last executing test programs: 4.662183678s ago: executing program 2 (id=5555): bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="1800000000000000000000000000000a850000000e000000850000000700000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="1600000000000000", @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000058"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f00000003c0)={0xffffffffffffffff, 0x20, &(0x7f0000000380)={&(0x7f0000000240)=""/197, 0xc5, 0x0, &(0x7f0000000340)}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r2, r1, 0x0, 0x0, 0x0, 0x0, 0x1, @void, @value}, 0x94) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x11, 0x8, &(0x7f0000003900)=ANY=[@ANYBLOB="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"], &(0x7f0000000380)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x2e) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000540)='rcu_utilization\x00', r3}, 0x10) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) r4 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000100)=ANY=[@ANYBLOB="180000000900000000000000213f0000c50000000e800000850000000e00000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) r5 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='mmap_lock_acquire_returned\x00', r4}, 0x10) r6 = bpf$ITER_CREATE(0xb, &(0x7f0000000100)={r5}, 0x8) write$cgroup_int(r6, &(0x7f00000001c0), 0xfffffdef) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x8, 0x4, &(0x7f0000000040)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x61, 0x11, 0x8d}, [@ldst={0x6, 0x2}], {0x95, 0x0, 0x74}}, &(0x7f0000003ff6)='GPL\x00', 0x2, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @cgroup_skb, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x48) 4.268778644s ago: executing program 0 (id=5558): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x12, 0x2000000000000210, &(0x7f0000000440)=ANY=[@ANYRESDEC, @ANYRES32, @ANYBLOB="0000000000000000b7080000080000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000086"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000001080)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r1}, 0x10) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000440)=ANY=[@ANYBLOB="9feb01001800000000000000380000003800000003000000000000000000000300000000020000000200000000fcff0000002100000000010500000010000000010000000000000e01000000000000000061"], 0x0, 0x53, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x20) 4.175358525s ago: executing program 0 (id=5559): bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x6, 0xc, &(0x7f0000000140)=ANY=[@ANYBLOB="18020000040000000000000000000000850000002c000000180100002020732500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000001700000095"], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @xdp, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) syz_open_procfs$namespace(0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000070000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000a5df850000002d00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x8, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000180)='sched_switch\x00', r0}, 0x18) socketpair(0x1, 0x5, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8941, &(0x7f0000000080)) socketpair(0x1, 0x5, 0x0, &(0x7f0000000740)={0xffffffffffffffff}) setsockopt$sock_attach_bpf(r2, 0x10f, 0x87, 0x0, 0x8) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000500)={&(0x7f0000000340)=ANY=[], &(0x7f0000000380)=""/187, 0x32, 0xbb, 0x1, 0x0, 0x0, @void, @value}, 0x28) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz1\x00', 0x1ff) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000002000000b7030000faffffff850000002d00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r3}, 0x10) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000002c0)=@base={0x6, 0x4, 0x8, 0x8, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000680)=ANY=[@ANYBLOB="1a000055a08a8e47f24afe0002000000aa381515f7421ad64ed8702329451ed95c2cbc4ee98cadbede91aff0187a9ca3d454d59f66008aa7b0b645634fc36eaada51fab839d11b3b3336d1f406", @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000030000009500000000000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000040)='mm_page_alloc\x00', r5}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002ac0)={0x1a, 0x3, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x19, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x2008, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) 4.098830886s ago: executing program 0 (id=5560): bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x6, 0xc, &(0x7f0000000140)=ANY=[@ANYBLOB="18020000040000000000000000000000850000002c000000180100002020732500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000001700000095"], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @xdp, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) syz_open_procfs$namespace(0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000070000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000a5df850000002d00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x8, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000180)='sched_switch\x00', r0}, 0x18) socketpair(0x1, 0x5, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8941, &(0x7f0000000080)) socketpair(0x1, 0x5, 0x0, &(0x7f0000000740)={0xffffffffffffffff}) setsockopt$sock_attach_bpf(r2, 0x10f, 0x87, 0x0, 0x8) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000500)={&(0x7f0000000340)=ANY=[], &(0x7f0000000380)=""/187, 0x32, 0xbb, 0x1, 0x0, 0x0, @void, @value}, 0x28) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz1\x00', 0x1ff) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000002000000b7030000faffffff850000002d00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r3}, 0x10) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000002c0)=@base={0x6, 0x4, 0x8, 0x8, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000680)=ANY=[@ANYBLOB="1a000055a08a8e47f24afe0002000000aa381515f7421ad64ed8702329451ed95c2cbc4ee98cadbede91aff0187a9ca3d454d59f66008aa7b0b645634fc36eaada51fab839d11b3b3336d1f406", @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000030000009500000000000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000040)='mm_page_alloc\x00', r5}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002ac0)={0x1a, 0x3, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x19, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x2008, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) 3.937378179s ago: executing program 0 (id=5563): bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x2000, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) (async) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[], 0x48) (async) perf_event_open(&(0x7f0000000800)={0x2, 0x80, 0xcb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfff, 0xecc}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="16000000000000000400000001"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) (async, rerun: 64) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x6, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @xdp, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) (async, rerun: 64) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x48) (async, rerun: 32) bpf$PROG_LOAD(0x5, 0x0, 0x0) (async, rerun: 32) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x9, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="160000000000000004000000ff0017"], 0x48) bpf$PROG_LOAD(0x5, 0x0, 0x0) (async, rerun: 64) bpf$PROG_LOAD(0x5, 0x0, 0x0) (async, rerun: 64) r2 = openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000002000000b7030000faffffff850000002d00000095"], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0xffffffffffffff3b) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0xc, 0xb, &(0x7f0000000180)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x4, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r3}, 0x10) (async) openat$cgroup_procs(r2, 0x0, 0x2, 0x0) (async, rerun: 64) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000340)={r1, 0x2000002, 0xe, 0xf00, &(0x7f0000000200)="df33c9f7b9a60000000000000000", 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x50) (async, rerun: 64) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x5, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) (async) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x10020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000001000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r4, &(0x7f0000001580)={0x0, 0x0, &(0x7f0000000300), 0x0, &(0x7f0000001480)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @private, @multicast1}}}], 0x20}, 0x0) (async) recvmsg$unix(r5, &(0x7f0000001140)={0x0, 0x2, &(0x7f0000001040)=[{&(0x7f00000015c0)=""/4096, 0x7ffff000}], 0x1}, 0x40000100) (async, rerun: 32) socketpair(0x1, 0x1, 0x0, 0x0) (async, rerun: 32) r6 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000000), 0x4) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000480)={r6, 0x20, &(0x7f0000000440)={&(0x7f0000000380)=""/159, 0x9f, 0x0, &(0x7f0000000040)=""/14, 0xe}}, 0x10) 3.839493651s ago: executing program 0 (id=5565): bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000140)={0x9, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000700000000000000000711224000000000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0xd, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) 3.820958871s ago: executing program 0 (id=5566): socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000100)) openat$tun(0xffffffffffffff9c, 0x0, 0x701a00, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x100002, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000440)=@base={0x1, 0x42, 0x6, 0x8, 0x0, 0x1, 0x9, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)=@base={0xc, 0x4, 0x4, 0x8001, 0x0, r0, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) bpf$MAP_LOOKUP_BATCH(0x18, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x8000, r1}, 0x38) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x11, 0xb, &(0x7f0000000640)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000004000000b703000000000000850000007200000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000040)='sched_switch\x00', r2}, 0x10) r3 = perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xb, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) r4 = perf_event_open(&(0x7f0000000340)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x20004, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0xfffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x644bcedf7f2f200f) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r4, 0x2405, r3) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = bpf$MAP_CREATE_CONST_STR(0x0, 0x0, 0x48) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000004c0)={0xffffffffffffffff}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)) recvmsg$unix(r6, 0x0, 0x3) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz1\x00', 0x1ff) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x11, 0x8, &(0x7f0000003900)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f0000000e00)={0x2, 0x80, 0xf1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1a089, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, @perf_bp={0x0}, 0x2018, 0x0, 0x0, 0x8, 0x1000, 0x0, 0x7, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) ioctl$SIOCSIFHWADDR(r7, 0x89f6, &(0x7f0000000900)={'tunl0\x00', @random="0000230c1100"}) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000540)={@map=r5, 0x2b, 0x1, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000480), &(0x7f0000000500)=[0x0, 0x0, 0x0, 0x0]}, 0x40) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000001340)=ANY=[], 0x50) socketpair(0x1d, 0x2, 0x2, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'bridge0\x00', 0x20}) socketpair(0x1, 0x5, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r8, 0x89a2, 0x0) 3.554339625s ago: executing program 2 (id=5572): r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="1800000000000000000000000000000a850000000e000000850000000700000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000140)='mm_page_alloc\x00', r0}, 0x10) syz_clone(0x40000000, 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 18) 3.20731773s ago: executing program 2 (id=5575): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x19, 0x4, 0x8, 0x8, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0xfffffffd, 0x0, 0x0, @void, @value, @void, @value}, 0x50) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xb, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB, @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x4, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000300)={{r0}, &(0x7f0000000280), &(0x7f00000002c0)=r1}, 0x20) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00', r2}, 0x10) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000280)=@base={0xb, 0x8, 0xc, 0xffffbffb, 0x1, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe, 0x0, @perf_config_ext={0x9ae0067}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x1) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x8, 0x5, &(0x7f00000001c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x40000008, 0x76}, [@map_idx={0x18, 0xb}]}, &(0x7f0000000040)='syzkaller\x00', 0x4, 0x99, &(0x7f0000000380)=""/153, 0x0, 0x8, '\x00', 0x0, @cgroup_skb=0x1, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, r2, 0x0, 0x0, 0x0, 0x10, 0xe9, @void, @value}, 0x94) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000800)=ANY=[@ANYBLOB="0f00000004000000080000000100000000000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="00000000000000766c3a00000000fd610000000000000000000000000000006038786755c19e9853b2bdc4003210630b7e0e56dbe86fce4d8bfcc66fafef"], 0x50) close(r3) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r7 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000012c0)={0xe, 0xf, &(0x7f00000016c0)=@ringbuf={{}, {{0x18, 0x1, 0x1, 0x0, r6}}, {}, [], {{}, {}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000280)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) getpid() bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000240)=ANY=[@ANYRES32=r4, @ANYRES32=r7, @ANYBLOB="aa9fc85d1ace0b1a00000000", @ANYRES32, @ANYBLOB, @ANYRES64=0x0], 0x10) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000240)={{r4}, &(0x7f0000000100), &(0x7f0000000140)=r3}, 0x20) sendmsg(r5, &(0x7f00000029c0)={0x0, 0x0, &(0x7f0000001680)=[{&(0x7f0000001400)='H', 0x20001401}], 0x1}, 0x0) r8 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="02000000040000000800000001"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x0, 0x10, &(0x7f0000000580)=ANY=[@ANYRES32=r8, @ANYBLOB="0000000000000000b704000008000000850000007800000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r9 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x10, &(0x7f0000000580)=ANY=[], &(0x7f0000000600)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000280)='sched_switch\x00', r9}, 0x18) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x10020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000023c0)={0x11, 0x4, &(0x7f0000000480)=ANY=[], 0x0, 0x2, 0x22, 0x0, 0x0, 0x21, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000700)=ANY=[], 0x50) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) 2.308350784s ago: executing program 2 (id=5582): r0 = openat$tun(0xffffffffffffff9c, 0x0, 0x3ab000, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000700)={0x0, 0xffffffffffffffff, 0x0, 0x101}, 0x34) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x11, 0x8, &(0x7f0000003900)=ANY=[@ANYBLOB="620af8ff0c200021bfa100000000000007010000f8ffffffb702000003000000bd120000000000008500000006000000b70000000000000095000000000000003faf4f1e7f2aa3d9b18ed81c0c869b51ec6c0af4e0e4a9446c7670568982b4e020f698393aa0f3881f9c24aa56f15199fad0093c59d66b5ece9f36c70d0f13905ea23c22624c9f87f9793f50bb546040677b0c5077da80fb982c1e9400e693146cea484a415b76966118b64f751a0f241b07080008002d75593a286cecc93e64c227c95aa0b784625704f07a72c234664c0af9360a1f7a5e6b607130c89f18c0c1089d8b853289e01aa27ae8b09e00e79ab20b0b8e1148f49faf2ad0000000000000006fa03c6468972089b302d7bf6023cdcedb5e0125ebbc08dee510cb2364149215108333719acd97cfa107d40224edc5465a932b77e74e802a0d42bc6099ad2300000080006ef6c1ff0900000000000010c63a949e8b7955394ffa82b8e942c89112f4ab87b1bfeda7be586602d985430cea0162ab3fcf4591c926abfb0767192302000000b0eea24492a660583eecb42cbcd3de3a83209da17a0faf60fd6ad9b97aa5fa68480366c9c6fd6fa5043aa3926b81e3b59c95c25a573dc2edcaea2b1a52496dfcaf99431412fd134a996382a1a04d5bb924cfe5f3185418d605ffff9c4d2ec7c32f2095e63c80aff9fa740b5b7632f32030916f89c6dad7603f2ba2a790d62d6faec2fed44da4928b30142ba11de6c5d50b83bae613402216b5054d1e7c13b1355d6f4a8245ffa4997da9c77af4c0eb97fca585ec6bf5af51d564beb6d952aab9c70764b0a8a7583c90b3433b809bdb9fbd48bc873495cbff8a326eea31ae4e0f7505ebf6c9d13330ca005ace1a84521f14518c9b476fccbd6c712016219848624b87cec2dbe98223a0eb4fa39f6b5c02e6d6d90756ff57902a8f57000000009700cf0b4b8bc2294133000000000000000000030000000000000000000000000010008bc0d9559711e6e8861c46495ba585a4b2d02edc3e28dd271c896249ed85b980680b00002b435ac15fc0288d9b2a169cdcacc413038dafb7a2c8cb482bac0ac502d9ba96ffffff7f0000100000000000007d5ad897ef3b7cda42013d53046da21b40216e14ba2d6ad5656bfff17addaedab25b30002abbba7fa725f38400be7c1f001b2cd317902f19e385be9e48dccff729433282830689da6b53b263339863297771429d120000003341bf4abacac95900fca0493cf29b33dcc9ffffffffffffffd39fec2271ff01589646efd1cf870cd7bb2366fde41f94290c2a5ff870ce41fd3467decb05cfd9fcb32c8ed1dbd9d10a64c1083d5e71b5565b1768ee58969c41595229df17bcad70fb4021428ce970275d13b78100788f11f76161d46ea3abe0fa4d30dc94ef241875f3b4ce0232fcea69c271d7fa29822aea68a660e717a04becff0f719197724f4fce1093b62d7e8c7123d8ec571be54c72d978cf906df0042e36acd37d7f9e119f2c06f815312e0cfe222a06f56dd022c074eb8a322fb0bf47c0a8d154b405c37feaf3dd95f6ef2ae582786105c7df8be5877050c91301bb997316dbf17866fb84d4173731efe895ff2e1c5560926e90109b598502d3e959efc71f665c4d75cf2458e3546c1c776da64fb5abee0acfd235f2f4632c9062ece84c99a061887a20639b41c8c12ee86c50804042b3fb5aac518a75f9e7d7101d5e186c489b3a06fb99e0aa7f23a054de2f4d92d6bd72ee2c9fdc75aaaf1e3e483b4ad05573af40326993947d9a631bcbf3583784acbda216550d7aec6b79e30cbd128f54c2d3335457acf37331766e472391e358c3b377327ac9ecc34f24c9ae153ec60ac0694dc55bff9f5f45f90400000000000000d6b2c5ea1393fdf24285bf16b99c9cc0ad1857216f1a985f369191ae954febb3df464bfe0f7f3ee9afe7befb89d2777399f5874c553aeb3729cffe86e66964ae09bb6d163118e4cbe024fd4500f8ff0700000000cc9d8046c216c1f895778cb25122a2a9f9b444aeadea2a40da8daccf080842a486721737390cbf3a74cb2003016f1514216bdf57d2a40d40b51ab63e96ec8485b3b8a8c9ae3d14f93100c2e0893862eef552fcde2981f48c482bde8a168c3f5db2fea6f26e4a4304e50c349f4f9ecee27defc93871c5f99b355b72d538ba4958ea8e4aa37094191e10096e7e60fc3541a2c905a1a95e9571bf38ae1981c4238ecaee6f75cd0a6881bd1517a8250ddc8674152f94e3a409e2a3bce109b60000000000000000d6d5210d7503000000a87a27602b81f76386f1535bef1497f92186086e29c6bc5a1fad6ec9a31137abf9a404abde7750898b1bd627e873f8703be8672d70d1ab57075228a9f46ed9bd1f08fb8191bbab2dc51de3a61f0868afc4294859323e6c257a45319f18101288d139bd3da20fed05a8fe64680b0a3fc22dd70400000000946912d6c98cd1a9fbe1e7d58c08acaf30235b918a31d2eca55f74a23641f61f2d5b308cf0d031b0c7f0ced69993e9960ff5f76015e6009556237badf4e7965bbe2777e808fcba821aa8e8c5c39609ff854352cb4900000000000000000000000000c1fee30a3f7a85d1b29e58c77685efc0ceb1c8e5729c66418d169fc03aa188546b3ad2a182068e1e3a0e2505bc7f41019645466a53f1c96e0d4b3bc19faa5449209b083dbd334b47f067bbab40743b2a42010082008df75cf43f8ecc8d3726602111b40e761fd21081920382f14d12ca3c3431ee97471c7868dcda7eaa69eb7f7f80572fdd11bb1d0d1280fbc22bf73468788df51710d7d31c632fc5ed1762eb0b428ee751c47d8e894f745a868404a0bf35f0121008b722b1eaa6aedfa1bf2e7ccb2d61d5d76331945ecefa26b8471d42645288d7226bbd9ccd628ab84875f2c50ba891cea592b0430a537a395dc73bda367bf12cb7d81691a5fe8c47be395656a297e9df0e71f96756ea5cce7daac4be290159f6bcd75f0dda9de5532e71ae9e48b0ed0254a83100000000f6fbb869604d51a36a54c832e45b2569dc0d90b075225fde44c4e0973171ad47d6b0fdf9743af932cd6db49a47613808bad959710300000000000000832d0a45fa4242e24c7e800003c9e8095e02985f28e678f66422436f949e2ab8f162d7e3f855e378f4a1f40b0c6fb2d4b205a800b6d713acebc5b014e61a543a5a194f9ac18d76b5440e3b1a569e7397f6cafa86966d7ba19e720413267a6ccea9c439671d2c680f2753ca184eeeb843450368acb4383a01d25eb3d1e23e0f2645d1cdfa9fa410632f95a5f622f851c66ee7e30393cd7a4d67ff2a49c4f93c0984b5c2d4523497e4d64f95f08493564a1df87111c9bf3194fef97dcecc467ace45feeb685c5870d05f88a0f463db88d377442e1349acaf766218b54a9d624778e1c4e064c98e494198276eb2df7766411bef0ebb5000000000006065d635b0b7a00ee767221d8af9753387e0cd8d718f54a29df6eba3bd4c440e6e2172e3fcc01b8babb757b5c59217b80d0db3ba582814a604e4ef7a803e9ca7c85b35c9b93a9e0885e238b44ae1c2e64cce3b27083b8246829e64056000302bffff15405bd5f2eba20000000000000000000000000000000000009a9823fd8fbc5aa16509945ed032b48ea12d8e0588dc52702e4084913a06d468d0928bad76d697e1f85ab030e788d38788ee5b5428d4a971cc97db9fd231088e570735ce129e7e77fc2777692664a1488fd8d6dff4dad618fd54f529d4555c6507009ee69dd1bc55258789b24052137e9637f3efbab71720f88c3c44b3b7486f979e8a3174b531f573fe0e5239c000be2733c49546f6e8a9175ec6f14dbf72cac91643b2fd99c29eca28a3c2e60d5e5b8795fae16a7c3ea57e728eca35eaf0155a39f97580e079175426c088a0208040982a0000000000000000000000000051ceaaf0159fe61f2eade7603d0a7a56fb09cd119ac06adb6597155ae47846892bb423c024d8cbe9240b71ec6dc2124d3a19e2d714b273d95d1d3aa737cb04a33615ff2a730e51067d5d675d7122361c37c61a43b5afd865b60d4cae891b73220f17d25985a7f76834995e53a93a1c7b9eef267df691ca983a0b15bda7f6c5c1ca7aa50261a3089a1ebf0734c9b07e8951ff023263ad5aed8cfb49b49e128c697724c057d22c5df5aef27ce3db11d5ad5527d149d076e1a87e2df27c0cb8a67ad026bf953e88f10447e125c2c0f1aebee1f3390a9e3ddad4e2a6e0f6e4569fdefa19e870e04acf9493b963f98e23cfc665e4f465fa3f801e1957c399e45f61d3459b1c606204368bb931345af2823c487d2fd99db6ea6e008e7ffa06ca861551189d155bd077a79fe2c7e961352e56824f727d21d41eae78bfec4a2d7a7edbc8ef958c5ea599f7c25bf71c2340558aa12fdd24a88aaad5921aee7dae6a2f3009d9cb43ab4898d0f0aa565431b6abe585d75db04d1c9ba0b9de4ae8b0d3132bc6810cc9a693979f55174a72e1df9fdef35bc470f9e6e591982757f45c52c645d891bf63bb21fb66926ebe1a8525611fc3e8bb8795c36dc2a86b5ab46ff33cc74f61751b2dae92676db85c8d0c721b7ea4544bf51c95c86fcac1f434d09d1ee4928aafe23de66fed972e0dddfb33f64e48701b049239e7f552d816441d11c4c2647c014462344359198d97c4b6e9ed31ca18987b64de079b2bed641e8a92f13ca70844c65cb423d01950b0ebf44bd28e09c05d9ae5dd689fb880fb18d042219f5ac60c3a03b085abf3e8e3efc842a8d328733461f04c99607061c65ed14c61322a5ac2d371a95b8ad867ec92d13a4fa4ae033a09673866cd77f4bcdaaa05207166b19a8758d8855400d8c6a7242dc207251e8797eca24ea4f487663e60f2f5e1f1424958fd148f846830e88a42d93e1fe9c0b4a4a268921738938aa9f3cb3811ac87c54c8ebc8bcfb4613cc3a997ff1579edbd4ade8020e3ad001b072b1a751b588ac4639f35a58e00a50c0270608c7a7f10132b1c25b9ea81232fbef665f6212f875b2a0000000000000000000000000000cf7b6c4ba9bec153d6834bfef080df374703a8ff56a63ec1fe5f2e05a79e3cace7283dd68d41e94420c325fe4dae144fde5ec25a87d625cab20753a77b323fa3783c8b675859b9012647885a242adfee2fe812ecbe5191e0a15142f7349e7627cc39d724e2e34e7a24154f26ae3125b36d0504965295d0453902ac7079b11a3a1e655e482331e3dc35b2e7e4e3ea99064fe5b9c8ae0ca3e5fd653f3286a99d81ce4eba765c38d097391ad4babac38ce5b4344e24a361cd54e5"], &(0x7f0000000380)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x2e) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000540)='rcu_utilization\x00', r1}, 0x10) syz_clone(0xd0080, &(0x7f0000000680)="4a3c108ed4a1299860c5b11bb26ef796e4ce1bb9c09e603a8b72cbb8ef05913774d1d6d00cfc2eb3cfc2b822be9c2e5d3cc6ebc513e3eccd1f77b2cdadf359e7a2b13865c5a894ffb2bbd39867c0a0952d52a36d65cf502fa6e36015ff9d3ca5db1ca9", 0x63, &(0x7f00000002c0), &(0x7f0000000500), &(0x7f0000000580)="b25db9a679c0fd87ae7bf181d339940cad52fb0aa15198568396df4b3d3f9d91d6c0bfdb81f9891bb53502565ce6a92c04ab64ebd66297c9b4") perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3fd, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) ioctl$TUNSETIFF(r0, 0x400454ca, 0x0) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f0000000180)=ANY=[@ANYBLOB="18010000010000000000000000030000850000007b00000095"], &(0x7f0000000100)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='kfree\x00', r2}, 0x10) r3 = bpf$PROG_LOAD_XDP(0x5, &(0x7f00000001c0)={0x6, 0x4, &(0x7f0000000300)=ANY=[@ANYBLOB="1802000000000000000000000000000085000000a000000095"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="19000000040000000800000008"], 0x48) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r4], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000400)={{r4}, &(0x7f0000000380), &(0x7f00000003c0)=r5}, 0x20) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000080)='mem_disconnect\x00'}, 0x10) bpf$BPF_PROG_TEST_RUN_LIVE(0xa, &(0x7f0000000080)={r3, 0x0, 0x0, 0x0, 0x0, 0xffffffff00000000, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) syz_clone(0x22023500, 0x0, 0x0, 0x0, 0x0, 0x0) r6 = bpf$PROG_LOAD(0x5, 0x0, 0x5e) bpf$PROG_LOAD(0x5, 0x0, 0x0) r7 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$TUNSETIFF(r7, 0x400454ca, &(0x7f0000000080)={'pimreg0\x00', 0x7c2}) ioctl$TUNGETVNETHDRSZ(r0, 0x800454d7, &(0x7f0000000240)) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) ioctl$TUNATTACHFILTER(r7, 0x401054d5, &(0x7f0000000400)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0xffffffff}]}) r8 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x0, 0x5, &(0x7f0000000000)=ANY=[@ANYRES8=r6], 0x0, 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) ioctl$TUNSETIFF(r8, 0x400454ca, &(0x7f0000000080)={'pimreg0\x00', 0x7c2}) 1.904436751s ago: executing program 1 (id=5585): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000f00000018010000646c6c2500000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0xb, 0x8, 0xc, 0x6f4, 0x1, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008bd6000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000003"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000004c0)={&(0x7f00000002c0)='mm_page_alloc\x00', r1}, 0x10) bpf$OBJ_GET_MAP(0x7, &(0x7f00000000c0)=@o_path={&(0x7f0000000080)='./cgroup.cpu/cpuset.cpus\x00'}, 0x18) perf_event_open$cgroup(&(0x7f0000000000)={0x6, 0x80, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}, 0x0, 0x7, 0x0, 0x5, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0xebffffffffffffff) 1.867719351s ago: executing program 3 (id=5586): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x19, 0x4, 0x8, 0x8, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xb, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB, @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x4, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000300)={{r0}, &(0x7f0000000280), &(0x7f00000002c0)=r1}, 0x20) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00', r2}, 0x10) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000280)=@base={0xb, 0x8, 0xc, 0xffffbffb, 0x1, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe, 0x0, @perf_config_ext={0x9ae0067}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x1) r3 = bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x4, &(0x7f0000000000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x8, 0x76}, [@call={0x27}]}, &(0x7f0000000040)='syzkaller\x00', 0x4, 0x99, &(0x7f0000000180)=""/153, 0x0, 0x0, '\x00', 0x0, @cgroup_skb, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0xfffffffffffffed8, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x3f) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000001240)=@base={0xf, 0x4, 0x8, 0x1, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x37) close(r3) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r7 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000012c0)={0xe, 0xf, &(0x7f00000016c0)=@ringbuf={{}, {{0x18, 0x1, 0x1, 0x0, r6}}, {}, [], {{}, {}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000280)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) getpid() bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000240)={@map=r4, r7, 0x5, 0x0, 0x0, @void, @value}, 0x10) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000240)={{r4}, &(0x7f0000000100), &(0x7f0000000140)=r3}, 0x20) sendmsg(r5, &(0x7f00000029c0)={0x0, 0x0, &(0x7f0000001680)=[{&(0x7f0000001400)='H', 0x20001401}], 0x1}, 0x0) r8 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="02000000040000000800000001"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x0, 0x10, &(0x7f0000000580)=ANY=[@ANYRES32=r8, @ANYBLOB="0000000000000000b704000008000000850000007800000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r9 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x10, &(0x7f0000000580)=ANY=[], &(0x7f0000000600)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000280)='sched_switch\x00', r9}, 