last executing test programs: 6.673122943s ago: executing program 1 (id=1234): mkdir(0x0, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x10, 0x5, &(0x7f0000000040)=@framed={{0x45, 0xa, 0x0, 0x0, 0x0, 0x61, 0x11, 0x38}, [@initr0]}, &(0x7f0000000000)='GPL\x00'}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) socketpair$tipc(0x1e, 0x5, 0x0, 0x0) mkdir(0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x9, 0x8}, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_clone(0x43001000, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$ITER_CREATE(0x21, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000edff0000000000000000850000000f00000018010000646c012500000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000800000850000000600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x90) recvmsg$unix(0xffffffffffffffff, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={0xffffffffffffffff, 0x18000000000002a0, 0x0, 0x0, &(0x7f0000000100), 0x0, 0xfe, 0x60000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60}, 0x50) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'ip6tnl0\x00', 0x200}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x89f1, &(0x7f0000000080)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00', r0}, 0x10) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x2, 0x2, 0x0, &(0x7f0000000340)) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x9, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000000000000000000000791041000000000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0xd}, 0x94) 4.887930689s ago: executing program 0 (id=1240): perf_event_open(&(0x7f0000004cc0)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x9, 0x400, 0x6, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0xaf1d, 0x1, @perf_bp={0x0, 0x1}, 0x100410, 0x200, 0x2, 0x1, 0x9, 0x9, 0xfffd, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) perf_event_open(&(0x7f0000000800)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x22, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x2, 0x2}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000800)={0x5, 0x80, 0x0, 0x1, 0xff, 0x0, 0x0, 0x0, 0x22, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0, 0x8}, 0x4880}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_LOOKUP_BATCH(0x18, 0x0, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x4, 0xe, 0x0, 0x0, 0x0, 0x200000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x2, @perf_bp={0x0}, 0x0, 0x5, 0x0, 0x0, 0xffffffffffffffff}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x1) bpf$PROG_LOAD(0x5, 0x0, 0x0) r2 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x11, 0xf, &(0x7f0000000340)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000000)='sched_switch\x00', r3}, 0x10) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x89a0, &(0x7f0000000080)) socketpair(0x1, 0x5, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x89a2, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8914, &(0x7f0000000080)) 4.794963967s ago: executing program 0 (id=1242): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="0700000004000000800000000100000028000000", @ANYRES32, @ANYBLOB="c5859b5b5b403eaa0000", @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/27], 0x50) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x8, &(0x7f0000000080)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r0, @ANYBLOB="00000000097e3069b703000000000020850000001b000000b700000900"/40], &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x2d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r1}, 0x18) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x2, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x6, 0x4, 0xfffffffc, 0x7, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x4}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000009007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) socketpair(0x1d, 0x2, 0x2, &(0x7f0000000300)={0x0, 0x0}) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000180)) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x420, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1, 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000e00)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r3, 0x8914, &(0x7f0000000040)={'sit0\x00', @random="4f33e363a4b1"}) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="0b00000005000000000400000900000001000000", @ANYRES32, @ANYBLOB='\x00'/10, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/18], 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f00000004c0)={r4, &(0x7f0000000340), &(0x7f0000000340)=""/171}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1a, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r4], 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000140)='sched_switch\x00', r5}, 0x10) perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x5, 0x0, 0xf3, 0x0, 0x0, 0x1, 0xa66a6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x10, 0x0, &(0x7f0000000600)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r6, 0x8914, &(0x7f0000000900)={'bridge0\x00', @remote}) 4.741921431s ago: executing program 3 (id=1243): perf_event_open(&(0x7f0000001480)={0x2, 0x80, 0x84, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x20000000}, 0x2980, 0x2, 0x0, 0x0, 0x0, 0xd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0xf, 0x4, 0x4, 0x12}, 0x48) r3 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000340)={0xe, 0x4, &(0x7f0000000400)=ANY=[@ANYBLOB="18020000801000000000000004000000850000000700000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x40f00}, 0x80) bpf$BPF_PROG_DETACH(0x8, &(0x7f00000015c0)=ANY=[@ANYRES32=r2, @ANYRES32=r3, @ANYBLOB="05"], 0x10) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000740)={{r2}, &(0x7f00000006c0), &(0x7f0000000700)=r1}, 0x20) sendmsg$inet(r0, &(0x7f0000000980)={0x0, 0x6000, &(0x7f0000000900)=[{&(0x7f0000000640)='U', 0xa00120}], 0x1}, 0x3) 4.416024958s ago: executing program 4 (id=1245): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x10, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000260018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000800"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sk_msg, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x5, 0x400, 0x9, 0x1}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000002c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r1}, 0x10) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001b00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001d80)=ANY=[@ANYBLOB="28010000000000000100000001"], 0x128}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r2, &(0x7f0000001b00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001d80)=ANY=[], 0x128}, 0x0) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={0x0}, 0x18) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x17, 0x0, 0x4, 0xff, 0x0, 0x1}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005800000095"], 0x0}, 0xb2) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xa, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x16, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={r4, 0x2000000, 0xe, 0x0, &(0x7f0000000200)="63eced8e46dc3f0adf33c9f7b986", 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) 4.414604378s ago: executing program 0 (id=1246): perf_event_open(&(0x7f0000004cc0)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x9, 0x400, 0x6, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0xaf1d, 0x1, @perf_bp={0x0, 0x1}, 0x100410, 0x200, 0x2, 0x1, 0x9, 0x9, 0xfffd, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) perf_event_open(&(0x7f0000000800)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x22, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x2, 0x2}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000800)={0x5, 0x80, 0x0, 0x1, 0xff, 0x0, 0x0, 0x0, 0x22, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0, 0x8}, 0x4880}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_LOOKUP_BATCH(0x18, 0x0, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x4, 0xe, 0x0, 0x0, 0x0, 0x200000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x2, @perf_bp={0x0}, 0x0, 0x5, 0x0, 0x0, 0xffffffffffffffff}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x1) bpf$PROG_LOAD(0x5, 0x0, 0x0) r2 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x11, 0xf, &(0x7f0000000340)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000000)='sched_switch\x00', r3}, 0x10) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x89a0, &(0x7f0000000080)) socketpair(0x1, 0x5, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x89a2, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8914, &(0x7f0000000080)) 4.351903283s ago: executing program 1 (id=1247): bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x4}, 0x0, 0x0, 0x0, 0x7, 0x0, 0x9}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340), 0x48) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000040)={r0}, 0x4) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18020000000000000000"], 0x0}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000840)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x6, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback=0x37, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000040)='mm_page_alloc\x00', r2}, 0x10) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000080)='mem\x00\x10\x00\x00\x00\x00\x00\x00I\xa2l') r3 = syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000080)) write$cgroup_subtree(r3, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0xb, 0xffffffffffffffff, 0x2) r4 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000100)=ANY=[@ANYBLOB="180000000900000000000000213f0000c50000000e800000850000000e00000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) r5 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='mmap_lock_acquire_returned\x00', r4}, 0x10) r6 = bpf$ITER_CREATE(0xb, &(0x7f0000000100)={r5}, 0x8) write$cgroup_int(r6, &(0x7f00000001c0), 0xfffffdef) r7 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000280)=@bpf_lsm={0x6, 0x3, &(0x7f00000003c0)=ANY=[@ANYBLOB="18000000003f000000000000000000f195"], &(0x7f0000000140)='GPL\x00'}, 0x80) bpf$BPF_PROG_TEST_RUN(0x1c, &(0x7f0000000240)={r7, 0xf, 0x25, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000001940)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$unix(r8, &(0x7f00000063c0)={&(0x7f0000005cc0)=@abs={0x1}, 0x3, 0x0}, 0x0) r9 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x6, 0xe, &(0x7f0000000000)=ANY=[@ANYRESOCT=r8], &(0x7f0000000040)='syzkaller\x00', 0x9, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @xdp, r6, 0x8, &(0x7f0000000540)={0x5, 0x1}, 0x8, 0x10, &(0x7f0000000340)={0x1}, 0x10}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000c80)={r9, 0x2000012, 0xe, 0x0, &(0x7f0000000c40)="63eced8e46dc3f2ddf33c9e9b986", 0x0, 0x7ffe, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000000900)={0x11, 0x18, &(0x7f0000000640)=ANY=[@ANYBLOB="18000000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000000000018230000", @ANYRES64=0x0, @ANYBLOB="0000000000000000b70500000000000085000000a5000000180100002020640500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000a50000000800000095"], &(0x7f00000005c0)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback=0x36, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) unlink(0x0) r10 = bpf$MAP_CREATE(0x0, &(0x7f0000000a00)=ANY=[@ANYBLOB="1b00000000000000000000000080000000000000", @ANYRES32, @ANYBLOB='A\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="000000000000000000000000000071000000002e0000a10000000000000de2e4b31e0a9346d33efcf94e73e72d44215e2999dbaad919068b1ac4c820cc44bab10ea514b8f68aa39d7aac753a69"], 0x50) r11 = bpf$PROG_LOAD(0x5, &(0x7f00000003c0)={0x3, 0x8, &(0x7f0000000580)=ANY=[@ANYBLOB="18000000000000000000000000000000850000005c00000018110000", @ANYRES32=r10, @ANYRES32=0x0], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sched_cls, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0xc3) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000004c0)={r11, 0x18000000000002a0, 0xe, 0x0, &(0x7f0000000280)="d2ff03076003009eb89e08f08c48", 0x0, 0xd5b1, 0x60000000, 0x0, 0x0, 0x0, 0x0}, 0x50) 4.312190467s ago: executing program 3 (id=1249): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x10, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000260018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000800"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sk_msg, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x5, 0x400, 0x9, 0x1}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000002c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r1}, 0x10) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001b00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001d80)=ANY=[@ANYBLOB="28010000000000000100000001"], 0x128}, 0x0) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x17, 0x0, 0x4, 0xff, 0x0, 0x1}, 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xa, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x16, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={r2, 0x2000000, 0xe, 0x0, &(0x7f0000000200)="63eced8e46dc3f0adf33c9f7b986", 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) 3.055248971s ago: executing program 0 (id=1250): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x15, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb7030000080000002d01000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x3, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b70400000000000085000000c3"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x5, 0x4, 0xfff, 0x7}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000280)={0x12, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="1800000000000000000000000000000073010a00000000009500000000000000"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x14}, 0x80) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f00000002c0)='hrtimer_start\x00', r1}, 0x3d) r2 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@ptr]}}, 0x0, 0x26}, 0x20) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a00)={0x6, 0xd, &(0x7f0000000bc0)=ANY=[@ANYBLOB="180000000000000000000000000000009500000000000000950000000000000018400000ffffffff000000000000000018100000", @ANYRES32, @ANYBLOB="00000000000000001850000000000000000000000000000018400000f8ffffff000000000000000095"], &(0x7f0000000300)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, r2, 0x8, 0x0, 0x0, 0x2, &(0x7f0000000940), 0x10}, 0x94) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000200), 0x46c40, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000640)={r0, 0x58, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000680)={0x1b, 0x0, 0x0, 0x4, 0x0, r0, 0x1, '\x00', r4, r2, 0x5, 0x1, 0x4}, 0x50) ioctl$TUNSETOFFLOAD(r3, 0x400454d0, 0x11) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000400)={&(0x7f0000000c40)="1e06fd824fcefc395abc892696b0e7f992c55e33dc0d75656fefdf5668b7f62afdb474b91b0aeef066025c52cf5d93aece48b551eab5ad00ca1036375a9348a29312a8594a1de528be78c5e5c578683ccec46e60d2da295679f1fe13d2df277c565c8d65da3e5c355df7f3eba2a49a86b823da0c5aad6a10f4e593ee280eba62804d1630044826f11ae8816b6036184fe87ab6a92eebdefa26bfcac7f799accc6354d439a567dfb24d5c78db222aaa8ac5ebdea1cb342fb8a9ac87ced4d0e86d992531a3cb0ddaefb5f5babebaac0970ec78337e9fd17d5f6dcb7f070e0d4e9cde11ad4f7eb54e5683bca21db9c44ee5fd3c89a6dfac817ecaf10b92e15236c3a5556f60c154bc429682904d5021635e3f08f2efde5aad4cf61fdd3b68b4a4ff6edc1b2240c9b25368b9976745107dd5c256d2eb0c624ce3a634e68cc793863f1e630ea1b53a6117333c2f8acf04451ca8b00eec04a266f87a766e0db5ba02122d0bf0af39cac0ada25cdc4f2e46a93e2132f257f180e6972a7739b372fd5ead928637869087f213e3eea682cbf4578f498196c88859a97b0888806d46474f8e9aa8dde6bac12c80efab47e929c3243da662a6f8cd96c8b89f78c5aa121d9f5044ef656bbde3c7d47578808c74e7135ee974c86adf33da438ec48bfa85c16a58280fe9c16b4bcc84835126d97ada4b1f318067476b38660ab30d6465bc4fff027ec49cdf00d29849a9b4e82e7c294d2677f5879dca33ccbf38bd17846e7d06f2978c2778f1a454fb02d7f04831f4ad543a27d77cc845fba0a77a6aeafedbc9fbd222ea530a48c941f78695636c90448d14fedba89d2bd5c8874c2658a8baeb6422a6325dbb00dcc0b4039d05be9db395d88b3fccbcaf30309c81b245072470a6f395ec0d61df704d9986c9091106ac2df547d8213c3e88bd231a2600151397eaa2f1dae0e56d8267f4cd6e46e6ae831e520809afc0e417a571edbe1ac850407b9a33c880372acc25af9263684eaca457741efcbf1927f3bbb90867a89a2e4994ac00a4cdb30524f42b102feb319d1052d2dfb918ad4945f3444d191e7327a7af7406b90dae4aebb3662be8879067d9c5ee5c656714308b41f63183bcfe6596e74ba99952aba42281b4f37bd23077eef26bcb0bc64a6e04c1c682dffe5580908b66e7775531169b7e5d4a9824ae4cc0c7385cc9ca008cc69332021977b5a254eae2835f9cfc596e6b4a179977790b192b6c159511b8684dd2df923e05b9639c2271f3ae7f956e0298e934e8f85684fa33fdc580f870aec217818012919d9745ca9004e98d5c9d55bbfa53a5f6045b30409bb0dede834b66fcde62db2300e9c1b02942b742798191b9024e3ded60728f61ae8d8bb9001dc1f69ce946d666ac5a37ddaba58c470c3bd7aa608a329df1be931542c82d275c812d7dac7e7632802caafaafc574d9d9ca359e8c3742e298644d111aff87a476028a2c2cd5faa52fb81eb453c8224adc0400ba76bdf8a412c47f5c1413788685e8b1453fed01939acf1702548d761217f38812ed5c59d9a19fc20bce2fe28e98204e8cc2b05573ae4f3e8bd43cc99d98d670481b3095a003c9cbdf6a2129cfc918a728629b07f57ffeb1b8948e86b60c644fa9d0da70f966b7d64a486f76c5910faa13541fe7d31f80cd55e8188a4139efba9d17e37e22e1245ac96bad86b93266dd0721ab4db1f0c052e6ce0e99df600b1a007b679ac0b37e993c680f73f2aab12e3bb4934412d11982f79a9aec99716a5a7c66f357dc12d9507eb6cde1cacfc95ff1d060a04635dc6185ef23ad9ba9c475faecf26425b69e7fb3035f8658f17f3b235ca600932213ff81da9b36b1709cb21d909424a749872c3db113e24a3e98be09211f5827eea6707f01e2c67eaa7a13c1752b1e9fa4eca2f6bb6c3ac0580a38d62c0bcf80805014c9c5dbde2c7a4c877a754941bc4d743d9bf13c50f928dacca1cbd72ffb36ea157579bdcdcef14acd9aa434cc7fe372697cc45ad9f5bbcd2bd288ce2ff08af21ebec19ea18d61106cf5ab78ce3393e7b8291eb2181707cc22bdb68f992176cb07de2808aae0279db0f4a1982559ca1c2c687cdfc6022c33ebac3e8120fd5dd6f08deae8a5e2f4439b6224ace9c90c04174878930a9b5b88ecda8ef890ef21dc6a5468432a7f1f8ac3b296c764fc7675781163cea7f901a5a3d8d610f24de767c8c26a46d907e9ab818a604a07722383c18c0c949c547266399b6466fbd1018065d8e23d5aee8515421e9454bc4ae581bcb2482e092300d7f8c040eb5e9fcb4fe752bb3046148a8da8c40d6fed67e5cd622fc94c7f552f0578b3506fef71756b28906313872dfe2994435ec47b42c0b6472988f14352b6a3900d88a5c8674ffa75be093a6cf0e843e0182ee2a7d0904dfdeceea42c39aeaf9c2ea500ec7c83d2738d66e84fb1ed77153ded4c2f9dea42ab720051d773f9cec61390a98ea4587bd4c1f60296d2677cdcbb86af7b87b5332139fd61ae36f29f56f0810b800949d95aff6003d4438a162604be0d1a72147ca5d601effc5ce5fc92e45ee47854bcc95c461ffdae07051ca51e3f70d1a6cc80a331d1de3983b917e6361da55cd98ca67b5c27f92d0ebecde2a08ebb420daa51ff1ba5c30829b8e506137e349af1274606acd6f6cab2e876d2e4b3a411143e4a02ebb141883793c6b0056b0e020f7be54e3ccb00feeff2e1220848741739f8a1a8d9a4455dc5c5bc32b663b6eb69e83036480c4f6feecdca640538a6446c54f1f0312a44fbc5fa21190c23fe632820a417c3c8ccd1a685352a1178e7bd39f0c06d64c9b6e2788cba18e1151d48668800b7252fcd20c9bdc6686b475d287117c1f8981bcff8519f924f658ab6a00579d3f2e3d79eee0f465e9401684f3f13f0020378b1791adb10add3dc93582f903e1b5acedeaccf23fa96f1347d833d4270e931d826e500da3af0c9e4a0606d2e7dbc0e8d1a76c12dc6557a0be3076f68dea3eef3ef31948997aba771981fab64ea15a6675ed04228b47c979ddae33111679f58697a7defcc588b4ea9f5a6f1f87b060c6d328a4972e21550114f738126933d715bd1675471562b7d866e434618b95d7a8a17fe34e3da08dbc60a1f01d0eaa4e37e77157270c5c58aa4f0964610bc3c44ac6171588652a3e6277b116549f583d4e010472200acfee97b81675832a41951d07750e4e0a121fd77a59060081dcf2940167320d66c4dd4f01110c5776c8c7f01d388c0e19480aa7e483287305377c0e08704d89dbfe38d3a0254ccc2e6648f6961012b075326ebc129c3f51ad3ea8e5a20b61fc8f2c0a982dd0b2895be45aa28dbbcb8675717ac50931be723629ef60beec8acb3cc1c45fc176310b84238a24ff7c3751fa0bdaf667fb291bfe08feca8565b2c28254761f5815238eddac3e578672884f4e9feaa8d19c64cbe791e38de4b6b0e0389c94b6eb7ab4c0dcd0f999854ff76133e38cb0c42b151f06ab9781f4e1f28edc8e11b59fba4112817f151b97441c85be698aa3d4902ab845abe27f6eee9a8ec4c02a951357e20e12e44bf9fe00e3714e2ce0632f099a151d34df3f516d515a