6003] ? __alloc_pages_bulk+0x9c0/0x9c0 [ 368.425133][ T6003] __alloc_pages+0x124/0x450 [ 368.429868][ T6003] ? __cfi___alloc_pages+0x10/0x10 [ 368.434990][ T6003] ? __cfi_mutex_lock+0x10/0x10 [ 368.439856][ T6003] ? __cfi_avc_has_perm+0x10/0x10 [ 368.444903][ T6003] pipe_write+0x592/0x1950 [ 368.449334][ T6003] ? irqentry_exit+0x37/0x40 [ 368.454104][ T6003] ? __cfi_pipe_write+0x10/0x10 [ 368.458960][ T6003] ? asm_sysvec_apic_timer_interrupt+0x1b/0x20 [ 368.465117][ T6003] vfs_write+0x5db/0xca0 [ 368.469365][ T6003] ? __cfi_vfs_write+0x10/0x10 [ 368.474135][ T6003] ? __fget_files+0x2d5/0x330 [ 368.478823][ T6003] ? __fdget_pos+0x1f2/0x380 [ 368.483495][ T6003] ? ksys_write+0x71/0x240 [ 368.487950][ T6003] ksys_write+0x140/0x240 [ 368.492365][ T6003] ? __cfi_ksys_write+0x10/0x10 [ 368.497307][ T6003] __x64_sys_write+0x7b/0x90 [ 368.501938][ T6003] x64_sys_call+0x27b/0x9a0 [ 368.506445][ T6003] do_syscall_64+0x4c/0xa0 [ 368.510948][ T6003] ? clear_bhb_loop+0x30/0x80 [ 368.515647][ T6003] ? clear_bhb_loop+0x30/0x80 [ 368.520340][ T6003] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 368.526249][ T6003] RIP: 0033:0x7f269878ebe9 [ 368.530768][ T6003] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 368.550563][ T6003] RSP: 002b:00007f269968a038 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 368.558995][ T6003] RAX: ffffffffffffffda RBX: 00007f26989b5fa0 RCX: 00007f269878ebe9 [ 368.567152][ T6003] RDX: 00000000fffffdef RSI: 00002000000001c0 RDI: 0000000000000000 [ 368.575127][ T6003] RBP: 00007f269968a090 R08: 0000000000000000 R09: 0000000000000000 [ 368.583369][ T6003] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 368.591339][ T6003] R13: 00007f26989b6038 R14: 00007f26989b5fa0 R15: 00007ffdfbc50458 [ 368.599353][ T6003] [ 368.827510][ T6009] device sit0 left promiscuous mode [ 369.228390][ T6006] device sit0 entered promiscuous mode [ 369.487596][ T6027] device sit0 left promiscuous mode [ 369.592216][ T6028] device sit0 entered promiscuous mode [ 369.709899][ T6026] device veth0_vlan left promiscuous mode [ 369.736347][ T6026] device veth0_vlan entered promiscuous mode [ 369.808714][ T6017] device sit0 left promiscuous mode [ 370.062819][ T6032] device veth0_vlan left promiscuous mode [ 370.088048][ T6032] device veth0_vlan entered promiscuous mode [ 370.125017][ T6017] device sit0 entered promiscuous mode [ 370.386210][ T6041] device sit0 left promiscuous mode [ 372.811484][ T6066] device sit0 left promiscuous mode [ 373.026372][ T6068] device sit0 entered promiscuous mode [ 374.804540][ T6086] device veth0_vlan left promiscuous mode [ 374.838172][ T6086] device veth0_vlan entered promiscuous mode [ 374.948928][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 374.976525][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 375.032715][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 375.046879][ T6096] device sit0 entered promiscuous mode [ 375.604744][ T6111] device sit0 left promiscuous mode [ 375.655154][ T6111] device sit0 entered promiscuous mode [ 376.739702][ T6127] device sit0 left promiscuous mode [ 376.825821][ T6121] device veth0_vlan left promiscuous mode [ 376.850057][ T6121] device veth0_vlan entered promiscuous mode [ 376.909870][ T6127] device sit0 entered promiscuous mode [ 376.951550][ T713] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 376.962580][ T713] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 376.976837][ T713] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 379.976126][ C0] sched: RT throttling activated [ 380.389900][ T6147] device veth0_vlan left promiscuous mode [ 380.449083][ T6147] device veth0_vlan entered promiscuous mode [ 380.534128][ T334] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 380.570576][ T334] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 380.625789][ T334] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 380.936497][ T6151] device veth0_vlan left promiscuous mode [ 381.067810][ T6151] device veth0_vlan entered promiscuous mode [ 381.198878][ T6155] device sit0 left promiscuous mode [ 381.451365][ T6156] device sit0 entered promiscuous mode [ 381.566478][ T6164] device sit0 left promiscuous mode [ 381.841833][ T6165] device sit0 entered promiscuous mode [ 382.070727][ T6168] device veth0_vlan left promiscuous mode [ 382.139698][ T6168] device veth0_vlan entered promiscuous mode [ 382.162158][ T713] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 382.186691][ T713] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 382.194348][ T713] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 384.828158][ T6190] device veth0_vlan left promiscuous mode [ 384.855184][ T6190] device veth0_vlan entered promiscuous mode [ 387.366438][ T6209] device veth0_vlan left promiscuous mode [ 387.406491][ T6209] device veth0_vlan entered promiscuous mode [ 387.554271][ T6212] device sit0 left promiscuous mode [ 387.735687][ T6215] device sit0 entered promiscuous mode [ 388.003953][ T6223] device sit0 left promiscuous mode [ 388.361354][ T6227] device veth0_vlan left promiscuous mode [ 388.378604][ T6227] device veth0_vlan entered promiscuous mode [ 388.428186][ T334] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 388.436981][ T334] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 388.444910][ T334] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 390.897621][ T6252] syz.1.1566[6252] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 390.897723][ T6252] syz.1.1566[6252] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 391.020150][ T6251] device veth0_vlan left promiscuous mode [ 391.091570][ T6251] device veth0_vlan entered promiscuous mode [ 391.143949][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 391.167010][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 391.253649][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 393.383206][ T6252] syz.1.1566[6252] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 393.383325][ T6252] syz.1.1566[6252] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 395.071268][ T6279] device sit0 left promiscuous mode [ 395.191241][ T6280] device sit0 entered promiscuous mode [ 397.303249][ T6291] device veth0_vlan left promiscuous mode [ 397.309508][ T6291] device veth0_vlan entered promiscuous mode [ 397.320982][ T6292] device veth0_vlan left promiscuous mode [ 397.333111][ T6292] device veth0_vlan entered promiscuous mode [ 397.404208][ T334] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 397.457212][ T334] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 397.529503][ T334] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 397.697191][ T6308] device sit0 entered promiscuous mode [ 398.579407][ T6313] device sit0 left promiscuous mode [ 398.619932][ T6316] device sit0 entered promiscuous mode [ 400.083138][ T6336] device sit0 left promiscuous mode [ 400.140328][ T6339] device sit0 entered promiscuous mode [ 400.932856][ T6343] device veth0_vlan left promiscuous mode [ 401.043025][ T6343] device veth0_vlan entered promiscuous mode [ 401.093027][ T6346] device veth0_vlan left promiscuous mode [ 401.101814][ T6346] device veth0_vlan entered promiscuous mode [ 401.115277][ T334] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 401.125885][ T334] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 401.135101][ T334] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 401.143120][ T334] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 401.152216][ T334] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 401.160177][ T334] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 401.672111][ T6360] device sit0 left promiscuous mode [ 401.886732][ T6362] device sit0 left promiscuous mode [ 402.141491][ T6361] device sit0 entered promiscuous mode [ 402.197698][ T6357] device sit0 entered promiscuous mode [ 402.980893][ T6383] device sit0 left promiscuous mode [ 403.266937][ T6377] device sit0 entered promiscuous mode [ 403.434825][ T6375] device sit0 left promiscuous mode [ 403.639042][ T6389] device sit0 entered promiscuous mode [ 405.297860][ T28] audit: type=1400 audit(1755847424.045:118): avc: denied { create } for pid=6404 comm="syz.2.1609" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=ax25_socket permissive=1 [ 405.500628][ T6401] device sit0 left promiscuous mode [ 405.718775][ T6415] device sit0 left promiscuous mode [ 405.811272][ T6416] device sit0 entered promiscuous mode [ 405.844884][ T6417] device sit0 entered promiscuous mode [ 406.380610][ T6428] device sit0 left promiscuous mode [ 406.728279][ T6438] device sit0 entered promiscuous mode [ 406.798709][ T6445] device veth0_vlan left promiscuous mode [ 406.867877][ T6445] device veth0_vlan entered promiscuous mode [ 409.010854][ T6470] FAULT_INJECTION: forcing a failure. [ 409.010854][ T6470] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 409.073594][ T6470] CPU: 1 PID: 6470 Comm: syz.4.1625 Not tainted syzkaller #0 [ 409.081007][ T6470] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 409.091070][ T6470] Call Trace: [ 409.094361][ T6470] [ 409.097288][ T6470] __dump_stack+0x21/0x24 [ 409.101710][ T6470] dump_stack_lvl+0xee/0x150 [ 409.106400][ T6470] ? __cfi_dump_stack_lvl+0x8/0x8 [ 409.111539][ T6470] dump_stack+0x15/0x24 [ 409.115718][ T6470] should_fail_ex+0x3d4/0x520 [ 409.120492][ T6470] should_fail+0xb/0x10 [ 409.124743][ T6470] should_fail_usercopy+0x1a/0x20 [ 409.129766][ T6470] _copy_from_user+0x1e/0xc0 [ 409.134365][ T6470] __sys_bpf+0x277/0x780 [ 409.138624][ T6470] ? bpf_link_show_fdinfo+0x320/0x320 [ 409.144127][ T6470] ? __cfi_ksys_write+0x10/0x10 [ 409.148992][ T6470] ? debug_smp_processor_id+0x17/0x20 [ 409.154456][ T6470] __x64_sys_bpf+0x7c/0x90 [ 409.158975][ T6470] x64_sys_call+0x488/0x9a0 [ 409.163673][ T6470] do_syscall_64+0x4c/0xa0 [ 409.168129][ T6470] ? clear_bhb_loop+0x30/0x80 [ 409.172822][ T6470] ? clear_bhb_loop+0x30/0x80 [ 409.177529][ T6470] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 409.183522][ T6470] RIP: 0033:0x7f65e818ebe9 [ 409.187941][ T6470] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 409.207728][ T6470] RSP: 002b:00007f65e9095038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 409.216135][ T6470] RAX: ffffffffffffffda RBX: 00007f65e83b5fa0 RCX: 00007f65e818ebe9 [ 409.224185][ T6470] RDX: 0000000000000020 RSI: 0000200000000080 RDI: 0000000000000004 [ 409.232144][ T6470] RBP: 00007f65e9095090 R08: 0000000000000000 R09: 0000000000000000 [ 409.240116][ T6470] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 409.248326][ T6470] R13: 00007f65e83b6038 R14: 00007f65e83b5fa0 R15: 00007ffefe8cfdd8 [ 409.256396][ T6470] [ 409.276415][ T6467] device sit0 left promiscuous mode [ 409.593144][ T6471] device sit0 entered promiscuous mode [ 410.105921][ T6486] device veth0_vlan left promiscuous mode [ 410.144070][ T6486] device veth0_vlan entered promiscuous mode [ 410.174730][ T6493] syz.2.1630[6493] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 410.176858][ T6493] syz.2.1630[6493] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 410.294531][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 410.394711][ T6486] syz.2.1630[6486] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 410.404108][ T6486] syz.2.1630[6486] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 410.406264][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 410.435370][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 410.459529][ T6494] device veth0_vlan left promiscuous mode [ 410.478548][ T6494] device veth0_vlan entered promiscuous mode [ 410.514207][ T6488] device sit0 left promiscuous mode [ 410.728593][ T6496] device sit0 entered promiscuous mode [ 412.053682][ T6521] device sit0 left promiscuous mode [ 412.237079][ T6524] device sit0 entered promiscuous mode [ 413.060836][ T6538] device sit0 left promiscuous mode [ 413.130054][ T6542] device sit0 entered promiscuous mode [ 413.246470][ T28] audit: type=1400 audit(1755847431.975:119): avc: denied { create } for pid=6547 comm="syz.2.1647" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 413.636603][ T6553] device veth0_vlan left promiscuous mode [ 413.754770][ T6553] device veth0_vlan entered