0x18) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x10020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000023c0)={0x11, 0x4, &(0x7f0000000480)=ANY=[], 0x0, 0x2, 0x22, 0x0, 0x0, 0x21, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000700)=ANY=[], 0x50) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) 1.865990921s ago: executing program 1 (id=5587): r0 = bpf$MAP_CREATE(0x1900000000000000, &(0x7f0000000040)=ANY=[@ANYBLOB="1b000020000000040000", @ANYRES32, @ANYBLOB='\x00'/10, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r0}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x20, 0x12504, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x8}, 0x7602, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16, 0x0, 0x4, 0x1, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000080000000000000000000181100", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000058"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f0000000300)='sched_switch\x00', r2}, 0x10) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) write$cgroup_pid(r3, &(0x7f0000000980), 0x20000992) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fb, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x16004, 0x0, 0x81, 0x5, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f0000001900)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sk_skb, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x48) 1.31042581s ago: executing program 2 (id=5590): perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={0x0, 0x5}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000005c0)={0x5, 0x80, 0x40, 0x1, 0xfe, 0x0, 0x0, 0x0, 0x2000, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}, 0x102202}, 0x0, 0x0, 0xffffffffffffffff, 0x1) bpf$MAP_CREATE(0x0, &(0x7f0000000080)=ANY=[@ANYBLOB, @ANYBLOB], 0x50) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0x1b, 0x3, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f00000002c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1f, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000200)={r0, 0x0, 0xe, 0x0, &(0x7f00000000c0)="5cdd3086ddffff6633c9bbac88a8", 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xd}, 0x0, 0x4, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_QUERY(0x10, 0x0, 0x0) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETOFFLOAD(r2, 0xc004743e, 0x110c230000) ioctl$TUNSETOFFLOAD(r2, 0x40047440, 0xf0ff1f00000000) ioctl$TUNSETQUEUE(r1, 0x400454d9, &(0x7f0000000000)={'veth1_to_bridge\x00', 0xd00}) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x10a700, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000200)={'rose0\x00', 0x112}) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000080)=0xffffffffffffffff, 0x4) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000380)=ANY=[@ANYBLOB="1b00000000000000000000000080000000000000", @ANYRES32, @ANYBLOB="0000000000000000000000000000000000000000b9d00a8a84b6d832dd7bf00b687470675ef7be1eac68dae02d981f22ab837d28d17b1d95dd318668f4d8279f6ace61328ddcf664507bc6cf58c24b5df0973d61a7e985b0ab0a7adb045523eb77", @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xf, &(0x7f0000000240)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b702000014000800b7030000000000008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000000000008500000084000000b70000000000000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f00000006c0)='sched_switch\x00', r5}, 0x10) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000380)=ANY=[], 0x48) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={&(0x7f0000000300), 0x12}, 0x1d10}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="170000000000000004000000ff000000820c0200", @ANYRES32=0x1, @ANYBLOB='\x00'/13, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x50) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, 0x0, 0x0) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, 0x0, &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000340)='thermal_power_allocator_pid\x00', r6, 0x0, 0x6}, 0x18) bpf$MAP_CREATE(0x300000000000000, &(0x7f0000000100)=@base={0x18, 0x4, 0x41, 0x0, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x4002, 0x8000005, 0x0, 0x0, @void, @value, @void, @value}, 0x50) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz1\x00', 0x1ff) 958.240535ms ago: executing program 3 (id=5591): bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000700)=ANY=[@ANYBLOB="9feb01001800000000000000340000003400000006000000040000000000000e0400000100000000000000000000000d00000000000000000000001004000000000000000000000903"], 0x0, 0x52, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x28) 898.790906ms ago: executing program 1 (id=5592): perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x2, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}, 0xa00, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xae3e, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={0x0}, 0x18) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, 0x0, 0x48) perf_event_open(&(0x7f0000000680)={0x2, 0xa7, 0xb, 0x2, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0, 0x7}, 0x0, 0x3}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f00000002c0)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20004, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x305500, 0x0) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xe}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, 0x0}, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x21, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, 0x0}, 0x0) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8924, &(0x7f0000000640)={'dummy0\x00', @local}) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$SIOCSIFHWADDR(r1, 0x8924, &(0x7f0000000040)={'veth0_macvtap\x00', @remote}) close(r2) r3 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETOFFLOAD(r3, 0xc004743e, 0x110e22fff6) ioctl$TUNGETVNETLE(r2, 0x4004743c, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f00000003c0)={r0, 0x0, &(0x7f0000000500)=""/206}, 0x20) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000880)=ANY=[@ANYBLOB="9feb010018000000000000003000000030000000020000000000000001000004000000000000000002000000000000000000000000000003000000000300000001000000000000000000e1432cbd4802d2366cf2c03d75a3c01b5ac168e5e9895bda4d508fca73e78ad4060c521aac39f82dab2e8b"], 0x0, 0x4a, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x28) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000bc0)=ANY=[@ANYBLOB="0e00000004000000040000000200020000000000", @ANYRES32, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="03090000020000000000000000000000000000000000000000000000c6deba5a21a0d179a36aaae8ba02d301eebc5cab25b34842802f94db92d20cfd0be12cee718954a8b55775e1c4af78"], 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1c, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000ac0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10001, @void, @value}, 0x94) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000, 0x0, @perf_bp={0x0, 0x3}, 0x0, 0x1, 0x1, 0x0, 0x0, 0x200000, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) 897.809986ms ago: executing program 3 (id=5593): perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="1e000000000000000500000006"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000180)='sched_switch\x00', r1}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000040)=@base={0xd, 0x4, 0x4, 0x9, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x4, &(0x7f0000000000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x8, 0x76}, [@call={0x27}]}, &(0x7f0000000040)='syzkaller\x00', 0x4, 0x99, &(0x7f0000000180)=""/153, 0x0, 0x0, '\x00', 0x0, @cgroup_skb, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0xfffffffffffffed8, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x3f) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000001240)=@base={0xf, 0x4, 0x8, 0x1, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x37) close(r2) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r6 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000012c0)={0xe, 0xf, &(0x7f00000016c0)=@ringbuf={{}, {{0x18, 0x1, 0x1, 0x0, r5}}, {}, [], {{}, {}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000280)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000240)=ANY=[@ANYRES32=r3, @ANYRES32=r6, @ANYBLOB="050000000000000000"], 0x10) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000240)={{r3}, &(0x7f0000000100), &(0x7f0000000140)=r2}, 0x20) sendmsg(r4, &(0x7f00000029c0)={0x0, 0x0, &(0x7f0000001680)=[{&(0x7f0000001400)='H', 0x20001401}], 0x1}, 0x0) (fail_nth: 19) 500.067433ms ago: executing program 3 (id=5596): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000100)={'dvmrp0\x00', 0x2}) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) r1 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340)={0x2, 0x4, 0x8, 0x1, 0x80, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x100, 0x1108, 0x9, 0x1, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000000), &(0x7f00000002c0), 0xb, r2}, 0x38) bpf$MAP_LOOKUP_BATCH(0x18, &(0x7f0000001140)={&(0x7f0000000f00)="0e9c17fae0", &(0x7f0000000f80)=""/253, &(0x7f0000001080), &(0x7f00000010c0), 0x1, r2}, 0x38) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000080)={r1}, 0x4) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000003c0)={0x3, 0x11, &(0x7f0000000200)=@framed={{0x18, 0x2}, [@call={0x85, 0x0, 0x0, 0x9b}, @snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0xffffffff}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r1}}]}, &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000002c0)={r3, 0x0, 0xe, 0x0, &(0x7f0000000100)="b34715ecd04550d3abc89b6f7bec", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x8}, 0x1400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xaffffff7ffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x8912, &(0x7f0000000080)) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000240)}}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000001040)=@base={0x7, 0x0, 0x3fd, 0x1, 0x88, 0xffffffffffffffff, 0x1, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb, 0x184, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f00000000c0)={{}, &(0x7f0000000000), &(0x7f0000000040)='%pB \x00'}, 0x20) bpf$PROG_LOAD(0x5, 0x0, 0x0) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0xa, 0x3, &(0x7f0000000480)=ANY=[@ANYBLOB="1809006c8c1eb7ba0095000001ab727de18624104ddef9f43dcfc02f7c74c9d7785bf1ae09842d3ae86061753264f459fedba7fb1f535dc42b9080efe33ac812919901aea90597c3b5588ddf295c74c42692edf733d2108365013ab1d5d96566733d06fad7b11b1112219c7a070000000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x60, '\x00', 0x0, @fallback=0x6, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0xc, 0x0, 0x0, &(0x7f0000000140)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41000, 0x60, '\x00', 0x0, @fallback=0x1c, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$TOKEN_CREATE(0x24, &(0x7f0000000500)={0x0, r5}, 0x8) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000540)={0x0, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="8500002d04816158fca1f700", @ANYRES32, @ANYBLOB="0000000000000000950000000000000045"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'tunl0\x00'}) ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x89f1, &(0x7f0000000080)) ioctl$TUNATTACHFILTER(r0, 0x401054d5, &(0x7f0000000180)={0x2, &(0x7f0000000000)=[{0x28, 0x40, 0x0, 0xfffff024}, {0x6, 0x0, 0xa0, 0x800}]}) 498.858162ms ago: executing program 4 (id=5597): bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="16000000000000000400000001"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0xffffffff, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000070000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000a5df850000002d00000095"], 0x0, 0x8f82, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x14, &(0x7f0000000400)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000010000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000020"], 0x0, 0x0, 0x0, 0x0, 0x41100, 0x40, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000070000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2f, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) socketpair(0x9, 0x80000, 0xff000000, &(0x7f0000000040)={0x0, 0x0}) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="180000000000000000000000002a981dec88a85c90d05e000000850000005000"], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x29, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000080)={{}, 0x0, &(0x7f00000002c0)}, 0x20) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cpu.stat\x00', 0x26e1, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) ioctl$SIOCSIFHWADDR(r0, 0x8b35, &(0x7f0000000000)={'veth0_macvtap\x00', @dev}) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'ip6_vti0\x00', 0x200}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080800000000007b8af8fe0000a300bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000030000209500000000000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0200000004000000080000000700000000070000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018ee0000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000010000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180)}, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0xfffc, 0x0, 0x0, 0x0, 0x80000001}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000080)={{}, 0x0, &(0x7f00000002c0)}, 0x20) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x13, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000580)={&(0x7f0000000540)='fib6_table_lookup\x00', r2}, 0x10) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'ip6_vti0\x00', 0x200}) socketpair(0x2b, 0x6, 0x4000, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x89f1, &(0x7f0000000080)) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f00000001c0)={0x2, 0x80, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0xfffffffffff7bbfe, 0x0, 0x0, 0x0, 0xffffffff}, 0x0, 0x2000000000000000, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x89f1, &(0x7f0000000080)) bpf$PROG_LOAD(0x5, 0x0, 0x0) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000100), 0x1001) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x4030582b, &(0x7f0000000280)={'lo\x00', @link_local={0x1, 0x80, 0xc2, 0xc}}) bpf$PROG_LOAD(0x5, 0x0, 0x0) 420.581574ms ago: executing program 4 (id=5598): bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001300)={&(0x7f0000000280)=ANY=[@ANYBLOB="9feb01001800000000000000300000003000000002000000000000000000001010000000000000000100008520000002000000000300000000000000000000000000000901"], 0x0, 0x4a, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x20) 418.956894ms ago: executing program 4 (id=5599): r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x4, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d0000001801000020696c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007100000095"], 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x24, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @void, @value}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f00000004c0)=ANY=[@ANYBLOB="94dae9f8fbc4282fc2d95e1d46ed7334b49809ae0a55c7cf53af42f558d67a17f005dbe63aa06cafdd960a7bb2200db2eea3ed221741a6964fb4a0a29a7e97cee25c58391c8f9f17884cea1e1ac9012c6b3bfd90fd973a0101a113f37d4d82488b17a136a3a27e3b3f49fee85de8427bd469ea19b3139c029eb64f7752df2636d205edc4805d13f8c77308c1312a9178dd9d7717f490e964317847a8b172713190596deb194eb6de94b4", @ANYRESDEC=0x0, @ANYRES32=r0], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x15, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000001300)={&(0x7f0000000c00)='net_dev_start_xmit\x00', r1}, 0x10) (async) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000002ec0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x48) (async) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x17, 0x0, 0x4, 0xff, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000059"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0xffffffff, @void, @value}, 0x94) (async) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001400)={{r3}, 0x0, &(0x7f00000013c0)}, 0x20) (async) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x16, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000001300)={&(0x7f0000000c00)='net_dev_start_xmit\x00', r4}, 0x10) (async) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r2, 0x18000000000002a0, 0xe2c, 0x60000000, &(0x7f0000000100)="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", 0x0, 0x24, 0x60000000}, 0x2c) 418.406884ms ago: executing program 4 (id=5600): r0 = openat$tun(0xffffffffffffff9c, 0x0, 0x3ab000, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000700)={0x0, 0xffffffffffffffff, 0x0, 0x101}, 0x34) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x11, 0x8, &(0x7f0000003900)=ANY=[@ANYBLOB="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"], &(0x7f0000000380)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x2e) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000540)='rcu_utilization\x00', r1}, 0x10) syz_clone(0xd0080, &(0x7f0000000680)="4a3c108ed4a1299860c5b11bb26ef796e4ce1bb9c09e603a8b72cbb8ef05913774d1d6d00cfc2eb3cfc2b822be9c2e5d3cc6ebc513e3eccd1f77b2cdadf359e7a2b13865c5a894ffb2bbd39867c0a0952d52a36d65cf502fa6e36015ff9d3ca5db1ca9", 0x63, &(0x7f00000002c0), &(0x7f0000000500), &(0x7f0000000580)="b25db9a679c0fd87ae7bf181d339940cad52fb0aa15198568396df4b3d3f9d91d6c0bfdb81f9891bb53502565ce6a92c04ab64ebd66297c9b4") perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3fd, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) ioctl$TUNSETIFF(r0, 0x400454ca, 0x0) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f0000000180)=ANY=[@ANYBLOB="18010000010000000000000000030000850000007b00000095"], &(0x7f0000000100)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='kfree\x00', r2}, 0x10) r3 = bpf$PROG_LOAD_XDP(0x5, &(0x7f00000001c0)={0x6, 0x4, &(0x7f0000000300)=ANY=[@ANYBLOB="1802000000000000000000000000000085000000a000000095"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="19000000040000000800000008"], 0x48) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r4], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000400)={{r4}, &(0x7f0000000380), &(0x7f00000003c0)=r5}, 0x20) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000080)='mem_disconnect\x00'}, 0x10) bpf$BPF_PROG_TEST_RUN_LIVE(0xa, &(0x7f0000000080)={r3, 0x0, 0x0, 0x0, 0x0, 0xffffffff00000000, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) syz_clone(0x22023500, 0x0, 0x0, 0x0, 0x0, 0x0) r6 = bpf$PROG_LOAD(0x5, 0x0, 0x5e) bpf$PROG_LOAD(0x5, 0x0, 0x0) r7 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$TUNSETIFF(r7, 0x400454ca, &(0x7f0000000080)={'pimreg0\x00', 0x7c2}) ioctl$TUNGETVNETHDRSZ(r0, 0x800454d7, &(0x7f0000000240)) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) ioctl$TUNATTACHFILTER(r7, 0x401054d5, &(0x7f0000000400)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0xffffffff}]}) r8 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x0, 0x5, &(0x7f0000000000)=ANY=[@ANYRES8=r6], 0x0, 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) ioctl$TUNSETIFF(r8, 0x400454ca, &(0x7f0000000080)={'pimreg0\x00', 0x7c2}) 366.085454ms ago: executing program 1 (id=5601): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0600000004000000ff0f00000700000000000000", @ANYRES32, @ANYBLOB="00000050fecbe100"/20, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYRES32=r0, @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000009007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='sys_enter\x00', r1}, 0x10) gettid() bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xe, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, '\x00', 0x0, @sk_skb, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r2 = bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYRES32, @ANYRES32=r2], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000680)={0x0, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="180100000abd92de000000000000ea04850000007b00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000040)={0x11, 0x4, &(0x7f00000002c0)=ANY=[], &(0x7f0000000180)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r3}, 0x10) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}, 0x24}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r5 = openat$cgroup_int(r4, &(0x7f00000000c0)='cpuset.memory_spread_slab\x00', 0x2, 0x0) write$cgroup_int(r5, &(0x7f00000003c0)=0x1000, 0x12) r6 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100), 0xc1842, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r8 = bpf$MAP_CREATE(0x0, &(0x7f00000008c0)=ANY=[@ANYBLOB="1e0000000000000004000000ff"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r8, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) r9 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000080)='netlink_extack\x00', r9}, 0x10) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'bond_slave_1\x00'}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r10, 0x8922, &(0x7f0000000080)) r11 = perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$unix(r7, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="14000000000000000100000001000000", @ANYRES32=r11, @ANYBLOB="0000000014000000000000000100000001000000", @ANYRES32, @ANYBLOB="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"/313], 0x30}, 0x0) ioctl$TUNSETIFF(r6, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000edff0000000000000000850000000f00000018010000646c012500000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000800000850000000600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r12 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="02000000040000000600000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000260018110000", @ANYRES32=r12, @ANYBLOB="0000000000000000b7"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) 300.881185ms ago: executing program 2 (id=5602): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @cgroup_skb, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="0b00000005000000000400000900000001000000", @ANYRES32, @ANYBLOB="0000000000020000000000000000001000000000", @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000900)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b708000008"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r2, &(0x7f0000001ac0)={0x0, 0x0, 0x0}, 0x0) close(r2) sendmsg$inet(r3, &(0x7f0000000b40)={0x0, 0x0, 0x0}, 0x0) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f00000004c0)={r1, &(0x7f0000000340), &(0x7f00000005c0)=""/155}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r1], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000880)={r0, 0xe0, &(0x7f0000001b80)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, &(0x7f0000000200)=[0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, &(0x7f00000008c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000002c0), 0x0, 0xe1, &(0x7f0000000780)=[{}, {}, {}, {}, {}, {}, {}, {}, {}], 0x48, 0x10, &(0x7f0000000580), &(0x7f0000000680), 0x8, 0xac, 0x8, 0x8, &(0x7f00000006c0)}}, 0x10) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', r4, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r5}, 0x10) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x6}, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000400)={0xffffffffffffffff}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) close(r8) sendmsg$inet(r7, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB="5400000f000000000000000400000000000000600000000100010001000000010000000700000007442cc05000000000000000010000ee06000000080000000100000e4a0000002000650e030000000500000008000000"], 0x88}, 0x0) close(r6) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000800)={&(0x7f0000001c80)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xbc, 0xbc, 0x3, [@int={0x7, 0x0, 0x0, 0x1, 0x0, 0x2d, 0x0, 0x6f, 0x1}, @struct={0xa, 0xa, 0x0, 0x4, 0x0, 0xa, [{0x5, 0x4, 0xf}, {0x0, 0x1, 0x7}, {0x8, 0x3, 0x1000}, {0x6, 0x5, 0x738}, {0xb, 0x0, 0x10000}, {0x6, 0x1, 0x1}, {0xd, 0x3, 0x7f}, {0x3, 0x0, 0xff}, {0x9, 0x2, 0x19}, {0x6, 0x5, 0x9c17}]}, @typedef={0xd, 0x0, 0x0, 0x8, 0x3}, @float={0x10, 0x0, 0x0, 0x10, 0x2}, @var={0x9, 0x0, 0x0, 0xe, 0x2, 0x2}]}, {0x0, [0x2e]}}, &(0x7f0000000540)=""/50, 0xd7, 0x32, 0x0, 0x1, 0x0, @void, @value}, 0x28) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) r11 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1801000000000000000000004b64ffed850000006d000000a50000000500000095"], &(0x7f00000002c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x54, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r11}, 0x10) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) close(r10) recvmsg$unix(r9, &(0x7f0000000400)={0x0, 0x0, 0x0}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_PROG_ATTACH(0x8, 0x0, 0x0) r12 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETIFF(r12, 0x400454ca, &(0x7f0000000140)={'pim6reg1\x00', 0x1}) 228.403997ms ago: executing program 3 (id=5603): bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000700)=ANY=[@ANYBLOB="9feb01001800000000000000340000003400000006000000040000000000000e0400000100000000000000000000000d00000000000000000000001004000000000000000000000903"], 0x0, 0x52, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x28) 165.129978ms ago: executing program 3 (id=5604): r0 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x1, 0x0, 0x9, 0x100, 0x0, 0x6, 0x0, 0x1}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x1) bpf$PROG_LOAD(0x5, &(0x7f00000006c0)={0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @xdp, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x3, 0x0, 0x0, 0x0, 0x0, 0x24, 0x12506, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x8}, 0x7602, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, r0, 0x0) perf_event_open(&(0x7f0000001480)={0x2, 0x80, 0x84, 0x1, 0x0, 0x0, 0x0, 0x0, 0xc000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000, 0x0, @perf_config_ext={0x20000000}, 0x0, 0x0, 0x0, 0x9, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_clone(0x20083500, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, 0x0, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) perf_event_open$cgroup(&(0x7f0000000000)={0x6, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}, 0x0, 0x8}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) syz_clone(0x630c1100, 0x0, 0x0, 0x0, 0x0, 0x0) syz_clone(0x43001000, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=ANY=[], 0x48) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000000e40)={0x0, 0x0, 0x0}, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000000900)={0x0, 0x0, 0x0}, 0x0) perf_event_open(0x0, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x6, 0x5, &(0x7f0000000540)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00', 0x3, 0xfa, &(0x7f0000000140)=""/250, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x20, @void, @value}, 0x94) 126.173318ms ago: executing program 1 (id=5605): bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="1800000000000000000000000000000a850000000e000000850000000700000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="0b0000009d000000010001000900000001"], 0x50) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000001400)={{r0}, &(0x7f0000001380), &(0x7f00000013c0)='%pB \x00'}, 0x20) 101.089908ms ago: executing program 1 (id=5606): bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r0, 0x8914, &(0x7f0000000000)={'veth0_vlan\x00', @remote}) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0600000004000000ff0f000007"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYRES64, @ANYBLOB="0000000000000000b7080000b2e900007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b70400000000000085"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, '\x00', 0x0, @fallback=0x34, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, @void, @value}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000004c0)={&(0x7f00000002c0)='mm_page_alloc\x00', r2}, 0x10) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x14, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x40, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000070000001801000020756c2500000000002020207b1af8"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x0, 0x5c, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d0000001801000020696c2500000000002020097b1af8ff00000000bfa100000000000007010000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000, @void, @value}, 0x94) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000040)='mm_page_alloc\x00', r4}, 