99dd3d7612e90fa48385317358f8661eda1d1520d97557c19695dbdaa46cf4dbb02ae8cce7cab5aa8d56b3a88ad58ab5dd3e9f40621bf8ebd8353c858204379b8c16c0700df712a7d1a8b0fbd274080dc8f5a2cf1df057d3f57b6dec6f7d30d58f9a67c3606332161f75481cda9ddd7f312601ead4c567701ba45b154c9119f86cc739a42bfae43cfdb3a5dcb54267e27be167bdf78bf95a9d70c9b0b5d6703bfe5b2e24aed87f4ca7b87ac52540c99d45804d42e7526142ab1bb0389cae9890dbee6aa632bed163b061021d7f09147dc69607ef63d2cb678c7705acb36640e20e634419fe33bfa268a672b5a81375b8b029d14f8c5b7a4b41e9f9f9106357f8e405f55757536b15aae4dd80bf34bb9f0b17899e1802f61e5ed1cd28e4b02f626b32b7643a3dd663856ad091e1b9e55a05ee8d508dfe2f4502ba94b4bd0cf59575bbd65766e7af133d7d42440a804231ad9bfe4ac903f79474d44cb25304717ed2a644b3d01a57ce9ccd7b8b24fb8b4a2d8a324c4698e6474d8b73509d2817b96d69f9b210219195d6549ae1256f419f3acb735c306b4c816b969957e8173ef70e8679958eba15554ef813476c816ce5bd691027665d5aa566971929b1a01c065f19d01eb9286de5663530bfa4c400829cb6d4c2916bcadf6caf2b878321cb96c24cb5600497519903bace8c2f4bb58f71e90c15a6530f97345c34577c58f3ae5544e0bcba412c471c3b738f4907d48bdc70b6c9727c7271c14276d262a1c3882d1cdd19486915779d63ed547d0135ddcbf5d69c0454f61c1f77da3f708c48ba2a3073a0a86ffc32294eb482c5a08e43b2662ef550f0fcbc580cac93a16beadc0edb020123d8b88b19b657a5bac9135b8bf7d71e3937ebee6468a81fe819c73b7506571a170c3373adf133fe2617ddf4e80caa6bce090d69cb02ea2ce55cfacdb60b4b714343032e3a1c827bcbe02507fcb1459795d68e0ac0acd472b4ad66ec70153c809a98636a1abea3f3c78f2f4d2c6104b4d420987999c14a8d40cecc7d59d65b00bd7598b883128bd0d9eb14377839faacfc0df1ff09cd6b84629f87b3ea901daafe25afb74faf1159a835f6492e9287d81f1b83d752dc64002dd198b06a4716f97853d022d2d36ff5db772f9a1e250c40fc03c091ee9310a0cabdf34441100fd4dfb4076ec2823d8242f644f8d40b700ffc12bb4e1c2347c4f61d996249b7bd7658bc16a7a1358d5bd85cfaf5f388791a1419f7076cd6df4c55ea2b8e8e436c114c0f9b7149350a89d9dd63cd19f256d5184641462e32b5e0fb2bad53b0be5411436d2c3ad71d46e4bd279e9869a44614853ad7880276dee5804d6f07ae317515a1eda52ad84c37f96e3ff79466b261831970efb0e58e0f311bef489ca7261314d665c67ede34a27fec925e0738cd228b6c0a06f45f1c7a63f808e212cdf1df8957015330e72d14d805cf75351cfab7740858cb164e68d8c309b44c55630ea140f07d00fa0c938c08d43e6435673f09a85543234cd20e6ae317a70de1d6c38510e85dacd45cbd1f3ffc804d653d4d25b637df5b3bbaf6e9a9eb46949a4db4b83a412869d7799fa290dcda9975d300712fe2cb3de7ea2817f00d9bd51802c0a1b1733991846b5a3b4c4d9bc7f77464ef6076422baaf923747b1622979e0d9da30f4504787a84e2c57b81796f6fb9dfb3b5123029844783a0f840a803ad736bb569ed3dc5f13e5a1c89aea3a8eaff754fae4d9ddc0983705c2013357b6c9abddc888f5ce48db2298c3558f9e420a95181e12de3df9171b85197dce7600402844e65ce7f383110d19846542d00ded40389656fe51c23edcbafd9757cabf54a598b421c7bb2e5d4e25ca05238f168c667b3856188f69abb5720dcc7a0abbe0bb24fc72dedfba66f5def34de2bee862bd170711eda4cb691c83171cf743428054af823dbd786aaeadc5091efd18fc33cc58cd745c4ffcca3edafd062758b03bce9f9f983c2ee00bb4a1df3672d25f34d1f11adc533db70178bfb060a40e009078449bf247da0fe3d26b5b7615b2b6b997d9daf21f052949ddcb7cb992adbb92767561c6128d7cac9c4ef89554b9df735ec75d983d44522c81d967263da22273e6b869bbdd90f254e8e0a35fd8702956ef192e4ced09312c0680a8751064da4eefd72c55e5a2eb6aec8ad1", &(0x7f0000000340)=""/184, &(0x7f0000000580)="898d3a096073ab7efc71883b324bf0049193b43150fe46025b51e196d0102b7bbec94c2fc2ca873d423789f9ac5a88ed98c99fb37f7c4df5dc70d6f25a7e48b2e3dbbd134e25ac2d9c1e73db04eac87fb5ad772621b23e3b690473144a95112cccf008c96fdd503b3af6a462c26e2c1ee168d4456befc603ff6740ec6aae232c6925f3ca", &(0x7f0000000280)="f1", 0x2, r0, 0x4}, 0x38) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="05000000040000000800000003"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x16, 0x0, 0x0, &(0x7f0000000000)='GPL\x00', 0x5, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0xb}, 0x94) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000000)={'\x00', 0x202}) bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x3, 0x3, &(0x7f0000000000)=ANY=[@ANYBLOB="1812"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sched_cls, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'bridge0\x00', 0x1}) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x68, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r5, 0x89f0, &(0x7f0000000080)) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000800)={0x1d, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r6, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000080)) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1b, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000040)='hrtimer_init\x00', r7}, 0x10) socketpair(0xa, 0x1, 0x0, &(0x7f0000000000)) 3.054833581s ago: executing program 2 (id=1251): bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1a, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x13}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x100, 0x10020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x30}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1b, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18020000000000000000"], 0x0, 0x0, 0x0, 0x0, 0x40f00}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000200)={{r1}, &(0x7f0000000180), &(0x7f00000001c0)=r0}, 0x20) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000940)={&(0x7f0000000040)='sys_enter\x00', r2}, 0x10) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) close(r4) recvmsg$unix(r3, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0xffffffffffffffae}, 0x0) write$cgroup_subtree(r5, &(0x7f0000000000)=ANY=[], 0xfdef) 3.046617862s ago: executing program 4 (id=1252): perf_event_open(&(0x7f0000004cc0)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x9, 0x400, 0x6, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0xaf1d, 0x1, @perf_bp={0x0, 0x1}, 0x100410, 0x200, 0x2, 0x1, 0x9, 0x9, 0xfffd, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) perf_event_open(&(0x7f0000000800)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x22, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x2, 0x2}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000800)={0x5, 0x80, 0x0, 0x1, 0xff, 0x0, 0x0, 0x0, 0x22, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0, 0x8}, 0x4880}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_LOOKUP_BATCH(0x18, 0x0, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x4, 0xe, 0x0, 0x0, 0x0, 0x200000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x2, @perf_bp={0x0}, 0x0, 0x5, 0x0, 0x0, 0xffffffffffffffff}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x1) bpf$PROG_LOAD(0x5, 0x0, 0x0) r2 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x11, 0xf, &(0x7f0000000340)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000000)='sched_switch\x00', r3}, 0x10) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x89a0, &(0x7f0000000080)) socketpair(0x1, 0x5, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x89a2, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8914, &(0x7f0000000080)) 2.989753376s ago: executing program 2 (id=1253): r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0xb, &(0x7f00000005c0)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000730000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000000000008500000006000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='kfree\x00', r0}, 0x10) socketpair(0x11, 0x3, 0x3, &(0x7f0000000040)) 2.95081101s ago: executing program 3 (id=1254): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x3, &(0x7f0000000200)=ANY=[@ANYBLOB="180000000000000000000000000000009500000000000000b1cebe3aac31776d27fdd73c0d657f164dec867a5bf7ab817c4b78f27507988bb8f762b978196e744f7e08a24f56029ef55544ccb30d8e45710f79777687857577c1bc946c7842cd384eca0d865593c0b2477292f915612cd6609b1bf88a3205609c46cd77e6b92555e1f99023d9fcd4b082398a3ce753db26753dc6dcf7db8bb7f5cc75a117d4755c77599a2e29e1969bafe5f28d6eac5030bd2c41d27898"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r0}, 0x10) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="1e0000000900000049a200006c0a000000010000", @ANYRES32, @ANYBLOB="7f00000000000000000000000000000000000000a5756b17cc7c01be7d8b06ddc5bcf871ef96bde54db3ab2f4b27", @ANYRES32=0x0, @ANYRES32, @ANYBLOB="01000000000000000500"/28], 0x50) bpf$MAP_DELETE_BATCH(0x18, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0xe30a, r1}, 0x38) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0xb, &(0x7f00000005c0)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000730000007b1af8ff"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x94) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000440), 0x301840, 0x0) ioctl$TUNSETTXFILTER(r3, 0x400454d1, &(0x7f0000000480)=ANY=[@ANYBLOB="01000100aeaaaaaaaa34"]) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='kfree\x00', r2}, 0x10) socketpair(0x1e, 0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x13, 0x14, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000002d00000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000280)={&(0x7f0000000000)='sched_switch\x00', r4}, 0x10) perf_event_open(&(0x7f0000000340)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x21, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$tipc(0x1e, 0x5, 0x0, 0x0) r5 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000140)}], 0x1}, 0x0) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='blkio.bfq.io_wait_time_recursive\x00', 0x275a, 0x0) ioctl$SIOCSIFHWADDR(r6, 0x4030582b, &(0x7f0000000280)={'lo\x00', @multicast}) close(r5) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={0x0, 0x0, 0x1e}, 0x28) bpf$MAP_GET_NEXT_KEY(0x4, 0x0, 0x0) syz_clone(0x24001100, 0x0, 0x900, 0x0, 0x0, 0x0) socketpair$tipc(0x1e, 0x2, 0x0, 0x0) bpf$MAP_CREATE_CONST_STR(0x0, 0x0, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={0x0}, 0x18) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 2.94534753s ago: executing program 4 (id=1255): bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1a, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x13}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x100, 0x10020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x30}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1b, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18020000000000000000"], 0x0, 0x0, 0x0, 0x0, 0x40f00}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000200)={{r1}, &(0x7f0000000180), &(0x7f00000001c0)=r0}, 0x20) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000940)={&(0x7f0000000040)='sys_enter\x00', r2}, 0x10) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) close(r4) recvmsg$unix(r3, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0xffffffffffffffae}, 0x0) write$cgroup_subtree(r5, &(0x7f0000000000)=ANY=[], 0xfdef) 2.940346571s ago: executing program 1 (id=1256): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="0700000004000000800000000100000028000000", @ANYRES32, @ANYBLOB="c5859b5b5b403eaa0000", @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/27], 0x50) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x8, &(0x7f0000000080)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r0, @ANYBLOB="00000000097e3069b703000000000020850000001b000000b700000900"/40], &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x2d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r1}, 0x18) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x2, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x6, 0x4, 0xfffffffc, 0x7, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x4}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000009007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) socketpair(0x1d, 0x2, 0x2, &(0x7f0000000300)={0x0, 0x0}) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000180)) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x420, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1, 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000e00)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r3, 0x8914, &(0x7f0000000040)={'sit0\x00', @random="4f33e363a4b1"}) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="0b00000005000000000400000900000001000000", @ANYRES32, @ANYBLOB='\x00'/10, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/18], 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f00000004c0)={r4, &(0x7f0000000340), &(0x7f0000000340)=""/171}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1a, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r4], 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000140)='sched_switch\x00', r5}, 0x10) perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x5, 0x0, 0xf3, 0x0, 0x0, 0x1, 0xa66a6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x10, 0x0, &(0x7f0000000600)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r6, 0x8914, &(0x7f0000000900)={'bridge0\x00', @remote}) 2.931379511s ago: executing program 2 (id=1257): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x10, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000260018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000800"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sk_msg, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x5, 0x400, 0x9, 0x1}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={0x0}, 0x18) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x17, 0x0, 0x4, 0xff, 0x0, 0x1}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005800000095"], 0x0}, 0xb2) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xa, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x16, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={r2, 0x2000000, 0xe, 0x0, &(0x7f0000000200)="63eced8e46dc3f0adf33c9f7b986", 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) 2.830160579s ago: executing program 4 (id=1258): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="05000000040000000800000005"], 0x48) bpf$MAP_CREATE(0x0, 0x0, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x1ffffc8b, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x1d, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x16, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @flow_dissector, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r1, 0x2000000, 0xe, 0x0, &(0x7f0000000200)="63eced8e46dc3f0adf33c9f7b986", 0x0, 0x3800, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) 2.81757478s ago: executing program 2 (id=1259): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x10, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000260018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000800"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sk_msg, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x5, 0x400, 0x9, 0x1}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000002c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={0x0}, 0x18) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x17, 0x0, 0x4, 0xff, 0x0, 0x1}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005800000095"], 0x0}, 0xb2) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xa, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x16, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={r2, 0x2000000, 0xe, 0x0, &(0x7f0000000200)="63eced8e46dc3f0adf33c9f7b986", 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) 2.801480702s ago: executing program 0 (id=1260): bpf$MAP_CREATE(0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="0700000004000000800000000100000028000000", @ANYRES32, @ANYBLOB="c5859b5b5b403eaa0000", @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x50) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00'}, 0x18) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x6, 0x4, 0xfffffffc, 0x7, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x4}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000009007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) socketpair(0x1d, 0x2, 0x2, &(0x7f0000000300)={0x0, 0x0}) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r1, 0x8914, &(0x7f0000000040)={'sit0\x00', @local}) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x420, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1, 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000e00)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r2, 0x8914, &(0x7f0000000040)={'sit0\x00', @random="4f33e363a4b1"}) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="0b00000005000000000400000900000001000000", @ANYRES32, @ANYBLOB='\x00'/10, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/18], 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f00000004c0)={r3, &(0x7f0000000340), &(0x7f0000000340)=""/171}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1a, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r3], 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000140)='sched_switch\x00', r4}, 0x10) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x5, 0x0, 0xf3, 0x0, 0x0, 0x1, 0xa66a6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x10, 0x0, &(0x7f0000000600)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r5, 0x8914, &(0x7f0000000900)={'bridge0\x00', @remote}) bpf$MAP_CREATE(0x0, 0x0, 0x0) socketpair$tipc(0x1e, 0x2, 0x0, 0x0) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x89a1, &(0x7f0000000900)={'bridge0\x00', @broadcast}) 2.767911104s ago: executing program 1 (id=1261): perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x10020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x3a0ffffffff) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, 0x0, 0x0}, 0x94) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x100, 0x100, 0x9, 0x1, 0x1}, 0x48) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000000), &(0x7f00000002c0), 0x8, r0}, 0x38) bpf$MAP_LOOKUP_BATCH(0x1b, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000100), 0x0, 0x3, r0}, 0x38) 1.96512874s ago: executing program 3 (id=1262): perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_bp={0x0}, 0x8100, 0xc8, 0xffffffff, 0x0, 0x0, 0x341}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1a, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x13}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x100, 0x10020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x30}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1b, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000016"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000200)={{r1}, &(0x7f0000000180), &(0x7f00000001c0)=r0}, 0x20) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000940)={&(0x7f0000000040)='sys_enter\x00', r2}, 0x10) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) close(r4) recvmsg$unix(r3, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0xffffffffffffffae}, 0x0) write$cgroup_subtree(r5, &(0x7f0000000000)=ANY=[], 0xfdef) 1.9642268s ago: executing program 4 (id=1263): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x10, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000260018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000800"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sk_msg, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x5, 0x400, 0x9, 0x1}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000002c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r1}, 0x10) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001b00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001d80)=ANY=[@ANYBLOB="28010000000000000100000001"], 0x128}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r2, &(0x7f0000001b00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001d80)=ANY=[], 0x128}, 0x0) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d2d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, 0x0) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, 0x0, &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x17, 0x0, 0x4, 0xff, 0x0, 0x1}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005800000095"], 0x0}, 0xb2) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xa, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x16, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={r4, 0x2000000, 0xe, 0x0, &(0x7f0000000200)="63eced8e46dc3f0adf33c9f7b986", 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) 