promiscuous mode [ 413.892419][ T713] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 413.986887][ T713] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 414.004571][ T713] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 417.961491][ T6583] device sit0 left promiscuous mode [ 418.098718][ T6585] device sit0 entered promiscuous mode [ 418.314442][ T6592] device sit0 left promiscuous mode [ 418.621355][ T6595] device sit0 entered promiscuous mode [ 418.804221][ T6596] device veth0_vlan left promiscuous mode [ 418.843353][ T6596] device veth0_vlan entered promiscuous mode [ 419.277133][ T6602] device veth0_vlan left promiscuous mode [ 419.332366][ T6602] device veth0_vlan entered promiscuous mode [ 419.724254][ T6616] device veth0_vlan left promiscuous mode [ 419.833094][ T6616] device veth0_vlan entered promiscuous mode [ 420.914928][ T6632] device veth0_vlan left promiscuous mode [ 421.008833][ T6632] device veth0_vlan entered promiscuous mode [ 421.039903][ T334] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 421.204814][ T334] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 421.244553][ T334] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 421.486687][ T6641] device sit0 left promiscuous mode [ 421.593082][ T6642] device sit0 left promiscuous mode [ 421.825456][ T6638] device sit0 entered promiscuous mode [ 421.840347][ T6634] device sit0 entered promiscuous mode [ 422.280057][ T6650] device veth0_vlan left promiscuous mode [ 422.324123][ T6650] device veth0_vlan entered promiscuous mode [ 422.755688][ T6661] device veth0_vlan left promiscuous mode [ 422.834763][ T6661] device veth0_vlan entered promiscuous mode [ 423.394835][ T6672] device veth0_vlan left promiscuous mode [ 423.429618][ T6672] device veth0_vlan entered promiscuous mode [ 423.843883][ T6684] device veth0_vlan left promiscuous mode [ 424.095284][ T6684] device veth0_vlan entered promiscuous mode [ 424.254878][ T6688] device sit0 left promiscuous mode [ 424.277306][ T6687] device sit0 entered promiscuous mode [ 424.586329][ T6698] device sit0 left promiscuous mode [ 424.730570][ T6696] device sit0 entered promiscuous mode [ 424.899532][ T6702] FAULT_INJECTION: forcing a failure. [ 424.899532][ T6702] name failslab, interval 1, probability 0, space 0, times 0 [ 424.912153][ T6702] CPU: 1 PID: 6702 Comm: syz.0.1690 Not tainted syzkaller #0 [ 424.919539][ T6702] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 424.929773][ T6702] Call Trace: [ 424.933050][ T6702] [ 424.935970][ T6702] __dump_stack+0x21/0x24 [ 424.940298][ T6702] dump_stack_lvl+0xee/0x150 [ 424.944980][ T6702] ? __cfi_dump_stack_lvl+0x8/0x8 [ 424.950011][ T6702] ? _raw_spin_lock_irqsave+0xb0/0x110 [ 424.955562][ T6702] ? __cfi__raw_spin_lock_irqsave+0x10/0x10 [ 424.961552][ T6702] dump_stack+0x15/0x24 [ 424.965881][ T6702] should_fail_ex+0x3d4/0x520 [ 424.970723][ T6702] __should_failslab+0xac/0xf0 [ 424.975570][ T6702] ? ref_tracker_alloc+0x139/0x430 [ 424.980758][ T6702] should_failslab+0x9/0x20 [ 424.985254][ T6702] __kmem_cache_alloc_node+0x3d/0x2c0 [ 424.990702][ T6702] ? ref_tracker_alloc+0x139/0x430 [ 424.995886][ T6702] kmalloc_trace+0x29/0xb0 [ 425.000284][ T6702] ref_tracker_alloc+0x139/0x430 [ 425.005207][ T6702] ? __cfi_ref_tracker_alloc+0x10/0x10 [ 425.010741][ T6702] ? __kasan_check_read+0x11/0x20 [ 425.015856][ T6702] ? linkwatch_urgent_event+0x3ac/0x430 [ 425.021419][ T6702] linkwatch_fire_event+0x1d2/0x240 [ 425.026607][ T6702] netif_carrier_off+0x9c/0xc0 [ 425.031417][ T6702] __tun_detach+0xc1c/0x1460 [ 425.036126][ T6702] tun_chr_close+0x92/0x140 [ 425.040646][ T6702] ? __cfi_tun_chr_close+0x10/0x10 [ 425.045833][ T6702] __fput+0x1fc/0x8f0 [ 425.049802][ T6702] ____fput+0x15/0x20 [ 425.053775][ T6702] task_work_run+0x1db/0x240 [ 425.058391][ T6702] ? __cfi_task_work_run+0x10/0x10 [ 425.063524][ T6702] ? filp_close+0x111/0x160 [ 425.068009][ T6702] exit_to_user_mode_loop+0x9b/0xb0 [ 425.073201][ T6702] exit_to_user_mode_prepare+0x5a/0xa0 [ 425.078644][ T6702] syscall_exit_to_user_mode+0x1a/0x30 [ 425.084090][ T6702] do_syscall_64+0x58/0xa0 [ 425.088503][ T6702] ? clear_bhb_loop+0x30/0x80 [ 425.093186][ T6702] ? clear_bhb_loop+0x30/0x80 [ 425.097960][ T6702] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 425.103943][ T6702] RIP: 0033:0x7fd31a58ebe9 [ 425.108542][ T6702] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 425.128426][ T6702] RSP: 002b:00007fd31b36f038 EFLAGS: 00000246 ORIG_RAX: 0000000000000003 [ 425.136905][ T6702] RAX: 0000000000000000 RBX: 00007fd31a7b5fa0 RCX: 00007fd31a58ebe9 [ 425.144969][ T6702] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000003 [ 425.152938][ T6702] RBP: 00007fd31b36f090 R08: 0000000000000000 R09: 0000000000000000 [ 425.160892][ T6702] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 425.169021][ T6702] R13: 00007fd31a7b6038 R14: 00007fd31a7b5fa0 R15: 00007ffe24e1b7c8 [ 425.176983][ T6702] [ 425.179991][ T6702] memory allocation failure, unreliable refcount tracker. [ 425.350991][ T6705] device sit0 left promiscuous mode [ 425.393392][ T6705] device sit0 entered promiscuous mode [ 426.189693][ T6723] FAULT_INJECTION: forcing a failure. [ 426.189693][ T6723] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 426.206116][ T6721] device veth0_vlan left promiscuous mode [ 426.238165][ T6721] device veth0_vlan entered promiscuous mode [ 426.244859][ T6723] CPU: 0 PID: 6723 Comm: syz.4.1696 Not tainted syzkaller #0 [ 426.252239][ T6723] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 426.262384][ T6723] Call Trace: [ 426.265663][ T6723] [ 426.268695][ T6723] __dump_stack+0x21/0x24 [ 426.273050][ T6723] dump_stack_lvl+0xee/0x150 [ 426.277658][ T6723] ? __cfi_dump_stack_lvl+0x8/0x8 [ 426.282696][ T6723] dump_stack+0x15/0x24 [ 426.286858][ T6723] should_fail_ex+0x3d4/0x520 [ 426.291668][ T6723] should_fail+0xb/0x10 [ 426.295828][ T6723] should_fail_usercopy+0x1a/0x20 [ 426.300856][ T6723] _copy_from_user+0x1e/0xc0 [ 426.305453][ T6723] __sys_bpf+0x277/0x780 [ 426.309725][ T6723] ? bpf_link_show_fdinfo+0x320/0x320 [ 426.315101][ T6723] ? __cfi_ksys_write+0x10/0x10 [ 426.319961][ T6723] ? debug_smp_processor_id+0x17/0x20 [ 426.325344][ T6723] __x64_sys_bpf+0x7c/0x90 [ 426.329787][ T6723] x64_sys_call+0x488/0x9a0 [ 426.334301][ T6723] do_syscall_64+0x4c/0xa0 [ 426.338730][ T6723] ? clear_bhb_loop+0x30/0x80 [ 426.343588][ T6723] ? clear_bhb_loop+0x30/0x80 [ 426.348310][ T6723] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 426.354859][ T6723] RIP: 0033:0x7f65e818ebe9 [ 426.359428][ T6723] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 426.379057][ T6723] RSP: 002b:00007f65e9095038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 426.387610][ T6723] RAX: ffffffffffffffda RBX: 00007f65e83b5fa0 RCX: 00007f65e818ebe9 [ 426.395698][ T6723] RDX: 000000000000002c RSI: 0000200000000080 RDI: 000000000000000a [ 426.403767][ T6723] RBP: 00007f65e9095090 R08: 0000000000000000 R09: 0000000000000000 [ 426.411745][ T6723] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 426.419721][ T6723] R13: 00007f65e83b6038 R14: 00007f65e83b5fa0 R15: 00007ffefe8cfdd8 [ 426.427702][ T6723] [ 427.033181][ T6728] device veth0_vlan left promiscuous mode [ 427.133755][ T6728] device veth0_vlan entered promiscuous mode [ 427.921480][ T6741] device veth0_vlan left promiscuous mode [ 427.955424][ T6741] device veth0_vlan entered promiscuous mode [ 428.435622][ T6743] device sit0 left promiscuous mode [ 429.542110][ T6753] device sit0 entered promiscuous mode [ 430.141206][ T6756] device sit0 left promiscuous mode [ 430.503726][ T6762] device sit0 entered promiscuous mode [ 430.831994][ T6770] device veth0_vlan left promiscuous mode [ 430.860833][ T6770] device veth0_vlan entered promiscuous mode [ 431.012304][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 431.032262][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 431.077497][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 431.125819][ T6773] device sit0 left promiscuous mode [ 431.180443][ T6776] device sit0 entered promiscuous mode [ 431.523628][ T6783] device sit0 left promiscuous mode [ 431.722265][ T6784] device sit0 entered promiscuous mode [ 432.501317][ T6788] device sit0 left promiscuous mode [ 432.868345][ T6788] device sit0 entered promiscuous mode [ 437.956840][ T6828] device sit0 left promiscuous mode [ 438.022293][ T6827] device veth0_vlan left promiscuous mode [ 438.086722][ T6827] device veth0_vlan entered promiscuous mode [ 438.231305][ T6819] device sit0 left promiscuous mode [ 438.369511][ T6829] device sit0 entered promiscuous mode [ 438.533970][ T6822] device sit0 entered promiscuous mode [ 438.615104][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 438.656631][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 438.770263][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 438.903310][ T6837] device sit0 left promiscuous mode [ 439.059804][ T6838] device sit0 entered promiscuous mode [ 439.369050][ T6848] device veth0_vlan left promiscuous mode [ 439.488895][ T6848] device veth0_vlan entered promiscuous mode [ 439.601444][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 439.644792][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 439.800530][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 441.882270][ T6882] device sit0 left promiscuous mode [ 442.248335][ T6888] device veth0_vlan left promiscuous mode [ 442.320305][ T6888] device veth0_vlan entered promiscuous mode [ 442.453784][ T6900] device sit0 left promiscuous mode [ 442.701193][ T6899] device veth0_vlan left promiscuous mode [ 442.847706][ T6899] device veth0_vlan entered promiscuous mode [ 443.779765][ T6917] FAULT_INJECTION: forcing a failure. [ 443.779765][ T6917] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 443.814858][ T6917] CPU: 0 PID: 6917 Comm: syz.1.1752 Not tainted syzkaller #0 [ 443.822269][ T6917] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 443.832329][ T6917] Call Trace: [ 443.835616][ T6917] [ 443.838555][ T6917] __dump_stack+0x21/0x24 [ 443.843083][ T6917] dump_stack_lvl+0xee/0x150 [ 443.847774][ T6917] ? __cfi_dump_stack_lvl+0x8/0x8 [ 443.852912][ T6917] dump_stack+0x15/0x24 [ 443.857129][ T6917] should_fail_ex+0x3d4/0x520 [ 443.861999][ T6917] should_fail+0xb/0x10 [ 443.866166][ T6917] should_fail_usercopy+0x1a/0x20 [ 443.871204][ T6917] _copy_from_user+0x1e/0xc0 [ 443.875795][ T6917] __sys_bpf+0x277/0x780 [ 443.880041][ T6917] ? bpf_link_show_fdinfo+0x320/0x320 [ 443.885420][ T6917] ? __cfi_ksys_write+0x10/0x10 [ 443.890364][ T6917] ? debug_smp_processor_id+0x17/0x20 [ 443.896262][ T6917] __x64_sys_bpf+0x7c/0x90 [ 443.900694][ T6917] x64_sys_call+0x488/0x9a0 [ 443.905217][ T6917] do_syscall_64+0x4c/0xa0 [ 443.909728][ T6917] ? clear_bhb_loop+0x30/0x80 [ 443.914503][ T6917] ? clear_bhb_loop+0x30/0x80 [ 443.919180][ T6917] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 443.925259][ T6917] RIP: 0033:0x7f084d98ebe9 [ 443.929693][ T6917] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 443.949493][ T6917] RSP: 002b:00007f084e809038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 443.958017][ T6917] RAX: ffffffffffffffda RBX: 00007f084dbb5fa0 RCX: 00007f084d98ebe9 [ 443.966004][ T6917] RDX: 0000000000000010 RSI: 0000200000000f40 RDI: 0000000000000011 [ 443.974153][ T6917] RBP: 00007f084e809090 R08: 0000000000000000 R09: 0000000000000000 [ 443.982131][ T6917] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 443.990108][ T6917] R13: 00007f084dbb6038 R14: 00007f084dbb5fa0 R15: 00007ffca6b5d3a8 [ 443.998084][ T6917] [ 444.005223][ T6911] device sit0 entered promiscuous mode [ 444.920118][ T6937] device sit0 left promiscuous mode [ 445.954588][ T6941] device sit0 entered promiscuous mode [ 446.762569][ T6949] device sit0 left promiscuous mode [ 446.827813][ T6951] device sit0 entered promiscuous mode [ 446.970057][ T6956] device veth0_vlan left promiscuous mode [ 446.979200][ T6956] device veth0_vlan entered promiscuous mode [ 447.233249][ T6962] device veth0_vlan left promiscuous mode [ 447.275152][ T6962] device veth0_vlan entered promiscuous mode [ 447.860293][ T6982] device sit0 entered promiscuous mode [ 450.736370][ T7023] device sit0 left promiscuous mode [ 450.755665][ T7023] device sit0 entered promiscuous mode [ 451.387748][ T7036] device sit0 left promiscuous mode [ 451.482096][ T7039] device sit0 entered promiscuous mode [ 451.843150][ T7042] device sit0 left promiscuous mode [ 452.058390][ T7044] device sit0 entered promiscuous mode [ 452.661998][ T7054] device veth0_vlan left promiscuous mode [ 452.682646][ T7054] device veth0_vlan entered promiscuous mode [ 452.715347][ T346] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 452.730144][ T346] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 452.775380][ T346] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 452.782156][ T7058] FAULT_INJECTION: forcing a failure. [ 452.782156][ T7058] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 452.798440][ T7058] CPU: 1 PID: 7058 Comm: syz.0.1792 Not tainted syzkaller #0 [ 452.805859][ T7058] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 452.815920][ T7058] Call Trace: [ 452.819217][ T7058] [ 452.822147][ T7058] __dump_stack+0x21/0x24 [ 452.826499][ T7058] dump_stack_lvl+0xee/0x150 [ 452.831182][ T7058] ? __cfi_dump_stack_lvl+0x8/0x8 [ 452.836223][ T7058] dump_stack+0x15/0x24 [ 452.840382][ T7058] should_fail_ex+0x3d4/0x520 [ 452.845061][ T7058] should_fail+0xb/0x10 [ 452.849219][ T7058] should_fail_usercopy+0x1a/0x20 [ 452.854273][ T7058] _copy_from_user+0x1e/0xc0 [ 452.858885][ T7058] __sys_bpf+0x277/0x780 [ 452.863260][ T7058] ? bpf_link_show_fdinfo+0x320/0x320 [ 452.868639][ T7058] ? asm_sysvec_apic_timer_interrupt+0x1b/0x20 [ 452.874812][ T7058] __x64_sys_bpf+0x7c/0x90 [ 452.879246][ T7058] x64_sys_call+0x488/0x9a0 [ 452.883773][ T7058] do_syscall_64+0x4c/0xa0 [ 452.888301][ T7058] ? clear_bhb_loop+0x30/0x80 [ 452.893238][ T7058] ? clear_bhb_loop+0x30/0x80 [ 452.898032][ T7058] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 452.903931][ T7058] RIP: 0033:0x7fd31a58ebe9 [ 452.908442][ T7058] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 452.928133][ T7058] RSP: 002b:00007fd31b36f038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 452.936635][ T7058] RAX: ffffffffffffffda RBX: 00007fd31a7b5fa0 RCX: 00007fd31a58ebe9 [ 452.944859][ T7058] RDX: 0000000000000048 RSI: 00002000000002c0 RDI: 000000000000000a [ 452.952965][ T7058] RBP: 00007fd31b36f090 R08: 0000000000000000 R09: 0000000000000000 [ 452.960961][ T7058] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 452.969148][ T7058] R13: 00007fd31a7b6038 R14: 00007fd31a7b5fa0 R15: 00007ffe24e1b7c8 [ 452.977117][ T7058] [ 453.008588][ T7061] device sit0 left promiscuous mode [ 453.055351][ T7061] device sit0 entered promiscuous mode [ 454.219400][ T7081] FAULT_INJECTION: forcing a failure. [ 454.219400][ T7081] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 454.286950][ T7081] CPU: 0 PID: 7081 Comm: syz.1.1800 Not tainted syzkaller #0 [ 454.294465][ T7081] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 454.299891][ T7074] device veth0_vlan left promiscuous mode [ 454.304610][ T7081] Call Trace: [ 454.304619][ T7081] [ 454.304626][ T7081] __dump_stack+0x21/0x24 [ 454.304654][ T7081] dump_stack_lvl+0xee/0x150 [ 454.304675][ T7081] ? __cfi_dump_stack_lvl+0x8/0x8 [ 454.304698][ T7081] dump_stack+0x15/0x24 [ 454.304717][ T7081] should_fail_ex+0x3d4/0x520 [ 454.304738][ T7081] should_fail+0xb/0x10 [ 454.304756][ T7081] should_fail_usercopy+0x1a/0x20 [ 454.304775][ T7081] _copy_from_user+0x1e/0xc0 [ 454.304793][ T7081] sock_do_ioctl+0x186/0x310 [ 454.304813][ T7081] ? sock_show_fdinfo+0xb0/0xb0 [ 454.304832][ T7081] ? selinux_file_ioctl+0x377/0x480 [ 454.304851][ T7081] sock_ioctl+0x4d8/0x6e0 [ 454.304868][ T7081] ? __cfi_sock_ioctl+0x10/0x10 [ 454.304885][ T7081] ? __fget_files+0x2d5/0x330 [ 454.304909][ T7081] ? security_file_ioctl+0x95/0xc0 [ 454.304928][ T7081] ? __cfi_sock_ioctl+0x10/0x10 [ 454.304945][ T7081] __se_sys_ioctl+0x12f/0x1b0 [ 454.304968][ T7081] __x64_sys_ioctl+0x7b/0x90 [ 454.304990][ T7081] x64_sys_call+0x58b/0x9a0 [ 454.305009][ T7081] do_syscall_64+0x4c/0xa0 [ 454.305030][ T7081] ? clear_bhb_loop+0x30/0x80 [ 454.305047][ T7081] ? clear_bhb_loop+0x30/0x80 [ 454.305064][ T7081] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 454.305082][ T7081] RIP: 0033:0x7f084d98ebe9 [ 454.305098][ T7081] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 454.305113][ T7081] RSP: 002b:00007f084e7e8038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 454.305140][ T7081] RAX: ffffffffffffffda RBX: 00007f084dbb6090 RCX: 00007f084d98ebe9 [ 454.412673][ T7074] device veth0_vlan entered promiscuous mode [ 454.415760][ T7081] RDX: 0000200000000040 RSI: 0000000000008914 RDI: 0000000000000006 [ 454.481361][ T7081] RBP: 00007f084e7e8090 R08: 0000000000000000 R09: 0000000000000000 [ 454.489431][ T7081] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 454.497591][ T7081] R13: 00007f084dbb6128 R14: 00007f084dbb6090 R15: 00007ffca6b5d3a8 [ 454.505698][ T7081] [ 454.511045][ T7078] device sit0 left promiscuous mode [ 454.532482][ T7080] device sit0 left promiscuous mode [ 454.554523][ T7082] device sit0 entered promiscuous mode [ 454.694359][ T28] audit: type=1400 audit(1755847473.455:120): avc: denied { read } for pid=7085 comm="syz.0.1801" name="ppp" dev="devtmpfs" ino=158 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ppp_device_t tclass=chr_file permissive=1 [ 454.772399][ T28] audit: type=1400 audit(1755847473.455:121): avc: denied { open } for pid=7085 comm="syz.0.1801" path="/dev/ppp" dev="devtmpfs" ino=158 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ppp_device_t tclass=chr_file permissive=1 [ 454.848814][ T28] audit: type=1400 audit(1755847473.455:122): avc: denied { ioctl } for pid=7085 comm="syz.0.1801" path="/dev/ppp" dev="devtmpfs" ino=158 ioctlcmd=0x743e scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ppp_device_t tclass=chr_file permissive=1 [ 454.973732][ T7101] device sit0 left promiscuous mode [ 455.113845][ T7104] device sit0 entered promiscuous mode [ 455.336735][ T7106] device sit0 entered promiscuous mode [ 456.322926][ T7120] device veth0_vlan left promiscuous mode [ 456.345217][ T7131] FAULT_INJECTION: forcing a failure. [ 456.345217][ T7131] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 456.419653][ T7120] device veth0_vlan entered promiscuous mode [ 456.462365][ T7131] CPU: 1 PID: 7131 Comm: syz.4.1813 Not tainted syzkaller #0 [ 456.469786][ T7131] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 456.479843][ T7131] Call Trace: [ 456.483132][ T7131] [ 456.486055][ T7131] __dump_stack+0x21/0x24 [ 456.490388][ T7131] dump_stack_lvl+0xee/0x150 [ 456.495066][ T7131] ? __cfi_dump_stack_lvl+0x8/0x8 [ 456.500176][ T7131] dump_stack+0x15/0x24 [ 456.504335][ T7131] should_fail_ex+0x3d4/0x520 [ 456.509130][ T7131] should_fail+0xb/0x10 [ 456.513298][ T7131] should_fail_usercopy+0x1a/0x20 [ 456.516327][ T334] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 456.518342][ T7131] _copy_from_user+0x1e/0xc0 [ 456.518367][ T7131] __sys_bpf+0x277/0x780 [ 456.533190][ T334] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 456.534957][ T7131] ? bpf_link_show_fdinfo+0x320/0x320 [ 456.547645][ T7131] ? __cfi_ksys_write+0x10/0x10 [ 456.552521][ T7131] ? debug_smp_processor_id+0x17/0x20 [ 456.554135][ T334] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 456.557903][ T7131] __x64_sys_bpf+0x7c/0x90 [ 456.557932][ T7131] x64_sys_call+0x488/0x9a0 [ 456.557949][ T7131] do_syscall_64+0x4c/0xa0 [ 456.557969][ T7131] ? clear_bhb_loop+0x30/0x80 [ 456.557985][ T7131] ? clear_bhb_loop+0x30/0x80 [ 456.558005][ T7131] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 456.594207][ T7131] RIP: 0033:0x7f65e818ebe9 [ 456.598628][ T7131] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 456.618346][ T7131] RSP: 002b:00007f65e9095038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 456.626875][ T7131] RAX: ffffffffffffffda RBX: 00007f65e83b5fa0 RCX: 00007f65e818ebe9 [ 456.634868][ T7131] RDX: 0000000000000020 RSI: 00002000000005c0 RDI: 0000000000000015 [ 456.642857][ T7131] RBP: 00007f65e9095090 R08: 0000000000000000 R09: 0000000000000000 [ 456.650852][ T7131] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 456.658834][ T7131] R13: 00007f65e83b6038 R14: 00007f65e83b5fa0 R15: 00007ffefe8cfdd8 [ 456.666852][ T7131] [ 457.338034][ T7141] device veth0_vlan left promiscuous mode [ 457.448402][ T7141] device veth0_vlan entered promiscuous mode [ 457.581539][ T334] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 457.638510][ T334] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 457.709116][ T334] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 457.756279][ T7149] device sit0 left promiscuous mode [ 457.768122][ T7146] device sit0 entered promiscuous mode [ 458.119991][ T7153] device sit0 left promiscuous mode [ 458.211048][ T7158] device veth0_vlan left promiscuous mode [ 458.222720][ T7158] device veth0_vlan entered promiscuous mode [ 458.287204][ T7159] device sit0 entered promiscuous mode [ 458.387816][ T7168] FAULT_INJECTION: forcing a failure. [ 458.387816][ T7168] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 458.420153][ T7168] CPU: 1 PID: 7168 Comm: syz.3.1823 Not tainted syzkaller #0 [ 458.427557][ T7168] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 458.437626][ T7168] Call Trace: [ 458.440907][ T7168] [ 458.443835][ T7168] __dump_stack+0x21/0x24 [ 458.448176][ T7168] dump_stack_lvl+0xee/0x150 [ 458.452774][ T7168] ? __cfi_dump_stack_lvl+0x8/0x8 [ 458.457894][ T7168] dump_stack+0x15/0x24 [ 458.462059][ T7168] should_fail_ex+0x3d4/0x520 [ 458.466751][ T7168] should_fail+0xb/0x10 [ 458.470919][ T7168] should_fail_usercopy+0x1a/0x20 [ 458.475945][ T7168] _copy_from_user+0x1e/0xc0 [ 458.480538][ T7168] __sys_bpf+0x277/0x780 [ 458.484793][ T7168] ? bpf_link_show_fdinfo+0x320/0x320 [ 458.490270][ T7168] ? __cfi_ksys_write+0x10/0x10 [ 458.495243][ T7168] ? debug_smp_processor_id+0x17/0x20 [ 458.500626][ T7168] __x64_sys_bpf+0x7c/0x90 [ 458.505054][ T7168] x64_sys_call+0x488/0x9a0 [ 458.509559][ T7168] do_syscall_64+0x4c/0xa0 [ 458.513988][ T7168] ? clear_bhb_loop+0x30/0x80 [ 458.518667][ T7168] ? clear_bhb_loop+0x30/0x80 [ 458.523352][ T7168] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 458.529247][ T7168] RIP: 0033:0x7f17af58ebe9 [ 458.533661][ T7168] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 458.553268][ T7168] RSP: 002b:00007f17b0427038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 458.561869][ T7168] RAX: ffffffffffffffda RBX: 00007f17af7b5fa0 RCX: 00007f17af58ebe9 [ 458.569930][ T7168] RDX: 0000000000000038 RSI: 0000200000000900 RDI: 000000000000001a [ 458.577904][ T7168] RBP: 00007f17b0427090 R08: 0000000000000000 R09: 0000000000000000 [ 458.585972][ T7168] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 458.594119][ T7168] R13: 00007f17af7b6038 R14: 00007f17af7b5fa0 R15: 00007ffc9c6148f8 [ 458.602189][ T7168] [ 459.605620][ T7182] device veth0_vlan left promiscuous mode [ 459.620840][ T7182] device veth0_vlan entered promiscuous mode [ 459.658586][ T7185] device veth0_vlan left promiscuous mode [ 459.682324][ T7185] device veth0_vlan entered promiscuous mode [ 459.749656][ T346] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 459.761453][ T346] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 459.769295][ T346] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 460.539161][ T7201] device veth0_vlan left promiscuous mode [ 460.584212][ T7201] device veth0_vlan entered promiscuous mode [ 461.138382][ T7218] device sit0 left promiscuous mode [ 461.327883][ T7221] FAULT_INJECTION: forcing a failure. [ 461.327883][ T7221] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 461.389188][ T7219] device sit0 entered promiscuous mode [ 461.490782][ T7221] CPU: 1 PID: 7221 Comm: syz.4.1838 Not tainted syzkaller #0 [ 461.498281][ T7221] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 461.508430][ T7221] Call Trace: [ 461.511709][ T7221] [ 461.514638][ T7221] __dump_stack+0x21/0x24 [ 461.518971][ T7221] dump_stack_lvl+0xee/0x150 [ 461.523656][ T7221] ? __cfi_dump_stack_lvl+0x8/0x8 [ 461.528686][ T7221] dump_stack+0x15/0x24 [ 461.532852][ T7221] should_fail_ex+0x3d4/0x520 [ 461.537541][ T7221] should_fail+0xb/0x10 [ 461.541702][ T7221] should_fail_usercopy+0x1a/0x20 [ 461.546817][ T7221] _copy_from_user+0x1e/0xc0 [ 461.551408][ T7221] __sys_bpf+0x277/0x780 [ 461.555649][ T7221] ? bpf_link_show_fdinfo+0x320/0x320 [ 461.561124][ T7221] ? asm_sysvec_apic_timer_interrupt+0x1b/0x20 [ 461.567439][ T7221] ? __bpf_trace_sys_enter+0x62/0x70 [ 461.572760][ T7221] __x64_sys_bpf+0x7c/0x90 [ 461.577205][ T7221] x64_sys_call+0x488/0x9a0 [ 461.581897][ T7221] do_syscall_64+0x4c/0xa0 [ 461.586360][ T7221] ? clear_bhb_loop+0x30/0x80 [ 461.591218][ T7221] ? clear_bhb_loop+0x30/0x80 [ 461.595985][ T7221] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 461.601944][ T7221] RIP: 0033:0x7f65e818ebe9 [ 461.606360][ T7221] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 461.625999][ T7221] RSP: 002b:00007f65e9095038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 461.634421][ T7221] RAX: ffffffffffffffda RBX: 00007f65e83b5fa0 RCX: 00007f65e818ebe9 [ 461.642422][ T7221] RDX: 0000000000000048 RSI: 0000200000000100 RDI: 0000000000000000 [ 461.650659][ T7221] RBP: 00007f65e9095090 R08: 0000000000000000 R09: 0000000000000000 [ 461.658634][ T7221] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 461.666697][ T7221] R13: 00007f65e83b6038 R14: 00007f65e83b5fa0 R15: 00007ffefe8cfdd8 [ 461.674681][ T7221] [ 462.361125][ T7237] device veth0_vlan left promiscuous mode [ 462.390052][ T7237] device veth0_vlan entered promiscuous mode [ 462.612947][ T346] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 462.636998][ T346] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 462.771452][ T346] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 462.853812][ T7239] device veth0_vlan left promiscuous mode [ 462.916497][ T7239] device veth0_vlan entered promiscuous mode [ 464.496507][ T7274] device sit0 left promiscuous mode [ 464.621655][ T7269] device sit0 entered promiscuous mode [ 465.295821][ T7287] device sit0 left promiscuous mode [ 465.570004][ T7290] device sit0 entered promiscuous mode [ 466.804500][ T7294] device veth0_vlan left promiscuous mode [ 466.822326][ T7294] device veth0_vlan entered promiscuous mode [ 466.838489][ T334] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 466.846835][ T334] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 466.854390][ T334] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 467.300388][ T7301] device veth0_vlan left promiscuous mode [ 467.425271][ T7301] device veth0_vlan entered promiscuous mode [ 467.867803][ T7320] device sit0 left promiscuous mode [ 468.057779][ T7323] device sit0 entered promiscuous mode [ 468.778433][ T7342] device veth0_vlan left promiscuous mode [ 468.785075][ T7342] device veth0_vlan entered promiscuous mode [ 468.828766][ T334] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 468.874387][ T334] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 468.945483][ T334] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 470.257819][ T7367] device veth0_vlan left promiscuous mode [ 470.266699][ T7367] device veth0_vlan entered promiscuous mode [ 470.275605][ T7366] device sit0 left promiscuous mode [ 470.309031][ T346] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 470.317201][ T346] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 470.324735][ T346] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 470.394259][ T7366] device sit0 entered promiscuous mode [ 471.727103][ T7374] device sit0 left promiscuous mode [ 472.066466][ T7377] device sit0 entered promiscuous mode [ 472.695591][ T7394] FAULT_INJECTION: forcing a failure. [ 472.695591][ T7394] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 472.711508][ T7394] CPU: 1 PID: 7394 Comm: syz.0.1895 Not tainted syzkaller #0 [ 472.718908][ T7394] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 472.729056][ T7394] Call Trace: [ 472.732422][ T7394] [ 472.735389][ T7394] __dump_stack+0x21/0x24 [ 472.739832][ T7394] dump_stack_lvl+0xee/0x150 [ 472.744426][ T7394] ? __cfi_dump_stack_lvl+0x8/0x8 [ 472.749566][ T7394] dump_stack+0x15/0x24 [ 472.753733][ T7394] should_fail_ex+0x3d4/0x520 [ 472.758418][ T7394] should_fail+0xb/0x10 [ 472.762584][ T7394] should_fail_usercopy+0x1a/0x20 [ 472.767625][ T7394] _copy_from_user+0x1e/0xc0 [ 472.772486][ T7394] __sys_bpf+0x277/0x780 [ 472.776831][ T7394] ? bpf_link_show_fdinfo+0x320/0x320 [ 472.782318][ T7394] ? __cfi_sched_clock_cpu+0x10/0x10 [ 472.787634][ T7394] __x64_sys_bpf+0x7c/0x90 [ 472.792071][ T7394] x64_sys_call+0x488/0x9a0 [ 472.796757][ T7394] do_syscall_64+0x4c/0xa0 [ 472.801191][ T7394] ? clear_bhb_loop+0x30/0x80 [ 472.805911][ T7394] ? clear_bhb_loop+0x30/0x80 [ 472.810769][ T7394] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 472.816763][ T7394] RIP: 0033:0x7fd31a58ebe9 [ 472.821399][ T7394] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 472.841027][ T7394] RSP: 002b:00007fd31b36f038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 472.849526][ T7394] RAX: ffffffffffffffda RBX: 00007fd31a7b5fa0 RCX: 00007fd31a58ebe9 [ 472.857662][ T7394] RDX: 0000000000000080 RSI: 0000200000003480 RDI: 0000000000000005 [ 472.865623][ T7394] RBP: 00007fd31b36f090 R08: 0000000000000000 R09: 0000000000000000 [ 472.873595][ T7394] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 472.881565][ T7394] R13: 00007fd31a7b6038 R14: 00007fd31a7b5fa0 R15: 00007ffe24e1b7c8 [ 472.889547][ T7394] [ 473.193666][ T7403] device veth0_vlan left promiscuous mode [ 473.225234][ T7403] device veth0_vlan entered promiscuous mode [ 473.929084][ T7414] device sit0 left promiscuous mode [ 474.133121][ T7422] device veth0_vlan left promiscuous mode [ 474.141332][ T7422] device veth0_vlan entered promiscuous mode [ 474.152710][ T7420] device sit0 entered promiscuous mode [ 476.629356][ T7439] device sit0 left promiscuous mode [ 476.858675][ T7449] device sit0 entered promiscuous mode [ 477.002590][ T7453] syz.3.1898[7453] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 477.002661][ T7453] syz.3.1898[7453] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 477.364424][ T7460] device veth0_vlan left promiscuous mode [ 477.449624][ T7460] device veth0_vlan entered promiscuous mode [ 477.617090][ T7462] device sit0 left promiscuous mode [ 477.631425][ T7462] device sit0 entered promiscuous mode [ 478.063106][ T7469] device veth0_vlan left promiscuous mode [ 478.094946][ T7469] device veth0_vlan entered promiscuous mode [ 478.237895][ T334] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 478.265278][ T334] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 478.274636][ T334] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 478.650394][ T7477] device sit0 left promiscuous mode [ 478.819634][ T7478] device sit0 entered promiscuous mode [ 478.959865][ T7479] device veth0_vlan left promiscuous mode [ 478.981203][ T7479] device veth0_vlan entered promiscuous mode [ 479.403706][ T7488] device sit0 left promiscuous mode [ 479.648446][ T7494] device sit0 entered promiscuous mode [ 479.751557][ T7495] device veth0_vlan left promiscuous mode [ 479.843840][ T7495] device veth0_vlan entered promiscuous mode [ 480.954458][ T7516] device veth0_vlan left promiscuous mode [ 480.964346][ T7516] device veth0_vlan entered promiscuous mode [ 480.984440][ T7517] device veth0_vlan left promiscuous mode [ 480.992909][ T7517] device veth0_vlan entered promiscuous mode [ 481.029037][ T7506] device sit0 left promiscuous mode [ 481.073505][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 481.082084][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 481.090124][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 481.098703][ T7507] device sit0 entered promiscuous mode [ 482.934456][ T7534] device veth0_vlan left promiscuous mode [ 482.957683][ T7534] device veth0_vlan entered promiscuous mode [ 483.079708][ T334] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 483.127635][ T334] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 483.211844][ T334] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 483.872583][ T7546] device veth0_vlan left promiscuous mode [ 484.010794][ T7546] device veth0_vlan entered promiscuous mode [ 485.050040][ T7569] device veth0_vlan left promiscuous mode [ 485.083507][ T7569] device veth0_vlan entered promiscuous mode [ 485.474684][ T7577] device veth0_vlan left promiscuous mode [ 485.598097][ T7577] device veth0_vlan entered promiscuous mode [ 485.828859][ T7575] device sit0 left promiscuous mode [ 485.894152][ T7578] device sit0 entered promiscuous mode [ 486.609320][ T7594] device veth0_vlan left promiscuous mode [ 486.651714][ T7594] device veth0_vlan entered promiscuous mode [ 486.726340][ T334] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 486.747678][ T334] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 486.762309][ T334] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 487.615034][ T7601] device veth0_vlan left promiscuous mode [ 487.750916][ T7601] device veth0_vlan entered promiscuous mode [ 490.090824][ T7636] device sit0 left promiscuous mode [ 490.265892][ T7637] device sit0 entered promiscuous mode [ 491.158117][ T7648] device sit0 left promiscuous mode [ 491.348834][ T7649] device sit0 entered promiscuous mode [ 492.532928][ T7654] device veth0_vlan left promiscuous mode [ 492.545366][ T7654] device veth0_vlan entered promiscuous mode [ 492.553907][ T7659] device veth0_vlan left promiscuous mode [ 492.575703][ T7659] device veth0_vlan entered promiscuous mode [ 492.801893][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 492.835062][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 492.881103][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 492.903208][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 492.918915][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 492.926945][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 493.107793][ T7665] device veth0_vlan left promiscuous mode [ 493.228938][ T7665] device veth0_vlan entered promiscuous mode [ 494.217589][ T7695] device sit0 left promiscuous mode [ 494.259233][ T7694] device sit0 left promiscuous mode [ 494.637959][ T7684] device sit0 entered promiscuous mode [ 495.204974][ T7698] device sit0 entered promiscuous mode [ 498.188319][ T7725] device veth0_vlan left promiscuous mode [ 498.258744][ T7725] device veth0_vlan entered promiscuous mode [ 498.434634][ T346] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 498.445228][ T346] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 498.551047][ T346] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 499.580706][ T7735] device veth0_vlan left promiscuous mode [ 499.619255][ T7735] device veth0_vlan entered promiscuous mode [ 499.878754][ T346] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 499.946666][ T346] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 499.954533][ T346] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 500.552388][ T7753] device sit0 left promiscuous mode [ 500.818642][ T7757] device sit0 left promiscuous mode [ 501.032718][ T7758] device sit0 entered promiscuous mode [ 502.826565][ T7795] device sit0 entered promiscuous mode [ 504.559541][ T7807] device sit0 left promiscuous mode [ 504.648901][ T7809] device sit0 entered promiscuous mode [ 505.044434][ T7825] device veth0_vlan left promiscuous mode [ 505.056467][ T7825] device veth0_vlan entered promiscuous mode [ 505.086415][ T7827] device veth0_vlan left promiscuous mode [ 505.132596][ T7827] device veth0_vlan entered promiscuous mode [ 505.211562][ T334] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 505.223018][ T334] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 505.230946][ T334] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 505.238776][ T334] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 505.247749][ T334] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 505.255400][ T334] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 506.255926][ T7834] device sit0 left promiscuous mode [ 506.368018][ T7847] device sit0 left promiscuous mode [ 506.905299][ T7852] device sit0 entered promiscuous mode [ 507.012403][ T7837] device sit0 entered promiscuous mode [ 507.049952][ T7853] device veth0_vlan left promiscuous mode [ 507.107918][ T7853] device veth0_vlan entered promiscuous mode [ 507.553371][ T7866] device veth0_vlan left promiscuous mode [ 507.647226][ T7866] device veth0_vlan entered promiscuous mode [ 509.116138][ T7891] device sit0 left promiscuous mode [ 509.460180][ T7892] device sit0 left promiscuous mode [ 509.612602][ T7896] device sit0 entered promiscuous mode [ 510.574626][ T7920] device syzkaller0 entered promiscuous mode [ 511.366960][ T7926] device sit0 left promiscuous mode [ 511.418974][ T7927] device sit0 entered promiscuous mode [ 511.690092][ T7941] FAULT_INJECTION: forcing a failure. [ 511.690092][ T7941] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 511.705503][ T7941] CPU: 1 PID: 7941 Comm: syz.0.2041 Not tainted syzkaller #0 [ 511.713027][ T7941] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 511.723148][ T7941] Call Trace: [ 511.726430][ T7941] [ 511.729365][ T7941] __dump_stack+0x21/0x24 [ 511.733701][ T7941] dump_stack_lvl+0xee/0x150 [ 511.738297][ T7941] ? __cfi_dump_stack_lvl+0x8/0x8 [ 511.743319][ T7941] dump_stack+0x15/0x24 [ 511.747478][ T7941] should_fail_ex+0x3d4/0x520 [ 511.752177][ T7941] should_fail+0xb/0x10 [ 511.756424][ T7941] should_fail_usercopy+0x1a/0x20 [ 511.761458][ T7941] _copy_to_user+0x1e/0x90 [ 511.765887][ T7941] simple_read_from_buffer+0xe9/0x160 [ 511.771268][ T7941] proc_fail_nth_read+0x19a/0x210 [ 511.776297][ T7941] ? __cfi_proc_fail_nth_read+0x10/0x10 [ 511.782035][ T7941] ? security_file_permission+0x94/0xb0 [ 511.787683][ T7941] ? __cfi_proc_fail_nth_read+0x10/0x10 [ 511.793247][ T7941] vfs_read+0x26e/0x8c0 [ 511.797414][ T7941] ? __cfi_vfs_read+0x10/0x10 [ 511.802100][ T7941] ? irqentry_exit+0x37/0x40 [ 511.806817][ T7941] ? sysvec_apic_timer_interrupt+0x64/0xc0 [ 511.812636][ T7941] ? asm_sysvec_apic_timer_interrupt+0x1b/0x20 [ 511.818935][ T7941] ksys_read+0x140/0x240 [ 511.823195][ T7941] ? __cfi_ksys_read+0x10/0x10 [ 511.827975][ T7941] __x64_sys_read+0x7b/0x90 [ 511.832499][ T7941] x64_sys_call+0x2f/0x9a0 [ 511.836917][ T7941] do_syscall_64+0x4c/0xa0 [ 511.841429][ T7941] ? clear_bhb_loop+0x30/0x80 [ 511.846133][ T7941] ? clear_bhb_loop+0x30/0x80 [ 511.850901][ T7941] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 511.856980][ T7941] RIP: 0033:0x7fd31a58d5fc [ 511.861470][ T7941] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 93 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 ef 93 02 00 48 [ 511.881419][ T7941] RSP: 002b:00007fd31b32d030 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 511.889839][ T7941] RAX: ffffffffffffffda RBX: 00007fd31a7b6180 RCX: 00007fd31a58d5fc [ 511.897795][ T7941] RDX: 000000000000000f RSI: 00007fd31b32d0a0 RDI: 0000000000000008 [ 511.905843][ T7941] RBP: 00007fd31b32d090 R08: 0000000000000000 R09: 0000000000000000 [ 511.913813][ T7941] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 511.921857][ T7941] R13: 00007fd31a7b6218 R14: 00007fd31a7b6180 R15: 00007ffe24e1b7c8 [ 511.929918][ T7941] [ 511.960157][ T7939] device syzkaller0 entered promiscuous mode [ 512.698118][ T7951] device sit0 left promiscuous mode [ 513.102504][ T7951] device sit0 entered promiscuous mode [ 514.586481][ T7959] device sit0 entered promiscuous mode [ 516.530603][ T7963] device sit0 left promiscuous mode [ 516.730510][ T7983] device sit0 left promiscuous mode [ 516.784304][ T7970] device sit0 entered promiscuous mode [ 516.796589][ T7986] device sit0 entered promiscuous mode [ 517.356126][ T7988] device sit0 left promiscuous mode [ 517.375773][ T7988] device sit0 entered promiscuous mode [ 517.994199][ T8007] device veth0_vlan left promiscuous mode [ 518.052677][ T8007] device veth0_vlan entered promiscuous mode [ 518.254235][ T8011] device veth0_vlan left promiscuous mode [ 518.314007][ T8011] device veth0_vlan entered promiscuous mode [ 518.510396][ T334] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 518.542412][ T334] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 518.598273][ T334] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 522.541274][ T8051] device sit0 left promiscuous mode [ 522.637852][ T8054] device sit0 entered promiscuous mode [ 523.185901][ T8050] device sit0 left promiscuous mode [ 523.207983][ T8062] device veth0_vlan left promiscuous mode [ 523.283383][ T8062] device veth0_vlan entered promiscuous mode [ 523.381269][ T8053] device sit0 entered promiscuous mode [ 523.398281][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 523.414427][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 523.433865][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 523.743646][ T8078] device veth0_vlan left promiscuous mode [ 523.799678][ T8078] device veth0_vlan entered promiscuous mode [ 523.856379][ T8075] device veth0_vlan left promiscuous mode [ 523.872787][ T8075] device veth0_vlan entered promiscuous mode [ 524.747361][ T8093] device veth0_vlan left promiscuous mode [ 524.787337][ T8093] device veth0_vlan entered promiscuous mode [ 524.940180][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 524.962191][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 525.035050][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 525.496553][ T8106] device sit0 left promiscuous mode [ 525.534093][ T8106] device sit0 entered promiscuous mode [ 525.656321][ T8109] device veth0_vlan left promiscuous mode [ 525.728942][ T8109] device veth0_vlan entered promiscuous mode [ 526.130753][ T8112] device sit0 left promiscuous mode [ 526.264011][ T8112] device sit0 entered promiscuous mode [ 526.338631][ T8121] device sit0 left promiscuous mode [ 526.366374][ T8117] device veth0_vlan left promiscuous mode [ 526.382641][ T8117] device veth0_vlan entered promiscuous mode [ 526.441923][ T8121] device sit0 entered promiscuous mode [ 527.166430][ T8127] device veth0_vlan left promiscuous mode [ 527.326510][ T8127] device veth0_vlan entered promiscuous mode [ 527.554313][ T334] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 527.617685][ T334] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 527.656502][ T334] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 528.113636][ T8143] device veth0_vlan left promiscuous mode [ 528.157561][ T8143] device veth0_vlan entered promiscuous mode [ 528.216705][ T334] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 528.225094][ T334] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 528.233038][ T334] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 530.062657][ T8169] device sit0 left promiscuous mode [ 530.124033][ T8169] device sit0 entered promiscuous mode [ 531.568123][ T8178] device veth0_vlan left promiscuous mode [ 531.694713][ T8178] device veth0_vlan entered promiscuous mode [ 531.707687][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 531.736738][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 531.770099][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 532.246838][ T8181] device sit0 left promiscuous mode [ 532.590050][ T8182] device sit0 entered promiscuous mode [ 536.217410][ T8222] device veth0_vlan left promiscuous mode [ 536.235478][ T8222] device veth0_vlan entered promiscuous mode [ 536.311579][ T8221] device veth0_vlan left promiscuous mode [ 536.344302][ T8221] device veth0_vlan entered promiscuous mode [ 536.470999][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 536.492180][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 536.571492][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 536.704621][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 536.784436][ T8228] FAULT_INJECTION: forcing a failure. [ 536.784436][ T8228] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 536.798274][ T8228] CPU: 1 PID: 8228 Comm: syz.3.2120 Not tainted syzkaller #0 [ 536.805668][ T8228] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 536.815739][ T8228] Call Trace: [ 536.819129][ T8228] [ 536.822064][ T8228] __dump_stack+0x21/0x24 [ 536.826405][ T8228] dump_stack_lvl+0xee/0x150 [ 536.831100][ T8228] ? __cfi_dump_stack_lvl+0x8/0x8 [ 536.836408][ T8228] dump_stack+0x15/0x24 [ 536.840590][ T8228] should_fail_ex+0x3d4/0x520 [ 536.845274][ T8228] should_fail+0xb/0x10 [ 536.849520][ T8228] should_fail_usercopy+0x1a/0x20 [ 536.854645][ T8228] _copy_from_user+0x1e/0xc0 [ 536.859243][ T8228] __sys_bpf+0x277/0x780 [ 536.863593][ T8228] ? bpf_link_show_fdinfo+0x320/0x320 [ 536.868970][ T8228] ? __cfi_ksys_write+0x10/0x10 [ 536.873841][ T8228] ? debug_smp_processor_id+0x17/0x20 [ 536.879216][ T8228] __x64_sys_bpf+0x7c/0x90 [ 536.883747][ T8228] x64_sys_call+0x488/0x9a0 [ 536.888248][ T8228] do_syscall_64+0x4c/0xa0 [ 536.892663][ T8228] ? clear_bhb_loop+0x30/0x80 [ 536.897367][ T8228] ? clear_bhb_loop+0x30/0x80 [ 536.902030][ T8228] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 536.907926][ T8228] RIP: 0033:0x7f17af58ebe9 [ 536.912337][ T8228] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 536.932372][ T8228] RSP: 002b:00007f17b0427038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 536.940900][ T8228] RAX: ffffffffffffffda RBX: 00007f17af7b5fa0 RCX: 00007f17af58ebe9 [ 536.948879][ T8228] RDX: 0000000000000024 RSI: 0000200000000640 RDI: 000000000000000a [ 536.957096][ T8228] RBP: 00007f17b0427090 R08: 0000000000000000 R09: 0000000000000000 [ 536.965073][ T8228] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 536.973043][ T8228] R13: 00007f17af7b6038 R14: 00007f17af7b5fa0 R15: 00007ffc9c6148f8 [ 536.981101][ T8228] [ 537.007347][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 537.024037][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 537.106795][ T8239] Driver unsupported XDP return value 0 on prog (id 1983) dev N/A, expect packet loss! [ 538.443075][ T8258] FAULT_INJECTION: forcing a failure. [ 538.443075][ T8258] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 538.542282][ T8258] CPU: 1 PID: 8258 Comm: syz.4.2128 Not tainted syzkaller #0 [ 538.549709][ T8258] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 538.559801][ T8258] Call Trace: [ 538.563074][ T8258] [ 538.566096][ T8258] __dump_stack+0x21/0x24 [ 538.570432][ T8258] dump_stack_lvl+0xee/0x150 [ 538.575387][ T8258] ? __cfi_dump_stack_lvl+0x8/0x8 [ 538.580501][ T8258] dump_stack+0x15/0x24 [ 538.584745][ T8258] should_fail_ex+0x3d4/0x520 [ 538.589423][ T8258] should_fail+0xb/0x10 [ 538.593667][ T8258] should_fail_usercopy+0x1a/0x20 [ 538.598814][ T8258] _copy_from_user+0x1e/0xc0 [ 538.603411][ T8258] __sys_bpf+0x277/0x780 [ 538.607841][ T8258] ? bpf_link_show_fdinfo+0x320/0x320 [ 538.613295][ T8258] ? __cfi_sched_clock_cpu+0x10/0x10 [ 538.618591][ T8258] __x64_sys_bpf+0x7c/0x90 [ 538.623011][ T8258] x64_sys_call+0x488/0x9a0 [ 538.627509][ T8258] do_syscall_64+0x4c/0xa0 [ 538.632051][ T8258] ? clear_bhb_loop+0x30/0x80 [ 538.636782][ T8258] ? clear_bhb_loop+0x30/0x80 [ 538.641460][ T8258] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 538.647435][ T8258] RIP: 0033:0x7f65e818ebe9 [ 538.651847][ T8258] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 538.671542][ T8258] RSP: 002b:00007f65e9095038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 538.679956][ T8258] RAX: ffffffffffffffda RBX: 00007f65e83b5fa0 RCX: 00007f65e818ebe9 [ 538.687933][ T8258] RDX: 0000000000000080 RSI: 0000200000003480 RDI: 0000000000000005 [ 538.696021][ T8258] RBP: 00007f65e9095090 R08: 0000000000000000 R09: 0000000000000000 [ 538.704246][ T8258] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 538.712397][ T8258] R13: 00007f65e83b6038 R14: 00007f65e83b5fa0 R15: 00007ffefe8cfdd8 [ 538.720406][ T8258] [ 539.465783][ T8274] device veth0_vlan left promiscuous mode [ 539.473299][ T8274] device veth0_vlan entered promiscuous mode [ 539.495638][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 539.584841][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 539.652247][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 540.141357][ T8291] FAULT_INJECTION: forcing a failure. [ 540.141357][ T8291] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 540.256161][ T8291] CPU: 1 PID: 8291 Comm: syz.0.2138 Not tainted syzkaller #0 [ 540.263686][ T8291] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 540.273742][ T8291] Call Trace: [ 540.277022][ T8291] [ 540.279988][ T8291] __dump_stack+0x21/0x24 [ 540.284330][ T8291] dump_stack_lvl+0xee/0x150 [ 540.289014][ T8291] ? __cfi_dump_stack_lvl+0x8/0x8 [ 540.294045][ T8291] dump_stack+0x15/0x24 [ 540.298249][ T8291] should_fail_ex+0x3d4/0x520 [ 540.303050][ T8291] should_fail+0xb/0x10 [ 540.307295][ T8291] should_fail_usercopy+0x1a/0x20 [ 540.312333][ T8291] _copy_from_user+0x1e/0xc0 [ 540.316926][ T8291] __sys_bpf+0x277/0x780 [ 540.321178][ T8291] ? bpf_link_show_fdinfo+0x320/0x320 [ 540.326556][ T8291] ? __cfi_ksys_write+0x10/0x10 [ 540.331478][ T8291] ? debug_smp_processor_id+0x17/0x20 [ 540.337051][ T8291] __x64_sys_bpf+0x7c/0x90 [ 540.341575][ T8291] x64_sys_call+0x488/0x9a0 [ 540.346098][ T8291] do_syscall_64+0x4c/0xa0 [ 540.350607][ T8291] ? clear_bhb_loop+0x30/0x80 [ 540.355297][ T8291] ? clear_bhb_loop+0x30/0x80 [ 540.359979][ T8291] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 540.365970][ T8291] RIP: 0033:0x7fd31a58ebe9 [ 540.370481][ T8291] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 540.390268][ T8291] RSP: 002b:00007fd31b36f038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 540.399036][ T8291] RAX: ffffffffffffffda RBX: 00007fd31a7b5fa0 RCX: 00007fd31a58ebe9 [ 540.407031][ T8291] RDX: 0000000000000050 RSI: 0000200000000840 RDI: 0000000000000000 [ 540.414999][ T8291] RBP: 00007fd31b36f090 R08: 0000000000000000 R09: 0000000000000000 [ 540.423146][ T8291] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 540.431189][ T8291] R13: 00007fd31a7b6038 R14: 00007fd31a7b5fa0 R15: 00007ffe24e1b7c8 [ 540.439190][ T8291] [ 540.625522][ T8301] FAULT_INJECTION: forcing a failure. [ 540.625522][ T8301] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 540.701468][ T8301] CPU: 1 PID: 8301 Comm: syz.4.2141 Not tainted syzkaller #0 [ 540.708886][ T8301] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 540.718959][ T8301] Call Trace: [ 540.722239][ T8301] [ 540.725185][ T8301] __dump_stack+0x21/0x24 [ 540.729524][ T8301] dump_stack_lvl+0xee/0x150 [ 540.734562][ T8301] ? __cfi_dump_stack_lvl+0x8/0x8 [ 540.739689][ T8301] dump_stack+0x15/0x24 [ 540.743885][ T8301] should_fail_ex+0x3d4/0x520 [ 540.748571][ T8301] should_fail+0xb/0x10 [ 540.752734][ T8301] should_fail_usercopy+0x1a/0x20 [ 540.757970][ T8301] _copy_from_user+0x1e/0xc0 [ 540.762647][ T8301] __sys_bpf+0x277/0x780 [ 540.766977][ T8301] ? bpf_link_show_fdinfo+0x320/0x320 [ 540.772350][ T8301] ? __cfi_sched_clock_cpu+0x10/0x10 [ 540.777753][ T8301] __x64_sys_bpf+0x7c/0x90 [ 540.782200][ T8301] x64_sys_call+0x488/0x9a0 [ 540.786894][ T8301] do_syscall_64+0x4c/0xa0 [ 540.791325][ T8301] ? clear_bhb_loop+0x30/0x80 [ 540.796012][ T8301] ? clear_bhb_loop+0x30/0x80 [ 540.800689][ T8301] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 540.806584][ T8301] RIP: 0033:0x7f65e818ebe9 [ 540.811000][ T8301] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 540.830795][ T8301] RSP: 002b:00007f65e9095038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 540.839221][ T8301] RAX: ffffffffffffffda RBX: 00007f65e83b5fa0 RCX: 00007f65e818ebe9 [ 540.847333][ T8301] RDX: 0000000000000080 RSI: 0000200000003480 RDI: 0000000000000005 [ 540.855306][ T8301] RBP: 00007f65e9095090 R08: 0000000000000000 R09: 0000000000000000 [ 540.863280][ T8301] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 540.871254][ T8301] R13: 00007f65e83b6038 R14: 00007f65e83b5fa0 R15: 00007ffefe8cfdd8 [ 540.879414][ T8301] [ 542.035492][ T8322] device veth0_vlan left promiscuous mode [ 542.057476][ T8322] device veth0_vlan entered promiscuous mode [ 542.127200][ T334] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 542.141308][ T334] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 542.157987][ T334] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 542.803137][ T8334] device sit0 left promiscuous mode [ 542.984559][ T8336] device sit0 entered promiscuous mode [ 543.305346][ T8341] device sit0 left promiscuous mode [ 543.442191][ T8342] device sit0 entered promiscuous mode [ 543.616841][ T8345] device syzkaller0 entered promiscuous mode [ 543.777016][ T8346] FAULT_INJECTION: forcing a failure. [ 543.777016][ T8346] name failslab, interval 1, probability 0, space 0, times 0 [ 543.789647][ T8346] CPU: 0 PID: 8346 Comm: syz.4.2154 Not tainted syzkaller #0 [ 543.797015][ T8346] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 543.807066][ T8346] Call Trace: [ 543.810325][ T8346] [ 543.813236][ T8346] __dump_stack+0x21/0x24 [ 543.817548][ T8346] dump_stack_lvl+0xee/0x150 [ 543.822117][ T8346] ? __cfi_dump_stack_lvl+0x8/0x8 [ 543.827120][ T8346] dump_stack+0x15/0x24 [ 543.831282][ T8346] should_fail_ex+0x3d4/0x520 [ 543.836065][ T8346] __should_failslab+0xac/0xf0 [ 543.840929][ T8346] ? ref_tracker_alloc+0x139/0x430 [ 543.846041][ T8346] should_failslab+0x9/0x20 [ 543.850547][ T8346] __kmem_cache_alloc_node+0x3d/0x2c0 [ 543.856011][ T8346] ? kmem_cache_free+0x12d/0x300 [ 543.860939][ T8346] ? ____kasan_slab_free+0x13d/0x180 [ 543.866319][ T8346] ? ref_tracker_alloc+0x139/0x430 [ 543.871560][ T8346] kmalloc_trace+0x29/0xb0 [ 543.876032][ T8346] ref_tracker_alloc+0x139/0x430 [ 543.881141][ T8346] ? __cfi_ref_tracker_alloc+0x10/0x10 [ 543.886587][ T8346] ? __kasan_check_read+0x11/0x20 [ 543.891784][ T8346] ? linkwatch_urgent_event+0x3ac/0x430 [ 543.897411][ T8346] linkwatch_fire_event+0x1d2/0x240 [ 543.902604][ T8346] netif_carrier_off+0x9c/0xc0 [ 543.907363][ T8346] __tun_detach+0xc1c/0x1460 [ 543.911992][ T8346] tun_chr_close+0x92/0x140 [ 543.916506][ T8346] ? __cfi_tun_chr_close+0x10/0x10 [ 543.921872][ T8346] __fput+0x1fc/0x8f0 [ 543.925856][ T8346] ____fput+0x15/0x20 [ 543.929850][ T8346] task_work_run+0x1db/0x240 [ 543.934525][ T8346] ? __cfi_task_work_run+0x10/0x10 [ 543.939719][ T8346] ? filp_close+0x111/0x160 [ 543.944311][ T8346] exit_to_user_mode_loop+0x9b/0xb0 [ 543.949619][ T8346] exit_to_user_mode_prepare+0x5a/0xa0 [ 543.955079][ T8346] syscall_exit_to_user_mode+0x1a/0x30 [ 543.960560][ T8346] do_syscall_64+0x58/0xa0 [ 543.964974][ T8346] ? clear_bhb_loop+0x30/0x80 [ 543.969817][ T8346] ? clear_bhb_loop+0x30/0x80 [ 543.974469][ T8346] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 543.980622][ T8346] RIP: 0033:0x7f65e818ebe9 [ 543.985052][ T8346] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 544.004921][ T8346] RSP: 002b:00007f65e9074038 EFLAGS: 00000246 ORIG_RAX: 0000000000000003 [ 544.013328][ T8346] RAX: 0000000000000000 RBX: 00007f65e83b6090 RCX: 00007f65e818ebe9 [ 544.021297][ T8346] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000003 [ 544.029335][ T8346] RBP: 00007f65e9074090 R08: 0000000000000000 R09: 0000000000000000 [ 544.037288][ T8346] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 544.045424][ T8346] R13: 00007f65e83b6128 R14: 00007f65e83b6090 R15: 00007ffefe8cfdd8 [ 544.053481][ T8346] [ 544.290813][ T8349] device syzkaller0 entered promiscuous mode [ 545.084088][ T8360] device syzkaller0 entered promiscuous mode [ 546.089242][ T8377] device veth0_vlan left promiscuous mode [ 546.105081][ T8377] device veth0_vlan entered promiscuous mode [ 546.126351][ T8380] device veth0_vlan left promiscuous mode [ 546.173478][ T8380] device veth0_vlan entered promiscuous mode [ 546.379816][ T8385] device sit0 left promiscuous mode [ 546.437785][ T8386] device sit0 entered promiscuous mode [ 546.654713][ T8389] FAULT_INJECTION: forcing a failure. [ 546.654713][ T8389] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 546.796423][ T8389] CPU: 0 PID: 8389 Comm: syz.3.2166 Not tainted syzkaller #0 [ 546.803846][ T8389] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 546.814029][ T8389] Call Trace: [ 546.817313][ T8389] [ 546.820258][ T8389] __dump_stack+0x21/0x24 [ 546.824635][ T8389] dump_stack_lvl+0xee/0x150 [ 546.829323][ T8389] ? __cfi_dump_stack_lvl+0x8/0x8 [ 546.834453][ T8389] ? _parse_integer+0x2a/0x40 [ 546.839228][ T8389] dump_stack+0x15/0x24 [ 546.843735][ T8389] should_fail_ex+0x3d4/0x520 [ 546.848414][ T8389] should_fail+0xb/0x10 [ 546.852689][ T8389] should_fail_usercopy+0x1a/0x20 [ 546.857802][ T8389] _copy_from_user+0x1e/0xc0 [ 546.862398][ T8389] ___sys_sendmsg+0x155/0x290 [ 546.867154][ T8389] ? __sys_sendmsg+0x270/0x270 [ 546.871930][ T8389] ? __kasan_check_write+0x14/0x20 [ 546.877067][ T8389] ? proc_fail_nth_write+0x17a/0x1f0 [ 546.882381][ T8389] ? vfs_write+0x9d6/0xca0 [ 546.886823][ T8389] ? __fdget+0x19c/0x220 [ 546.891165][ T8389] __x64_sys_sendmsg+0x1f0/0x2c0 [ 546.896175][ T8389] ? __cfi___x64_sys_sendmsg+0x10/0x10 [ 546.901909][ T8389] ? fpregs_assert_state_consistent+0xb1/0xe0 [ 546.908432][ T8389] x64_sys_call+0x171/0x9a0 [ 546.912940][ T8389] do_syscall_64+0x4c/0xa0 [ 546.917365][ T8389] ? clear_bhb_loop+0x30/0x80 [ 546.922143][ T8389] ? clear_bhb_loop+0x30/0x80 [ 546.926996][ T8389] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 546.932908][ T8389] RIP: 0033:0x7f17af58ebe9 [ 546.937324][ T8389] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 546.957106][ T8389] RSP: 002b:00007f17b0427038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 546.965533][ T8389] RAX: ffffffffffffffda RBX: 00007f17af7b5fa0 RCX: 00007f17af58ebe9 [ 546.973603][ T8389] RDX: 0000000000000000 RSI: 0000200000000500 RDI: 0000000000000004 [ 546.981579][ T8389] RBP: 00007f17b0427090 R08: 0000000000000000 R09: 0000000000000000 [ 546.989746][ T8389] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 546.997721][ T8389] R13: 00007f17af7b6038 R14: 00007f17af7b5fa0 R15: 00007ffc9c6148f8 [ 547.005713][ T8389] [ 547.916138][ T8414] device sit0 left promiscuous mode [ 548.176843][ T8417] device sit0 entered promiscuous mode [ 549.469223][ T8425] device veth0_vlan left promiscuous mode [ 549.567251][ T8425] device veth0_vlan entered promiscuous mode [ 549.796166][ T8424] device sit0 left promiscuous mode [ 549.897462][ T8426] device sit0 entered promiscuous mode [ 550.040572][ T8434] device sit0 left promiscuous mode [ 550.176602][ T8437] device sit0 entered promiscuous mode [ 551.555173][ T8452] device veth0_vlan left promiscuous mode [ 551.761429][ T8452] device veth0_vlan entered promiscuous mode [ 552.424769][ T8470] device sit0 left promiscuous mode [ 552.593001][ T8467] device sit0 entered promiscuous mode [ 552.982234][ T8476] device sit0 left promiscuous mode [ 553.157603][ T8480] device sit0 entered promiscuous mode [ 553.913399][ T8489] device veth0_vlan left promiscuous mode [ 553.923838][ T8489] device veth0_vlan entered promiscuous mode [ 554.545838][ T8502] device veth0_vlan left promiscuous mode [ 554.586972][ T8502] device veth0_vlan entered promiscuous mode [ 554.761986][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 554.772366][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 554.786718][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 555.242112][ T8514] device veth0_vlan left promiscuous mode [ 555.256038][ T8514] device veth0_vlan entered promiscuous mode [ 556.475624][ T8535] device sit0 left promiscuous mode [ 556.765917][ T8549] device sit0 left promiscuous mode [ 556.939839][ T8551] device veth0_vlan left promiscuous mode [ 556.966725][ T8551] device veth0_vlan entered promiscuous mode [ 557.314347][ T8550] device veth0_vlan left promiscuous mode [ 557.367095][ T8550] device veth0_vlan entered promiscuous mode [ 557.376021][ T8549] device sit0 entered promiscuous mode [ 557.855485][ T8571] device sit0 left promiscuous mode [ 558.026309][ T8555] device sit0 entered promiscuous mode [ 558.403128][ T8567] device sit0 entered promiscuous mode [ 560.030720][ T8600] device sit0 left promiscuous mode [ 560.285161][ T8606] device sit0 entered promiscuous mode [ 560.522675][ T8598] device veth0_vlan left promiscuous mode [ 560.567721][ T8598] device veth0_vlan entered promiscuous mode [ 560.587415][ T8607] device sit0 left promiscuous mode [ 560.602135][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 560.616552][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 560.691319][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 561.108732][ T8624] device sit0 left promiscuous mode [ 561.778165][ T8635] device sit0 entered promiscuous mode [ 565.139717][ T8668] device veth0_vlan left promiscuous mode [ 565.146496][ T8668] device veth0_vlan entered promiscuous mode [ 565.219820][ T334] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 565.257990][ T334] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 565.307868][ T334] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 565.767437][ T8673] device veth0_vlan left promiscuous mode [ 565.858791][ T8673] device veth0_vlan entered promiscuous mode [ 569.090334][ T8716] device sit0 left promiscuous mode [ 569.111043][ T8716] device sit0 entered promiscuous mode [ 569.167165][ T8732] FAULT_INJECTION: forcing a failure. [ 569.167165][ T8732] name failslab, interval 1, probability 0, space 0, times 0 [ 569.214730][ T8732] CPU: 1 PID: 8732 Comm: syz.3.2255 Not tainted syzkaller #0 [ 569.222331][ T8732] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 569.232491][ T8732] Call Trace: [ 569.235856][ T8732] [ 569.238796][ T8732] __dump_stack+0x21/0x24 [ 569.243149][ T8732] dump_stack_lvl+0xee/0x150 [ 569.247852][ T8732] ? __cfi_dump_stack_lvl+0x8/0x8 [ 569.253066][ T8732] ? copy_from_user_nofault+0xe3/0x140 [ 569.258528][ T8732] dump_stack+0x15/0x24 [ 569.262706][ T8732] should_fail_ex+0x3d4/0x520 [ 569.267383][ T8732] ? getname_flags+0xb9/0x500 [ 569.272155][ T8732] __should_failslab+0xac/0xf0 [ 569.277120][ T8732] should_failslab+0x9/0x20 [ 569.281648][ T8732] kmem_cache_alloc+0x3b/0x330 [ 569.286445][ T8732] ? __cfi_ksys_write+0x10/0x10 [ 569.291498][ T8732] getname_flags+0xb9/0x500 [ 569.296217][ T8732] __x64_sys_unlink+0x3c/0x50 [ 569.301001][ T8732] x64_sys_call+0x958/0x9a0 [ 569.305614][ T8732] do_syscall_64+0x4c/0xa0 [ 569.310048][ T8732] ? clear_bhb_loop+0x30/0x80 [ 569.314728][ T8732] ? clear_bhb_loop+0x30/0x80 [ 569.319495][ T8732] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 569.325406][ T8732] RIP: 0033:0x7f17af58ebe9 [ 569.329833][ T8732] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 569.349799][ T8732] RSP: 002b:00007f17b0427038 EFLAGS: 00000246 ORIG_RAX: 0000000000000057 [ 569.358551][ T8732] RAX: ffffffffffffffda RBX: 00007f17af7b5fa0 RCX: 00007f17af58ebe9 [ 569.366530][ T8732] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 569.374604][ T8732] RBP: 00007f17b0427090 R08: 0000000000000000 R09: 0000000000000000 [ 569.382569][ T8732] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 569.390542][ T8732] R13: 00007f17af7b6038 R14: 00007f17af7b5fa0 R15: 00007ffc9c6148f8 [ 569.398518][ T8732] [ 569.485951][ T8729] device veth0_vlan left promiscuous mode [ 569.495661][ T8729] device veth0_vlan entered promiscuous mode [ 569.759815][ T8743] device veth0_vlan left promiscuous mode [ 569.799993][ T8743] device veth0_vlan entered promiscuous mode [ 570.203559][ T8748] device veth0_vlan left promiscuous mode [ 570.240096][ T8748] device veth0_vlan entered promiscuous mode [ 570.629817][ T8757] device veth0_vlan left promiscuous mode [ 570.671426][ T8757] device veth0_vlan entered promiscuous mode [ 573.242765][ T8787] device sit0 left promiscuous mode [ 573.413465][ T8784] device sit0 entered promiscuous mode [ 573.591865][ T8792] FAULT_INJECTION: forcing a failure. [ 573.591865][ T8792] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 573.721327][ T8792] CPU: 1 PID: 8792 Comm: syz.4.2272 Not tainted syzkaller #0 [ 573.728909][ T8792] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 573.738970][ T8792] Call Trace: [ 573.742259][ T8792] [ 573.745319][ T8792] __dump_stack+0x21/0x24 [ 573.749666][ T8792] dump_stack_lvl+0xee/0x150 [ 573.754352][ T8792] ? __cfi_dump_stack_lvl+0x8/0x8 [ 573.759470][ T8792] dump_stack+0x15/0x24 [ 573.763630][ T8792] should_fail_ex+0x3d4/0x520 [ 573.768392][ T8792] should_fail+0xb/0x10 [ 573.772554][ T8792] should_fail_usercopy+0x1a/0x20 [ 573.777578][ T8792] _copy_from_user+0x1e/0xc0 [ 573.782255][ T8792] __sys_bpf+0x277/0x780 [ 573.786585][ T8792] ? bpf_link_show_fdinfo+0x320/0x320 [ 573.791965][ T8792] ? __cfi_ksys_write+0x10/0x10 [ 573.796943][ T8792] ? debug_smp_processor_id+0x17/0x20 [ 573.802335][ T8792] __x64_sys_bpf+0x7c/0x90 [ 573.806773][ T8792] x64_sys_call+0x488/0x9a0 [ 573.811298][ T8792] do_syscall_64+0x4c/0xa0 [ 573.815753][ T8792] ? clear_bhb_loop+0x30/0x80 [ 573.820434][ T8792] ? clear_bhb_loop+0x30/0x80 [ 573.825117][ T8792] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 573.831007][ T8792] RIP: 0033:0x7f65e818ebe9 [ 573.835509][ T8792] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 573.855115][ T8792] RSP: 002b:00007f65e9095038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 573.863535][ T8792] RAX: ffffffffffffffda RBX: 00007f65e83b5fa0 RCX: 00007f65e818ebe9 [ 573.871606][ T8792] RDX: 000000000000002c RSI: 0000200000000080 RDI: 000000000000000a [ 573.879580][ T8792] RBP: 00007f65e9095090 R08: 0000000000000000 R09: 0000000000000000 [ 573.887597][ T8792] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 573.895658][ T8792] R13: 00007f65e83b6038 R14: 00007f65e83b5fa0 R15: 00007ffefe8cfdd8 [ 573.903640][ T8792] [ 574.273285][ T8803] device veth0_vlan left promiscuous mode [ 574.281248][ T8803] device veth0_vlan entered promiscuous mode [ 574.293792][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 574.302168][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 574.309717][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 574.321262][ T8801] device veth0_vlan left promiscuous mode [ 574.330226][ T8801] device veth0_vlan entered promiscuous mode [ 574.357854][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 574.366317][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 574.373912][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 578.280267][ T8863] device sit0 entered promiscuous mode [ 578.588442][ T8864] device veth0_vlan left promiscuous mode [ 578.638092][ T8864] device veth0_vlan entered promiscuous mode [ 579.066533][ T8874] FAULT_INJECTION: forcing a failure. [ 579.066533][ T8874] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 579.238967][ T8874] CPU: 0 PID: 8874 Comm: syz.4.2293 Not tainted syzkaller #0 [ 579.246636][ T8874] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 579.256788][ T8874] Call Trace: [ 579.260069][ T8874] [ 579.262998][ T8874] __dump_stack+0x21/0x24 [ 579.267351][ T8874] dump_stack_lvl+0xee/0x150 [ 579.271946][ T8874] ? __cfi_dump_stack_lvl+0x8/0x8 [ 579.277070][ T8874] dump_stack+0x15/0x24 [ 579.281244][ T8874] should_fail_ex+0x3d4/0x520 [ 579.285928][ T8874] should_fail+0xb/0x10 [ 579.290258][ T8874] should_fail_usercopy+0x1a/0x20 [ 579.295309][ T8874] _copy_from_user+0x1e/0xc0 [ 579.299938][ T8874] __sys_bpf+0x277/0x780 [ 579.304198][ T8874] ? bpf_link_show_fdinfo+0x320/0x320 [ 579.309685][ T8874] ? __cfi_ksys_write+0x10/0x10 [ 579.314548][ T8874] ? debug_smp_processor_id+0x17/0x20 [ 579.319930][ T8874] __x64_sys_bpf+0x7c/0x90 [ 579.324450][ T8874] x64_sys_call+0x488/0x9a0 [ 579.328959][ T8874] do_syscall_64+0x4c/0xa0 [ 579.333382][ T8874] ? clear_bhb_loop+0x30/0x80 [ 579.338057][ T8874] ? clear_bhb_loop+0x30/0x80 [ 579.342828][ T8874] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 579.348899][ T8874] RIP: 0033:0x7f65e818ebe9 [ 579.353317][ T8874] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 579.373188][ T8874] RSP: 002b:00007f65e9095038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 579.381613][ T8874] RAX: ffffffffffffffda RBX: 00007f65e83b5fa0 RCX: 00007f65e818ebe9 [ 579.389674][ T8874] RDX: 0000000000000020 RSI: 0000200000000200 RDI: 0000000000000015 [ 579.397657][ T8874] RBP: 00007f65e9095090 R08: 0000000000000000 R09: 0000000000000000 [ 579.405639][ T8874] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 579.413613][ T8874] R13: 00007f65e83b6038 R14: 00007f65e83b5fa0 R15: 00007ffefe8cfdd8 [ 579.421606][ T8874] [ 581.391200][ T8908] device veth0_vlan left promiscuous mode [ 581.420623][ T8908] device veth0_vlan entered promiscuous mode [ 581.476507][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 581.500952][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 581.544800][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 581.621122][ T8907] device veth0_vlan left promiscuous mode [ 581.678622][ T8907] device veth0_vlan entered promiscuous mode [ 582.159478][ T28] audit: type=1400 audit(1755847600.925:123): avc: denied { create } for pid=8922 comm="syz.4.2310" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 582.716452][ T28] audit: type=1400 audit(1755847601.475:124): avc: denied { create } for pid=8927 comm="syz.1.2311" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 583.336356][ T8936] device sit0 left promiscuous mode [ 583.556969][ T8941] device sit0 entered promiscuous mode [ 584.280006][ T8952] device veth0_vlan left promiscuous mode [ 584.396399][ T8952] device veth0_vlan entered promiscuous mode [ 584.404835][ T713] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 584.430562][ T713] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 584.530006][ T713] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 584.601987][ T8958] device veth0_vlan left promiscuous mode [ 584.670967][ T8958] device veth0_vlan entered promiscuous mode [ 584.966986][ T8971] FAULT_INJECTION: forcing a failure. [ 584.966986][ T8971] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 585.028857][ T8971] CPU: 1 PID: 8971 Comm: syz.3.2323 Not tainted syzkaller #0 [ 585.036365][ T8971] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 585.046436][ T8971] Call Trace: [ 585.049714][ T8971] [ 585.052641][ T8971] __dump_stack+0x21/0x24 [ 585.056983][ T8971] dump_stack_lvl+0xee/0x150 [ 585.061606][ T8971] ? __cfi_dump_stack_lvl+0x8/0x8 [ 585.066633][ T8971] dump_stack+0x15/0x24 [ 585.070809][ T8971] should_fail_ex+0x3d4/0x520 [ 585.075569][ T8971] should_fail+0xb/0x10 [ 585.079724][ T8971] should_fail_usercopy+0x1a/0x20 [ 585.084745][ T8971] _copy_from_user+0x1e/0xc0 [ 585.089440][ T8971] __sys_bpf+0x277/0x780 [ 585.093711][ T8971] ? bpf_link_show_fdinfo+0x320/0x320 [ 585.099292][ T8971] ? __cfi_ksys_write+0x10/0x10 [ 585.104208][ T8971] ? debug_smp_processor_id+0x17/0x20 [ 585.109582][ T8971] __x64_sys_bpf+0x7c/0x90 [ 585.114004][ T8971] x64_sys_call+0x488/0x9a0 [ 585.118517][ T8971] do_syscall_64+0x4c/0xa0 [ 585.122955][ T8971] ? clear_bhb_loop+0x30/0x80 [ 585.127643][ T8971] ? clear_bhb_loop+0x30/0x80 [ 585.132421][ T8971] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 585.138350][ T8971] RIP: 0033:0x7f17af58ebe9 [ 585.142803][ T8971] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 585.162592][ T8971] RSP: 002b:00007f17b0427038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 585.171239][ T8971] RAX: ffffffffffffffda RBX: 00007f17af7b5fa0 RCX: 00007f17af58ebe9 [ 585.179225][ T8971] RDX: 0000000000000018 RSI: 0000200000000500 RDI: 0000000000000006 [ 585.187265][ T8971] RBP: 00007f17b0427090 R08: 0000000000000000 R09: 0000000000000000 [ 585.195241][ T8971] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 585.203217][ T8971] R13: 00007f17af7b6038 R14: 00007f17af7b5fa0 R15: 00007ffc9c6148f8 [ 585.211636][ T8971] [ 585.551557][ T8981] device sit0 left promiscuous mode [ 585.994178][ T8983] device sit0 entered promiscuous mode [ 586.812461][ T8990] device sit0 left promiscuous mode [ 586.826844][ T8993] device veth0_vlan left promiscuous mode [ 586.846471][ T8993] device veth0_vlan entered promiscuous mode [ 586.910022][ T8992] device sit0 entered promiscuous mode [ 587.195299][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 587.208303][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 587.227996][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 587.286121][ T8996] device sit0 left promiscuous mode [ 587.384254][ T8997] device sit0 entered promiscuous mode [ 589.538512][ T9017] device veth0_vlan left promiscuous mode [ 589.545797][ T9017] device veth0_vlan entered promiscuous mode [ 589.603419][ T9020] device veth0_vlan left promiscuous mode [ 589.625148][ T9020] device veth0_vlan entered promiscuous mode [ 589.685670][ T713] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 589.697005][ T713] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 589.706493][ T713] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 589.714116][ T713] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 589.723324][ T713] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 589.731452][ T713] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 589.741065][ T9023] device veth0_vlan left promiscuous mode [ 589.760536][ T9023] device veth0_vlan entered promiscuous mode [ 589.871121][ T713] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 589.916706][ T713] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 589.964189][ T713] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 591.106081][ T9040] device sit0 left promiscuous mode [ 591.188388][ T9047] device sit0 entered promiscuous mode [ 591.338956][ T9055] device sit0 left promiscuous mode [ 591.495417][ T9057] device sit0 entered promiscuous mode [ 591.806746][ T9054] device sit0 left promiscuous mode [ 591.999043][ T9058] device sit0 entered promiscuous mode [ 592.554594][ T9069] device sit0 left promiscuous mode [ 592.686447][ T9075] device sit0 entered promiscuous mode [ 593.068519][ T9085] device sit0 left promiscuous mode [ 593.197008][ T9087] device sit0 entered promiscuous mode [ 594.140086][ T9111] device sit0 left promiscuous mode [ 594.343201][ T9110] device sit0 entered promiscuous mode [ 594.977286][ T9123] device sit0 left promiscuous mode [ 595.045544][ T9119] device sit0 left promiscuous mode [ 595.180497][ T9125] device sit0 entered promiscuous mode [ 595.385353][ T9124] device sit0 entered promiscuous mode [ 595.706899][ T9134] device sit0 left promiscuous mode [ 596.243917][ T9143] device veth0_vlan left promiscuous mode [ 596.306994][ T9143] device veth0_vlan entered promiscuous mode [ 596.409004][ T9130] device sit0 entered promiscuous mode [ 596.425187][ T9145] device sit0 left promiscuous mode [ 596.443457][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 596.452046][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 596.459830][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 596.471654][ T9137] device sit0 entered promiscuous mode [ 596.503942][ T9144] device veth0_vlan left promiscuous mode [ 596.530112][ T9144] device veth0_vlan entered promiscuous mode [ 596.623624][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 596.632092][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 596.640215][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 597.249295][ T9163] device veth0_vlan left promiscuous mode [ 597.329494][ T9163] device veth0_vlan entered promiscuous mode [ 598.281961][ T9174] device veth0_vlan left promiscuous mode [ 598.311986][ T9174] device veth0_vlan entered promiscuous mode [ 599.168458][ T9187] device sit0 left promiscuous mode [ 599.430874][ T9189] device sit0 entered promiscuous mode [ 599.608221][ T9191] device veth0_vlan left promiscuous mode [ 599.644301][ T9191] device veth0_vlan entered promiscuous mode [ 599.730851][ T9200] device sit0 left promiscuous mode [ 600.155174][ T9202] device sit0 left promiscuous mode [ 600.336746][ T9205] device sit0 entered promiscuous mode [ 600.587732][ T9210] device veth0_vlan left promiscuous mode [ 600.601679][ T9210] device veth0_vlan entered promiscuous mode [ 600.616116][ T9196] device sit0 entered promiscuous mode [ 600.750544][ T9218] device sit0 left promiscuous mode [ 600.983636][ T9220] device sit0 entered promiscuous mode [ 601.243216][ T9222] device veth0_vlan left promiscuous mode [ 601.317816][ T9222] device veth0_vlan entered promiscuous mode [ 602.033645][ T9235] device veth0_vlan left promiscuous mode [ 602.120428][ T9235] device veth0_vlan entered promiscuous mode [ 602.176355][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 602.186462][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 602.194216][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 603.068365][ T9255] device sit0 left promiscuous mode [ 603.191761][ T9254] device sit0 entered promiscuous mode [ 603.795640][ T9267] device sit0 left promiscuous mode [ 604.151209][ T9271] device sit0 entered promiscuous mode [ 605.342486][ T9294] device veth0_vlan left promiscuous mode [ 605.349504][ T9294] device veth0_vlan entered promiscuous mode [ 605.362706][ T713] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 605.371151][ T713] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 605.379102][ T713] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 606.032188][ T9306] device sit0 left promiscuous mode [ 607.662247][ T9329] device sit0 entered promiscuous mode [ 610.390620][ T9349] device veth0_vlan left promiscuous mode [ 610.460967][ T9349] device veth0_vlan entered promiscuous mode [ 610.602364][ T9356] device sit0 left promiscuous mode [ 610.618419][ T9358] device sit0 entered promiscuous mode [ 610.785527][ T9360] device veth0_vlan left promiscuous mode [ 610.819804][ T9360] device veth0_vlan entered promiscuous mode [ 611.393579][ T9368] device veth0_vlan left promiscuous mode [ 611.406174][ T9368] device veth0_vlan entered promiscuous mode [ 611.419612][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 611.428395][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 611.436471][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 611.446258][ T9372] device sit0 left promiscuous mode [ 611.496811][ T9373] device sit0 entered promiscuous mode [ 612.528902][ T9384] device sit0 left promiscuous mode [ 612.808942][ T9387] device sit0 entered promiscuous mode [ 614.005816][ T9397] device veth0_vlan left promiscuous mode [ 614.022489][ T9397] device veth0_vlan entered promiscuous mode [ 614.046062][ T9404] device sit0 left promiscuous mode [ 614.126376][ T9405] device sit0 entered promiscuous mode [ 614.746287][ T9409] device veth0_vlan left promiscuous mode [ 614.757422][ T9409] device veth0_vlan entered promiscuous mode [ 614.772221][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 614.783697][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 614.798159][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 615.479140][ T9430] device sit0 left promiscuous mode [ 615.578187][ T9433] device sit0 entered promiscuous mode [ 616.719791][ T9446] device sit0 left promiscuous mode [ 616.831045][ T9447] device sit0 entered promiscuous mode [ 616.908834][ T9455] device sit0 left promiscuous mode [ 617.205334][ T9454] device veth0_vlan left promiscuous mode [ 617.212248][ T9454] device veth0_vlan entered promiscuous mode [ 617.376432][ T9456] device sit0 entered promiscuous mode [ 618.405925][ T9472] device veth0_vlan left promiscuous mode [ 618.514550][ T9472] device veth0_vlan entered promiscuous mode [ 618.549354][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 618.567900][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 618.581556][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 618.791847][ T9486] device sit0 left promiscuous mode [ 619.419942][ T9478] device sit0 entered promiscuous mode [ 620.176208][ T9501] device sit0 left promiscuous mode [ 620.469959][ T9502] device sit0 entered promiscuous mode [ 620.697050][ T9498] device sit0 left promiscuous mode [ 620.873786][ T9506] device sit0 left promiscuous mode [ 620.979215][ T9508] device sit0 entered promiscuous mode [ 620.992632][ T9507] device sit0 entered promiscuous mode [ 621.315988][ T9515] device veth0_vlan left promiscuous mode [ 621.444626][ T9515] device veth0_vlan entered promiscuous mode [ 621.619968][ T346] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 621.641973][ T346] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 621.710202][ T346] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 621.852893][ T9523] device veth0_vlan left promiscuous mode [ 621.926942][ T9523] device veth0_vlan entered promiscuous mode [ 622.258890][ T9545] device veth0_vlan left promiscuous mode [ 622.320522][ T9545] device veth0_vlan entered promiscuous mode [ 622.434332][ T9553] device sit0 left promiscuous mode [ 622.631996][ T9547] device sit0 entered promiscuous mode [ 622.935033][ T9565] device sit0 left promiscuous mode [ 623.150693][ T9566] device sit0 entered promiscuous mode [ 623.588949][ T9573] device sit0 left promiscuous mode [ 623.617822][ T9574] device sit0 entered promiscuous mode [ 624.178447][ T9586] device sit0 left promiscuous mode [ 624.436521][ T9585] device veth0_vlan left promiscuous mode [ 624.484477][ T9585] device veth0_vlan entered promiscuous mode [ 624.602775][ T713] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 624.670450][ T713] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 624.733077][ T713] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 624.948354][ T9593] device veth0_vlan left promiscuous mode [ 624.958636][ T9593] device veth0_vlan entered promiscuous mode [ 625.600459][ T9610] device veth0_vlan left promiscuous mode [ 625.627905][ T9610] device veth0_vlan entered promiscuous mode [ 625.800865][ T346] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 625.828610][ T346] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 625.920519][ T346] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 626.040983][ T9622] device sit0 left promiscuous mode [ 626.165848][ T9627] device sit0 left promiscuous mode [ 626.303207][ T9619] device sit0 left promiscuous mode [ 626.401611][ T9630] device sit0 entered promiscuous mode [ 626.742358][ T9636] device sit0 entered promiscuous mode [ 627.228204][ T9640] device sit0 entered promiscuous mode [ 627.722763][ T9648] device veth0_vlan left promiscuous mode [ 627.874376][ T9648] device veth0_vlan entered promiscuous mode [ 627.972913][ T9651] device sit0 left promiscuous mode [ 628.068643][ T9653] device sit0 entered promiscuous mode [ 628.944394][ T9670] device veth0_vlan left promiscuous mode [ 628.975400][ T9670] device veth0_vlan entered promiscuous mode [ 629.685437][ T9683] device sit0 entered promiscuous mode [ 632.218853][ T9713] device veth0_vlan left promiscuous mode [ 632.263474][ T9713] device veth0_vlan entered promiscuous mode [ 632.356525][ T9711] device veth0_vlan left promiscuous mode [ 632.371667][ T9711] device veth0_vlan entered promiscuous mode [ 632.584787][ T9723] device veth0_vlan left promiscuous mode [ 632.613183][ T9723] device veth0_vlan entered promiscuous mode [ 632.889066][ T9730] device sit0 left promiscuous mode [ 632.952072][ T9732] device sit0 entered promiscuous mode [ 633.331444][ T9744] device sit0 left promiscuous mode [ 633.839550][ T9749] device veth0_vlan left promiscuous mode [ 633.847940][ T9749] device veth0_vlan entered promiscuous mode [ 633.899752][ T713] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 633.909608][ T713] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 633.920785][ T713] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 633.969170][ T9738] device sit0 entered promiscuous mode [ 634.357492][ T9767] device veth0_vlan left promiscuous mode [ 634.378805][ T9767] device veth0_vlan entered promiscuous mode [ 634.484918][ T9768] device veth0_vlan left promiscuous mode [ 634.565060][ T9768] device veth0_vlan entered promiscuous mode [ 635.426190][ T9785] device sit0 left promiscuous mode [ 635.638510][ T9784] device veth0_vlan left promiscuous mode [ 635.702796][ T9784] device veth0_vlan entered promiscuous mode [ 635.820755][ T9786] device sit0 entered promiscuous mode [ 635.917209][ T713] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 635.926294][ T713] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 635.954967][ T713] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 636.300389][ T9801] device sit0 left promiscuous mode [ 636.459075][ T9803] device sit0 entered promiscuous mode [ 638.154888][ T9823] device veth0_vlan left promiscuous mode [ 638.166782][ T9823] device veth0_vlan entered promiscuous mode [ 638.408763][ T9836] device veth0_vlan left promiscuous mode [ 638.465519][ T9836] device veth0_vlan entered promiscuous mode [ 638.571363][ T9841] device sit0 left promiscuous mode [ 638.626818][ T9842] device sit0 entered promiscuous mode [ 641.476609][ T9886] device sit0 left promiscuous mode [ 641.637261][ T9893] device sit0 entered promiscuous mode [ 641.955781][ T9891] device sit0 left promiscuous mode [ 642.224614][ T9892] device sit0 entered promiscuous mode [ 642.359560][ T9908] device sit0 left promiscuous mode