0x10) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000080)='mem\x00\x10\x00\x00\x00\x00\x00\x00I\xa2l') r5 = syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000080)) write$cgroup_subtree(r5, 0x0, 0x0) close(r3) r6 = openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x60) ioctl$TUNSETOFFLOAD(r6, 0xc004743e, 0x110e22fff6) ioctl$TUNGETVNETLE(r3, 0x40047451, &(0x7f0000000180)) perf_event_open(&(0x7f0000000500)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x2000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r7, 0x8914, &(0x7f0000000000)={'veth0_vlan\x00', @random="0106002010ff"}) r8 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d0000001801000020696c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r9 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r9}, 0x10) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000a00)={r8, 0xe0, &(0x7f00000008c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, &(0x7f0000000280)=[0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x6, 0x3, &(0x7f00000003c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000400)=[0x0, 0x0, 0x0], 0x0, 0xb8, &(0x7f0000000580)=[{}, {}, {}, {}, {}, {}, {}, {}], 0x40, 0x10, &(0x7f00000005c0), &(0x7f0000000600), 0x8, 0x26, 0x8, 0x8, &(0x7f0000000640)}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000d00)={0x5, 0x2b, &(0x7f0000000740)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x3}, {{0x18, 0x1, 0x1, 0x0, r1}}, {}, [@call={0x85, 0x0, 0x0, 0xc9}, @snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0xfff}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r1}}, @ldst={0x0, 0x3, 0x1, 0xb, 0x7, 0x100, 0xfffffffffffffffc}, @generic={0x3c, 0x0, 0x3, 0x7, 0x80000001}, @map_val={0x18, 0x8, 0x2, 0x0, r1, 0x0, 0x0, 0x0, 0xffffffff}, @tail_call={{0x18, 0x2, 0x1, 0x0, r1}}, @initr0={0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xac20}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x4}, @map_fd={0x18, 0x4, 0x1, 0x0, r1}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0xbcdff78e90e4143f}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000200)='GPL\x00', 0x9000, 0x50, &(0x7f0000000300)=""/80, 0x41100, 0x0, '\x00', r10, @fallback=0x5, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000a40)={0x5, 0x8, 0x0, 0x7fff}, 0x10, 0x0, r2, 0x4, &(0x7f0000000c80)=[r1, r1, r1], &(0x7f0000000cc0)=[{0x3, 0x4, 0x8, 0x4}, {0x2, 0x2, 0xa, 0x6}, {0x5, 0x2, 0x7, 0x1}, {0x0, 0x4, 0xf, 0xa}], 0x10, 0x2, @void, @value}, 0x94) 78.680929ms ago: executing program 4 (id=5607): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000070000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000a5df850000002d00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x0, 0x25c, &(0x7f0000000440)=ANY=[@ANYBLOB="180200000000001700000000000000001801000020646c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000000000008500000006000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f0000000400)='task_rename\x00', r0}, 0x18) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x3, &(0x7f0000000240)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000380)=@base={0x10, 0x4, 0x8, 0x7, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000940)={{r2}, &(0x7f00000008c0), &(0x7f0000000900)=r1}, 0x20) 0s ago: executing program 4 (id=5608): bpf$ITER_CREATE(0x21, &(0x7f00000002c0), 0x8) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x1, 0x100004, 0x220104, 0xb, 0x1, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x2000000, 0x180, 0x0, 0x0, @void, @value, @void, @value}, 0x48) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f00000002c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x9}, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000080)={{}, 0x0, &(0x7f00000002c0)}, 0x20) r0 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) socketpair$tipc(0x1e, 0x5, 0x0, 0x0) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x24, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7, 0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x26, 0x800, 0x843, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000180)) socketpair(0x1, 0x1, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000ac0)={0x0, 0xc, &(0x7f00000003c0)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000070000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000a5df850000002d00000095", @ANYRESHEX=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, '\x00', 0x0, @fallback=0x18, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x0, 0x5c, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d0000001801000020696c2500000000002020097b1af8ff00000000bfa100000000000007010000b8ffffffb702000000000000b703000000000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000, @void, @value}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000100)='mm_lru_insertion\x00', r1}, 0x10) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1801000011000000000000000000000018120000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000f6000000850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x24, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000000600)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18000000000000000000000000000000850000006d"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000005c0)={&(0x7f0000000300)='sys_enter\x00', r4}, 0x10) bpf$OBJ_PIN_MAP(0x9, &(0x7f0000000040)=@generic={0x0}, 0x18) write$cgroup_type(r2, &(0x7f0000000180), 0x40010) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x3, 0xe, &(0x7f00000022c0)=ANY=[@ANYBLOB="b702000000050000bfa300000000000007030000f0ffffff7a0af0ff0200000079a4f0ff00000000b706000000000681ad64020000000000450404000100ff0f1704000001130a00b7050000030000006a0af2fe000000008500000009000000b700000000000000950000000000000000e154cd8445974b26c933f7ffffffffe4fbffffff55bb2007ee51050512b5b42128aa090a79507df79f298129daa7a6b2f91af50342115e17392ac627c87881c000006146001e04aeacea799a22a2fa798b5adc43eb27d53319d0ad229e5752548300000000dbc2777df150b7cdd77b85b941092314fd085f028f2ed1a4535550614e09d6378198a6097a670838337af2abd55a87ac0394b2f92ffab7d153d62058d0a413b2173619ccf55520f22c9ca8b6712f3024b7041b1df65b3e1b9bf115646d14ce53d13d0ccacda1ef0900094fa737c28b99938512c816fdcceaede3faedc51d29a47fc813a2ec00f4c7a53ac271d6d7f4ea6bf97f2f33e2ea2e534300bcb3fdc4b4861004eefbda7f54f82a804da4f85db47a4a69bf9bc5fa96ee293fbd165a5a68488e40b030166565a097b1b44b451de736bb6d43db8db03d4b7745fef1d04ec633dee254a6d491b849a5a787e814c4fd21a18986252a70f8f92eb6f0e8c7db4bf23242a1f2c28159f09943b1b0452d1b72183aacf4a84f9130b775dd4e9e3070756f97ad791fa99dac06b57479321a0574fb30ff0000001989425f5d0b79f6584d0416d7c4bb9f547b328c8ddc20ea011bf5742e0e0d4334db8b20ce3f9f16cb7fc20fb4791ec85821d0c48fb657c29b309c73f0977e7cde65a82b94c461d7962b0d2277a84af326f37f3e2c25a61ec45c3af97a8f17da954aff3fc8c108755f01000000010000006e7dac1aba4b20dc7de058a4dfa7e85a8bdf1d41a2d8bda74d66f47cc180f82c5f573c6d294d3665016ac59dda0fde4745db06753a7ac74a2d32f7528751313694bf5700b20ef0c248ddd3da32396a614cacad4aff2066bb5d4045c958559b7dcb98a6273b8c651e24d9f679e4fbe948dfb4cc4a389469608241730459f0123fd39206000000000000eb55dad46de56ef907b059b90b8aa49afb9a79ae5498f6589880ed6eea7f9c670012be05e7de0940313c5870786554df26236ebced9390cb6941b8375d936a7d2120eca291963eb2d537d8ee4de5c183c960119451c31539b22809e1d7f0cda06a9fa87d64cb77872a2cd8a104e16bb1a2bacf13464ca03aff14a9aa4bd9539f5096412b92012e095b84c20243ff98df3347f0e399d1b9f27e3c33269c0e153b28b2d4410572bc45b98d2de10c21d3ea02208d304d455c36300000000022320178b00cc6ed7966130b547dbf8b497af002000000cd1d000000200008000000000000001abc11c800000000000000000000000928ee53595a779d243a48cea769470424d20a04c04b2c4324ab7f4a5c81921f0128dfd70b438af60b060000000000000056642b49b745f3bf2c4af38ffb7d748308eea09fc361b4735efbf3411718d6ee7aebf9ef679dbfae9fb4a79f8a836804ed3a1079b0282a12043408cd60b687dcff91af19010000000000000000456f7d2a42bd13da202274f20675eb781925441578e93046aaddea8ec4ca37f71c2710a7ea8ae0dc214e1cc275b26adfa892e6de92000000000000000000ddff004cff9ec7ffff35e62f4eeee50e5bafecea4d4134f9d006c8d6883eca5c9c58c9e93311ab5009c68c73de2f04f15d005387577f480000ea65559eb00e76e9d0ada201bcbb5c252b28a60ca770663da451790cc36000906d5a9fad98c308e39bd5ffb6151d79c1cee1cd102e3c8e63e9fba05e3633be3f00000015762e5f5a3a0bc33fdbe28a5ffc83f2b485185cc92fe7f791e8f6429309d6adab4b7e508e5bf024ed8f8a005f2bbf96c89739f5cf1e750d50517a59a3ad09e8802e8f4f535447cc0fc9d5f99a73145dfcedad69da9cd4375c624600e78f4458542b14f29611f95d4a31838eeb20c20bb82aa31771cd379ec83554cea5e6539db7384e1f58d81f2f2653c4d9818708e27c89b552d7fcd116bce9c764c714c9402c21d181aac59efb28d4f91652f6750b6ec962802c0320f8059195729d60c534ee8e8ff0755b67fe4c25edb85bcff24c757aa8090000000000008c420eb4304f66e3a37aaf000000c42a570f0e9dd5fd545470f862f8c3c14fa9ecd1e877b0d8ca84c044859e85e6158f9184bc61a9a284db80e4636c25b96174327d82761c26e329555f9290af4100000000000000749efd3763655500344bae34137f5ab0d534b8d63e4ca3b671f2de1cdf519192c6b59a601fd419adc16e2055b85058f793484305d7a1759782e4c571ee855a47bc00edf5e9020c09ab004321610b857e8717764b633b21cb32f0eb3280e09758bd445ab91d20baca005472b79d7b574a247f1d2fe45b3c4e93da3d51de647c10dd49944dc87c92fe8bad99ca332af00f191b66b6a6f732a91f0e2e9190e4b448da7de018c58e950767f9b320be61e58c79d497247d278888901d442ad7f8536605a644e9e3d769db497c3960dfde12182334caee994adc38a436367a54b9e182b78e9a0ceb9a2c4f63902c1ad1a7c5a08d0920a23c2a86abbdf357849a651733e57f31019876026888c8ccb85c86b4f8ffffff7f000000002c331fca0e541b7ca211c28ed61c52573d9308a13d115b43f8b1894c8fa8a14dc4810f61ae96bf704526a8919bc700002100000000000000000001000027c9a46157a3609b6fd9843ee19ec647249a9375de5858818f3c4a4fa6ce46f4d42b07199de8b99231ace58c77819ee214e49666c464d35ca9b5143ed3b3dc8c17a23692759ccf5a205311b7ab22532697b861dfb54609fd88e6043bd52ae84c1bb0c8a6c769f952283a1f4e3842edb3d42c68a27ef6a1296dfff4a979369b0e8ebc62887aa46e820a74f91381ccc198e353047db70686d147357024eb3cb94f1e89cb5ba0a56aa046b4dc521a3d9356b4b8b5917c4c860495b240e80063bde261fd00000000007271e28ef6806bc8e139c49b91c76bea3858f78fbd8d31330d89069f9648a2ff93060ff073b3a113e47edf76f7d116d2b0976cf2ec447c030931651dd315003b7a6a5433a2bb3c035fc6846abe389b25c988f0bbb889560ae99ec4b227eda2e63a1c31a2c2bd48a822cbe92b6524e0cd8020ecaa34e19e7141d5e221509342bfe7d294d1eb3de6a50ca0301f89c2ee627e949c68b3a4a426a9b7d503a26e9a714ee5f72d8805dd1bfbd081f6a5d1f1289dfe14cb9194e26a44fac273461fc5c0e0a33db7f2d43ea8086cf059f40fa2640b6bfb74dd35f5a31059c01517cf4b6641fce9a24b96767b837ca037a1199735c375c705c798e0e208e4a5259d0bfa526b462af45a6eab34000000000000000000000000c4426344ec1a3366515dee221e747f55d7dd02534bc503b9b28277c253e410986bef2111a99cc448d652929f8a67a6a1d3f00dcad91aff428aade3f85714a1d3ef29acd4d49b62339c10c2ec0dac4728288e78980c1184d8223edbccbf9258b7374e79a1f8bf3fb73cfd1e76982f3d899f71e495f0ba8c6dbb7bbdfc399847a11921f97eba0ea14c4fed9a71eedb97c02461792e4a48dac16c60c3fcaab222025d78963c3ac899fa8b63f58a30212c9b2d7fe751e2046b78f86e22861b6504c667350244dd6d9189a8b9c45f8aaff9db694811ca86ed978f23eed7459c0382074170cf1e25b0e9ba3d1cc309353eea4cd8ab96bafda393276bdd8d32ead8db9e1b54d2d3d50e2815268fc1a6ec566981bc8ca2a4583f3d40e817433d0f4f25cfe6cc1897449ba5f26a9d66ac73e6f5c401376f23a314e0b9ff997d22f3e34b7524642c248aa813edaa626f00000021f8547d393dabe616fbbde21c90be00b5a22671395c7a69c6dd4d022ffc97ddb6aa025131652d409da1d8cfc3d219d4b1c1b7b8170d7c33d91db2b73f7ae02485a209a2474b5d0790d05c01bec623056e4d3f4d3149373a28b26a15a1fcce73d57e6eaf7e6f315fe275ebc9ef7aeca277dde01dde724f419803a2172a7833ceab38d21ca4f1dea5e1f4d8824167b21dd289dd4e6ecfba9e163bdbc48e1e758ecde05c10809c9edfa6d77c652fd742e6dad13d2a397bebe3ea8bc087d3720e2202f36c7719ae34f042e19dc08a3323a3d94098a7ec171469352bab1662c3e4d4803c565cfcce32dad628fade43a4844abb230ce608726fd87e93c405a96cf638c41510f26e9da5f316"], &(0x7f0000000b80)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sched_cls, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0xfffffedf, 0x10, &(0x7f0000000040), 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000640)={r5, 0x0, 0x62, 0xfe, &(0x7f0000000140)="cb74445b7d4c0b24676c6c71ae37efcedaf40242309766deb4e793f90000000000000000dbc856cbc664650634231454ca2d8034c4ca29e0d99c3b6615e91835a600c08f989af45438a54981be310aad92ae545b1c961e5f3762a51fe4c736edec6f", &(0x7f0000000440)=""/254, 0x2f00, 0x0, 0xff, 0x194, &(0x7f0000000980)="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", &(0x7f00000007c0)="4c87fe555ceb79157b1e507ff4d3cc053321e42ae89f596427188b4877ab8f1776c0685784f1174c6401ecc1dd6e2a77bc79238f87ad9215a92ff203a30099e77c543e702b4a4438d358616381745f24f74e585498af129c4b173b242f445b08135f7fa40eb7ba78160ff4f0c80e1b324d0c234cb7f43a3ff9e9535dc16000c797113a039f4508a09144090000009f38a90a24f173b3e68377e4272950a80cfcd3aa6850e917bc7e57370060f5e6db941d67fc98a1e98103830b821657438325578d2af822dd4fc13ea7a7eef8d9be4e715aec8fd6cadc41c8da5ce9da2b9e1559d92a1936fc2b3a00000000000000000072200e10ba6269b634f10f7098c65ba67ba65c0e2687637e131fb8d5ba6c12c09c8356853c434a44ff0878e496dcf9a4f5ca02c293279948f37ebb28843f92c87c057a3b410e04418557d5deda7ddd3bd1d384d64ec980187e8b64a0696571a49e847db79349c9b3c3fab5f1f977bde4d802d9026ae0c11744eb1525c5195fd215d7a432497f35c2f2cfcd2b6336b26dfef0cb968c910ea2af5cdd4d58cc08535d5514", 0x2, 0x0, 0x10000}, 0x24) syz_clone(0x40000000, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xa, 0x4, 0x8, 0x8, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0x1, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) kernel console output (not intermixed with test programs): 8 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 625.255139][T12683] RSP: 002b:00007f01b16e1038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 625.263745][T12683] RAX: ffffffffffffffda RBX: 00007f01b09b5fa0 RCX: 00007f01b078e969 [ 625.271723][T12683] RDX: 0000000000000038 RSI: 0000200000000900 RDI: 000000000000001a [ 625.279692][T12683] RBP: 00007f01b16e1090 R08: 0000000000000000 R09: 0000000000000000 [ 625.287659][T12683] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 625.295625][T12683] R13: 0000000000000000 R14: 00007f01b09b5fa0 R15: 00007ffe55ef76a8 [ 625.303600][T12683] [ 625.821579][T12693] device pim6reg1 entered promiscuous mode [ 626.570388][T12711] bridge0: port 3(team_slave_1) entered blocking state [ 626.607220][T12711] bridge0: port 3(team_slave_1) entered disabled state [ 626.712598][T12711] device team_slave_1 entered promiscuous mode [ 627.061385][T12714] device sit0 left promiscuous mode [ 627.252311][T12715] device vlan1 entered promiscuous mode [ 627.431782][T12721] device sit0 left promiscuous mode [ 627.489626][T12723] device veth0_vlan left promiscuous mode [ 627.524679][T12723] device veth0_vlan entered promiscuous mode [ 627.677036][T12390] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 627.697897][T12390] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 627.705663][T12390] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 628.336378][T12751] device veth0_vlan left promiscuous mode [ 628.446690][T12751] device veth0_vlan entered promiscuous mode [ 629.598555][T12765] device veth0_vlan left promiscuous mode [ 629.695185][T12765] device veth0_vlan entered promiscuous mode [ 629.724523][ T28] audit: type=1400 audit(1747296802.735:146): avc: denied { create } for pid=12772 comm="syz.3.3903" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=atmpvc_socket permissive=1 [ 630.044336][T12775] device veth0_vlan left promiscuous mode [ 630.126772][T12775] device veth0_vlan entered promiscuous mode [ 631.332711][T12819] device veth0_vlan left promiscuous mode [ 631.379522][T12819] device veth0_vlan entered promiscuous mode [ 631.596845][ T407] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 631.614179][ T407] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 631.653200][ T407] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 632.251724][T12853] device sit0 left promiscuous mode [ 632.586685][T12847] device sit0 entered promiscuous mode [ 632.868843][T12859] device sit0 entered promiscuous mode [ 634.207524][T12896] device pim6reg1 entered promiscuous mode [ 634.557379][T12912] FAULT_INJECTION: forcing a failure. [ 634.557379][T12912] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 634.625268][T12912] CPU: 0 PID: 12912 Comm: syz.2.3949 Not tainted 6.1.134-syzkaller-00014-g3cd01bb5bd37 #0 [ 634.635342][T12912] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/19/2025 [ 634.645424][T12912] Call Trace: [ 634.648722][T12912] [ 634.651670][T12912] __dump_stack+0x21/0x24 [ 634.656048][T12912] dump_stack_lvl+0xee/0x150 [ 634.660647][T12912] ? __cfi_dump_stack_lvl+0x8/0x8 [ 634.665685][T12912] dump_stack+0x15/0x24 [ 634.669842][T12912] should_fail_ex+0x3d4/0x520 [ 634.674523][T12912] should_fail+0xb/0x10 [ 634.678680][T12912] should_fail_usercopy+0x1a/0x20 [ 634.683730][T12912] _copy_to_user+0x1e/0x90 [ 634.688153][T12912] generic_map_lookup_batch+0x6c8/0xa90 [ 634.693709][T12912] ? __cfi_generic_map_lookup_batch+0x10/0x10 [ 634.699789][T12912] ? __fdget+0x19c/0x220 [ 634.704041][T12912] ? __cfi_generic_map_lookup_batch+0x10/0x10 [ 634.710110][T12912] bpf_map_do_batch+0x2e8/0x620 [ 634.714968][T12912] __sys_bpf+0x624/0x780 [ 634.719217][T12912] ? bpf_link_show_fdinfo+0x320/0x320 [ 634.724600][T12912] ? irqentry_exit+0x37/0x40 [ 634.729188][T12912] ? sysvec_apic_timer_interrupt+0x64/0xc0 [ 634.735000][T12912] ? asm_sysvec_apic_timer_interrupt+0x1b/0x20 [ 634.741173][T12912] __x64_sys_bpf+0x7c/0x90 [ 634.745597][T12912] x64_sys_call+0x488/0x9a0 [ 634.750102][T12912] do_syscall_64+0x4c/0xa0 [ 634.754522][T12912] ? clear_bhb_loop+0x15/0x70 [ 634.759196][T12912] ? clear_bhb_loop+0x15/0x70 [ 634.763869][T12912] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 634.769766][T12912] RIP: 0033:0x7f528bb8e969 [ 634.774181][T12912] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 634.793877][T12912] RSP: 002b:00007f528c91d038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 634.802304][T12912] RAX: ffffffffffffffda RBX: 00007f528bdb5fa0 RCX: 00007f528bb8e969 [ 634.810309][T12912] RDX: 0000000000000038 RSI: 00002000000003c0 RDI: 0000000000000018 [ 634.818285][T12912] RBP: 00007f528c91d090 R08: 0000000000000000 R09: 0000000000000000 [ 634.826251][T12912] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 634.834218][T12912] R13: 0000000000000000 R14: 00007f528bdb5fa0 R15: 00007ffc8eb21748 [ 634.842195][T12912] [ 635.597662][T12929] device veth0_vlan left promiscuous mode [ 635.606252][T12929] device veth0_vlan entered promiscuous mode [ 635.644956][ T407] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 635.660047][ T407] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 635.671066][ T407] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 635.812491][T12936] bond_slave_1: mtu less than device minimum [ 636.826503][T12949] device veth0_vlan left promiscuous mode [ 636.956848][T12949] device veth0_vlan entered promiscuous mode [ 637.259954][T12959] device pim6reg1 entered promiscuous mode [ 637.274033][T12962] device pim6reg1 entered promiscuous mode [ 638.503878][T13001] device veth0_vlan left promiscuous mode [ 638.630835][T13001] device veth0_vlan entered promiscuous mode [ 638.953890][T13011] device veth0_vlan left promiscuous mode [ 639.089670][T13011] device veth0_vlan entered promiscuous mode [ 639.432957][T13016] device sit0 left promiscuous mode [ 639.667860][T13027] device pim6reg1 entered promiscuous mode [ 639.856308][T13033] device pim6reg1 entered promiscuous mode [ 640.110504][T13040] device sit0 entered promiscuous mode [ 641.026639][T13052] device veth0_vlan left promiscuous mode [ 641.160624][T13052] device veth0_vlan entered promiscuous mode [ 641.349028][ T407] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 641.388255][ T407] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 641.416548][ T407] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 641.427734][T13056] device sit0 entered promiscuous mode [ 641.598553][T13059] device sit0 left promiscuous mode [ 641.738140][T13059] device sit0 entered promiscuous mode [ 641.903524][T13061] device veth0_vlan left promiscuous mode [ 641.921330][T13061] device veth0_vlan entered promiscuous mode [ 641.951015][T13072] device pim6reg1 entered promiscuous mode [ 642.136740][T13081] device veth0_vlan left promiscuous mode [ 642.212303][T13081] device veth0_vlan entered promiscuous mode [ 642.317272][T13088] bridge0: port 3(team_slave_1) entered blocking state [ 642.324206][T13088] bridge0: port 3(team_slave_1) entered disabled state [ 642.332196][T13088] device team_slave_1 entered promiscuous mode [ 642.529155][T13093] device veth0_vlan left promiscuous mode [ 642.547320][T13093] device veth0_vlan entered promiscuous mode [ 642.643264][T13099] device sit0 entered promiscuous mode [ 643.805774][T13124] device veth0_vlan left promiscuous mode [ 643.868619][T13124] device veth0_vlan entered promiscuous mode [ 647.060215][T13212] device veth0_vlan left promiscuous mode [ 647.131011][T13212] device veth0_vlan entered promiscuous mode [ 647.685394][T13228] device veth0_vlan left promiscuous mode [ 647.752230][T13228] device veth0_vlan entered promiscuous mode [ 647.988140][ T304] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 648.016727][ T304] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 648.043825][ T304] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 649.164374][T13264] device veth0_vlan left promiscuous mode [ 649.261540][T13264] device veth0_vlan entered promiscuous mode [ 649.437600][T13266] device sit0 left promiscuous mode [ 649.468776][T13273] FAULT_INJECTION: forcing a failure. [ 649.468776][T13273] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 649.479379][T13267] device sit0 entered promiscuous mode [ 649.489411][T13273] CPU: 1 PID: 13273 Comm: syz.0.4059 Not tainted 6.1.134-syzkaller-00014-g3cd01bb5bd37 #0 [ 649.499341][T13273] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/19/2025 [ 649.509497][T13273] Call Trace: [ 649.512843][T13273] [ 649.515783][T13273] __dump_stack+0x21/0x24 [ 649.520139][T13273] dump_stack_lvl+0xee/0x150 [ 649.524755][T13273] ? __cfi_dump_stack_lvl+0x8/0x8 [ 649.529828][T13273] ? migrate_enable+0x19c/0x280 [ 649.534701][T13273] dump_stack+0x15/0x24 [ 649.538880][T13273] should_fail_ex+0x3d4/0x520 [ 649.543585][T13273] should_fail+0xb/0x10 [ 649.547757][T13273] should_fail_usercopy+0x1a/0x20 [ 649.552795][T13273] _copy_from_user+0x1e/0xc0 [ 649.557405][T13273] generic_map_update_batch+0x4b1/0x780 [ 649.562979][T13273] ? __cfi_generic_map_update_batch+0x10/0x10 [ 649.569078][T13273] ? __fdget+0x19c/0x220 [ 649.573343][T13273] ? __cfi_generic_map_update_batch+0x10/0x10 [ 649.579431][T13273] bpf_map_do_batch+0x48c/0x620 [ 649.584304][T13273] __sys_bpf+0x624/0x780 [ 649.588574][T13273] ? bpf_link_show_fdinfo+0x320/0x320 [ 649.594017][T13273] ? __cfi_ksys_write+0x10/0x10 [ 649.598887][T13273] ? debug_smp_processor_id+0x17/0x20 [ 649.604261][T13273] __x64_sys_bpf+0x7c/0x90 [ 649.608684][T13273] x64_sys_call+0x488/0x9a0 [ 649.613187][T13273] do_syscall_64+0x4c/0xa0 [ 649.617601][T13273] ? clear_bhb_loop+0x15/0x70 [ 649.622289][T13273] ? clear_bhb_loop+0x15/0x70 [ 649.626965][T13273] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 649.632860][T13273] RIP: 0033:0x7ff541d8e969 [ 649.637270][T13273] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 649.657219][T13273] RSP: 002b:00007ff542cda038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 649.665629][T13273] RAX: ffffffffffffffda RBX: 00007ff541fb5fa0 RCX: 00007ff541d8e969 [ 649.673594][T13273] RDX: 0000000000000038 RSI: 0000200000000900 RDI: 000000000000001a [ 649.681564][T13273] RBP: 00007ff542cda090 R08: 0000000000000000 R09: 0000000000000000 [ 649.689527][T13273] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 649.697492][T13273] R13: 0000000000000000 R14: 00007ff541fb5fa0 R15: 00007ffe631fa598 [ 649.705466][T13273] [ 649.862390][T13280] device veth0_vlan left promiscuous mode [ 649.901617][T13280] device veth0_vlan entered promiscuous mode [ 650.333834][T13290] device sit0 left promiscuous mode [ 651.384011][T13311] device sit0 left promiscuous mode [ 651.510260][T13312] device sit0 entered promiscuous mode [ 651.693009][T13318] device pim6reg1 entered promiscuous mode [ 653.057135][T13367] device sit0 left promiscuous mode [ 653.173708][T13367] device sit0 entered promiscuous mode [ 655.030027][T13411] device veth0_vlan left promiscuous mode [ 655.088841][T13411] device veth0_vlan entered promiscuous mode [ 655.163108][T13415] device sit0 entered promiscuous mode [ 655.422151][T13418] device veth0_vlan left promiscuous mode [ 655.467383][T13418] device veth0_vlan entered promiscuous mode [ 655.508282][ T407] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 655.517615][ T407] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 655.526625][ T407] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 656.759182][T13446] device sit0 left promiscuous mode [ 656.817178][T13446] device sit0 entered promiscuous mode [ 657.022184][T13448] device veth0_vlan left promiscuous mode [ 657.041700][T13448] device veth0_vlan entered promiscuous mode [ 657.160304][T13459] device veth0_vlan left promiscuous mode [ 657.222530][T13459] device veth0_vlan entered promiscuous mode [ 657.335384][T13472] device pim6reg1 entered promiscuous mode [ 657.532794][T13477] device veth1_macvtap left promiscuous mode [ 657.539409][T13477] device macsec0 left promiscuous mode [ 657.775728][T13492] FAULT_INJECTION: forcing a failure. [ 657.775728][T13492] name failslab, interval 1, probability 0, space 0, times 0 [ 657.789529][T13492] CPU: 1 PID: 13492 Comm: syz.4.4131 Not tainted 6.1.134-syzkaller-00014-g3cd01bb5bd37 #0 [ 657.799545][T13492] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/19/2025 [ 657.809623][T13492] Call Trace: [ 657.812918][T13492] [ 657.815861][T13492] __dump_stack+0x21/0x24 [ 657.820211][T13492] dump_stack_lvl+0xee/0x150 [ 657.824819][T13492] ? __cfi_dump_stack_lvl+0x8/0x8 [ 657.829866][T13492] dump_stack+0x15/0x24 [ 657.834038][T13492] should_fail_ex+0x3d4/0x520 [ 657.838736][T13492] ? __alloc_file+0x28/0x2a0 [ 657.843339][T13492] __should_failslab+0xac/0xf0 [ 657.848113][T13492] should_failslab+0x9/0x20 [ 657.852633][T13492] kmem_cache_alloc+0x3b/0x330 [ 657.857409][T13492] ? __cfi__raw_spin_lock+0x10/0x10 [ 657.862624][T13492] __alloc_file+0x28/0x2a0 [ 657.867057][T13492] alloc_empty_file+0x97/0x180 [ 657.871832][T13492] alloc_file+0x59/0x640 [ 657.876086][T13492] alloc_file_pseudo+0x17a/0x1f0 [ 657.881039][T13492] ? __cfi_alloc_file_pseudo+0x10/0x10 [ 657.886521][T13492] sock_alloc_file+0xba/0x270 [ 657.891216][T13492] __sys_socketpair+0x2d5/0x5b0 [ 657.896091][T13492] __x64_sys_socketpair+0x9b/0xb0 [ 657.901128][T13492] x64_sys_call+0x6e/0x9a0 [ 657.905561][T13492] do_syscall_64+0x4c/0xa0 [ 657.909999][T13492] ? clear_bhb_loop+0x15/0x70 [ 657.914776][T13492] ? clear_bhb_loop+0x15/0x70 [ 657.919463][T13492] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 657.925375][T13492] RIP: 0033:0x7fbeb958e969 [ 657.929839][T13492] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 657.950076][T13492] RSP: 002b:00007fbeba457038 EFLAGS: 00000246 ORIG_RAX: 0000000000000035 [ 657.958508][T13492] RAX: ffffffffffffffda RBX: 00007fbeb97b5fa0 RCX: 00007fbeb958e969 [ 657.966574][T13492] RDX: 0000000000000000 RSI: 0000000000000001 RDI: 000000000000001e [ 657.974556][T13492] RBP: 00007fbeba457090 R08: 0000000000000000 R09: 0000000000000000 [ 657.982534][T13492] R10: 0000200000000040 R11: 0000000000000246 R12: 0000000000000002 [ 657.990511][T13492] R13: 0000000000000000 R14: 00007fbeb97b5fa0 R15: 00007fffc5bf9758 [ 657.998497][T13492] [ 658.075984][T13504] device pim6reg1 entered promiscuous mode [ 658.677290][T13515] device veth0_vlan left promiscuous mode [ 658.741618][T13515] device veth0_vlan entered promiscuous mode [ 659.280353][T13539] device veth0_vlan left promiscuous mode [ 659.345578][T13539] device veth0_vlan entered promiscuous mode [ 659.378177][T13546] device pim6reg1 entered promiscuous mode [ 659.386972][T13548] device pim6reg1 entered promiscuous mode [ 659.464247][T13552] bond_slave_1: mtu less than device minimum [ 660.124344][T13583] device veth0_vlan left promiscuous mode [ 660.133065][T13583] device veth0_vlan entered promiscuous mode [ 660.213019][T13589] FAULT_INJECTION: forcing a failure. [ 660.213019][T13589] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 660.226376][T13589] CPU: 1 PID: 13589 Comm: syz.3.4164 Not tainted 6.1.134-syzkaller-00014-g3cd01bb5bd37 #0 [ 660.236383][T13589] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/19/2025 [ 660.246430][T13589] Call Trace: [ 660.249699][T13589] [ 660.252625][T13589] __dump_stack+0x21/0x24 [ 660.256950][T13589] dump_stack_lvl+0xee/0x150 [ 660.261534][T13589] ? __cfi_dump_stack_lvl+0x8/0x8 [ 660.266553][T13589] ? migrate_enable+0x19c/0x280 [ 660.271396][T13589] dump_stack+0x15/0x24 [ 660.275547][T13589] should_fail_ex+0x3d4/0x520 [ 660.280216][T13589] should_fail+0xb/0x10 [ 660.284386][T13589] should_fail_usercopy+0x1a/0x20 [ 660.289400][T13589] _copy_from_user+0x1e/0xc0 [ 660.293981][T13589] generic_map_update_batch+0x4b1/0x780 [ 660.299522][T13589] ? __cfi_generic_map_update_batch+0x10/0x10 [ 660.305612][T13589] ? __fdget+0x19c/0x220 [ 660.309945][T13589] ? __cfi_generic_map_update_batch+0x10/0x10 [ 660.316004][T13589] bpf_map_do_batch+0x48c/0x620 [ 660.320849][T13589] __sys_bpf+0x624/0x780 [ 660.325104][T13589] ? bpf_link_show_fdinfo+0x320/0x320 [ 660.330522][T13589] ? __cfi_ksys_write+0x10/0x10 [ 660.335385][T13589] ? debug_smp_processor_id+0x17/0x20 [ 660.340791][T13589] __x64_sys_bpf+0x7c/0x90 [ 660.345208][T13589] x64_sys_call+0x488/0x9a0 [ 660.349703][T13589] do_syscall_64+0x4c/0xa0 [ 660.354200][T13589] ? clear_bhb_loop+0x15/0x70 [ 660.358864][T13589] ? clear_bhb_loop+0x15/0x70 [ 660.363554][T13589] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 660.369443][T13589] RIP: 0033:0x7f01c1b8e969 [ 660.373851][T13589] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 660.393448][T13589] RSP: 002b:00007f01c29a4038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 660.401865][T13589] RAX: ffffffffffffffda RBX: 00007f01c1db5fa0 RCX: 00007f01c1b8e969 [ 660.409839][T13589] RDX: 0000000000000038 RSI: 0000200000000900 RDI: 000000000000001a [ 660.417819][T13589] RBP: 00007f01c29a4090 R08: 0000000000000000 R09: 0000000000000000 [ 660.425825][T13589] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 660.433797][T13589] R13: 0000000000000000 R14: 00007f01c1db5fa0 R15: 00007ffc61b12478 [ 660.441825][T13589] [ 660.462907][T13592] device pim6reg1 entered promiscuous mode [ 660.509949][T13602] device sit0 left promiscuous mode [ 660.536106][T13602] device sit0 entered promiscuous mode [ 660.779268][T13613] bond_slave_1: mtu less than device minimum [ 660.958050][T13615] device veth0_vlan left promiscuous mode [ 661.159476][T13615] device veth0_vlan entered promiscuous mode [ 661.437893][ T304] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 661.461581][ T304] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 661.511823][ T304] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 661.572225][T13624] device veth0_vlan left promiscuous mode [ 661.594680][T13624] device veth0_vlan entered promiscuous mode [ 661.791210][ T304] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 661.809462][ T304] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 661.855025][ T304] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 661.912018][T13634] device pim6reg1 entered promiscuous mode [ 663.168973][T13651] device sit0 left promiscuous mode [ 663.203735][T13651] device sit0 entered promiscuous mode [ 663.768603][T13666] device sit0 left promiscuous mode [ 663.876612][T13666] device sit0 entered promiscuous mode [ 664.150504][T13678] device pim6reg1 entered promiscuous mode [ 664.280842][T13685] device veth0_vlan left promiscuous mode [ 664.355098][T13685] device veth0_vlan entered promiscuous mode [ 664.879975][T13699] bond_slave_1: mtu less than device minimum [ 665.084303][T13719] FAULT_INJECTION: forcing a failure. [ 665.084303][T13719] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 665.108242][T13719] CPU: 0 PID: 13719 Comm: syz.1.4206 Not tainted 6.1.134-syzkaller-00014-g3cd01bb5bd37 #0 [ 665.118189][T13719] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/19/2025 [ 665.128379][T13719] Call Trace: [ 665.131677][T13719] [ 665.134620][T13719] __dump_stack+0x21/0x24 [ 665.139149][T13719] dump_stack_lvl+0xee/0x150 [ 665.143766][T13719] ? __cfi_dump_stack_lvl+0x8/0x8 [ 665.148815][T13719] ? migrate_enable+0x19c/0x280 [ 665.153686][T13719] dump_stack+0x15/0x24 [ 665.157866][T13719] should_fail_ex+0x3d4/0x520 [ 665.162562][T13719] should_fail+0xb/0x10 [ 665.166789][T13719] should_fail_usercopy+0x1a/0x20 [ 665.171842][T13719] _copy_to_user+0x1e/0x90 [ 665.176294][T13719] generic_map_lookup_batch+0x730/0xa90 [ 665.181866][T13719] ? __cfi_generic_map_lookup_batch+0x10/0x10 [ 665.187958][T13719] ? __fdget+0x19c/0x220 [ 665.192229][T13719] ? __cfi_generic_map_lookup_batch+0x10/0x10 [ 665.198319][T13719] bpf_map_do_batch+0x2e8/0x620 [ 665.203237][T13719] ? security_bpf+0x93/0xb0 [ 665.207768][T13719] __sys_bpf+0x624/0x780 [ 665.212038][T13719] ? bpf_link_show_fdinfo+0x320/0x320 [ 665.217439][T13719] ? __cfi_sched_clock_cpu+0x10/0x10 [ 665.222833][T13719] __x64_sys_bpf+0x7c/0x90 [ 665.227283][T13719] x64_sys_call+0x488/0x9a0 [ 665.231804][T13719] do_syscall_64+0x4c/0xa0 [ 665.236242][T13719] ? clear_bhb_loop+0x15/0x70 [ 665.240957][T13719] ? clear_bhb_loop+0x15/0x70 [ 665.245651][T13719] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 665.251567][T13719] RIP: 0033:0x7f01b078e969 [ 665.256002][T13719] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 665.275631][T13719] RSP: 002b:00007f01b16e1038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 665.284070][T13719] RAX: ffffffffffffffda RBX: 00007f01b09b5fa0 RCX: 00007f01b078e969 [ 665.292042][T13719] RDX: 0000000000000038 RSI: 00002000000003c0 RDI: 0000000000000018 [ 665.300007][T13719] RBP: 00007f01b16e1090 R08: 0000000000000000 R09: 0000000000000000 [ 665.307975][T13719] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 665.315947][T13719] R13: 0000000000000000 R14: 00007f01b09b5fa0 R15: 00007ffe55ef76a8 [ 665.324006][T13719] [ 665.405936][T13732] device pim6reg1 entered promiscuous mode [ 665.536028][T13746] device sit0 left promiscuous mode [ 665.661223][T13748] device veth0_vlan left promiscuous mode [ 665.826620][T13748] device veth0_vlan entered promiscuous mode [ 666.454672][T13784] device pim6reg1 entered promiscuous mode [ 666.698127][T13791] device sit0 left promiscuous mode [ 666.799731][T13793] device sit0 entered promiscuous mode [ 667.024102][T13795] device veth0_vlan left promiscuous mode [ 667.167480][T13795] device veth0_vlan entered promiscuous mode [ 667.395154][ T304] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 667.405262][ T304] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 667.413240][ T304] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 667.890727][T13820] bond_slave_1: mtu less than device minimum [ 667.907821][T13819] device pim6reg1 entered promiscuous mode [ 668.235443][T13835] bond_slave_1: mtu less than device minimum [ 668.288595][T13834] bond_slave_1: mtu less than device minimum [ 668.738583][T13843] device veth0_vlan left promiscuous mode [ 668.845144][T13843] device veth0_vlan entered promiscuous mode [ 669.040397][T13852] device sit0 left promiscuous mode [ 669.050935][ T28] audit: type=1400 audit(1747296842.065:147): avc: denied { create } for pid=13859 comm="syz.4.4246" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 669.093751][T13854] device sit0 entered promiscuous mode [ 669.489658][T13874] device veth0_vlan left promiscuous mode [ 669.627054][T13874] device veth0_vlan entered promiscuous mode [ 669.938373][ T304] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 669.989891][ T304] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 670.039574][ T304] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 670.201236][T13895] device veth0_vlan left promiscuous mode [ 670.320643][T13895] device veth0_vlan entered promiscuous mode [ 670.749682][T13898] device sit0 left promiscuous mode [ 670.859744][T13909] device pim6reg1 entered promiscuous mode [ 671.360300][T13943] device sit0 left promiscuous mode [ 671.455373][T13943] device sit0 entered promiscuous mode [ 672.751545][T13976] device veth0_vlan left promiscuous mode [ 672.876424][T13976] device veth0_vlan entered promiscuous mode [ 672.909530][ T407] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 672.919781][ T407] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 672.928002][ T407] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 673.165148][T13992] device sit0 left promiscuous mode [ 673.453057][T13993] device sit0 entered promiscuous mode [ 673.466765][T14001] bond_slave_1: mtu less than device minimum [ 673.795845][T14020] device veth0_vlan left promiscuous mode [ 673.918283][T14020] device veth0_vlan entered promiscuous mode [ 674.263132][ T304] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 674.274223][ T304] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 674.286097][ T304] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 674.384820][T14026] device sit0 left promiscuous mode [ 674.470614][T14026] device sit0 entered promiscuous mode [ 675.055356][T14062] device veth0_vlan left promiscuous mode [ 675.065271][T14062] device veth0_vlan entered promiscuous mode [ 675.077749][ T304] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 675.086654][ T304] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 675.095416][ T304] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 675.145676][T14065] device veth0_vlan left promiscuous mode [ 675.160094][T14065] device veth0_vlan entered promiscuous mode [ 675.218004][T14073] device sit0 left promiscuous mode [ 675.250497][T14073] device sit0 entered promiscuous mode [ 676.733593][T14117] device veth0_vlan left promiscuous mode [ 676.799086][T14117] device veth0_vlan entered promiscuous mode [ 676.934896][ T304] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 676.950138][ T304] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 676.968813][ T304] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 677.386910][T14126] FAULT_INJECTION: forcing a failure. [ 677.386910][T14126] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 677.414336][T14126] CPU: 1 PID: 14126 Comm: syz.2.4330 Not tainted 6.1.134-syzkaller-00014-g3cd01bb5bd37 #0 [ 677.424286][T14126] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/19/2025 [ 677.434539][T14126] Call Trace: [ 677.437833][T14126] [ 677.440772][T14126] __dump_stack+0x21/0x24 [ 677.445225][T14126] dump_stack_lvl+0xee/0x150 [ 677.449836][T14126] ? __cfi_dump_stack_lvl+0x8/0x8 [ 677.455054][T14126] ? migrate_enable+0x19c/0x280 [ 677.459921][T14126] dump_stack+0x15/0x24 [ 677.464100][T14126] should_fail_ex+0x3d4/0x520 [ 677.468811][T14126] should_fail+0xb/0x10 [ 677.473168][T14126] should_fail_usercopy+0x1a/0x20 [ 677.478209][T14126] _copy_to_user+0x1e/0x90 [ 677.482716][T14126] generic_map_lookup_batch+0x6c8/0xa90 [ 677.488280][T14126] ? __cfi_generic_map_lookup_batch+0x10/0x10 [ 677.494355][T14126] ? __fdget+0x19c/0x220 [ 677.498606][T14126] ? __cfi_generic_map_lookup_batch+0x10/0x10 [ 677.504681][T14126] bpf_map_do_batch+0x2e8/0x620 [ 677.509532][T14126] ? security_bpf+0x93/0xb0 [ 677.514038][T14126] __sys_bpf+0x624/0x780 [ 677.518289][T14126] ? bpf_link_show_fdinfo+0x320/0x320 [ 677.523677][T14126] ? __cfi_sched_clock_cpu+0x10/0x10 [ 677.528969][T14126] __x64_sys_bpf+0x7c/0x90 [ 677.533387][T14126] x64_sys_call+0x488/0x9a0 [ 677.537888][T14126] do_syscall_64+0x4c/0xa0 [ 677.542316][T14126] ? clear_bhb_loop+0x15/0x70 [ 677.546991][T14126] ? clear_bhb_loop+0x15/0x70 [ 677.551662][T14126] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 677.557559][T14126] RIP: 0033:0x7f528bb8e969 [ 677.562008][T14126] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 677.581616][T14126] RSP: 002b:00007f528c91d038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 677.590030][T14126] RAX: ffffffffffffffda RBX: 00007f528bdb5fa0 RCX: 00007f528bb8e969 [ 677.598000][T14126] RDX: 0000000000000038 RSI: 00002000000003c0 RDI: 0000000000000018 [ 677.605970][T14126] RBP: 00007f528c91d090 R08: 0000000000000000 R09: 0000000000000000 [ 677.613967][T14126] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 677.622023][T14126] R13: 0000000000000000 R14: 00007f528bdb5fa0 R15: 00007ffc8eb21748 [ 677.630086][T14126] [ 677.746518][T14128] device veth0_vlan left promiscuous mode [ 677.773054][T14128] device veth0_vlan entered promiscuous mode [ 677.874288][T12072] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 677.924407][T12072] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 677.993172][T12072] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 679.076259][T14160] device veth0_vlan left promiscuous mode [ 679.145869][T14160] device veth0_vlan entered promiscuous mode [ 679.521050][T14176] FAULT_INJECTION: forcing a failure. [ 679.521050][T14176] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 679.551682][T14176] CPU: 0 PID: 14176 Comm: syz.3.4347 Not tainted 6.1.134-syzkaller-00014-g3cd01bb5bd37 #0 [ 679.561629][T14176] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/19/2025 [ 679.571702][T14176] Call Trace: [ 679.575019][T14176] [ 679.577958][T14176] __dump_stack+0x21/0x24 [ 679.582318][T14176] dump_stack_lvl+0xee/0x150 [ 679.586928][T14176] ? __cfi_dump_stack_lvl+0x8/0x8 [ 679.591978][T14176] dump_stack+0x15/0x24 [ 679.596162][T14176] should_fail_ex+0x3d4/0x520 [ 679.600860][T14176] should_fail+0xb/0x10 [ 679.605038][T14176] should_fail_usercopy+0x1a/0x20 [ 679.610118][T14176] _copy_to_user+0x1e/0x90 [ 679.614562][T14176] simple_read_from_buffer+0xe9/0x160 [ 679.619963][T14176] proc_fail_nth_read+0x19a/0x210 [ 679.625019][T14176] ? __cfi_proc_fail_nth_read+0x10/0x10 [ 679.630606][T14176] ? security_file_permission+0x94/0xb0 [ 679.636176][T14176] ? __cfi_proc_fail_nth_read+0x10/0x10 [ 679.641755][T14176] vfs_read+0x26e/0x8c0 [ 679.646115][T14176] ? __cfi_vfs_read+0x10/0x10 [ 679.650824][T14176] ? __kasan_check_write+0x14/0x20 [ 679.655967][T14176] ? mutex_lock+0x8d/0x1a0 [ 679.660417][T14176] ? __cfi_mutex_lock+0x10/0x10 [ 679.665303][T14176] ? __fdget_pos+0x2cd/0x380 [ 679.669915][T14176] ? ksys_read+0x71/0x240 [ 679.674270][T14176] ksys_read+0x140/0x240 [ 679.678627][T14176] ? fd_install+0x169/0x2a0 [ 679.683166][T14176] ? __cfi_ksys_read+0x10/0x10 [ 679.687954][T14176] ? debug_smp_processor_id+0x17/0x20 [ 679.693347][T14176] __x64_sys_read+0x7b/0x90 [ 679.697882][T14176] x64_sys_call+0x2f/0x9a0 [ 679.702314][T14176] do_syscall_64+0x4c/0xa0 [ 679.706740][T14176] ? clear_bhb_loop+0x15/0x70 [ 679.711411][T14176] ? clear_bhb_loop+0x15/0x70 [ 679.716169][T14176] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 679.722068][T14176] RIP: 0033:0x7f01c1b8d37c [ 679.726478][T14176] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 93 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 ef 93 02 00 48 [ 679.746079][T14176] RSP: 002b:00007f01c29a4030 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 679.754496][T14176] RAX: ffffffffffffffda RBX: 00007f01c1db5fa0 RCX: 00007f01c1b8d37c [ 679.762466][T14176] RDX: 000000000000000f RSI: 00007f01c29a40a0 RDI: 000000000000000a [ 679.770433][T14176] RBP: 00007f01c29a4090 R08: 0000000000000000 R09: 0000000000000000 [ 679.778408][T14176] R10: 0000200000000040 R11: 0000000000000246 R12: 0000000000000002 [ 679.786375][T14176] R13: 0000000000000000 R14: 00007f01c1db5fa0 R15: 00007ffc61b12478 [ 679.794351][T14176] [ 679.846541][T14172] device sit0 entered promiscuous mode [ 681.747621][T14232] device sit0 entered promiscuous mode [ 682.855230][T14262] device macsec0 left promiscuous mode [ 684.124389][T14292] device sit0 left promiscuous mode [ 684.226795][T14294] device sit0 entered promiscuous mode [ 684.428377][T14296] bond_slave_1: mtu less than device minimum [ 684.640666][T14307] FAULT_INJECTION: forcing a failure. [ 684.640666][T14307] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 684.749501][T14307] CPU: 1 PID: 14307 Comm: syz.4.4386 Not tainted 6.1.134-syzkaller-00014-g3cd01bb5bd37 #0 [ 684.759448][T14307] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/19/2025 [ 684.769522][T14307] Call Trace: [ 684.772903][T14307] [ 684.775848][T14307] __dump_stack+0x21/0x24 [ 684.780291][T14307] dump_stack_lvl+0xee/0x150 [ 684.784903][T14307] ? __cfi_dump_stack_lvl+0x8/0x8 [ 684.789965][T14307] dump_stack+0x15/0x24 [ 684.794146][T14307] should_fail_ex+0x3d4/0x520 [ 684.798842][T14307] should_fail+0xb/0x10 [ 684.803015][T14307] should_fail_usercopy+0x1a/0x20 [ 684.808057][T14307] _copy_from_user+0x1e/0xc0 [ 684.812665][T14307] sock_do_ioctl+0x186/0x310 [ 684.817273][T14307] ? sock_show_fdinfo+0xb0/0xb0 [ 684.822141][T14307] ? selinux_file_ioctl+0x377/0x480 [ 684.827363][T14307] sock_ioctl+0x4d8/0x6e0 [ 684.831724][T14307] ? __cfi_sock_ioctl+0x10/0x10 [ 684.836595][T14307] ? __fget_files+0x2d5/0x330 [ 684.841305][T14307] ? security_file_ioctl+0x95/0xc0 [ 684.846442][T14307] ? __cfi_sock_ioctl+0x10/0x10 [ 684.851316][T14307] __se_sys_ioctl+0x12f/0x1b0 [ 684.856024][T14307] __x64_sys_ioctl+0x7b/0x90 [ 684.860644][T14307] x64_sys_call+0x58b/0x9a0 [ 684.865167][T14307] do_syscall_64+0x4c/0xa0 [ 684.869691][T14307] ? clear_bhb_loop+0x15/0x70 [ 684.874394][T14307] ? clear_bhb_loop+0x15/0x70 [ 684.879090][T14307] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 684.885017][T14307] RIP: 0033:0x7fbeb958e969 [ 684.889454][T14307] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 684.909691][T14307] RSP: 002b:00007fbeba457038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 684.918179][T14307] RAX: ffffffffffffffda RBX: 00007fbeb97b5fa0 RCX: 00007fbeb958e969 [ 684.926173][T14307] RDX: 0000200000000100 RSI: 0000000000008914 RDI: 0000000000000008 [ 684.934169][T14307] RBP: 00007fbeba457090 R08: 0000000000000000 R09: 0000000000000000 [ 684.942169][T14307] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 684.950174][T14307] R13: 0000000000000000 R14: 00007fbeb97b5fa0 R15: 00007fffc5bf9758 [ 684.958187][T14307] [ 685.037226][T14314] device pim6reg1 entered promiscuous mode [ 685.044110][T14312] device pim6reg1 entered promiscuous mode [ 685.568240][T14331] device sit0 left promiscuous mode [ 685.636951][T14333] device sit0 entered promiscuous mode [ 686.585118][T14365] device syzkaller0 entered promiscuous mode [ 686.612013][T14364] device sit0 left promiscuous mode [ 686.759096][T14371] device sit0 entered promiscuous mode [ 687.583870][T14384] device veth0_vlan left promiscuous mode [ 687.605172][T14384] device veth0_vlan entered promiscuous mode [ 687.724551][T14389] FAULT_INJECTION: forcing a failure. [ 687.724551][T14389] name failslab, interval 1, probability 0, space 0, times 0 [ 687.737419][T14389] CPU: 0 PID: 14389 Comm: syz.0.4413 Not tainted 6.1.134-syzkaller-00014-g3cd01bb5bd37 #0 [ 687.747340][T14389] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/19/2025 [ 687.757411][T14389] Call Trace: [ 687.760705][T14389] [ 687.763646][T14389] __dump_stack+0x21/0x24 [ 687.768000][T14389] dump_stack_lvl+0xee/0x150 [ 687.772607][T14389] ? __cfi_dump_stack_lvl+0x8/0x8 [ 687.777659][T14389] dump_stack+0x15/0x24 [ 687.781834][T14389] should_fail_ex+0x3d4/0x520 [ 687.786536][T14389] __should_failslab+0xac/0xf0 [ 687.791382][T14389] should_failslab+0x9/0x20 [ 687.795918][T14389] kmem_cache_alloc_node+0x42/0x340 [ 687.801148][T14389] ? perf_event_alloc+0x118/0x1970 [ 687.806289][T14389] ? _find_next_zero_bit+0x8d/0x140 [ 687.811512][T14389] perf_event_alloc+0x118/0x1970 [ 687.816483][T14389] ? alloc_fd+0x4e6/0x590 [ 687.820850][T14389] __se_sys_perf_event_open+0x5ae/0x1b80 [ 687.826517][T14389] ? __kasan_check_write+0x14/0x20 [ 687.831667][T14389] ? mutex_unlock+0x89/0x220 [ 687.836301][T14389] ? __x64_sys_perf_event_open+0xd0/0xd0 [ 687.842055][T14389] ? __cfi_ksys_write+0x10/0x10 [ 687.846936][T14389] __x64_sys_perf_event_open+0xbf/0xd0 [ 687.852513][T14389] x64_sys_call+0x385/0x9a0 [ 687.857038][T14389] do_syscall_64+0x4c/0xa0 [ 687.861466][T14389] ? clear_bhb_loop+0x15/0x70 [ 687.866146][T14389] ? clear_bhb_loop+0x15/0x70 [ 687.870825][T14389] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 687.876986][T14389] RIP: 0033:0x7ff541d8e969 [ 687.881405][T14389] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 687.901022][T14389] RSP: 002b:00007ff542cda038 EFLAGS: 00000246 ORIG_RAX: 000000000000012a [ 687.909442][T14389] RAX: ffffffffffffffda RBX: 00007ff541fb5fa0 RCX: 00007ff541d8e969 [ 687.917419][T14389] RDX: 0000000000000000 RSI: ffffffffffffffff RDI: 0000200000000000 [ 687.925410][T14389] RBP: 00007ff542cda090 R08: 0000000000000000 R09: 0000000000000000 [ 687.933386][T14389] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000001 [ 687.941354][T14389] R13: 0000000000000000 R14: 00007ff541fb5fa0 R15: 00007ffe631fa598 [ 687.949330][T14389] [ 689.571176][T14435] bond_slave_1: mtu less than device minimum [ 690.176499][T14443] device veth0_vlan left promiscuous mode [ 690.208423][T14443] device veth0_vlan entered promiscuous mode [ 690.665495][T14445] device syzkaller0 entered promiscuous mode [ 690.860734][ T28] audit: type=1400 audit(1747296863.875:148): avc: denied { create } for pid=14461 comm="syz.1.4438" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=ax25_socket permissive=1 [ 692.143399][T14495] device sit0 left promiscuous mode [ 692.218629][T14495] device sit0 entered promiscuous mode [ 693.533094][T14530] FAULT_INJECTION: forcing a failure. [ 693.533094][T14530] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 693.618884][T14530] CPU: 1 PID: 14530 Comm: syz.1.4460 Not tainted 6.1.134-syzkaller-00014-g3cd01bb5bd37 #0 [ 693.628926][T14530] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/19/2025 [ 693.639097][T14530] Call Trace: [ 693.642397][T14530] [ 693.645344][T14530] __dump_stack+0x21/0x24 [ 693.649700][T14530] dump_stack_lvl+0xee/0x150 [ 693.654304][T14530] ? __cfi_dump_stack_lvl+0x8/0x8 [ 693.659339][T14530] ? migrate_enable+0x19c/0x280 [ 693.664188][T14530] dump_stack+0x15/0x24 [ 693.668346][T14530] should_fail_ex+0x3d4/0x520 [ 693.673024][T14530] should_fail+0xb/0x10 [ 693.677180][T14530] should_fail_usercopy+0x1a/0x20 [ 693.682201][T14530] _copy_from_user+0x1e/0xc0 [ 693.686792][T14530] generic_map_update_batch+0x458/0x780 [ 693.692344][T14530] ? __cfi_generic_map_update_batch+0x10/0x10 [ 693.698414][T14530] ? __fdget+0x19c/0x220 [ 693.702662][T14530] ? __cfi_generic_map_update_batch+0x10/0x10 [ 693.708728][T14530] bpf_map_do_batch+0x48c/0x620 [ 693.713575][T14530] __sys_bpf+0x624/0x780 [ 693.717824][T14530] ? bpf_link_show_fdinfo+0x320/0x320 [ 693.723302][T14530] ? __cfi_ksys_write+0x10/0x10 [ 693.728157][T14530] ? debug_smp_processor_id+0x17/0x20 [ 693.733528][T14530] __x64_sys_bpf+0x7c/0x90 [ 693.737947][T14530] x64_sys_call+0x488/0x9a0 [ 693.742540][T14530] do_syscall_64+0x4c/0xa0 [ 693.746958][T14530] ? clear_bhb_loop+0x15/0x70 [ 693.751636][T14530] ? clear_bhb_loop+0x15/0x70 [ 693.756309][T14530] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 693.762205][T14530] RIP: 0033:0x7f01b078e969 [ 693.766627][T14530] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 693.786228][T14530] RSP: 002b:00007f01b16e1038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 693.794643][T14530] RAX: ffffffffffffffda RBX: 00007f01b09b5fa0 RCX: 00007f01b078e969 [ 693.802612][T14530] RDX: 0000000000000038 RSI: 0000200000000900 RDI: 000000000000001a [ 693.810582][T14530] RBP: 00007f01b16e1090 R08: 0000000000000000 R09: 0000000000000000 [ 693.818551][T14530] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 693.826517][T14530] R13: 0000000000000000 R14: 00007f01b09b5fa0 R15: 00007ffe55ef76a8 [ 693.834504][T14530] [ 693.938095][T14536] device veth0_vlan left promiscuous mode [ 693.973095][T14536] device veth0_vlan entered promiscuous mode [ 694.048424][T12390] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 694.058534][T12390] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 694.066289][T12390] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 694.482563][T14571] device sit0 left promiscuous mode [ 694.783104][T14577] device pim6reg1 entered promiscuous mode [ 694.928819][T14580] device sit0 left promiscuous mode [ 695.137752][T14586] device pim6reg1 entered promiscuous mode [ 695.259806][T14594] device veth0_vlan left promiscuous mode [ 695.363478][T14594] device veth0_vlan entered promiscuous mode [ 695.546643][ T304] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 695.557446][ T304] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 695.565509][ T304] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 696.163992][T14622] device sit0 entered promiscuous mode [ 696.271061][T14626] device sit0 left promiscuous mode [ 696.302975][T14629] device sit0 entered promiscuous mode [ 697.542622][T14666] device sit0 entered promiscuous mode [ 698.408962][T14689] bond_slave_1: mtu less than device minimum [ 699.248625][T14716] device sit0 left promiscuous mode [ 699.441882][T14718] device sit0 entered promiscuous mode [ 699.768631][T14726] device veth0_vlan left promiscuous mode [ 699.780468][T14728] FAULT_INJECTION: forcing a failure. [ 699.780468][T14728] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 699.909666][T14728] CPU: 1 PID: 14728 Comm: syz.3.4524 Not tainted 6.1.134-syzkaller-00014-g3cd01bb5bd37 #0 [ 699.919379][T14726] device veth0_vlan entered promiscuous mode [ 699.919612][T14728] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/19/2025 [ 699.919628][T14728] Call Trace: [ 699.919635][T14728] [ 699.919644][T14728] __dump_stack+0x21/0x24 [ 699.919679][T14728] dump_stack_lvl+0xee/0x150 [ 699.919708][T14728] ? __cfi_dump_stack_lvl+0x8/0x8 [ 699.919738][T14728] ? migrate_enable+0x19c/0x280 [ 699.919764][T14728] dump_stack+0x15/0x24 [ 699.919791][T14728] should_fail_ex+0x3d4/0x520 [ 699.919819][T14728] should_fail+0xb/0x10 [ 699.973778][T14728] should_fail_usercopy+0x1a/0x20 [ 699.978829][T14728] _copy_from_user+0x1e/0xc0 [ 699.983439][T14728] generic_map_update_batch+0x4b1/0x780 [ 699.989014][T14728] ? __cfi_generic_map_update_batch+0x10/0x10 [ 699.995089][T14728] ? __fdget+0x19c/0x220 [ 699.999340][T14728] ? __cfi_generic_map_update_batch+0x10/0x10 [ 700.005497][T14728] bpf_map_do_batch+0x48c/0x620 [ 700.010345][T14728] __sys_bpf+0x624/0x780 [ 700.014595][T14728] ? bpf_link_show_fdinfo+0x320/0x320 [ 700.019990][T14728] ? __cfi_ksys_write+0x10/0x10 [ 700.024854][T14728] ? debug_smp_processor_id+0x17/0x20 [ 700.030227][T14728] __x64_sys_bpf+0x7c/0x90 [ 700.034648][T14728] x64_sys_call+0x488/0x9a0 [ 700.039153][T14728] do_syscall_64+0x4c/0xa0 [ 700.043571][T14728] ? clear_bhb_loop+0x15/0x70 [ 700.048260][T14728] ? clear_bhb_loop+0x15/0x70 [ 700.052945][T14728] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 700.058844][T14728] RIP: 0033:0x7f01c1b8e969 [ 700.063255][T14728] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 700.082863][T14728] RSP: 002b:00007f01c29a4038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 700.091305][T14728] RAX: ffffffffffffffda RBX: 00007f01c1db5fa0 RCX: 00007f01c1b8e969 [ 700.099299][T14728] RDX: 0000000000000038 RSI: 0000200000000900 RDI: 000000000000001a [ 700.107283][T14728] RBP: 00007f01c29a4090 R08: 0000000000000000 R09: 0000000000000000 [ 700.115253][T14728] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 700.123226][T14728] R13: 0000000000000000 R14: 00007f01c1db5fa0 R15: 00007ffc61b12478 [ 700.131218][T14728] [ 700.843811][T14760] device sit0 left promiscuous mode [ 701.415019][T14771] device veth0_vlan left promiscuous mode [ 701.539717][T14771] device veth0_vlan entered promiscuous mode [ 701.832612][T14788] device sit0 left promiscuous mode [ 701.959007][T14786] device sit0 entered promiscuous mode [ 702.121248][T14790] device sit0 entered promiscuous mode [ 702.691409][T14813] device sit0 left promiscuous mode [ 702.801292][T14815] device pim6reg1 entered promiscuous mode [ 703.124254][T14825] device veth0_vlan left promiscuous mode [ 703.236900][T14825] device veth0_vlan entered promiscuous mode [ 703.493399][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 703.521662][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 703.568320][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 703.629557][T14827] device veth0_vlan left promiscuous mode [ 703.775300][T14827] device veth0_vlan entered promiscuous mode [ 704.462703][T14871] device sit0 entered promiscuous mode [ 704.592641][T14870] device sit0 left promiscuous mode [ 704.763442][T14878] FAULT_INJECTION: forcing a failure. [ 704.763442][T14878] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 704.837312][T14878] CPU: 0 PID: 14878 Comm: syz.3.4570 Not tainted 6.1.134-syzkaller-00014-g3cd01bb5bd37 #0 [ 704.847265][T14878] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/19/2025 [ 704.857342][T14878] Call Trace: [ 704.860649][T14878] [ 704.863594][T14878] __dump_stack+0x21/0x24 [ 704.867956][T14878] dump_stack_lvl+0xee/0x150 [ 704.872574][T14878] ? __cfi_dump_stack_lvl+0x8/0x8 [ 704.877718][T14878] ? _parse_integer+0x2a/0x40 [ 704.882514][T14878] dump_stack+0x15/0x24 [ 704.886701][T14878] should_fail_ex+0x3d4/0x520 [ 704.891414][T14878] should_fail+0xb/0x10 [ 704.895596][T14878] should_fail_usercopy+0x1a/0x20 [ 704.900641][T14878] _copy_from_user+0x1e/0xc0 [ 704.905258][T14878] ___sys_sendmsg+0x155/0x290 [ 704.910026][T14878] ? __sys_sendmsg+0x270/0x270 [ 704.914818][T14878] ? __kasan_check_write+0x14/0x20 [ 704.919963][T14878] ? proc_fail_nth_write+0x17a/0x1f0 [ 704.925279][T14878] ? vfs_write+0x9d6/0xca0 [ 704.929724][T14878] ? __fdget+0x19c/0x220 [ 704.933993][T14878] __x64_sys_sendmsg+0x1f0/0x2c0 [ 704.938959][T14878] ? __cfi___x64_sys_sendmsg+0x10/0x10 [ 704.944450][T14878] ? fpregs_assert_state_consistent+0xb1/0xe0 [ 704.950541][T14878] x64_sys_call+0x171/0x9a0 [ 704.955325][T14878] do_syscall_64+0x4c/0xa0 [ 704.959764][T14878] ? clear_bhb_loop+0x15/0x70 [ 704.964455][T14878] ? clear_bhb_loop+0x15/0x70 [ 704.969151][T14878] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 704.975168][T14878] RIP: 0033:0x7f01c1b8e969 [ 704.979612][T14878] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 704.999237][T14878] RSP: 002b:00007f01c29a4038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 705.007680][T14878] RAX: ffffffffffffffda RBX: 00007f01c1db5fa0 RCX: 00007f01c1b8e969 [ 705.015672][T14878] RDX: 0000000000000000 RSI: 00002000000029c0 RDI: 0000000000000008 [ 705.023662][T14878] RBP: 00007f01c29a4090 R08: 0000000000000000 R09: 0000000000000000 [ 705.031656][T14878] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 705.039646][T14878] R13: 0000000000000000 R14: 00007f01c1db5fa0 R15: 00007ffc61b12478 [ 705.047640][T14878] [ 705.251610][T14896] FAULT_INJECTION: forcing a failure. [ 705.251610][T14896] name failslab, interval 1, probability 0, space 0, times 0 [ 705.372816][T14896] CPU: 1 PID: 14896 Comm: syz.0.4576 Not tainted 6.1.134-syzkaller-00014-g3cd01bb5bd37 #0 [ 705.382771][T14896] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/19/2025 [ 705.392928][T14896] Call Trace: [ 705.396206][T14896] [ 705.399141][T14896] __dump_stack+0x21/0x24 [ 705.403479][T14896] dump_stack_lvl+0xee/0x150 [ 705.408077][T14896] ? __cfi_dump_stack_lvl+0x8/0x8 [ 705.413109][T14896] ? stack_trace_save+0x98/0xe0 [ 705.418003][T14896] dump_stack+0x15/0x24 [ 705.422162][T14896] should_fail_ex+0x3d4/0x520 [ 705.426841][T14896] __should_failslab+0xac/0xf0 [ 705.431871][T14896] should_failslab+0x9/0x20 [ 705.436404][T14896] kmem_cache_alloc_node+0x42/0x340 [ 705.441637][T14896] ? dup_task_struct+0x5a/0x770 [ 705.446492][T14896] ? cgroup_freezing+0x9c/0xc0 [ 705.451255][T14896] dup_task_struct+0x5a/0x770 [ 705.455939][T14896] ? __kasan_check_write+0x14/0x20 [ 705.461103][T14896] ? recalc_sigpending+0x168/0x1c0 [ 705.466223][T14896] copy_process+0x5ac/0x3470 [ 705.470826][T14896] ? __cfi_kstrtouint_from_user+0x10/0x10 [ 705.476557][T14896] ? __kasan_check_write+0x14/0x20 [ 705.481683][T14896] ? proc_fail_nth_write+0x17a/0x1f0 [ 705.486975][T14896] ? idle_dummy+0x10/0x10 [ 705.491324][T14896] kernel_clone+0x23a/0x810 [ 705.495843][T14896] ? __cfi_kernel_clone+0x10/0x10 [ 705.500959][T14896] ? __kasan_check_write+0x14/0x20 [ 705.506075][T14896] ? mutex_unlock+0x89/0x220 [ 705.510675][T14896] __x64_sys_clone+0x168/0x1b0 [ 705.515445][T14896] ? __cfi___x64_sys_clone+0x10/0x10 [ 705.520740][T14896] ? fpregs_assert_state_consistent+0xb1/0xe0 [ 705.526808][T14896] x64_sys_call+0x990/0x9a0 [ 705.531309][T14896] do_syscall_64+0x4c/0xa0 [ 705.535728][T14896] ? clear_bhb_loop+0x15/0x70 [ 705.540404][T14896] ? clear_bhb_loop+0x15/0x70 [ 705.545117][T14896] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 705.551015][T14896] RIP: 0033:0x7ff541d8e969 [ 705.555427][T14896] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 705.575127][T14896] RSP: 002b:00007ff542cd9fe8 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 705.583542][T14896] RAX: ffffffffffffffda RBX: 00007ff541fb5fa0 RCX: 00007ff541d8e969 [ 705.591513][T14896] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000040000000 [ 705.599484][T14896] RBP: 00007ff542cda090 R08: 0000000000000000 R09: 0000000000000000 [ 705.607454][T14896] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000001 [ 705.615444][T14896] R13: 0000000000000000 R14: 00007ff541fb5fa0 R15: 00007ffe631fa598 [ 705.623442][T14896] [ 705.902461][T14903] device veth0_vlan left promiscuous mode [ 705.921845][T14903] device veth0_vlan entered promiscuous mode [ 705.969799][T14912] device pim6reg1 entered promiscuous mode [ 706.227088][T14917] device veth0_vlan left promiscuous mode [ 706.240380][T14917] device veth0_vlan entered promiscuous mode [ 706.346626][ T407] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 706.386342][ T407] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 706.438478][ T407] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 706.466855][T14937] device sit0 entered promiscuous mode [ 706.621741][T14946] device sit0 left promiscuous mode [ 706.760640][T14947] device sit0 left promiscuous mode [ 707.308428][T14960] device syzkaller0 entered promiscuous mode [ 707.399335][T14976] device veth0_vlan left promiscuous mode [ 707.422893][T14976] device veth0_vlan entered promiscuous mode [ 707.638051][T14998] FAULT_INJECTION: forcing a failure. [ 707.638051][T14998] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 707.719262][T14998] CPU: 1 PID: 14998 Comm: syz.3.4613 Not tainted 6.1.134-syzkaller-00014-g3cd01bb5bd37 #0 [ 707.729203][T14998] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/19/2025 [ 707.739280][T14998] Call Trace: [ 707.742572][T14998] [ 707.745512][T14998] __dump_stack+0x21/0x24 [ 707.749867][T14998] dump_stack_lvl+0xee/0x150 [ 707.754474][T14998] ? __cfi_dump_stack_lvl+0x8/0x8 [ 707.759524][T14998] ? migrate_enable+0x19c/0x280 [ 707.764391][T14998] dump_stack+0x15/0x24 [ 707.768566][T14998] should_fail_ex+0x3d4/0x520 [ 707.773263][T14998] should_fail+0xb/0x10 [ 707.777439][T14998] should_fail_usercopy+0x1a/0x20 [ 707.782479][T14998] _copy_from_user+0x1e/0xc0 [ 707.787091][T14998] generic_map_update_batch+0x4b1/0x780 [ 707.792660][T14998] ? __cfi_generic_map_update_batch+0x10/0x10 [ 707.798749][T14998] ? __fdget+0x19c/0x220 [ 707.803023][T14998] ? __cfi_generic_map_update_batch+0x10/0x10 [ 707.809112][T14998] bpf_map_do_batch+0x48c/0x620 [ 707.813983][T14998] __sys_bpf+0x624/0x780 [ 707.818248][T14998] ? bpf_link_show_fdinfo+0x320/0x320 [ 707.823663][T14998] ? __cfi_ksys_write+0x10/0x10 [ 707.828540][T14998] ? debug_smp_processor_id+0x17/0x20 [ 707.834022][T14998] __x64_sys_bpf+0x7c/0x90 [ 707.838466][T14998] x64_sys_call+0x488/0x9a0 [ 707.842992][T14998] do_syscall_64+0x4c/0xa0 [ 707.847430][T14998] ? clear_bhb_loop+0x15/0x70 [ 707.852117][T14998] ? clear_bhb_loop+0x15/0x70 [ 707.856807][T14998] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 707.862729][T14998] RIP: 0033:0x7f01c1b8e969 [ 707.867156][T14998] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 707.886773][T14998] RSP: 002b:00007f01c29a4038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 707.895209][T14998] RAX: ffffffffffffffda RBX: 00007f01c1db5fa0 RCX: 00007f01c1b8e969 [ 707.903198][T14998] RDX: 0000000000000038 RSI: 0000200000000900 RDI: 000000000000001a [ 707.911178][T14998] RBP: 00007f01c29a4090 R08: 0000000000000000 R09: 0000000000000000 [ 707.919155][T14998] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 707.927133][T14998] R13: 0000000000000000 R14: 00007f01c1db5fa0 R15: 00007ffc61b12478 [ 707.935119][T14998] [ 708.221714][T15013] bond_slave_1: mtu less than device minimum [ 708.896622][T15027] FAULT_INJECTION: forcing a failure. [ 708.896622][T15027] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 708.951469][T15027] CPU: 0 PID: 15027 Comm: syz.3.4622 Not tainted 6.1.134-syzkaller-00014-g3cd01bb5bd37 #0 [ 708.961423][T15027] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/19/2025 [ 708.971674][T15027] Call Trace: [ 708.974986][T15027] [ 708.977929][T15027] __dump_stack+0x21/0x24 [ 708.982283][T15027] dump_stack_lvl+0xee/0x150 [ 708.986895][T15027] ? __cfi_dump_stack_lvl+0x8/0x8 [ 708.991940][T15027] dump_stack+0x15/0x24 [ 708.996115][T15027] should_fail_ex+0x3d4/0x520 [ 709.000814][T15027] should_fail+0xb/0x10 [ 709.004994][T15027] should_fail_usercopy+0x1a/0x20 [ 709.010035][T15027] _copy_from_user+0x1e/0xc0 [ 709.014640][T15027] iovec_from_user+0x1aa/0x2e0 [ 709.019430][T15027] ? _parse_integer+0x2a/0x40 [ 709.024216][T15027] __import_iovec+0x71/0x470 [ 709.028922][T15027] import_iovec+0x7c/0xb0 [ 709.033271][T15027] ___sys_sendmsg+0x1e4/0x290 [ 709.037976][T15027] ? __sys_sendmsg+0x270/0x270 [ 709.042765][T15027] ? __kasan_check_write+0x14/0x20 [ 709.047899][T15027] ? proc_fail_nth_write+0x17a/0x1f0 [ 709.053215][T15027] ? vfs_write+0x9d6/0xca0 [ 709.057655][T15027] ? __fdget+0x19c/0x220 [ 709.061933][T15027] __x64_sys_sendmsg+0x1f0/0x2c0 [ 709.066896][T15027] ? __cfi___x64_sys_sendmsg+0x10/0x10 [ 709.072385][T15027] ? fpregs_assert_state_consistent+0xb1/0xe0 [ 709.078492][T15027] x64_sys_call+0x171/0x9a0 [ 709.083013][T15027] do_syscall_64+0x4c/0xa0 [ 709.087446][T15027] ? clear_bhb_loop+0x15/0x70 [ 709.092133][T15027] ? clear_bhb_loop+0x15/0x70 [ 709.096825][T15027] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 709.102743][T15027] RIP: 0033:0x7f01c1b8e969 [ 709.107183][T15027] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 709.126898][T15027] RSP: 002b:00007f01c29a4038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 709.135433][T15027] RAX: ffffffffffffffda RBX: 00007f01c1db5fa0 RCX: 00007f01c1b8e969 [ 709.143693][T15027] RDX: 0000000000000000 RSI: 00002000000029c0 RDI: 0000000000000008 [ 709.151740][T15027] RBP: 00007f01c29a4090 R08: 0000000000000000 R09: 0000000000000000 [ 709.159740][T15027] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 709.167833][T15027] R13: 0000000000000000 R14: 00007f01c1db5fa0 R15: 00007ffc61b12478 [ 709.175833][T15027] [ 709.307241][T15031] device veth0_vlan left promiscuous mode [ 709.342237][T15031] device veth0_vlan entered promiscuous mode [ 709.456072][T15042] syz.0.4627 uses obsolete (PF_INET,SOCK_PACKET) [ 709.999587][T12072] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 710.018659][T12072] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 710.026588][T12072] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 710.179776][T15061] FAULT_INJECTION: forcing a failure. [ 710.179776][T15061] name failslab, interval 1, probability 0, space 0, times 0 [ 710.192567][T15061] CPU: 1 PID: 15061 Comm: syz.4.4633 Not tainted 6.1.134-syzkaller-00014-g3cd01bb5bd37 #0 [ 710.202484][T15061] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/19/2025 [ 710.212545][T15061] Call Trace: [ 710.215865][T15061] [ 710.218795][T15061] __dump_stack+0x21/0x24 [ 710.223136][T15061] dump_stack_lvl+0xee/0x150 [ 710.227733][T15061] ? __cfi_dump_stack_lvl+0x8/0x8 [ 710.232781][T15061] dump_stack+0x15/0x24 [ 710.236943][T15061] should_fail_ex+0x3d4/0x520 [ 710.241630][T15061] ? prepare_creds+0x2f/0x640 [ 710.246305][T15061] __should_failslab+0xac/0xf0 [ 710.251068][T15061] should_failslab+0x9/0x20 [ 710.255624][T15061] kmem_cache_alloc+0x3b/0x330 [ 710.260392][T15061] prepare_creds+0x2f/0x640 [ 710.264920][T15061] ? memcpy+0x56/0x70 [ 710.268909][T15061] copy_creds+0xe4/0x640 [ 710.273154][T15061] copy_process+0x81c/0x3470 [ 710.277762][T15061] ? __cfi_kstrtouint_from_user+0x10/0x10 [ 710.283509][T15061] ? __kasan_check_write+0x14/0x20 [ 710.288637][T15061] ? proc_fail_nth_write+0x17a/0x1f0 [ 710.293939][T15061] ? idle_dummy+0x10/0x10 [ 710.298290][T15061] kernel_clone+0x23a/0x810 [ 710.302889][T15061] ? __cfi_kernel_clone+0x10/0x10 [ 710.307927][T15061] ? __kasan_check_write+0x14/0x20 [ 710.313067][T15061] ? mutex_unlock+0x89/0x220 [ 710.317678][T15061] __x64_sys_clone+0x168/0x1b0 [ 710.322466][T15061] ? __cfi___x64_sys_clone+0x10/0x10 [ 710.327779][T15061] ? fpregs_assert_state_consistent+0xb1/0xe0 [ 710.333855][T15061] x64_sys_call+0x990/0x9a0 [ 710.338361][T15061] do_syscall_64+0x4c/0xa0 [ 710.342781][T15061] ? clear_bhb_loop+0x15/0x70 [ 710.347454][T15061] ? clear_bhb_loop+0x15/0x70 [ 710.352131][T15061] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 710.358045][T15061] RIP: 0033:0x7fbeb958e969 [ 710.362456][T15061] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 710.382063][T15061] RSP: 002b:00007fbeba456fe8 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 710.390651][T15061] RAX: ffffffffffffffda RBX: 00007fbeb97b5fa0 RCX: 00007fbeb958e969 [ 710.398622][T15061] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000040000000 [ 710.406594][T15061] RBP: 00007fbeba457090 R08: 0000000000000000 R09: 0000000000000000 [ 710.414563][T15061] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000001 [ 710.422540][T15061] R13: 0000000000000000 R14: 00007fbeb97b5fa0 R15: 00007fffc5bf9758 [ 710.430519][T15061] [ 710.457642][T15064] bond_slave_1: mtu less than device minimum [ 710.552521][T15070] device sit0 left promiscuous mode [ 710.929038][T15075] device pim6reg1 entered promiscuous mode [ 712.308305][T15117] syz.2.4648 (15117) used obsolete PPPIOCDETACH ioctl [ 712.327163][T15115] device sit0 entered promiscuous mode [ 713.190399][T15122] device veth0_vlan left promiscuous mode [ 713.210965][T15122] device veth0_vlan entered promiscuous mode [ 713.236233][T15133] device veth0_vlan left promiscuous mode [ 713.365179][T15133] device veth0_vlan entered promiscuous mode [ 713.469777][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 713.489035][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 713.517240][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 713.551806][T15150] device veth0_vlan left promiscuous mode [ 713.708926][T15150] device veth0_vlan entered promiscuous mode [ 713.985461][T15156] device veth0_vlan left promiscuous mode [ 714.011823][T15156] device veth0_vlan entered promiscuous mode [ 714.094838][T15162] device veth0_vlan left promiscuous mode [ 714.105683][T15162] device veth0_vlan entered promiscuous mode [ 714.386881][T15169] device veth0_vlan left promiscuous mode [ 714.399255][T15169] device veth0_vlan entered promiscuous mode [ 714.766955][T15171] device veth0_vlan left promiscuous mode [ 714.804231][T15171] device veth0_vlan entered promiscuous mode [ 714.848934][T12072] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 714.868825][T12072] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 714.886627][T12072] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 714.919653][T15189] FAULT_INJECTION: forcing a failure. [ 714.919653][T15189] name failslab, interval 1, probability 0, space 0, times 0 [ 714.977830][T15189] CPU: 1 PID: 15189 Comm: syz.0.4670 Not tainted 6.1.134-syzkaller-00014-g3cd01bb5bd37 #0 [ 714.987772][T15189] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/19/2025 [ 714.991127][T15190] bond_slave_1: mtu less than device minimum [ 714.997842][T15189] Call Trace: [ 714.997853][T15189] [ 714.997861][T15189] __dump_stack+0x21/0x24 [ 714.997895][T15189] dump_stack_lvl+0xee/0x150 [ 714.997921][T15189] ? __cfi_dump_stack_lvl+0x8/0x8 [ 714.997948][T15189] ? entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 714.997984][T15189] dump_stack+0x15/0x24 [ 714.998011][T15189] should_fail_ex+0x3d4/0x520 [ 714.998038][T15189] __should_failslab+0xac/0xf0 [ 714.998060][T15189] ? trace_probe_init+0x67/0x390 [ 714.998081][T15189] should_failslab+0x9/0x20 [ 714.998111][T15189] __kmem_cache_alloc_node+0x3d/0x2c0 [ 714.998138][T15189] ? trace_probe_init+0x67/0x390 [ 714.998157][T15189] __kmalloc+0xa1/0x1e0 [ 714.998185][T15189] trace_probe_init+0x67/0x390 [ 714.998204][T15189] ? __kasan_kmalloc+0x95/0xb0 [ 714.998226][T15189] ? create_local_trace_uprobe+0x147/0x6f0 [ 714.998249][T15189] ? kmalloc_trace+0x40/0xb0 [ 715.087995][T15189] create_local_trace_uprobe+0x172/0x6f0 [ 715.093664][T15189] ? __cfi_create_local_trace_uprobe+0x10/0x10 [ 715.100043][T15189] ? __kasan_check_write+0x14/0x20 [ 715.105189][T15189] ? _copy_from_user+0x8f/0xc0 [ 715.109976][T15189] perf_uprobe_init+0xf9/0x1a0 [ 715.114774][T15189] perf_uprobe_event_init+0x10b/0x190 [ 715.120224][T15189] perf_try_init_event+0x15b/0x450 [ 715.125454][T15189] perf_event_alloc+0x10f7/0x1970 [ 715.130521][T15189] __se_sys_perf_event_open+0x5ae/0x1b80 [ 715.136183][T15189] ? __kasan_check_write+0x14/0x20 [ 715.141323][T15189] ? mutex_unlock+0x89/0x220 [ 715.145947][T15189] ? __x64_sys_perf_event_open+0xd0/0xd0 [ 715.151610][T15189] ? __cfi_ksys_write+0x10/0x10 [ 715.156490][T15189] __x64_sys_perf_event_open+0xbf/0xd0 [ 715.161977][T15189] x64_sys_call+0x385/0x9a0 [ 715.166512][T15189] do_syscall_64+0x4c/0xa0 [ 715.170954][T15189] ? clear_bhb_loop+0x15/0x70 [ 715.175655][T15189] ? clear_bhb_loop+0x15/0x70 [ 715.180350][T15189] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 715.186279][T15189] RIP: 0033:0x7ff541d8e969 [ 715.190886][T15189] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 715.210513][T15189] RSP: 002b:00007ff542cda038 EFLAGS: 00000246 ORIG_RAX: 000000000000012a [ 715.218979][T15189] RAX: ffffffffffffffda RBX: 00007ff541fb5fa0 RCX: 00007ff541d8e969 [ 715.226978][T15189] RDX: 0000000000000000 RSI: ffffffffffffffff RDI: 0000200000000000 [ 715.234977][T15189] RBP: 00007ff542cda090 R08: 0000000000000000 R09: 0000000000000000 [ 715.242978][T15189] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000001 [ 715.250972][T15189] R13: 0000000000000000 R14: 00007ff541fb5fa0 R15: 00007ffe631fa598 [ 715.259054][T15189] [ 715.290551][T15189] trace_uprobe: Failed to allocate trace_uprobe.(-12) [ 717.508579][T15211] device veth0_vlan left promiscuous mode [ 717.516634][T15211] device veth0_vlan entered promiscuous mode [ 717.524108][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 717.533786][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 717.541499][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 717.553822][T15214] FAULT_INJECTION: forcing a failure. [ 717.553822][T15214] name failslab, interval 1, probability 0, space 0, times 0 [ 717.568281][T15214] CPU: 0 PID: 15214 Comm: syz.1.4679 Not tainted 6.1.134-syzkaller-00014-g3cd01bb5bd37 #0 [ 717.578676][T15214] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/19/2025 [ 717.588827][T15214] Call Trace: [ 717.592103][T15214] [ 717.595037][T15214] __dump_stack+0x21/0x24 [ 717.599411][T15214] dump_stack_lvl+0xee/0x150 [ 717.604009][T15214] ? __cfi_dump_stack_lvl+0x8/0x8 [ 717.609040][T15214] ? slab_post_alloc_hook+0x4f/0x2d0 [ 717.614328][T15214] ? security_inode_alloc+0x33/0x120 [ 717.619711][T15214] ? inode_init_always+0x6fc/0x960 [ 717.624916][T15214] ? new_inode_pseudo+0xa2/0x1f0 [ 717.629862][T15214] ? proc_pid_make_inode+0x27/0x1d0 [ 717.635064][T15214] ? proc_pident_instantiate+0x69/0x2b0 [ 717.640614][T15214] ? proc_pident_lookup+0x1c7/0x270 [ 717.645818][T15214] ? proc_tid_base_lookup+0x2b/0x30 [ 717.651029][T15214] dump_stack+0x15/0x24 [ 717.655192][T15214] should_fail_ex+0x3d4/0x520 [ 717.659881][T15214] __should_failslab+0xac/0xf0 [ 717.664655][T15214] should_failslab+0x9/0x20 [ 717.669167][T15214] kmem_cache_alloc_node+0x42/0x340 [ 717.674369][T15214] ? __alloc_skb+0xdf/0x7e0 [ 717.678895][T15214] ? avc_has_perm_noaudit+0x2f4/0x460 [ 717.684275][T15214] __alloc_skb+0xdf/0x7e0 [ 717.688608][T15214] ? __cfi_avc_has_perm_noaudit+0x10/0x10 [ 717.694334][T15214] alloc_skb_with_frags+0xa8/0x620 [ 717.699534][T15214] ? memcpy+0x56/0x70 [ 717.703523][T15214] ? avc_has_perm_noaudit+0x2f4/0x460 [ 717.708900][T15214] sock_alloc_send_pskb+0x853/0x980 [ 717.714167][T15214] ? __cfi_sock_alloc_send_pskb+0x10/0x10 [ 717.719993][T15214] ? avc_has_perm+0x158/0x240 [ 717.724692][T15214] ? security_socket_getpeersec_dgram+0xbb/0xd0 [ 717.730942][T15214] unix_stream_sendmsg+0x41a/0xc90 [ 717.736059][T15214] ? __cfi_unix_stream_sendmsg+0x10/0x10 [ 717.741694][T15214] ? stack_trace_save+0x98/0xe0 [ 717.746563][T15214] ? __stack_depot_save+0x36/0x480 [ 717.751730][T15214] ? security_socket_sendmsg+0x93/0xb0 [ 717.757200][T15214] ? __cfi_unix_stream_sendmsg+0x10/0x10 [ 717.762832][T15214] ____sys_sendmsg+0x5a9/0x990 [ 717.767608][T15214] ? __sys_sendmsg_sock+0x40/0x40 [ 717.772645][T15214] ? import_iovec+0x7c/0xb0 [ 717.777150][T15214] ___sys_sendmsg+0x21c/0x290 [ 717.781837][T15214] ? __sys_sendmsg+0x270/0x270 [ 717.786613][T15214] ? __kasan_check_write+0x14/0x20 [ 717.791733][T15214] ? proc_fail_nth_write+0x17a/0x1f0 [ 717.797033][T15214] ? vfs_write+0x9d6/0xca0 [ 717.801457][T15214] ? __fdget+0x19c/0x220 [ 717.805706][T15214] __x64_sys_sendmsg+0x1f0/0x2c0 [ 717.810651][T15214] ? __cfi___x64_sys_sendmsg+0x10/0x10 [ 717.816126][T15214] ? fpregs_assert_state_consistent+0xb1/0xe0 [ 717.822202][T15214] x64_sys_call+0x171/0x9a0 [ 717.826799][T15214] do_syscall_64+0x4c/0xa0 [ 717.831220][T15214] ? clear_bhb_loop+0x15/0x70 [ 717.835895][T15214] ? clear_bhb_loop+0x15/0x70 [ 717.840575][T15214] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 717.846560][T15214] RIP: 0033:0x7f01b078e969 [ 717.850973][T15214] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 717.870577][T15214] RSP: 002b:00007f01b16e1038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 717.878997][T15214] RAX: ffffffffffffffda RBX: 00007f01b09b5fa0 RCX: 00007f01b078e969 [ 717.886973][T15214] RDX: 0000000000000000 RSI: 00002000000029c0 RDI: 0000000000000008 [ 717.894942][T15214] RBP: 00007f01b16e1090 R08: 0000000000000000 R09: 0000000000000000 [ 717.902913][T15214] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 717.910975][T15214] R13: 0000000000000000 R14: 00007f01b09b5fa0 R15: 00007ffe55ef76a8 [ 717.918961][T15214] [ 718.128822][T15222] device veth0_vlan left promiscuous mode [ 718.446752][T15222] device veth0_vlan entered promiscuous mode [ 718.996271][T15244] FAULT_INJECTION: forcing a failure. [ 718.996271][T15244] name failslab, interval 1, probability 0, space 0, times 0 [ 719.082761][T15244] CPU: 0 PID: 15244 Comm: syz.4.4690 Not tainted 6.1.134-syzkaller-00014-g3cd01bb5bd37 #0 [ 719.092714][T15244] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/19/2025 [ 719.102888][T15244] Call Trace: [ 719.106192][T15244] [ 719.109147][T15244] __dump_stack+0x21/0x24 [ 719.113504][T15244] dump_stack_lvl+0xee/0x150 [ 719.118133][T15244] ? __cfi_dump_stack_lvl+0x8/0x8 [ 719.123191][T15244] dump_stack+0x15/0x24 [ 719.127377][T15244] should_fail_ex+0x3d4/0x520 [ 719.132079][T15244] __should_failslab+0xac/0xf0 [ 719.136877][T15244] ? security_prepare_creds+0x4e/0x150 [ 719.142376][T15244] should_failslab+0x9/0x20 [ 719.146912][T15244] __kmem_cache_alloc_node+0x3d/0x2c0 [ 719.152325][T15244] ? security_prepare_creds+0x4e/0x150 [ 719.157809][T15244] __kmalloc+0xa1/0x1e0 [ 719.161991][T15244] ? prepare_creds+0x2f/0x640 [ 719.166683][T15244] security_prepare_creds+0x4e/0x150 [ 719.172077][T15244] prepare_creds+0x456/0x640 [ 719.176691][T15244] copy_creds+0xe4/0x640 [ 719.180958][T15244] copy_process+0x81c/0x3470 [ 719.185575][T15244] ? __cfi_kstrtouint_from_user+0x10/0x10 [ 719.191503][T15244] ? __kasan_check_write+0x14/0x20 [ 719.196660][T15244] ? proc_fail_nth_write+0x17a/0x1f0 [ 719.201983][T15244] ? idle_dummy+0x10/0x10 [ 719.206348][T15244] kernel_clone+0x23a/0x810 [ 719.210887][T15244] ? __cfi_kernel_clone+0x10/0x10 [ 719.215950][T15244] ? __kasan_check_write+0x14/0x20 [ 719.221099][T15244] ? mutex_unlock+0x89/0x220 [ 719.225700][T15244] __x64_sys_clone+0x168/0x1b0 [ 719.230478][T15244] ? __cfi___x64_sys_clone+0x10/0x10 [ 719.235885][T15244] ? fpregs_assert_state_consistent+0xb1/0xe0 [ 719.241969][T15244] x64_sys_call+0x990/0x9a0 [ 719.246493][T15244] do_syscall_64+0x4c/0xa0 [ 719.250908][T15244] ? clear_bhb_loop+0x15/0x70 [ 719.255583][T15244] ? clear_bhb_loop+0x15/0x70 [ 719.260259][T15244] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 719.266168][T15244] RIP: 0033:0x7fbeb958e969 [ 719.270588][T15244] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 719.290204][T15244] RSP: 002b:00007fbeba456fe8 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 719.298649][T15244] RAX: ffffffffffffffda RBX: 00007fbeb97b5fa0 RCX: 00007fbeb958e969 [ 719.306650][T15244] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000040000000 [ 719.314649][T15244] RBP: 00007fbeba457090 R08: 0000000000000000 R09: 0000000000000000 [ 719.322774][T15244] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000001 [ 719.330779][T15244] R13: 0000000000000000 R14: 00007fbeb97b5fa0 R15: 00007fffc5bf9758 [ 719.338781][T15244] [ 719.434140][T15250] device sit0 entered promiscuous mode [ 720.035730][T15270] device veth0_vlan left promiscuous mode [ 720.119270][T15270] device veth0_vlan entered promiscuous mode [ 722.269964][T15323] device veth0_vlan left promiscuous mode [ 722.384064][T15323] device veth0_vlan entered promiscuous mode [ 722.566897][T15334] device sit0 entered promiscuous mode [ 723.433018][T15357] device sit0 left promiscuous mode [ 723.478481][T15360] FAULT_INJECTION: forcing a failure. [ 723.478481][T15360] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 723.595706][T15360] CPU: 1 PID: 15360 Comm: syz.1.4729 Not tainted 6.1.134-syzkaller-00014-g3cd01bb5bd37 #0 [ 723.605661][T15360] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/19/2025 [ 723.615734][T15360] Call Trace: [ 723.619031][T15360] [ 723.622240][T15360] __dump_stack+0x21/0x24 [ 723.626602][T15360] dump_stack_lvl+0xee/0x150 [ 723.631216][T15360] ? __cfi_dump_stack_lvl+0x8/0x8 [ 723.636267][T15360] ? migrate_enable+0x19c/0x280 [ 723.641142][T15360] dump_stack+0x15/0x24 [ 723.645322][T15360] should_fail_ex+0x3d4/0x520 [ 723.650024][T15360] should_fail+0xb/0x10 [ 723.654217][T15360] should_fail_usercopy+0x1a/0x20 [ 723.659262][T15360] _copy_from_user+0x1e/0xc0 [ 723.663872][T15360] generic_map_update_batch+0x4b1/0x780 [ 723.669449][T15360] ? __cfi_generic_map_update_batch+0x10/0x10 [ 723.675639][T15360] ? __fdget+0x19c/0x220 [ 723.679911][T15360] ? __cfi_generic_map_update_batch+0x10/0x10 [ 723.686001][T15360] bpf_map_do_batch+0x48c/0x620 [ 723.690877][T15360] __sys_bpf+0x624/0x780 [ 723.695146][T15360] ? bpf_link_show_fdinfo+0x320/0x320 [ 723.700550][T15360] ? __cfi_ksys_write+0x10/0x10 [ 723.705427][T15360] ? debug_smp_processor_id+0x17/0x20 [ 723.710820][T15360] __x64_sys_bpf+0x7c/0x90 [ 723.715260][T15360] x64_sys_call+0x488/0x9a0 [ 723.719782][T15360] do_syscall_64+0x4c/0xa0 [ 723.724225][T15360] ? clear_bhb_loop+0x15/0x70 [ 723.728917][T15360] ? clear_bhb_loop+0x15/0x70 [ 723.733611][T15360] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 723.739532][T15360] RIP: 0033:0x7f01b078e969 [ 723.743961][T15360] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 723.763757][T15360] RSP: 002b:00007f01b16e1038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 723.772200][T15360] RAX: ffffffffffffffda RBX: 00007f01b09b5fa0 RCX: 00007f01b078e969 [ 723.780222][T15360] RDX: 0000000000000038 RSI: 0000200000000900 RDI: 000000000000001a [ 723.788231][T15360] RBP: 00007f01b16e1090 R08: 0000000000000000 R09: 0000000000000000 [ 723.796218][T15360] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 723.804230][T15360] R13: 0000000000000000 R14: 00007f01b09b5fa0 R15: 00007ffe55ef76a8 [ 723.812234][T15360] [ 723.832501][T15367] device pim6reg1 entered promiscuous mode [ 724.142389][T15376] device veth0_vlan left promiscuous mode [ 724.257331][T15376] device veth0_vlan entered promiscuous mode [ 724.357326][T12072] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 724.369087][T12072] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 724.448731][T12072] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 724.903376][T15391] device sit0 entered promiscuous mode [ 725.931285][T15416] device veth0_vlan left promiscuous mode [ 726.128394][T15416] device veth0_vlan entered promiscuous mode [ 728.239218][T15467] device sit0 left promiscuous mode [ 728.496573][T15470] device pim6reg1 entered promiscuous mode [ 728.895606][T15475] device veth0_vlan left promiscuous mode [ 729.026322][T15475] device veth0_vlan entered promiscuous mode [ 729.238113][T12072] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 729.267147][T12072] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 729.274978][T12072] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 729.288500][T15482] device sit0 left promiscuous mode [ 729.401587][T15484] device sit0 entered promiscuous mode [ 729.697701][T15490] device sit0 left promiscuous mode [ 729.743548][T15494] device sit0 entered promiscuous mode [ 730.368021][T15515] device sit0 left promiscuous mode [ 730.460489][T15518] device sit0 left promiscuous mode [ 730.478598][T15516] device pim6reg1 entered promiscuous mode [ 730.507734][T15518] device sit0 entered promiscuous mode [ 731.314015][ T28] audit: type=1400 audit(1747296904.325:149): avc: denied { create } for pid=15543 comm="syz.4.4779" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=qipcrtr_socket permissive=1 [ 731.992980][T15557] device veth0_vlan left promiscuous mode [ 732.011994][T15557] device veth0_vlan entered promiscuous