1.96373719s ago: executing program 1 (id=1264): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x10, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000260018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000800"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sk_msg, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x5, 0x400, 0x9, 0x1}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000002c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r1}, 0x10) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001b00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001d80)=ANY=[@ANYBLOB="28010000000000000100000001"], 0x128}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r2, &(0x7f0000001b00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001d80)=ANY=[], 0x128}, 0x0) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={0x0}, 0x18) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x17, 0x0, 0x4, 0xff, 0x0, 0x1}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005800000095"], 0x0}, 0xb2) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xa, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x16, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={r4, 0x2000000, 0xe, 0x0, &(0x7f0000000200)="63eced8e46dc3f0adf33c9f7b986", 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) 1.875292967s ago: executing program 2 (id=1265): perf_event_open(&(0x7f0000004cc0)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x9, 0x400, 0x6, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0xaf1d, 0x1, @perf_bp={0x0, 0x1}, 0x100410, 0x200, 0x2, 0x1, 0x9, 0x9, 0xfffd, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) perf_event_open(&(0x7f0000000800)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x22, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x2, 0x2}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000800)={0x5, 0x80, 0x0, 0x1, 0xff, 0x0, 0x0, 0x0, 0x22, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0, 0x8}, 0x4880}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_LOOKUP_BATCH(0x18, 0x0, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x4, 0xe, 0x0, 0x0, 0x0, 0x200000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x2, @perf_bp={0x0}, 0x0, 0x5, 0x0, 0x0, 0xffffffffffffffff}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x1) bpf$PROG_LOAD(0x5, 0x0, 0x0) r2 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x11, 0xf, &(0x7f0000000340)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7020000140000e5b7030000000000008500000083000000bf090000000000005509010000"], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000000)='sched_switch\x00', r3}, 0x10) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x89a0, &(0x7f0000000080)) socketpair(0x1, 0x5, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x89a2, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8914, &(0x7f0000000080)) 1.870977158s ago: executing program 3 (id=1266): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x10, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000260018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000800"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sk_msg, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x5, 0x400, 0x9, 0x1}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000002c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r1}, 0x10) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001b00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001d80)=ANY=[@ANYBLOB="28010000000000000100000001"], 0x128}, 0x0) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x0) perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x17, 0x0, 0x4, 0xff, 0x0, 0x1}, 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xa, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x16, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={r2, 0x2000000, 0xe, 0x0, &(0x7f0000000200)="63eced8e46dc3f0adf33c9f7b986", 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) 84.601523ms ago: executing program 1 (id=1267): bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x4}, 0x0, 0x0, 0x0, 0x7, 0x0, 0x9}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340), 0x48) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000040)={r0}, 0x4) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18020000000000000000"], 0x0}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000840)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x6, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback=0x37, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000040)='mm_page_alloc\x00', r2}, 0x10) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000080)='mem\x00\x10\x00\x00\x00\x00\x00\x00I\xa2l') r3 = syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000080)) write$cgroup_subtree(r3, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0xb, 0xffffffffffffffff, 0x2) r4 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000100)=ANY=[@ANYBLOB="180000000900000000000000213f0000c50000000e800000850000000e00000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) r5 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='mmap_lock_acquire_returned\x00', r4}, 0x10) r6 = bpf$ITER_CREATE(0xb, &(0x7f0000000100)={r5}, 0x8) write$cgroup_int(r6, &(0x7f00000001c0), 0xfffffdef) r7 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000280)=@bpf_lsm={0x6, 0x3, &(0x7f00000003c0)=ANY=[@ANYBLOB="18000000003f000000000000000000f195"], &(0x7f0000000140)='GPL\x00'}, 0x80) bpf$BPF_PROG_TEST_RUN(0x1c, &(0x7f0000000240)={r7, 0xf, 0x25, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000001940)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$unix(r8, &(0x7f00000063c0)={&(0x7f0000005cc0)=@abs={0x1}, 0x3, 0x0}, 0x0) r9 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x6, 0xe, &(0x7f0000000000)=ANY=[@ANYRESOCT=r8], &(0x7f0000000040)='syzkaller\x00', 0x9, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @xdp, r6, 0x8, &(0x7f0000000540)={0x5, 0x1}, 0x8, 0x10, &(0x7f0000000340)={0x1}, 0x10}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000c80)={r9, 0x2000012, 0xe, 0x0, &(0x7f0000000c40)="63eced8e46dc3f2ddf33c9e9b986", 0x0, 0x7ffe, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000000900)={0x11, 0x18, &(0x7f0000000640)=ANY=[@ANYBLOB="18000000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000000000018230000", @ANYRES64=0x0, @ANYBLOB="0000000000000000b70500000000000085000000a5000000180100002020640500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000a50000000800000095"], &(0x7f00000005c0)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback=0x36, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) unlink(0x0) r10 = bpf$MAP_CREATE(0x0, &(0x7f0000000a00)=ANY=[@ANYBLOB="1b00000000000000000000000080000000000000", @ANYRES32, @ANYBLOB='A\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="000000000000000000000000000071000000002e0000a10000000000000de2e4b31e0a9346d33efcf94e73e72d44215e2999dbaad919068b1ac4c820cc44bab10ea514b8f68aa39d7aac753a69"], 0x50) r11 = bpf$PROG_LOAD(0x5, &(0x7f00000003c0)={0x3, 0x8, &(0x7f0000000580)=ANY=[@ANYBLOB="18000000000000000000000000000000850000005c00000018110000", @ANYRES32=r10, @ANYRES32=0x0], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sched_cls, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0xc3) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000004c0)={r11, 0x18000000000002a0, 0xe, 0x0, &(0x7f0000000280)="d2ff03076003009eb89e08f08c48", 0x0, 0xd5b1, 0x60000000, 0x0, 0x0, 0x0, 0x0}, 0x50) 56.867016ms ago: executing program 3 (id=1268): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x10, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000260018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000800"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sk_msg, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x5, 0x400, 0x9, 0x1}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000002c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r1}, 0x10) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001b00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001d80)=ANY=[@ANYBLOB="28010000000000000100000001"], 0x128}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r2, &(0x7f0000001b00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001d80)=ANY=[], 0x128}, 0x0) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d2d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, 0x0) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, 0x0, &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x17, 0x0, 0x4, 0xff, 0x0, 0x1}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005800000095"], 0x0}, 0xb2) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xa, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x16, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={r4, 0x2000000, 0xe, 0x0, &(0x7f0000000200)="63eced8e46dc3f0adf33c9f7b986", 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) 56.487856ms ago: executing program 4 (id=1269): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="0700000004000000800000000100000028000000", @ANYRES32, @ANYBLOB="c5859b5b5b403eaa0000", @ANYRES32=0x0, @ANYRES32, @ANYBLOB], 0x50) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x8, &(0x7f0000000080)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r0, @ANYBLOB="00000000097e3069b703000000000020850000001b000000b700000900"/40], &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x2d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r1}, 0x18) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x2, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x6, 0x4, 0xfffffffc, 0x7, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x4}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000009007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) socketpair(0x1d, 0x2, 0x2, &(0x7f0000000300)={0x0, 0x0}) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r3, 0x8914, &(0x7f0000000040)={'sit0\x00', @local}) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x420, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1, 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000e00)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r4, 0x8914, &(0x7f0000000040)={'sit0\x00', @random="4f33e363a4b1"}) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="0b00000005000000000400000900000001000000", @ANYRES32, @ANYBLOB='\x00'/10, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/18], 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f00000004c0)={r5, &(0x7f0000000340), &(0x7f0000000340)=""/171}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1a, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r5], 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000140)='sched_switch\x00', r6}, 0x10) perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r7, 0x8914, &(0x7f0000000900)={'bridge0\x00', @remote}) bpf$MAP_CREATE(0x0, 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r8, 0x89a1, &(0x7f0000000900)={'bridge0\x00', @broadcast}) 54.802356ms ago: executing program 0 (id=1270): r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000340)={0x11, 0x3, &(0x7f0000001680)=ANY=[@ANYBLOB="1800000000030000000000000000000095"], &(0x7f0000001700)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41000, 0x9}, 0x94) r1 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000000)='mmap_lock_acquire_returned\x00', r0}, 0x10) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000340)={0x11, 0x3, &(0x7f0000001680)=ANY=[], &(0x7f0000001700)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41000, 0x9}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000000)='mmap_lock_acquire_returned\x00', r2}, 0x18) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000340)={0x11, 0x3, &(0x7f0000001680)=ANY=[], &(0x7f0000001700)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41000, 0x9}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000000)='mmap_lock_acquire_returned\x00', r3}, 0x10) close(r1) (fail_nth: 1) 0s ago: executing program 2 (id=1271): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="0700000004000000800000000100000028000000", @ANYRES32, @ANYBLOB="c5859b5b5b403eaa0000", @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/27], 0x50) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x8, &(0x7f0000000080)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r0, @ANYBLOB="00000000097e3069b703000000000020850000001b000000b700000900"/40], &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x2d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r1}, 0x18) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x2, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x6, 0x4, 0xfffffffc, 0x7, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x4}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000009007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) socketpair(0x1d, 0x2, 0x2, &(0x7f0000000300)={0x0, 0x0}) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000180)) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x420, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1, 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000e00)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r3, 0x8914, &(0x7f0000000040)={'sit0\x00', @random="4f33e363a4b1"}) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="0b00000005000000000400000900000001000000", @ANYRES32, @ANYBLOB='\x00'/10, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/18], 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f00000004c0)={r4, &(0x7f0000000340), &(0x7f0000000340)=""/171}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1a, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r4], 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000140)='sched_switch\x00', r5}, 0x10) perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x5, 0x0, 0xf3, 0x0, 0x0, 0x1, 0xa66a6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x10, 0x0, &(0x7f0000000600)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r6, 0x8914, &(0x7f0000000900)={'bridge0\x00', @remote}) kernel console output (not intermixed with test programs): Warning: Permanently added '10.128.0.228' (ED25519) to the list of known hosts. [ 23.534933][ T28] audit: type=1400 audit(1755796974.266:64): avc: denied { mounton } for pid=275 comm="syz-executor" path="/syzcgroup/unified" dev="sda1" ino=2022 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 23.536374][ T275] cgroup: Unknown subsys name 'net' [ 23.557644][ T28] audit: type=1400 audit(1755796974.266:65): avc: denied { mount } for pid=275 comm="syz-executor" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 23.584940][ T28] audit: type=1400 audit(1755796974.296:66): avc: denied { unmount } for pid=275 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 23.585135][ T275] cgroup: Unknown subsys name 'devices' [ 23.725612][ T275] cgroup: Unknown subsys name 'hugetlb' [ 23.731328][ T275] cgroup: Unknown subsys name 'rlimit' [ 23.835663][ T28] audit: type=1400 audit(1755796974.566:67): avc: denied { setattr } for pid=275 comm="syz-executor" name="raw-gadget" dev="devtmpfs" ino=258 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 23.858868][ T28] audit: type=1400 audit(1755796974.566:68): avc: denied { mounton } for pid=275 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1 [ 23.883644][ T28] audit: type=1400 audit(1755796974.566:69): avc: denied { mount } for pid=275 comm="syz-executor" name="/" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=filesystem permissive=1 [ 23.895325][ T277] SELinux: Context root:object_r:swapfile_t is not valid (left unmapped). Setting up swapspace version 1, size = 127995904 bytes [ 23.916939][ T28] audit: type=1400 audit(1755796974.646:70): avc: denied { relabelto } for pid=277 comm="mkswap" name="swap-file" dev="sda1" ino=2025 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 23.942511][ T28] audit: type=1400 audit(1755796974.646:71): avc: denied { write } for pid=277 comm="mkswap" path="/root/swap-file" dev="sda1" ino=2025 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 23.980801][ T28] audit: type=1400 audit(1755796974.706:72): avc: denied { read } for pid=275 comm="syz-executor" name="swap-file" dev="sda1" ino=2025 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 24.006354][ T28] audit: type=1400 audit(1755796974.706:73): avc: denied { open } for pid=275 comm="syz-executor" path="/root/swap-file" dev="sda1" ino=2025 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 24.006403][ T275] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 24.858154][ T285] bridge0: port 1(bridge_slave_0) entered blocking state [ 24.865308][ T285] bridge0: port 1(bridge_slave_0) entered disabled state [ 24.872945][ T285] device bridge_slave_0 entered promiscuous mode [ 24.881396][ T285] bridge0: port 2(bridge_slave_1) entered blocking state [ 24.888539][ T285] bridge0: port 2(bridge_slave_1) entered disabled state [ 24.896079][ T285] device bridge_slave_1 entered promiscuous mode [ 25.014353][ T284] bridge0: port 1(bridge_slave_0) entered blocking state [ 25.021420][ T284] bridge0: port 1(bridge_slave_0) entered disabled state [ 25.029077][ T284] device bridge_slave_0 entered promiscuous mode [ 25.035829][ T283] bridge0: port 1(bridge_slave_0) entered blocking state [ 25.042901][ T283] bridge0: port 1(bridge_slave_0) entered disabled state [ 25.050724][ T283] device bridge_slave_0 entered promiscuous mode [ 25.066639][ T284] bridge0: port 2(bridge_slave_1) entered blocking state [ 25.073709][ T284] bridge0: port 2(bridge_slave_1) entered disabled state [ 25.081074][ T284] device bridge_slave_1 entered promiscuous mode [ 25.087760][ T283] bridge0: port 2(bridge_slave_1) entered blocking state [ 25.094840][ T283] bridge0: port 2(bridge_slave_1) entered disabled state [ 25.102217][ T283] device bridge_slave_1 entered promiscuous mode [ 25.118239][ T286] bridge0: port 1(bridge_slave_0) entered blocking state [ 25.125327][ T286] bridge0: port 1(bridge_slave_0) entered disabled state [ 25.132792][ T286] device bridge_slave_0 entered promiscuous mode [ 25.151654][ T286] bridge0: port 2(bridge_slave_1) entered blocking state [ 25.158791][ T286] bridge0: port 2(bridge_slave_1) entered disabled state [ 25.166348][ T286] device bridge_slave_1 entered promiscuous mode [ 25.214753][ T287] bridge0: port 1(bridge_slave_0) entered blocking state [ 25.221880][ T287] bridge0: port 1(bridge_slave_0) entered disabled state [ 25.229381][ T287] device bridge_slave_0 entered promiscuous mode [ 25.247594][ T287] bridge0: port 2(bridge_slave_1) entered blocking state [ 25.254693][ T287] bridge0: port 2(bridge_slave_1) entered disabled state [ 25.262140][ T287] device bridge_slave_1 entered promiscuous mode [ 25.320674][ T285] bridge0: port 2(bridge_slave_1) entered blocking state [ 25.327774][ T285] bridge0: port 2(bridge_slave_1) entered forwarding state [ 25.335111][ T285] bridge0: port 1(bridge_slave_0) entered blocking state [ 25.342188][ T285] bridge0: port 1(bridge_slave_0) entered forwarding state [ 25.442104][ T284] bridge0: port 2(bridge_slave_1) entered blocking state [ 25.449177][ T284] bridge0: port 2(bridge_slave_1) entered forwarding state [ 25.456491][ T284] bridge0: port 1(bridge_slave_0) entered blocking state [ 25.463544][ T284] bridge0: port 1(bridge_slave_0) entered forwarding state [ 25.491623][ T283] bridge0: port 2(bridge_slave_1) entered blocking state [ 25.498760][ T283] bridge0: port 2(bridge_slave_1) entered forwarding state [ 25.506077][ T283] bridge0: port 1(bridge_slave_0) entered blocking state [ 25.513110][ T283] bridge0: port 1(bridge_slave_0) entered forwarding state [ 25.550160][ T8] bridge0: port 1(bridge_slave_0) entered disabled state [ 25.557994][ T8] bridge0: port 2(bridge_slave_1) entered disabled state [ 25.565462][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 25.573641][ T8] bridge0: port 1(bridge_slave_0) entered disabled state [ 25.580994][ T8] bridge0: port 2(bridge_slave_1) entered disabled state [ 25.588272][ T8] bridge0: port 1(bridge_slave_0) entered disabled state [ 25.595941][ T8] bridge0: port 2(bridge_slave_1) entered disabled state [ 25.605580][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 25.613856][ T8] bridge0: port 1(bridge_slave_0) entered blocking state [ 25.620897][ T8] bridge0: port 1(bridge_slave_0) entered forwarding state [ 25.634940][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 25.642448][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 25.655629][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 25.663891][ T8] bridge0: port 2(bridge_slave_1) entered blocking state [ 25.670923][ T8] bridge0: port 2(bridge_slave_1) entered forwarding state [ 25.697657][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 25.706235][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 25.714628][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 25.746770][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 25.755174][ T8] bridge0: port 1(bridge_slave_0) entered blocking state [ 25.762197][ T8] bridge0: port 1(bridge_slave_0) entered forwarding state [ 25.769599][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 25.778068][ T8] bridge0: port 2(bridge_slave_1) entered blocking state [ 25.785136][ T8] bridge0: port 2(bridge_slave_1) entered forwarding state [ 25.792873][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 25.801144][ T8] bridge0: port 1(bridge_slave_0) entered blocking state [ 25.808193][ T8] bridge0: port 1(bridge_slave_0) entered forwarding state [ 25.815911][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 25.824192][ T8] bridge0: port 2(bridge_slave_1) entered blocking state [ 25.831212][ T8] bridge0: port 2(bridge_slave_1) entered forwarding state [ 25.838616][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 25.862671][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 25.870186][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 25.878033][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 25.886407][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 25.895577][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 25.904136][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 25.924412][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 25.932594][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 25.940718][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 25.949145][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 25.957391][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 25.965994][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 25.976326][ T284] device veth0_vlan entered promiscuous mode [ 25.988885][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 25.997097][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 26.005680][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 26.014183][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 26.022510][ T8] bridge0: port 1(bridge_slave_0) entered blocking state [ 26.029640][ T8] bridge0: port 1(bridge_slave_0) entered forwarding state [ 26.037548][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 26.045968][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 26.054144][ T8] bridge0: port 2(bridge_slave_1) entered blocking state [ 26.061166][ T8] bridge0: port 2(bridge_slave_1) entered forwarding state [ 26.068540][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 26.076749][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 26.085025][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 26.092499][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 26.100164][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 26.107835][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 26.115366][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 26.124471][ T285] device veth0_vlan entered promiscuous mode [ 26.140161][ T283] device veth0_vlan entered promiscuous mode [ 26.155115][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 26.164516][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 26.172913][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 26.181475][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 26.190265][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 26.198555][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 26.206749][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 26.214744][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 26.222831][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 26.231235][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 26.239535][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 26.247077][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 26.255930][ T285] device veth1_macvtap entered promiscuous mode [ 26.269671][ T283] device veth1_macvtap entered promiscuous mode [ 26.278609][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 26.286540][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 26.294225][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 26.301736][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 26.311298][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 26.319513][ T8] bridge0: port 1(bridge_slave_0) entered blocking state [ 26.326575][ T8] bridge0: port 1(bridge_slave_0) entered forwarding state [ 26.334071][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 26.342299][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 26.350717][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 26.358539][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 26.367121][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 26.375606][ T8] bridge0: port 2(bridge_slave_1) entered blocking state [ 26.382635][ T8] bridge0: port 2(bridge_slave_1) entered forwarding state [ 26.390275][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 26.403522][ T284] device veth1_macvtap entered promiscuous mode [ 26.414203][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 26.422787][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 26.431775][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 26.440051][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 26.448578][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 26.480922][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 26.489234][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 26.497552][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 26.506154][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 26.514358][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 26.522716][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 26.531258][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 26.539751][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 26.548151][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 26.556447][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 26.565073][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 26.573412][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 26.581961][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 26.590396][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 26.599230][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 26.607985][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 26.616693][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 26.624996][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 26.633049][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 26.640624][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 26.658620][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 26.666943][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 26.674696][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 26.682254][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 26.698938][ T286] device veth0_vlan entered promiscuous mode [ 26.701533][ T284] request_module fs-gadgetfs succeeded, but still no fs? [ 26.714823][ T287] device veth0_vlan entered promiscuous mode [ 26.735120][ T334] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 26.765102][ T286] device veth1_macvtap entered promiscuous mode [ 26.790421][ T334] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 26.805257][ T287] device veth1_macvtap entered promiscuous mode [ 26.821643][ C0] hrtimer: interrupt took 25123 ns [ 26.846657][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 26.855426][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 26.892877][ T334] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 26.911757][ T334] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 26.981470][ T334] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 27.018090][ T334] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 27.026698][ T334] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 27.036659][ T334] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 27.722502][ T364] device sit0 entered promiscuous mode [ 27.920433][ T365] bridge0: port 2(bridge_slave_1) entered disabled state [ 27.927754][ T365] bridge0: port 1(bridge_slave_0) entered disabled state [ 28.647660][ T392] device sit0 entered promiscuous mode [ 28.935202][ T391] bridge0: port 2(bridge_slave_1) entered disabled state [ 28.942515][ T391] bridge0: port 1(bridge_slave_0) entered disabled state [ 28.993044][ T396] device bridge_slave_1 left promiscuous mode [ 28.999527][ T396] bridge0: port 2(bridge_slave_1) entered disabled state [ 29.007993][ T396] device bridge_slave_0 left promiscuous mode [ 29.014249][ T396] bridge0: port 1(bridge_slave_0) entered disabled state [ 30.198398][ T411] device sit0 entered promiscuous mode [ 30.228810][ T28] kauditd_printk_skb: 42 callbacks suppressed [ 30.228827][ T28] audit: type=1400 audit(1755796980.956:116): avc: denied { cpu } for pid=408 comm="syz.4.27" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=1 [ 30.880906][ T422] device sit0 left promiscuous mode [ 31.072571][ T425] device sit0 entered promiscuous mode [ 31.251942][ T428] bridge0: port 2(bridge_slave_1) entered disabled state [ 31.259217][ T428] bridge0: port 1(bridge_slave_0) entered disabled state [ 31.267751][ T28] audit: type=1400 audit(1755796981.976:117): avc: denied { write } for pid=436 comm="syz.4.36" name="ppp" dev="devtmpfs" ino=158 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ppp_device_t tclass=chr_file permissive=1 [ 31.347826][ T439] device xfrm0 entered promiscuous mode [ 31.377429][ T441] device sit0 left promiscuous mode [ 31.412049][ T441] device sit0 entered promiscuous mode [ 31.737424][ T446] device sit0 left promiscuous mode [ 31.779767][ T447] device sit0 entered promiscuous mode [ 31.984099][ T453] syz.3.40[453] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 31.985355][ T453] syz.3.40[453] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 32.468871][ T479] device sit0 left promiscuous mode [ 32.501510][ T480] device sit0 left promiscuous mode [ 32.543165][ T482] device sit0 entered promiscuous mode [ 32.794601][ T481] device sit0 entered promiscuous mode [ 33.282396][ T509] device sit0 left promiscuous mode [ 33.355988][ T507] device sit0 entered promiscuous mode [ 33.482787][ T512] device sit0 entered promiscuous mode [ 33.602256][ T513] bridge0: port 2(bridge_slave_1) entered disabled state [ 33.609588][ T513] bridge0: port 1(bridge_slave_0) entered disabled state [ 33.641137][ T515] device sit0 left promiscuous mode [ 33.720381][ T516] device sit0 entered promiscuous mode [ 33.845033][ T520] device sit0 left promiscuous mode [ 33.928923][ T525] device sit0 entered promiscuous mode [ 36.543300][ C0] sched: RT throttling activated [ 37.312389][ T552] device sit0 left promiscuous mode [ 37.409706][ T557] device sit0 entered promiscuous mode [ 37.454636][ T558] device sit0 left promiscuous mode [ 37.535735][ T561] device sit0 entered promiscuous mode [ 37.615000][ T565] device bridge_slave_1 left promiscuous mode [ 37.629967][ T565] bridge0: port 2(bridge_slave_1) entered disabled state [ 37.660746][ T565] device bridge_slave_0 left promiscuous mode [ 37.711479][ T565] bridge0: port 1(bridge_slave_0) entered disabled state [ 37.758833][ T577] Illegal XDP return value 3375825977 on prog (id 91) dev N/A, expect packet loss! [ 37.814442][ T566] device sit0 left promiscuous mode [ 37.838826][ T569] device sit0 entered promiscuous mode [ 38.140696][ T591] device macsec0 entered promiscuous mode [ 38.317704][ T597] device sit0 left promiscuous mode [ 38.426754][ T599] device sit0 entered promiscuous mode [ 38.644733][ T604] device sit0 left promiscuous mode [ 38.683712][ T606] device sit0 entered promiscuous mode [ 39.195129][ T621] device sit0 left promiscuous mode [ 39.220892][ T622] device sit0 entered promiscuous mode [ 40.793253][ T636] device sit0 entered promiscuous mode [ 40.980957][ T642] device sit0 left promiscuous mode [ 41.004542][ T640] bridge0: port 2(bridge_slave_1) entered disabled state [ 41.011784][ T640] bridge0: port 1(bridge_slave_0) entered disabled state [ 41.022011][ T644] device sit0 entered promiscuous mode [ 41.167254][ T645] device bridge_slave_1 left promiscuous mode [ 41.176701][ T645] bridge0: port 2(bridge_slave_1) entered disabled state [ 41.189872][ T645] device bridge_slave_0 left promiscuous mode [ 41.196184][ T645] bridge0: port 1(bridge_slave_0) entered disabled state [ 41.456269][ T652] device sit0 left promiscuous mode [ 41.480131][ T656] device sit0 entered promiscuous mode [ 42.535911][ T28] audit: type=1400 audit(1755796993.266:118): avc: denied { create } for pid=680 comm="syz.2.112" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 43.743993][ T714] device sit0 left promiscuous mode [ 43.913673][ T714] device sit0 entered promiscuous mode [ 44.091505][ T717] device sit0 left promiscuous mode [ 44.236993][ T718] device sit0 entered promiscuous mode [ 44.916796][ T741] device sit0 left promiscuous mode [ 45.031314][ T742] device sit0 entered promiscuous mode [ 46.043518][ T768] device sit0 left promiscuous mode [ 46.089668][ T770] device sit0 left promiscuous mode [ 46.160447][ T774] device sit0 left promiscuous mode [ 46.239318][ T775] device sit0 entered promiscuous mode [ 46.336772][ T768] device sit0 entered promiscuous mode [ 46.440208][ T777] device sit0 entered promiscuous mode [ 46.546296][ T779] device bridge_slave_1 left promiscuous mode [ 46.553396][ T779] bridge0: port 2(bridge_slave_1) entered disabled state [ 46.565387][ T779] device bridge_slave_0 left promiscuous mode [ 46.575760][ T779] bridge0: port 1(bridge_slave_0) entered disabled state [ 46.643153][ T782] device sit0 left promiscuous mode [ 46.658716][ T783] device sit0 entered promiscuous mode [ 46.841685][ T780] device bridge_slave_1 left promiscuous mode [ 46.869872][ T780] bridge0: port 2(bridge_slave_1) entered disabled state [ 46.884692][ T780] device bridge_slave_0 left promiscuous mode [ 46.895656][ T780] bridge0: port 1(bridge_slave_0) entered disabled state [ 47.056409][ T809] device sit0 left promiscuous mode [ 47.106595][ T811] device sit0 left promiscuous mode [ 47.131909][ T815] device sit0 left promiscuous mode [ 47.158130][ T809] device sit0 entered promiscuous mode [ 47.173028][ T811] device sit0 entered promiscuous mode [ 47.294020][ T815] device sit0 entered promiscuous mode [ 47.467982][ T820] syzkaller: port 1(erspan0) entered blocking state [ 47.477282][ T820] syzkaller: port 1(erspan0) entered disabled state [ 47.501780][ T820] device erspan0 entered promiscuous mode [ 47.669713][ T831] FAULT_INJECTION: forcing a failure. [ 47.669713][ T831] name failslab, interval 1, probability 0, space 0, times 1 [ 47.682385][ T831] CPU: 1 PID: 831 Comm: syz.1.162 Not tainted syzkaller #0 [ 47.689630][ T831] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 47.699719][ T831] Call Trace: [ 47.703026][ T831] [ 47.706016][ T831] __dump_stack+0x21/0x24 [ 47.710385][ T831] dump_stack_lvl+0xee/0x150 [ 47.715011][ T831] ? __cfi_dump_stack_lvl+0x8/0x8 [ 47.720074][ T831] dump_stack+0x15/0x24 [ 47.724345][ T831] should_fail_ex+0x3d4/0x520 [ 47.729053][ T831] __should_failslab+0xac/0xf0 [ 47.733849][ T831] ? ref_tracker_alloc+0x139/0x430 [ 47.738994][ T831] should_failslab+0x9/0x20 [ 47.743537][ T831] __kmem_cache_alloc_node+0x3d/0x2c0 [ 47.748944][ T831] ? kmem_cache_free+0x12d/0x300 [ 47.753922][ T831] ? ____kasan_slab_free+0x13d/0x180 [ 47.759240][ T831] ? ref_tracker_alloc+0x139/0x430 [ 47.764399][ T831] kmalloc_trace+0x29/0xb0 [ 47.768859][ T831] ref_tracker_alloc+0x139/0x430 [ 47.773861][ T831] ? __cfi_ref_tracker_alloc+0x10/0x10 [ 47.779365][ T831] ? __kasan_check_read+0x11/0x20 [ 47.784435][ T831] ? linkwatch_urgent_event+0x3ac/0x430 [ 47.790020][ T831] linkwatch_fire_event+0x1d2/0x240 [ 47.795246][ T831] netif_carrier_off+0x9c/0xc0 [ 47.800035][ T831] __tun_detach+0xc1c/0x1460 [ 47.804669][ T831] tun_chr_close+0x92/0x140 [ 47.809210][ T831] ? __cfi_tun_chr_close+0x10/0x10 [ 47.814385][ T831] __fput+0x1fc/0x8f0 [ 47.818413][ T831] ____fput+0x15/0x20 [ 47.822520][ T831] task_work_run+0x1db/0x240 [ 47.827144][ T831] ? __cfi_task_work_run+0x10/0x10 [ 47.832289][ T831] ? filp_close+0x111/0x160 [ 47.836825][ T831] exit_to_user_mode_loop+0x9b/0xb0 [ 47.842045][ T831] exit_to_user_mode_prepare+0x5a/0xa0 [ 47.847524][ T831] syscall_exit_to_user_mode+0x1a/0x30 [ 47.853011][ T831] do_syscall_64+0x58/0xa0 [ 47.857508][ T831] ? clear_bhb_loop+0x30/0x80 [ 47.862221][ T831] ? clear_bhb_loop+0x30/0x80 [ 47.866925][ T831] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 47.872836][ T831] RIP: 0033:0x7f518938ebe9 [ 47.877281][ T831] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 47.896920][ T831] RSP: 002b:00007f518a164038 EFLAGS: 00000246 ORIG_RAX: 0000000000000003 [ 47.905333][ T831] RAX: 0000000000000000 RBX: 00007f51895b5fa0 RCX: 00007f518938ebe9 [ 47.913316][ T831] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000003 [ 47.921298][ T831] RBP: 00007f518a164090 R08: 0000000000000000 R09: 0000000000000000 [ 47.929274][ T831] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 47.937303][ T831] R13: 00007f51895b6038 R14: 00007f51895b5fa0 R15: 00007fff6d4a7668 [ 47.945283][ T831] [ 47.948304][ T831] memory allocation failure, unreliable refcount tracker. [ 48.214986][ T838] device syzkaller0 entered promiscuous mode [ 48.905211][ T897] FAULT_INJECTION: forcing a failure. [ 48.905211][ T897] name fail_usercopy, interval 1, probability 0, space 0, times 1 [ 48.924917][ T897] CPU: 1 PID: 897 Comm: syz.1.184 Not tainted syzkaller #0 [ 48.932161][ T897] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 48.942241][ T897] Call Trace: [ 48.945538][ T897] [ 48.948476][ T897] __dump_stack+0x21/0x24 [ 48.952818][ T897] dump_stack_lvl+0xee/0x150 [ 48.957448][ T897] ? __cfi_dump_stack_lvl+0x8/0x8 [ 48.962481][ T897] ? perf_event_read_local+0x603/0x720 [ 48.968030][ T897] dump_stack+0x15/0x24 [ 48.972193][ T897] should_fail_ex+0x3d4/0x520 [ 48.976872][ T897] should_fail+0xb/0x10 [ 48.981060][ T897] should_fail_usercopy+0x1a/0x20 [ 48.986085][ T897] _copy_from_user+0x1e/0xc0 [ 48.990767][ T897] __sys_bpf+0x277/0x780 [ 48.995098][ T897] ? bpf_link_show_fdinfo+0x320/0x320 [ 49.000500][ T897] ? __cfi_ksys_write+0x10/0x10 [ 49.005354][ T897] ? do_user_addr_fault+0x9ac/0x1050 [ 49.010645][ T897] ? __bpf_trace_sys_enter+0x62/0x70 [ 49.015929][ T897] __x64_sys_bpf+0x7c/0x90 [ 49.020353][ T897] x64_sys_call+0x488/0x9a0 [ 49.024858][ T897] do_syscall_64+0x4c/0xa0 [ 49.029368][ T897] ? clear_bhb_loop+0x30/0x80 [ 49.034046][ T897] ? clear_bhb_loop+0x30/0x80 [ 49.038731][ T897] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 49.044638][ T897] RIP: 0033:0x7f518938ebe9 [ 49.049085][ T897] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 49.068697][ T897] RSP: 002b:00007f518a143038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 49.077126][ T897] RAX: ffffffffffffffda RBX: 00007f51895b6090 RCX: 00007f518938ebe9 [ 49.085127][ T897] RDX: 0000000000000010 RSI: 00002000000009c0 RDI: 000000000000000f [ 49.093123][ T897] RBP: 