mode [ 732.917129][T15575] bond_slave_1: mtu less than device minimum [ 732.976009][T15580] device sit0 entered promiscuous mode [ 733.452717][T15578] device sit0 left promiscuous mode [ 733.893814][T15594] device veth0_vlan left promiscuous mode [ 733.917050][T15594] device veth0_vlan entered promiscuous mode [ 734.149488][T15605] device sit0 left promiscuous mode [ 734.185633][T15605] device sit0 entered promiscuous mode [ 734.722743][T15613] device veth0_vlan left promiscuous mode [ 734.748375][T15613] device veth0_vlan entered promiscuous mode [ 734.915286][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 734.930570][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 734.953772][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 735.479688][T15631] FAULT_INJECTION: forcing a failure. [ 735.479688][T15631] name failslab, interval 1, probability 0, space 0, times 0 [ 735.606407][T15634] device veth0_vlan left promiscuous mode [ 735.618595][T15631] CPU: 0 PID: 15631 Comm: syz.1.4806 Not tainted 6.1.134-syzkaller-00014-g3cd01bb5bd37 #0 [ 735.628607][T15631] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/19/2025 [ 735.638668][T15631] Call Trace: [ 735.641950][T15631] [ 735.644879][T15631] __dump_stack+0x21/0x24 [ 735.649222][T15631] dump_stack_lvl+0xee/0x150 [ 735.653832][T15631] ? __cfi_dump_stack_lvl+0x8/0x8 [ 735.658864][T15631] dump_stack+0x15/0x24 [ 735.663023][T15631] should_fail_ex+0x3d4/0x520 [ 735.667699][T15631] __should_failslab+0xac/0xf0 [ 735.672471][T15631] ? alloc_fdtable+0xb4/0x2b0 [ 735.677154][T15631] should_failslab+0x9/0x20 [ 735.681660][T15631] __kmem_cache_alloc_node+0x3d/0x2c0 [ 735.687036][T15631] ? alloc_fdtable+0xb4/0x2b0 [ 735.691802][T15631] kmalloc_trace+0x29/0xb0 [ 735.696225][T15631] alloc_fdtable+0xb4/0x2b0 [ 735.700728][T15631] ? _find_last_bit+0x7c/0x120 [ 735.705498][T15631] dup_fd+0x668/0x8f0 [ 735.709484][T15631] ? __mutex_init+0xcd/0x1a0 [ 735.714085][T15631] copy_files+0x76/0xe0 [ 735.718248][T15631] copy_process+0x11f3/0x3470 [ 735.722949][T15631] ? idle_dummy+0x10/0x10 [ 735.727369][T15631] kernel_clone+0x23a/0x810 [ 735.731883][T15631] ? __cfi_kernel_clone+0x10/0x10 [ 735.736912][T15631] ? __kasan_check_write+0x14/0x20 [ 735.742028][T15631] ? mutex_unlock+0x89/0x220 [ 735.746627][T15631] __x64_sys_clone+0x168/0x1b0 [ 735.751395][T15631] ? __cfi___x64_sys_clone+0x10/0x10 [ 735.756693][T15631] ? fpregs_assert_state_consistent+0xb1/0xe0 [ 735.762768][T15631] x64_sys_call+0x990/0x9a0 [ 735.767356][T15631] do_syscall_64+0x4c/0xa0 [ 735.771804][T15631] ? clear_bhb_loop+0x15/0x70 [ 735.776476][T15631] ? clear_bhb_loop+0x15/0x70 [ 735.781199][T15631] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 735.787100][T15631] RIP: 0033:0x7f01b078e969 [ 735.791513][T15631] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 735.811122][T15631] RSP: 002b:00007f01b16e0fe8 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 735.819534][T15631] RAX: ffffffffffffffda RBX: 00007f01b09b5fa0 RCX: 00007f01b078e969 [ 735.827506][T15631] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000040000000 [ 735.835511][T15631] RBP: 00007f01b16e1090 R08: 0000000000000000 R09: 0000000000000000 [ 735.843581][T15631] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000001 [ 735.851550][T15631] R13: 0000000000000000 R14: 00007f01b09b5fa0 R15: 00007ffe55ef76a8 [ 735.859610][T15631] [ 735.901977][T15634] device veth0_vlan entered promiscuous mode [ 736.162564][T15641] device veth0_vlan left promiscuous mode [ 736.278731][T15641] device veth0_vlan entered promiscuous mode [ 736.433673][T12390] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 736.442937][T12390] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 736.450633][T12390] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 736.754246][T15653] device veth0_vlan left promiscuous mode [ 736.926315][T15653] device veth0_vlan entered promiscuous mode [ 738.994263][T15687] device veth0_vlan left promiscuous mode [ 739.000436][T15687] device veth0_vlan entered promiscuous mode [ 739.148337][T15699] device sit0 entered promiscuous mode [ 739.279705][T15694] device veth0_vlan left promiscuous mode [ 739.287977][T15694] device veth0_vlan entered promiscuous mode [ 739.309826][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 739.318999][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 739.326985][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 739.338690][T15698] device sit0 left promiscuous mode [ 739.794453][T15720] FAULT_INJECTION: forcing a failure. [ 739.794453][T15720] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 739.868408][T15720] CPU: 0 PID: 15720 Comm: syz.0.4833 Not tainted 6.1.134-syzkaller-00014-g3cd01bb5bd37 #0 [ 739.878361][T15720] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/19/2025 [ 739.888442][T15720] Call Trace: [ 739.891745][T15720] [ 739.894687][T15720] __dump_stack+0x21/0x24 [ 739.899043][T15720] dump_stack_lvl+0xee/0x150 [ 739.903659][T15720] ? __cfi_dump_stack_lvl+0x8/0x8 [ 739.908713][T15720] ? migrate_enable+0x19c/0x280 [ 739.913594][T15720] dump_stack+0x15/0x24 [ 739.917829][T15720] should_fail_ex+0x3d4/0x520 [ 739.922527][T15720] should_fail+0xb/0x10 [ 739.926701][T15720] should_fail_usercopy+0x1a/0x20 [ 739.931799][T15720] _copy_from_user+0x1e/0xc0 [ 739.936406][T15720] generic_map_update_batch+0x4b1/0x780 [ 739.942007][T15720] ? __cfi_generic_map_update_batch+0x10/0x10 [ 739.948108][T15720] ? __fdget+0x19c/0x220 [ 739.952384][T15720] ? __cfi_generic_map_update_batch+0x10/0x10 [ 739.958476][T15720] bpf_map_do_batch+0x48c/0x620 [ 739.963350][T15720] __sys_bpf+0x624/0x780 [ 739.967618][T15720] ? bpf_link_show_fdinfo+0x320/0x320 [ 739.973027][T15720] ? __cfi_ksys_write+0x10/0x10 [ 739.977908][T15720] ? debug_smp_processor_id+0x17/0x20 [ 739.983309][T15720] __x64_sys_bpf+0x7c/0x90 [ 739.987758][T15720] x64_sys_call+0x488/0x9a0 [ 739.992287][T15720] do_syscall_64+0x4c/0xa0 [ 739.996729][T15720] ? clear_bhb_loop+0x15/0x70 [ 740.001423][T15720] ? clear_bhb_loop+0x15/0x70 [ 740.006123][T15720] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 740.012043][T15720] RIP: 0033:0x7ff541d8e969 [ 740.016486][T15720] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 740.036212][T15720] RSP: 002b:00007ff542cda038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 740.044662][T15720] RAX: ffffffffffffffda RBX: 00007ff541fb5fa0 RCX: 00007ff541d8e969 [ 740.052670][T15720] RDX: 0000000000000038 RSI: 0000200000000900 RDI: 000000000000001a [ 740.060757][T15720] RBP: 00007ff542cda090 R08: 0000000000000000 R09: 0000000000000000 [ 740.068760][T15720] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 740.073095][T15725] device pim6reg1 entered promiscuous mode [ 740.076745][T15720] R13: 0000000000000000 R14: 00007ff541fb5fa0 R15: 00007ffe631fa598 [ 740.076775][T15720] [ 740.593877][T15742] device sit0 entered promiscuous mode [ 741.501707][T15757] device sit0 left promiscuous mode [ 741.589877][T15752] device sit0 left promiscuous mode [ 741.612583][T15769] device pim6reg1 entered promiscuous mode [ 742.059607][T15785] device veth0_vlan left promiscuous mode [ 742.170254][T15785] device veth0_vlan entered promiscuous mode [ 742.254409][ T28] audit: type=1400 audit(1747296915.265:150): avc: denied { ioctl } for pid=15795 comm="syz.2.4852" path="net:[4026532327]" dev="nsfs" ino=4026532327 ioctlcmd=0xb701 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 743.143274][T15813] device sit0 entered promiscuous mode [ 743.436118][T15821] device pim6reg1 entered promiscuous mode [ 744.319307][T15861] device sit0 left promiscuous mode [ 744.440518][T15862] device sit0 entered promiscuous mode [ 745.016412][T15872] device veth0_vlan left promiscuous mode [ 745.157429][T15872] device veth0_vlan entered promiscuous mode [ 745.445781][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 745.457217][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 745.465371][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 746.433579][T15901] device pim6reg1 entered promiscuous mode [ 746.460653][T15909] device sit0 left promiscuous mode [ 746.505882][T15909] device sit0 entered promiscuous mode [ 747.442956][T15917] device veth0_vlan left promiscuous mode [ 747.460950][T15917] device veth0_vlan entered promiscuous mode [ 747.736821][T15932] FAULT_INJECTION: forcing a failure. [ 747.736821][T15932] name failslab, interval 1, probability 0, space 0, times 0 [ 747.791506][T15932] CPU: 1 PID: 15932 Comm: syz.3.4890 Not tainted 6.1.134-syzkaller-00014-g3cd01bb5bd37 #0 [ 747.801448][T15932] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/19/2025 [ 747.811521][T15932] Call Trace: [ 747.814813][T15932] [ 747.817755][T15932] __dump_stack+0x21/0x24 [ 747.822117][T15932] dump_stack_lvl+0xee/0x150 [ 747.826733][T15932] ? __cfi_dump_stack_lvl+0x8/0x8 [ 747.831779][T15932] ? snprintf+0xd7/0x120 [ 747.836051][T15932] dump_stack+0x15/0x24 [ 747.840230][T15932] should_fail_ex+0x3d4/0x520 [ 747.844940][T15932] __should_failslab+0xac/0xf0 [ 747.849719][T15932] ? traceprobe_set_print_fmt+0x5d/0xc0 [ 747.855292][T15932] should_failslab+0x9/0x20 [ 747.859824][T15932] __kmem_cache_alloc_node+0x3d/0x2c0 [ 747.865224][T15932] ? __set_print_fmt+0x736/0x790 [ 747.870190][T15932] ? traceprobe_set_print_fmt+0x5d/0xc0 [ 747.875765][T15932] __kmalloc+0xa1/0x1e0 [ 747.879944][T15932] traceprobe_set_print_fmt+0x5d/0xc0 [ 747.885347][T15932] create_local_trace_uprobe+0x55d/0x6f0 [ 747.890997][T15932] ? __cfi_create_local_trace_uprobe+0x10/0x10 [ 747.897171][T15932] ? __kasan_check_write+0x14/0x20 [ 747.902311][T15932] ? _copy_from_user+0x8f/0xc0 [ 747.907107][T15932] perf_uprobe_init+0xf9/0x1a0 [ 747.911995][T15932] perf_uprobe_event_init+0x10b/0x190 [ 747.917385][T15932] perf_try_init_event+0x15b/0x450 [ 747.922510][T15932] perf_event_alloc+0x10f7/0x1970 [ 747.927560][T15932] __se_sys_perf_event_open+0x5ae/0x1b80 [ 747.933215][T15932] ? __kasan_check_write+0x14/0x20 [ 747.938356][T15932] ? mutex_unlock+0x89/0x220 [ 747.942976][T15932] ? __x64_sys_perf_event_open+0xd0/0xd0 [ 747.948724][T15932] ? __cfi_ksys_write+0x10/0x10 [ 747.953615][T15932] __x64_sys_perf_event_open+0xbf/0xd0 [ 747.959100][T15932] x64_sys_call+0x385/0x9a0 [ 747.963626][T15932] do_syscall_64+0x4c/0xa0 [ 747.968069][T15932] ? clear_bhb_loop+0x15/0x70 [ 747.972761][T15932] ? clear_bhb_loop+0x15/0x70 [ 747.977452][T15932] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 747.983368][T15932] RIP: 0033:0x7f01c1b8e969 [ 747.987795][T15932] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 748.007417][T15932] RSP: 002b:00007f01c29a4038 EFLAGS: 00000246 ORIG_RAX: 000000000000012a [ 748.015850][T15932] RAX: ffffffffffffffda RBX: 00007f01c1db5fa0 RCX: 00007f01c1b8e969 [ 748.023840][T15932] RDX: 0000000000000000 RSI: ffffffffffffffff RDI: 0000200000000000 [ 748.031828][T15932] RBP: 00007f01c29a4090 R08: 0000000000000000 R09: 0000000000000000 [ 748.039813][T15932] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000002 [ 748.047797][T15932] R13: 0000000000000000 R14: 00007f01c1db5fa0 R15: 00007ffc61b12478 [ 748.055779][T15932] [ 748.303597][T15937] device veth0_vlan left promiscuous mode [ 748.375457][T15937] device veth0_vlan entered promiscuous mode [ 748.487200][ T2451] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 748.508711][ T2451] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 748.516632][ T2451] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 748.527001][T15942] device veth0_vlan left promiscuous mode [ 748.546690][T15942] device veth0_vlan entered promiscuous mode [ 748.644827][T15948] device sit0 left promiscuous mode [ 748.850100][ T2451] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 748.863891][ T2451] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 748.871896][ T2451] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 748.880524][T15951] device pim6reg1 entered promiscuous mode [ 748.998863][T15958] device veth0_vlan left promiscuous mode [ 749.051085][T15958] device veth0_vlan entered promiscuous mode [ 749.222651][T15967] device sit0 left promiscuous mode [ 749.308611][T15967] device sit0 entered promiscuous mode [ 749.600614][T15979] bond_slave_1: mtu less than device minimum [ 750.367005][T15992] device veth0_vlan left promiscuous mode [ 750.540975][T15992] device veth0_vlan entered promiscuous mode [ 750.812575][ T2451] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 750.828593][ T2451] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 750.836333][ T2451] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 751.074449][T16025] device sit0 left promiscuous mode [ 751.095684][T16025] device sit0 entered promiscuous mode [ 751.465029][T16028] device syzkaller0 entered promiscuous mode [ 752.161177][T16053] device sit0 entered promiscuous mode [ 752.602246][T16058] device veth0_vlan left promiscuous mode [ 752.650147][T16058] device veth0_vlan entered promiscuous mode [ 752.762077][T16065] device sit0 left promiscuous mode [ 752.781406][T16063] device sit0 left promiscuous mode [ 752.871904][T16068] device sit0 entered promiscuous mode [ 753.012461][T16077] device pim6reg1 entered promiscuous mode [ 753.055518][T16082] device veth0_vlan left promiscuous mode [ 753.087008][T16082] device veth0_vlan entered promiscuous mode [ 753.167103][T12390] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 753.176009][T12390] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 753.184761][T12390] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 753.212433][T16087] device veth0_vlan left promiscuous mode [ 753.233101][T16087] device veth0_vlan entered promiscuous mode [ 753.525272][T16098] device sit0 entered promiscuous mode [ 753.808994][T16115] device sit0 left promiscuous mode [ 753.857247][T16116] bond_slave_1: mtu less than device minimum [ 753.867193][T16115] device sit0 entered promiscuous mode [ 754.056794][T16124] device sit0 left promiscuous mode [ 754.115181][T16127] FAULT_INJECTION: forcing a failure. [ 754.115181][T16127] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 754.168614][T16127] CPU: 0 PID: 16127 Comm: syz.2.4950 Not tainted 6.1.134-syzkaller-00014-g3cd01bb5bd37 #0 [ 754.178561][T16127] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/19/2025 [ 754.188638][T16127] Call Trace: [ 754.191929][T16127] [ 754.195060][T16127] __dump_stack+0x21/0x24 [ 754.199414][T16127] dump_stack_lvl+0xee/0x150 [ 754.204038][T16127] ? __cfi_dump_stack_lvl+0x8/0x8 [ 754.209102][T16127] ? irqentry_exit+0x37/0x40 [ 754.213734][T16127] dump_stack+0x15/0x24 [ 754.217918][T16127] should_fail_ex+0x3d4/0x520 [ 754.222617][T16127] should_fail+0xb/0x10 [ 754.227048][T16127] should_fail_usercopy+0x1a/0x20 [ 754.232111][T16127] copyin+0x20/0xa0 [ 754.235940][T16127] _copy_from_iter+0x3e2/0xfd0 [ 754.240721][T16127] ? copyin+0x82/0xa0 [ 754.244717][T16127] ? _copy_from_iter+0x420/0xfd0 [ 754.249672][T16127] ? __cfi__copy_from_iter+0x10/0x10 [ 754.254973][T16127] ? __cfi__copy_from_iter+0x10/0x10 [ 754.260274][T16127] ? check_stack_object+0x81/0x140 [ 754.265409][T16127] copy_page_from_iter+0x1d2/0x2b0 [ 754.270553][T16127] skb_copy_datagram_from_iter+0x2cd/0x6b0 [ 754.276399][T16127] unix_stream_sendmsg+0x66a/0xc90 [ 754.281541][T16127] ? __cfi_unix_stream_sendmsg+0x10/0x10 [ 754.287197][T16127] ? stack_trace_save+0x98/0xe0 [ 754.292072][T16127] ? __stack_depot_save+0x36/0x480 [ 754.297210][T16127] ? security_socket_sendmsg+0x93/0xb0 [ 754.302709][T16127] ? __cfi_unix_stream_sendmsg+0x10/0x10 [ 754.308375][T16127] ____sys_sendmsg+0x5a9/0x990 [ 754.313194][T16127] ? __sys_sendmsg_sock+0x40/0x40 [ 754.318246][T16127] ? import_iovec+0x7c/0xb0 [ 754.322861][T16127] ___sys_sendmsg+0x21c/0x290 [ 754.327562][T16127] ? __sys_sendmsg+0x270/0x270 [ 754.332348][T16127] ? __kasan_check_write+0x14/0x20 [ 754.337487][T16127] ? proc_fail_nth_write+0x17a/0x1f0 [ 754.342802][T16127] ? vfs_write+0x9d6/0xca0 [ 754.347260][T16127] ? __fdget+0x19c/0x220 [ 754.351527][T16127] __x64_sys_sendmsg+0x1f0/0x2c0 [ 754.356489][T16127] ? __cfi___x64_sys_sendmsg+0x10/0x10 [ 754.361973][T16127] ? fpregs_assert_state_consistent+0xb1/0xe0 [ 754.368057][T16127] x64_sys_call+0x171/0x9a0 [ 754.372578][T16127] do_syscall_64+0x4c/0xa0 [ 754.377013][T16127] ? clear_bhb_loop+0x15/0x70 [ 754.381700][T16127] ? clear_bhb_loop+0x15/0x70 [ 754.386399][T16127] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 754.392315][T16127] RIP: 0033:0x7f528bb8e969 [ 754.396771][T16127] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 754.416395][T16127] RSP: 002b:00007f528c91d038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 754.424828][T16127] RAX: ffffffffffffffda RBX: 00007f528bdb5fa0 RCX: 00007f528bb8e969 [ 754.432823][T16127] RDX: 0000000000000000 RSI: 00002000000029c0 RDI: 0000000000000008 [ 754.440824][T16127] RBP: 00007f528c91d090 R08: 0000000000000000 R09: 0000000000000000 [ 754.448813][T16127] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 754.456804][T16127] R13: 0000000000000000 R14: 00007f528bdb5fa0 R15: 00007ffc8eb21748 [ 754.464805][T16127] [ 754.507645][T16124] device pim6reg1 entered promiscuous mode [ 754.560300][T16122] device veth0_vlan left promiscuous mode [ 754.592530][T16122] device veth0_vlan entered promiscuous mode [ 754.764809][T16130] device sit0 left promiscuous mode [ 754.783255][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 754.808648][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 754.816476][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 754.854352][T16134] device sit0 entered promiscuous mode [ 755.018477][T16145] device sit0 left promiscuous mode [ 756.410748][T16207] device sit0 entered promiscuous mode [ 756.662754][T16210] device sit0 entered promiscuous mode [ 756.970957][T16220] FAULT_INJECTION: forcing a failure. [ 756.970957][T16220] name failslab, interval 1, probability 0, space 0, times 0 [ 757.021987][T16220] CPU: 0 PID: 16220 Comm: syz.4.4981 Not tainted 6.1.134-syzkaller-00014-g3cd01bb5bd37 #0 [ 757.031930][T16220] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/19/2025 [ 757.042009][T16220] Call Trace: [ 757.045301][T16220] [ 757.048247][T16220] __dump_stack+0x21/0x24 [ 757.052588][T16220] dump_stack_lvl+0xee/0x150 [ 757.057179][T16220] ? __cfi_dump_stack_lvl+0x8/0x8 [ 757.062271][T16220] ? __cfi_kvmalloc_node+0x10/0x10 [ 757.067388][T16220] dump_stack+0x15/0x24 [ 757.071547][T16220] should_fail_ex+0x3d4/0x520 [ 757.076224][T16220] ? copy_fs_struct+0x4c/0x220 [ 757.080981][T16220] __should_failslab+0xac/0xf0 [ 757.085742][T16220] should_failslab+0x9/0x20 [ 757.090251][T16220] kmem_cache_alloc+0x3b/0x330 [ 757.095051][T16220] copy_fs_struct+0x4c/0x220 [ 757.099636][T16220] copy_fs+0x6f/0x140 [ 757.103630][T16220] copy_process+0x121f/0x3470 [ 757.108323][T16220] ? idle_dummy+0x10/0x10 [ 757.112658][T16220] kernel_clone+0x23a/0x810 [ 757.117172][T16220] ? __cfi_kernel_clone+0x10/0x10 [ 757.122201][T16220] ? __kasan_check_write+0x14/0x20 [ 757.127318][T16220] ? mutex_unlock+0x89/0x220 [ 757.131913][T16220] __x64_sys_clone+0x168/0x1b0 [ 757.136683][T16220] ? __cfi___x64_sys_clone+0x10/0x10 [ 757.141976][T16220] ? fpregs_assert_state_consistent+0xb1/0xe0 [ 757.148221][T16220] x64_sys_call+0x990/0x9a0 [ 757.152728][T16220] do_syscall_64+0x4c/0xa0 [ 757.157145][T16220] ? clear_bhb_loop+0x15/0x70 [ 757.161813][T16220] ? clear_bhb_loop+0x15/0x70 [ 757.166571][T16220] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 757.172467][T16220] RIP: 0033:0x7fbeb958e969 [ 757.176880][T16220] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 757.196487][T16220] RSP: 002b:00007fbeba456fe8 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 757.204906][T16220] RAX: ffffffffffffffda RBX: 00007fbeb97b5fa0 RCX: 00007fbeb958e969 [ 757.212887][T16220] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000040000000 [ 757.220859][T16220] RBP: 00007fbeba457090 R08: 0000000000000000 R09: 0000000000000000 [ 757.228825][T16220] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000001 [ 757.236794][T16220] R13: 0000000000000000 R14: 00007fbeb97b5fa0 R15: 00007fffc5bf9758 [ 757.244770][T16220] [ 757.398068][T16227] device sit0 entered promiscuous mode [ 757.626020][T16249] FAULT_INJECTION: forcing a failure. [ 757.626020][T16249] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 757.668212][T16241] device veth0_vlan left promiscuous mode [ 757.690383][T16249] CPU: 0 PID: 16249 Comm: syz.3.4991 Not tainted 6.1.134-syzkaller-00014-g3cd01bb5bd37 #0 [ 757.700329][T16249] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/19/2025 [ 757.710496][T16249] Call Trace: [ 757.713793][T16249] [ 757.716734][T16249] __dump_stack+0x21/0x24 [ 757.721089][T16249] dump_stack_lvl+0xee/0x150 [ 757.725704][T16249] ? __cfi_dump_stack_lvl+0x8/0x8 [ 757.730757][T16249] ? __cfi_avc_has_perm_noaudit+0x10/0x10 [ 757.736511][T16249] dump_stack+0x15/0x24 [ 757.740698][T16249] should_fail_ex+0x3d4/0x520 [ 757.745399][T16249] should_fail_alloc_page+0x61/0x90 [ 757.750633][T16249] prepare_alloc_pages+0x148/0x5f0 [ 757.755774][T16249] ? __alloc_pages_bulk+0x9c0/0x9c0 [ 757.760997][T16249] __alloc_pages+0x115/0x3a0 [ 757.765613][T16249] ? __cfi___alloc_pages+0x10/0x10 [ 757.770758][T16249] ? is_bpf_text_address+0x177/0x190 [ 757.776154][T16249] ? kernel_text_address+0xa0/0xd0 [ 757.781287][T16249] __pmd_alloc+0xa6/0x4a0 [ 757.785645][T16249] ? __cfi_stack_trace_consume_entry+0x10/0x10 [ 757.791821][T16249] ? mas_state_walk+0x79b/0xa60 [ 757.796694][T16249] ? __cfi___pmd_alloc+0x10/0x10 [ 757.801655][T16249] ? __kasan_check_read+0x11/0x20 [ 757.806708][T16249] handle_mm_fault+0xa0f/0x2640 [ 757.811585][T16249] ? __cfi_mt_find+0x10/0x10 [ 757.816211][T16249] ? __cfi_handle_mm_fault+0x10/0x10 [ 757.821518][T16249] ? down_read_trylock+0x273/0x640 [ 757.826658][T16249] ? lock_mm_and_find_vma+0x9e/0x320 [ 757.832138][T16249] ? do_user_addr_fault+0x2ee/0x1050 [ 757.837533][T16249] do_user_addr_fault+0x63b/0x1050 [ 757.842674][T16249] exc_page_fault+0x51/0xb0 [ 757.847209][T16249] asm_exc_page_fault+0x27/0x30 [ 757.852086][T16249] RIP: 0010:__get_user_4+0x1c/0x30 [ 757.857225][T16249] Code: 01 ca c3 90 90 90 90 90 90 90 90 90 90 90 48 ba fd ef ff ff ff 7f 00 00 48 39 d0 0f 83 90 00 00 00 48 19 d2 48 21 d0 0f 01 cb <8b> 10 31 c0 0f 01 ca c3 90 90 90 90 90 90 90 90 90 90 90 90 48 ba [ 757.876849][T16249] RSP: 0018:ffffc9000a2c7d38 EFLAGS: 00050206 [ 757.882943][T16249] RAX: 000000110e22fff6 RBX: ffff88811c4b1180 RCX: 0000000000000005 [ 757.890945][T16249] RDX: ffffffffffffffff RSI: ffffffff87302cd0 RDI: 00000000c004743e [ 757.898941][T16249] RBP: ffffc9000a2c7e80 R08: ffff88813d500000 R09: 0000000000000003 [ 757.906937][T16249] R10: 00000000c004743e R11: 0000000000000000 R12: 00000000c004743e [ 757.914926][T16249] R13: ffff88813d8ef458 R14: ffff88813d8ef380 R15: 1ffff11027b1de8b [ 757.922927][T16249] ? ppp_ioctl+0x381/0x1690 [ 757.927462][T16249] ? mutex_unlock+0x89/0x220 [ 757.932084][T16249] ? __cfi_mutex_unlock+0x10/0x10 [ 757.937136][T16249] ? __cfi_ppp_ioctl+0x10/0x10 [ 757.941927][T16249] ? __fget_files+0x2d5/0x330 [ 757.946640][T16249] ? security_file_ioctl+0x95/0xc0 [ 757.951774][T16249] ? __cfi_ppp_ioctl+0x10/0x10 [ 757.956561][T16249] __se_sys_ioctl+0x12f/0x1b0 [ 757.961266][T16249] __x64_sys_ioctl+0x7b/0x90 [ 757.965887][T16249] x64_sys_call+0x58b/0x9a0 [ 757.970408][T16249] do_syscall_64+0x4c/0xa0 [ 757.974844][T16249] ? clear_bhb_loop+0x15/0x70 [ 757.979533][T16249] ? clear_bhb_loop+0x15/0x70 [ 757.984221][T16249] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 757.988342][T16241] device veth0_vlan entered promiscuous mode [ 757.990135][T16249] RIP: 0033:0x7f01c1b8e969 [ 757.990157][T16249] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 758.020230][T16249] RSP: 002b:00007f01c29a4038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 758.028668][T16249] RAX: ffffffffffffffda RBX: 00007f01c1db5fa0 RCX: 00007f01c1b8e969 [ 758.036667][T16249] RDX: 000000110e22fff6 RSI: 00000000c004743e RDI: 0000000000000006 [ 758.044657][T16249] RBP: 00007f01c29a4090 R08: 0000000000000000 R09: 0000000000000000 [ 758.052642][T16249] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 758.060704][T16249] R13: 0000000000000000 R14: 00007f01c1db5fa0 R15: 00007ffc61b12478 [ 758.068683][T16249] [ 758.356423][T16262] bond_slave_1: mtu less than device minimum [ 758.411948][T16264] device pim6reg1 entered promiscuous mode [ 758.551369][T16270] FAULT_INJECTION: forcing a failure. [ 758.551369][T16270] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 758.584596][T16270] CPU: 0 PID: 16270 Comm: syz.2.5000 Not tainted 6.1.134-syzkaller-00014-g3cd01bb5bd37 #0 [ 758.594549][T16270] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/19/2025 [ 758.604626][T16270] Call Trace: [ 758.607922][T16270] [ 758.610864][T16270] __dump_stack+0x21/0x24 [ 758.615222][T16270] dump_stack_lvl+0xee/0x150 [ 758.619838][T16270] ? __cfi_dump_stack_lvl+0x8/0x8 [ 758.625064][T16270] ? irqentry_exit+0x37/0x40 [ 758.629687][T16270] dump_stack+0x15/0x24 [ 758.633870][T16270] should_fail_ex+0x3d4/0x520 [ 758.638577][T16270] should_fail+0xb/0x10 [ 758.642844][T16270] should_fail_usercopy+0x1a/0x20 [ 758.647902][T16270] copyin+0x20/0xa0 [ 758.651729][T16270] _copy_from_iter+0x3e2/0xfd0 [ 758.656510][T16270] ? copyin+0x82/0xa0 [ 758.660515][T16270] ? _copy_from_iter+0x420/0xfd0 [ 758.665470][T16270] ? __cfi__copy_from_iter+0x10/0x10 [ 758.670752][T16270] ? __cfi__copy_from_iter+0x10/0x10 [ 758.676030][T16270] ? check_stack_object+0x81/0x140 [ 758.681147][T16270] copy_page_from_iter+0x1d2/0x2b0 [ 758.686349][T16270] skb_copy_datagram_from_iter+0x2cd/0x6b0 [ 758.692210][T16270] unix_stream_sendmsg+0x66a/0xc90 [ 758.697334][T16270] ? __cfi_unix_stream_sendmsg+0x10/0x10 [ 758.703071][T16270] ? stack_trace_save+0x98/0xe0 [ 758.707948][T16270] ? __stack_depot_save+0x36/0x480 [ 758.713067][T16270] ? security_socket_sendmsg+0x93/0xb0 [ 758.718532][T16270] ? __cfi_unix_stream_sendmsg+0x10/0x10 [ 758.724161][T16270] ____sys_sendmsg+0x5a9/0x990 [ 758.728940][T16270] ? __sys_sendmsg_sock+0x40/0x40 [ 758.733974][T16270] ? import_iovec+0x7c/0xb0 [ 758.738483][T16270] ___sys_sendmsg+0x21c/0x290 [ 758.743176][T16270] ? __sys_sendmsg+0x270/0x270 [ 758.747947][T16270] ? __kasan_check_write+0x14/0x20 [ 758.753065][T16270] ? proc_fail_nth_write+0x17a/0x1f0 [ 758.758395][T16270] ? vfs_write+0x9d6/0xca0 [ 758.762822][T16270] ? __fdget+0x19c/0x220 [ 758.767096][T16270] __x64_sys_sendmsg+0x1f0/0x2c0 [ 758.772064][T16270] ? __cfi___x64_sys_sendmsg+0x10/0x10 [ 758.777535][T16270] ? fpregs_assert_state_consistent+0xb1/0xe0 [ 758.783606][T16270] x64_sys_call+0x171/0x9a0 [ 758.788116][T16270] do_syscall_64+0x4c/0xa0 [ 758.792546][T16270] ? clear_bhb_loop+0x15/0x70 [ 758.797221][T16270] ? clear_bhb_loop+0x15/0x70 [ 758.801898][T16270] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 758.807796][T16270] RIP: 0033:0x7f528bb8e969 [ 758.812213][T16270] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 758.831821][T16270] RSP: 002b:00007f528c91d038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 758.840244][T16270] RAX: ffffffffffffffda RBX: 00007f528bdb5fa0 RCX: 00007f528bb8e969 [ 758.848221][T16270] RDX: 0000000000000000 RSI: 00002000000029c0 RDI: 0000000000000008 [ 758.856189][T16270] RBP: 00007f528c91d090 R08: 0000000000000000 R09: 0000000000000000 [ 758.864158][T16270] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 758.872139][T16270] R13: 0000000000000000 R14: 00007f528bdb5fa0 R15: 00007ffc8eb21748 [ 758.880125][T16270] [ 758.912237][T16275] device veth0_vlan left promiscuous mode [ 758.920639][T16275] device veth0_vlan entered promiscuous mode [ 759.099310][T16277] device veth0_vlan left promiscuous mode [ 759.338025][T16277] device veth0_vlan entered promiscuous mode [ 759.845965][T16299] device sit0 entered promiscuous mode [ 759.980975][T16307] device sit0 left promiscuous mode [ 760.038073][T16307] device sit0 entered promiscuous mode [ 760.829022][T16323] device veth0_vlan left promiscuous mode [ 760.851712][T16323] device veth0_vlan entered promiscuous mode [ 760.863706][T16327] device sit0 left promiscuous mode [ 760.879434][T16329] device sit0 entered promiscuous mode [ 761.060786][T16330] device sit0 left promiscuous mode [ 761.161746][T16334] device pim6reg1 entered promiscuous mode [ 762.159569][T16372] FAULT_INJECTION: forcing a failure. [ 762.159569][T16372] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 762.230146][T16374] device sit0 left promiscuous mode [ 762.278338][T16372] CPU: 0 PID: 16372 Comm: syz.0.5029 Not tainted 6.1.134-syzkaller-00014-g3cd01bb5bd37 #0 [ 762.288276][T16372] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/19/2025 [ 762.298349][T16372] Call Trace: [ 762.301652][T16372] [ 762.304601][T16372] __dump_stack+0x21/0x24 [ 762.308957][T16372] dump_stack_lvl+0xee/0x150 [ 762.313575][T16372] ? __cfi_dump_stack_lvl+0x8/0x8 [ 762.318623][T16372] ? get_page_from_freelist+0x2c6e/0x2ce0 [ 762.324368][T16372] ? bpf_send_signal_common+0x339/0x420 [ 762.329939][T16372] dump_stack+0x15/0x24 [ 762.334120][T16372] should_fail_ex+0x3d4/0x520 [ 762.338829][T16372] should_fail_alloc_page+0x61/0x90 [ 762.344038][T16372] prepare_alloc_pages+0x148/0x5f0 [ 762.349159][T16372] ? __alloc_pages_bulk+0x9c0/0x9c0 [ 762.354357][T16372] ? __cfi_bpf_trace_run4+0x10/0x10 [ 762.359557][T16372] __alloc_pages+0x115/0x3a0 [ 762.364152][T16372] ? __cfi___alloc_pages+0x10/0x10 [ 762.369262][T16372] ? __alloc_pages+0x282/0x3a0 [ 762.374030][T16372] pte_alloc_one+0x70/0x180 [ 762.378541][T16372] ? __cfi_pte_alloc_one+0x10/0x10 [ 762.383654][T16372] ? __mod_node_page_state+0x9e/0xd0 [ 762.388938][T16372] ? __mod_lruvec_page_state+0x183/0x200 [ 762.394575][T16372] ? vma_data_pages+0x58/0xa0 [ 762.399265][T16372] do_fault+0xe97/0x1df0 [ 762.403512][T16372] ? pte_marker_clear+0x220/0x220 [ 762.408545][T16372] ? __kasan_check_read+0x11/0x20 [ 762.413574][T16372] handle_mm_fault+0x12fa/0x2640 [ 762.418538][T16372] ? __cfi_handle_mm_fault+0x10/0x10 [ 762.423845][T16372] ? down_read_trylock+0x273/0x640 [ 762.429041][T16372] ? lock_mm_and_find_vma+0x9e/0x320 [ 762.434325][T16372] ? do_user_addr_fault+0x2ee/0x1050 [ 762.439612][T16372] do_user_addr_fault+0x63b/0x1050 [ 762.444745][T16372] exc_page_fault+0x51/0xb0 [ 762.449334][T16372] asm_exc_page_fault+0x27/0x30 [ 762.454188][T16372] RIP: 0010:__get_user_4+0x1c/0x30 [ 762.459302][T16372] Code: 01 ca c3 90 90 90 90 90 90 90 90 90 90 90 48 ba fd ef ff ff ff 7f 00 00 48 39 d0 0f 83 90 00 00 00 48 19 d2 48 21 d0 0f 01 cb <8b> 10 31 c0 0f 01 ca c3 90 90 90 90 90 90 90 90 90 90 90 90 48 ba [ 762.478903][T16372] RSP: 0018:ffffc90000b37d38 EFLAGS: 00050206 [ 762.484970][T16372] RAX: 000000110e22fff6 RBX: ffff888132520000 RCX: 0000000000000005 [ 762.492945][T16372] RDX: ffffffffffffffff RSI: ffffffff87302cd0 RDI: 00000000c004743e [ 762.500913][T16372] RBP: ffffc90000b37e80 R08: ffff8881271d9440 R09: 0000000000000003 [ 762.508883][T16372] R10: 00000000c004743e R11: 0000000000000000 R12: 00000000c004743e [ 762.516850][T16372] R13: ffff8881120f7ed8 R14: ffff8881120f7e00 R15: 1ffff1102241efdb [ 762.524831][T16372] ? ppp_ioctl+0x381/0x1690 [ 762.529342][T16372] ? mutex_unlock+0x89/0x220 [ 762.533937][T16372] ? __cfi_mutex_unlock+0x10/0x10 [ 762.539060][T16372] ? __cfi_ppp_ioctl+0x10/0x10 [ 762.543828][T16372] ? __fget_files+0x2d5/0x330 [ 762.548515][T16372] ? security_file_ioctl+0x95/0xc0 [ 762.553646][T16372] ? __cfi_ppp_ioctl+0x10/0x10 [ 762.558409][T16372] __se_sys_ioctl+0x12f/0x1b0 [ 762.563090][T16372] __x64_sys_ioctl+0x7b/0x90 [ 762.567686][T16372] x64_sys_call+0x58b/0x9a0 [ 762.572203][T16372] do_syscall_64+0x4c/0xa0 [ 762.576638][T16372] ? clear_bhb_loop+0x15/0x70 [ 762.581309][T16372] ? clear_bhb_loop+0x15/0x70 [ 762.585989][T16372] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 762.591997][T16372] RIP: 0033:0x7ff541d8e969 [ 762.596406][T16372] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 762.616186][T16372] RSP: 002b:00007ff542cda038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 762.624683][T16372] RAX: ffffffffffffffda RBX: 00007ff541fb5fa0 RCX: 00007ff541d8e969 [ 762.632657][T16372] RDX: 000000110e22fff6 RSI: 00000000c004743e RDI: 0000000000000006 [ 762.640624][T16372] RBP: 00007ff542cda090 R08: 0000000000000000 R09: 0000000000000000 [ 762.648590][T16372] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 762.657073][T16372] R13: 0000000000000000 R14: 00007ff541fb5fa0 R15: 00007ffe631fa598 [ 762.665050][T16372] [ 762.866831][T16379] device sit0 entered promiscuous mode [ 762.977966][T16372] device veth0_vlan left promiscuous mode [ 763.009313][T16372] device veth0_vlan entered promiscuous mode [ 763.175328][T16394] device sit0 left promiscuous mode [ 763.223901][T16396] FAULT_INJECTION: forcing a failure. [ 763.223901][T16396] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 763.285197][T16394] device sit0 entered promiscuous mode [ 763.318027][T16396] CPU: 0 PID: 16396 Comm: syz.3.5036 Not tainted 6.1.134-syzkaller-00014-g3cd01bb5bd37 #0 [ 763.328076][T16396] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/19/2025 [ 763.338150][T16396] Call Trace: [ 763.341442][T16396] [ 763.344385][T16396] __dump_stack+0x21/0x24 [ 763.348744][T16396] dump_stack_lvl+0xee/0x150 [ 763.353357][T16396] ? __cfi_dump_stack_lvl+0x8/0x8 [ 763.358444][T16396] ? migrate_enable+0x19c/0x280 [ 763.363314][T16396] dump_stack+0x15/0x24 [ 763.367494][T16396] should_fail_ex+0x3d4/0x520 [ 763.372278][T16396] should_fail+0xb/0x10 [ 763.376456][T16396] should_fail_usercopy+0x1a/0x20 [ 763.381502][T16396] _copy_from_user+0x1e/0xc0 [ 763.386115][T16396] generic_map_update_batch+0x4b1/0x780 [ 763.391695][T16396] ? __cfi_generic_map_update_batch+0x10/0x10 [ 763.397791][T16396] ? __fdget+0x19c/0x220 [ 763.402070][T16396] ? __cfi_generic_map_update_batch+0x10/0x10 [ 763.408163][T16396] bpf_map_do_batch+0x48c/0x620 [ 763.413035][T16396] __sys_bpf+0x624/0x780 [ 763.417320][T16396] ? bpf_link_show_fdinfo+0x320/0x320 [ 763.422813][T16396] ? __cfi_ksys_write+0x10/0x10 [ 763.427790][T16396] ? debug_smp_processor_id+0x17/0x20 [ 763.433200][T16396] __x64_sys_bpf+0x7c/0x90 [ 763.437651][T16396] x64_sys_call+0x488/0x9a0 [ 763.442177][T16396] do_syscall_64+0x4c/0xa0 [ 763.446621][T16396] ? clear_bhb_loop+0x15/0x70 [ 763.451332][T16396] ? clear_bhb_loop+0x15/0x70 [ 763.456030][T16396] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 763.461968][T16396] RIP: 0033:0x7f01c1b8e969 [ 763.466494][T16396] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 763.486212][T16396] RSP: 002b:00007f01c29a4038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 763.494649][T16396] RAX: ffffffffffffffda RBX: 00007f01c1db5fa0 RCX: 00007f01c1b8e969 [ 763.502725][T16396] RDX: 0000000000000038 RSI: 0000200000000900 RDI: 000000000000001a [ 763.510761][T16396] RBP: 00007f01c29a4090 R08: 0000000000000000 R09: 0000000000000000 [ 763.518752][T16396] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 763.526747][T16396] R13: 0000000000000000 R14: 00007f01c1db5fa0 R15: 00007ffc61b12478 [ 763.534748][T16396] [ 763.605064][T16399] device veth0_vlan left promiscuous mode [ 763.623365][T16399] device veth0_vlan entered promiscuous mode [ 764.623023][T16426] device veth0_vlan left promiscuous mode [ 764.757383][T16426] device veth0_vlan entered promiscuous mode [ 764.861131][T12072] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 764.872942][T12072] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 764.883974][T12072] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 764.926759][T16441] device pim6reg1 entered promiscuous mode [ 764.940135][T16449] device sit0 left promiscuous mode [ 765.051683][T16446] device veth0_vlan left promiscuous mode [ 765.115827][T16446] device veth0_vlan entered promiscuous mode [ 765.133731][T16449] device sit0 entered promiscuous mode [ 765.447223][T16466] bond_slave_1: mtu less than device minimum [ 765.981873][T16484] FAULT_INJECTION: forcing a failure. [ 765.981873][T16484] name failslab, interval 1, probability 0, space 0, times 0 [ 765.995010][T16484] CPU: 1 PID: 16484 Comm: syz.1.5060 Not tainted 6.1.134-syzkaller-00014-g3cd01bb5bd37 #0 [ 766.004936][T16484] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/19/2025 [ 766.015020][T16484] Call Trace: [ 766.018316][T16484] [ 766.021260][T16484] __dump_stack+0x21/0x24 [ 766.025620][T16484] dump_stack_lvl+0xee/0x150 [ 766.030237][T16484] ? __cfi_dump_stack_lvl+0x8/0x8 [ 766.035288][T16484] ? copy_sighand+0x54/0x230 [ 766.039913][T16484] dump_stack+0x15/0x24 [ 766.044093][T16484] should_fail_ex+0x3d4/0x520 [ 766.048881][T16484] ? copy_signal+0x54/0x630 [ 766.053413][T16484] __should_failslab+0xac/0xf0 [ 766.058194][T16484] should_failslab+0x9/0x20 [ 766.062724][T16484] kmem_cache_alloc+0x3b/0x330 [ 766.067511][T16484] copy_signal+0x54/0x630 [ 766.071870][T16484] ? copy_process+0x1256/0x3470 [ 766.076747][T16484] copy_process+0x1277/0x3470 [ 766.081454][T16484] ? idle_dummy+0x10/0x10 [ 766.085901][T16484] kernel_clone+0x23a/0x810 [ 766.090427][T16484] ? __cfi_kernel_clone+0x10/0x10 [ 766.095479][T16484] ? __kasan_check_write+0x14/0x20 [ 766.100617][T16484] ? mutex_unlock+0x89/0x220 [ 766.105242][T16484] __x64_sys_clone+0x168/0x1b0 [ 766.110030][T16484] ? __cfi___x64_sys_clone+0x10/0x10 [ 766.115351][T16484] ? fpregs_assert_state_consistent+0xb1/0xe0 [ 766.121556][T16484] x64_sys_call+0x990/0x9a0 [ 766.126102][T16484] do_syscall_64+0x4c/0xa0 [ 766.130546][T16484] ? clear_bhb_loop+0x15/0x70 [ 766.135248][T16484] ? clear_bhb_loop+0x15/0x70 [ 766.139942][T16484] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 766.145860][T16484] RIP: 0033:0x7f01b078e969 [ 766.150282][T16484] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 766.169885][T16484] RSP: 002b:00007f01b16e0fe8 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 766.178307][T16484] RAX: ffffffffffffffda RBX: 00007f01b09b5fa0 RCX: 00007f01b078e969 [ 766.186284][T16484] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000040000000 [ 766.194252][T16484] RBP: 00007f01b16e1090 R08: 0000000000000000 R09: 0000000000000000 [ 766.202398][T16484] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000002 [ 766.210368][T16484] R13: 0000000000000000 R14: 00007f01b09b5fa0 R15: 00007ffe55ef76a8 [ 766.218345][T16484] [ 766.599891][T16501] device sit0 left promiscuous mode [ 766.685734][T16495] device veth0_vlan left promiscuous mode [ 766.785209][T16495] device veth0_vlan entered promiscuous mode [ 766.835893][T16502] device sit0 entered promiscuous mode [ 767.355492][T16529] FAULT_INJECTION: forcing a failure. [ 767.355492][T16529] name failslab, interval 1, probability 0, space 0, times 0 [ 767.403949][T16529] CPU: 0 PID: 16529 Comm: syz.2.5077 Not tainted 6.1.134-syzkaller-00014-g3cd01bb5bd37 #0 [ 767.413891][T16529] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/19/2025 [ 767.423966][T16529] Call Trace: [ 767.427267][T16529] [ 767.430234][T16529] __dump_stack+0x21/0x24 [ 767.434687][T16529] dump_stack_lvl+0xee/0x150 [ 767.439306][T16529] ? __cfi_dump_stack_lvl+0x8/0x8 [ 767.444361][T16529] ? __cfi_handle_mm_fault+0x10/0x10 [ 767.449675][T16529] ? down_read_trylock+0x273/0x640 [ 767.454816][T16529] dump_stack+0x15/0x24 [ 767.459086][T16529] should_fail_ex+0x3d4/0x520 [ 767.463797][T16529] __should_failslab+0xac/0xf0 [ 767.468585][T16529] ? kvmalloc_node+0x294/0x480 [ 767.473386][T16529] should_failslab+0x9/0x20 [ 767.477918][T16529] __kmem_cache_alloc_node+0x3d/0x2c0 [ 767.483314][T16529] ? up_read+0x56/0x1d0 [ 767.487312][T16533] device veth0_vlan left promiscuous mode [ 767.487496][T16529] ? kvmalloc_node+0x294/0x480 [ 767.487532][T16529] __kmalloc_node+0xa1/0x1e0 [ 767.487564][T16529] kvmalloc_node+0x294/0x480 [ 767.487595][T16529] ? __cfi_kvmalloc_node+0x10/0x10 [ 767.487625][T16529] ? __cfi_paravirt_BUG+0x10/0x10 [ 767.487649][T16529] ? asm_exc_page_fault+0x27/0x30 [ 767.487684][T16529] alloc_netdev_mqs+0x8d/0xf90 [ 767.487707][T16529] ? __cfi_ppp_setup+0x10/0x10 [ 767.532129][T16529] ppp_ioctl+0x5aa/0x1690 [ 767.536498][T16529] ? mutex_unlock+0x89/0x220 [ 767.541115][T16529] ? __cfi_ppp_ioctl+0x10/0x10 [ 767.545913][T16529] ? __fget_files+0x2d5/0x330 [ 767.550773][T16529] ? security_file_ioctl+0x95/0xc0 [ 767.555909][T16529] ? __cfi_ppp_ioctl+0x10/0x10 [ 767.560698][T16529] __se_sys_ioctl+0x12f/0x1b0 [ 767.565404][T16529] __x64_sys_ioctl+0x7b/0x90 [ 767.570029][T16529] x64_sys_call+0x58b/0x9a0 [ 767.574651][T16529] do_syscall_64+0x4c/0xa0 [ 767.579182][T16529] ? clear_bhb_loop+0x15/0x70 [ 767.583880][T16529] ? clear_bhb_loop+0x15/0x70 [ 767.588877][T16529] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 767.594798][T16529] RIP: 0033:0x7f528bb8e969 [ 767.599226][T16529] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 767.618938][T16529] RSP: 002b:00007f528c91d038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 767.627380][T16529] RAX: ffffffffffffffda RBX: 00007f528bdb5fa0 RCX: 00007f528bb8e969 [ 767.635391][T16529] RDX: 000000110e22fff6 RSI: 00000000c004743e RDI: 0000000000000006 [ 767.643433][T16529] RBP: 00007f528c91d090 R08: 0000000000000000 R09: 0000000000000000 [ 767.651436][T16529] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 767.659528][T16529] R13: 0000000000000000 R14: 00007f528bdb5fa0 R15: 00007ffc8eb21748 [ 767.667527][T16529] [ 767.701722][T16533] device veth0_vlan entered promiscuous mode [ 768.049317][T16530] bond_slave_1: mtu less than device minimum [ 769.075992][T16562] device sit0 entered promiscuous mode [ 769.292884][T16567] device sit0 left promiscuous mode [ 769.720710][T16574] bond_slave_1: mtu less than device minimum [ 769.833103][T16585] device veth0_vlan left promiscuous mode [ 769.845770][T16585] device veth0_vlan entered promiscuous mode [ 770.153488][T16599] device sit0 left promiscuous mode [ 770.234216][T16599] device sit0 entered promiscuous mode [ 770.753232][T16616] device sit0 left promiscuous mode [ 770.890829][T16623] device sit0 entered promiscuous mode [ 771.055882][T16633] FAULT_INJECTION: forcing a failure. [ 771.055882][T16633] name failslab, interval 1, probability 0, space 0, times 0 [ 771.103960][T16633] CPU: 1 PID: 16633 Comm: syz.0.5109 Not tainted 6.1.134-syzkaller-00014-g3cd01bb5bd37 #0 [ 771.113909][T16633] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/19/2025 [ 771.123996][T16633] Call Trace: [ 771.127294][T16633] [ 771.130237][T16633] __dump_stack+0x21/0x24 [ 771.134595][T16633] dump_stack_lvl+0xee/0x150 [ 771.139215][T16633] ? __cfi_dump_stack_lvl+0x8/0x8 [ 771.144258][T16633] ? entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 771.150356][T16633] dump_stack+0x15/0x24 [ 771.154540][T16633] should_fail_ex+0x3d4/0x520 [ 771.159247][T16633] ? copy_mm+0x15b/0x1a10 [ 771.163618][T16633] __should_failslab+0xac/0xf0 [ 771.168413][T16633] should_failslab+0x9/0x20 [ 771.172944][T16633] kmem_cache_alloc+0x3b/0x330 [ 771.177746][T16633] copy_mm+0x15b/0x1a10 [ 771.181932][T16633] ? __kasan_slab_alloc+0x72/0x80 [ 771.186993][T16633] ? copy_signal+0x630/0x630 [ 771.191622][T16633] ? _raw_spin_lock+0x8e/0xe0 [ 771.196334][T16633] ? __cfi__raw_spin_lock+0x10/0x10 [ 771.201560][T16633] ? memset+0x35/0x40 [ 771.205573][T16633] ? __init_rwsem+0x12c/0x240 [ 771.210277][T16633] ? copy_signal+0x4ea/0x630 [ 771.214912][T16633] copy_process+0x12a8/0x3470 [ 771.219632][T16633] ? idle_dummy+0x10/0x10 [ 771.223993][T16633] kernel_clone+0x23a/0x810 [ 771.228527][T16633] ? __cfi_kernel_clone+0x10/0x10 [ 771.233587][T16633] ? __kasan_check_write+0x14/0x20 [ 771.238727][T16633] ? mutex_unlock+0x89/0x220 [ 771.243370][T16633] __x64_sys_clone+0x168/0x1b0 [ 771.248167][T16633] ? __cfi___x64_sys_clone+0x10/0x10 [ 771.253489][T16633] ? fpregs_assert_state_consistent+0xb1/0xe0 [ 771.259600][T16633] x64_sys_call+0x990/0x9a0 [ 771.264139][T16633] do_syscall_64+0x4c/0xa0 [ 771.268587][T16633] ? clear_bhb_loop+0x15/0x70 [ 771.273297][T16633] ? clear_bhb_loop+0x15/0x70 [ 771.278098][T16633] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 771.284026][T16633] RIP: 0033:0x7ff541d8e969 [ 771.288456][T16633] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 771.308086][T16633] RSP: 002b:00007ff542cd9fe8 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 771.316524][T16633] RAX: ffffffffffffffda RBX: 00007ff541fb5fa0 RCX: 00007ff541d8e969 [ 771.324522][T16633] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000040000000 [ 771.332603][T16633] RBP: 00007ff542cda090 R08: 0000000000000000 R09: 0000000000000000 [ 771.340596][T16633] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000002 [ 771.348585][T16633] R13: 0000000000000000 R14: 00007ff541fb5fa0 R15: 00007ffe631fa598 [ 771.356580][T16633] [ 771.365685][T16637] bond_slave_1: mtu less than device minimum [ 771.377922][T16640] bridge0: port 2(bridge_slave_1) entered disabled state [ 771.388397][T16640] bridge0: port 1(bridge_slave_0) entered disabled state [ 771.720683][T16652] device veth0_vlan left promiscuous mode [ 771.905419][T16652] device veth0_vlan entered promiscuous mode [ 772.455514][T12390] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 772.494469][T12390] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 772.579756][T12390] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 772.729891][T16666] device sit0 left promiscuous mode [ 772.861131][T16672] syz.0.5119[16672] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 772.861257][T16672] syz.0.5119[16672] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 772.903078][T16669] device sit0 entered promiscuous mode [ 773.074685][T16675] device sit0 left promiscuous mode [ 773.522297][T16689] device veth0_vlan left promiscuous mode [ 773.737431][T16689] device veth0_vlan entered promiscuous mode [ 774.154353][ T28] audit: type=1400 audit(1747296947.165:151): avc: denied { create } for pid=16697 comm="syz.0.5126" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_connector_socket permissive=1 [ 774.217193][T16700] device sit0 entered promiscuous mode [ 775.109051][T16718] device sit0 left promiscuous mode [ 775.171904][T16718] device sit0 entered promiscuous mode [ 775.345986][T16720] device sit0 left promiscuous mode [ 775.546018][T16729] @ÿ: renamed from bond_slave_0 [ 775.629724][T16739] device veth0_vlan left promiscuous mode [ 775.952952][T16739] device veth0_vlan entered promiscuous mode [ 776.149996][T16753] device veth0_vlan left promiscuous mode [ 776.162773][T16753] device veth0_vlan entered promiscuous mode [ 776.176592][T12390] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 776.201090][T12390] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 776.212745][T12390] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 776.235407][T16758] device veth0_vlan left promiscuous mode [ 776.248165][T16758] device veth0_vlan entered promiscuous mode [ 776.257036][T12390] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 776.295469][T12390] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 776.335956][T12390] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 776.353393][T16755] device pim6reg1 entered promiscuous mode [ 776.992164][T16781] device syzkaller0 entered promiscuous mode [ 777.436209][T16797] device veth0_vlan left promiscuous mode [ 777.636791][T16797] device veth0_vlan entered promiscuous mode [ 778.003928][T16815] device sit0 left promiscuous mode [ 778.208005][T16818] device veth0_vlan left promiscuous mode [ 778.223963][T16818] device veth0_vlan entered promiscuous mode [ 778.621249][T16848] device pim6reg1 entered promiscuous mode [ 778.819751][T16860] device sit0 entered promiscuous mode [ 779.230235][T16869] FAULT_INJECTION: forcing a failure. [ 779.230235][T16869] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 779.268748][T16869] CPU: 1 PID: 16869 Comm: syz.1.5179 Not tainted 6.1.134-syzkaller-00014-g3cd01bb5bd37 #0 [ 779.278705][T16869] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/19/2025 [ 779.288789][T16869] Call Trace: [ 779.292082][T16869] [ 779.295025][T16869] __dump_stack+0x21/0x24 [ 779.299392][T16869] dump_stack_lvl+0xee/0x150 [ 779.304106][T16869] ? __cfi_dump_stack_lvl+0x8/0x8 [ 779.309169][T16869] ? migrate_enable+0x19c/0x280 [ 779.314051][T16869] dump_stack+0x15/0x24 [ 779.318235][T16869] should_fail_ex+0x3d4/0x520 [ 779.322986][T16869] should_fail+0xb/0x10 [ 779.327252][T16869] should_fail_usercopy+0x1a/0x20 [ 779.332302][T16869] _copy_from_user+0x1e/0xc0 [ 779.336919][T16869] generic_map_update_batch+0x458/0x780 [ 779.342495][T16869] ? __cfi_generic_map_update_batch+0x10/0x10 [ 779.348596][T16869] ? __fdget+0x19c/0x220 [ 779.352876][T16869] ? __cfi_generic_map_update_batch+0x10/0x10 [ 779.358967][T16869] bpf_map_do_batch+0x48c/0x620 [ 779.363848][T16869] __sys_bpf+0x624/0x780 [ 779.368116][T16869] ? bpf_link_show_fdinfo+0x320/0x320 [ 779.373520][T16869] ? __cfi_ksys_write+0x10/0x10 [ 779.378407][T16869] ? debug_smp_processor_id+0x17/0x20 [ 779.383818][T16869] __x64_sys_bpf+0x7c/0x90 [ 779.388272][T16869] x64_sys_call+0x488/0x9a0 [ 779.392800][T16869] do_syscall_64+0x4c/0xa0 [ 779.397243][T16869] ? clear_bhb_loop+0x15/0x70 [ 779.401941][T16869] ? clear_bhb_loop+0x15/0x70 [ 779.406637][T16869] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 779.412645][T16869] RIP: 0033:0x7f01b078e969 [ 779.417079][T16869] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 779.436729][T16869] RSP: 002b:00007f01b16e1038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 779.445172][T16869] RAX: ffffffffffffffda RBX: 00007f01b09b5fa0 RCX: 00007f01b078e969 [ 779.453165][T16869] RDX: 0000000000000038 RSI: 0000200000000900 RDI: 000000000000001a [ 779.461151][T16869] RBP: 00007f01b16e1090 R08: 0000000000000000 R09: 0000000000000000 [ 779.469135][T16869] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 779.477119][T16869] R13: 0000000000000000 R14: 00007f01b09b5fa0 R15: 00007ffe55ef76a8 [ 779.485100][T16869] [ 779.614684][T16879] device pim6reg1 entered promiscuous mode [ 779.683156][T16886] device sit0 left promiscuous mode [ 779.738811][T16888] device sit0 entered promiscuous mode [ 779.965337][ T28] audit: type=1400 audit(1747296952.975:152): avc: denied { append } for pid=16901 comm="syz.1.5191" name="ppp" dev="devtmpfs" ino=158 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ppp_device_t tclass=chr_file permissive=1 [ 780.353816][T16919] device sit0 left promiscuous mode [ 780.527563][T16924] device pim6reg1 entered promiscuous mode [ 780.727416][T16928] device veth0_vlan left promiscuous mode [ 780.955554][T16928] device veth0_vlan entered promiscuous mode [ 781.441731][T16956] device sit0 entered promiscuous mode [ 781.680107][T16963] device veth0_vlan left promiscuous mode [ 781.770533][T16963] device veth0_vlan entered promiscuous mode [ 782.076267][T16969] device sit0 left promiscuous mode [ 782.098567][T16970] device sit0 entered promiscuous mode [ 782.535546][T16978] device sit0 entered promiscuous mode [ 782.868406][T16993] device veth0_vlan left promiscuous mode [ 783.050266][T16993] device veth0_vlan entered promiscuous mode [ 784.195580][T17022] device sit0 left promiscuous mode [ 784.419429][T17023] device sit0 entered promiscuous mode [ 784.750462][T17030] device sit0 left promiscuous mode [ 784.977069][T17041] device sit0 entered promiscuous mode [ 786.538782][T17068] device veth0_vlan left promiscuous mode [ 786.582958][T17068] device veth0_vlan entered promiscuous mode [ 787.039770][T12390] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 787.068536][T12390] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 787.103779][T12390] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 787.133048][T17080] bond_slave_1: mtu less than device minimum [ 787.194958][T17089] FAULT_INJECTION: forcing a failure. [ 787.194958][T17089] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 787.213059][T17089] CPU: 1 PID: 17089 Comm: syz.2.5247 Not tainted 6.1.134-syzkaller-00014-g3cd01bb5bd37 #0 [ 787.222994][T17089] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/19/2025 [ 787.233074][T17089] Call Trace: [ 787.236370][T17089] [ 787.239310][T17089] __dump_stack+0x21/0x24 [ 787.243665][T17089] dump_stack_lvl+0xee/0x150 [ 787.248284][T17089] ? __cfi_dump_stack_lvl+0x8/0x8 [ 787.253335][T17089] ? migrate_enable+0x19c/0x280 [ 787.258209][T17089] dump_stack+0x15/0x24 [ 787.262384][T17089] should_fail_ex+0x3d4/0x520 [ 787.267082][T17089] should_fail+0xb/0x10 [ 787.271252][T17089] should_fail_usercopy+0x1a/0x20 [ 787.276295][T17089] _copy_from_user+0x1e/0xc0 [ 787.280902][T17089] generic_map_update_batch+0x4b1/0x780 [ 787.286479][T17089] ? __cfi_generic_map_update_batch+0x10/0x10 [ 787.292663][T17089] ? __fdget+0x19c/0x220 [ 787.297376][T17089] ? __cfi_generic_map_update_batch+0x10/0x10 [ 787.303483][T17089] bpf_map_do_batch+0x48c/0x620 [ 787.308353][T17089] __sys_bpf+0x624/0x780 [ 787.312622][T17089] ? bpf_link_show_fdinfo+0x320/0x320 [ 787.318022][T17089] ? __cfi_ksys_write+0x10/0x10 [ 787.322918][T17089] ? debug_smp_processor_id+0x17/0x20 [ 787.328293][T17089] __x64_sys_bpf+0x7c/0x90 [ 787.332715][T17089] x64_sys_call+0x488/0x9a0 [ 787.337219][T17089] do_syscall_64+0x4c/0xa0 [ 787.341668][T17089] ? clear_bhb_loop+0x15/0x70 [ 787.346343][T17089] ? clear_bhb_loop+0x15/0x70 [ 787.351016][T17089] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 787.356912][T17089] RIP: 0033:0x7f528bb8e969 [ 787.361327][T17089] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 787.380930][T17089] RSP: 002b:00007f528c91d038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 787.389343][T17089] RAX: ffffffffffffffda RBX: 00007f528bdb5fa0 RCX: 00007f528bb8e969 [ 787.397311][T17089] RDX: 0000000000000038 RSI: 0000200000000900 RDI: 000000000000001a [ 787.405305][T17089] RBP: 00007f528c91d090 R08: 0000000000000000 R09: 0000000000000000 [ 787.413308][T17089] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 787.421277][T17089] R13: 0000000000000000 R14: 00007f528bdb5fa0 R15: 00007ffc8eb21748 [ 787.429274][T17089] [ 787.471668][T17087] device sit0 entered promiscuous mode [ 788.470609][T17136] device sit0 left promiscuous mode [ 788.524200][T17136] device sit0 entered promiscuous mode [ 789.062630][T17145] device team_slave_1 left promiscuous mode [ 789.108818][T17145] bridge0: port 3(team_slave_1) entered disabled state [ 789.142748][T17145] device bridge_slave_1 left promiscuous mode [ 789.199323][T17145] bridge0: port 2(bridge_slave_1) entered disabled state [ 789.317174][T17145] bridge0: port 1(bridge_slave_0) entered disabled state [ 789.715920][T17154] device veth0_vlan left promiscuous mode [ 789.776776][T17154] device veth0_vlan entered promiscuous mode [ 789.905977][T12390] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 789.914652][T12390] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 789.955243][T12390] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 790.298758][T17165] device veth0_vlan left promiscuous mode [ 790.460142][T17165] device veth0_vlan entered promiscuous mode [ 790.561553][T17181] FAULT_INJECTION: forcing a failure. [ 790.561553][T17181] name failslab, interval 1, probability 0, space 0, times 0 [ 790.585259][ T2451] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 790.594080][ T2451] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 790.601655][T17181] CPU: 0 PID: 17181 Comm: syz.4.5274 Not tainted 6.1.134-syzkaller-00014-g3cd01bb5bd37 #0 [ 790.611566][T17181] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/19/2025 [ 790.621727][T17181] Call Trace: [ 790.625024][T17181] [ 790.627970][T17181] __dump_stack+0x21/0x24 [ 790.632338][T17181] dump_stack_lvl+0xee/0x150 [ 790.636950][T17181] ? __cfi_dump_stack_lvl+0x8/0x8 [ 790.642006][T17181] dump_stack+0x15/0x24 [ 790.646194][T17181] should_fail_ex+0x3d4/0x520 [ 790.650894][T17181] __should_failslab+0xac/0xf0 [ 790.655682][T17181] should_failslab+0x9/0x20 [ 790.660211][T17181] kmem_cache_alloc_bulk+0x2d/0x3c0 [ 790.665436][T17181] mas_dup_build+0xa76/0x17e0 [ 790.670142][T17181] __mt_dup+0x12a/0x1f0 [ 790.674321][T17181] ? __cfi___mt_dup+0x10/0x10 [ 790.679030][T17181] ? _raw_spin_lock+0x8e/0xe0 [ 790.683733][T17181] ? memset+0x35/0x40 [ 790.687739][T17181] copy_mm+0x6a1/0x1a10 [ 790.691923][T17181] ? copy_signal+0x630/0x630 [ 790.696538][T17181] ? _raw_spin_lock+0x8e/0xe0 [ 790.701236][T17181] ? __cfi__raw_spin_lock+0x10/0x10 [ 790.706455][T17181] ? __init_rwsem+0x12c/0x240 [ 790.711246][T17181] ? copy_signal+0x4ea/0x630 [ 790.715871][T17181] copy_process+0x12a8/0x3470 [ 790.720589][T17181] ? idle_dummy+0x10/0x10 [ 790.724943][T17181] kernel_clone+0x23a/0x810 [ 790.729476][T17181] ? __cfi_kernel_clone+0x10/0x10 [ 790.734526][T17181] ? __kasan_check_write+0x14/0x20 [ 790.739659][T17181] ? mutex_unlock+0x89/0x220 [ 790.744277][T17181] __x64_sys_clone+0x168/0x1b0 [ 790.749072][T17181] ? __cfi___x64_sys_clone+0x10/0x10 [ 790.754390][T17181] ? fpregs_assert_state_consistent+0xb1/0xe0 [ 790.760481][T17181] x64_sys_call+0x990/0x9a0 [ 790.765003][T17181] do_syscall_64+0x4c/0xa0 [ 790.769439][T17181] ? clear_bhb_loop+0x15/0x70 [ 790.774131][T17181] ? clear_bhb_loop+0x15/0x70 [ 790.778822][T17181] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 790.784750][T17181] RIP: 0033:0x7fbeb958e969 [ 790.789178][T17181] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 790.808802][T17181] RSP: 002b:00007fbeba456fe8 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 790.817234][T17181] RAX: ffffffffffffffda RBX: 00007fbeb97b5fa0 RCX: 00007fbeb958e969 [ 