00007f518a143090 R08: 0000000000000000 R09: 0000000000000000 [ 49.101100][ T897] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 49.109070][ T897] R13: 00007f51895b6128 R14: 00007f51895b6090 R15: 00007fff6d4a7668 [ 49.117050][ T897] [ 49.198670][ T902] syzkaller: port 1(erspan0) entered blocking state [ 49.257721][ T902] syzkaller: port 1(erspan0) entered disabled state [ 49.306623][ T902] device erspan0 entered promiscuous mode [ 49.350264][ T905] syzkaller: port 1(erspan0) entered blocking state [ 49.357029][ T905] syzkaller: port 1(erspan0) entered forwarding state [ 49.551469][ T924] FAULT_INJECTION: forcing a failure. [ 49.551469][ T924] name failslab, interval 1, probability 0, space 0, times 0 [ 49.609279][ T924] CPU: 0 PID: 924 Comm: syz.3.195 Not tainted syzkaller #0 [ 49.616542][ T924] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 49.626617][ T924] Call Trace: [ 49.629935][ T924] [ 49.632888][ T924] __dump_stack+0x21/0x24 [ 49.637252][ T924] dump_stack_lvl+0xee/0x150 [ 49.641873][ T924] ? __cfi_dump_stack_lvl+0x8/0x8 [ 49.646928][ T924] ? stack_trace_save+0x98/0xe0 [ 49.651807][ T924] dump_stack+0x15/0x24 [ 49.656033][ T924] should_fail_ex+0x3d4/0x520 [ 49.660916][ T924] __should_failslab+0xac/0xf0 [ 49.665709][ T924] should_failslab+0x9/0x20 [ 49.670244][ T924] kmem_cache_alloc_node+0x42/0x340 [ 49.675469][ T924] ? dup_task_struct+0x5a/0x770 [ 49.680359][ T924] dup_task_struct+0x5a/0x770 [ 49.685081][ T924] ? __kasan_check_write+0x14/0x20 [ 49.690231][ T924] ? recalc_sigpending+0x168/0x1c0 [ 49.695373][ T924] copy_process+0x5b8/0x3420 [ 49.699994][ T924] ? __cfi_kstrtouint_from_user+0x10/0x10 [ 49.705853][ T924] ? __kasan_check_write+0x14/0x20 [ 49.711008][ T924] ? idle_dummy+0x10/0x10 [ 49.715368][ T924] kernel_clone+0x23a/0x810 [ 49.719905][ T924] ? __cfi_kernel_clone+0x10/0x10 [ 49.724965][ T924] ? __kasan_check_write+0x14/0x20 [ 49.730119][ T924] ? mutex_unlock+0x89/0x220 [ 49.734745][ T924] __x64_sys_clone+0x168/0x1b0 [ 49.739557][ T924] ? __cfi___x64_sys_clone+0x10/0x10 [ 49.744875][ T924] ? fpregs_assert_state_consistent+0xb1/0xe0 [ 49.751073][ T924] x64_sys_call+0x990/0x9a0 [ 49.755619][ T924] do_syscall_64+0x4c/0xa0 [ 49.760066][ T924] ? clear_bhb_loop+0x30/0x80 [ 49.764764][ T924] ? clear_bhb_loop+0x30/0x80 [ 49.769468][ T924] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 49.775391][ T924] RIP: 0033:0x7ff5e9d8ebe9 [ 49.779882][ T924] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 49.799531][ T924] RSP: 002b:00007ff5eab1dfe8 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 49.808063][ T924] RAX: ffffffffffffffda RBX: 00007ff5e9fb5fa0 RCX: 00007ff5e9d8ebe9 [ 49.816100][ T924] RDX: 0000000000000000 RSI: fffffffffffffda0 RDI: 0000000046085200 [ 49.824180][ T924] RBP: 00007ff5eab1e090 R08: 0000000000000000 R09: 0000000000000000 [ 49.832190][ T924] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000001 [ 49.840180][ T924] R13: 00007ff5e9fb6038 R14: 00007ff5e9fb5fa0 R15: 00007ffed846be18 [ 49.848214][ T924] [ 49.906112][ T933] device sit0 left promiscuous mode [ 49.970247][ T940] device sit0 left promiscuous mode [ 50.019039][ T933] device sit0 entered promiscuous mode [ 50.167865][ T940] device sit0 entered promiscuous mode [ 50.290737][ T952] syzkaller: port 1(erspan0) entered blocking state [ 50.297816][ T952] syzkaller: port 1(erspan0) entered disabled state [ 50.308394][ T952] device erspan0 entered promiscuous mode [ 50.335160][ T953] syzkaller: port 1(erspan0) entered blocking state [ 50.341806][ T953] syzkaller: port 1(erspan0) entered forwarding state [ 50.486104][ T966] device sit0 left promiscuous mode [ 50.617859][ T966] device sit0 entered promiscuous mode [ 50.649094][ T974] device sit0 left promiscuous mode [ 50.698979][ T974] device sit0 entered promiscuous mode [ 50.770695][ T28] audit: type=1400 audit(1755797001.496:119): avc: denied { create } for pid=971 comm="syz.0.213" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=pppox_socket permissive=1 [ 50.878205][ T992] syzkaller: port 1(erspan0) entered blocking state [ 50.884905][ T992] syzkaller: port 1(erspan0) entered forwarding state [ 50.913619][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller: link becomes ready [ 50.981159][ T997] device sit0 left promiscuous mode [ 51.054586][ T1006] device sit0 left promiscuous mode [ 51.079449][ T997] device sit0 entered promiscuous mode [ 51.106242][ T1011] device pim6reg1 entered promiscuous mode [ 51.147819][ T1006] device sit0 entered promiscuous mode [ 51.284447][ T1022] FAULT_INJECTION: forcing a failure. [ 51.284447][ T1022] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 51.297877][ T1022] CPU: 1 PID: 1022 Comm: syz.0.233 Not tainted syzkaller #0 [ 51.305211][ T1022] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 51.315306][ T1022] Call Trace: [ 51.318754][ T1022] [ 51.321736][ T1022] __dump_stack+0x21/0x24 [ 51.326117][ T1022] dump_stack_lvl+0xee/0x150 [ 51.330783][ T1022] ? __cfi_dump_stack_lvl+0x8/0x8 [ 51.335855][ T1022] dump_stack+0x15/0x24 [ 51.340055][ T1022] should_fail_ex+0x3d4/0x520 [ 51.344775][ T1022] should_fail+0xb/0x10 [ 51.348998][ T1022] should_fail_usercopy+0x1a/0x20 [ 51.354167][ T1022] _copy_from_user+0x1e/0xc0 [ 51.358876][ T1022] __sys_bpf+0x277/0x780 [ 51.363149][ T1022] ? bpf_link_show_fdinfo+0x320/0x320 [ 51.368573][ T1022] ? __cfi_ksys_write+0x10/0x10 [ 51.373461][ T1022] ? debug_smp_processor_id+0x17/0x20 [ 51.379992][ T1022] __x64_sys_bpf+0x7c/0x90 [ 51.384455][ T1022] x64_sys_call+0x488/0x9a0 [ 51.389099][ T1022] do_syscall_64+0x4c/0xa0 [ 51.393551][ T1022] ? clear_bhb_loop+0x30/0x80 [ 51.398251][ T1022] ? clear_bhb_loop+0x30/0x80 [ 51.402954][ T1022] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 51.408873][ T1022] RIP: 0033:0x7fcde218ebe9 [ 51.413296][ T1022] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 51.432923][ T1022] RSP: 002b:00007fcde0bf7038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 51.441346][ T1022] RAX: ffffffffffffffda RBX: 00007fcde23b5fa0 RCX: 00007fcde218ebe9 [ 51.449321][ T1022] RDX: 000000000000002c RSI: 0000200000000080 RDI: 000000000000000a [ 51.457299][ T1022] RBP: 00007fcde0bf7090 R08: 0000000000000000 R09: 0000000000000000 [ 51.465271][ T1022] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 51.473244][ T1022] R13: 00007fcde23b6038 R14: 00007fcde23b5fa0 R15: 00007ffcf75bf0b8 [ 51.481232][ T1022] [ 51.651881][ T1037] device sit0 left promiscuous mode [ 51.708218][ T1037] device sit0 entered promiscuous mode [ 51.898130][ T1055] device sit0 left promiscuous mode [ 51.933084][ T1056] device syzkaller0 entered promiscuous mode [ 51.949486][ T1065] device sit0 entered promiscuous mode [ 52.183943][ T1076] FAULT_INJECTION: forcing a failure. [ 52.183943][ T1076] name failslab, interval 1, probability 0, space 0, times 0 [ 52.197641][ T1076] CPU: 1 PID: 1076 Comm: syz.1.252 Not tainted syzkaller #0 [ 52.204960][ T1076] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 52.215022][ T1076] Call Trace: [ 52.218318][ T1076] [ 52.221276][ T1076] __dump_stack+0x21/0x24 [ 52.225640][ T1076] dump_stack_lvl+0xee/0x150 [ 52.230284][ T1076] ? __cfi_dump_stack_lvl+0x8/0x8 [ 52.235338][ T1076] dump_stack+0x15/0x24 [ 52.239521][ T1076] should_fail_ex+0x3d4/0x520 [ 52.244208][ T1076] __should_failslab+0xac/0xf0 [ 52.249075][ T1076] ? slhc_init+0x77/0x770 [ 52.253409][ T1076] should_failslab+0x9/0x20 [ 52.257939][ T1076] __kmem_cache_alloc_node+0x3d/0x2c0 [ 52.263325][ T1076] ? security_file_permission+0x94/0xb0 [ 52.268899][ T1076] ? slhc_init+0x77/0x770 [ 52.273225][ T1076] kmalloc_trace+0x29/0xb0 [ 52.277665][ T1076] slhc_init+0x77/0x770 [ 52.281820][ T1076] ppp_ioctl+0x126d/0x1690 [ 52.286235][ T1076] ? mutex_unlock+0x89/0x220 [ 52.290823][ T1076] ? __cfi_mutex_unlock+0x10/0x10 [ 52.295866][ T1076] ? __cfi_ppp_ioctl+0x10/0x10 [ 52.300631][ T1076] ? __fget_files+0x2d5/0x330 [ 52.305310][ T1076] ? security_file_ioctl+0x95/0xc0 [ 52.310414][ T1076] ? __cfi_ppp_ioctl+0x10/0x10 [ 52.315184][ T1076] __se_sys_ioctl+0x12f/0x1b0 [ 52.319861][ T1076] __x64_sys_ioctl+0x7b/0x90 [ 52.324455][ T1076] x64_sys_call+0x58b/0x9a0 [ 52.328959][ T1076] do_syscall_64+0x4c/0xa0 [ 52.333376][ T1076] ? clear_bhb_loop+0x30/0x80 [ 52.338234][ T1076] ? clear_bhb_loop+0x30/0x80 [ 52.342916][ T1076] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 52.348895][ T1076] RIP: 0033:0x7f518938ebe9 [ 52.353318][ T1076] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 52.373113][ T1076] RSP: 002b:00007f518a164038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 52.381560][ T1076] RAX: ffffffffffffffda RBX: 00007f51895b5fa0 RCX: 00007f518938ebe9 [ 52.389554][ T1076] RDX: 0000200000000180 RSI: 0000000040047451 RDI: 000000000000004a [ 52.397631][ T1076] RBP: 00007f518a164090 R08: 0000000000000000 R09: 0000000000000000 [ 52.405619][ T1076] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 52.413613][ T1076] R13: 00007f51895b6038 R14: 00007f51895b5fa0 R15: 00007fff6d4a7668 [ 52.421617][ T1076] [ 52.515806][ T1094] FAULT_INJECTION: forcing a failure. [ 52.515806][ T1094] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 52.590616][ T1097] device sit0 left promiscuous mode [ 52.621768][ T1097] device sit0 entered promiscuous mode [ 52.640393][ T1094] CPU: 0 PID: 1094 Comm: syz.1.260 Not tainted syzkaller #0 [ 52.647781][ T1094] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 52.657861][ T1094] Call Trace: [ 52.661167][ T1094] [ 52.664125][ T1094] __dump_stack+0x21/0x24 [ 52.668494][ T1094] dump_stack_lvl+0xee/0x150 [ 52.673132][ T1094] ? __cfi_dump_stack_lvl+0x8/0x8 [ 52.678200][ T1094] dump_stack+0x15/0x24 [ 52.682392][ T1094] should_fail_ex+0x3d4/0x520 [ 52.687110][ T1094] should_fail+0xb/0x10 [ 52.691303][ T1094] should_fail_usercopy+0x1a/0x20 [ 52.696372][ T1094] _copy_from_user+0x1e/0xc0 [ 52.700992][ T1094] __sys_bpf+0x277/0x780 [ 52.705267][ T1094] ? bpf_link_show_fdinfo+0x320/0x320 [ 52.710708][ T1094] ? __cfi_ksys_write+0x10/0x10 [ 52.715606][ T1094] ? debug_smp_processor_id+0x17/0x20 [ 52.721029][ T1094] __x64_sys_bpf+0x7c/0x90 [ 52.725487][ T1094] x64_sys_call+0x488/0x9a0 [ 52.730020][ T1094] do_syscall_64+0x4c/0xa0 [ 52.734472][ T1094] ? clear_bhb_loop+0x30/0x80 [ 52.739193][ T1094] ? clear_bhb_loop+0x30/0x80 [ 52.743907][ T1094] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 52.749834][ T1094] RIP: 0033:0x7f518938ebe9 [ 52.754289][ T1094] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 52.773932][ T1094] RSP: 002b:00007f518a164038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 52.782385][ T1094] RAX: ffffffffffffffda RBX: 00007f51895b5fa0 RCX: 00007f518938ebe9 [ 52.790382][ T1094] RDX: 0000000000000020 RSI: 0000200000000180 RDI: 0000000000000002 [ 52.798810][ T1094] RBP: 00007f518a164090 R08: 0000000000000000 R09: 0000000000000000 [ 52.806804][ T1094] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 52.814811][ T1094] R13: 00007f51895b6038 R14: 00007f51895b5fa0 R15: 00007fff6d4a7668 [ 52.822906][ T1094] [ 52.944759][ T1113] FAULT_INJECTION: forcing a failure. [ 52.944759][ T1113] name failslab, interval 1, probability 0, space 0, times 0 [ 52.986404][ T1113] CPU: 1 PID: 1113 Comm: syz.4.268 Not tainted syzkaller #0 [ 52.994105][ T1113] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 53.004173][ T1113] Call Trace: [ 53.007468][ T1113] [ 53.010409][ T1113] __dump_stack+0x21/0x24 [ 53.014771][ T1113] dump_stack_lvl+0xee/0x150 [ 53.019368][ T1113] ? __cfi_dump_stack_lvl+0x8/0x8 [ 53.024402][ T1113] dump_stack+0x15/0x24 [ 53.028564][ T1113] should_fail_ex+0x3d4/0x520 [ 53.033254][ T1113] __should_failslab+0xac/0xf0 [ 53.038026][ T1113] ? kernfs_fop_write_iter+0x156/0x410 [ 53.043525][ T1113] should_failslab+0x9/0x20 [ 53.048214][ T1113] __kmem_cache_alloc_node+0x3d/0x2c0 [ 53.053593][ T1113] ? kernfs_fop_write_iter+0x156/0x410 [ 53.059067][ T1113] __kmalloc+0xa1/0x1e0 [ 53.063240][ T1113] kernfs_fop_write_iter+0x156/0x410 [ 53.068544][ T1113] vfs_write+0x5db/0xca0 [ 53.072795][ T1113] ? slab_free_freelist_hook+0xc2/0x190 [ 53.078520][ T1113] ? __cfi_vfs_write+0x10/0x10 [ 53.083298][ T1113] ? __cfi_mutex_lock+0x10/0x10 [ 53.088155][ T1113] ? __fdget_pos+0x2cd/0x380 [ 53.092760][ T1113] ? ksys_write+0x71/0x240 [ 53.097188][ T1113] ksys_write+0x140/0x240 [ 53.101529][ T1113] ? __cfi_ksys_write+0x10/0x10 [ 53.106391][ T1113] ? debug_smp_processor_id+0x17/0x20 [ 53.111772][ T1113] __x64_sys_write+0x7b/0x90 [ 53.116370][ T1113] x64_sys_call+0x27b/0x9a0 [ 53.120881][ T1113] do_syscall_64+0x4c/0xa0 [ 53.125307][ T1113] ? clear_bhb_loop+0x30/0x80 [ 53.129991][ T1113] ? clear_bhb_loop+0x30/0x80 [ 53.134673][ T1113] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 53.140570][ T1113] RIP: 0033:0x7fdb7158ebe9 [ 53.144998][ T1113] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 53.164633][ T1113] RSP: 002b:00007fdb723ac038 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 53.173049][ T1113] RAX: ffffffffffffffda RBX: 00007fdb717b5fa0 RCX: 00007fdb7158ebe9 [ 53.181020][ T1113] RDX: 0000000000000027 RSI: 0000200000000300 RDI: 0000000000000005 [ 53.189077][ T1113] RBP: 00007fdb723ac090 R08: 0000000000000000 R09: 0000000000000000 [ 53.197070][ T1113] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 53.205058][ T1113] R13: 00007fdb717b6038 R14: 00007fdb717b5fa0 R15: 00007fffa7fe5458 [ 53.213035][ T1113] [ 53.368645][ T1133] device sit0 left promiscuous mode [ 53.423300][ T1133] device sit0 entered promiscuous mode [ 53.498567][ T1139] FAULT_INJECTION: forcing a failure. [ 53.498567][ T1139] name failslab, interval 1, probability 0, space 0, times 0 [ 53.511230][ T1139] CPU: 0 PID: 1139 Comm: syz.1.279 Not tainted syzkaller #0 [ 53.518554][ T1139] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 53.528650][ T1139] Call Trace: [ 53.531963][ T1139] [ 53.534908][ T1139] __dump_stack+0x21/0x24 [ 53.539273][ T1139] dump_stack_lvl+0xee/0x150 [ 53.543894][ T1139] ? __cfi_dump_stack_lvl+0x8/0x8 [ 53.548949][ T1139] ? perf_swevent_hrtimer+0x465/0x530 [ 53.554352][ T1139] ? _parse_integer+0x2a/0x40 [ 53.559154][ T1139] dump_stack+0x15/0x24 [ 53.563344][ T1139] should_fail_ex+0x3d4/0x520 [ 53.568054][ T1139] ? __sigqueue_alloc+0x13f/0x210 [ 53.573112][ T1139] __should_failslab+0xac/0xf0 [ 53.577903][ T1139] should_failslab+0x9/0x20 [ 53.582438][ T1139] kmem_cache_alloc+0x3b/0x330 [ 53.587234][ T1139] __sigqueue_alloc+0x13f/0x210 [ 53.592121][ T1139] __send_signal_locked+0x19d/0xb70 [ 53.597346][ T1139] ? __kasan_check_write+0x14/0x20 [ 53.602502][ T1139] ? __task_pid_nr_ns+0x1dd/0x280 [ 53.607567][ T1139] send_signal_locked+0x422/0x580 [ 53.612627][ T1139] force_sig_info_to_task+0x31c/0x3f0 [ 53.618012][ T1139] force_sig+0xb7/0x100 [ 53.622202][ T1139] ? __cfi_force_sig+0x10/0x10 [ 53.627004][ T1139] ? kvm_sched_clock_read+0x18/0x40 [ 53.632238][ T1139] ? sched_clock_cpu+0x6e/0x250 [ 53.637114][ T1139] ? cond_local_irq_disable+0x40/0x40 [ 53.642512][ T1139] gp_user_force_sig_segv+0xc2/0x1f0 [ 53.647813][ T1139] exc_general_protection+0xb9/0x1e0 [ 53.653108][ T1139] asm_exc_general_protection+0x27/0x30 [ 53.658656][ T1139] RIP: 0033:0x7f5189367739 [ 53.663074][ T1139] Code: f8 77 c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 89 f8 48 89 fa c5 f9 ef c0 25 ff 0f 00 00 3d e0 0f 00 00 0f 87 27 01 00 00 fd 74 0f c5 fd d7 c1 85 c0 74 5b f3 0f bc c0 e9 30 01 00 00 66 [ 53.682680][ T1139] RSP: 002b:00007f518a1637c8 EFLAGS: 00010283 [ 53.688748][ T1139] RAX: 0000000000000999 RBX: 00007f518a163d30 RCX: 00007f5189578120 [ 53.696723][ T1139] RDX: 9999999999999999 RSI: 00007f5189411b31 RDI: 9999999999999999 [ 53.704784][ T1139] RBP: 000000000000000b R08: 0000000000000000 R09: 0000000000000000 [ 53.712845][ T1139] R10: 00000000ffffffff R11: 0000000000000000 R12: 0000000000000073 [ 53.720819][ T1139] R13: 00007f518a163eb0 R14: 9999999999999999 R15: 0000000000000000 [ 53.728804][ T1139] [ 53.870193][ T1146] syzkaller: port 1(erspan0) entered blocking state [ 53.910342][ T1150] FAULT_INJECTION: forcing a failure. [ 53.910342][ T1150] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 53.933394][ T1146] syzkaller: port 1(erspan0) entered disabled state [ 53.969274][ T1146] device erspan0 entered promiscuous mode [ 53.996134][ T1150] CPU: 1 PID: 1150 Comm: syz.4.283 Not tainted syzkaller #0 [ 54.003501][ T1150] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 54.006315][ T28] audit: type=1400 audit(1755797004.726:120): avc: denied { create } for pid=1141 comm="syz.3.281" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 54.013667][ T1150] Call Trace: [ 54.013675][ T1150] [ 54.013683][ T1150] __dump_stack+0x21/0x24 [ 54.013716][ T1150] dump_stack_lvl+0xee/0x150 [ 54.048146][ T1150] ? __cfi_dump_stack_lvl+0x8/0x8 [ 54.053218][ T1150] dump_stack+0x15/0x24 [ 54.053866][ T1146] syzkaller: port 1(erspan0) entered blocking state [ 54.057405][ T1150] should_fail_ex+0x3d4/0x520 [ 54.057439][ T1150] should_fail+0xb/0x10 [ 54.064067][ T1146] syzkaller: port 1(erspan0) entered forwarding state [ 54.068701][ T1150] should_fail_usercopy+0x1a/0x20 [ 54.084637][ T1150] _copy_from_user+0x1e/0xc0 [ 54.089257][ T1150] __sys_bpf+0x277/0x780 [ 54.093547][ T1150] ? bpf_link_show_fdinfo+0x320/0x320 [ 54.098942][ T1150] ? __cfi_ksys_write+0x10/0x10 [ 54.103816][ T1150] ? debug_smp_processor_id+0x17/0x20 [ 54.109204][ T1150] __x64_sys_bpf+0x7c/0x90 [ 54.113732][ T1150] x64_sys_call+0x488/0x9a0 [ 54.118248][ T1150] do_syscall_64+0x4c/0xa0 [ 54.122680][ T1150] ? clear_bhb_loop+0x30/0x80 [ 54.127367][ T1150] ? clear_bhb_loop+0x30/0x80 [ 54.132069][ T1150] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 54.137975][ T1150] RIP: 0033:0x7fdb7158ebe9 [ 54.142400][ T1150] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 54.162097][ T1150] RSP: 002b:00007fdb723ac038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 54.170527][ T1150] RAX: ffffffffffffffda RBX: 00007fdb717b5fa0 RCX: 00007fdb7158ebe9 [ 54.178592][ T1150] RDX: 0000000000000048 RSI: 0000200000000840 RDI: 0000000000000000 [ 54.186566][ T1150] RBP: 00007fdb723ac090 R08: 0000000000000000 R09: 0000000000000000 [ 54.194537][ T1150] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 54.202518][ T1150] R13: 00007fdb717b6038 R14: 00007fdb717b5fa0 R15: 00007fffa7fe5458 [ 54.210500][ T1150] [ 54.231329][ T28] audit: type=1400 audit(1755797004.786:121): avc: denied { tracepoint } for pid=1141 comm="syz.3.281" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=1 [ 54.606637][ T1170] device sit0 left promiscuous mode [ 54.697249][ T1171] device sit0 entered promiscuous mode [ 55.194357][ T1186] device sit0 left promiscuous mode [ 55.228470][ T1189] device sit0 entered promiscuous mode [ 55.379635][ T1194] device sit0 left promiscuous mode [ 55.415620][ T1194] device sit0 entered promiscuous mode [ 55.885748][ T1218] device sit0 left promiscuous mode [ 55.993629][ T1225] device sit0 entered promiscuous mode [ 56.152225][ T28] audit: type=1400 audit(1755797006.876:122): avc: denied { create } for pid=1226 comm="syz.1.309" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1 [ 56.301074][ T1229] device sit0 left promiscuous mode [ 56.337485][ T1232] device sit0 entered promiscuous mode [ 56.537407][ T1242] device sit0 left promiscuous mode [ 56.981695][ T1264] device sit0 entered promiscuous mode [ 57.205409][ T1266] device veth0_vlan left promiscuous mode [ 57.246401][ T1266] device veth0_vlan entered promiscuous mode [ 57.294199][ T1273] device sit0 left promiscuous mode [ 57.312090][ T1275] device sit0 left promiscuous mode [ 57.333623][ T1276] device sit0 entered promiscuous mode [ 57.478928][ T1292] FAULT_INJECTION: forcing a failure. [ 57.478928][ T1292] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 57.507729][ T1292] CPU: 1 PID: 1292 Comm: syz.3.332 Not tainted syzkaller #0 [ 57.515075][ T1292] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 57.525158][ T1292] Call Trace: [ 57.528457][ T1292] [ 57.531415][ T1292] __dump_stack+0x21/0x24 [ 57.535782][ T1292] dump_stack_lvl+0xee/0x150 [ 57.540402][ T1292] ? __cfi_dump_stack_lvl+0x8/0x8 [ 57.545465][ T1292] dump_stack+0x15/0x24 [ 57.549670][ T1292] should_fail_ex+0x3d4/0x520 [ 57.554372][ T1292] should_fail+0xb/0x10 [ 57.558634][ T1292] should_fail_usercopy+0x1a/0x20 [ 57.563687][ T1292] _copy_from_user+0x1e/0xc0 [ 57.568313][ T1292] __sys_bpf+0x277/0x780 [ 57.572586][ T1292] ? bpf_link_show_fdinfo+0x320/0x320 [ 57.578022][ T1292] ? __cfi_ksys_write+0x10/0x10 [ 57.582910][ T1292] ? debug_smp_processor_id+0x17/0x20 [ 57.588306][ T1292] __x64_sys_bpf+0x7c/0x90 [ 57.592760][ T1292] x64_sys_call+0x488/0x9a0 [ 57.597298][ T1292] do_syscall_64+0x4c/0xa0 [ 57.601837][ T1292] ? clear_bhb_loop+0x30/0x80 [ 57.606541][ T1292] ? clear_bhb_loop+0x30/0x80 [ 57.611378][ T1292] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 57.617296][ T1292] RIP: 0033:0x7ff5e9d8ebe9 [ 57.621756][ T1292] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 57.641391][ T1292] RSP: 002b:00007ff5eab1e038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 57.649832][ T1292] RAX: ffffffffffffffda RBX: 00007ff5e9fb5fa0 RCX: 00007ff5e9d8ebe9 [ 57.657830][ T1292] RDX: 0000000000000040 RSI: 0000200000000240 RDI: 000000000000001c [ 57.665823][ T1292] RBP: 00007ff5eab1e090 R08: 0000000000000000 R09: 0000000000000000 [ 57.673819][ T1292] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 57.681820][ T1292] R13: 00007ff5e9fb6038 R14: 00007ff5e9fb5fa0 R15: 00007ffed846be18 [ 57.689824][ T1292] [ 58.017481][ T1316] device sit0 left promiscuous mode [ 58.228815][ T1329] FAULT_INJECTION: forcing a failure. [ 58.228815][ T1329] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 58.303630][ T1329] CPU: 1 PID: 1329 Comm: syz.2.343 Not tainted syzkaller #0 [ 58.310973][ T1329] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 58.321056][ T1329] Call Trace: [ 58.324366][ T1329] [ 58.327318][ T1329] __dump_stack+0x21/0x24 [ 58.331685][ T1329] dump_stack_lvl+0xee/0x150 [ 58.336333][ T1329] ? __cfi_dump_stack_lvl+0x8/0x8 [ 58.341398][ T1329] dump_stack+0x15/0x24 [ 58.345592][ T1329] should_fail_ex+0x3d4/0x520 [ 58.350311][ T1329] should_fail+0xb/0x10 [ 58.354500][ T1329] should_fail_usercopy+0x1a/0x20 [ 58.359655][ T1329] _copy_from_user+0x1e/0xc0 [ 58.364272][ T1329] do_vfs_ioctl+0x16d6/0x1c80 [ 58.368983][ T1329] ? __ia32_compat_sys_ioctl+0x790/0x790 [ 58.374655][ T1329] ? ioctl_has_perm+0x391/0x4c0 [ 58.379840][ T1329] ? has_cap_mac_admin+0x330/0x330 [ 58.384983][ T1329] ? __hrtimer_run_queues+0x991/0x9f0 [ 58.390479][ T1329] ? selinux_file_ioctl+0x377/0x480 [ 58.395707][ T1329] ? __cfi_selinux_file_ioctl+0x10/0x10 [ 58.401281][ T1329] ? __fget_files+0x2d5/0x330 [ 58.405997][ T1329] ? security_file_ioctl+0x95/0xc0 [ 58.411136][ T1329] __se_sys_ioctl+0x9f/0x1b0 [ 58.415767][ T1329] __x64_sys_ioctl+0x7b/0x90 [ 58.420435][ T1329] x64_sys_call+0x58b/0x9a0 [ 58.424976][ T1329] do_syscall_64+0x4c/0xa0 [ 58.429451][ T1329] ? clear_bhb_loop+0x30/0x80 [ 58.434166][ T1329] ? clear_bhb_loop+0x30/0x80 [ 58.438978][ T1329] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 58.444900][ T1329] RIP: 0033:0x7f281018ebe9 [ 58.449328][ T1329] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 58.468950][ T1329] RSP: 002b:00007f2810f15038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 58.477381][ T1329] RAX: ffffffffffffffda RBX: 00007f28103b5fa0 RCX: 00007f281018ebe9 [ 58.485376][ T1329] RDX: 0000200000000040 RSI: 000000004030582a RDI: 0000000000000005 [ 58.493356][ T1329] RBP: 00007f2810f15090 R08: 0000000000000000 R09: 0000000000000000 [ 58.501358][ T1329] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 58.509335][ T1329] R13: 00007f28103b6038 R14: 00007f28103b5fa0 R15: 00007ffc3fd0c1b8 [ 58.517321][ T1329] [ 58.579205][ T1334] device sit0 entered promiscuous mode [ 59.122937][ T28] audit: type=1400 audit(1755797009.846:123): avc: denied { setattr } for pid=1358 comm="syz.0.355" path="/dev/net/tun" dev="devtmpfs" ino=156 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tun_tap_device_t tclass=chr_file permissive=1 [ 59.199950][ T1371] device sit0 entered promiscuous mode [ 60.022705][ T1394] FAULT_INJECTION: forcing a failure. [ 60.022705][ T1394] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 60.074209][ T1394] CPU: 0 PID: 1394 Comm: syz.4.365 Not tainted syzkaller #0 [ 60.081558][ T1394] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 60.091640][ T1394] Call Trace: [ 60.094942][ T1394] [ 60.097941][ T1394] __dump_stack+0x21/0x24 [ 60.102300][ T1394] dump_stack_lvl+0xee/0x150 [ 60.106921][ T1394] ? __cfi_dump_stack_lvl+0x8/0x8 [ 60.111978][ T1394] dump_stack+0x15/0x24 [ 60.116168][ T1394] should_fail_ex+0x3d4/0x520 [ 60.120869][ T1394] should_fail+0xb/0x10 [ 60.125050][ T1394] should_fail_usercopy+0x1a/0x20 [ 60.130099][ T1394] _copy_from_user+0x1e/0xc0 [ 60.134726][ T1394] __sys_bpf+0x277/0x780 [ 60.138998][ T1394] ? bpf_link_show_fdinfo+0x320/0x320 [ 60.144403][ T1394] ? __cfi_ksys_write+0x10/0x10 [ 60.149291][ T1394] ? debug_smp_processor_id+0x17/0x20 [ 60.154699][ T1394] __x64_sys_bpf+0x7c/0x90 [ 60.159165][ T1394] x64_sys_call+0x488/0x9a0 [ 60.163711][ T1394] do_syscall_64+0x4c/0xa0 [ 60.168263][ T1394] ? clear_bhb_loop+0x30/0x80 [ 60.172974][ T1394] ? clear_bhb_loop+0x30/0x80 [ 60.177682][ T1394] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 60.183603][ T1394] RIP: 0033:0x7fdb7158ebe9 [ 60.188040][ T1394] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 60.207665][ T1394] RSP: 002b:00007fdb7238b038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 60.216106][ T1394] RAX: ffffffffffffffda RBX: 00007fdb717b6090 RCX: 00007fdb7158ebe9 [ 60.224099][ T1394] RDX: 0000000000000038 RSI: 00002000000003c0 RDI: 0000000000000018 [ 60.232092][ T1394] RBP: 00007fdb7238b090 R08: 0000000000000000 R09: 0000000000000000 [ 60.240082][ T1394] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 60.248163][ T1394] R13: 00007fdb717b6128 R14: 00007fdb717b6090 R15: 00007fffa7fe5458 [ 60.256180][ T1394] [ 60.894040][ T1416] device sit0 left promiscuous mode [ 60.975512][ T1421] device sit0 left promiscuous mode [ 61.096363][ T1423] device sit0 entered promiscuous mode [ 61.647658][ T1451] cgroup: fork rejected by pids controller in /syz1 [ 62.014493][ T286] syz-executor (286) used greatest stack depth: 21984 bytes left [ 62.338401][ T1567] device sit0 left promiscuous mode [ 62.436791][ T1569] device sit0 left promiscuous mode [ 62.466505][ T1571] device sit0 entered promiscuous mode [ 63.032059][ T416] device veth1_macvtap left promiscuous mode [ 63.039362][ T416] device veth0_vlan left promiscuous mode [ 63.187493][ T1572] bridge0: port 1(bridge_slave_0) entered blocking state [ 63.195606][ T1572] bridge0: port 1(bridge_slave_0) entered disabled state [ 63.203192][ T1572] device bridge_slave_0 entered promiscuous mode [ 63.263813][ T1605] device sit0 left promiscuous mode [ 63.290666][ T1606] device sit0 entered promiscuous mode [ 63.449877][ T1572] bridge0: port 2(bridge_slave_1) entered blocking state [ 63.467348][ T1572] bridge0: port 2(bridge_slave_1) entered disabled state [ 63.481327][ T1572] device bridge_slave_1 entered promiscuous mode [ 63.590145][ T1610] device syzkaller0 entered promiscuous mode [ 63.698251][ T1620] device sit0 entered promiscuous mode [ 63.711977][ T1614] device sit0 left promiscuous mode [ 63.757114][ T1623] device sit0 entered promiscuous mode [ 64.038044][ T1635] device sit0 left promiscuous mode [ 64.075225][ T1641] device sit0 left promiscuous mode [ 64.093035][ T28] audit: type=1400 audit(1755797014.816:124): avc: denied { create } for pid=1572 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 64.165384][ T28] audit: type=1400 audit(1755797014.866:125): avc: denied { write } for pid=1572 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 64.187487][ T28] audit: type=1400 audit(1755797014.866:126): avc: denied { read } for pid=1572 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 64.189374][ T1635] device sit0 entered promiscuous mode [ 64.364258][ T1658] FAULT_INJECTION: forcing a failure. [ 64.364258][ T1658] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 64.419222][ T348] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 64.427964][ T1658] CPU: 1 PID: 1658 Comm: syz.0.419 Not tainted syzkaller #0 [ 64.435288][ T1658] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 64.445370][ T1658] Call Trace: [ 64.448673][ T1658] [ 64.451619][ T1658] __dump_stack+0x21/0x24 [ 64.455977][ T1658] dump_stack_lvl+0xee/0x150 [ 64.460618][ T1658] ? __cfi_dump_stack_lvl+0x8/0x8 [ 64.465686][ T1658] dump_stack+0x15/0x24 [ 64.469903][ T1658] should_fail_ex+0x3d4/0x520 [ 64.474614][ T1658] should_fail+0xb/0x10 [ 64.478883][ T1658] should_fail_usercopy+0x1a/0x20 [ 64.483938][ T1658] _copy_from_user+0x1e/0xc0 [ 64.488550][ T1658] __sys_bpf+0x277/0x780 [ 64.492811][ T1658] ? bpf_link_show_fdinfo+0x320/0x320 [ 64.498295][ T1658] ? __cfi_ksys_write+0x10/0x10 [ 64.503172][ T1658] ? debug_smp_processor_id+0x17/0x20 [ 64.508567][ T1658] __x64_sys_bpf+0x7c/0x90 [ 64.513021][ T1658] x64_sys_call+0x488/0x9a0 [ 64.517549][ T1658] do_syscall_64+0x4c/0xa0 [ 64.521987][ T1658] ? clear_bhb_loop+0x30/0x80 [ 64.526693][ T1658] ? clear_bhb_loop+0x30/0x80 [ 64.531406][ T1658] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 64.537321][ T1658] RIP: 0033:0x7fcde218ebe9 [ 64.541752][ T1658] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 64.561374][ T1658] RSP: 002b:00007fcde0bf7038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 64.569819][ T1658] RAX: ffffffffffffffda RBX: 00007fcde23b5fa0 RCX: 00007fcde218ebe9 [ 64.577828][ T1658] RDX: 0000000000000020 RSI: 0000200000000740 RDI: 0000000000000002 [ 64.585834][ T1658] RBP: 00007fcde0bf7090 R08: 0000000000000000 R09: 0000000000000000 [ 64.593837][ T1658] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 64.601824][ T1658] R13: 00007fcde23b6038 R14: 00007fcde23b5fa0 R15: 00007ffcf75bf0b8 [ 64.609818][ T1658] [ 64.632940][ T348] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 64.661780][ T348] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 64.698006][ T348] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 64.724366][ T348] bridge0: port 1(bridge_slave_0) entered blocking state [ 64.731472][ T348] bridge0: port 1(bridge_slave_0) entered forwarding state [ 64.769701][ T348] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 64.785877][ T348] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 64.803383][ T348] bridge0: port 2(bridge_slave_1) entered blocking state [ 64.810536][ T348] bridge0: port 2(bridge_slave_1) entered forwarding state [ 64.833654][ T1668] device sit0 left promiscuous mode [ 64.861922][ T348] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 64.894170][ T348] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 64.906468][ T348] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 64.921382][ T348] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 64.930134][ T348] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 64.941822][ T1669] device sit0 entered promiscuous mode [ 64.955933][ T1671] device syz_tun entered promiscuous mode [ 64.967841][ T1572] device veth0_vlan entered promiscuous mode [ 65.001784][ T1676] device sit0 entered promiscuous mode [ 65.226307][ T348] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 65.244897][ T348] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 65.263806][ T348] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 65.272000][ T348] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 65.280595][ T348] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 65.288446][ T348] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 65.320927][ T1572] device veth1_macvtap entered promiscuous mode [ 65.355893][ T334] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 65.373764][ T334] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 65.382174][ T334] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 65.390889][ T1706] device sit0 left promiscuous mode [ 65.434235][ T1709] device sit0 entered promiscuous mode [ 65.449980][ T334] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 65.472120][ T334] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 65.492153][ T334] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 65.533552][ T334] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 66.086568][ T1738] FAULT_INJECTION: forcing a failure. [ 66.086568][ T1738] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 66.117602][ T1735] device sit0 entered promiscuous mode [ 66.165071][ T1738] CPU: 0 PID: 1738 Comm: syz.4.446 Not tainted syzkaller #0 [ 66.172435][ T1738] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 66.182512][ T1738] Call Trace: [ 66.185812][ T1738] [ 66.188761][ T1738] __dump_stack+0x21/0x24 [ 66.193123][ T1738] dump_stack_lvl+0xee/0x150 [ 66.197762][ T1738] ? __cfi_dump_stack_lvl+0x8/0x8 [ 66.202903][ T1738] ? ioctl_has_perm+0x391/0x4c0 [ 66.207814][ T1738] dump_stack+0x15/0x24 [ 66.211997][ T1738] should_fail_ex+0x3d4/0x520 [ 66.216713][ T1738] should_fail+0xb/0x10 [ 66.220896][ T1738] should_fail_usercopy+0x1a/0x20 [ 66.225954][ T1738] _copy_from_user+0x1e/0xc0 [ 66.230599][ T1738] __tun_chr_ioctl+0x1ed/0x1e70 [ 66.235497][ T1738] ? tun_flow_create+0x320/0x320 [ 66.240472][ T1738] ? mutex_unlock+0x89/0x220 [ 66.245103][ T1738] tun_chr_ioctl+0x2a/0x40 [ 66.249561][ T1738] ? __cfi_tun_chr_ioctl+0x10/0x10 [ 66.254705][ T1738] __se_sys_ioctl+0x12f/0x1b0 [ 66.259429][ T1738] __x64_sys_ioctl+0x7b/0x90 [ 66.264183][ T1738] x64_sys_call+0x58b/0x9a0 [ 66.268717][ T1738] do_syscall_64+0x4c/0xa0 [ 66.273229][ T1738] ? clear_bhb_loop+0x30/0x80 [ 66.277931][ T1738] ? clear_bhb_loop+0x30/0x80 [ 66.282649][ T1738] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 66.288571][ T1738] RIP: 0033:0x7fdb7158ebe9 [ 66.293010][ T1738] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 66.312647][ T1738] RSP: 002b:00007fdb723ac038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 66.321097][ T1738] RAX: ffffffffffffffda RBX: 00007fdb717b5fa0 RCX: 00007fdb7158ebe9 [ 66.329200][ T1738] RDX: 0000200000000140 RSI: 00000000400454d9 RDI: 0000000000000003 [ 66.337371][ T1738] RBP: 00007fdb723ac090 R08: 0000000000000000 R09: 0000000000000000 [ 66.345469][ T1738] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 66.353477][ T1738] R13: 00007fdb717b6038 R14: 00007fdb717b5fa0 R15: 00007fffa7fe5458 [ 66.361571][ T1738] [ 66.403014][ T1741] device sit0 entered promiscuous mode [ 66.741137][ T1746] bridge0: port 2(bridge_slave_1) entered disabled state [ 66.748419][ T1746] bridge0: port 1(bridge_slave_0) entered disabled state [ 66.811443][ T1757] device sit0 left promiscuous mode [ 66.837367][ T1757] device sit0 entered promiscuous mode [ 67.025129][ T1769] device sit0 left promiscuous mode [ 67.079228][ T1765] device pim6reg1 entered promiscuous mode [ 67.240051][ T1776] device syzkaller0 entered promiscuous mode [ 67.971379][ T1803] device sit0 left promiscuous mode [ 68.054261][ T1803] device sit0 entered promiscuous mode [ 68.185800][ T1807] device sit0 left promiscuous mode [ 68.273815][ T1811] device syzkaller0 entered promiscuous mode [ 68.458863][ T1821] device wg2 entered promiscuous mode [ 68.509161][ T1825] device sit0 entered promiscuous mode [ 68.680676][ T1837] FAULT_INJECTION: forcing a failure. [ 68.680676][ T1837] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 68.773393][ T1837] CPU: 1 PID: 1837 Comm: syz.1.484 Not tainted syzkaller #0 [ 68.780744][ T1837] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 68.790911][ T1837] Call Trace: [ 68.794211][ T1837] [ 68.797176][ T1837] __dump_stack+0x21/0x24 [ 68.801560][ T1837] dump_stack_lvl+0xee/0x150 [ 68.806185][ T1837] ? __cfi_dump_stack_lvl+0x8/0x8 [ 68.811263][ T1837] dump_stack+0x15/0x24 [ 68.815445][ T1837] should_fail_ex+0x3d4/0x520 [ 68.820164][ T1837] should_fail+0xb/0x10 [ 68.824385][ T1837] should_fail_usercopy+0x1a/0x20 [ 68.829441][ T1837] _copy_from_user+0x1e/0xc0 [ 68.834061][ T1837] __sys_bpf+0x277/0x780 [ 68.838333][ T1837] ? bpf_link_show_fdinfo+0x320/0x320 [ 68.843740][ T1837] ? __cfi_ksys_write+0x10/0x10 [ 68.848628][ T1837] ? debug_smp_processor_id+0x17/0x20 [ 68.854031][ T1837] __x64_sys_bpf+0x7c/0x90 [ 68.858484][ T1837] x64_sys_call+0x488/0x9a0 [ 68.863019][ T1837] do_syscall_64+0x4c/0xa0 [ 68.867467][ T1837] ? clear_bhb_loop+0x30/0x80 [ 68.872179][ T1837] ? clear_bhb_loop+0x30/0x80 [ 68.876895][ T1837] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 68.882831][ T1837] RIP: 0033:0x7f51e358ebe9 [ 68.887271][ T1837] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 68.906918][ T1837] RSP: 002b:00007f51e43d2038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 68.915360][ T1837] RAX: ffffffffffffffda RBX: 00007f51e37b5fa0 RCX: 00007f51e358ebe9 [ 68.923358][ T1837] RDX: 0000000000000010 RSI: 0000200000000740 RDI: 000000000000000a [ 68.931365][ T1837] RBP: 00007f51e43d2090 R08: 0000000000000000 R09: 0000000000000000 [ 68.939380][ T1837] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 68.947391][ T1837] R13: 00007f51e37b6038 R14: 00007f51e37b5fa0 R15: 00007ffc75dd5d38 [ 68.955406][ T1837] [ 69.007796][ T1844] device sit0 left promiscuous mode [ 69.028380][ T1846] device sit0 left promiscuous mode [ 69.052889][ T1844] device sit0 entered promiscuous mode [ 69.420161][ T1863] FAULT_INJECTION: forcing a failure. [ 69.420161][ T1863] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 69.463377][ T1863] CPU: 1 PID: 1863 Comm: syz.4.494 Not tainted syzkaller #0 [ 69.470734][ T1863] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 69.480819][ T1863] Call Trace: [ 69.484106][ T1863] [ 69.487042][ T1863] __dump_stack+0x21/0x24 [ 69.491390][ T1863] dump_stack_lvl+0xee/0x150 [ 69.495992][ T1863] ? __cfi_dump_stack_lvl+0x8/0x8 [ 69.501034][ T1863] dump_stack+0x15/0x24 [ 69.505217][ T1863] should_fail_ex+0x3d4/0x520 [ 69.509917][ T1863] should_fail+0xb/0x10 [ 69.514112][ T1863] should_fail_usercopy+0x1a/0x20 [ 69.519179][ T1863] _copy_from_user+0x1e/0xc0 [ 69.523778][ T1863] __sys_bpf+0x277/0x780 [ 69.528028][ T1863] ? bpf_link_show_fdinfo+0x320/0x320 [ 69.533414][ T1863] ? __cfi_ksys_write+0x10/0x10 [ 69.538284][ T1863] ? debug_smp_processor_id+0x17/0x20 [ 69.543664][ T1863] __x64_sys_bpf+0x7c/0x90 [ 69.548097][ T1863] x64_sys_call+0x488/0x9a0 [ 69.552607][ T1863] do_syscall_64+0x4c/0xa0 [ 69.557033][ T1863] ? clear_bhb_loop+0x30/0x80 [ 69.561750][ T1863] ? clear_bhb_loop+0x30/0x80 [ 69.566444][ T1863] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 69.572355][ T1863] RIP: 0033:0x7fdb7158ebe9 [ 69.576803][ T1863] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 69.596414][ T1863] RSP: 002b:00007fdb723ac038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 69.604856][ T1863] RAX: ffffffffffffffda RBX: 00007fdb717b5fa0 RCX: 00007fdb7158ebe9 [ 69.612842][ T1863] RDX: 0000000000000048 RSI: 0000200000000840 RDI: 0000000000000000 [ 69.620828][ T1863] RBP: 00007fdb723ac090 R08: 0000000000000000 R09: 0000000000000000 [ 69.628804][ T1863] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 69.636794][ T1863] R13: 00007fdb717b6038 R14: 00007fdb717b5fa0 R15: 00007fffa7fe5458 [ 69.644874][ T1863] [ 69.664182][ T1865] syzkaller: port 1(erspan0) entered disabled state [ 69.721334][ T1872] FAULT_INJECTION: forcing a failure. [ 69.721334][ T1872] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 69.736043][ T1872] CPU: 0 PID: 1872 Comm: syz.0.498 Not tainted syzkaller #0 [ 69.743404][ T1872] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 69.750645][ T1876] FAULT_INJECTION: forcing a failure. [ 69.750645][ T1876] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 69.753608][ T1872] Call Trace: [ 69.753616][ T1872] [ 69.753624][ T1872] __dump_stack+0x21/0x24 [ 69.753656][ T1872] dump_stack_lvl+0xee/0x150 [ 69.782110][ T1872] ? __cfi_dump_stack_lvl+0x8/0x8 [ 69.787175][ T1872] dump_stack+0x15/0x24 [ 69.791363][ T1872] should_fail_ex+0x3d4/0x520 [ 69.796065][ T1872] should_fail+0xb/0x10 [ 69.800260][ T1872] should_fail_usercopy+0x1a/0x20 [ 69.805308][ T1872] _copy_from_user+0x1e/0xc0 [ 69.809923][ T1872] sock_do_ioctl+0x186/0x310 [ 69.814543][ T1872] ? sock_show_fdinfo+0xb0/0xb0 [ 69.819436][ T1872] ? selinux_file_ioctl+0x377/0x480 [ 69.824662][ T1872] sock_ioctl+0x4d8/0x6e0 [ 69.829019][ T1872] ? __cfi_sock_ioctl+0x10/0x10 [ 69.833897][ T1872] ? __fget_files+0x2d5/0x330 [ 69.838599][ T1872] ? security_file_ioctl+0x95/0xc0 [ 69.843740][ T1872] ? __cfi_sock_ioctl+0x10/0x10 [ 69.848615][ T1872] __se_sys_ioctl+0x12f/0x1b0 [ 69.853324][ T1872] __x64_sys_ioctl+0x7b/0x90 [ 69.857951][ T1872] x64_sys_call+0x58b/0x9a0 [ 69.862483][ T1872] do_syscall_64+0x4c/0xa0 [ 69.866940][ T1872] ? clear_bhb_loop+0x30/0x80 [ 69.871636][ T1872] ? clear_bhb_loop+0x30/0x80 [ 69.876354][ T1872] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 69.882273][ T1872] RIP: 0033:0x7fcde218ebe9 [ 69.886795][ T1872] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 69.906423][ T1872] RSP: 002b:00007fcde0bf7038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 69.914869][ T1872] RAX: ffffffffffffffda RBX: 00007fcde23b5fa0 RCX: 00007fcde218ebe9 [ 69.922863][ T1872] RDX: 0000200000000000 RSI: 0000000000008924 RDI: 0000000000000009 [ 69.930853][ T1872] RBP: 00007fcde0bf7090 R08: 0000000000000000 R09: 0000000000000000 [ 69.938826][ T1872] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 69.946799][ T1872] R13: 00007fcde23b6038 R14: 00007fcde23b5fa0 R15: 00007ffcf75bf0b8 [ 69.954781][ T1872] [ 69.958925][ T1876] CPU: 1 PID: 1876 Comm: syz.3.500 Not tainted syzkaller #0 [ 69.966253][ T1876] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 69.976343][ T1876] Call Trace: [ 69.979622][ T1876] [ 69.982555][ T1876] __dump_stack+0x21/0x24 [ 69.986900][ T1876] dump_stack_lvl+0xee/0x150 [ 69.991515][ T1876] ? __cfi_dump_stack_lvl+0x8/0x8 [ 69.996549][ T1876] dump_stack+0x15/0x24 [ 70.000738][ T1876] should_fail_ex+0x3d4/0x520 [ 70.005420][ T1876] should_fail+0xb/0x10 [ 70.009585][ T1876] should_fail_usercopy+0x1a/0x20 [ 70.014624][ T1876] _copy_to_user+0x1e/0x90 [ 70.019047][ T1876] simple_read_from_buffer+0xe9/0x160 [ 70.024434][ T1876] proc_fail_nth_read+0x19a/0x210 [ 70.029468][ T1876] ? __cfi_proc_fail_nth_read+0x10/0x10 [ 70.035026][ T1876] ? security_file_permission+0x94/0xb0 [ 70.040580][ T1876] ? __cfi_proc_fail_nth_read+0x10/0x10 [ 70.046136][ T1876] vfs_read+0x26e/0x8c0 [ 70.050306][ T1876] ? __cfi_vfs_read+0x10/0x10 [ 70.055025][ T1876] ? __kasan_check_write+0x14/0x20 [ 70.060149][ T1876] ? mutex_lock+0x8d/0x1a0 [ 70.064565][ T1876] ? __cfi_mutex_lock+0x10/0x10 [ 70.069414][ T1876] ? __fdget_pos+0x2cd/0x380 [ 70.074008][ T1876] ? ksys_read+0x71/0x240 [ 70.078345][ T1876] ksys_read+0x140/0x240 [ 70.082607][ T1876] ? __cfi_ksys_read+0x10/0x10 [ 70.087475][ T1876] ? debug_smp_processor_id+0x17/0x20 [ 70.092852][ T1876] __x64_sys_read+0x7b/0x90 [ 70.097364][ T1876] x64_sys_call+0x2f/0x9a0 [ 70.101783][ T1876] do_syscall_64+0x4c/0xa0 [ 70.106209][ T1876] ? clear_bhb_loop+0x30/0x80 [ 70.110890][ T1876] ? clear_bhb_loop+0x30/0x80 [ 70.115577][ T1876] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 70.121465][ T1876] RIP: 0033:0x7ff5e9d8d5fc [ 70.125875][ T1876] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 93 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 ef 93 02 00 48 [ 70.145478][ T1876] RSP: 002b:00007ff5eab1e030 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 70.153895][ T1876] RAX: ffffffffffffffda RBX: 00007ff5e9fb5fa0 RCX: 00007ff5e9d8d5fc [ 70.161871][ T1876] RDX: 000000000000000f RSI: 00007ff5eab1e0a0 RDI: 0000000000000007 [ 70.169842][ T1876] RBP: 00007ff5eab1e090 R08: 0000000000000000 R09: 0000000000000000 [ 70.177835][ T1876] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 70.185824][ T1876] R13: 00007ff5e9fb6038 R14: 00007ff5e9fb5fa0 R15: 00007ffed846be18 [ 70.193827][ T1876] [ 70.249902][ T1885] device sit0 entered promiscuous mode [ 70.300669][ T1891] device sit0 left promiscuous mode [ 70.346320][ T1891] device sit0 entered promiscuous mode [ 70.519906][ T1913] FAULT_INJECTION: forcing a failure. [ 70.519906][ T1913] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 70.630867][ T1913] CPU: 1 PID: 1913 Comm: syz.2.513 Not tainted syzkaller #0 [ 70.638206][ T1913] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 70.648288][ T1913] Call Trace: [ 70.651571][ T1913] [ 70.654502][ T1913] __dump_stack+0x21/0x24 [ 70.658832][ T1913] dump_stack_lvl+0xee/0x150 [ 70.663426][ T1913] ? __cfi_dump_stack_lvl+0x8/0x8 [ 70.668479][ T1913] ? _parse_integer+0x2a/0x40 [ 70.673203][ T1913] dump_stack+0x15/0x24 [ 70.677368][ T1913] should_fail_ex+0x3d4/0x520 [ 70.682077][ T1913] should_fail+0xb/0x10 [ 70.686262][ T1913] should_fail_usercopy+0x1a/0x20 [ 70.691311][ T1913] _copy_from_user+0x1e/0xc0 [ 70.695913][ T1913] ___sys_sendmsg+0x155/0x290 [ 70.700609][ T1913] ? __sys_sendmsg+0x270/0x270 [ 70.705396][ T1913] ? __kasan_check_write+0x14/0x20 [ 70.710557][ T1913] ? proc_fail_nth_write+0x17a/0x1f0 [ 70.715925][ T1913] ? vfs_write+0x9d6/0xca0 [ 70.720377][ T1913] ? __fdget+0x19c/0x220 [ 70.724651][ T1913] __x64_sys_sendmsg+0x1f0/0x2c0 [ 70.729616][ T1913] ? __cfi___x64_sys_sendmsg+0x10/0x10 [ 70.735102][ T1913] ? fpregs_assert_state_consistent+0xb1/0xe0 [ 70.741292][ T1913] x64_sys_call+0x171/0x9a0 [ 70.745833][ T1913] do_syscall_64+0x4c/0xa0 [ 70.750283][ T1913] ? clear_bhb_loop+0x30/0x80 [ 70.754992][ T1913] ? clear_bhb_loop+0x30/0x80 [ 70.759694][ T1913] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 70.765631][ T1913] RIP: 0033:0x7f281018ebe9 [ 70.770071][ T1913] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 70.789713][ T1913] RSP: 002b:00007f280ebf7038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 70.798162][ T1913] RAX: ffffffffffffffda RBX: 00007f28103b6090 RCX: 00007f281018ebe9 [ 70.806165][ T1913] RDX: 0000000000000000 RSI: 0000200000000b40 RDI: 0000000000000003 [ 70.814161][ T1913] RBP: 00007f280ebf7090 R08: 0000000000000000 R09: 0000000000000000 [ 70.822333][ T1913] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 70.830327][ T1913] R13: 00007f28103b6128 R14: 00007f28103b6090 R15: 00007ffc3fd0c1b8 [ 70.838336][ T1913] [ 71.005458][ T1933] device sit0 left promiscuous mode [ 71.012441][ T1931] FAULT_INJECTION: forcing a failure. [ 71.012441][ T1931] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 71.026955][ T1931] CPU: 0 PID: 1931 Comm: syz.4.521 Not tainted syzkaller #0 [ 71.027020][ T1933] device sit0 entered promiscuous mode [ 71.034277][ T1931] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 71.034295][ T1931] Call Trace: [ 71.034302][ T1931] [ 71.034311][ T1931] __dump_stack+0x21/0x24 [ 71.034344][ T1931] dump_stack_lvl+0xee/0x150 [ 71.034369][ T1931] ? __cfi_dump_stack_lvl+0x8/0x8 [ 71.034396][ T1931] ? _parse_integer+0x2a/0x40 [ 71.034423][ T1931] dump_stack+0x15/0x24 [ 71.034449][ T1931] should_fail_ex+0x3d4/0x520 [ 71.034482][ T1931] should_fail+0xb/0x10 [ 71.087888][ T1931] should_fail_usercopy+0x1a/0x20 [ 71.092936][ T1931] _copy_from_user+0x1e/0xc0 [ 71.097538][ T1931] ___sys_sendmsg+0x155/0x290 [ 71.102232][ T1931] ? __sys_sendmsg+0x270/0x270 [ 71.107001][ T1931] ? __kasan_check_write+0x14/0x20 [ 71.112127][ T1931] ? proc_fail_nth_write+0x17a/0x1f0 [ 71.117454][ T1931] ? vfs_write+0x9d6/0xca0 [ 71.121910][ T1931] ? __fdget+0x19c/0x220 [ 71.126179][ T1931] __x64_sys_sendmsg+0x1f0/0x2c0 [ 71.131121][ T1931] ? __cfi___x64_sys_sendmsg+0x10/0x10 [ 71.136585][ T1931] ? fpregs_assert_state_consistent+0xb1/0xe0 [ 71.142666][ T1931] x64_sys_call+0x171/0x9a0 [ 71.147175][ T1931] do_syscall_64+0x4c/0xa0 [ 71.151599][ T1931] ? clear_bhb_loop+0x30/0x80 [ 71.156317][ T1931] ? clear_bhb_loop+0x30/0x80 [ 71.161001][ T1931] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 71.166894][ T1931] RIP: 0033:0x7fdb7158ebe9 [ 71.171314][ T1931] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 71.190921][ T1931] RSP: 002b:00007fdb723ac038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 71.199339][ T1931] RAX: ffffffffffffffda RBX: 00007fdb717b5fa0 RCX: 00007fdb7158ebe9 [ 71.207310][ T1931] RDX: 0000000000000000 RSI: 0000200000000b40 RDI: 0000000000000003 [ 71.215301][ T1931] RBP: 00007fdb723ac090 R08: 0000000000000000 R09: 0000000000000000 [ 71.223276][ T1931] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 71.231250][ T1931] R13: 00007fdb717b6038 R14: 00007fdb717b5fa0 R15: 00007fffa7fe5458 [ 71.239229][ T1931] [ 71.276972][ T1933] device bridge_slave_1 left promiscuous mode [ 71.283245][ T1933] bridge0: port 2(bridge_slave_1) entered disabled state [ 71.298658][ T1933] device bridge_slave_0 left promiscuous mode [ 71.330072][ T1933] bridge0: port 1(bridge_slave_0) entered disabled state [ 71.360149][ T1952] FAULT_INJECTION: forcing a failure. [ 71.360149][ T1952] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 71.379970][ T1952] CPU: 1 PID: 1952 Comm: syz.2.528 Not tainted syzkaller #0 [ 71.387297][ T1952] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 71.397373][ T1952] Call Trace: [ 71.400669][ T1952] [ 71.403619][ T1952] __dump_stack+0x21/0x24 [ 71.407968][ T1952] dump_stack_lvl+0xee/0x150 [ 71.412577][ T1952] ? __cfi_dump_stack_lvl+0x8/0x8 [ 71.417623][ T1952] dump_stack+0x15/0x24 [ 71.421812][ T1952] should_fail_ex+0x3d4/0x520 [ 71.426506][ T1952] should_fail+0xb/0x10 [ 71.430674][ T1952] should_fail_usercopy+0x1a/0x20 [ 71.435707][ T1952] _copy_from_user+0x1e/0xc0 [ 71.440304][ T1952] __sys_bpf+0x277/0x780 [ 71.444548][ T1952] ? bpf_link_show_fdinfo+0x320/0x320 [ 71.449930][ T1952] ? __cfi_ksys_write+0x10/0x10 [ 71.454791][ T1952] ? debug_smp_processor_id+0x17/0x20 [ 71.460190][ T1952] __x64_sys_bpf+0x7c/0x90 [ 71.464614][ T1952] x64_sys_call+0x488/0x9a0 [ 71.469132][ T1952] do_syscall_64+0x4c/0xa0 [ 71.473556][ T1952] ? clear_bhb_loop+0x30/0x80 [ 71.478252][ T1952] ? clear_bhb_loop+0x30/0x80 [ 71.482929][ T1952] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 71.488822][ T1952] RIP: 0033:0x7f281018ebe9 [ 71.493234][ T1952] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 71.512939][ T1952] RSP: 002b:00007f2810f15038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 71.521358][ T1952] RAX: ffffffffffffffda RBX: 00007f28103b5fa0 RCX: 00007f281018ebe9 [ 71.529330][ T1952] RDX: 0000000000000020 RSI: 0000200000001280 RDI: 0000000000000012 [ 71.537310][ T1952] RBP: 00007f2810f15090 R08: 0000000000000000 R09: 0000000000000000 [ 71.545280][ T1952] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 71.553255][ T1952] R13: 00007f28103b6038 R14: 00007f28103b5fa0 R15: 00007ffc3fd0c1b8 [ 71.561237][ T1952] [ 71.582764][ T1944] device sit0 left promiscuous mode [ 71.601749][ T1957] device sit0 entered promiscuous mode [ 71.626076][ T1960] syz.4.529[1960] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 71.626155][ T1960] syz.4.529[1960] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 71.653217][ T1960] syz.4.529[1960] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 71.665008][ T1960] syz.4.529[1960] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 72.292833][ T1995] device sit0 left promiscuous mode [ 72.381358][ T2000] device sit0 left promiscuous mode [ 72.466800][ T2003] device sit0 entered promiscuous mode [ 72.625111][ T2007] device sit0 entered promiscuous mode [ 72.820065][ T2013] device sit0 entered promiscuous mode [ 73.010349][ T2019] device sit0 left promiscuous mode [ 73.108111][ T2024] device sit0 entered promiscuous mode [ 74.372553][ T2042] device sit0 left promiscuous mode [ 74.429277][ T2042] device sit0 entered promiscuous mode [ 74.597386][ T2048] device sit0 left promiscuous mode [ 74.623893][ T2051] device sit0 entered promiscuous mode [ 74.999813][ T2068] device xfrm0 entered promiscuous mode [ 75.176861][ T2077] device sit0 left promiscuous mode [ 75.232171][ T2080] device sit0 entered promiscuous mode [ 75.726970][ T2085] syz.2.574[2085] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 75.727047][ T2085] syz.2.574[2085] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 77.645984][ T2152] device sit0 left promiscuous mode [ 77.721259][ T2152] device sit0 entered promiscuous mode [ 77.993484][ T2159] device sit0 left promiscuous mode [ 78.805299][ T2200] device sit0 left promiscuous mode [ 78.856864][ T2204] device sit0 entered promiscuous mode [ 79.366967][ T2216] device sit0 left promiscuous mode [ 79.417347][ T2216] device sit0 entered promiscuous mode [ 79.620689][ T2219] device sit0 left promiscuous mode [ 79.738141][ T2222] device sit0 entered promiscuous mode [ 79.960928][ T2226] device sit0 left promiscuous mode [ 80.022850][ T2228] device sit0 entered promiscuous mode [ 80.312984][ T2233] device sit0 left promiscuous mode [ 80.332086][ T2234] device sit0 entered promiscuous mode [ 80.480729][ T2236] device sit0 left promiscuous mode [ 80.970025][ T2263] syzkaller: port 1(erspan0) entered blocking state [ 80.976701][ T2263] syzkaller: port 1(erspan0) entered forwarding state [ 81.074002][ T416] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller: link becomes ready [ 81.195973][ T2261] syz.4.639[2261] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 81.196052][ T2261] syz.4.639[2261] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 81.332038][ T2273] device sit0 left promiscuous mode [ 81.380514][ T2273] device sit0 entered promiscuous mode [ 81.510177][ T2275] device sit0 left promiscuous mode [ 81.525823][ T2280] device sit0 entered promiscuous mode [ 81.647540][ T2290] device sit0 entered promiscuous mode [ 81.827641][ T2297] device sit0 left promiscuous mode [ 81.900354][ T2297] device sit0 entered promiscuous mode [ 82.549040][ T2328] device sit0 left promiscuous mode [ 82.618471][ T2325] syzkaller: port 1(erspan0) entered blocking state [ 82.636392][ T2325] syzkaller: port 1(erspan0) entered disabled state [ 82.663692][ T2325] device erspan0 entered promiscuous mode [ 82.694678][ T2332] syzkaller: port 1(erspan0) entered blocking state [ 82.701413][ T2332] syzkaller: port 1(erspan0) entered forwarding state [ 82.717577][ T2328] device sit0 entered promiscuous mode [ 83.959809][ T2385] device xfrm0 entered promiscuous mode [ 84.311617][ T2392] device syzkaller0 entered promiscuous mode [ 85.795012][ T2448] device sit0 left promiscuous mode [ 85.995730][ T2446] device syzkaller0 entered promiscuous mode [ 86.014004][ T2451] device sit0 entered promiscuous mode [ 86.961464][ T2480] device sit0 entered promiscuous mode [ 88.259093][ T2528] device sit0 left promiscuous mode [ 88.317581][ T2528] device sit0 entered promiscuous mode [ 88.499786][ T2540] device sit0 left promiscuous mode [ 88.584248][ T2540] device sit0 entered promiscuous mode [ 88.914837][ T2562] device xfrm0 entered promiscuous mode [ 89.399989][ T2572] device sit0 left promiscuous mode [ 89.462663][ T2569] device sit0 entered promiscuous mode [ 90.539281][ T2604] device sit0 left promiscuous mode [ 90.609785][ T2605] device sit0 entered promiscuous mode [ 90.685389][ T2607] device sit0 left promiscuous mode [ 90.723659][ T2610] device sit0 entered promiscuous mode [ 90.944747][ T2621] device sit0 left promiscuous mode [ 90.975642][ T2621] device sit0 entered promiscuous mode [ 92.034716][ T2626] device sit0 left promiscuous mode [ 92.146668][ T2626] device sit0 entered promiscuous mode [ 92.513100][ T2654] device sit0 left promiscuous mode [ 92.625569][ T2659] device sit0 entered promiscuous mode [ 94.684429][ T2726] device sit0 left promiscuous mode [ 94.764791][ T2731] device sit0 entered promiscuous mode [ 94.956810][ T2736] device sit0 left promiscuous mode [ 95.046569][ T2740] device sit0 entered promiscuous mode [ 95.706382][ T2769] device sit0 left promiscuous mode [ 95.778344][ T2774] device sit0 entered promiscuous mode [ 97.124439][ T2802] device sit0 left promiscuous mode [ 97.491366][ T2823] device sit0 entered promiscuous mode [ 97.707694][ T2824] device sit0 left promiscuous mode [ 97.728088][ T2825] device sit0 entered promiscuous mode [ 97.927326][ T2835] device sit0 left promiscuous mode [ 98.023086][ T2835] device sit0 entered promiscuous mode [ 98.452181][ T2855] device sit0 left promiscuous mode [ 98.471895][ T2855] device sit0 entered promiscuous mode [ 98.607380][ T2858] device sit0 left promiscuous mode [ 98.705735][ T2863] device sit0 left promiscuous mode [ 98.737909][ T2866] device sit0 entered promiscuous mode [ 98.881178][ T2870] device sit0 left promiscuous mode [ 98.931668][ T2873] device sit0 entered promiscuous mode [ 100.045795][ T2909] device sit0 entered promiscuous mode [ 100.487321][ T2935] device sit0 left promiscuous mode [ 100.516169][ T2935] device sit0 entered promiscuous mode [ 101.724474][ T2966] device sit0 left promiscuous mode [ 101.772868][ T2966] device sit0 entered promiscuous mode [ 101.984578][ T2971] device sit0 left promiscuous mode [ 101.999015][ T2976] device sit0 entered promiscuous mode [ 102.172733][ T3000] device sit0 left promiscuous mode [ 102.201657][ T3000] device sit0 entered promiscuous mode [ 103.575492][ T3022] device sit0 left promiscuous mode [ 103.661467][ T3022] device sit0 entered promiscuous mode [ 103.858799][ T3038] device sit0 left promiscuous mode [ 103.880793][ T3042] device sit0 entered promiscuous mode [ 104.124073][ T3049] device sit0 left promiscuous mode [ 104.167582][ T3054] device sit0 entered promiscuous mode [ 105.024964][ T3082] device sit0 left promiscuous mode [ 105.066628][ T3082] device sit0 entered promiscuous mode [ 105.185198][ T3087] device sit0 left promiscuous mode [ 105.234413][ T3092] device sit0 entered promiscuous mode [ 106.006872][ T3125] device sit0 left promiscuous mode [ 106.118457][ T3128] device sit0 entered promiscuous mode [ 106.888650][ T3146] device sit0 left promiscuous mode [ 106.921527][ T3147] device sit0 entered promiscuous mode [ 107.288076][ T3165] device sit0 left promiscuous mode [ 107.355062][ T3165] device sit0 entered promiscuous mode [ 107.460451][ T3172] device sit0 left promiscuous mode [ 107.505948][ T3172] device sit0 entered promiscuous mode [ 109.879204][ T3211] device sit0 left promiscuous mode [ 109.924925][ T3212] device sit0 entered promiscuous mode [ 110.137224][ T3222] device xfrm0 entered promiscuous mode [ 110.189873][ T3228] device sit0 left promiscuous mode [ 110.271235][ T3228] device sit0 entered promiscuous mode [ 110.747149][ T3252] device sit0 left promiscuous mode [ 110.818717][ T3255] device sit0 entered promiscuous mode [ 111.261501][ T3272] device sit0 left promiscuous mode [ 111.363361][ T3273] device sit0 entered promiscuous mode [ 111.607994][ T3275] device sit0 left promiscuous mode [ 111.642636][ T3280] device sit0 entered promiscuous mode [ 111.770050][ T3294] device sit0 left promiscuous mode [ 111.856023][ T3297] device sit0 entered promiscuous mode [ 112.822085][ T3332] device sit0 left promiscuous mode [ 112.860773][ T3335] device sit0 entered promiscuous mode [ 113.088563][ T3342] device sit0 left promiscuous mode [ 113.139923][ T3342] device sit0 entered promiscuous mode [ 113.363535][ T3356] device sit0 left promiscuous mode [ 113.427663][ T3356] device sit0 entered promiscuous mode [ 113.612635][ T3364] device sit0 left promiscuous mode [ 113.685187][ T3369] device sit0 entered promiscuous mode [ 113.955915][ T3385] device sit0 left promiscuous mode [ 114.011705][ T3388] device sit0 entered promiscuous mode [ 114.766621][ T3406] FAULT_INJECTION: forcing a failure. [ 114.766621][ T3406] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 114.786883][ T3406] CPU: 1 PID: 3406 Comm: syz.0.1086 Not tainted syzkaller #0 [ 114.794316][ T3406] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 114.804569][ T3406] Call Trace: [ 114.807872][ T3406] [ 114.810835][ T3406] __dump_stack+0x21/0x24 [ 114.815198][ T3406] dump_stack_lvl+0xee/0x150 [ 114.819823][ T3406] ? __cfi_dump_stack_lvl+0x8/0x8 [ 114.824882][ T3406] dump_stack+0x15/0x24 [ 114.829069][ T3406] should_fail_ex+0x3d4/0x520 [ 114.833783][ T3406] should_fail+0xb/0x10 [ 114.838017][ T3406] should_fail_usercopy+0x1a/0x20 [ 114.843081][ T3406] _copy_from_user+0x1e/0xc0 [ 114.847705][ T3406] __sys_bpf+0x277/0x780 [ 114.851985][ T3406] ? bpf_link_show_fdinfo+0x320/0x320 [ 114.857390][ T3406] ? __cfi_ksys_write+0x10/0x10 [ 114.862279][ T3406] ? debug_smp_processor_id+0x17/0x20 [ 114.867698][ T3406] __x64_sys_bpf+0x7c/0x90 [ 114.872160][ T3406] x64_sys_call+0x488/0x9a0 [ 114.876693][ T3406] do_syscall_64+0x4c/0xa0 [ 114.881150][ T3406] ? clear_bhb_loop+0x30/0x80 [ 114.885847][ T3406] ? clear_bhb_loop+0x30/0x80 [ 114.890548][ T3406] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 114.896458][ T3406] RIP: 0033:0x7fcde218ebe9 [ 114.900895][ T3406] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 114.920518][ T3406] RSP: 002b:00007fcde0bf7038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 114.928954][ T3406] RAX: ffffffffffffffda RBX: 00007fcde23b5fa0 RCX: 00007fcde218ebe9 [ 114.936954][ T3406] RDX: 0000000000000090 RSI: 00002000000000c0 RDI: 0000000000000005 [ 114.944951][ T3406] RBP: 00007fcde0bf7090 R08: 0000000000000000 R09: 0000000000000000 [ 114.952945][ T3406] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 114.960950][ T3406] R13: 00007fcde23b6038 R14: 00007fcde23b5fa0 R15: 00007ffcf75bf0b8 [ 114.968961][ T3406] [ 114.985277][ T3410] device sit0 left promiscuous mode [ 115.096892][ T3415] device sit0 left promiscuous mode [ 115.158137][ T3420] device sit0 left promiscuous mode [ 115.183675][ T3414] device sit0 entered promiscuous mode [ 115.346743][ T3420] device sit0 entered promiscuous mode [ 116.263473][ T3459] device sit0 left promiscuous mode [ 116.324188][ T3459] device sit0 entered promiscuous mode [ 117.658879][ T3529] device sit0 left promiscuous mode [ 117.737605][ T3529] device sit0 entered promiscuous mode [ 118.333475][ T3563] device sit0 left promiscuous mode [ 118.441294][ T3566] device sit0 entered promiscuous mode [ 118.705342][ T3569] device sit0 left promiscuous mode [ 118.744211][ T3576] device sit0 entered promiscuous mode [ 119.198691][ T28] audit: type=1400 audit(1755797069.926:127): avc: denied { create } for pid=3601 comm="syz.1.1166" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 119.223045][ T3602] FAULT_INJECTION: forcing a failure. [ 119.223045][ T3602] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 119.274860][ T3602] CPU: 0 PID: 3602 Comm: syz.1.1166 Not tainted syzkaller #0 [ 119.282292][ T3602] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 119.292377][ T3602] Call Trace: [ 119.295694][ T3602] [ 119.298751][ T3602] __dump_stack+0x21/0x24 [ 119.303126][ T3602] dump_stack_lvl+0xee/0x150 [ 119.307843][ T3602] ? __cfi_dump_stack_lvl+0x8/0x8 [ 119.312918][ T3602] dump_stack+0x15/0x24 [ 119.317117][ T3602] should_fail_ex+0x3d4/0x520 [ 119.321923][ T3602] should_fail+0xb/0x10 [ 119.326115][ T3602] should_fail_usercopy+0x1a/0x20 [ 119.331174][ T3602] _copy_from_user+0x1e/0xc0 [ 119.335801][ T3602] sock_do_ioctl+0x186/0x310 [ 119.340420][ T3602] ? sock_show_fdinfo+0xb0/0xb0 [ 119.345298][ T3602] ? selinux_file_ioctl+0x377/0x480 [ 119.350531][ T3602] sock_ioctl+0x4d8/0x6e0 [ 119.354894][ T3602] ? __cfi_sock_ioctl+0x10/0x10 [ 119.359780][ T3602] ? asm_sysvec_apic_timer_interrupt+0x1b/0x20 [ 119.366139][ T3602] ? __cfi_sock_ioctl+0x10/0x10 [ 119.371027][ T3602] ? __se_sys_ioctl+0x114/0x1b0 [ 119.375923][ T3602] ? __cfi_sock_ioctl+0x10/0x10 [ 119.380803][ T3602] __se_sys_ioctl+0x12f/0x1b0 [ 119.385512][ T3602] __x64_sys_ioctl+0x7b/0x90 [ 119.390137][ T3602] x64_sys_call+0x58b/0x9a0 [ 119.394668][ T3602] do_syscall_64+0x4c/0xa0 [ 119.399131][ T3602] ? clear_bhb_loop+0x30/0x80 [ 119.403829][ T3602] ? clear_bhb_loop+0x30/0x80 [ 119.408524][ T3602] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 119.414445][ T3602] RIP: 0033:0x7f51e358ebe9 [ 119.418893][ T3602] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 119.438543][ T3602] RSP: 002b:00007f51e43d2038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 119.446992][ T3602] RAX: ffffffffffffffda RBX: 00007f51e37b5fa0 RCX: 00007f51e358ebe9 [ 119.454983][ T3602] RDX: 0000200000000080 RSI: 0000000000008914 RDI: 0000000000000008 [ 119.462968][ T3602] RBP: 00007f51e43d2090 R08: 0000000000000000 R09: 0000000000000000 [ 119.470951][ T3602] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 119.478936][ T3602] R13: 00007f51e37b6038 R14: 00007f51e37b5fa0 R15: 00007ffc75dd5d38 [ 119.486931][ T3602] [ 124.547829][ T3678] FAULT_INJECTION: forcing a failure. [ 124.547829][ T3678] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 124.605371][ T3678] CPU: 0 PID: 3678 Comm: syz.0.1197 Not tainted syzkaller #0 [ 124.612898][ T3678] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 124.622985][ T3678] Call Trace: [ 124.626288][ T3678] [ 124.629245][ T3678] __dump_stack+0x21/0x24 [ 124.633607][ T3678] dump_stack_lvl+0xee/0x150 [ 124.638227][ T3678] ? __cfi_dump_stack_lvl+0x8/0x8 [ 124.643283][ T3678] dump_stack+0x15/0x24 [ 124.647479][ T3678] should_fail_ex+0x3d4/0x520 [ 124.652183][ T3678] should_fail+0xb/0x10 [ 124.656366][ T3678] should_fail_usercopy+0x1a/0x20 [ 124.661428][ T3678] _copy_from_user+0x1e/0xc0 [ 124.666067][ T3678] __sys_bpf+0x277/0x780 [ 124.670336][ T3678] ? bpf_link_show_fdinfo+0x320/0x320 [ 124.675756][ T3678] ? __cfi_ksys_write+0x10/0x10 [ 124.680820][ T3678] ? debug_smp_processor_id+0x17/0x20 [ 124.686234][ T3678] __x64_sys_bpf+0x7c/0x90 [ 124.690705][ T3678] x64_sys_call+0x488/0x9a0 [ 124.695246][ T3678] do_syscall_64+0x4c/0xa0 [ 124.699698][ T3678] ? clear_bhb_loop+0x30/0x80 [ 124.704420][ T3678] ? clear_bhb_loop+0x30/0x80 [ 124.709132][ T3678] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 124.715057][ T3678] RIP: 0033:0x7fcde218ebe9 [ 124.719500][ T3678] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 124.739135][ T3678] RSP: 002b:00007fcde0bf7038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 124.747585][ T3678] RAX: ffffffffffffffda RBX: 00007fcde23b5fa0 RCX: 00007fcde218ebe9 [ 124.755637][ T3678] RDX: 0000000000000050 RSI: 0000200000000640 RDI: 0000000000000000 [ 124.763636][ T3678] RBP: 00007fcde0bf7090 R08: 0000000000000000 R09: 0000000000000000 [ 124.771724][ T3678] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 124.779740][ T3678] R13: 00007fcde23b6038 R14: 00007fcde23b5fa0 R15: 00007ffcf75bf0b8 [ 124.787760][ T3678] [ 125.246857][ T3705] device sit0 entered promiscuous mode [ 125.852681][ T3716] FAULT_INJECTION: forcing a failure. [ 125.852681][ T3716] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 125.945698][ T3716] CPU: 0 PID: 3716 Comm: syz.1.1214 Not tainted syzkaller #0 [ 125.953129][ T3716] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 125.963215][ T3716] Call Trace: [ 125.966516][ T3716] [ 125.969467][ T3716] __dump_stack+0x21/0x24 [ 125.974008][ T3716] dump_stack_lvl+0xee/0x150 [ 125.978637][ T3716] ? __cfi_dump_stack_lvl+0x8/0x8 [ 125.983700][ T3716] dump_stack+0x15/0x24 [ 125.987886][ T3716] should_fail_ex+0x3d4/0x520 [ 125.992591][ T3716] should_fail+0xb/0x10 [ 125.996783][ T3716] should_fail_usercopy+0x1a/0x20 [ 126.002100][ T3716] _copy_from_user+0x1e/0xc0 [ 126.006715][ T3716] __sys_bpf+0x277/0x780 [ 126.011029][ T3716] ? bpf_link_show_fdinfo+0x320/0x320 [ 126.016442][ T3716] ? __cfi_ksys_write+0x10/0x10 [ 126.021341][ T3716] ? debug_smp_processor_id+0x17/0x20 [ 126.026751][ T3716] __x64_sys_bpf+0x7c/0x90 [ 126.031201][ T3716] x64_sys_call+0x488/0x9a0 [ 126.035753][ T3716] do_syscall_64+0x4c/0xa0 [ 126.040226][ T3716] ? clear_bhb_loop+0x30/0x80 [ 126.045020][ T3716] ? clear_bhb_loop+0x30/0x80 [ 126.049730][ T3716] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 126.055654][ T3716] RIP: 0033:0x7f51e358ebe9 [ 126.060190][ T3716] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 126.079819][ T3716] RSP: 002b:00007f51e43d2038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 126.088246][ T3716] RAX: ffffffffffffffda RBX: 00007f51e37b5fa0 RCX: 00007f51e358ebe9 [ 126.096224][ T3716] RDX: 0000000000000038 RSI: 0000200000000200 RDI: 000000000000001a [ 126.104201][ T3716] RBP: 00007f51e43d2090 R08: 0000000000000000 R09: 0000000000000000 [ 126.112176][ T3716] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 126.120146][ T3716] R13: 00007f51e37b6038 R14: 00007f51e37b5fa0 R15: 00007ffc75dd5d38 [ 126.128136][ T3716] [ 131.692956][ T3827] device sit0 left promiscuous mode [ 131.818158][ T3828] device sit0 entered promiscuous mode [ 133.632102][ T3848] device sit0 left promiscuous mode [ 133.667939][ T3852] FAULT_INJECTION: forcing a failure. [ 133.667939][ T3852] name failslab, interval 1, probability 0, space 0, times 0 [ 133.691605][ T3848] device sit0 entered promiscuous mode [ 133.760896][ T3852] CPU: 1 PID: 3852 Comm: syz.0.1270 Not tainted syzkaller #0 [ 133.768414][ T3852] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 133.778772][ T3852] Call Trace: [ 133.782094][ T3852] [ 133.785047][ T3852] __dump_stack+0x21/0x24 [ 133.789415][ T3852] dump_stack_lvl+0xee/0x150 [ 133.794015][ T3852] ? __cfi_dump_stack_lvl+0x8/0x8 [ 133.799075][ T3852] dump_stack+0x15/0x24 [ 133.803358][ T3852] should_fail_ex+0x3d4/0x520 [ 133.808173][ T3852] __should_failslab+0xac/0xf0 [ 133.812970][ T3852] ? tracepoint_probe_unregister+0x1e6/0x8b0 [ 133.818988][ T3852] should_failslab+0x9/0x20 [ 133.823534][ T3852] __kmem_cache_alloc_node+0x3d/0x2c0 [ 133.828942][ T3852] ? __cfi_mutex_lock+0x10/0x10 [ 133.833816][ T3852] ? delete_node+0x2f4/0xa60 [ 133.838435][ T3852] ? tracepoint_probe_unregister+0x1e6/0x8b0 [ 133.844448][ T3852] __kmalloc+0xa1/0x1e0 [ 133.848646][ T3852] ? __cfi___bpf_trace_mmap_lock_acquire_returned+0x10/0x10 [ 133.856004][ T3852] tracepoint_probe_unregister+0x1e6/0x8b0 [ 133.861859][ T3852] bpf_probe_unregister+0x61/0x70 [ 133.866928][ T3852] bpf_raw_tp_link_release+0x63/0x90 [ 133.872330][ T3852] bpf_link_free+0x13a/0x390 [ 133.876957][ T3852] ? bpf_link_put_deferred+0x20/0x20 [ 133.882285][ T3852] bpf_link_release+0x15f/0x170 [ 133.887157][ T3852] ? __cfi_bpf_link_release+0x10/0x10 [ 133.892556][ T3852] __fput+0x1fc/0x8f0 [ 133.896580][ T3852] ____fput+0x15/0x20 [ 133.900589][ T3852] task_work_run+0x1db/0x240 [ 133.905220][ T3852] ? __cfi_task_work_run+0x10/0x10 [ 133.910374][ T3852] ? filp_close+0x111/0x160 [ 133.914999][ T3852] exit_to_user_mode_loop+0x9b/0xb0 [ 133.920228][ T3852] exit_to_user_mode_prepare+0x5a/0xa0 [ 133.925804][ T3852] syscall_exit_to_user_mode+0x1a/0x30 [ 133.931291][ T3852] do_syscall_64+0x58/0xa0 [ 133.935744][ T3852] ? clear_bhb_loop+0x30/0x80 [ 133.940454][ T3852] ? clear_bhb_loop+0x30/0x80 [ 133.945350][ T3852] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 133.951268][ T3852] RIP: 0033:0x7fcde218ebe9 [ 133.955799][ T3852] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 133.975688][ T3852] RSP: 002b:00007fcde0bf7038 EFLAGS: 00000246 ORIG_RAX: 0000000000000003 [ 133.984144][ T3852] RAX: 0000000000000000 RBX: 00007fcde23b5fa0 RCX: 00007fcde218ebe9 [ 133.992146][ T3852] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000004 [ 134.000242][ T3852] RBP: 00007fcde0bf7090 R08: 0000000000000000 R09: 0000000000000000 [ 134.008243][ T3852] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 134.016237][ T3852] R13: 00007fcde23b6038 R14: 00007fcde23b5fa0 R15: 00007ffcf75bf0b8 [ 134.024299][ T3852] [ 134.056098][ T3850] CFI failure at __traceiter_mmap_lock_acquire_returned+0x9a/0xf0 (target: tp_stub_func+0x0/0x10; expected type: 0xd59bbc2f) [ 134.056089][ T3849] CFI failure at __traceiter_mmap_lock_acquire_returned+0x9a/0xf0 (target: tp_stub_func+0x0/0x10; expected type: 0xd59bbc2f) [ 134.069236][ T3850] invalid opcode: 0000 [#1] PREEMPT SMP KASAN [ 134.088319][ T3850] CPU: 1 PID: 3850 Comm: syz.2.1271 Not tainted syzkaller #0 [ 134.095688][ T3850] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 134.105735][ T3850] RIP: 0010:__traceiter_mmap_lock_acquire_returned+0x9a/0xf0 [ 134.113116][ T3850] Code: 42 80 3c 30 00 74 05 e8 b4 26 0c 00 48 8b 7b 08 48 8b 75 c8 48 8b 55 c0 8b 4d d4 45 89 e0 41 ba d1 43 64 2a 45 03 57 fc 74 02 <0f> 0b 41 ff d7 49 83 c5 18 4c 89 e8 48 c1 e8 03 42 80 3c 30 00 74 [ 134.132732][ T3850] RSP: 0018:ffffc9000182f7d0 EFLAGS: 00010286 [ 134.138824][ T3850] RAX: 1ffff11026966b86 RBX: ffff888134b35c28 RCX: 0000000000000000 [ 134.146796][ T3850] RDX: ffffc9000182f840 RSI: ffff88810f7b6d00 RDI: ffffc90001835000 [ 134.154819][ T3850] RBP: ffffc9000182f810 R08: 0000000000000001 R09: fffffbfff0ee498e [ 134.162794][ T3850] R10: 00000000cfa4aadd R11: 1ffffffff0ee498d R12: 0000000000000001 [ 134.170763][ T3850] R13: ffff888134b35c28 R14: dffffc0000000000 R15: ffffffff817123b0 [ 134.178738][ T3850] FS: 0000000000000000(0000) GS:ffff8881f7100000(0000) knlGS:0000000000000000 [ 134.187664][ T3850] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 134.194276][ T3850] CR2: 00002000000b0000 CR3: 0000000134ad3000 CR4: 00000000003506a0 [ 134.202247][ T3850] DR0: 0000000000000002 DR1: 0000200000000300 DR2: 0000000000000000 [ 134.210211][ T3850] DR3: 0000000000000000 DR6: 00000000ffff0ff0 DR7: 0000000000000600 [ 134.218265][ T3850] Call Trace: [ 134.221546][ T3850] [ 134.224477][ T3850] __mmap_lock_do_trace_acquire_returned+0x17d/0x1d0 [ 134.231167][ T3850] ? __cfi___mmap_lock_do_trace_acquire_returned+0x10/0x10 [ 134.238383][ T3850] ? do_futex+0x2b9/0x420 [ 134.242722][ T3850] ? __cfi_down_read+0x10/0x10 [ 134.247481][ T3850] ? futex_exit_release+0x119/0x1d0 [ 134.252693][ T3850] do_exit+0x2377/0x2650 [ 134.256938][ T3850] ? __cfi_do_exit+0x10/0x10 [ 134.261524][ T3850] ? plist_del+0x3df/0x3f0 [ 134.265931][ T3850] ? _raw_spin_unlock+0x4c/0x70 [ 134.270782][ T3850] ? futex_unqueue+0x126/0x160 [ 134.275545][ T3850] ? __kasan_check_write+0x14/0x20 [ 134.280662][ T3850] ? _raw_spin_lock_irq+0x8f/0xe0 [ 134.285690][ T3850] ? __cfi__raw_spin_lock_irq+0x10/0x10 [ 134.291233][ T3850] do_group_exit+0x210/0x2d0 [ 134.295832][ T3850] ? __kasan_check_write+0x14/0x20 [ 134.300946][ T3850] get_signal+0x13b5/0x1520 [ 134.305455][ T3850] arch_do_signal_or_restart+0xb0/0x1030 [ 134.311086][ T3850] ? do_futex+0x2dc/0x420 [ 134.315414][ T3850] ? irqentry_exit+0x37/0x40 [ 134.319999][ T3850] ? sysvec_apic_timer_interrupt+0x64/0xc0 [ 134.325800][ T3850] ? __cfi_do_futex+0x10/0x10 [ 134.330483][ T3850] ? __cfi_arch_do_signal_or_restart+0x10/0x10 [ 134.336652][ T3850] ? __se_sys_futex+0x273/0x2e0 [ 134.341517][ T3850] ? __kasan_check_write+0x14/0x20 [ 134.346629][ T3850] exit_to_user_mode_loop+0x7a/0xb0 [ 134.351825][ T3850] exit_to_user_mode_prepare+0x5a/0xa0 [ 134.357279][ T3850] syscall_exit_to_user_mode+0x1a/0x30 [ 134.362740][ T3850] do_syscall_64+0x58/0xa0 [ 134.367153][ T3850] ? clear_bhb_loop+0x30/0x80 [ 134.371820][ T3850] ? clear_bhb_loop+0x30/0x80 [ 134.376496][ T3850] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 134.382381][ T3850] RIP: 0033:0x7f281018ebe9 [ 134.386816][ T3850] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 134.406423][ T3850] RSP: 002b:00007f2810f150e8 EFLAGS: 00000246 ORIG_RAX: 00000000000000ca [ 134.414883][ T3850] RAX: fffffffffffffe00 RBX: 00007f28103b5fa8 RCX: 00007f281018ebe9 [ 134.422851][ T3850] RDX: 0000000000000000 RSI: 0000000000000080 RDI: 00007f28103b5fa8 [ 134.430833][ T3850] RBP: 00007f28103b5fa0 R08: 0000000000000000 R09: 0000000000000000 [ 134.438829][ T3850] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 134.446814][ T3850] R13: 00007f28103b6038 R14: 00007ffc3fd0c0d0 R15: 00007ffc3fd0c1b8 [ 134.454812][ T3850] [ 134.457838][ T3850] Modules linked in: [ 134.461788][ T3849] invalid opcode: 0000 [#2] PREEMPT SMP KASAN [ 134.461929][ T3850] ---[ end trace 0000000000000000 ]--- [ 134.467885][ T3849] CPU: 0 PID: 3849 Comm: syz.2.1271 Tainted: G D syzkaller #0 [ 134.467911][ T3849] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 134.467922][ T3849] RIP: 0010:__traceiter_mmap_lock_acquire_returned+0x9a/0xf0 [ 134.467953][ T3849] Code: 42 80 3c 30 00 74 05 e8 b4 26 0c 00 48 8b 7b 08 48 8b 75 c8 48 8b 55 c0 8b 4d d4 45 89 e0 41 ba d1 43 64 2a 45 03 57 fc 74 02 <0f> 0b 41 ff d7 49 83 c5 18 4c 89 e8 48 c1 e8 03 42 80 3c 30 00 74 [ 134.467970][ T3849] RSP: 0018:ffffc9000181fb30 EFLAGS: 00010286 [ 134.467988][ T3849] RAX: 1ffff11026966b86 RBX: ffff888134b35c28 RCX: 0000000000000000 [ 134.468002][ T3849] RDX: ffffc9000181fba0 RSI: ffff88810f7b6d00 RDI: ffffc90001835000 [ 134.468017][ T3849] RBP: ffffc9000181fb70 R08: 0000000000000001 R09: fffffbfff0ee498e [ 134.468032][ T3849] R10: 00000000cfa4aadd R11: 1ffffffff0ee498d R12: 0000000000000001 [ 134.468047][ T3849] R13: ffff888134b35c28 R14: dffffc0000000000 R15: ffffffff817123b0 [ 134.468061][ T3849] FS: 0000000000000000(0000) GS:ffff8881f7000000(0000) knlGS:0000000000000000 [ 134.468078][ T3849] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 134.468099][ T3849] CR2: 0000200000318000 CR3: 0000000134ad3000 CR4: 00000000003506b0 [ 134.468117][ T3849] DR0: 0000000000000002 DR1: 0000000000000000 DR2: 0000000000000000 [ 134.468130][ T3849] DR3: 0000000000000000 DR6: 00000000ffff0ff0 DR7: 0000000000000600 [ 134.468143][ T3849] Call Trace: [ 134.468149][ T3849] [ 134.468160][ T3849] __mmap_lock_do_trace_acquire_returned+0x17d/0x1d0 [ 134.468187][ T3849] ? __cfi___mmap_lock_do_trace_acquire_returned+0x10/0x10 [ 134.473713][ T3850] RIP: 0010:__traceiter_mmap_lock_acquire_returned+0x9a/0xf0 [ 134.482487][ T3849] ? do_futex+0x2b9/0x420 [ 134.492573][ T3850] Code: 42 80 3c 30 00 74 05 e8 b4 26 0c 00 48 8b 7b 08 48 8b 75 c8 48 8b 55 c0 8b 4d d4 45 89 e0 41 ba d1 43 64 2a 45 03 57 fc 74 02 <0f> 0b 41 ff d7 49 83 c5 18 4c 89 e8 48 c1 e8 03 42 80 3c 30 00 74 [ 134.499925][ T3849] ? __cfi_down_read+0x10/0x10 [ 134.519661][ T3850] RSP: 0018:ffffc9000182f7d0 EFLAGS: 00010286 [ 134.525596][ T3849] ? futex_exit_release+0x119/0x1d0 [ 134.533634][ T3850] [ 134.541673][ T3849] do_exit+0x2377/0x2650 [ 134.549666][ T3850] RAX: 1ffff11026966b86 RBX: ffff888134b35c28 RCX: 0000000000000000 [ 134.557617][ T3849] ? __cfi_do_exit+0x10/0x10 [ 134.565647][ T3850] RDX: ffffc9000182f840 RSI: ffff88810f7b6d00 RDI: ffffc90001835000 [ 134.574531][ T3849] ? _raw_spin_unlock_irqrestore+0x5a/0x80 [ 134.581126][ T3850] RBP: ffffc9000182f810 R08: 0000000000000001 R09: fffffbfff0ee498e [ 134.589092][ T3849] ? try_to_wake_up+0x613/0x1220 [ 134.597088][ T3850] R10: 00000000cfa4aadd R11: 1ffffffff0ee498d R12: 0000000000000001 [ 134.605045][ T3849] ? wake_up_state+0xb/0x10 [ 134.608336][ T3850] R13: ffff888134b35c28 R14: dffffc0000000000 R15: ffffffff817123b0 [ 134.611267][ T3849] ? zap_other_threads+0x2b7/0x2f0 [ 134.618184][ T3850] FS: 0000000000000000(0000) GS:ffff8881f7100000(0000) knlGS:0000000000000000 [ 134.625207][ T3849] do_group_exit+0x210/0x2d0 [ 134.632580][ T3850] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 134.636917][ T3849] __x64_sys_exit_group+0x3f/0x40 [ 134.656549][ T3850] CR2: 00002000000b0000 CR3: 0000000134ad3000 CR4: 00000000003506a0 [ 134.661381][ T3849] x64_sys_call+0x7b4/0x9a0 [ 134.667492][ T3850] DR0: 0000000000000002 DR1: 0000200000000300 DR2: 0000000000000000 [ 134.672657][ T3849] do_syscall_64+0x4c/0xa0 [ 134.675032][ T3850] DR3: 0000000000000000 DR6: 00000000ffff0ff0 DR7: 0000000000000600 [ 134.679223][ T3849] ? clear_bhb_loop+0x30/0x80 [ 134.687218][ T3850] Kernel panic - not syncing: Fatal exception [ 134.691777][ T3849] ? clear_bhb_loop+0x30/0x80 [ 134.691800][ T3849] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 134.691820][ T3849] RIP: 0033:0x7f281018ebe9 [ 134.691835][ T3849] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 134.691851][ T3849] RSP: 002b:00007ffc3fd0c518 EFLAGS: 00000246 ORIG_RAX: 00000000000000e7 [ 134.691871][ T3849] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f281018ebe9 [ 134.691884][ T3849] RDX: 0000000000000064 RSI: 0000000000000000 RDI: 0000000000000000 [ 134.691895][ T3849] RBP: 00007ffc3fd0c57c R08: 000000193fd0c60f R09: 00000000000927c0 [ 134.691909][ T3849] R10: 0000000000000001 R11: 0000000000000246 R12: 00000000000000ef [ 134.691920][ T3849] R13: 00000000000927c0 R14: 00000000000209a7 R15: 00007ffc3fd0c5d0 [ 134.691938][ T3849] [ 134.691944][ T3849] Modules linked in: [ 134.700132][ T3850] Kernel Offset: disabled [ 134.907139][ T3850] Rebooting in 86400 seconds..