790.825223][T17181] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000040000000 [ 790.833249][T17181] RBP: 00007fbeba457090 R08: 0000000000000000 R09: 0000000000000000 [ 790.836633][ T2451] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 790.841234][T17181] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000002 [ 790.841251][T17181] R13: 0000000000000000 R14: 00007fbeb97b5fa0 R15: 00007fffc5bf9758 [ 790.841272][T17181] [ 790.871321][T17172] device sit0 left promiscuous mode [ 790.886922][T17175] device sit0 entered promiscuous mode [ 792.248785][T17224] device sit0 left promiscuous mode [ 792.294614][T17220] device sit0 left promiscuous mode [ 792.407961][T17222] device sit0 left promiscuous mode [ 792.499395][T17225] device sit0 entered promiscuous mode [ 792.704757][T17231] device pim6reg1 entered promiscuous mode [ 792.711559][T17232] device pim6reg1 entered promiscuous mode [ 795.712740][T17335] FAULT_INJECTION: forcing a failure. [ 795.712740][T17335] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 795.820774][T17335] CPU: 1 PID: 17335 Comm: syz.2.5320 Not tainted 6.1.134-syzkaller-00014-g3cd01bb5bd37 #0 [ 795.830803][T17335] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/19/2025 [ 795.840882][T17335] Call Trace: [ 795.844175][T17335] [ 795.847130][T17335] __dump_stack+0x21/0x24 [ 795.851495][T17335] dump_stack_lvl+0xee/0x150 [ 795.856105][T17335] ? __cfi_dump_stack_lvl+0x8/0x8 [ 795.861156][T17335] dump_stack+0x15/0x24 [ 795.865339][T17335] should_fail_ex+0x3d4/0x520 [ 795.870043][T17335] should_fail+0xb/0x10 [ 795.874312][T17335] should_fail_usercopy+0x1a/0x20 [ 795.879363][T17335] _copy_to_user+0x1e/0x90 [ 795.883802][T17335] simple_read_from_buffer+0xe9/0x160 [ 795.889214][T17335] proc_fail_nth_read+0x19a/0x210 [ 795.894274][T17335] ? __cfi_proc_fail_nth_read+0x10/0x10 [ 795.899871][T17335] ? security_file_permission+0x94/0xb0 [ 795.905449][T17335] ? __cfi_proc_fail_nth_read+0x10/0x10 [ 795.911030][T17335] vfs_read+0x26e/0x8c0 [ 795.915220][T17335] ? __cfi_vfs_read+0x10/0x10 [ 795.919919][T17335] ? __kasan_check_write+0x14/0x20 [ 795.925064][T17335] ? mutex_lock+0x8d/0x1a0 [ 795.929516][T17335] ? __cfi_mutex_lock+0x10/0x10 [ 795.934396][T17335] ? __fdget_pos+0x2cd/0x380 [ 795.939012][T17335] ? ksys_read+0x71/0x240 [ 795.943368][T17335] ksys_read+0x140/0x240 [ 795.947630][T17335] ? __cfi_ksys_read+0x10/0x10 [ 795.952414][T17335] ? fpregs_restore_userregs+0x128/0x260 [ 795.958061][T17335] __x64_sys_read+0x7b/0x90 [ 795.962584][T17335] x64_sys_call+0x2f/0x9a0 [ 795.967017][T17335] do_syscall_64+0x4c/0xa0 [ 795.971452][T17335] ? clear_bhb_loop+0x15/0x70 [ 795.976140][T17335] ? clear_bhb_loop+0x15/0x70 [ 795.980862][T17335] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 795.986787][T17335] RIP: 0033:0x7f528bb8d37c [ 795.991216][T17335] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 93 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 ef 93 02 00 48 [ 796.010866][T17335] RSP: 002b:00007f528c91d030 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 796.019305][T17335] RAX: ffffffffffffffda RBX: 00007f528bdb5fa0 RCX: 00007f528bb8d37c [ 796.027299][T17335] RDX: 000000000000000f RSI: 00007f528c91d0a0 RDI: 0000000000000006 [ 796.035287][T17335] RBP: 00007f528c91d090 R08: 0000000000000000 R09: 0000000000000000 [ 796.043275][T17335] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000002 [ 796.051351][T17335] R13: 0000000000000000 R14: 00007f528bdb5fa0 R15: 00007ffc8eb21748 [ 796.059353][T17335] [ 796.613366][T17343] device veth0_vlan left promiscuous mode [ 796.646786][T17343] device veth0_vlan entered promiscuous mode [ 796.684965][T12390] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 796.738893][T12390] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 796.777193][T12390] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 797.115587][T17374] device sit0 left promiscuous mode [ 798.609003][T17397] device syzkaller0 entered promiscuous mode [ 798.913690][T17412] device sit0 entered promiscuous mode [ 798.938111][T17414] device sit0 left promiscuous mode [ 799.018456][T17414] device sit0 entered promiscuous mode [ 799.076953][T17422] device veth0_vlan left promiscuous mode [ 799.091033][T17422] device veth0_vlan entered promiscuous mode [ 799.133825][T17426] device sit0 left promiscuous mode [ 799.170782][T17424] device veth0_vlan left promiscuous mode [ 799.335180][T17424] device veth0_vlan entered promiscuous mode [ 799.614354][T17426] device sit0 entered promiscuous mode [ 799.991670][T17446] device wg2 entered promiscuous mode [ 800.223548][T17455] device syzkaller0 entered promiscuous mode [ 800.697524][T17467] bond_slave_1: mtu less than device minimum [ 800.747156][T17470] device sit0 left promiscuous mode [ 800.925030][T17470] device sit0 entered promiscuous mode [ 802.023006][T17500] device veth0_vlan left promiscuous mode [ 802.085417][T17500] device veth0_vlan entered promiscuous mode [ 802.163881][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 802.184370][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 802.207454][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 802.252523][T17505] device veth0_vlan left promiscuous mode [ 802.400225][T17505] device veth0_vlan entered promiscuous mode [ 802.711284][T17514] device veth0_vlan left promiscuous mode [ 802.892983][T17514] device veth0_vlan entered promiscuous mode [ 803.512693][T17526] device veth0_vlan left promiscuous mode [ 803.530196][T17526] device veth0_vlan entered promiscuous mode [ 804.057540][T17542] device veth0_vlan left promiscuous mode [ 804.084805][T17542] device veth0_vlan entered promiscuous mode [ 804.696200][T17563] device veth0_vlan left promiscuous mode [ 804.732249][T17563] device veth0_vlan entered promiscuous mode [ 805.168531][T17573] device sit0 entered promiscuous mode [ 805.943523][T17595] device veth0_vlan left promiscuous mode [ 806.014587][T17595] device veth0_vlan entered promiscuous mode [ 806.192705][T17609] device veth0_vlan left promiscuous mode [ 806.272672][T17609] device veth0_vlan entered promiscuous mode [ 806.406739][T12390] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 806.440708][T12390] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 806.489200][T12390] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 808.242529][T17645] device veth0_vlan left promiscuous mode [ 808.255243][T17645] device veth0_vlan entered promiscuous mode [ 808.288908][T12072] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 808.329421][T12072] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 808.372953][T12072] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 808.414067][T17655] device veth0_vlan left promiscuous mode [ 808.632133][T17655] device veth0_vlan entered promiscuous mode [ 810.271544][T17709] device sit0 left promiscuous mode [ 810.334859][T17706] device veth0_vlan left promiscuous mode [ 810.384219][T17706] device veth0_vlan entered promiscuous mode [ 810.490566][T17712] device sit0 entered promiscuous mode [ 810.628045][T17718] device sit0 left promiscuous mode [ 810.682489][T17718] device sit0 entered promiscuous mode [ 810.912868][T17731] device sit0 entered promiscuous mode [ 811.130757][T17729] device sit0 left promiscuous mode [ 811.238836][T17734] device pim6reg1 entered promiscuous mode [ 811.712869][T17746] bond_slave_1: mtu less than device minimum [ 811.747684][T17752] device veth0_vlan left promiscuous mode [ 811.783200][T17752] device veth0_vlan entered promiscuous mode [ 811.932054][T17759] device sit0 left promiscuous mode [ 811.987023][T17759] device sit0 entered promiscuous mode [ 812.834590][T17788] bond_slave_1: mtu less than device minimum [ 813.221282][T17792] device veth0_vlan left promiscuous mode [ 813.229525][T17794] FAULT_INJECTION: forcing a failure. [ 813.229525][T17794] name failslab, interval 1, probability 0, space 0, times 0 [ 813.247957][T17794] CPU: 0 PID: 17794 Comm: syz.2.5463 Not tainted 6.1.134-syzkaller-00014-g3cd01bb5bd37 #0 [ 813.257895][T17794] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/19/2025 [ 813.267973][T17794] Call Trace: [ 813.271264][T17794] [ 813.274201][T17794] __dump_stack+0x21/0x24 [ 813.278559][T17794] dump_stack_lvl+0xee/0x150 [ 813.283286][T17794] ? __cfi_dump_stack_lvl+0x8/0x8 [ 813.288334][T17794] dump_stack+0x15/0x24 [ 813.292515][T17794] should_fail_ex+0x3d4/0x520 [ 813.297215][T17794] __should_failslab+0xac/0xf0 [ 813.301995][T17794] should_failslab+0x9/0x20 [ 813.306523][T17794] kmem_cache_alloc_node+0x42/0x340 [ 813.311742][T17794] ? __alloc_skb+0xdf/0x7e0 [ 813.316261][T17794] ? kmem_cache_free+0x12d/0x300 [ 813.321216][T17794] __alloc_skb+0xdf/0x7e0 [ 813.325560][T17794] ? slab_free_freelist_hook+0xc2/0x190 [ 813.331131][T17794] alloc_skb_with_frags+0xa8/0x620 [ 813.336263][T17794] ? kmem_cache_free+0x12d/0x300 [ 813.341221][T17794] sock_alloc_send_pskb+0x853/0x980 [ 813.346455][T17794] ? __cfi_sock_alloc_send_pskb+0x10/0x10 [ 813.352200][T17794] ? __kasan_check_write+0x14/0x20 [ 813.357340][T17794] ? __cfi_sock_def_readable+0x10/0x10 [ 813.362822][T17794] ? __local_bh_enable_ip+0x58/0x80 [ 813.368036][T17794] ? __cfi_sock_def_readable+0x10/0x10 [ 813.373509][T17794] ? sk_psock_verdict_data_ready+0x1aa/0x1d0 [ 813.379508][T17794] unix_stream_sendmsg+0x41a/0xc90 [ 813.384634][T17794] ? unix_stream_sendmsg+0x781/0xc90 [ 813.389935][T17794] ? __cfi_unix_stream_sendmsg+0x10/0x10 [ 813.395577][T17794] ? stack_trace_save+0x98/0xe0 [ 813.400430][T17794] ? __stack_depot_save+0x36/0x480 [ 813.405557][T17794] ? security_socket_sendmsg+0x93/0xb0 [ 813.411022][T17794] ? __cfi_unix_stream_sendmsg+0x10/0x10 [ 813.416651][T17794] ____sys_sendmsg+0x5a9/0x990 [ 813.421422][T17794] ? __sys_sendmsg_sock+0x40/0x40 [ 813.426458][T17794] ? import_iovec+0x7c/0xb0 [ 813.430962][T17794] ___sys_sendmsg+0x21c/0x290 [ 813.435645][T17794] ? __sys_sendmsg+0x270/0x270 [ 813.440412][T17794] ? __kasan_check_write+0x14/0x20 [ 813.445530][T17794] ? proc_fail_nth_write+0x17a/0x1f0 [ 813.450823][T17794] ? vfs_write+0x9d6/0xca0 [ 813.455247][T17794] ? __fdget+0x19c/0x220 [ 813.459494][T17794] __x64_sys_sendmsg+0x1f0/0x2c0 [ 813.464525][T17794] ? __cfi___x64_sys_sendmsg+0x10/0x10 [ 813.470164][T17794] ? fpregs_assert_state_consistent+0xb1/0xe0 [ 813.476233][T17794] x64_sys_call+0x171/0x9a0 [ 813.480745][T17794] do_syscall_64+0x4c/0xa0 [ 813.485170][T17794] ? clear_bhb_loop+0x15/0x70 [ 813.489840][T17794] ? clear_bhb_loop+0x15/0x70 [ 813.494620][T17794] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 813.500519][T17794] RIP: 0033:0x7f528bb8e969 [ 813.504955][T17794] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 813.524559][T17794] RSP: 002b:00007f528c91d038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 813.532973][T17794] RAX: ffffffffffffffda RBX: 00007f528bdb5fa0 RCX: 00007f528bb8e969 [ 813.541031][T17794] RDX: 0000000000000000 RSI: 00002000000029c0 RDI: 0000000000000008 [ 813.549001][T17794] RBP: 00007f528c91d090 R08: 0000000000000000 R09: 0000000000000000 [ 813.556969][T17794] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 813.564955][T17794] R13: 0000000000000000 R14: 00007f528bdb5fa0 R15: 00007ffc8eb21748 [ 813.572931][T17794] [ 813.584390][T17792] device veth0_vlan entered promiscuous mode [ 813.911912][ T28] audit: type=1400 audit(1747296986.925:153): avc: denied { create } for pid=17810 comm="syz.0.5469" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 813.945940][T17813] FAULT_INJECTION: forcing a failure. [ 813.945940][T17813] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 814.031639][T17813] CPU: 1 PID: 17813 Comm: syz.1.5470 Not tainted 6.1.134-syzkaller-00014-g3cd01bb5bd37 #0 [ 814.041587][T17813] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/19/2025 [ 814.051665][T17813] Call Trace: [ 814.054961][T17813] [ 814.057903][T17813] __dump_stack+0x21/0x24 [ 814.062359][T17813] dump_stack_lvl+0xee/0x150 [ 814.066977][T17813] ? __cfi_dump_stack_lvl+0x8/0x8 [ 814.072026][T17813] dump_stack+0x15/0x24 [ 814.076208][T17813] should_fail_ex+0x3d4/0x520 [ 814.080906][T17813] should_fail+0xb/0x10 [ 814.085082][T17813] should_fail_usercopy+0x1a/0x20 [ 814.090129][T17813] _copy_to_user+0x1e/0x90 [ 814.094562][T17813] simple_read_from_buffer+0xe9/0x160 [ 814.099962][T17813] proc_fail_nth_read+0x19a/0x210 [ 814.105018][T17813] ? __cfi_proc_fail_nth_read+0x10/0x10 [ 814.110600][T17813] ? security_file_permission+0x94/0xb0 [ 814.116170][T17813] ? __cfi_proc_fail_nth_read+0x10/0x10 [ 814.121746][T17813] vfs_read+0x26e/0x8c0 [ 814.126019][T17813] ? __cfi_vfs_read+0x10/0x10 [ 814.130725][T17813] ? __kasan_check_write+0x14/0x20 [ 814.135859][T17813] ? mutex_lock+0x8d/0x1a0 [ 814.140303][T17813] ? __cfi_mutex_lock+0x10/0x10 [ 814.145198][T17813] ? __fdget_pos+0x2cd/0x380 [ 814.149813][T17813] ? ksys_read+0x71/0x240 [ 814.154166][T17813] ksys_read+0x140/0x240 [ 814.158426][T17813] ? __cfi_ksys_read+0x10/0x10 [ 814.163298][T17813] ? fput+0x154/0x1a0 [ 814.167287][T17813] ? debug_smp_processor_id+0x17/0x20 [ 814.172934][T17813] __x64_sys_read+0x7b/0x90 [ 814.177451][T17813] x64_sys_call+0x2f/0x9a0 [ 814.181869][T17813] do_syscall_64+0x4c/0xa0 [ 814.186290][T17813] ? clear_bhb_loop+0x15/0x70 [ 814.191049][T17813] ? clear_bhb_loop+0x15/0x70 [ 814.195723][T17813] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 814.201622][T17813] RIP: 0033:0x7f01b078d37c [ 814.206037][T17813] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 93 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 ef 93 02 00 48 [ 814.225756][T17813] RSP: 002b:00007f01b16e1030 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 814.234260][T17813] RAX: ffffffffffffffda RBX: 00007f01b09b5fa0 RCX: 00007f01b078d37c [ 814.242269][T17813] RDX: 000000000000000f RSI: 00007f01b16e10a0 RDI: 0000000000000007 [ 814.250238][T17813] RBP: 00007f01b16e1090 R08: 0000000000000000 R09: 0000000000000000 [ 814.258234][T17813] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 814.266200][T17813] R13: 0000000000000000 R14: 00007f01b09b5fa0 R15: 00007ffe55ef76a8 [ 814.274179][T17813] [ 814.286305][T17818] device veth0_vlan left promiscuous mode [ 814.351542][T17818] device veth0_vlan entered promiscuous mode [ 814.422480][T17822] device veth0_vlan left promiscuous mode [ 814.444619][T17822] device veth0_vlan entered promiscuous mode [ 815.737005][T17866] device veth0_vlan left promiscuous mode [ 815.785010][T17866] device veth0_vlan entered promiscuous mode [ 815.964006][T17869] device pim6reg1 entered promiscuous mode [ 816.643609][T17899] device sit0 left promiscuous mode [ 816.784365][T17900] device sit0 entered promiscuous mode [ 817.206141][T17908] device veth0_vlan left promiscuous mode [ 817.272107][T17908] device veth0_vlan entered promiscuous mode [ 817.529136][T17915] device pim6reg1 entered promiscuous mode [ 817.555597][T17913] device veth0_vlan left promiscuous mode [ 817.587737][T17913] device veth0_vlan entered promiscuous mode [ 817.722909][T17913] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 817.767109][T12072] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 817.796303][T12072] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 817.805271][T12072] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 817.897287][T17924] device veth0_vlan left promiscuous mode [ 818.000584][T17924] device veth0_vlan entered promiscuous mode [ 818.093498][T17928] device sit0 entered promiscuous mode [ 818.214437][T17933] device sit0 left promiscuous mode [ 818.236936][T17934] device sit0 entered promiscuous mode [ 818.493371][T17936] device sit0 left promiscuous mode [ 818.539479][T17939] device sit0 entered promiscuous mode [ 818.666497][T17945] bond_slave_1: mtu less than device minimum [ 818.684998][T17955] device veth0_vlan left promiscuous mode [ 818.741730][T17955] device veth0_vlan entered promiscuous mode [ 818.789410][T17955] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 818.834719][T12072] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 818.853475][T12072] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 818.898569][T12072] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 819.262110][T17973] FAULT_INJECTION: forcing a failure. [ 819.262110][T17973] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 819.280362][T17973] CPU: 0 PID: 17973 Comm: syz.1.5522 Not tainted 6.1.134-syzkaller-00014-g3cd01bb5bd37 #0 [ 819.290311][T17973] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/19/2025 [ 819.300389][T17973] Call Trace: [ 819.303680][T17973] [ 819.306623][T17973] __dump_stack+0x21/0x24 [ 819.310977][T17973] dump_stack_lvl+0xee/0x150 [ 819.315591][T17973] ? __cfi_dump_stack_lvl+0x8/0x8 [ 819.320645][T17973] ? kvm_sched_clock_read+0x18/0x40 [ 819.325881][T17973] dump_stack+0x15/0x24 [ 819.330064][T17973] should_fail_ex+0x3d4/0x520 [ 819.334763][T17973] should_fail+0xb/0x10 [ 819.338937][T17973] should_fail_usercopy+0x1a/0x20 [ 819.344015][T17973] _copy_from_user+0x1e/0xc0 [ 819.348622][T17973] iovec_from_user+0x1aa/0x2e0 [ 819.353408][T17973] __import_iovec+0x71/0x470 [ 819.358012][T17973] ? sysvec_apic_timer_interrupt+0x64/0xc0 [ 819.363836][T17973] import_iovec+0x7c/0xb0 [ 819.368193][T17973] ___sys_sendmsg+0x1e4/0x290 [ 819.372896][T17973] ? __sys_sendmsg+0x270/0x270 [ 819.377699][T17973] __x64_sys_sendmsg+0x1f0/0x2c0 [ 819.382666][T17973] ? __cfi___x64_sys_sendmsg+0x10/0x10 [ 819.388160][T17973] ? sched_clock_cpu+0x6e/0x250 [ 819.393037][T17973] ? debug_smp_processor_id+0x17/0x20 [ 819.398506][T17973] ? fpregs_assert_state_consistent+0xb1/0xe0 [ 819.404596][T17973] x64_sys_call+0x171/0x9a0 [ 819.409099][T17973] do_syscall_64+0x4c/0xa0 [ 819.413530][T17973] ? clear_bhb_loop+0x15/0x70 [ 819.418225][T17973] ? clear_bhb_loop+0x15/0x70 [ 819.422901][T17973] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 819.428803][T17973] RIP: 0033:0x7f01b078e969 [ 819.433229][T17973] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 819.452882][T17973] RSP: 002b:00007f01b16e1038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 819.461337][T17973] RAX: ffffffffffffffda RBX: 00007f01b09b5fa0 RCX: 00007f01b078e969 [ 819.469328][T17973] RDX: 0000000000000000 RSI: 00002000000029c0 RDI: 0000000000000008 [ 819.477305][T17973] RBP: 00007f01b16e1090 R08: 0000000000000000 R09: 0000000000000000 [ 819.485289][T17973] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 819.493268][T17973] R13: 0000000000000000 R14: 00007f01b09b5fa0 R15: 00007ffe55ef76a8 [ 819.501247][T17973] [ 819.705024][T17987] FAULT_INJECTION: forcing a failure. [ 819.705024][T17987] name failslab, interval 1, probability 0, space 0, times 0 [ 819.791984][T17987] CPU: 0 PID: 17987 Comm: syz.1.5527 Not tainted 6.1.134-syzkaller-00014-g3cd01bb5bd37 #0 [ 819.801934][T17987] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/19/2025 [ 819.812016][T17987] Call Trace: [ 819.815310][T17987] [ 819.818247][T17987] __dump_stack+0x21/0x24 [ 819.822600][T17987] dump_stack_lvl+0xee/0x150 [ 819.827250][T17987] ? __cfi_dump_stack_lvl+0x8/0x8 [ 819.832295][T17987] ? __cfi_avc_has_perm_noaudit+0x10/0x10 [ 819.838043][T17987] dump_stack+0x15/0x24 [ 819.842222][T17987] should_fail_ex+0x3d4/0x520 [ 819.846928][T17987] ? dup_fd+0x56/0x8f0 [ 819.851023][T17987] __should_failslab+0xac/0xf0 [ 819.855804][T17987] should_failslab+0x9/0x20 [ 819.860331][T17987] kmem_cache_alloc+0x3b/0x330 [ 819.865127][T17987] dup_fd+0x56/0x8f0 [ 819.869048][T17987] ? __mutex_init+0xcd/0x1a0 [ 819.873661][T17987] ? perf_event_init_task+0x47b/0x4c0 [ 819.879057][T17987] copy_files+0x76/0xe0 [ 819.883241][T17987] copy_process+0x11f3/0x3470 [ 819.887948][T17987] ? idle_dummy+0x10/0x10 [ 819.892307][T17987] kernel_clone+0x23a/0x810 [ 819.896873][T17987] ? __cfi_kernel_clone+0x10/0x10 [ 819.901925][T17987] ? __kasan_check_write+0x14/0x20 [ 819.907065][T17987] ? mutex_unlock+0x89/0x220 [ 819.911684][T17987] __x64_sys_clone+0x168/0x1b0 [ 819.916475][T17987] ? __cfi___x64_sys_clone+0x10/0x10 [ 819.921795][T17987] ? fpregs_assert_state_consistent+0xb1/0xe0 [ 819.927897][T17987] x64_sys_call+0x990/0x9a0 [ 819.932426][T17987] do_syscall_64+0x4c/0xa0 [ 819.936866][T17987] ? clear_bhb_loop+0x15/0x70 [ 819.941568][T17987] ? clear_bhb_loop+0x15/0x70 [ 819.946320][T17987] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 819.952241][T17987] RIP: 0033:0x7f01b078e969 [ 819.956678][T17987] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 819.976389][T17987] RSP: 002b:00007f01b16e0fe8 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 819.984827][T17987] RAX: ffffffffffffffda RBX: 00007f01b09b5fa0 RCX: 00007f01b078e969 [ 819.992827][T17987] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000040000000 [ 820.000823][T17987] RBP: 00007f01b16e1090 R08: 0000000000000000 R09: 0000000000000000 [ 820.008820][T17987] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000002 [ 820.016810][T17987] R13: 0000000000000000 R14: 00007f01b09b5fa0 R15: 00007ffe55ef76a8 [ 820.024806][T17987] [ 820.844808][T18010] device veth0_vlan left promiscuous mode [ 820.954979][T18010] device veth0_vlan entered promiscuous mode [ 821.023393][T12072] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 821.032876][T12072] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 821.042482][T12072] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 821.076872][T18014] device veth0_vlan left promiscuous mode [ 821.142246][T18014] device veth0_vlan entered promiscuous mode [ 821.235183][T12072] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 821.248840][T12072] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 821.267698][T12072] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 821.353976][T18025] device veth0_vlan left promiscuous mode [ 821.444316][T18025] device veth0_vlan entered promiscuous mode [ 821.957038][T18040] device veth0_vlan left promiscuous mode [ 822.025994][T18040] device veth0_vlan entered promiscuous mode [ 823.322493][T18070] device veth0_vlan left promiscuous mode [ 823.352976][T18070] device veth0_vlan entered promiscuous mode [ 823.463834][T12072] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 823.473216][T12072] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 823.481298][T12072] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 823.604418][T18075] device pim6reg1 entered promiscuous mode [ 823.731200][T18078] device pim6reg1 entered promiscuous mode [ 824.939509][T18132] FAULT_INJECTION: forcing a failure. [ 824.939509][T18132] name failslab, interval 1, probability 0, space 0, times 0 [ 824.967910][T18132] CPU: 1 PID: 18132 Comm: syz.2.5572 Not tainted 6.1.134-syzkaller-00014-g3cd01bb5bd37 #0 [ 824.977860][T18132] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/19/2025 [ 824.987940][T18132] Call Trace: [ 824.991236][T18132] [ 824.994200][T18132] __dump_stack+0x21/0x24 [ 824.998562][T18132] dump_stack_lvl+0xee/0x150 [ 825.003199][T18132] ? __cfi_dump_stack_lvl+0x8/0x8 [ 825.008316][T18132] dump_stack+0x15/0x24 [ 825.012503][T18132] should_fail_ex+0x3d4/0x520 [ 825.017205][T18132] __should_failslab+0xac/0xf0 [ 825.021992][T18132] ? alloc_fdtable+0xb4/0x2b0 [ 825.026790][T18132] should_failslab+0x9/0x20 [ 825.031361][T18132] __kmem_cache_alloc_node+0x3d/0x2c0 [ 825.036766][T18132] ? alloc_fdtable+0xb4/0x2b0 [ 825.041492][T18132] kmalloc_trace+0x29/0xb0 [ 825.045940][T18132] alloc_fdtable+0xb4/0x2b0 [ 825.050559][T18132] ? _find_last_bit+0x7c/0x120 [ 825.055364][T18132] dup_fd+0x668/0x8f0 [ 825.059388][T18132] ? __mutex_init+0xcd/0x1a0 [ 825.064012][T18132] copy_files+0x76/0xe0 [ 825.068199][T18132] copy_process+0x11f3/0x3470 [ 825.072919][T18132] ? idle_dummy+0x10/0x10 [ 825.077281][T18132] kernel_clone+0x23a/0x810 [ 825.081818][T18132] ? __cfi_kernel_clone+0x10/0x10 [ 825.086875][T18132] ? __kasan_check_write+0x14/0x20 [ 825.092018][T18132] ? mutex_unlock+0x89/0x220 [ 825.096643][T18132] __x64_sys_clone+0x168/0x1b0 [ 825.101442][T18132] ? __cfi___x64_sys_clone+0x10/0x10 [ 825.106762][T18132] ? perf_trace_sys_enter+0x30/0x150 [ 825.112071][T18132] ? trace_sys_enter+0x3d/0x50 [ 825.116858][T18132] x64_sys_call+0x990/0x9a0 [ 825.121387][T18132] do_syscall_64+0x4c/0xa0 [ 825.125831][T18132] ? clear_bhb_loop+0x15/0x70 [ 825.130528][T18132] ? clear_bhb_loop+0x15/0x70 [ 825.135227][T18132] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 825.141148][T18132] RIP: 0033:0x7f528bb8e969 [ 825.145581][T18132] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 825.165396][T18132] RSP: 002b:00007f528c91cfe8 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 825.173845][T18132] RAX: ffffffffffffffda RBX: 00007f528bdb5fa0 RCX: 00007f528bb8e969 [ 825.181923][T18132] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000040000000 [ 825.189901][T18132] RBP: 00007f528c91d090 R08: 0000000000000000 R09: 0000000000000000 [ 825.197868][T18132] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000002 [ 825.205836][T18132] R13: 0000000000000000 R14: 00007f528bdb5fa0 R15: 00007ffc8eb21748 [ 825.213844][T18132] [ 825.450506][T18145] device sit0 left promiscuous mode [ 825.542113][T18146] device sit0 entered promiscuous mode [ 826.058562][T18155] device sit0 left promiscuous mode [ 826.874551][T18181] bond_slave_1: mtu less than device minimum [ 827.570150][T18190] FAULT_INJECTION: forcing a failure. [ 827.570150][T18190] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 827.617753][T18190] CPU: 1 PID: 18190 Comm: syz.3.5593 Not tainted 6.1.134-syzkaller-00014-g3cd01bb5bd37 #0 [ 827.627756][T18190] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/19/2025 [ 827.637825][T18190] Call Trace: [ 827.641100][T18190] [ 827.644110][T18190] __dump_stack+0x21/0x24 [ 827.648445][T18190] dump_stack_lvl+0xee/0x150 [ 827.653034][T18190] ? __cfi_dump_stack_lvl+0x8/0x8 [ 827.658056][T18190] dump_stack+0x15/0x24 [ 827.662223][T18190] should_fail_ex+0x3d4/0x520 [ 827.666897][T18190] should_fail+0xb/0x10 [ 827.671224][T18190] should_fail_usercopy+0x1a/0x20 [ 827.676250][T18190] copyin+0x20/0xa0 [ 827.680060][T18190] _copy_from_iter+0x3e2/0xfd0 [ 827.684848][T18190] ? copyin+0x82/0xa0 [ 827.688848][T18190] ? _copy_from_iter+0x420/0xfd0 [ 827.693805][T18190] ? __cfi__copy_from_iter+0x10/0x10 [ 827.699117][T18190] ? __cfi__copy_from_iter+0x10/0x10 [ 827.704425][T18190] ? check_stack_object+0x81/0x140 [ 827.709568][T18190] copy_page_from_iter+0x1d2/0x2b0 [ 827.714679][T18190] skb_copy_datagram_from_iter+0x2cd/0x6b0 [ 827.720489][T18190] unix_stream_sendmsg+0x66a/0xc90 [ 827.725596][T18190] ? unix_stream_sendmsg+0x781/0xc90 [ 827.730884][T18190] ? __cfi_unix_stream_sendmsg+0x10/0x10 [ 827.736530][T18190] ? stack_trace_save+0x98/0xe0 [ 827.741398][T18190] ? __stack_depot_save+0x36/0x480 [ 827.746533][T18190] ? security_socket_sendmsg+0x93/0xb0 [ 827.751996][T18190] ? __cfi_unix_stream_sendmsg+0x10/0x10 [ 827.757623][T18190] ____sys_sendmsg+0x5a9/0x990 [ 827.762401][T18190] ? __sys_sendmsg_sock+0x40/0x40 [ 827.767455][T18190] ? import_iovec+0x7c/0xb0 [ 827.771967][T18190] ___sys_sendmsg+0x21c/0x290 [ 827.776651][T18190] ? __sys_sendmsg+0x270/0x270 [ 827.781416][T18190] ? __kasan_check_write+0x14/0x20 [ 827.786539][T18190] ? proc_fail_nth_write+0x17a/0x1f0 [ 827.791838][T18190] ? vfs_write+0x9d6/0xca0 [ 827.796262][T18190] ? __fdget+0x19c/0x220 [ 827.800510][T18190] __x64_sys_sendmsg+0x1f0/0x2c0 [ 827.805453][T18190] ? __cfi___x64_sys_sendmsg+0x10/0x10 [ 827.810924][T18190] ? fpregs_assert_state_consistent+0xb1/0xe0 [ 827.817081][T18190] x64_sys_call+0x171/0x9a0 [ 827.821586][T18190] do_syscall_64+0x4c/0xa0 [ 827.826008][T18190] ? clear_bhb_loop+0x15/0x70 [ 827.830772][T18190] ? clear_bhb_loop+0x15/0x70 [ 827.835448][T18190] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 827.841354][T18190] RIP: 0033:0x7f01c1b8e969 [ 827.845781][T18190] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 827.865491][T18190] RSP: 002b:00007f01c29a4038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 827.873904][T18190] RAX: ffffffffffffffda RBX: 00007f01c1db5fa0 RCX: 00007f01c1b8e969 [ 827.881876][T18190] RDX: 0000000000000000 RSI: 00002000000029c0 RDI: 0000000000000008 [ 827.889845][T18190] RBP: 00007f01c29a4090 R08: 0000000000000000 R09: 0000000000000000 [ 827.897826][T18190] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 827.905825][T18190] R13: 0000000000000000 R14: 00007f01c1db5fa0 R15: 00007ffc61b12478 [ 827.913822][T18190] [ 828.154635][T18216] bond_slave_1: mtu less than device minimum [ 828.484869][T18229] device veth0_vlan left promiscuous mode [ 828.538448][T18229] device veth0_vlan entered promiscuous mode [ 829.420143][ T2451] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 829.468158][ T2451] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 829.475440][ T2451] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready