last executing test programs: 9m28.572008848s ago: executing program 4 (id=1058): r0 = gettid() syz_open_procfs$namespace(r0, &(0x7f00000000c0)='ns/pid\x00') perf_event_open(0x0, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x8, 0x0, 0x200, 0xa0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x1, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x3, 0x16, &(0x7f0000000280)=ANY=[], &(0x7f0000000100)='GPL\x00', 0xfffffffe, 0x0, 0x0, 0x0, 0x4, '\x00', 0x0, @sched_cls=0x2e, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x4000}, 0x94) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r1, &(0x7f0000000500)={&(0x7f0000000040)=@hci, 0x80, &(0x7f0000000100)=[{&(0x7f0000000400)=""/248, 0x200105d0}], 0x1}, 0x1f00) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="16000000000000000400000001"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000000001811", @ANYRES32=r3, @ANYBLOB], 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x0, 0xfff, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_UPDATE_BATCH(0x1a, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0500000004000000ff0f000007"], 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, 0x0, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000500)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f0000000300)='sched_switch\x00', r4}, 0x10) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="090000ffa1bdb7006d0500000200000000000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000600), &(0x7f0000001f80), 0xfffffffb, r5}, 0x38) sendmsg$tipc(r2, &(0x7f0000000240)={0x0, 0xfffffff5, &(0x7f0000000200)=[{&(0x7f0000000140)="a2", 0xfffffdef}], 0x1}, 0x0) 9m28.111164177s ago: executing program 3 (id=1060): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000500)=ANY=[@ANYBLOB="1800000000000000000000000000000018010000786c6c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000002d00000095"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000003480)={0x11, 0x2, 0x0, &(0x7f0000000000)='GPL\x00', 0x7, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x88, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x9}, 0x94) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x18, 0x4, 0x0, 0x0, 0x4, 0x93, &(0x7f00000003c0)=""/147}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000080)='sched_switch\x00', r1}, 0x10) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000001380)={0x6, 0x0, 0x0, &(0x7f0000000500)='syzkaller\x00', 0x1, 0x0, 0x0, 0x40f00, 0x5a, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000c80)={0x1000, 0x1}, 0x8, 0x10, &(0x7f0000000ec0)={0x4, 0x6, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x2, &(0x7f0000000f00)=[0xffffffffffffffff, 0xffffffffffffffff], &(0x7f0000000180)=[{0x3, 0x1, 0x7}, {0x4, 0x3, 0x4, 0x7}], 0x10, 0x10001}, 0x94) perf_event_open(&(0x7f00000002c0)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20004, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) sendmsg$tipc(r2, &(0x7f00000003c0)={0x0, 0x0, 0x0}, 0x0) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r0}, 0x10) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000012c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r3, &(0x7f0000000740)={0x0, 0x0, &(0x7f0000000900)=[{&(0x7f00000013c0)="2080", 0x2}], 0x1, 0x0, 0x0, 0x800300}, 0x20000801) recvmsg(r4, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x300}, 0x40002002) 9m27.822000432s ago: executing program 3 (id=1062): perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000003480)={0x11, 0x2, &(0x7f00000001c0)=ANY=[@ANYBLOB="17010000a4fc0a000500feff"], &(0x7f0000000000)='GPL\x00', 0x6, 0xf4240, &(0x7f0000003300)=""/137, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value=0x1000000}, 0x80) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=@base={0x7, 0x4, 0x8, 0x1}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x8, &(0x7f0000000740)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, [@tail_call={{0x18, 0x2, 0x1, 0x0, r0}, {}, {0x85, 0x0, 0x0, 0x1b}}]}, &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x36, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={0x0, r1}, 0x18) 9m27.154405735s ago: executing program 4 (id=1063): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="180000000000000000000000000700001801"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x55, '\x00', 0x0, @fallback=0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB], 0x48) 9m27.020103498s ago: executing program 4 (id=1064): r0 = gettid() syz_open_procfs$namespace(r0, &(0x7f00000000c0)='ns/pid\x00') perf_event_open(0x0, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x8, 0x0, 0x200, 0xa0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x1, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x3, 0x16, &(0x7f0000000280)=ANY=[], &(0x7f0000000100)='GPL\x00', 0xfffffffe, 0x0, 0x0, 0x0, 0x4, '\x00', 0x0, @sched_cls=0x2e, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x4000}, 0x94) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r1, &(0x7f0000000500)={&(0x7f0000000040)=@hci, 0x80, &(0x7f0000000100)=[{&(0x7f0000000400)=""/248, 0x200105d0}], 0x1}, 0x1f00) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="16000000000000000400000001"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000000001811", @ANYRES32=r3, @ANYBLOB], 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x0, 0xfff, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_UPDATE_BATCH(0x1a, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000700)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b70400000000000085000000c300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, 0x0, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000500)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f0000000300)='sched_switch\x00', r4}, 0x10) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="090000ffa1bdb7006d0500000200000000000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000600), &(0x7f0000001f80), 0xfffffffb, r5}, 0x38) sendmsg$tipc(r2, &(0x7f0000000240)={0x0, 0xfffffff5, &(0x7f0000000200)=[{&(0x7f0000000140)="a2", 0xfffffdef}], 0x1}, 0x0) 9m26.93489155s ago: executing program 3 (id=1065): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x1, 0x1, 0x7fe2, 0x1}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xd, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sock_ops, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000140)='sched_switch\x00', r1}, 0x10) socketpair(0x18, 0x0, 0x2, &(0x7f0000004080)) 9m26.92239363s ago: executing program 3 (id=1066): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000500)=ANY=[@ANYBLOB="1800000000000000000000000000000018010000786c6c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000002d00000095"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000003480)={0x11, 0x2, 0x0, &(0x7f0000000000)='GPL\x00', 0x7, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x88, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x9}, 0x94) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x18, 0x4, 0x0, 0x0, 0x4, 0x93, &(0x7f00000003c0)=""/147}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000080)='sched_switch\x00', r0}, 0x10) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000001380)={0x6, 0x0, 0x0, &(0x7f0000000500)='syzkaller\x00', 0x1, 0x0, 0x0, 0x40f00, 0x5a, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000c80)={0x1000, 0x1}, 0x8, 0x10, &(0x7f0000000ec0)={0x4, 0x6, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x2, &(0x7f0000000f00)=[0xffffffffffffffff, 0xffffffffffffffff], &(0x7f0000000180)=[{0x3, 0x1, 0x7}, {0x4, 0x3, 0x4, 0x7}], 0x10, 0x10001}, 0x94) r1 = perf_event_open(&(0x7f00000002c0)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20004, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, 0xffffffffffffffff) openat$ppp(0xffffffffffffff9c, 0x0, 0x305500, 0x0) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000007c0)={r0, 0x0, 0x0}, 0x10) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, 0x0, 0x0}, 0x94) sendmsg$tipc(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, 0x0}, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.net/syz0\x00', 0x1ff) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000012c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r2, &(0x7f0000000740)={0x0, 0x0, &(0x7f0000000900)=[{&(0x7f00000013c0)="2080", 0x2}], 0x1, 0x0, 0x0, 0x800300}, 0x20000801) recvmsg(r3, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x300}, 0x40002002) 9m26.604335815s ago: executing program 3 (id=1067): bpf$MAP_CREATE(0x0, 0x0, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) close(0xffffffffffffffff) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f00000004c0)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000000000008500000071000000850000000800000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000440)=0x6, 0x12) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) write$cgroup_int(r0, &(0x7f0000000000), 0xfffffd26) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000840)=ANY=[@ANYBLOB="1600000000000000040000000700000000000000", @ANYRES32=0x1, @ANYBLOB="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", @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0}, 0x90) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x22, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000100)='mm_lru_insertion\x00', r2}, 0x10) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x26e1, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0xfffffffe, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000100)='mm_lru_insertion\x00', r3}, 0x10) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) write$cgroup_type(r4, &(0x7f0000000180), 0x40010) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x401c5820, &(0x7f00000001c0)=0x8) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0xc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={0xffffffffffffffff, 0x18000000000002a0, 0x75, 0x0, &(0x7f00000003c0)="b9e403c6631e39495a2d0a52b2afa05dc7cf1c4c0d3c3e803439b4b238a6ddc4e684bc82d5501995f19bb53b133f9eafed80585e8cd8884902d947cb1437bd495aac9e5ab1b143a9c53d4a44e173264ae8b217489f52de0642eb6e785e31f33458d4da6176825c1d68d43ceed3214dde86156a6a29", 0x0, 0x7ab, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) syz_clone(0x640c7000, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0xd, 0x1, &(0x7f0000000300)=ANY=[@ANYBLOB="95000000000c0000"], &(0x7f0000000340)='GPL\x00', 0x6, 0x18, &(0x7f0000000380)=""/24, 0x41000, 0x2, '\x00', 0x0, @fallback=0x1d, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000a00)={0x3, 0x2, 0x9, 0x85}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x6, &(0x7f0000000a40)=[0x1], &(0x7f0000000a80)=[{0x3, 0x1, 0x1, 0x9}, {0x3, 0x2, 0x8, 0x9}, {0x4, 0x2, 0x4, 0x7}, {0x2, 0x1, 0x2, 0x9}, {0x3, 0x2, 0xd, 0xa}, {0x6, 0x1, 0x2, 0x6}], 0x10, 0x2}, 0x94) syz_clone(0x4021400, 0x0, 0x9000, 0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=ANY=[@ANYBLOB="0900000005000000fd0900008400000000000000", @ANYRES32, @ANYBLOB="feffff7affffff00"/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x50) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000300)={0xffffffffffffffff, 0x0, &(0x7f00000000c0), &(0x7f0000000240), 0x800, r5}, 0x38) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000480)='xprtrdma_post_linv_err\x00', r0, 0x0, 0xda}, 0x18) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}, 0x0, 0x10001, 0x0, 0x0, 0x0, 0xd56}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_LOOKUP_BATCH(0x19, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000680), &(0x7f0000000540), 0x6c, r5}, 0x38) 9m26.130714075s ago: executing program 4 (id=1069): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000004000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb70300000e41621eb70400000000000085000000c300000095"], 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1a, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0600000004000000030000000500000000000000", @ANYRES32, @ANYBLOB, @ANYRES32=0x0, @ANYBLOB], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x13, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x8e8e, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000140)='sched_switch\x00', r1}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000006b00)={0xffffffffffffffff}) setsockopt$sock_attach_bpf(r2, 0x1, 0x10, &(0x7f0000000400), 0x4) sendmsg$unix(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000000c0)='+', 0x1}], 0x1, &(0x7f00000003c0)=ANY=[@ANYBLOB="14000000000000000100000001"], 0x18}, 0x20000041) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x2, 0x4, 0x599, 0x1, 0x0, 0x1}, 0x48) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000001340), &(0x7f0000000900), 0x404, r3, 0x0, 0x1ba8847c99}, 0x38) 9m25.155050283s ago: executing program 4 (id=1072): bpf$MAP_CREATE(0x0, 0x0, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) close(0xffffffffffffffff) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f00000004c0)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa1000000"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000440)=0x6, 0x12) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r1 = bpf$MAP_CREATE(0x0, 0x0, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB, @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x22, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000100)='mm_lru_insertion\x00', r2}, 0x10) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x26e1, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0xfffffffe, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000100)='mm_lru_insertion\x00', r3}, 0x10) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) write$cgroup_type(r4, &(0x7f0000000180), 0x40010) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x401c5820, &(0x7f00000001c0)=0x8) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0xc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={0xffffffffffffffff, 0x18000000000002a0, 0x75, 0x0, &(0x7f00000003c0)="b9e403c6631e39495a2d0a52b2afa05dc7cf1c4c0d3c3e803439b4b238a6ddc4e684bc82d5501995f19bb53b133f9eafed80585e8cd8884902d947cb1437bd495aac9e5ab1b143a9c53d4a44e173264ae8b217489f52de0642eb6e785e31f33458d4da6176825c1d68d43ceed3214dde86156a6a29", 0x0, 0x7ab, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) syz_clone(0x640c7000, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0xd, 0x1, &(0x7f0000000300)=ANY=[@ANYBLOB="95000000000c0000"], &(0x7f0000000340)='GPL\x00', 0x6, 0x18, &(0x7f0000000380)=""/24, 0x41000, 0x2, '\x00', 0x0, @fallback=0x1d, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000a00)={0x3, 0x2, 0x9, 0x85}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x7, &(0x7f0000000a40)=[0x1], &(0x7f0000000a80)=[{0x3, 0x1, 0x1, 0x9}, {0x3, 0x2, 0x8, 0x9}, {0x4, 0x2, 0x4, 0x7}, {0x2, 0x1, 0x2, 0x9}, {0x3, 0x2, 0xd, 0xa}, {0x6, 0x1, 0x2, 0x6}, {0x4, 0x2, 0x4}], 0x10, 0x2}, 0x94) syz_clone(0x4021400, 0x0, 0x9000, 0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=ANY=[@ANYBLOB="0900000005000000fd0900008400000000000000", @ANYRES32, @ANYBLOB="feffff7affffff00"/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x50) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000300)={0xffffffffffffffff, 0x0, &(0x7f00000000c0), &(0x7f0000000240), 0x800, r5}, 0x38) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000480)='xprtrdma_post_linv_err\x00', r0, 0x0, 0xda}, 0x18) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}, 0x0, 0x10001, 0x0, 0x0, 0x0, 0xd56}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_LOOKUP_BATCH(0x19, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000680), &(0x7f0000000540), 0x6c, r5}, 0x38) 9m9.75100927s ago: executing program 32 (id=1067): bpf$MAP_CREATE(0x0, 0x0, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) close(0xffffffffffffffff) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f00000004c0)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000000000008500000071000000850000000800000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000440)=0x6, 0x12) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) write$cgroup_int(r0, &(0x7f0000000000), 0xfffffd26) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000840)=ANY=[@ANYBLOB="1600000000000000040000000700000000000000", @ANYRES32=0x1, @ANYBLOB="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", @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0}, 0x90) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x22, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000100)='mm_lru_insertion\x00', r2}, 0x10) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x26e1, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0xfffffffe, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000100)='mm_lru_insertion\x00', r3}, 0x10) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) write$cgroup_type(r4, &(0x7f0000000180), 0x40010) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x401c5820, &(0x7f00000001c0)=0x8) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0xc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={0xffffffffffffffff, 0x18000000000002a0, 0x75, 0x0, &(0x7f00000003c0)="b9e403c6631e39495a2d0a52b2afa05dc7cf1c4c0d3c3e803439b4b238a6ddc4e684bc82d5501995f19bb53b133f9eafed80585e8cd8884902d947cb1437bd495aac9e5ab1b143a9c53d4a44e173264ae8b217489f52de0642eb6e785e31f33458d4da6176825c1d68d43ceed3214dde86156a6a29", 0x0, 0x7ab, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) syz_clone(0x640c7000, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0xd, 0x1, &(0x7f0000000300)=ANY=[@ANYBLOB="95000000000c0000"], &(0x7f0000000340)='GPL\x00', 0x6, 0x18, &(0x7f0000000380)=""/24, 0x41000, 0x2, '\x00', 0x0, @fallback=0x1d, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000a00)={0x3, 0x2, 0x9, 0x85}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x6, &(0x7f0000000a40)=[0x1], &(0x7f0000000a80)=[{0x3, 0x1, 0x1, 0x9}, {0x3, 0x2, 0x8, 0x9}, {0x4, 0x2, 0x4, 0x7}, {0x2, 0x1, 0x2, 0x9}, {0x3, 0x2, 0xd, 0xa}, {0x6, 0x1, 0x2, 0x6}], 0x10, 0x2}, 0x94) syz_clone(0x4021400, 0x0, 0x9000, 0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=ANY=[@ANYBLOB="0900000005000000fd0900008400000000000000", @ANYRES32, @ANYBLOB="feffff7affffff00"/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x50) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000300)={0xffffffffffffffff, 0x0, &(0x7f00000000c0), &(0x7f0000000240), 0x800, r5}, 0x38) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000480)='xprtrdma_post_linv_err\x00', r0, 0x0, 0xda}, 0x18) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}, 0x0, 0x10001, 0x0, 0x0, 0x0, 0xd56}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_LOOKUP_BATCH(0x19, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000680), &(0x7f0000000540), 0x6c, r5}, 0x38) 9m9.431629846s ago: executing program 33 (id=1072): bpf$MAP_CREATE(0x0, 0x0, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) close(0xffffffffffffffff) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f00000004c0)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa1000000"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000440)=0x6, 0x12) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r1 = bpf$MAP_CREATE(0x0, 0x0, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB, @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x22, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000100)='mm_lru_insertion\x00', r2}, 0x10) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x26e1, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0xfffffffe, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000100)='mm_lru_insertion\x00', r3}, 0x10) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) write$cgroup_type(r4, &(0x7f0000000180), 0x40010) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x401c5820, &(0x7f00000001c0)=0x8) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0xc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={0xffffffffffffffff, 0x18000000000002a0, 0x75, 0x0, &(0x7f00000003c0)="b9e403c6631e39495a2d0a52b2afa05dc7cf1c4c0d3c3e803439b4b238a6ddc4e684bc82d5501995f19bb53b133f9eafed80585e8cd8884902d947cb1437bd495aac9e5ab1b143a9c53d4a44e173264ae8b217489f52de0642eb6e785e31f33458d4da6176825c1d68d43ceed3214dde86156a6a29", 0x0, 0x7ab, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) syz_clone(0x640c7000, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0xd, 0x1, &(0x7f0000000300)=ANY=[@ANYBLOB="95000000000c0000"], &(0x7f0000000340)='GPL\x00', 0x6, 0x18, &(0x7f0000000380)=""/24, 0x41000, 0x2, '\x00', 0x0, @fallback=0x1d, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000a00)={0x3, 0x2, 0x9, 0x85}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x7, &(0x7f0000000a40)=[0x1], &(0x7f0000000a80)=[{0x3, 0x1, 0x1, 0x9}, {0x3, 0x2, 0x8, 0x9}, {0x4, 0x2, 0x4, 0x7}, {0x2, 0x1, 0x2, 0x9}, {0x3, 0x2, 0xd, 0xa}, {0x6, 0x1, 0x2, 0x6}, {0x4, 0x2, 0x4}], 0x10, 0x2}, 0x94) syz_clone(0x4021400, 0x0, 0x9000, 0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=ANY=[@ANYBLOB="0900000005000000fd0900008400000000000000", @ANYRES32, @ANYBLOB="feffff7affffff00"/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x50) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000300)={0xffffffffffffffff, 0x0, &(0x7f00000000c0), &(0x7f0000000240), 0x800, r5}, 0x38) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000480)='xprtrdma_post_linv_err\x00', r0, 0x0, 0xda}, 0x18) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}, 0x0, 0x10001, 0x0, 0x0, 0x0, 0xd56}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_LOOKUP_BATCH(0x19, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000680), &(0x7f0000000540), 0x6c, r5}, 0x38) 9m8.207428089s ago: executing program 34 (id=1083): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000edff0000000000000000850000000f00000018010000646c012500000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000800000850000000600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x3c, 0x3c, 0x6, [@array={0x0, 0x0, 0x0, 0x3, 0x0, {0x2, 0x2}}, @func_proto={0x0, 0x0, 0x0, 0x9, 0x4}, @ptr={0x0, 0x0, 0x0, 0x4}, @func={0x2000004, 0x0, 0x0, 0x8}]}, {0x0, [0x0, 0x0, 0x0, 0x61]}}, 0x0, 0x5a}, 0x28) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000200)='fdb_delete\x00', r0}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x16, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff"], 0x0, 0x101, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @flow_dissector, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, 0x0, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="1e0000000000000004000000ff"], 0x50) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0}, 0x90) bpf$BPF_GET_PROG_INFO(0xa, &(0x7f0000000740)={0xffffffffffffffff, 0x0, 0x0}, 0x10) syz_clone(0x42164000, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) ioctl$TUNGETDEVNETNS(r2, 0x8982, 0x20000500) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x36, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f00000005c0)='sched_switch\x00', r3}, 0x10) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) bpf$BPF_PROG_DETACH(0x9, 0x0, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000240)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000001c0)='./cgroup.net/syz0\x00', 0x1ff) r5 = openat$cgroup_subtree(r4, &(0x7f0000000200), 0x2, 0x0) write$cgroup_subtree(r5, &(0x7f0000000080)={[{0x2b, 'cpu'}]}, 0x5) 9m7.697281559s ago: executing program 35 (id=1084): bpf$MAP_CREATE(0x0, 0x0, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) close(0xffffffffffffffff) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f00000004c0)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa1000000"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000440)=0x6, 0x12) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r1 = bpf$MAP_CREATE(0x0, 0x0, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB, @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x22, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000100)='mm_lru_insertion\x00', r2}, 0x10) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x26e1, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0xfffffffe, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000100)='mm_lru_insertion\x00', r3}, 0x10) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) write$cgroup_type(r4, &(0x7f0000000180), 0x40010) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x401c5820, &(0x7f00000001c0)=0x8) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0xc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={0xffffffffffffffff, 0x18000000000002a0, 0x75, 0x0, &(0x7f00000003c0)="b9e403c6631e39495a2d0a52b2afa05dc7cf1c4c0d3c3e803439b4b238a6ddc4e684bc82d5501995f19bb53b133f9eafed80585e8cd8884902d947cb1437bd495aac9e5ab1b143a9c53d4a44e173264ae8b217489f52de0642eb6e785e31f33458d4da6176825c1d68d43ceed3214dde86156a6a29", 0x0, 0x7ab, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) syz_clone(0x640c7000, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0xd, 0x1, &(0x7f0000000300)=ANY=[@ANYBLOB="95000000000c0000"], &(0x7f0000000340)='GPL\x00', 0x6, 0x18, &(0x7f0000000380)=""/24, 0x41000, 0x2, '\x00', 0x0, @fallback=0x1d, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000a00)={0x3, 0x2, 0x9, 0x85}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x7, &(0x7f0000000a40)=[0x1], &(0x7f0000000a80)=[{0x3, 0x1, 0x1, 0x9}, {0x3, 0x2, 0x8, 0x9}, {0x4, 0x2, 0x4, 0x7}, {0x2, 0x1, 0x2, 0x9}, {0x3, 0x2, 0xd, 0xa}, {0x6, 0x1, 0x2, 0x6}, {0x4, 0x2, 0x4}], 0x10, 0x2}, 0x94) syz_clone(0x4021400, 0x0, 0x9000, 0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=ANY=[@ANYBLOB="0900000005000000fd0900008400000000000000", @ANYRES32, @ANYBLOB="feffff7affffff00"/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x50) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000300)={0xffffffffffffffff, 0x0, &(0x7f00000000c0), &(0x7f0000000240), 0x800, r5}, 0x38) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000480)='xprtrdma_post_linv_err\x00', r0, 0x0, 0xda}, 0x18) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}, 0x0, 0x10001, 0x0, 0x0, 0x0, 0xd56}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_LOOKUP_BATCH(0x19, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000680), &(0x7f0000000540), 0x6c, r5}, 0x38) 8m19.965097896s ago: executing program 7 (id=1224): bpf$MAP_CREATE(0x0, &(0x7f00000006c0)=ANY=[@ANYBLOB="16000000000000000400000001"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41000}, 0x94) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f0000000180)=ANY=[@ANYBLOB="18010000010000000000000000030000850000007b00000095"], &(0x7f0000000140)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000080)) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000500)=ANY=[@ANYBLOB="0e00000004000000080000000800000000000000", @ANYRES32, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800"/15, @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f0000000240)=ANY=[@ANYBLOB="1800000000000000000000000000010018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b702000000000000850000008600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f00000006c0)='sched_switch\x00', r3}, 0x10) bpf$MAP_CREATE(0x300000000000000, &(0x7f00000003c0)=ANY=[@ANYBLOB="180000000400000041000000000000", @ANYRES32=0x1, @ANYBLOB='\x00'/19, @ANYRES32=0x0, @ANYBLOB], 0x48) perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0x96, 0x1, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0x2}, 0x0, 0x8000000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000600)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x80260, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000, 0x3, @perf_bp={&(0x7f0000000300), 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='kfree\x00'}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xe, 0xb, &(0x7f0000010080)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007100000095000000000000007b84cdec698bd1def814850ea80e9c02bd3419f8e23ff0"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0xfffffffffffffd5c) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x8000000000000000, 0x8000}, 0x4105, 0x0, 0x3}, 0x0, 0xfeffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r5 = openat$cgroup_int(r4, &(0x7f0000000100)='cpuset.sched_relax_domain_level\x00', 0x2, 0x0) write$cgroup_int(r5, &(0x7f0000000080), 0x12) r6 = bpf$MAP_CREATE(0x0, 0x0, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r6], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_CREATE(0x0, &(0x7f0000000840)=ANY=[@ANYBLOB="010000000500000002000000ffff000005000000", @ANYRES32, @ANYBLOB="0000000000000004000000000000000000000080", @ANYRES32=0x0, @ANYRES32, @ANYBLOB="000000000100"/28], 0x48) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f00000000c0)='sched_switch\x00', r0}, 0x10) 8m19.964012516s ago: executing program 8 (id=1225): bpf$MAP_CREATE(0x0, 0x0, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) close(0xffffffffffffffff) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f00000004c0)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa1000000"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000440)=0x6, 0x12) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000840)=ANY=[@ANYBLOB="1600000000000000040000000700000000000000", @ANYRES32=0x1, @ANYBLOB="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", @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/21], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB, @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x22, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000100)='mm_lru_insertion\x00', r2}, 0x10) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x26e1, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0xfffffffe, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000100)='mm_lru_insertion\x00', r3}, 0x10) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) write$cgroup_type(r4, &(0x7f0000000180), 0x40010) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x401c5820, &(0x7f00000001c0)=0x8) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0xc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={0xffffffffffffffff, 0x18000000000002a0, 0x75, 0x0, &(0x7f00000003c0)="b9e403c6631e39495a2d0a52b2afa05dc7cf1c4c0d3c3e803439b4b238a6ddc4e684bc82d5501995f19bb53b133f9eafed80585e8cd8884902d947cb1437bd495aac9e5ab1b143a9c53d4a44e173264ae8b217489f52de0642eb6e785e31f33458d4da6176825c1d68d43ceed3214dde86156a6a29", 0x0, 0x7ab, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) syz_clone(0x640c7000, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0xd, 0x1, &(0x7f0000000300)=ANY=[@ANYBLOB="95000000000c0000"], &(0x7f0000000340)='GPL\x00', 0x6, 0x18, &(0x7f0000000380)=""/24, 0x41000, 0x2, '\x00', 0x0, @fallback=0x1d, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000a00)={0x3, 0x2, 0x9, 0x85}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x7, &(0x7f0000000a40)=[0x1], &(0x7f0000000a80)=[{0x3, 0x1, 0x1, 0x9}, {0x3, 0x2, 0x8, 0x9}, {0x4, 0x2, 0x4, 0x7}, {0x2, 0x1, 0x2, 0x9}, {0x3, 0x2, 0xd, 0xa}, {0x6, 0x1, 0x2, 0x6}, {0x4, 0x2, 0x4}], 0x10, 0x2}, 0x94) syz_clone(0x4021400, 0x0, 0x9000, 0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=ANY=[@ANYBLOB="0900000005000000fd0900008400000000000000", @ANYRES32, @ANYBLOB="feffff7affffff00"/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x50) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000300)={0xffffffffffffffff, 0x0, &(0x7f00000000c0), &(0x7f0000000240), 0x800, r5}, 0x38) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000480)='xprtrdma_post_linv_err\x00', r0, 0x0, 0xda}, 0x18) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}, 0x0, 0x10001, 0x0, 0x0, 0x0, 0xd56}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_LOOKUP_BATCH(0x19, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000680), &(0x7f0000000540), 0x6c, r5}, 0x38) 8m18.810290148s ago: executing program 7 (id=1227): bpf$MAP_CREATE(0x0, 0x0, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) close(0xffffffffffffffff) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f00000004c0)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000000000008500000071000000850000000800000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000440)=0x6, 0x12) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) write$cgroup_int(r0, &(0x7f0000000000), 0xfffffd26) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000840)=ANY=[@ANYBLOB="1600000000000000040000000700000000000000", @ANYRES32=0x1, @ANYBLOB="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", @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0}, 0x90) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x22, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000100)='mm_lru_insertion\x00', r2}, 0x10) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x26e1, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0xfffffffe, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000100)='mm_lru_insertion\x00', r3}, 0x10) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) write$cgroup_type(r4, &(0x7f0000000180), 0x40010) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x401c5820, &(0x7f00000001c0)=0x8) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0xc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={0xffffffffffffffff, 0x18000000000002a0, 0x75, 0x0, &(0x7f00000003c0)="b9e403c6631e39495a2d0a52b2afa05dc7cf1c4c0d3c3e803439b4b238a6ddc4e684bc82d5501995f19bb53b133f9eafed80585e8cd8884902d947cb1437bd495aac9e5ab1b143a9c53d4a44e173264ae8b217489f52de0642eb6e785e31f33458d4da6176825c1d68d43ceed3214dde86156a6a29", 0x0, 0x7ab, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) syz_clone(0x640c7000, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0xd, 0x1, &(0x7f0000000300)=ANY=[@ANYBLOB="95000000000c0000"], &(0x7f0000000340)='GPL\x00', 0x6, 0x18, &(0x7f0000000380)=""/24, 0x41000, 0x2, '\x00', 0x0, @fallback=0x1d, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000a00)={0x3, 0x2, 0x9, 0x85}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x6, &(0x7f0000000a40)=[0x1], &(0x7f0000000a80)=[{0x3, 0x1, 0x1, 0x9}, {0x4, 0x2, 0x4, 0x7}, {0x2, 0x1, 0x2, 0x9}, {0x3, 0x2, 0xd, 0xa}, {0x6, 0x1, 0x2, 0x6}, {0x4, 0x2, 0x4}], 0x10, 0x2}, 0x94) syz_clone(0x4021400, 0x0, 0x9000, 0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=ANY=[@ANYBLOB="0900000005000000fd0900008400000000000000", @ANYRES32, @ANYBLOB="feffff7affffff00"/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x50) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000300)={0xffffffffffffffff, 0x0, &(0x7f00000000c0), &(0x7f0000000240), 0x800, r5}, 0x38) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000480)='xprtrdma_post_linv_err\x00', r0, 0x0, 0xda}, 0x18) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}, 0x0, 0x10001, 0x0, 0x0, 0x0, 0xd56}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_LOOKUP_BATCH(0x19, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000680), &(0x7f0000000540), 0x6c, r5}, 0x38) 8m16.10684902s ago: executing program 8 (id=1236): perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x10020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5c31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) getpid() socketpair$unix(0x1, 0x5, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) recvmsg$unix(0xffffffffffffffff, 0x0, 0x100) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x1a, 0x0, 0x0, &(0x7f0000000000)='GPL\x00', 0x5, 0x0, 0x0, 0x41100, 0x8, '\x00', 0x0, @fallback=0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x4}, 0x94) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000480)=@base={0x2, 0x4, 0x8, 0xc}, 0x50) close(0x3) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x7, 0x10001, 0x5, 0x1}, 0x50) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xd, &(0x7f0000000280)=ANY=[@ANYBLOB="18000000000000000000000000000000850000006d00000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000028000000b704000000000000850000000300000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000000)='tlb_flush\x00', r1}, 0x10) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0500000001000000ff0f0000"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x0, 0x47, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x8, '\x00', 0x0, @fallback=0x4cf68d79c8eac253, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f00000009c0)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000006000000b703000000000083850000007100000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000500)='mm_page_alloc\x00', r2}, 0x10) perf_event_open(&(0x7f0000000380)={0x0, 0xfffffffffffffeaf, 0x0, 0x0, 0x0, 0xb, 0x0, 0x1000000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x9, 0x600000000000}, 0x0, 0xc8}, 0x0, 0x9, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r3) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000f60000008500000043"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="1b00000000000000000000000080000000000000", @ANYRES32, @ANYRES32=0x0], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r4], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value=0x2000000}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000180)='sched_switch\x00', r5}, 0x10) 8m15.904507704s ago: executing program 8 (id=1238): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="180000000500000000000000000000001801000020a0702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000080850000000400000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffff0b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="0a000000040000000800000008"], 0x48) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="1e0000000000000004000000ff"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005700000095"], 0x0}, 0x90) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000200)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r3}, 0x18) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xa, 0x2, 0x1006, 0xff, 0x42, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x4}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000140)='sched_switch\x00', r4}, 0x10) socketpair(0x18, 0x0, 0x2, &(0x7f0000004080)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000140)='mm_page_alloc\x00', r0}, 0x10) openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz0\x00', 0x1ff) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) openat$cgroup_int(r5, &(0x7f00000000c0)='blkio.throttle.write_iops_device\x00', 0x2, 0x0) 8m15.449552353s ago: executing program 8 (id=1240): perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x2, 0x0, 0x3ff, 0x8620, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x80, 0x4f02b8b6}, 0x0, 0x0, 0x0, 0x1, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x1) bpf$PROG_LOAD(0x5, &(0x7f00000006c0)={0x6, 0x0, 0x0, &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @xdp}, 0x94) syz_clone(0x630c1100, 0x0, 0x0, 0x0, 0x0, 0x0) syz_clone(0x43001000, 0x0, 0x0, 0x0, 0x0, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x101400, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x16, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000008f"], 0x0, 0x101, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @flow_dissector, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r0 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r0}, 0x10) perf_event_open(&(0x7f0000000340)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x21, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x40000000}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x48) r1 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000001480)={'syzkaller0\x00', 0x7101}) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) ioctl$TUNSETOFFLOAD(r2, 0xc004743e, 0x110e22fff6) sendmsg$unix(0xffffffffffffffff, 0x0, 0x20000) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'syzkaller0\x00', 0xca58c30f81b6079f}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=@base={0x7, 0x4, 0x208, 0xd9}, 0x50) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x8, &(0x7f0000000740)=@framed={{}, [@tail_call={{0x18, 0x2, 0x1, 0x0, r4}, {}, {0x85, 0x0, 0x0, 0x1b}}]}, &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000000500)=@base={0x5, 0x1, 0x8e, 0xe7c9, 0x1}, 0x48) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_DELETE_BATCH(0x18, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0xe30a, r6}, 0x38) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000040)='kfree\x00', r5}, 0x18) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x8914, &(0x7f0000000080)) bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000340)={'dvmrp1\x00', 0x7101}) 8m14.238793916s ago: executing program 7 (id=1245): bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000500)=ANY=[@ANYBLOB="0a00000004000000ff0f00000700000000000000", @ANYRES32, @ANYBLOB="000000400600"/19, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b70800000004000000001e4f67eac2f7d4a1000000000000c9b8ff77f8ffffffb703000008000020b70400000000000085000000c300000095"], 0x0, 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r2 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00', r2}, 0x10) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TUNSETOFFLOAD(r0, 0xc004743e, 0x110e22fff6) perf_event_open(0x0, 0xffffffffffffffff, 0xb, 0xffffffffffffffff, 0x0) r3 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="0b000000070000000800000004000000050000008415536ce3b62424b3da9895f99b5864cd8fea9859d7cc707185b0e659719f3a4264b0002b1c0baa14b13d5249f24994fb3b95c425dc539f611add71567306acd4b62d5e8206c9992d791e5ef649fddd78d68d1ab74b257865c5fdb9bd1be5aa6d2e2e50d4783ccd20f43e7acdeb6c90c8e71c0d5da303", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[], &(0x7f0000000bc0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000002010000850000004300000095"], 0x0, 0x400000, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000700)='signal_generate\x00', r5}, 0x10) r6 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x1, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x1) perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x3, 0x0, 0x0, 0x0, 0x0, 0x24, 0x12506, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x8}, 0x7602}, 0x0, 0xffffffffffffffff, r6, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.current\x00', 0x275a, 0x0) socketpair(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r7, 0x89a2, &(0x7f0000000080)) ioctl$TUNSETOFFLOAD(r3, 0x4004743d, 0x110e22fff6) close(r3) 8m13.545576479s ago: executing program 7 (id=1247): bpf$MAP_CREATE(0x0, 0x0, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) close(0xffffffffffffffff) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f00000004c0)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa1000000"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000440)=0x6, 0x12) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000840)=ANY=[@ANYBLOB="1600000000000000040000000700000000000000", @ANYRES32=0x1, @ANYBLOB="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", @ANYRES32=0x0, @ANYRES32], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB, @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x22, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000100)='mm_lru_insertion\x00', r2}, 0x10) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x26e1, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0xfffffffe, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000100)='mm_lru_insertion\x00', r3}, 0x10) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) write$cgroup_type(r4, &(0x7f0000000180), 0x40010) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x401c5820, &(0x7f00000001c0)=0x8) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0xc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={0xffffffffffffffff, 0x18000000000002a0, 0x75, 0x0, &(0x7f00000003c0)="b9e403c6631e39495a2d0a52b2afa05dc7cf1c4c0d3c3e803439b4b238a6ddc4e684bc82d5501995f19bb53b133f9eafed80585e8cd8884902d947cb1437bd495aac9e5ab1b143a9c53d4a44e173264ae8b217489f52de0642eb6e785e31f33458d4da6176825c1d68d43ceed3214dde86156a6a29", 0x0, 0x7ab, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) syz_clone(0x640c7000, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0xd, 0x1, &(0x7f0000000300)=ANY=[@ANYBLOB="95000000000c0000"], &(0x7f0000000340)='GPL\x00', 0x6, 0x18, &(0x7f0000000380)=""/24, 0x41000, 0x2, '\x00', 0x0, @fallback=0x1d, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000a00)={0x3, 0x2, 0x9, 0x85}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x7, &(0x7f0000000a40)=[0x1], &(0x7f0000000a80)=[{0x3, 0x1, 0x1, 0x9}, {0x3, 0x2, 0x8, 0x9}, {0x4, 0x2, 0x4, 0x7}, {0x2, 0x1, 0x2, 0x9}, {0x3, 0x2, 0xd, 0xa}, {0x6, 0x1, 0x2, 0x6}, {0x4, 0x2, 0x4}], 0x10, 0x2}, 0x94) syz_clone(0x4021400, 0x0, 0x9000, 0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=ANY=[@ANYBLOB="0900000005000000fd0900008400000000000000", @ANYRES32, @ANYBLOB="feffff7affffff00"/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x50) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000300)={0xffffffffffffffff, 0x0, &(0x7f00000000c0), &(0x7f0000000240), 0x800, r5}, 0x38) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000480)='xprtrdma_post_linv_err\x00', r0, 0x0, 0xda}, 0x18) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}, 0x0, 0x10001, 0x0, 0x0, 0x0, 0xd56}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_LOOKUP_BATCH(0x19, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000680), &(0x7f0000000540), 0x6c, r5}, 0x38) 8m13.039815059s ago: executing program 8 (id=1249): r0 = bpf$MAP_CREATE(0x0, 0x0, 0x50) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000000c0)={r0, 0x58, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r2 = bpf$MAP_CREATE(0x2000000000000000, &(0x7f0000000140)=ANY=[@ANYBLOB="0600000004000000008000005c"], 0x48) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x709}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_LOOKUP_BATCH(0x18, &(0x7f00000003c0)={0x0, 0x0, &(0x7f00000002c0), &(0x7f0000000100), 0x200df000, r2, 0x0, 0x200000}, 0x38) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0xb, 0x8, 0xc, 0xffffbfff, 0x1, 0x1}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000810018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, 0x0, &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000140)='sched_switch\x00', r4}, 0x10) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000040)=@base={0xc, 0x4, 0x4, 0x9}, 0x48) bpf$MAP_CREATE(0x0, &(0x7f0000000100)=ANY=[], 0x48) mkdirat$cgroup(0xffffffffffffffff, &(0x7f00000001c0)='syz1\x00', 0x1ff) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={0x0}, 0x18) bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x11, 0x8, &(0x7f0000000080)=ANY=[@ANYRESDEC=r0, @ANYRES32=r0, @ANYBLOB="0000000000000000b703000000000000850000001b000000b70000000000000095"], &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', r1, @fallback=0x2d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x59, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) 8m12.846049053s ago: executing program 8 (id=1250): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x9, 0x1002a, 0x8000, 0x1}, 0x50) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000001c0)={{r0, 0xffffffffffffffff}, &(0x7f00000002c0), &(0x7f0000000280)}, 0x20) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000080)={r1, &(0x7f0000000a40)="8c", 0x0}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800"/12, @ANYRES32], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) r2 = bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000380)=ANY=[@ANYBLOB="1e0000000500000003000000040000008004", @ANYRES32, @ANYRES32=0x0, @ANYRES32=r2, @ANYBLOB], 0x50) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x100, 0x10020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_clone(0x640c7000, 0x0, 0x0, 0x0, 0x0, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="1e000000000000000500000006"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000008c0)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0}, 0x94) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r4}, 0x10) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) setsockopt$sock_attach_bpf(r5, 0x1, 0x1d, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="190000000400000004000000020000", @ANYRES32=0x1, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="c100008c51cf0600000000000000"], 0x48) bpf$MAP_GET_NEXT_KEY(0x2, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x48) sendmsg$unix(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000300)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000200)=[{&(0x7f0000000180)="3d3d70a0bc380c6fee155706bfb6", 0xe}], 0x1, 0x0, 0x0, 0x40}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xb, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_CREATE(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x61000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_config_ext={0x8001, 0xc}, 0xa100, 0xc8, 0x3, 0x0, 0xfffffffffffffffd, 0x2, 0x0, 0x0, 0x0, 0x0, 0x8000000000000001}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.current\x00', 0x275a, 0x0) write$cgroup_pid(r6, &(0x7f0000000000), 0x2a979d) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0xc, 0x0, &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x13, r6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) 8m12.845733783s ago: executing program 36 (id=1250): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x9, 0x1002a, 0x8000, 0x1}, 0x50) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000001c0)={{r0, 0xffffffffffffffff}, &(0x7f00000002c0), &(0x7f0000000280)}, 0x20) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000080)={r1, &(0x7f0000000a40)="8c", 0x0}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800"/12, @ANYRES32], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) r2 = bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000380)=ANY=[@ANYBLOB="1e0000000500000003000000040000008004", @ANYRES32, @ANYRES32=0x0, @ANYRES32=r2, @ANYBLOB], 0x50) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x100, 0x10020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_clone(0x640c7000, 0x0, 0x0, 0x0, 0x0, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="1e000000000000000500000006"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000008c0)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0}, 0x94) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r4}, 0x10) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) setsockopt$sock_attach_bpf(r5, 0x1, 0x1d, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="190000000400000004000000020000", @ANYRES32=0x1, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="c100008c51cf0600000000000000"], 0x48) bpf$MAP_GET_NEXT_KEY(0x2, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x48) sendmsg$unix(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000300)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000200)=[{&(0x7f0000000180)="3d3d70a0bc380c6fee155706bfb6", 0xe}], 0x1, 0x0, 0x0, 0x40}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xb, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_CREATE(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x61000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_config_ext={0x8001, 0xc}, 0xa100, 0xc8, 0x3, 0x0, 0xfffffffffffffffd, 0x2, 0x0, 0x0, 0x0, 0x0, 0x8000000000000001}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.current\x00', 0x275a, 0x0) write$cgroup_pid(r6, &(0x7f0000000000), 0x2a979d) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0xc, 0x0, &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x13, r6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) 8m12.845402903s ago: executing program 7 (id=1251): perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x10020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_clone(0x640c7000, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000008c0)=ANY=[@ANYBLOB="0a00000002000000ff0f000007"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x8, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000130000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b70400000000000085000000c300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000300)={{r0}, &(0x7f0000000280), &(0x7f00000002c0)=r1}, 0x20) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f0000000300)='sched_switch\x00', r2}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB="0a00000001010000ff7f0000cc00000000000000", @ANYRES32, @ANYBLOB="000000000000000000b412130000040000000000000000", @ANYRES32=0x0, @ANYRES32, @ANYBLOB="000000000300"/28], 0x50) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB, @ANYRES32, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x12, 0xa, 0x4, 0x2}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000180)={{r5}, &(0x7f00000002c0), &(0x7f0000000140)=r4}, 0x20) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000600)={{r5}, &(0x7f0000000580)=0x2, &(0x7f00000005c0)=r4}, 0x20) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000080)={r5, &(0x7f0000000040)}, 0x20) ioctl$SIOCSIFHWADDR(r3, 0x8914, &(0x7f0000000040)={'macsec0\x00'}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) recvmsg$unix(r6, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000540)=""/4096, 0x1000}], 0x1}, 0x0) sendmsg$inet(r6, &(0x7f0000000500)={0x0, 0x0, &(0x7f0000001740)=[{&(0x7f0000000280)='>', 0x1}], 0x1}, 0x0) 8m12.764144584s ago: executing program 9 (id=1252): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000500)=ANY=[@ANYBLOB="1800000000000000000000000000000018010000786c6c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000002d00000095"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000001380)={0x6, 0x0, 0x0, &(0x7f0000000500)='syzkaller\x00', 0x1, 0x0, 0x0, 0x40f00, 0x5a, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000c80)={0x1000, 0x1}, 0x8, 0x10, &(0x7f0000000ec0)={0x4, 0x6, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x2, &(0x7f0000000f00)=[0xffffffffffffffff, 0xffffffffffffffff], &(0x7f0000000180)=[{0x3, 0x1, 0x7}, {0x4, 0x3, 0x4, 0x7}], 0x10, 0x10001}, 0x94) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) openat$ppp(0xffffffffffffff9c, 0x0, 0x305500, 0x0) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000a00)=ANY=[], 0x48) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000007c0)={0xffffffffffffffff, 0x0, 0x0}, 0x10) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, 0x0, 0x0}, 0x94) sendmsg$tipc(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, 0x0}, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.net/syz0\x00', 0x1ff) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000012c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r0, &(0x7f0000000740)={0x0, 0x0, &(0x7f0000000900)=[{&(0x7f00000013c0)="2080", 0x2}], 0x1, 0x0, 0x0, 0x800300}, 0x20000801) recvmsg(r1, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x300}, 0x40002002) 8m12.711099646s ago: executing program 37 (id=1252): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000500)=ANY=[@ANYBLOB="1800000000000000000000000000000018010000786c6c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000002d00000095"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000001380)={0x6, 0x0, 0x0, &(0x7f0000000500)='syzkaller\x00', 0x1, 0x0, 0x0, 0x40f00, 0x5a, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000c80)={0x1000, 0x1}, 0x8, 0x10, &(0x7f0000000ec0)={0x4, 0x6, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x2, &(0x7f0000000f00)=[0xffffffffffffffff, 0xffffffffffffffff], &(0x7f0000000180)=[{0x3, 0x1, 0x7}, {0x4, 0x3, 0x4, 0x7}], 0x10, 0x10001}, 0x94) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) openat$ppp(0xffffffffffffff9c, 0x0, 0x305500, 0x0) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000a00)=ANY=[], 0x48) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000007c0)={0xffffffffffffffff, 0x0, 0x0}, 0x10) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, 0x0, 0x0}, 0x94) sendmsg$tipc(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, 0x0}, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.net/syz0\x00', 0x1ff) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000012c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r0, &(0x7f0000000740)={0x0, 0x0, &(0x7f0000000900)=[{&(0x7f00000013c0)="2080", 0x2}], 0x1, 0x0, 0x0, 0x800300}, 0x20000801) recvmsg(r1, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x300}, 0x40002002) 8m12.658155827s ago: executing program 7 (id=1254): bpf$MAP_CREATE(0x0, &(0x7f00000006c0)=ANY=[@ANYBLOB="16000000000000000400000001"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41000}, 0x94) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f0000000180)=ANY=[@ANYBLOB="18010000010000000000000000030000850000007b00000095"], &(0x7f0000000140)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000080)) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000500)=ANY=[@ANYBLOB="0e00000004000000080000000800000000000000", @ANYRES32, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800"/15, @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) bpf$MAP_CREATE(0x0, &(0x7f0000000840)=ANY=[@ANYBLOB="010000000500000002000000ffff000005000000", @ANYRES32, @ANYBLOB="0000000000000004000000000000000000000080", @ANYRES32=0x0, @ANYRES32, @ANYBLOB="000000000100"/28], 0x48) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f00000000c0)='sched_switch\x00', r0}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000840)=@base={0xa, 0x101, 0x7fff, 0xcc, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x4}, 0x50) 8m12.606712608s ago: executing program 38 (id=1254): bpf$MAP_CREATE(0x0, &(0x7f00000006c0)=ANY=[@ANYBLOB="16000000000000000400000001"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41000}, 0x94) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f0000000180)=ANY=[@ANYBLOB="18010000010000000000000000030000850000007b00000095"], &(0x7f0000000140)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000080)) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000500)=ANY=[@ANYBLOB="0e00000004000000080000000800000000000000", @ANYRES32, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800"/15, @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) bpf$MAP_CREATE(0x0, &(0x7f0000000840)=ANY=[@ANYBLOB="010000000500000002000000ffff000005000000", @ANYRES32, @ANYBLOB="0000000000000004000000000000000000000080", @ANYRES32=0x0, @ANYRES32, @ANYBLOB="000000000100"/28], 0x48) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f00000000c0)='sched_switch\x00', r0}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000840)=@base={0xa, 0x101, 0x7fff, 0xcc, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x4}, 0x50) 8m12.584716968s ago: executing program 3 (id=1253): perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x2, 0x0, 0x3ff, 0x8620, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x80, 0x4f02b8b6}, 0x0, 0x0, 0x0, 0x1, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x1) bpf$PROG_LOAD(0x5, &(0x7f00000006c0)={0x6, 0x0, 0x0, &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @xdp}, 0x94) syz_clone(0x630c1100, 0x0, 0x0, 0x0, 0x0, 0x0) syz_clone(0x43001000, 0x0, 0x0, 0x0, 0x0, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x101400, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x16, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000008f"], 0x0, 0x101, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @flow_dissector, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r0 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r0}, 0x10) perf_event_open(&(0x7f0000000340)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x21, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x40000000}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x48) r1 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000001480)={'syzkaller0\x00', 0x7101}) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) ioctl$TUNSETOFFLOAD(r2, 0xc004743e, 0x110e22fff6) sendmsg$unix(0xffffffffffffffff, 0x0, 0x20000) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'syzkaller0\x00', 0xca58c30f81b6079f}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=@base={0x7, 0x4, 0x208, 0xd9}, 0x50) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x8, &(0x7f0000000740)=@framed={{}, [@tail_call={{0x18, 0x2, 0x1, 0x0, r4}, {}, {0x85, 0x0, 0x0, 0x1b}}]}, &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000000500)=@base={0x5, 0x1, 0x8e, 0xe7c9, 0x1}, 0x48) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_DELETE_BATCH(0x18, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0xe30a, r6}, 0x38) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000040)='kfree\x00', r5}, 0x18) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x8914, &(0x7f0000000080)) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000340)={'dvmrp1\x00', 0x7101}) 8m12.528718309s ago: executing program 39 (id=1253): perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x2, 0x0, 0x3ff, 0x8620, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x80, 0x4f02b8b6}, 0x0, 0x0, 0x0, 0x1, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x1) bpf$PROG_LOAD(0x5, &(0x7f00000006c0)={0x6, 0x0, 0x0, &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @xdp}, 0x94) syz_clone(0x630c1100, 0x0, 0x0, 0x0, 0x0, 0x0) syz_clone(0x43001000, 0x0, 0x0, 0x0, 0x0, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x101400, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x16, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000008f"], 0x0, 0x101, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @flow_dissector, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r0 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r0}, 0x10) perf_event_open(&(0x7f0000000340)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x21, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x40000000}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x48) r1 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000001480)={'syzkaller0\x00', 0x7101}) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) ioctl$TUNSETOFFLOAD(r2, 0xc004743e, 0x110e22fff6) sendmsg$unix(0xffffffffffffffff, 0x0, 0x20000) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'syzkaller0\x00', 0xca58c30f81b6079f}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=@base={0x7, 0x4, 0x208, 0xd9}, 0x50) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x8, &(0x7f0000000740)=@framed={{}, [@tail_call={{0x18, 0x2, 0x1, 0x0, r4}, {}, {0x85, 0x0, 0x0, 0x1b}}]}, &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000000500)=@base={0x5, 0x1, 0x8e, 0xe7c9, 0x1}, 0x48) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_DELETE_BATCH(0x18, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0xe30a, r6}, 0x38) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000040)='kfree\x00', r5}, 0x18) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x8914, &(0x7f0000000080)) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000340)={'dvmrp1\x00', 0x7101}) 8m12.45247624s ago: executing program 4 (id=1255): r0 = bpf$MAP_CREATE(0x0, 0x0, 0x50) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000000c0)={r0, 0x58, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r2 = bpf$MAP_CREATE(0x2000000000000000, &(0x7f0000000140)=ANY=[@ANYBLOB="0600000004000000008000005c"], 0x48) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x709}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_LOOKUP_BATCH(0x18, &(0x7f00000003c0)={0x0, 0x0, &(0x7f00000002c0), &(0x7f0000000100), 0x200df000, r2, 0x0, 0x200000}, 0x38) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0xb, 0x8, 0xc, 0xffffbfff, 0x1, 0x1}, 0x48) bpf$MAP_UPDATE_BATCH(0x1a, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000810018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000140)='sched_switch\x00', r4}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000040)=@base={0xc, 0x4, 0x4, 0x9}, 0x48) bpf$MAP_CREATE(0x0, &(0x7f0000000100)=ANY=[], 0x48) mkdirat$cgroup(0xffffffffffffffff, &(0x7f00000001c0)='syz1\x00', 0x1ff) bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x11, 0x8, &(0x7f0000000080)=ANY=[@ANYRESDEC=r0, @ANYRES32=r0, @ANYBLOB="0000000000000000b703000000000000850000001b000000b70000000000000095"], &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', r1, @fallback=0x2d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x59, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) 8m12.394678702s ago: executing program 40 (id=1255): r0 = bpf$MAP_CREATE(0x0, 0x0, 0x50) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000000c0)={r0, 0x58, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r2 = bpf$MAP_CREATE(0x2000000000000000, &(0x7f0000000140)=ANY=[@ANYBLOB="0600000004000000008000005c"], 0x48) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x709}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_LOOKUP_BATCH(0x18, &(0x7f00000003c0)={0x0, 0x0, &(0x7f00000002c0), &(0x7f0000000100), 0x200df000, r2, 0x0, 0x200000}, 0x38) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0xb, 0x8, 0xc, 0xffffbfff, 0x1, 0x1}, 0x48) bpf$MAP_UPDATE_BATCH(0x1a, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000810018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000140)='sched_switch\x00', r4}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000040)=@base={0xc, 0x4, 0x4, 0x9}, 0x48) bpf$MAP_CREATE(0x0, &(0x7f0000000100)=ANY=[], 0x48) mkdirat$cgroup(0xffffffffffffffff, &(0x7f00000001c0)='syz1\x00', 0x1ff) bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x11, 0x8, &(0x7f0000000080)=ANY=[@ANYRESDEC=r0, @ANYRES32=r0, @ANYBLOB="0000000000000000b703000000000000850000001b000000b70000000000000095"], &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', r1, @fallback=0x2d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x59, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) 12.302783132s ago: executing program 5 (id=3425): bpf$ITER_CREATE(0x21, &(0x7f0000000040), 0x8) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000400)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x3, '\x00', 0x0, 0x0}, 0x50) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000480)={r0, 0xffffffffffffffff}, 0x4) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x10, &(0x7f0000000680)=ANY=[@ANYBLOB="18000000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r1, @ANYBLOB="0000000000000000b70500000800000085000000b600000095"], &(0x7f00000001c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7a04, 0x0, @perf_bp={0x0}, 0x1e005}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000007c0)={0x2, 0x80, 0x69, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5, 0x800}, 0x0, 0x0, 0x0, 0x2, 0xfffffffffffffffe, 0x0, 0x1, 0x0, 0x0, 0x0, 0xfffffffffffffffe}, 0x0, 0xf, 0xffffffffffffffff, 0x2) bpf$PROG_LOAD(0x5, &(0x7f0000000840)={0x4, 0x16, &(0x7f0000000140)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00'}, 0x94) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002ac0)={0x1a, 0x3, &(0x7f00000012c0)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x18, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x2000}, 0x90) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={0x0, r2}, 0x10) 12.301023803s ago: executing program 6 (id=3426): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x41100, 0xc, '\x00', 0x0, @fallback=0x2e, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="02000000040000000100000022bf"], 0x48) r1 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000002100), 0x48) bpf$MAP_CREATE(0x0, &(0x7f0000000580)=ANY=[@ANYBLOB="1e000000070000000300000000000100201c0000", @ANYRES32=0x1, @ANYBLOB="0200"/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="0300000003000000010000000300000000000000000000000000000010f447950b2175c6bd69860f4f5906db51c848ad94e2e6239455b14fe060a3d163c7b7e7946e39a0f194c1ef428aab892b67e8ef4294b752c6015f5cffea0bc590449d24403a1e84877dbd2f8bf9c9044469bd80640707aa0d302f660c262d86fbf2e07fccb9d320ec489c410ca581e980ddb0603d1bbd4ce6f28aae58749cd345335208264718"], 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[], 0x0}, 0x94) r2 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0), 0x1c1842, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000040)={'macvtap0\x00', 0x100}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r3, 0x8914, &(0x7f0000002280)={'syzkaller0\x00', @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x1}}) openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x1c1842, 0x0) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xae9, 0x30, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc, 0x0, @perf_bp={0x0, 0x1}, 0x2000, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r1) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x11, 0x5, &(0x7f00000002c0)=ANY=[@ANYBLOB="1805000000000000000000004b64ffec850000007d00"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x94) bpf$PROG_LOAD(0x5, 0x0, 0x0) mkdir(&(0x7f0000000300)='./file0\x00', 0x1) syz_clone(0x640c7000, 0x0, 0x0, 0x0, 0x0, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x140, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000480)={{r0}, &(0x7f0000000040), &(0x7f0000000400)}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x1, 0xe, &(0x7f0000001880)=ANY=[@ANYBLOB="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"], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0xfffffffffffffd00}, 0x48) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x10020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000240)='cpuacct.stat\x00', 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x94) 12.059299737s ago: executing program 5 (id=3427): bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0500000004000000ff0f000007"], 0x48) bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000940)={&(0x7f0000000040)='sys_enter\x00', r0}, 0x10) syz_clone(0x40800000, 0x0, 0x0, 0x0, 0x0, 0x0) 11.713892784s ago: executing program 5 (id=3431): bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) socketpair$unix(0xa, 0x2, 0x3a, 0x0) perf_event_open(0x0, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0500000004000000ff0f000007"], 0x48) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='blkio.bfq.time\x00', 0x26e1, 0x0) close(r1) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000011c0)={r1, 0x18000000000002a0, 0xe, 0x0, &(0x7f0000001240)="b9ff03076804268c989e14f088a8", 0x0, 0x4068, 0x60000000, 0x0, 0x0, 0x0, 0x0}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000000700)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b70400000000000085"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x13, r1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f00000002c0)={{r0}, &(0x7f0000000040), &(0x7f0000000280)='%pS \x00'}, 0x20) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r2}, 0x10) perf_event_open(&(0x7f00000004c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xd, 0xffffffff}, 0x118920, 0x0, 0x0, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002c80)={0x3, 0x5, 0x0, &(0x7f0000000000)='syzkaller\x00', 0x4}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000002c0)={r3, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa00, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) syz_clone(0xc0000000, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x200000000000000, &(0x7f0000000240)=@base={0x9, 0x8, 0x4, 0x4009, 0xa}, 0x48) 8.918859377s ago: executing program 1 (id=3441): perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x34120, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x48) bpf$MAP_CREATE(0x0, 0x0, 0x48) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) mkdir(0x0, 0x0) syz_clone(0x44208400, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000780)={0x6, 0x3, &(0x7f0000000680)=ANY=[@ANYBLOB="18000000020000000000000000ee"], &(0x7f00000002c0)='GPL\x00'}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000007000000095"], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f}, 0x90) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000680)='sched_switch\x00', r0}, 0x10) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) mkdirat$cgroup(0xffffffffffffffff, 0x0, 0x1ff) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000001480)='./cgroup/syz1\x00', 0x200002, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000007c0)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) (fail_nth: 4) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) 8.894628618s ago: executing program 5 (id=3442): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="01000000040000000800000005"], 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x6, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000002c0)={{r0}, &(0x7f0000000040), &(0x7f0000000280)}, 0x20) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r1, 0x8914, &(0x7f0000000280)={'wg2\x00'}) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000002000000b7030000000000fc850000000400000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d0000001801000020696c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x23, 0x0, 0x0, 0x0, 0xfffffffffffffe51, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='fib_table_lookup\x00', r2}, 0x10) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000300)='fib_table_lookup\x00', r3}, 0x10) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r4, 0x8914, &(0x7f0000000040)={'wg2\x00', @multicast}) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000240)) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00'}, 0x18) bpf$MAP_CREATE(0x600000000000000, &(0x7f0000000580)=@base={0xf, 0x4, 0x4, 0x20002, 0x0, 0x1, 0xfffffffd, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x4}, 0x48) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x20, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000180)='tlb_flush\x00', r5}, 0x10) syz_clone(0x11, 0x0, 0x0, 0x0, 0x0, 0x0) 7.943720256s ago: executing program 5 (id=3445): bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) socketpair$unix(0xa, 0x2, 0x3a, 0x0) perf_event_open(0x0, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="05000000"], 0x48) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='blkio.bfq.time\x00', 0x26e1, 0x0) close(r1) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000011c0)={r1, 0x18000000000002a0, 0xe, 0x0, &(0x7f0000001240)="b9ff03076804268c989e14f088a8", 0x0, 0x4068, 0x60000000, 0x0, 0x0, 0x0, 0x0}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000000700)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x13, r1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_UPDATE_CONST_STR(0x2, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00'}, 0x10) perf_event_open(&(0x7f00000004c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xd, 0xffffffff}, 0x118920, 0x0, 0x0, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_clone(0xc0000000, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x2) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x200000000000000, &(0x7f0000000240)=@base={0x9, 0x8, 0x4, 0x4009, 0xa}, 0x48) 7.829089989s ago: executing program 6 (id=3446): bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) socketpair$unix(0xa, 0x2, 0x3a, 0x0) perf_event_open(0x0, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="05000000"], 0x48) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='blkio.bfq.time\x00', 0x26e1, 0x0) close(r1) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000011c0)={r1, 0x18000000000002a0, 0xe, 0x0, &(0x7f0000001240)="b9ff03076804268c989e14f088a8", 0x0, 0x4068, 0x60000000, 0x0, 0x0, 0x0, 0x0}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000000700)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x13, r1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f00000002c0)={{r0}, 0x0, &(0x7f0000000280)='%pS \x00'}, 0x20) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00'}, 0x10) perf_event_open(&(0x7f00000004c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xd, 0xffffffff}, 0x118920, 0x0, 0x0, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_clone(0xc0000000, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x2) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x200000000000000, &(0x7f0000000240)=@base={0x9, 0x8, 0x4, 0x4009, 0xa}, 0x48) 7.816763379s ago: executing program 2 (id=3447): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="01000000040000000800000005"], 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x6, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000002c0)={{r0}, &(0x7f0000000040), &(0x7f0000000280)}, 0x20) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r1, 0x8914, &(0x7f0000000280)={'wg2\x00'}) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000002000000b7030000000000fc850000000400000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d0000001801000020696c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x23, 0x0, 0x0, 0x0, 0xfffffffffffffe51, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='fib_table_lookup\x00', r2}, 0x10) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000300)='fib_table_lookup\x00', r3}, 0x10) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r4, 0x8914, &(0x7f0000000040)={'wg2\x00', @multicast}) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0xb701, 0x0) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00'}, 0x18) bpf$MAP_CREATE(0x600000000000000, &(0x7f0000000580)=@base={0xf, 0x4, 0x4, 0x20002, 0x0, 0x1, 0xfffffffd, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x4}, 0x48) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x20, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000180)='tlb_flush\x00', r5}, 0x10) syz_clone(0x11, 0x0, 0x0, 0x0, 0x0, 0x0) 7.467157335s ago: executing program 0 (id=3448): bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x7, 0x4, 0x208, 0x1}, 0x50) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x8, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r0, @ANYBLOB="0000000000000000b70300002100000085"], &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f0000000080)='sched_switch\x00', r1}, 0x18) r2 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x10, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4000000000000007910480000000000610400000000000095000000"], &(0x7f0000003ff6)='GPL\x00', 0x2, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @sk_msg}, 0x48) close(r2) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f0000000540)=ANY=[@ANYBLOB="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"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @sk_skb, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x1dd}, 0x48) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0xf, 0x4, 0x4, 0x12}, 0x48) bpf$BPF_PROG_DETACH(0x8, &(0x7f00000007c0)=ANY=[@ANYRES32=r6, @ANYRES32=r5, @ANYBLOB='&\x00\x00\x00\x00\x00\x00\x00\x00', @ANYRES32, @ANYBLOB="d392342a19555d1e696797b1cb271c1dff538956d508b290da74ef098a0773b25492d569e3f0c7aefb4b7d9a1fdaa1c3aa668f8a3264ee672c58e00eef6a9fa3923111bab8bf4597f90b509bf54d4ed786c490218b406eeb8931317000edf6757f61ebfc368aa838d9388afd61a3d2e5422e7dd638f12cb079887ad09548fbdfc13c62ffa74e84c52cf8fa35ce13c44c4b2cfa0163747295ae", @ANYRES64=0x0], 0x10) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000000c0)={{r6}, &(0x7f0000000000), &(0x7f0000000080)=r2}, 0x20) recvmsg$unix(r3, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f00000006c0)=""/179, 0x33fe0}], 0x1, 0x0, 0x0, 0x300}, 0x0) sendmsg$inet(r4, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000b00)="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", 0xfff}, {&(0x7f0000000180)="dd43", 0x2}], 0x2}, 0x0) 7.23124166s ago: executing program 0 (id=3449): bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x11, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=@base={0x7, 0x4, 0x8, 0x1}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x8, &(0x7f0000000740)=ANY=[@ANYBLOB, @ANYRES32=r0, @ANYBLOB="0000000000000000b703000000030000850000001b000000b70000000000000095"], &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x11, 0x5, &(0x7f00000002c0)=ANY=[@ANYBLOB="1805000000000000000000004b64ffec850000007d000000850000000700000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0xb}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x3, 0x4, &(0x7f0000000040)=@framed={{0xffffffb4, 0x5, 0x0, 0x0, 0x0, 0x61, 0x10, 0x50}, [@ldst={0x3, 0x2, 0x3, 0x1c10a1, 0x0, 0x9e}]}, &(0x7f0000003ff6)='GPL\x00', 0x5, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @sched_cls, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x85}, 0x52) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000080)='sched_switch\x00', r2}, 0x10) bpf$PROG_LOAD(0x5, 0x0, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x19, 0x4, 0x4, 0x8002, 0x0, 0x1}, 0x50) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000300)={r3, 0x0, 0x0}, 0x20) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f0000000080)='sched_switch\x00', r1}, 0x18) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x8}, 0x0, 0x0, 0x0, 0x0, 0x800000000000, 0x400000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x5, &(0x7f0000002500)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='GPL\x00'}, 0x48) r5 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400), 0x2, 0x0) ioctl$TUNSETIFF(r5, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) close(r5) recvmsg$unix(r4, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0), 0x100}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)) 6.841462428s ago: executing program 2 (id=3450): bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000500)=ANY=[@ANYBLOB="0a00000004000000ff0f00000700000000000000", @ANYRES32, @ANYBLOB="000000400600"/19, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b70800000004000000001e4f67eac2f7d4a1000000000000c9b8ff77f8ffffffb703000008000020b70400000000000085000000c3"], 0x0, 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r2 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00', r2}, 0x10) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TUNSETOFFLOAD(r0, 0xc004743e, 0x110e22fff6) perf_event_open(0x0, 0xffffffffffffffff, 0xb, 0xffffffffffffffff, 0x0) r3 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="0b000000070000000800000004000000050000008415536ce3b62424b3da9895f99b5864cd8fea9859d7cc707185b0e659719f3a4264b0002b1c0baa14b13d5249f24994fb3b95c425dc539f611add71567306acd4b62d5e8206c9992d791e5ef649fddd78d68d1ab74b257865c5fdb9bd1be5aa6d2e2e50d4783ccd20f43e7acdeb6c90c8e71c0d5da303", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000100000000000000fe0018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000000000017b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000bc0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r5, @ANYBLOB], 0x0, 0x400000, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000700)='signal_generate\x00', r6}, 0x10) r7 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x1, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x1) perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x3, 0x0, 0x0, 0x0, 0x0, 0x24, 0x12506, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x8}, 0x7602}, 0x0, 0xffffffffffffffff, r7, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.current\x00', 0x275a, 0x0) socketpair(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r8, 0x89a2, &(0x7f0000000080)) ioctl$TUNSETOFFLOAD(r3, 0x4004743d, 0x110e22fff6) close(r3) 6.451747075s ago: executing program 2 (id=3451): perf_event_open(0x0, 0x0, 0x2, 0xffffffffffffffff, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) close(0xffffffffffffffff) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x34120, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1b, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000016"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18020000000000000000"], 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00'}, 0x10) ioctl$SIOCSIFHWADDR(r0, 0x8914, &(0x7f0000000040)={'sit0\x00', @local}) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x28, 0x28, 0x9, [@volatile={0x0, 0x0, 0x0, 0x9, 0x3}, @var={0x7, 0x0, 0x0, 0xe, 0x1}, @func_proto={0x0, 0x0, 0x0, 0xd, 0x2}]}, {0x0, [0x5f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f]}}, 0x0, 0x49}, 0x28) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='sys_enter\x00'}, 0x18) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) setsockopt$sock_attach_bpf(r2, 0x1, 0x1d, &(0x7f00000001c0), 0x4) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8914, &(0x7f0000000040)={'sit0\x00', @random="4f33e363a4b1"}) bpf$MAP_CREATE(0x0, 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) write$cgroup_subtree(r3, &(0x7f0000000140)=ANY=[], 0xfffffdef) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) write$cgroup_pid(r4, &(0x7f0000000980), 0x20000992) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="18010000000000000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, 0x2}, 0x94) 6.413630046s ago: executing program 1 (id=3452): bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0500000004000000ff0f000007"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000700)={0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x94) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000940)={&(0x7f0000000040)='sys_enter\x00', r0}, 0x10) syz_clone(0x40800000, 0x0, 0x0, 0x0, 0x0, 0x0) 6.280445629s ago: executing program 0 (id=3453): perf_event_open(&(0x7f0000000480)={0x2, 0x80, 0xcb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x6, 0x9}, 0x8080, 0x5, 0x0, 0x0, 0xed}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x1a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000001700)=ANY=[@ANYBLOB="160000000000000061b1000002"], 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000080)={{r1, 0xffffffffffffffff}, 0x0, &(0x7f0000000040)}, 0x20) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f00000009c0)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000093850000007100000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0xc, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000000)='kfree\x00', r3}, 0x10) bpf$MAP_LOOKUP_ELEM(0x15, &(0x7f0000000200)={r2, 0x0, &(0x7f0000001780)=""/4096}, 0x20) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="0200000044000000008000000600000000040200", @ANYRES32, @ANYBLOB="0600000000b1fb00000028c3caa4000000000000a7d637107fe1309ac1e6fd7f9b8252c92d62586c3cd27a62", @ANYRES32=0x0, @ANYRES32, @ANYBLOB="03000000000000000100"/28], 0x50) openat$cgroup_procs(0xffffffffffffffff, 0x0, 0x2, 0x0) openat$cgroup_procs(0xffffffffffffffff, 0x0, 0x2, 0x0) sendmsg$tipc(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)=[{0x0}], 0x1}, 0x0) r4 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f00000002c0)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) r5 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000e00)={&(0x7f0000000980)='sys_exit\x00', r4}, 0x10) r6 = bpf$ITER_CREATE(0xb, &(0x7f0000000100)={r5}, 0x8) bpf$PROG_LOAD(0x5, &(0x7f0000000540)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000f6000000850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r7 = bpf$MAP_CREATE(0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r7, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000002"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000e00)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000000)='workqueue_queue_work\x00', r8}, 0x10) r9 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETIFF(r9, 0x400454ca, &(0x7f0000000280)={'pim6reg1\x00', 0x2}) ioctl$TUNATTACHFILTER(r9, 0x401054d5, &(0x7f0000000700)={0x1, &(0x7f00000006c0)=[{0x59, 0x8, 0x3, 0xd}]}) write$cgroup_int(r6, &(0x7f00000001c0), 0xfffffdef) openat$cgroup_devices(r6, &(0x7f0000000280)='devices.deny\x00', 0x2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0a00000004000000ff0f00000700000000000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/23], 0x48) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)) 5.963546384s ago: executing program 1 (id=3454): bpf$MAP_CREATE(0x0, 0x0, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) close(0xffffffffffffffff) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f00000004c0)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa1000000"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000440)=0x6, 0x12) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000840)=ANY=[@ANYBLOB="1600000000000000040000000700000000000000", @ANYRES32=0x1, @ANYBLOB="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", @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB, @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x22, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000100)='mm_lru_insertion\x00', r2}, 0x10) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x26e1, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0xfffffffe, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000100)='mm_lru_insertion\x00', r3}, 0x10) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) write$cgroup_type(r4, &(0x7f0000000180), 0x40010) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x401c5820, &(0x7f00000001c0)=0x8) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0xc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={0xffffffffffffffff, 0x18000000000002a0, 0x75, 0x0, &(0x7f00000003c0)="b9e403c6631e39495a2d0a52b2afa05dc7cf1c4c0d3c3e803439b4b238a6ddc4e684bc82d5501995f19bb53b133f9eafed80585e8cd8884902d947cb1437bd495aac9e5ab1b143a9c53d4a44e173264ae8b217489f52de0642eb6e785e31f33458d4da6176825c1d68d43ceed3214dde86156a6a29", 0x0, 0x7ab, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) syz_clone(0x640c7000, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0xd, 0x1, &(0x7f0000000300)=ANY=[@ANYBLOB="95000000000c0000"], &(0x7f0000000340)='GPL\x00', 0x6, 0x18, &(0x7f0000000380)=""/24, 0x41000, 0x2, '\x00', 0x0, @fallback=0x1d, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000a00)={0x3, 0x2, 0x9, 0x85}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x7, &(0x7f0000000a40)=[0x1], &(0x7f0000000a80)=[{0x3, 0x1, 0x1, 0x9}, {0x3, 0x2, 0x8, 0x9}, {0x4, 0x2, 0x4, 0x7}, {0x2, 0x1, 0x2, 0x9}, {0x3, 0x2, 0xd, 0xa}, {0x6, 0x1, 0x2, 0x6}, {0x4, 0x2, 0x4}], 0x10, 0x2}, 0x94) syz_clone(0x4021400, 0x0, 0x9000, 0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=ANY=[@ANYBLOB="0900000005000000fd0900008400000000000000", @ANYRES32, @ANYBLOB="feffff7affffff00"/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x50) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000300)={0xffffffffffffffff, 0x0, &(0x7f00000000c0), &(0x7f0000000240), 0x800, r5}, 0x38) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000480)='xprtrdma_post_linv_err\x00', r0, 0x0, 0xda}, 0x18) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}, 0x0, 0x10001, 0x0, 0x0, 0x0, 0xd56}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_LOOKUP_BATCH(0x19, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000680), &(0x7f0000000540), 0x6c, r5}, 0x38) 5.801583478s ago: executing program 6 (id=3455): perf_event_open(0x0, 0x0, 0x2, 0xffffffffffffffff, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) close(0xffffffffffffffff) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x34120, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1b, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000016"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18020000000000000000"], 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00'}, 0x10) ioctl$SIOCSIFHWADDR(r0, 0x8914, &(0x7f0000000040)={'sit0\x00', @local}) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x28, 0x28, 0x9, [@volatile={0x0, 0x0, 0x0, 0x9, 0x3}, @var={0x7, 0x0, 0x0, 0xe, 0x1}, @func_proto={0x0, 0x0, 0x0, 0xd, 0x2}]}, {0x0, [0x5f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f]}}, 0x0, 0x49}, 0x28) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='sys_enter\x00'}, 0x18) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) setsockopt$sock_attach_bpf(r2, 0x1, 0x1d, &(0x7f00000001c0), 0x4) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8914, &(0x7f0000000040)={'sit0\x00', @random="4f33e363a4b1"}) bpf$MAP_CREATE(0x0, 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) write$cgroup_subtree(r3, &(0x7f0000000140)=ANY=[], 0xfffffdef) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) write$cgroup_pid(r4, &(0x7f0000000980), 0x20000992) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="18010000000000000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, 0x2}, 0x94) 5.771944648s ago: executing program 0 (id=3456): bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) socketpair$unix(0xa, 0x2, 0x3a, 0x0) perf_event_open(0x0, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="05000000"], 0x48) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='blkio.bfq.time\x00', 0x26e1, 0x0) close(r1) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000011c0)={r1, 0x18000000000002a0, 0xe, 0x0, &(0x7f0000001240)="b9ff03076804268c989e14f088a8", 0x0, 0x4068, 0x60000000, 0x0, 0x0, 0x0, 0x0}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000000700)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x13, r1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_UPDATE_CONST_STR(0x2, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00'}, 0x10) perf_event_open(&(0x7f00000004c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xd, 0xffffffff}, 0x118920, 0x0, 0x0, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_clone(0xc0000000, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x2) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x200000000000000, &(0x7f0000000240)=@base={0x9, 0x8, 0x4, 0x4009, 0xa}, 0x48) 5.444559755s ago: executing program 2 (id=3457): recvmsg$unix(0xffffffffffffffff, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) socketpair(0x1, 0x1, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000007300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0600000004000000ff0f000007"], 0x48) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000004c0)={r3, 0x58, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x7, 0xc, &(0x7f0000000380)=ANY=[@ANYRES64=r1, @ANYRESOCT=r4, @ANYBLOB="00000000000000ac3a47038e7deeb9fe8a2ed200b70800bfa200000000e8ffffffb703000000000021b70400000000000085000000c300000095000000000000000000000000006afd6315abb54295933505c4cefc3359d2ba8ab59455ee32cd1da80dd8a5782510580a37bb4fe7b14d3f82671abbc4b21ff12ef29a2e74d9dfdcfd06efb081df000000000000"], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0xa, '\x00', r4, @fallback=0x11, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x94) bpf$TOKEN_CREATE(0x24, &(0x7f0000000540)={0x0, r0}, 0x8) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback=0x2b, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x40}, 0x94) r6 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000700)='signal_generate\x00', r5}, 0x10) syz_open_procfs$namespace(0x0, 0xfffffffffffffffe) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00', r2}, 0x10) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000700), 0x100}, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r8 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000240)={&(0x7f0000000200)='sys_enter\x00', r7}, 0x10) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x8}, 0x0, 0x0, 0x0, 0x0, 0x10}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) close(r8) syz_clone(0x640c7000, 0x0, 0x0, 0x0, 0x0, 0x0) r9 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000300)='freezer.parent_freezing\x00', 0x0, 0x0) ioctl$SIOCSIFHWADDR(r9, 0x8924, &(0x7f0000000340)={'batadv_slave_0\x00'}) ioctl$PERF_EVENT_IOC_ID(r6, 0x80082407, &(0x7f0000000500)) perf_event_open(0x0, 0x0, 0xfffff7ffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, 0x0) 4.190254599s ago: executing program 6 (id=3458): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0e000000040000000800000005"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x6, 0xc, &(0x7f00000001c0)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bc82000000000000a6020000f8ffffffb703000008000000cd03000000000000850000003300000095"], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @xdp=0xedf0e51957efc755, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000002c0)={{r0}, &(0x7f0000000040), &(0x7f0000000280)=r1}, 0x20) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000080)={{r0}, &(0x7f0000000240), &(0x7f0000000380)=r1}, 0x20) socketpair$tipc(0x1e, 0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x2, 0x80, 0xcb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x6, 0x9}, 0x8080, 0x5, 0x0, 0x0, 0xed}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r2, &(0x7f0000000500)={0x0, 0x0, 0x0}, 0x0) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000540)={0x11, 0x4, &(0x7f00000002c0)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x4, '\x00', 0x0, 0x2}, 0x94) r4 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f00000000c0)='sys_enter\x00', r3}, 0x10) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, 0x0, 0x0) r5 = bpf$TOKEN_CREATE(0x24, &(0x7f0000000300), 0x8) bpf$TOKEN_CREATE(0x24, &(0x7f0000000400)={0x0, r5}, 0x8) bpf$PROG_LOAD(0x5, &(0x7f0000000740)={0x1, 0xb, &(0x7f00000006c0)=ANY=[@ANYBLOB="180000000500000000000000000000001801000020a0702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000", @ANYRES8=r5], 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1d, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0xa}, 0x94) openat$cgroup_type(0xffffffffffffffff, 0x0, 0x2, 0x0) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x53, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r6}, 0x10) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1042d, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000200)='ns/ipc\x00') openat$cgroup_procs(0xffffffffffffffff, 0x0, 0x2, 0x0) r7 = syz_clone(0x403ac400, 0x0, 0x0, 0x0, 0x0, 0x0) r8 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000140)={0x6, 0x3, &(0x7f0000000680)=ANY=[@ANYBLOB="180000000200000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x94) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000200)={0x6, 0x3, &(0x7f0000000680)=ANY=[], &(0x7f00000002c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, r8}, 0x94) bpf$MAP_CREATE(0x0, &(0x7f00000005c0)=ANY=[], 0x50) ioctl$TUNSETSTEERINGEBPF(r8, 0x800454e0, 0x0) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x6, 0x9, 0x10, 0x3, 0x0, 0x3, 0x4000, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x5, 0x2, @perf_config_ext={0x6, 0x6}, 0x110042, 0x9, 0x1, 0x7, 0xa, 0xffffffff, 0x7, 0x0, 0x8, 0x0, 0x4}, r7, 0x2, r4, 0x19) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) 4.175950279s ago: executing program 5 (id=3459): bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) socketpair$unix(0xa, 0x2, 0x3a, 0x0) perf_event_open(0x0, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="05000000"], 0x48) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='blkio.bfq.time\x00', 0x26e1, 0x0) close(r1) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000011c0)={r1, 0x18000000000002a0, 0xe, 0x0, &(0x7f0000001240)="b9ff03076804268c989e14f088a8", 0x0, 0x4068, 0x60000000, 0x0, 0x0, 0x0, 0x0}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000000700)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x13, r1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f00000002c0)={{r0}, 0x0, &(0x7f0000000280)='%pS \x00'}, 0x20) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00'}, 0x10) perf_event_open(&(0x7f00000004c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xd, 0xffffffff}, 0x118920, 0x0, 0x0, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_clone(0xc0000000, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x2) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x200000000000000, &(0x7f0000000240)=@base={0x9, 0x8, 0x4, 0x4009, 0xa}, 0x48) 2.59766096s ago: executing program 2 (id=3460): r0 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x2, 0x0, 0x3ff, 0x8620, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x80, 0x4f02b8b6}, 0x0, 0x0, 0x0, 0x1, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x1) bpf$PROG_LOAD(0x5, &(0x7f00000006c0)={0x6, 0x0, 0x0, &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @xdp}, 0x94) syz_clone(0x630c1100, 0x0, 0x0, 0x0, 0x0, 0x0) syz_clone(0x43001000, 0x0, 0x0, 0x0, 0x0, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x101400, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x16, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000008f"], 0x0, 0x101, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @flow_dissector, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r2 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r2}, 0x10) perf_event_open(&(0x7f0000000340)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x21, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x40000000}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0) r3 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000004c0)=@o_path={&(0x7f0000000480)='./file0\x00', 0x0, 0x0, r1}, 0x18) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000500)={&(0x7f0000000200)="0e", &(0x7f00000014c0)=""/4096, &(0x7f0000000280)="aa6720bf395164ea74eaa0e78cf224dbfd1410a18dbd8861de15ef93c4aef806934ec970cd276e2505f0f54a4755ea6899599ff61731b2f19d86c18a35bbc33ca80b1b87a9e34667a6aa33694aa6479a81d7692d75794e2a347929a66b3597e9d04a9ace6db0dbdeec45de2f087ee59d7b8119e4b415b1e7ec7443e5e7ae2271dbd9cc10c70e55137b6a813eb237b2ee0ede3d923a475795cf3764bc987a2a4c8280c04bc3ad97dfcc09c37dddddd6183b24b1b72ce32e255c6c77", &(0x7f00000003c0)="62a9d6c89b6acbe114422e0368be4d9fbf943d453900572e0267c1495b25021cecd7076733377efebeaf2cc957cc0b6ce71bc88b80da439da988911d62cb210b21080b943b69feb7f03c78bafd452d8d36821714d0e8432737e14de0294f0a64a7ec54b3143e12c53aed247396781de49bb01bdc852956f298a1a9892559608a6db0ee44d7614f937895340ac07de82032e2914f5a706a2bc075f51503f944da8cfb85b4d92eb0ca312b0ae145aafa182188", 0x4, r3, 0x4}, 0x38) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x48) r4 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f0000001480)={'syzkaller0\x00', 0x7101}) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r5 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) ioctl$TUNSETOFFLOAD(r5, 0xc004743e, 0x110e22fff6) sendmsg$unix(0xffffffffffffffff, 0x0, 0x20000) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'syzkaller0\x00', 0xca58c30f81b6079f}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x8914, &(0x7f0000000080)) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000140)='sched_switch\x00', r7}, 0x10) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000000000}, 0x0, 0xffffffffffffffff, r0, 0x0) close(r4) 2.55595748s ago: executing program 6 (id=3461): bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0500000004000000ff0f000007"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000700)={0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x94) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000940)={&(0x7f0000000040)='sys_enter\x00', r0}, 0x10) syz_clone(0x40800000, 0x0, 0x0, 0x0, 0x0, 0x0) 2.201507857s ago: executing program 6 (id=3462): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="05000000010000000a000000"], 0x48) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="100000000400000004000000020000000000", @ANYRES32=0x1, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="000000000000000000f79b"], 0x48) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x4, 0x8, &(0x7f00000003c0)=ANY=[@ANYBLOB="18020000120000000000000000000000850000005300000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b702000000000000850000008600000095"], &(0x7f00000004c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x32, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000600)={r2, 0x0, 0xe, 0x0, &(0x7f0000000040)="e06921e8682d85ff9782762f86dd", 0x0, 0xc7d, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x17, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1802000008000000000000000000000018010000696c6c2500000000002020207b1af8ff00000000ffffffb702000008000000b70300000f0000008500000006000000850000007d"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x43, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f00000001c0)=ANY=[@ANYBLOB="180000000000000000000020519b193904f00000", @ANYRESDEC=r0, @ANYRES16=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x32, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) r3 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000007c0)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xf, &(0x7f0000000040)=ANY=[@ANYBLOB="1800000000090000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000000000008500000085000000b70000000000000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f00000006c0)='sched_switch\x00', r4}, 0x10) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0xfffffffe, 0x2, 0x0, 0x101}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x11, 0x13, &(0x7f0000000080)=ANY=[@ANYBLOB="18080000000000000000000000000000851000000600000018020000", @ANYRES32, @ANYBLOB="00000000000000006600020000000000180000000000000000000000000000009500040000000000360a020000000000180100002020782500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b50a00000000000085000000060000009500000000000000"], &(0x7f0000000000)='GPL\x00', 0x2, 0xff5c, &(0x7f0000000340)=""/222}, 0x78) r5 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r5, 0x40082406, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x6, 0xb, &(0x7f0000000000)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, '\x00', 0x0, @xdp, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$ENABLE_STATS(0x20, 0x0, 0x0) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="07000000040000000802000001"], 0x50) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x11, 0x8, &(0x7f0000000740)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r6, @ANYBLOB="0000000000000000b703000000040000850000001b000000b70000000000000095"], &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r8 = perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x6, 0x7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r8, 0x40082406, &(0x7f00000001c0)='cpu&00\t_&') bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000480)={&(0x7f0000000380)=ANY=[@ANYBLOB="9feb01001800000000000000280000002800000003000000010000000000000c02000000000000000200000d00000000000000000000000000000000000040000061"], 0x0, 0x43}, 0x28) ioctl$PERF_EVENT_IOC_SET_FILTER(r8, 0x40082406, &(0x7f0000000080)='mm_lru_insertion\x00') bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='mm_lru_insertion\x00', r7}, 0x18) syz_clone(0x640c7000, 0x0, 0x0, 0x0, 0x0, 0x0) 1.973010362s ago: executing program 0 (id=3463): bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000002c0)={0x1, 0xffffffffffffffff}, 0x4) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000400)={r0, &(0x7f0000000300)="d3a92c64ba44fe70a2b01b247e4698240ee14c2723a563ddc31d5e159c599464da419fb853eeb826d3a5ddcff3b82a881b644615bdd801302687724226a8d8115bb4f1dbb9e425ddf51b63a5cc8c7d53d8d1782d47e81c518dd06f8885e108eacba9cd650c75cdc23d4bfcfd337cd310cc6b61b82543026b8af83a3d348660d6b510401c7ac254c760b8d5a8e4986bd327f271f7877ddd6af088c1bc189aaa17ef4fa1aff2f066a61ab93cff81c79525b046c474a926ac37097179f098c06c01b8f52b2b725d865d483d8933c6eeef1c483faddd", &(0x7f0000002a00)=""/4096}, 0x20) r1 = bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000033c0)=ANY=[], 0x50) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x100, 0x10020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$MAP_CREATE(0x1900000000000000, &(0x7f0000000040)=ANY=[@ANYBLOB="1b00000000000000000000000020"], 0x48) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000001e80)=ANY=[@ANYBLOB="0b000000080000000c000000ffffffff01"], 0x48) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x11, 0xd, &(0x7f0000000240)=ANY=[@ANYBLOB="18000000000000000000000000000000850000006d00000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000021007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000010b704000000000000850000000100000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={&(0x7f0000000180)='kfree\x00', r4}, 0x10) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7, 0xb}, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x18, 0xc, &(0x7f00000004c0)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffff3703000008000000b704000000000000850000008200000095000000000000009500000000000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffbb, 0x0, 0x0, 0x0}, 0x94) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000580)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000000)='consume_skb\x00', r5}, 0xa) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000580)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000000)='consume_skb\x00', r6}, 0x10) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$tipc(r7, &(0x7f0000004440)={&(0x7f0000000ec0)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x2}}, 0x10, &(0x7f0000004340)=[{&(0x7f0000001c80)="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", 0xd4d}], 0x1}, 0x0) syz_clone(0x640c7000, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000008c0)={0x3, 0xc, &(0x7f0000000440)=ANY=[], 0x0}, 0x94) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x48) r8 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000000440)=ANY=[@ANYBLOB], &(0x7f0000000000)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, r8) r9 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x11, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1801000021000000000000004bc311ec8500000075000000850000000800000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000980)=ANY=[@ANYBLOB="0200000004000000080000000100000080000400", @ANYRES32, @ANYBLOB="0200"/20, @ANYRES32=0x0, @ANYRES32=r1, @ANYBLOB="05000000000000000100"/28], 0x50) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='signal_deliver\x00', r9}, 0x10) syz_open_procfs$namespace(0x0, 0xfffffffffffffffe) 1.000816331s ago: executing program 2 (id=3464): perf_event_open(0x0, 0x0, 0x2, 0xffffffffffffffff, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) close(0xffffffffffffffff) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x34120, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$MAP_CREATE(0x0, 0x0, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1b, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18020000000000000000"], 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00'}, 0x10) ioctl$SIOCSIFHWADDR(r0, 0x8914, &(0x7f0000000040)={'sit0\x00', @local}) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x28, 0x28, 0x9, [@volatile={0x0, 0x0, 0x0, 0x9, 0x3}, @var={0x7, 0x0, 0x0, 0xe, 0x1}, @func_proto={0x0, 0x0, 0x0, 0xd, 0x2}]}, {0x0, [0x5f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f]}}, 0x0, 0x49}, 0x28) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='sys_enter\x00'}, 0x18) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x1d, &(0x7f00000001c0), 0x4) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8914, &(0x7f0000000040)={'sit0\x00', @random="4f33e363a4b1"}) bpf$MAP_CREATE(0x0, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) write$cgroup_subtree(r2, &(0x7f0000000140)=ANY=[], 0xfffffdef) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) write$cgroup_pid(r3, &(0x7f0000000980), 0x20000992) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="18010000000000000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, 0x2}, 0x94) 681.653367ms ago: executing program 0 (id=3465): bpf$MAP_CREATE(0x0, 0x0, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) close(0xffffffffffffffff) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f00000004c0)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa1000000"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000440)=0x6, 0x12) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000840)=ANY=[@ANYBLOB="1600000000000000040000000700000000000000", @ANYRES32=0x1, @ANYBLOB="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", @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB, @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x22, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000100)='mm_lru_insertion\x00', r2}, 0x10) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x26e1, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0xfffffffe, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000100)='mm_lru_insertion\x00', r3}, 0x10) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) write$cgroup_type(r4, &(0x7f0000000180), 0x40010) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x401c5820, &(0x7f00000001c0)=0x8) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={0xffffffffffffffff, 0x18000000000002a0, 0x75, 0x0, &(0x7f00000003c0)="b9e403c6631e39495a2d0a52b2afa05dc7cf1c4c0d3c3e803439b4b238a6ddc4e684bc82d5501995f19bb53b133f9eafed80585e8cd8884902d947cb1437bd495aac9e5ab1b143a9c53d4a44e173264ae8b217489f52de0642eb6e785e31f33458d4da6176825c1d68d43ceed3214dde86156a6a29", 0x0, 0x7ab, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) syz_clone(0x640c7000, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0xd, 0x1, &(0x7f0000000300)=ANY=[@ANYBLOB="95000000000c0000"], &(0x7f0000000340)='GPL\x00', 0x6, 0x18, &(0x7f0000000380)=""/24, 0x41000, 0x2, '\x00', 0x0, @fallback=0x1d, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000a00)={0x3, 0x2, 0x9, 0x85}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x7, &(0x7f0000000a40)=[0x1], &(0x7f0000000a80)=[{0x3, 0x1, 0x1, 0x9}, {0x3, 0x2, 0x8, 0x9}, {0x4, 0x2, 0x4, 0x7}, {0x2, 0x1, 0x2, 0x9}, {0x3, 0x2, 0xd, 0xa}, {0x6, 0x1, 0x2, 0x6}, {0x4, 0x2, 0x4}], 0x10, 0x2}, 0x94) syz_clone(0x4021400, 0x0, 0x9000, 0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=ANY=[@ANYBLOB="0900000005000000fd0900008400000000000000", @ANYRES32, @ANYBLOB="feffff7affffff00"/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x50) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000300)={0xffffffffffffffff, 0x0, &(0x7f00000000c0), &(0x7f0000000240), 0x800, r5}, 0x38) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000480)='xprtrdma_post_linv_err\x00', r0, 0x0, 0xda}, 0x18) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}, 0x0, 0x10001, 0x0, 0x0, 0x0, 0xd56}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_LOOKUP_BATCH(0x19, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000680), &(0x7f0000000540), 0x6c, r5}, 0x38) 231.394665ms ago: executing program 1 (id=3466): bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x7, 0x4, 0x208, 0x1}, 0x50) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x8, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r0, @ANYBLOB="0000000000000000b70300002100000085"], &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f0000000080)='sched_switch\x00', r1}, 0x18) r2 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x10, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4000000000000007910480000000000610400000000000095000000"], &(0x7f0000003ff6)='GPL\x00', 0x2, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @sk_msg}, 0x48) close(r2) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f0000000540)=ANY=[@ANYBLOB="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"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @sk_skb, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x1dd}, 0x48) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0xf, 0x4, 0x4, 0x12}, 0x48) bpf$BPF_PROG_DETACH(0x8, &(0x7f00000007c0)=ANY=[@ANYRES32=r6, @ANYRES32=r5, @ANYBLOB='&\x00'/11, @ANYRES32, @ANYBLOB="d392342a19555d1e696797b1cb271c1dff538956d508b290da74ef098a0773b25492d569e3f0c7aefb4b7d9a1fdaa1c3aa668f8a3264ee672c58e00eef6a9fa3923111bab8bf4597f90b509bf54d4ed786c490218b406eeb8931317000edf6757f61ebfc368aa838d9388afd61a3d2e5422e7dd638f12cb079887ad09548fbdfc13c62ffa74e84c52cf8fa35ce13c44c4b2cfa0163747295ae", @ANYRES64=0x0], 0x10) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000000c0)={{r6}, &(0x7f0000000000), &(0x7f0000000080)=r2}, 0x20) recvmsg$unix(r3, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f00000006c0)=""/179, 0x33fe0}], 0x1, 0x0, 0x0, 0x300}, 0x0) sendmsg$inet(r4, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000b00)="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", 0xfff}, {&(0x7f0000000180)="dd43", 0x2}], 0x2}, 0x0) 163.594037ms ago: executing program 1 (id=3467): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x6, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000002c0)={{}, &(0x7f0000000040), &(0x7f0000000280)}, 0x20) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r0, 0x8914, &(0x7f0000000280)={'wg2\x00'}) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d0000001801000020696c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x23, 0x0, 0x0, 0x0, 0xfffffffffffffe51, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='fib_table_lookup\x00'}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000300)='fib_table_lookup\x00', r1}, 0x10) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r2, 0x8914, &(0x7f0000000040)={'wg2\x00', @multicast}) 0s ago: executing program 1 (id=3468): r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x100, 0x341a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xfffffffffffffffc}, 0x0, 0x1, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000900)={0x1b, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0xe8c}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18020000000000000000"], 0x0}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000200)={{r1}, &(0x7f0000000180), &(0x7f00000001c0)=r0}, 0x20) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000040)='task_newtask\x00', r2}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r3 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) syz_clone(0x400, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r3, 0x2402, 0x8) syz_clone(0x42164000, 0x0, 0x0, 0x0, 0x0, 0x0) kernel console output (not intermixed with test programs): Warning: Permanently added '10.128.1.103' (ED25519) to the list of known hosts. [ 19.414216][ T28] audit: type=1400 audit(1756973867.935:64): avc: denied { mounton } for pid=275 comm="syz-executor" path="/syzcgroup/unified" dev="sda1" ino=2022 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 19.415480][ T275] cgroup: Unknown subsys name 'net' [ 19.437111][ T28] audit: type=1400 audit(1756973867.935:65): avc: denied { mount } for pid=275 comm="syz-executor" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 19.466077][ T28] audit: type=1400 audit(1756973867.985:66): avc: denied { unmount } for pid=275 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 19.466196][ T275] cgroup: Unknown subsys name 'devices' [ 19.582956][ T275] cgroup: Unknown subsys name 'hugetlb' [ 19.589159][ T275] cgroup: Unknown subsys name 'rlimit' [ 19.721039][ T28] audit: type=1400 audit(1756973868.235:67): avc: denied { setattr } for pid=275 comm="syz-executor" name="raw-gadget" dev="devtmpfs" ino=258 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 19.744340][ T28] audit: type=1400 audit(1756973868.235:68): avc: denied { mounton } for pid=275 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1 Setting up swapspace version 1, size = 127995904 bytes [ 19.768331][ T277] SELinux: Context root:object_r:swapfile_t is not valid (left unmapped). [ 19.769748][ T28] audit: type=1400 audit(1756973868.245:69): avc: denied { mount } for pid=275 comm="syz-executor" name="/" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=filesystem permissive=1 [ 19.802003][ T28] audit: type=1400 audit(1756973868.305:70): avc: denied { relabelto } for pid=277 comm="mkswap" name="swap-file" dev="sda1" ino=2025 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 19.819552][ T275] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 19.827942][ T28] audit: type=1400 audit(1756973868.305:71): avc: denied { write } for pid=277 comm="mkswap" path="/root/swap-file" dev="sda1" ino=2025 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 19.862910][ T28] audit: type=1400 audit(1756973868.335:72): avc: denied { read } for pid=275 comm="syz-executor" name="swap-file" dev="sda1" ino=2025 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 19.889613][ T28] audit: type=1400 audit(1756973868.335:73): avc: denied { open } for pid=275 comm="syz-executor" path="/root/swap-file" dev="sda1" ino=2025 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 20.644157][ T284] bridge0: port 1(bridge_slave_0) entered blocking state [ 20.651432][ T284] bridge0: port 1(bridge_slave_0) entered disabled state [ 20.659024][ T284] device bridge_slave_0 entered promiscuous mode [ 20.677275][ T284] bridge0: port 2(bridge_slave_1) entered blocking state [ 20.684691][ T284] bridge0: port 2(bridge_slave_1) entered disabled state [ 20.692147][ T284] device bridge_slave_1 entered promiscuous mode [ 20.727700][ T287] bridge0: port 1(bridge_slave_0) entered blocking state [ 20.735017][ T287] bridge0: port 1(bridge_slave_0) entered disabled state [ 20.742599][ T287] device bridge_slave_0 entered promiscuous mode [ 20.753982][ T283] bridge0: port 1(bridge_slave_0) entered blocking state [ 20.761310][ T283] bridge0: port 1(bridge_slave_0) entered disabled state [ 20.769083][ T283] device bridge_slave_0 entered promiscuous mode [ 20.779237][ T287] bridge0: port 2(bridge_slave_1) entered blocking state [ 20.786357][ T287] bridge0: port 2(bridge_slave_1) entered disabled state [ 20.793977][ T287] device bridge_slave_1 entered promiscuous mode [ 20.808876][ T283] bridge0: port 2(bridge_slave_1) entered blocking state [ 20.816190][ T283] bridge0: port 2(bridge_slave_1) entered disabled state [ 20.823691][ T283] device bridge_slave_1 entered promiscuous mode [ 20.830617][ T286] bridge0: port 1(bridge_slave_0) entered blocking state [ 20.837814][ T286] bridge0: port 1(bridge_slave_0) entered disabled state [ 20.846568][ T286] device bridge_slave_0 entered promiscuous mode [ 20.854969][ T286] bridge0: port 2(bridge_slave_1) entered blocking state [ 20.862195][ T286] bridge0: port 2(bridge_slave_1) entered disabled state [ 20.869676][ T286] device bridge_slave_1 entered promiscuous mode [ 20.982850][ T285] bridge0: port 1(bridge_slave_0) entered blocking state [ 20.990086][ T285] bridge0: port 1(bridge_slave_0) entered disabled state [ 20.997587][ T285] device bridge_slave_0 entered promiscuous mode [ 21.005238][ T285] bridge0: port 2(bridge_slave_1) entered blocking state [ 21.012631][ T285] bridge0: port 2(bridge_slave_1) entered disabled state [ 21.020158][ T285] device bridge_slave_1 entered promiscuous mode [ 21.135231][ T284] bridge0: port 2(bridge_slave_1) entered blocking state [ 21.142395][ T284] bridge0: port 2(bridge_slave_1) entered forwarding state [ 21.149994][ T284] bridge0: port 1(bridge_slave_0) entered blocking state [ 21.157217][ T284] bridge0: port 1(bridge_slave_0) entered forwarding state [ 21.169691][ T283] bridge0: port 2(bridge_slave_1) entered blocking state [ 21.176820][ T283] bridge0: port 2(bridge_slave_1) entered forwarding state [ 21.184458][ T283] bridge0: port 1(bridge_slave_0) entered blocking state [ 21.191774][ T283] bridge0: port 1(bridge_slave_0) entered forwarding state [ 21.222118][ T287] bridge0: port 2(bridge_slave_1) entered blocking state [ 21.229656][ T287] bridge0: port 2(bridge_slave_1) entered forwarding state [ 21.237888][ T287] bridge0: port 1(bridge_slave_0) entered blocking state [ 21.245227][ T287] bridge0: port 1(bridge_slave_0) entered forwarding state [ 21.259430][ T285] bridge0: port 2(bridge_slave_1) entered blocking state [ 21.266646][ T285] bridge0: port 2(bridge_slave_1) entered forwarding state [ 21.274258][ T285] bridge0: port 1(bridge_slave_0) entered blocking state [ 21.282003][ T285] bridge0: port 1(bridge_slave_0) entered forwarding state [ 21.292633][ T8] bridge0: port 1(bridge_slave_0) entered disabled state [ 21.300249][ T8] bridge0: port 2(bridge_slave_1) entered disabled state [ 21.307806][ T8] bridge0: port 1(bridge_slave_0) entered disabled state [ 21.316001][ T8] bridge0: port 2(bridge_slave_1) entered disabled state [ 21.323851][ T8] bridge0: port 1(bridge_slave_0) entered disabled state [ 21.331878][ T8] bridge0: port 2(bridge_slave_1) entered disabled state [ 21.339672][ T8] bridge0: port 1(bridge_slave_0) entered disabled state [ 21.347120][ T8] bridge0: port 2(bridge_slave_1) entered disabled state [ 21.355867][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 21.363700][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 21.396264][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 21.405089][ T8] bridge0: port 1(bridge_slave_0) entered blocking state [ 21.412676][ T8] bridge0: port 1(bridge_slave_0) entered forwarding state [ 21.420728][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 21.429275][ T8] bridge0: port 2(bridge_slave_1) entered blocking state [ 21.436537][ T8] bridge0: port 2(bridge_slave_1) entered forwarding state [ 21.460513][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 21.468926][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 21.477412][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 21.485695][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 21.495066][ T8] bridge0: port 1(bridge_slave_0) entered blocking state [ 21.502276][ T8] bridge0: port 1(bridge_slave_0) entered forwarding state [ 21.510134][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 21.518764][ T8] bridge0: port 2(bridge_slave_1) entered blocking state [ 21.527250][ T8] bridge0: port 2(bridge_slave_1) entered forwarding state [ 21.550285][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 21.563947][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 21.576414][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 21.584811][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 21.593358][ T8] bridge0: port 1(bridge_slave_0) entered blocking state [ 21.600667][ T8] bridge0: port 1(bridge_slave_0) entered forwarding state [ 21.616675][ T284] device veth0_vlan entered promiscuous mode [ 21.631639][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 21.640727][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 21.648936][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 21.656868][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 21.666140][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 21.675073][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 21.683365][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 21.691784][ T8] bridge0: port 1(bridge_slave_0) entered blocking state [ 21.699298][ T8] bridge0: port 1(bridge_slave_0) entered forwarding state [ 21.707231][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 21.716119][ T8] bridge0: port 2(bridge_slave_1) entered blocking state [ 21.724538][ T8] bridge0: port 2(bridge_slave_1) entered forwarding state [ 21.732831][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 21.741597][ T8] bridge0: port 1(bridge_slave_0) entered blocking state [ 21.748705][ T8] bridge0: port 1(bridge_slave_0) entered forwarding state [ 21.756392][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 21.764656][ T8] bridge0: port 2(bridge_slave_1) entered blocking state [ 21.771924][ T8] bridge0: port 2(bridge_slave_1) entered forwarding state [ 21.779610][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 21.788226][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 21.796839][ T8] bridge0: port 2(bridge_slave_1) entered blocking state [ 21.804866][ T8] bridge0: port 2(bridge_slave_1) entered forwarding state [ 21.823966][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 21.832797][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 21.841868][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 21.850398][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 21.858895][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 21.867460][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 21.876028][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 21.886671][ T284] device veth1_macvtap entered promiscuous mode [ 21.903857][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 21.912300][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 21.920383][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 21.929560][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 21.938683][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 21.947477][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 21.960906][ T283] device veth0_vlan entered promiscuous mode [ 21.973396][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 21.982015][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 21.991049][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 21.999337][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 22.008105][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 22.016492][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 22.024877][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 22.033416][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 22.042273][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 22.050659][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 22.058630][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 22.066895][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 22.076214][ T286] device veth0_vlan entered promiscuous mode [ 22.098614][ T286] device veth1_macvtap entered promiscuous mode [ 22.106065][ T284] request_module fs-gadgetfs succeeded, but still no fs? [ 22.106635][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 22.122803][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 22.131150][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 22.139770][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 22.148688][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 22.157119][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 22.165535][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 22.183115][ T285] device veth0_vlan entered promiscuous mode [ 22.198525][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 22.214693][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 22.223371][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 22.231005][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 22.238858][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 22.247637][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 22.256167][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 22.264792][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 22.273578][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 22.282130][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 22.296878][ T287] device veth0_vlan entered promiscuous mode [ 22.305400][ T283] device veth1_macvtap entered promiscuous mode [ 22.318098][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 22.327085][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 22.336036][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 22.345963][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 22.354357][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 22.362079][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 22.380906][ T287] device veth1_macvtap entered promiscuous mode [ 22.392318][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 22.401062][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 22.409972][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 22.418709][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 22.430347][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 22.461202][ C0] hrtimer: interrupt took 26925 ns [ 22.472339][ T285] device veth1_macvtap entered promiscuous mode [ 22.499210][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 22.507787][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 22.517064][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 22.525925][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 22.535480][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 22.551591][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 22.593782][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 22.611743][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 22.625520][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 22.641721][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 24.777039][ T28] kauditd_printk_skb: 34 callbacks suppressed [ 24.777053][ T28] audit: type=1400 audit(1756973873.295:108): avc: denied { read } for pid=392 comm="syz.1.14" name="ppp" dev="devtmpfs" ino=158 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ppp_device_t tclass=chr_file permissive=1 [ 25.006662][ T28] audit: type=1400 audit(1756973873.355:109): avc: denied { open } for pid=392 comm="syz.1.14" path="/dev/ppp" dev="devtmpfs" ino=158 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ppp_device_t tclass=chr_file permissive=1 [ 25.036784][ T28] audit: type=1400 audit(1756973873.365:110): avc: denied { ioctl } for pid=392 comm="syz.1.14" path="/dev/ppp" dev="devtmpfs" ino=158 ioctlcmd=0x743e scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ppp_device_t tclass=chr_file permissive=1 [ 25.273384][ T400] device veth1_macvtap left promiscuous mode [ 25.408743][ T403] device veth1_macvtap entered promiscuous mode [ 25.503162][ T403] device macsec0 entered promiscuous mode [ 25.567022][ T346] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 25.855456][ T28] audit: type=1400 audit(1756973874.375:111): avc: denied { create } for pid=412 comm="syz.1.20" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1 [ 27.343614][ T433] device veth1_macvtap left promiscuous mode [ 29.580134][ T481] device veth1_macvtap left promiscuous mode [ 29.704511][ T481] device macsec0 left promiscuous mode [ 34.864394][ T532] device veth1_macvtap left promiscuous mode [ 35.038758][ T537] device veth1_macvtap entered promiscuous mode [ 35.047322][ T537] device macsec0 entered promiscuous mode [ 37.082772][ T561] Driver unsupported XDP return value 0 on prog (id 50) dev N/A, expect packet loss! [ 38.797188][ T28] audit: type=1400 audit(1756973887.315:112): avc: denied { write } for pid=562 comm="syz.2.58" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 38.968948][ T581] device veth1_macvtap left promiscuous mode [ 39.109123][ T586] device veth1_macvtap entered promiscuous mode [ 39.130962][ T586] device macsec0 entered promiscuous mode [ 39.259429][ T28] audit: type=1400 audit(1756973887.775:113): avc: denied { create } for pid=590 comm="syz.4.64" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 39.397378][ T28] audit: type=1400 audit(1756973887.915:114): avc: denied { cpu } for pid=593 comm="syz.3.65" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=1 [ 39.819499][ T28] audit: type=1400 audit(1756973888.335:115): avc: denied { read } for pid=606 comm="syz.1.68" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 39.877975][ T604] device veth0_vlan left promiscuous mode [ 39.960532][ T604] device veth0_vlan entered promiscuous mode [ 41.117633][ T620] device veth1_macvtap entered promiscuous mode [ 41.156022][ T620] device macsec0 entered promiscuous mode [ 41.327325][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 41.416898][ T626] device macsec0 entered promiscuous mode [ 41.727628][ T621] device veth1_macvtap left promiscuous mode [ 41.825074][ T621] device macsec0 left promiscuous mode [ 42.086283][ T634] device veth1_macvtap left promiscuous mode [ 42.098457][ T634] device macsec0 left promiscuous mode [ 42.847574][ T646] device veth1_macvtap left promiscuous mode [ 42.861580][ T646] device macsec0 left promiscuous mode [ 45.028975][ T686] syz.2.93 uses obsolete (PF_INET,SOCK_PACKET) [ 45.133542][ T28] audit: type=1400 audit(1756973893.655:116): avc: denied { create } for pid=681 comm="syz.2.93" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 48.797435][ T786] device syzkaller0 entered promiscuous mode [ 54.925536][ T846] device veth1_macvtap entered promiscuous mode [ 54.966015][ T846] device macsec0 entered promiscuous mode [ 55.080292][ T346] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 55.741682][ T869] device veth1_macvtap left promiscuous mode [ 55.786992][ T869] device macsec0 left promiscuous mode [ 56.795160][ T872] device veth1_macvtap entered promiscuous mode [ 56.828555][ T872] device macsec0 entered promiscuous mode [ 57.085663][ T888] device veth1_macvtap entered promiscuous mode [ 57.134906][ T888] device macsec0 entered promiscuous mode [ 57.200988][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 58.935062][ T935] device veth1_macvtap left promiscuous mode [ 58.982024][ T935] device macsec0 left promiscuous mode [ 59.397450][ T949] device veth1_macvtap left promiscuous mode [ 59.405169][ T949] device macsec0 left promiscuous mode [ 60.055114][ T953] device syzkaller0 entered promiscuous mode [ 89.388275][ T1252] device veth0_vlan left promiscuous mode [ 89.581218][ T1252] device veth0_vlan entered promiscuous mode [ 89.778089][ T334] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 89.853328][ T334] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 89.935585][ T334] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 125.824458][ T1643] device veth0_vlan left promiscuous mode [ 125.891140][ T1643] device veth0_vlan entered promiscuous mode [ 126.004136][ T343] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 126.022363][ T343] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 126.093422][ T343] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 126.227341][ T1662] FAULT_INJECTION: forcing a failure. [ 126.227341][ T1662] name failslab, interval 1, probability 0, space 0, times 1 [ 126.240044][ T1662] CPU: 0 PID: 1662 Comm: syz.1.356 Not tainted syzkaller #0 [ 126.247359][ T1662] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 126.257425][ T1662] Call Trace: [ 126.260703][ T1662] [ 126.263629][ T1662] __dump_stack+0x21/0x24 [ 126.268009][ T1662] dump_stack_lvl+0xee/0x150 [ 126.272605][ T1662] ? __cfi_dump_stack_lvl+0x8/0x8 [ 126.277644][ T1662] ? kasan_set_track+0x60/0x70 [ 126.282404][ T1662] ? kasan_save_alloc_info+0x25/0x30 [ 126.287692][ T1662] ? __kasan_slab_alloc+0x72/0x80 [ 126.292719][ T1662] ? slab_post_alloc_hook+0x4f/0x2d0 [ 126.298001][ T1662] ? kmem_cache_alloc+0x16e/0x330 [ 126.303032][ T1662] dump_stack+0x15/0x24 [ 126.307192][ T1662] should_fail_ex+0x3d4/0x520 [ 126.311870][ T1662] __should_failslab+0xac/0xf0 [ 126.316636][ T1662] ? ref_tracker_alloc+0x139/0x430 [ 126.321740][ T1662] should_failslab+0x9/0x20 [ 126.326237][ T1662] __kmem_cache_alloc_node+0x3d/0x2c0 [ 126.331606][ T1662] ? ref_tracker_alloc+0x139/0x430 [ 126.336711][ T1662] kmalloc_trace+0x29/0xb0 [ 126.341138][ T1662] ref_tracker_alloc+0x139/0x430 [ 126.346087][ T1662] ? __cfi_ref_tracker_alloc+0x10/0x10 [ 126.351551][ T1662] ? slab_post_alloc_hook+0x6d/0x2d0 [ 126.356849][ T1662] ? __slab_alloc+0x6b/0xa0 [ 126.361361][ T1662] dst_init+0xc4/0x3d0 [ 126.365437][ T1662] ? __cfi_ip6_dst_gc+0x10/0x10 [ 126.370285][ T1662] dst_alloc+0x191/0x1e0 [ 126.374531][ T1662] ip6_pol_route+0x9ae/0x1110 [ 126.379212][ T1662] ? ip6_pol_route+0x477/0x1110 [ 126.384063][ T1662] ? __cfi_ip6_pol_route+0x10/0x10 [ 126.389176][ T1662] ? prep_new_page+0x3b/0x110 [ 126.393893][ T1662] ? get_page_from_freelist+0x2c7b/0x2cf0 [ 126.399620][ T1662] ip6_pol_route_input+0x56/0x80 [ 126.404569][ T1662] fib6_rule_lookup+0x1d7/0x580 [ 126.409435][ T1662] ? __cfi_ip6_pol_route_input+0x10/0x10 [ 126.415077][ T1662] ? __cfi_fib6_rule_lookup+0x10/0x10 [ 126.420445][ T1662] ? ip6t_do_table+0x1328/0x14e0 [ 126.425387][ T1662] ip6_route_input+0x58c/0x8c0 [ 126.430153][ T1662] ? __cfi_ip6_route_input+0x10/0x10 [ 126.435466][ T1662] ? __cfi_ip6t_do_table+0x10/0x10 [ 126.440696][ T1662] ? __cfi_ip6table_mangle_hook+0x10/0x10 [ 126.446436][ T1662] ip6_rcv_finish+0x156/0x370 [ 126.451130][ T1662] ipv6_rcv+0xe9/0x210 [ 126.455217][ T1662] ? __cfi_ipv6_rcv+0x10/0x10 [ 126.459920][ T1662] ? __cfi_ip6_rcv_finish+0x10/0x10 [ 126.465166][ T1662] ? _copy_from_iter+0x1b1/0xfd0 [ 126.470161][ T1662] ? __cfi_ipv6_rcv+0x10/0x10 [ 126.474860][ T1662] __netif_receive_skb+0xd7/0x2a0 [ 126.479895][ T1662] ? tun_rx_batched+0x158/0x770 [ 126.484761][ T1662] netif_receive_skb+0x98/0x3d0 [ 126.489614][ T1662] ? __cfi_netif_receive_skb+0x10/0x10 [ 126.495074][ T1662] ? __cfi__copy_from_iter+0x10/0x10 [ 126.500364][ T1662] ? tun_rx_batched+0x158/0x770 [ 126.505223][ T1662] tun_rx_batched+0x1b6/0x770 [ 126.509904][ T1662] ? pskb_may_pull+0x100/0x100 [ 126.514664][ T1662] ? stack_trace_save+0x98/0xe0 [ 126.519516][ T1662] ? tun_get_user+0x1f21/0x3320 [ 126.524378][ T1662] tun_get_user+0x2494/0x3320 [ 126.529068][ T1662] ? kstrtoull+0x137/0x1d0 [ 126.533497][ T1662] ? tun_do_read+0x1c20/0x1c20 [ 126.538271][ T1662] ? __kasan_check_write+0x14/0x20 [ 126.543397][ T1662] ? ref_tracker_alloc+0x30f/0x430 [ 126.548520][ T1662] ? __cfi_ref_tracker_alloc+0x10/0x10 [ 126.553988][ T1662] ? avc_policy_seqno+0x1b/0x70 [ 126.558855][ T1662] ? selinux_file_permission+0x2a5/0x510 [ 126.564491][ T1662] tun_chr_write_iter+0x1fb/0x300 [ 126.569531][ T1662] vfs_write+0x5db/0xca0 [ 126.573824][ T1662] ? slab_free_freelist_hook+0xc2/0x190 [ 126.579407][ T1662] ? __cfi_vfs_write+0x10/0x10 [ 126.584180][ T1662] ? __fget_files+0x2d5/0x330 [ 126.588870][ T1662] ? __fdget_pos+0x1f2/0x380 [ 126.593518][ T1662] ? ksys_write+0x71/0x240 [ 126.597958][ T1662] ksys_write+0x140/0x240 [ 126.602356][ T1662] ? __cfi_ksys_write+0x10/0x10 [ 126.607235][ T1662] ? debug_smp_processor_id+0x17/0x20 [ 126.612621][ T1662] __x64_sys_write+0x7b/0x90 [ 126.617230][ T1662] x64_sys_call+0x27b/0x9a0 [ 126.621855][ T1662] do_syscall_64+0x4c/0xa0 [ 126.626278][ T1662] ? clear_bhb_loop+0x30/0x80 [ 126.630973][ T1662] ? clear_bhb_loop+0x30/0x80 [ 126.635676][ T1662] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 126.641584][ T1662] RIP: 0033:0x7f529d18ebe9 [ 126.646025][ T1662] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 126.665657][ T1662] RSP: 002b:00007f529e0de038 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 126.674225][ T1662] RAX: ffffffffffffffda RBX: 00007f529d3c5fa0 RCX: 00007f529d18ebe9 [ 126.682191][ T1662] RDX: 000000000000fdef RSI: 0000200000000640 RDI: 00000000000000c8 [ 126.690155][ T1662] RBP: 00007f529e0de090 R08: 0000000000000000 R09: 0000000000000000 [ 126.698219][ T1662] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 126.706200][ T1662] R13: 00007f529d3c6038 R14: 00007f529d3c5fa0 R15: 00007ffea690e2e8 [ 126.714188][ T1662] [ 126.717266][ T1662] memory allocation failure, unreliable refcount tracker. [ 153.918648][ T2057] FAULT_INJECTION: forcing a failure. [ 153.918648][ T2057] name failslab, interval 1, probability 0, space 0, times 0 [ 153.941293][ T2057] CPU: 0 PID: 2057 Comm: syz.0.468 Not tainted syzkaller #0 [ 153.948679][ T2057] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 153.958739][ T2057] Call Trace: [ 153.962024][ T2057] [ 153.964960][ T2057] __dump_stack+0x21/0x24 [ 153.969282][ T2057] dump_stack_lvl+0xee/0x150 [ 153.973868][ T2057] ? __cfi_dump_stack_lvl+0x8/0x8 [ 153.978999][ T2057] ? kasan_save_alloc_info+0x25/0x30 [ 153.984288][ T2057] ? kmalloc_trace+0x40/0xb0 [ 153.988895][ T2057] ? alloc_perf_context+0x59/0x2e0 [ 153.994106][ T2057] ? find_get_context+0x34c/0x9e0 [ 153.999211][ T2057] ? __x64_sys_perf_event_open+0xbf/0xd0 [ 154.004829][ T2057] dump_stack+0x15/0x24 [ 154.008979][ T2057] should_fail_ex+0x3d4/0x520 [ 154.013655][ T2057] __should_failslab+0xac/0xf0 [ 154.018406][ T2057] should_failslab+0x9/0x20 [ 154.022908][ T2057] slab_pre_alloc_hook+0x30/0x1e0 [ 154.027945][ T2057] kmem_cache_alloc_lru+0x49/0x280 [ 154.033040][ T2057] ? __d_alloc+0x34/0x6c0 [ 154.037371][ T2057] __d_alloc+0x34/0x6c0 [ 154.041507][ T2057] d_alloc_pseudo+0x1d/0x70 [ 154.046005][ T2057] alloc_file_pseudo+0xc8/0x1f0 [ 154.050851][ T2057] ? __cfi_alloc_file_pseudo+0x10/0x10 [ 154.056312][ T2057] ? alloc_perf_context+0x222/0x2e0 [ 154.061516][ T2057] anon_inode_getfile+0xa6/0x180 [ 154.066545][ T2057] __se_sys_perf_event_open+0xbd2/0x1b80 [ 154.072264][ T2057] ? __x64_sys_perf_event_open+0xd0/0xd0 [ 154.078317][ T2057] ? __cfi_ksys_write+0x10/0x10 [ 154.083178][ T2057] __x64_sys_perf_event_open+0xbf/0xd0 [ 154.088639][ T2057] x64_sys_call+0x385/0x9a0 [ 154.093134][ T2057] do_syscall_64+0x4c/0xa0 [ 154.097533][ T2057] ? clear_bhb_loop+0x30/0x80 [ 154.102196][ T2057] ? clear_bhb_loop+0x30/0x80 [ 154.106861][ T2057] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 154.112840][ T2057] RIP: 0033:0x7f9492d8ebe9 [ 154.117289][ T2057] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 154.136979][ T2057] RSP: 002b:00007f9493cf9038 EFLAGS: 00000246 ORIG_RAX: 000000000000012a [ 154.145474][ T2057] RAX: ffffffffffffffda RBX: 00007f9492fc5fa0 RCX: 00007f9492d8ebe9 [ 154.153433][ T2057] RDX: ffffffffffffffff RSI: 0000000000000000 RDI: 00002000000012c0 [ 154.161485][ T2057] RBP: 00007f9493cf9090 R08: 0000000000000000 R09: 0000000000000000 [ 154.169436][ T2057] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000001 [ 154.177398][ T2057] R13: 00007f9492fc6038 R14: 00007f9492fc5fa0 R15: 00007ffd806e6ee8 [ 154.185379][ T2057] [ 157.852193][ T2117] FAULT_INJECTION: forcing a failure. [ 157.852193][ T2117] name failslab, interval 1, probability 0, space 0, times 0 [ 157.905647][ T2117] CPU: 1 PID: 2117 Comm: syz.3.488 Not tainted syzkaller #0 [ 157.913342][ T2117] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 157.923690][ T2117] Call Trace: [ 157.927063][ T2117] [ 157.929998][ T2117] __dump_stack+0x21/0x24 [ 157.934389][ T2117] dump_stack_lvl+0xee/0x150 [ 157.939274][ T2117] ? __cfi_dump_stack_lvl+0x8/0x8 [ 157.944508][ T2117] ? ____kasan_slab_free+0x13d/0x180 [ 157.949812][ T2117] dump_stack+0x15/0x24 [ 157.954847][ T2117] should_fail_ex+0x3d4/0x520 [ 157.959933][ T2117] __should_failslab+0xac/0xf0 [ 157.964856][ T2117] ? tun_device_event+0x15d/0xf30 [ 157.970256][ T2117] should_failslab+0x9/0x20 [ 157.974841][ T2117] __kmem_cache_alloc_node+0x3d/0x2c0 [ 157.980233][ T2117] ? rwsem_read_trylock+0x29a/0x620 [ 157.985537][ T2117] ? consume_skb+0xc1/0x1f0 [ 157.990103][ T2117] ? tun_device_event+0x15d/0xf30 [ 157.995313][ T2117] __kmalloc+0xa1/0x1e0 [ 157.999612][ T2117] ? _raw_spin_lock_irqsave+0xb0/0x110 [ 158.005176][ T2117] tun_device_event+0x15d/0xf30 [ 158.010048][ T2117] ? __kasan_check_read+0x11/0x20 [ 158.015085][ T2117] ? macsec_notify+0xff/0x490 [ 158.019870][ T2117] ? inetdev_event+0x4fe/0x10e0 [ 158.024735][ T2117] ? __cfi_macsec_notify+0x10/0x10 [ 158.029954][ T2117] ? sel_netif_netdev_notifier_handler+0x1a1/0x300 [ 158.036478][ T2117] raw_notifier_call_chain+0xa1/0x110 [ 158.041866][ T2117] dev_change_tx_queue_len+0x1af/0x330 [ 158.047608][ T2117] ? __cfi_dev_change_tx_queue_len+0x10/0x10 [ 158.053782][ T2117] dev_ifsioc+0x26e/0xed0 [ 158.058414][ T2117] ? dev_ioctl+0xd10/0xd10 [ 158.062957][ T2117] ? __kasan_check_write+0x14/0x20 [ 158.068132][ T2117] ? mutex_lock+0x8d/0x1a0 [ 158.072648][ T2117] ? __cfi_mutex_lock+0x10/0x10 [ 158.077644][ T2117] ? dev_get_by_name_rcu+0xe5/0x130 [ 158.082850][ T2117] dev_ioctl+0x556/0xd10 [ 158.087130][ T2117] sock_do_ioctl+0x23f/0x310 [ 158.091736][ T2117] ? sock_show_fdinfo+0xb0/0xb0 [ 158.096690][ T2117] ? selinux_file_ioctl+0x377/0x480 [ 158.101903][ T2117] sock_ioctl+0x4d8/0x6e0 [ 158.106421][ T2117] ? __cfi_sock_ioctl+0x10/0x10 [ 158.111371][ T2117] ? __fget_files+0x2d5/0x330 [ 158.116095][ T2117] ? security_file_ioctl+0x95/0xc0 [ 158.121262][ T2117] ? __cfi_sock_ioctl+0x10/0x10 [ 158.126197][ T2117] __se_sys_ioctl+0x12f/0x1b0 [ 158.131055][ T2117] __x64_sys_ioctl+0x7b/0x90 [ 158.135731][ T2117] x64_sys_call+0x58b/0x9a0 [ 158.140422][ T2117] do_syscall_64+0x4c/0xa0 [ 158.145308][ T2117] ? clear_bhb_loop+0x30/0x80 [ 158.150295][ T2117] ? clear_bhb_loop+0x30/0x80 [ 158.155018][ T2117] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 158.160925][ T2117] RIP: 0033:0x7f2223f8ebe9 [ 158.165431][ T2117] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 158.185305][ T2117] RSP: 002b:00007f2224da0038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 158.193837][ T2117] RAX: ffffffffffffffda RBX: 00007f22241c5fa0 RCX: 00007f2223f8ebe9 [ 158.202400][ T2117] RDX: 0000200000002280 RSI: 0000000000008943 RDI: 0000000000000007 [ 158.210465][ T2117] RBP: 00007f2224da0090 R08: 0000000000000000 R09: 0000000000000000 [ 158.218630][ T2117] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 158.226706][ T2117] R13: 00007f22241c6038 R14: 00007f22241c5fa0 R15: 00007ffc199694d8 [ 158.235287][ T2117] [ 158.305618][ T2117] syzkaller0: refused to change device tx_queue_len [ 161.513082][ T28] audit: type=1400 audit(1756974010.035:117): avc: denied { create } for pid=2146 comm="syz.0.495" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=appletalk_socket permissive=1 [ 161.790368][ T2174] device pim6reg1 entered promiscuous mode [ 163.603214][ T2199] device pim6reg1 entered promiscuous mode [ 164.009638][ T2207] device syzkaller0 entered promiscuous mode [ 166.317478][ T2237] device pim6reg1 entered promiscuous mode [ 167.895782][ T2265] bond_slave_1: mtu greater than device maximum [ 168.103494][ T28] audit: type=1400 audit(1756974016.625:118): avc: denied { create } for pid=2266 comm="syz.2.531" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=ax25_socket permissive=1 [ 168.900772][ T2298] FAULT_INJECTION: forcing a failure. [ 168.900772][ T2298] name failslab, interval 1, probability 0, space 0, times 0 [ 169.021314][ T2298] CPU: 1 PID: 2298 Comm: syz.0.542 Not tainted syzkaller #0 [ 169.028647][ T2298] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 169.038693][ T2298] Call Trace: [ 169.041969][ T2298] [ 169.044899][ T2298] __dump_stack+0x21/0x24 [ 169.049223][ T2298] dump_stack_lvl+0xee/0x150 [ 169.053810][ T2298] ? __cfi_dump_stack_lvl+0x8/0x8 [ 169.058861][ T2298] ? avc_has_perm+0x158/0x240 [ 169.063554][ T2298] dump_stack+0x15/0x24 [ 169.067703][ T2298] should_fail_ex+0x3d4/0x520 [ 169.072366][ T2298] __should_failslab+0xac/0xf0 [ 169.077113][ T2298] should_failslab+0x9/0x20 [ 169.081604][ T2298] slab_pre_alloc_hook+0x30/0x1e0 [ 169.086612][ T2298] kmem_cache_alloc_lru+0x49/0x280 [ 169.091707][ T2298] ? sock_alloc_inode+0x28/0xc0 [ 169.096538][ T2298] sock_alloc_inode+0x28/0xc0 [ 169.101198][ T2298] ? __cfi_sock_alloc_inode+0x10/0x10 [ 169.106555][ T2298] new_inode_pseudo+0x70/0x1f0 [ 169.111311][ T2298] __sock_create+0x12c/0x7c0 [ 169.115905][ T2298] __sys_socketpair+0x218/0x5b0 [ 169.120752][ T2298] __x64_sys_socketpair+0x9b/0xb0 [ 169.125795][ T2298] x64_sys_call+0x6e/0x9a0 [ 169.130199][ T2298] do_syscall_64+0x4c/0xa0 [ 169.134595][ T2298] ? clear_bhb_loop+0x30/0x80 [ 169.139264][ T2298] ? clear_bhb_loop+0x30/0x80 [ 169.143937][ T2298] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 169.149811][ T2298] RIP: 0033:0x7f9492d8ebe9 [ 169.154208][ T2298] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 169.173797][ T2298] RSP: 002b:00007f9493cf9038 EFLAGS: 00000246 ORIG_RAX: 0000000000000035 [ 169.182294][ T2298] RAX: ffffffffffffffda RBX: 00007f9492fc5fa0 RCX: 00007f9492d8ebe9 [ 169.190445][ T2298] RDX: 0000000000000000 RSI: 0000000000000001 RDI: 000000000000000a [ 169.198496][ T2298] RBP: 00007f9493cf9090 R08: 0000000000000000 R09: 0000000000000000 [ 169.206715][ T2298] R10: 0000200000000000 R11: 0000000000000246 R12: 0000000000000001 [ 169.214671][ T2298] R13: 00007f9492fc6038 R14: 00007f9492fc5fa0 R15: 00007ffd806e6ee8 [ 169.222659][ T2298] [ 169.284456][ T2298] socket: no more sockets [ 170.079907][ T2322] FAULT_INJECTION: forcing a failure. [ 170.079907][ T2322] name failslab, interval 1, probability 0, space 0, times 0 [ 170.189042][ T2322] CPU: 1 PID: 2322 Comm: syz.1.547 Not tainted syzkaller #0 [ 170.196370][ T2322] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 170.206598][ T2322] Call Trace: [ 170.209977][ T2322] [ 170.212916][ T2322] __dump_stack+0x21/0x24 [ 170.217426][ T2322] dump_stack_lvl+0xee/0x150 [ 170.222023][ T2322] ? __cfi_dump_stack_lvl+0x8/0x8 [ 170.227068][ T2322] dump_stack+0x15/0x24 [ 170.231221][ T2322] should_fail_ex+0x3d4/0x520 [ 170.235914][ T2322] __should_failslab+0xac/0xf0 [ 170.240700][ T2322] should_failslab+0x9/0x20 [ 170.245213][ T2322] kmem_cache_alloc_node+0x42/0x340 [ 170.250592][ T2322] ? __alloc_skb+0x236/0x4b0 [ 170.255190][ T2322] ? __alloc_skb+0xea/0x4b0 [ 170.259693][ T2322] ? __tipc_sendmsg+0x19dd/0x2680 [ 170.264799][ T2322] ? tipc_sendmsg+0x55/0x70 [ 170.269387][ T2322] __alloc_skb+0xea/0x4b0 [ 170.273727][ T2322] __pskb_copy_fclone+0xa7/0xeb0 [ 170.278778][ T2322] tipc_msg_reassemble+0x12e/0x440 [ 170.283900][ T2322] tipc_mcast_xmit+0x1c6/0x1720 [ 170.288750][ T2322] ? tipc_msg_build+0xd1/0xfd0 [ 170.293798][ T2322] ? __cfi_tipc_mcast_xmit+0x10/0x10 [ 170.299317][ T2322] ? __build_skb_around+0x24f/0x470 [ 170.304519][ T2322] ? __kasan_check_write+0x14/0x20 [ 170.310500][ T2322] ? __check_object_size+0x90/0x600 [ 170.315708][ T2322] ? memcpy+0x56/0x70 [ 170.319794][ T2322] ? tipc_msg_build+0x45e/0xfd0 [ 170.324733][ T2322] ? tipc_nametbl_lookup_mcast_nodes+0x3fa/0x960 [ 170.331060][ T2322] __tipc_sendmsg+0x1d81/0x2680 [ 170.335929][ T2322] ? rht_lock+0x120/0x120 [ 170.340279][ T2322] ? __cfi_woken_wake_function+0x10/0x10 [ 170.346017][ T2322] ? avc_has_perm+0x158/0x240 [ 170.350704][ T2322] ? __kasan_check_write+0x14/0x20 [ 170.355824][ T2322] ? _raw_spin_lock_bh+0x8e/0xe0 [ 170.360775][ T2322] ? __cfi__raw_spin_lock_bh+0x10/0x10 [ 170.366226][ T2322] ? kernel_text_address+0xa0/0xd0 [ 170.371342][ T2322] ? __local_bh_enable_ip+0x58/0x80 [ 170.376547][ T2322] ? lock_sock_nested+0x1ec/0x280 [ 170.381580][ T2322] ? __cfi_lock_sock_nested+0x10/0x10 [ 170.386957][ T2322] ? stack_trace_save+0x98/0xe0 [ 170.391818][ T2322] ? __stack_depot_save+0x36/0x480 [ 170.396931][ T2322] tipc_sendmsg+0x55/0x70 [ 170.401359][ T2322] ? __cfi_tipc_sendmsg+0x10/0x10 [ 170.406495][ T2322] ____sys_sendmsg+0x5a9/0x990 [ 170.411277][ T2322] ? __sys_sendmsg_sock+0x40/0x40 [ 170.416316][ T2322] ? import_iovec+0x7c/0xb0 [ 170.420880][ T2322] ___sys_sendmsg+0x21c/0x290 [ 170.425576][ T2322] ? __sys_sendmsg+0x270/0x270 [ 170.430366][ T2322] ? __kasan_check_write+0x14/0x20 [ 170.435487][ T2322] ? proc_fail_nth_write+0x17a/0x1f0 [ 170.440777][ T2322] ? vfs_write+0x9d6/0xca0 [ 170.445196][ T2322] ? __fdget+0x19c/0x220 [ 170.449427][ T2322] __x64_sys_sendmsg+0x1f0/0x2c0 [ 170.454383][ T2322] ? __cfi___x64_sys_sendmsg+0x10/0x10 [ 170.459850][ T2322] ? fpregs_assert_state_consistent+0xb1/0xe0 [ 170.465930][ T2322] x64_sys_call+0x171/0x9a0 [ 170.470437][ T2322] do_syscall_64+0x4c/0xa0 [ 170.474872][ T2322] ? clear_bhb_loop+0x30/0x80 [ 170.479556][ T2322] ? clear_bhb_loop+0x30/0x80 [ 170.484229][ T2322] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 170.490118][ T2322] RIP: 0033:0x7f529d18ebe9 [ 170.494523][ T2322] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 170.514123][ T2322] RSP: 002b:00007f529e0de038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 170.522538][ T2322] RAX: ffffffffffffffda RBX: 00007f529d3c5fa0 RCX: 00007f529d18ebe9 [ 170.530506][ T2322] RDX: 0000000000000000 RSI: 0000200000004440 RDI: 0000000000000009 [ 170.538493][ T2322] RBP: 00007f529e0de090 R08: 0000000000000000 R09: 0000000000000000 [ 170.546469][ T2322] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 170.554564][ T2322] R13: 00007f529d3c6038 R14: 00007f529d3c5fa0 R15: 00007ffea690e2e8 [ 170.562632][ T2322] [ 170.676103][ T2328] bridge0: port 1(bridge_slave_0) entered disabled state [ 171.041523][ T2325] O3ãc¤±: renamed from bridge_slave_0 [ 171.257542][ T2325] bond_slave_1: mtu greater than device maximum [ 171.875237][ T2347] bridge0: port 2(bridge_slave_1) entered disabled state [ 176.758075][ T2408] FAULT_INJECTION: forcing a failure. [ 176.758075][ T2408] name fail_usercopy, interval 1, probability 0, space 0, times 1 [ 176.781380][ T2408] CPU: 1 PID: 2408 Comm: syz.0.572 Not tainted syzkaller #0 [ 176.788698][ T2408] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 176.798750][ T2408] Call Trace: [ 176.802023][ T2408] [ 176.804939][ T2408] __dump_stack+0x21/0x24 [ 176.809249][ T2408] dump_stack_lvl+0xee/0x150 [ 176.813823][ T2408] ? __cfi_dump_stack_lvl+0x8/0x8 [ 176.818889][ T2408] dump_stack+0x15/0x24 [ 176.823025][ T2408] should_fail_ex+0x3d4/0x520 [ 176.827687][ T2408] should_fail+0xb/0x10 [ 176.831822][ T2408] should_fail_usercopy+0x1a/0x20 [ 176.836826][ T2408] _copy_to_user+0x1e/0x90 [ 176.841221][ T2408] map_lookup_and_delete_elem+0x63e/0x770 [ 176.847070][ T2408] __sys_bpf+0x516/0x780 [ 176.851292][ T2408] ? bpf_link_show_fdinfo+0x320/0x320 [ 176.856739][ T2408] ? __cfi_ksys_write+0x10/0x10 [ 176.861680][ T2408] ? do_user_addr_fault+0x9ac/0x1050 [ 176.867069][ T2408] ? debug_smp_processor_id+0x17/0x20 [ 176.872494][ T2408] __x64_sys_bpf+0x7c/0x90 [ 176.876943][ T2408] x64_sys_call+0x488/0x9a0 [ 176.881461][ T2408] do_syscall_64+0x4c/0xa0 [ 176.885855][ T2408] ? clear_bhb_loop+0x30/0x80 [ 176.890513][ T2408] ? clear_bhb_loop+0x30/0x80 [ 176.895185][ T2408] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 176.901058][ T2408] RIP: 0033:0x7f9492d8ebe9 [ 176.905451][ T2408] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 176.925040][ T2408] RSP: 002b:00007f9493cd8038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 176.933452][ T2408] RAX: ffffffffffffffda RBX: 00007f9492fc6090 RCX: 00007f9492d8ebe9 [ 176.941436][ T2408] RDX: 0000000000000020 RSI: 0000200000000580 RDI: 0000000000000015 [ 176.949389][ T2408] RBP: 00007f9493cd8090 R08: 0000000000000000 R09: 0000000000000000 [ 176.957344][ T2408] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 176.965294][ T2408] R13: 00007f9492fc6128 R14: 00007f9492fc6090 R15: 00007ffd806e6ee8 [ 176.973369][ T2408] [ 177.603430][ T2417] FAULT_INJECTION: forcing a failure. [ 177.603430][ T2417] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 177.637192][ T2417] CPU: 0 PID: 2417 Comm: syz.0.575 Not tainted syzkaller #0 [ 177.644515][ T2417] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 177.654570][ T2417] Call Trace: [ 177.657845][ T2417] [ 177.660852][ T2417] __dump_stack+0x21/0x24 [ 177.665166][ T2417] dump_stack_lvl+0xee/0x150 [ 177.669751][ T2417] ? __cfi_dump_stack_lvl+0x8/0x8 [ 177.674759][ T2417] ? has_cap_mac_admin+0x330/0x330 [ 177.679855][ T2417] dump_stack+0x15/0x24 [ 177.683985][ T2417] should_fail_ex+0x3d4/0x520 [ 177.688644][ T2417] should_fail+0xb/0x10 [ 177.692777][ T2417] should_fail_usercopy+0x1a/0x20 [ 177.697797][ T2417] _copy_from_user+0x1e/0xc0 [ 177.702367][ T2417] get_user_ifreq+0x6c/0x180 [ 177.706940][ T2417] sock_ioctl+0x630/0x6e0 [ 177.711258][ T2417] ? __cfi_sock_ioctl+0x10/0x10 [ 177.716310][ T2417] ? security_file_ioctl+0x95/0xc0 [ 177.722038][ T2417] ? __cfi_sock_ioctl+0x10/0x10 [ 177.726920][ T2417] __se_sys_ioctl+0x12f/0x1b0 [ 177.731589][ T2417] __x64_sys_ioctl+0x7b/0x90 [ 177.736170][ T2417] x64_sys_call+0x58b/0x9a0 [ 177.740670][ T2417] do_syscall_64+0x4c/0xa0 [ 177.745088][ T2417] ? clear_bhb_loop+0x30/0x80 [ 177.749762][ T2417] ? clear_bhb_loop+0x30/0x80 [ 177.754423][ T2417] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 177.760304][ T2417] RIP: 0033:0x7f9492d8ebe9 [ 177.764702][ T2417] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 177.784293][ T2417] RSP: 002b:00007f9493cf9038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 177.792704][ T2417] RAX: ffffffffffffffda RBX: 00007f9492fc5fa0 RCX: 00007f9492d8ebe9 [ 177.800675][ T2417] RDX: 0000200000000080 RSI: 00000000000089f2 RDI: 0000000000000005 [ 177.808681][ T2417] RBP: 00007f9493cf9090 R08: 0000000000000000 R09: 0000000000000000 [ 177.816650][ T2417] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 177.824618][ T2417] R13: 00007f9492fc6038 R14: 00007f9492fc5fa0 R15: 00007ffd806e6ee8 [ 177.832583][ T2417] [ 179.493980][ T2437] device bridge_slave_1 left promiscuous mode [ 179.525914][ T2437] bridge0: port 2(bridge_slave_1) entered disabled state [ 179.652482][ T2437] device O3ãc¤± left promiscuous mode [ 179.657971][ T2437] bridge0: port 1(O3ãc¤±) entered disabled state [ 179.992201][ T2455] FAULT_INJECTION: forcing a failure. [ 179.992201][ T2455] name failslab, interval 1, probability 0, space 0, times 0 [ 180.127507][ T2455] CPU: 1 PID: 2455 Comm: syz.4.588 Not tainted syzkaller #0 [ 180.134834][ T2455] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 180.144889][ T2455] Call Trace: [ 180.148165][ T2455] [ 180.151093][ T2455] __dump_stack+0x21/0x24 [ 180.155420][ T2455] dump_stack_lvl+0xee/0x150 [ 180.160036][ T2455] ? __cfi_dump_stack_lvl+0x8/0x8 [ 180.165064][ T2455] ? kasan_set_track+0x60/0x70 [ 180.169831][ T2455] ? kasan_save_alloc_info+0x25/0x30 [ 180.175137][ T2455] dump_stack+0x15/0x24 [ 180.179293][ T2455] should_fail_ex+0x3d4/0x520 [ 180.183974][ T2455] __should_failslab+0xac/0xf0 [ 180.188744][ T2455] should_failslab+0x9/0x20 [ 180.193257][ T2455] kmem_cache_alloc_node+0x42/0x340 [ 180.198469][ T2455] ? __alloc_skb+0xea/0x4b0 [ 180.202980][ T2455] __alloc_skb+0xea/0x4b0 [ 180.207329][ T2455] alloc_skb_with_frags+0xa8/0x620 [ 180.212624][ T2455] sock_alloc_send_pskb+0x853/0x980 [ 180.217832][ T2455] ? __cfi_sock_alloc_send_pskb+0x10/0x10 [ 180.223555][ T2455] ? __kasan_check_write+0x14/0x20 [ 180.228677][ T2455] ? _raw_spin_lock+0x8e/0xe0 [ 180.233367][ T2455] ? __cfi__raw_spin_lock+0x10/0x10 [ 180.238673][ T2455] ? security_socket_getpeersec_dgram+0xbb/0xd0 [ 180.244920][ T2455] unix_dgram_sendmsg+0x592/0x16d0 [ 180.250045][ T2455] ? kernel_text_address+0xa0/0xd0 [ 180.255166][ T2455] ? selinux_socket_sendmsg+0x208/0x2e0 [ 180.260809][ T2455] ? __cfi_selinux_socket_sendmsg+0x10/0x10 [ 180.266705][ T2455] ? __cfi_unix_dgram_sendmsg+0x10/0x10 [ 180.272273][ T2455] ? stack_trace_save+0x98/0xe0 [ 180.277126][ T2455] ? __stack_depot_save+0x36/0x480 [ 180.282236][ T2455] unix_seqpacket_sendmsg+0x118/0x1e0 [ 180.287696][ T2455] ? __cfi_unix_seqpacket_sendmsg+0x10/0x10 [ 180.293591][ T2455] ____sys_sendmsg+0x5a9/0x990 [ 180.298364][ T2455] ? __sys_sendmsg_sock+0x40/0x40 [ 180.303390][ T2455] ? import_iovec+0x7c/0xb0 [ 180.307897][ T2455] ___sys_sendmsg+0x21c/0x290 [ 180.312569][ T2455] ? __sys_sendmsg+0x270/0x270 [ 180.317328][ T2455] ? __cfi_bpf_bprintf_prepare+0x10/0x10 [ 180.322959][ T2455] ? proc_fail_nth_write+0x17a/0x1f0 [ 180.328248][ T2455] ? bpf_trace_printk+0x127/0x250 [ 180.333274][ T2455] ? __fdget+0x19c/0x220 [ 180.337582][ T2455] __x64_sys_sendmsg+0x1f0/0x2c0 [ 180.342528][ T2455] ? __cfi___x64_sys_sendmsg+0x10/0x10 [ 180.347990][ T2455] ? __bpf_trace_sys_enter+0x62/0x70 [ 180.353276][ T2455] ? trace_sys_enter+0x3d/0x50 [ 180.358095][ T2455] x64_sys_call+0x171/0x9a0 [ 180.362604][ T2455] do_syscall_64+0x4c/0xa0 [ 180.367032][ T2455] ? clear_bhb_loop+0x30/0x80 [ 180.371837][ T2455] ? clear_bhb_loop+0x30/0x80 [ 180.376521][ T2455] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 180.382505][ T2455] RIP: 0033:0x7fb20ff8ebe9 [ 180.386924][ T2455] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 180.406531][ T2455] RSP: 002b:00007fb210e11038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 180.414948][ T2455] RAX: ffffffffffffffda RBX: 00007fb2101c5fa0 RCX: 00007fb20ff8ebe9 [ 180.422921][ T2455] RDX: 0000000000000000 RSI: 0000200000000580 RDI: 0000000000000006 [ 180.430891][ T2455] RBP: 00007fb210e11090 R08: 0000000000000000 R09: 0000000000000000 [ 180.438864][ T2455] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 180.446833][ T2455] R13: 00007fb2101c6038 R14: 00007fb2101c5fa0 R15: 00007ffea89cc008 [ 180.454813][ T2455] [ 180.463894][ T28] audit: type=1400 audit(1756974028.985:119): avc: denied { create } for pid=2452 comm="syz.0.587" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=dccp_socket permissive=1 [ 186.176920][ T28] audit: type=1400 audit(1756974034.695:120): avc: denied { write } for pid=2541 comm="syz.2.615" name="ppp" dev="devtmpfs" ino=158 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ppp_device_t tclass=chr_file permissive=1 [ 187.439724][ T28] audit: type=1400 audit(1756974035.955:121): avc: denied { create } for pid=2548 comm="syz.1.617" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 195.514623][ T28] audit: type=1400 audit(1756974044.035:122): avc: denied { relabelfrom } for pid=2667 comm="syz.2.651" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tun_socket permissive=1 [ 195.610768][ T28] audit: type=1400 audit(1756974044.035:123): avc: denied { relabelto } for pid=2667 comm="syz.2.651" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tun_socket permissive=1 [ 198.172559][ T2711] FAULT_INJECTION: forcing a failure. [ 198.172559][ T2711] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 198.291371][ T2711] CPU: 1 PID: 2711 Comm: syz.4.665 Not tainted syzkaller #0 [ 198.298793][ T2711] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 198.308840][ T2711] Call Trace: [ 198.312117][ T2711] [ 198.315054][ T2711] __dump_stack+0x21/0x24 [ 198.319405][ T2711] dump_stack_lvl+0xee/0x150 [ 198.323994][ T2711] ? __cfi_dump_stack_lvl+0x8/0x8 [ 198.329025][ T2711] ? __kmalloc_node+0xb2/0x1e0 [ 198.333807][ T2711] dump_stack+0x15/0x24 [ 198.337963][ T2711] should_fail_ex+0x3d4/0x520 [ 198.342729][ T2711] should_fail+0xb/0x10 [ 198.346895][ T2711] should_fail_usercopy+0x1a/0x20 [ 198.351920][ T2711] _copy_from_user+0x1e/0xc0 [ 198.356514][ T2711] generic_map_update_batch+0x458/0x780 [ 198.362066][ T2711] ? __cfi_generic_map_update_batch+0x10/0x10 [ 198.368135][ T2711] ? __fdget+0x19c/0x220 [ 198.372420][ T2711] ? __cfi_generic_map_update_batch+0x10/0x10 [ 198.378646][ T2711] bpf_map_do_batch+0x48c/0x620 [ 198.383623][ T2711] __sys_bpf+0x624/0x780 [ 198.387877][ T2711] ? bpf_link_show_fdinfo+0x320/0x320 [ 198.393278][ T2711] ? __cfi_ksys_write+0x10/0x10 [ 198.398147][ T2711] ? debug_smp_processor_id+0x17/0x20 [ 198.403627][ T2711] __x64_sys_bpf+0x7c/0x90 [ 198.408048][ T2711] x64_sys_call+0x488/0x9a0 [ 198.412557][ T2711] do_syscall_64+0x4c/0xa0 [ 198.417023][ T2711] ? clear_bhb_loop+0x30/0x80 [ 198.421711][ T2711] ? clear_bhb_loop+0x30/0x80 [ 198.426390][ T2711] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 198.432430][ T2711] RIP: 0033:0x7fb20ff8ebe9 [ 198.436861][ T2711] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 198.456480][ T2711] RSP: 002b:00007fb210e11038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 198.464896][ T2711] RAX: ffffffffffffffda RBX: 00007fb2101c5fa0 RCX: 00007fb20ff8ebe9 [ 198.472872][ T2711] RDX: 0000000000000038 RSI: 0000200000000200 RDI: 000000000000001a [ 198.480849][ T2711] RBP: 00007fb210e11090 R08: 0000000000000000 R09: 0000000000000000 [ 198.488825][ T2711] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 198.496804][ T2711] R13: 00007fb2101c6038 R14: 00007fb2101c5fa0 R15: 00007ffea89cc008 [ 198.504786][ T2711] [ 203.085427][ T2770] device pim6reg1 entered promiscuous mode [ 206.753721][ T28] audit: type=1400 audit(1756974055.265:124): avc: denied { create } for pid=2822 comm="syz.1.699" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_dnrt_socket permissive=1 [ 207.004673][ T28] audit: type=1400 audit(1756974055.465:125): avc: denied { create } for pid=2822 comm="syz.1.699" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 212.113205][ T2895] FAULT_INJECTION: forcing a failure. [ 212.113205][ T2895] name failslab, interval 1, probability 0, space 0, times 0 [ 212.251224][ T2895] CPU: 0 PID: 2895 Comm: syz.2.717 Not tainted syzkaller #0 [ 212.258553][ T2895] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 212.268635][ T2895] Call Trace: [ 212.271911][ T2895] [ 212.274857][ T2895] __dump_stack+0x21/0x24 [ 212.279190][ T2895] dump_stack_lvl+0xee/0x150 [ 212.283794][ T2895] ? __cfi_dump_stack_lvl+0x8/0x8 [ 212.288823][ T2895] ? _raw_spin_unlock_irqrestore+0x5a/0x80 [ 212.294628][ T2895] dump_stack+0x15/0x24 [ 212.298783][ T2895] should_fail_ex+0x3d4/0x520 [ 212.303460][ T2895] __should_failslab+0xac/0xf0 [ 212.308221][ T2895] ? nf_nat_masq_schedule+0x238/0x4e0 [ 212.313595][ T2895] should_failslab+0x9/0x20 [ 212.318532][ T2895] __kmem_cache_alloc_node+0x3d/0x2c0 [ 212.323905][ T2895] ? detach_if_pending+0xf4/0x300 [ 212.328940][ T2895] ? nf_nat_masq_schedule+0x238/0x4e0 [ 212.334322][ T2895] kmalloc_trace+0x29/0xb0 [ 212.338747][ T2895] nf_nat_masq_schedule+0x238/0x4e0 [ 212.343945][ T2895] ? __kasan_check_write+0x14/0x20 [ 212.349084][ T2895] ? __cfi_device_cmp+0x10/0x10 [ 212.353938][ T2895] ? masq_device_event+0xd0/0xd0 [ 212.358877][ T2895] ? nfqnl_rcv_dev_event+0x441/0x470 [ 212.364163][ T2895] ? rtnl_is_locked+0x15/0x20 [ 212.368847][ T2895] masq_device_event+0x9b/0xd0 [ 212.373613][ T2895] raw_notifier_call_chain+0xa1/0x110 [ 212.378988][ T2895] dev_close_many+0x32d/0x4d0 [ 212.383663][ T2895] ? try_to_wake_up+0x613/0x1220 [ 212.388617][ T2895] ? __cfi_dev_close_many+0x10/0x10 [ 212.393820][ T2895] ? __kasan_check_read+0x11/0x20 [ 212.398856][ T2895] unregister_netdevice_many+0x439/0x1820 [ 212.404580][ T2895] ? __cfi_unregister_netdevice_many+0x10/0x10 [ 212.410732][ T2895] ? __queue_delayed_work+0x188/0x200 [ 212.416117][ T2895] ? queue_delayed_work_on+0x101/0x150 [ 212.421574][ T2895] ? linkwatch_fire_event+0x1d2/0x240 [ 212.426951][ T2895] ? __cfi_queue_delayed_work_on+0x10/0x10 [ 212.432765][ T2895] ? exit_to_user_mode_loop+0x9b/0xb0 [ 212.438140][ T2895] ? __kasan_check_read+0x11/0x20 [ 212.443169][ T2895] unregister_netdevice_queue+0x31c/0x360 [ 212.448892][ T2895] ? linkwatch_schedule_work+0x161/0x190 [ 212.454532][ T2895] ? __cfi_unregister_netdevice_queue+0x10/0x10 [ 212.460823][ T2895] ? linkwatch_fire_event+0x1ed/0x240 [ 212.466204][ T2895] __tun_detach+0xca6/0x1460 [ 212.470791][ T2895] tun_chr_close+0x92/0x140 [ 212.475291][ T2895] ? __cfi_tun_chr_close+0x10/0x10 [ 212.480397][ T2895] __fput+0x1fc/0x8f0 [ 212.484373][ T2895] ____fput+0x15/0x20 [ 212.488346][ T2895] task_work_run+0x1db/0x240 [ 212.492930][ T2895] ? __cfi_task_work_run+0x10/0x10 [ 212.498035][ T2895] ? filp_close+0x111/0x160 [ 212.502546][ T2895] exit_to_user_mode_loop+0x9b/0xb0 [ 212.507736][ T2895] exit_to_user_mode_prepare+0x5a/0xa0 [ 212.513187][ T2895] syscall_exit_to_user_mode+0x1a/0x30 [ 212.518642][ T2895] do_syscall_64+0x58/0xa0 [ 212.523166][ T2895] ? clear_bhb_loop+0x30/0x80 [ 212.527968][ T2895] ? clear_bhb_loop+0x30/0x80 [ 212.532657][ T2895] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 212.538551][ T2895] RIP: 0033:0x7f137eb8ebe9 [ 212.542985][ T2895] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 212.562701][ T2895] RSP: 002b:00007f137f960038 EFLAGS: 00000246 ORIG_RAX: 0000000000000003 [ 212.571364][ T2895] RAX: 0000000000000000 RBX: 00007f137edc5fa0 RCX: 00007f137eb8ebe9 [ 212.579319][ T2895] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000003 [ 212.587269][ T2895] RBP: 00007f137f960090 R08: 0000000000000000 R09: 0000000000000000 [ 212.595234][ T2895] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 212.603184][ T2895] R13: 00007f137edc6038 R14: 00007f137edc5fa0 R15: 00007ffe27241368 [ 212.611245][ T2895] [ 213.811917][ T28] audit: type=1400 audit(1756974062.335:126): avc: denied { create } for pid=2905 comm="syz.1.722" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=isdn_socket permissive=1 [ 220.459175][ T3046] syzkaller1: tun_chr_ioctl cmd 1074025677 [ 220.571500][ T3046] syzkaller1: linktype set to 774 [ 223.993215][ T3084] device syzkaller0 entered promiscuous mode [ 226.527564][ T3120] device pim6reg1 entered promiscuous mode [ 227.453406][ T28] audit: type=1400 audit(1756974075.975:127): avc: denied { create } for pid=3142 comm="syz.1.791" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=pppox_socket permissive=1 [ 229.396593][ T3185] FAULT_INJECTION: forcing a failure. [ 229.396593][ T3185] name fail_page_alloc, interval 1, probability 0, space 0, times 1 [ 229.581540][ T3185] CPU: 0 PID: 3185 Comm: syz.0.804 Not tainted syzkaller #0 [ 229.588894][ T3185] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 229.598946][ T3185] Call Trace: [ 229.602223][ T3185] [ 229.605150][ T3185] __dump_stack+0x21/0x24 [ 229.609475][ T3185] dump_stack_lvl+0xee/0x150 [ 229.614076][ T3185] ? __cfi_dump_stack_lvl+0x8/0x8 [ 229.619103][ T3185] dump_stack+0x15/0x24 [ 229.623252][ T3185] should_fail_ex+0x3d4/0x520 [ 229.627932][ T3185] should_fail_alloc_page+0x61/0x90 [ 229.633127][ T3185] prepare_alloc_pages+0x148/0x5f0 [ 229.638235][ T3185] ? __alloc_pages_bulk+0x9c0/0x9c0 [ 229.643432][ T3185] __alloc_pages+0x124/0x450 [ 229.648024][ T3185] ? __cfi___alloc_pages+0x10/0x10 [ 229.653136][ T3185] ? __cfi__raw_spin_lock_irq+0x10/0x10 [ 229.658769][ T3185] ? copy_page_from_iter+0x235/0x2b0 [ 229.664062][ T3185] pipe_write+0x592/0x1950 [ 229.668487][ T3185] ? __cfi_pipe_write+0x10/0x10 [ 229.673336][ T3185] ? selinux_file_permission+0x3ef/0x510 [ 229.678967][ T3185] ? fsnotify_perm+0x67/0x5b0 [ 229.683641][ T3185] ? security_file_permission+0x8a/0xb0 [ 229.689199][ T3185] vfs_write+0x5db/0xca0 [ 229.693542][ T3185] ? slab_free_freelist_hook+0xc2/0x190 [ 229.699096][ T3185] ? __cfi_vfs_write+0x10/0x10 [ 229.703876][ T3185] ? __fget_files+0x2d5/0x330 [ 229.708550][ T3185] ? __fdget_pos+0x1f2/0x380 [ 229.713137][ T3185] ? ksys_write+0x71/0x240 [ 229.717553][ T3185] ksys_write+0x140/0x240 [ 229.721901][ T3185] ? __cfi_ksys_write+0x10/0x10 [ 229.726855][ T3185] ? debug_smp_processor_id+0x17/0x20 [ 229.732283][ T3185] __x64_sys_write+0x7b/0x90 [ 229.736893][ T3185] x64_sys_call+0x27b/0x9a0 [ 229.741403][ T3185] do_syscall_64+0x4c/0xa0 [ 229.745816][ T3185] ? clear_bhb_loop+0x30/0x80 [ 229.750492][ T3185] ? clear_bhb_loop+0x30/0x80 [ 229.755187][ T3185] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 229.761144][ T3185] RIP: 0033:0x7f9492d8ebe9 [ 229.765551][ T3185] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 229.785152][ T3185] RSP: 002b:00007f9493cf9038 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 229.793571][ T3185] RAX: ffffffffffffffda RBX: 00007f9492fc5fa0 RCX: 00007f9492d8ebe9 [ 229.801541][ T3185] RDX: 000000000000fdef RSI: 0000200000000640 RDI: 0000000000000000 [ 229.809507][ T3185] RBP: 00007f9493cf9090 R08: 0000000000000000 R09: 0000000000000000 [ 229.817478][ T3185] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 229.825448][ T3185] R13: 00007f9492fc6038 R14: 00007f9492fc5fa0 R15: 00007ffd806e6ee8 [ 229.833515][ T3185] [ 234.195561][ T3249] device veth1_macvtap entered promiscuous mode [ 234.208608][ T3249] device macsec0 entered promiscuous mode [ 234.281754][ T343] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 235.667607][ T3281] FAULT_INJECTION: forcing a failure. [ 235.667607][ T3281] name failslab, interval 1, probability 0, space 0, times 0 [ 235.738969][ T3281] CPU: 0 PID: 3281 Comm: syz.2.832 Not tainted syzkaller #0 [ 235.746325][ T3281] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 235.756392][ T3281] Call Trace: [ 235.759665][ T3281] [ 235.762602][ T3281] __dump_stack+0x21/0x24 [ 235.766946][ T3281] dump_stack_lvl+0xee/0x150 [ 235.771535][ T3281] ? __cfi_dump_stack_lvl+0x8/0x8 [ 235.776558][ T3281] ? avc_has_perm+0x158/0x240 [ 235.781247][ T3281] dump_stack+0x15/0x24 [ 235.785393][ T3281] should_fail_ex+0x3d4/0x520 [ 235.790071][ T3281] __should_failslab+0xac/0xf0 [ 235.794832][ T3281] should_failslab+0x9/0x20 [ 235.799336][ T3281] slab_pre_alloc_hook+0x30/0x1e0 [ 235.804370][ T3281] kmem_cache_alloc_lru+0x49/0x280 [ 235.809477][ T3281] ? sock_alloc_inode+0x28/0xc0 [ 235.814337][ T3281] sock_alloc_inode+0x28/0xc0 [ 235.819045][ T3281] ? __cfi_sock_alloc_inode+0x10/0x10 [ 235.824411][ T3281] new_inode_pseudo+0x70/0x1f0 [ 235.829172][ T3281] __sock_create+0x12c/0x7c0 [ 235.833788][ T3281] __sys_socketpair+0x218/0x5b0 [ 235.838637][ T3281] __x64_sys_socketpair+0x9b/0xb0 [ 235.843660][ T3281] x64_sys_call+0x6e/0x9a0 [ 235.848071][ T3281] do_syscall_64+0x4c/0xa0 [ 235.852550][ T3281] ? clear_bhb_loop+0x30/0x80 [ 235.857245][ T3281] ? clear_bhb_loop+0x30/0x80 [ 235.861925][ T3281] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 235.867815][ T3281] RIP: 0033:0x7f137eb8ebe9 [ 235.872244][ T3281] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 235.891935][ T3281] RSP: 002b:00007f137f960038 EFLAGS: 00000246 ORIG_RAX: 0000000000000035 [ 235.900357][ T3281] RAX: ffffffffffffffda RBX: 00007f137edc5fa0 RCX: 00007f137eb8ebe9 [ 235.908324][ T3281] RDX: 0000000000000000 RSI: 0000000000000001 RDI: 000000000000000a [ 235.916324][ T3281] RBP: 00007f137f960090 R08: 0000000000000000 R09: 0000000000000000 [ 235.924292][ T3281] R10: 0000200000000000 R11: 0000000000000246 R12: 0000000000000001 [ 235.932262][ T3281] R13: 00007f137edc6038 R14: 00007f137edc5fa0 R15: 00007ffe27241368 [ 235.940252][ T3281] [ 236.083105][ T3281] socket: no more sockets [ 241.922779][ T28] audit: type=1400 audit(1756974090.445:128): avc: denied { create } for pid=3379 comm="syz.4.862" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 292.470243][ T3916] tap0: tun_chr_ioctl cmd 1074025677 [ 292.483307][ T3916] tap0: linktype set to 773 [ 294.595802][ T3991] FAULT_INJECTION: forcing a failure. [ 294.595802][ T3991] name failslab, interval 1, probability 0, space 0, times 0 [ 294.681297][ T3991] CPU: 1 PID: 3991 Comm: syz.1.1035 Not tainted syzkaller #0 [ 294.688716][ T3991] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 294.698775][ T3991] Call Trace: [ 294.702049][ T3991] [ 294.705112][ T3991] __dump_stack+0x21/0x24 [ 294.709441][ T3991] dump_stack_lvl+0xee/0x150 [ 294.714029][ T3991] ? __cfi_dump_stack_lvl+0x8/0x8 [ 294.719051][ T3991] dump_stack+0x15/0x24 [ 294.723287][ T3991] should_fail_ex+0x3d4/0x520 [ 294.727979][ T3991] __should_failslab+0xac/0xf0 [ 294.732739][ T3991] ? __get_vm_area_node+0x12c/0x360 [ 294.737945][ T3991] should_failslab+0x9/0x20 [ 294.742462][ T3991] __kmem_cache_alloc_node+0x3d/0x2c0 [ 294.747842][ T3991] ? __get_vm_area_node+0x12c/0x360 [ 294.753055][ T3991] kmalloc_node_trace+0x26/0xb0 [ 294.757914][ T3991] __get_vm_area_node+0x12c/0x360 [ 294.762950][ T3991] __vmalloc_node_range+0x326/0x13d0 [ 294.768243][ T3991] ? bpf_prog_alloc_no_stats+0x3e/0x3f0 [ 294.773791][ T3991] ? __cfi_avc_has_perm_noaudit+0x10/0x10 [ 294.779535][ T3991] ? release_firmware_map_entry+0x194/0x194 [ 294.785423][ T3991] ? __cfi___vmalloc_node_range+0x10/0x10 [ 294.791132][ T3991] ? __cfi_selinux_capable+0x10/0x10 [ 294.796537][ T3991] ? bpf_prog_alloc_no_stats+0x3e/0x3f0 [ 294.802081][ T3991] __vmalloc+0x79/0x90 [ 294.806233][ T3991] ? bpf_prog_alloc_no_stats+0x3e/0x3f0 [ 294.811858][ T3991] bpf_prog_alloc_no_stats+0x3e/0x3f0 [ 294.817228][ T3991] bpf_prog_alloc+0x22/0x1c0 [ 294.821833][ T3991] bpf_prog_load+0x7c6/0x15a0 [ 294.826507][ T3991] ? map_freeze+0x390/0x390 [ 294.831004][ T3991] ? __sys_bpf+0x2ed/0x780 [ 294.835422][ T3991] __sys_bpf+0x504/0x780 [ 294.839676][ T3991] ? bpf_link_show_fdinfo+0x320/0x320 [ 294.845048][ T3991] ? __cfi_sched_clock_cpu+0x10/0x10 [ 294.850335][ T3991] __x64_sys_bpf+0x7c/0x90 [ 294.854752][ T3991] x64_sys_call+0x488/0x9a0 [ 294.859322][ T3991] do_syscall_64+0x4c/0xa0 [ 294.863754][ T3991] ? clear_bhb_loop+0x30/0x80 [ 294.868451][ T3991] ? clear_bhb_loop+0x30/0x80 [ 294.873126][ T3991] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 294.879116][ T3991] RIP: 0033:0x7f529d18ebe9 [ 294.883526][ T3991] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 294.903155][ T3991] RSP: 002b:00007f529e0de038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 294.911576][ T3991] RAX: ffffffffffffffda RBX: 00007f529d3c5fa0 RCX: 00007f529d18ebe9 [ 294.919544][ T3991] RDX: 0000000000000090 RSI: 0000200000002c40 RDI: 0000000000000005 [ 294.927507][ T3991] RBP: 00007f529e0de090 R08: 0000000000000000 R09: 0000000000000000 [ 294.935477][ T3991] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 294.943481][ T3991] R13: 00007f529d3c6038 R14: 00007f529d3c5fa0 R15: 00007ffea690e2e8 [ 294.951454][ T3991] [ 295.271415][ T3991] syz.1.1035: vmalloc error: size 4096, vm_struct allocation failed, mode:0x500dc0(GFP_USER|__GFP_ZERO|__GFP_ACCOUNT), nodemask=(null),cpuset=syz1,mems_allowed=0 [ 295.571239][ T3991] CPU: 0 PID: 3991 Comm: syz.1.1035 Not tainted syzkaller #0 [ 295.578656][ T3991] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 295.588710][ T3991] Call Trace: [ 295.591990][ T3991] [ 295.594913][ T3991] __dump_stack+0x21/0x24 [ 295.599249][ T3991] dump_stack_lvl+0xee/0x150 [ 295.603847][ T3991] ? __cfi_dump_stack_lvl+0x8/0x8 [ 295.608873][ T3991] ? pr_cont_kernfs_name+0x133/0x160 [ 295.614155][ T3991] dump_stack+0x15/0x24 [ 295.618306][ T3991] warn_alloc+0x1b0/0x1d0 [ 295.622628][ T3991] ? should_failslab+0x9/0x20 [ 295.627307][ T3991] ? __cfi_warn_alloc+0x10/0x10 [ 295.632153][ T3991] ? kmalloc_node_trace+0x3d/0xb0 [ 295.637176][ T3991] ? __get_vm_area_node+0x353/0x360 [ 295.642377][ T3991] __vmalloc_node_range+0x34b/0x13d0 [ 295.647662][ T3991] ? __cfi_avc_has_perm_noaudit+0x10/0x10 [ 295.653381][ T3991] ? release_firmware_map_entry+0x194/0x194 [ 295.659269][ T3991] ? __cfi___vmalloc_node_range+0x10/0x10 [ 295.664988][ T3991] ? __cfi_selinux_capable+0x10/0x10 [ 295.670288][ T3991] ? bpf_prog_alloc_no_stats+0x3e/0x3f0 [ 295.675828][ T3991] __vmalloc+0x79/0x90 [ 295.679900][ T3991] ? bpf_prog_alloc_no_stats+0x3e/0x3f0 [ 295.685483][ T3991] bpf_prog_alloc_no_stats+0x3e/0x3f0 [ 295.690844][ T3991] bpf_prog_alloc+0x22/0x1c0 [ 295.695419][ T3991] bpf_prog_load+0x7c6/0x15a0 [ 295.700215][ T3991] ? map_freeze+0x390/0x390 [ 295.704707][ T3991] ? __sys_bpf+0x2ed/0x780 [ 295.709119][ T3991] __sys_bpf+0x504/0x780 [ 295.713341][ T3991] ? bpf_link_show_fdinfo+0x320/0x320 [ 295.718698][ T3991] ? __cfi_sched_clock_cpu+0x10/0x10 [ 295.723964][ T3991] __x64_sys_bpf+0x7c/0x90 [ 295.728363][ T3991] x64_sys_call+0x488/0x9a0 [ 295.732845][ T3991] do_syscall_64+0x4c/0xa0 [ 295.737242][ T3991] ? clear_bhb_loop+0x30/0x80 [ 295.741901][ T3991] ? clear_bhb_loop+0x30/0x80 [ 295.746559][ T3991] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 295.752431][ T3991] RIP: 0033:0x7f529d18ebe9 [ 295.756852][ T3991] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 295.776434][ T3991] RSP: 002b:00007f529e0de038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 295.784826][ T3991] RAX: ffffffffffffffda RBX: 00007f529d3c5fa0 RCX: 00007f529d18ebe9 [ 295.792779][ T3991] RDX: 0000000000000090 RSI: 0000200000002c40 RDI: 0000000000000005 [ 295.800729][ T3991] RBP: 00007f529e0de090 R08: 0000000000000000 R09: 0000000000000000 [ 295.808677][ T3991] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 295.816645][ T3991] R13: 00007f529d3c6038 R14: 00007f529d3c5fa0 R15: 00007ffea690e2e8 [ 295.824601][ T3991] [ 295.934509][ T3991] Mem-Info: [ 295.937667][ T3991] active_anon:13987 inactive_anon:0 isolated_anon:0 [ 295.937667][ T3991] active_file:26183 inactive_file:2300 isolated_file:0 [ 295.937667][ T3991] unevictable:0 dirty:314 writeback:0 [ 295.937667][ T3991] slab_reclaimable:7883 slab_unreclaimable:74330 [ 295.937667][ T3991] mapped:29277 shmem:6007 pagetables:664 [ 295.937667][ T3991] sec_pagetables:0 bounce:0 [ 295.937667][ T3991] kernel_misc_reclaimable:0 [ 295.937667][ T3991] free:1514364 free_pcp:4607 free_cma:0 [ 296.166555][ T3991] Node 0 active_anon:33148kB inactive_anon:0kB active_file:104732kB inactive_file:9200kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:117108kB dirty:1256kB writeback:0kB shmem:1228kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 0kB writeback_tmp:0kB kernel_stack:5192kB pagetables:2656kB sec_pagetables:0kB all_unreclaimable? no [ 296.211230][ T3991] DMA32 free:2968532kB boost:0kB min:31288kB low:39108kB high:46928kB reserved_highatomic:0KB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:3145324kB managed:2974204kB mlocked:0kB bounce:0kB free_pcp:5672kB local_pcp:60kB free_cma:0kB [ 296.350473][ T3991] lowmem_reserve[]: 0 3932 3932 3932 [ 296.431341][ T3991] Normal free:3079840kB boost:0kB min:42436kB low:53044kB high:63652kB reserved_highatomic:0KB active_anon:33148kB inactive_anon:0kB active_file:104732kB inactive_file:9200kB unevictable:0kB writepending:1256kB present:5242880kB managed:4026656kB mlocked:0kB bounce:0kB free_pcp:32516kB local_pcp:9800kB free_cma:0kB [ 296.681640][ T3991] lowmem_reserve[]: 0 0 0 0 [ 296.686256][ T3991] DMA32: 3*4kB (M) 1*8kB (M) 2*16kB (M) 3*32kB (M) 3*64kB (M) 3*128kB (M) 3*256kB (M) 3*512kB (M) 4*1024kB (UM) 2*2048kB (M) 722*4096kB (M) = 2968532kB [ 296.759978][ T3991] Normal: 1827*4kB (ME) 1180*8kB (ME) 1236*16kB (UME) 694*32kB (UME) 419*64kB (UME) 215*128kB (UME) 153*256kB (UME) 88*512kB (UM) 39*1024kB (UME) 18*2048kB (UM) 685*4096kB (UM) = 3079852kB [ 296.779940][ T3991] 28790 total pagecache pages [ 296.800179][ T3991] 0 pages in swap cache [ 296.863161][ T3991] Free swap = 124996kB [ 296.867372][ T3991] Total swap = 124996kB [ 296.880348][ T3991] 2097051 pages RAM [ 296.887546][ T3991] 0 pages HighMem/MovableOnly [ 297.011469][ T3991] 346836 pages reserved [ 297.015654][ T3991] 0 pages cma reserved [ 298.952618][ T4026] FAULT_INJECTION: forcing a failure. [ 298.952618][ T4026] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 298.983613][ T4031] FAULT_INJECTION: forcing a failure. [ 298.983613][ T4031] name failslab, interval 1, probability 0, space 0, times 0 [ 299.011653][ T4026] CPU: 0 PID: 4026 Comm: syz.1.1048 Not tainted syzkaller #0 [ 299.019065][ T4026] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 299.029123][ T4026] Call Trace: [ 299.032404][ T4026] [ 299.035335][ T4026] __dump_stack+0x21/0x24 [ 299.039677][ T4026] dump_stack_lvl+0xee/0x150 [ 299.044287][ T4026] ? __cfi_dump_stack_lvl+0x8/0x8 [ 299.049325][ T4026] ? bloom_map_push_elem+0x33/0x180 [ 299.054625][ T4026] dump_stack+0x15/0x24 [ 299.058793][ T4026] should_fail_ex+0x3d4/0x520 [ 299.063495][ T4026] should_fail+0xb/0x10 [ 299.067724][ T4026] should_fail_usercopy+0x1a/0x20 [ 299.072776][ T4026] strncpy_from_user+0x24/0x2d0 [ 299.077645][ T4026] ? getname_flags+0xb9/0x500 [ 299.082331][ T4026] getname_flags+0xf4/0x500 [ 299.086845][ T4026] __x64_sys_mkdirat+0x7c/0xa0 [ 299.091615][ T4026] x64_sys_call+0x73d/0x9a0 [ 299.096149][ T4026] do_syscall_64+0x4c/0xa0 [ 299.100580][ T4026] ? clear_bhb_loop+0x30/0x80 [ 299.105265][ T4026] ? clear_bhb_loop+0x30/0x80 [ 299.109951][ T4026] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 299.115863][ T4026] RIP: 0033:0x7f529d18ebe9 [ 299.120368][ T4026] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 299.139976][ T4026] RSP: 002b:00007f529e0de038 EFLAGS: 00000246 ORIG_RAX: 0000000000000102 [ 299.148396][ T4026] RAX: ffffffffffffffda RBX: 00007f529d3c5fa0 RCX: 00007f529d18ebe9 [ 299.156376][ T4026] RDX: 00000000000001ff RSI: 0000000000000000 RDI: ffffffffffffff9c [ 299.164349][ T4026] RBP: 00007f529e0de090 R08: 0000000000000000 R09: 0000000000000000 [ 299.172329][ T4026] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 299.180306][ T4026] R13: 00007f529d3c6038 R14: 00007f529d3c5fa0 R15: 00007ffea690e2e8 [ 299.188302][ T4026] [ 299.311692][ T4031] CPU: 1 PID: 4031 Comm: syz.4.1047 Not tainted syzkaller #0 [ 299.319099][ T4031] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 299.329145][ T4031] Call Trace: [ 299.332453][ T4031] [ 299.335375][ T4031] __dump_stack+0x21/0x24 [ 299.339703][ T4031] dump_stack_lvl+0xee/0x150 [ 299.344290][ T4031] ? __cfi_dump_stack_lvl+0x8/0x8 [ 299.349314][ T4031] dump_stack+0x15/0x24 [ 299.353459][ T4031] should_fail_ex+0x3d4/0x520 [ 299.358134][ T4031] __should_failslab+0xac/0xf0 [ 299.362893][ T4031] should_failslab+0x9/0x20 [ 299.367390][ T4031] kmem_cache_alloc_node+0x42/0x340 [ 299.372586][ T4031] ? __alloc_skb+0xea/0x4b0 [ 299.377100][ T4031] ? __kasan_slab_free+0x11/0x20 [ 299.382040][ T4031] __alloc_skb+0xea/0x4b0 [ 299.386368][ T4031] inet_netconf_notify_devconf+0x169/0x220 [ 299.392176][ T4031] inetdev_event+0x831/0x10e0 [ 299.396846][ T4031] ? __cfi_inetdev_event+0x10/0x10 [ 299.401951][ T4031] ? arp_netdev_event+0xd4/0x2b0 [ 299.406888][ T4031] raw_notifier_call_chain+0xa1/0x110 [ 299.412262][ T4031] unregister_netdevice_many+0xf8f/0x1820 [ 299.417983][ T4031] ? _raw_spin_unlock_irqrestore+0x5a/0x80 [ 299.423779][ T4031] ? __cfi_unregister_netdevice_many+0x10/0x10 [ 299.429934][ T4031] ? ref_tracker_alloc+0x2a5/0x430 [ 299.435046][ T4031] ? __kasan_check_write+0x14/0x20 [ 299.440164][ T4031] ? queue_delayed_work_on+0x101/0x150 [ 299.445636][ T4031] ? linkwatch_fire_event+0x1d2/0x240 [ 299.451042][ T4031] ? __cfi_queue_delayed_work_on+0x10/0x10 [ 299.456906][ T4031] ? exit_to_user_mode_loop+0x9b/0xb0 [ 299.462281][ T4031] ? __kasan_check_read+0x11/0x20 [ 299.467313][ T4031] unregister_netdevice_queue+0x31c/0x360 [ 299.473044][ T4031] ? linkwatch_schedule_work+0x161/0x190 [ 299.478677][ T4031] ? __cfi_unregister_netdevice_queue+0x10/0x10 [ 299.484918][ T4031] ? linkwatch_fire_event+0x1ed/0x240 [ 299.490285][ T4031] __tun_detach+0xca6/0x1460 [ 299.494903][ T4031] tun_chr_close+0x92/0x140 [ 299.499399][ T4031] ? __cfi_tun_chr_close+0x10/0x10 [ 299.504498][ T4031] __fput+0x1fc/0x8f0 [ 299.508476][ T4031] ____fput+0x15/0x20 [ 299.512454][ T4031] task_work_run+0x1db/0x240 [ 299.517050][ T4031] ? __cfi_task_work_run+0x10/0x10 [ 299.522168][ T4031] ? filp_close+0x111/0x160 [ 299.526679][ T4031] exit_to_user_mode_loop+0x9b/0xb0 [ 299.531876][ T4031] exit_to_user_mode_prepare+0x5a/0xa0 [ 299.537338][ T4031] syscall_exit_to_user_mode+0x1a/0x30 [ 299.542795][ T4031] do_syscall_64+0x58/0xa0 [ 299.547210][ T4031] ? clear_bhb_loop+0x30/0x80 [ 299.551889][ T4031] ? clear_bhb_loop+0x30/0x80 [ 299.556563][ T4031] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 299.562450][ T4031] RIP: 0033:0x7fb20ff8ebe9 [ 299.566858][ T4031] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 299.586548][ T4031] RSP: 002b:00007fb210e11038 EFLAGS: 00000246 ORIG_RAX: 0000000000000003 [ 299.594961][ T4031] RAX: 0000000000000000 RBX: 00007fb2101c5fa0 RCX: 00007fb20ff8ebe9 [ 299.602932][ T4031] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000004 [ 299.611071][ T4031] RBP: 00007fb210e11090 R08: 0000000000000000 R09: 0000000000000000 [ 299.619038][ T4031] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 299.627005][ T4031] R13: 00007fb2101c6038 R14: 00007fb2101c5fa0 R15: 00007ffea89cc008 [ 299.634977][ T4031] [ 299.663346][ T4039] FAULT_INJECTION: forcing a failure. [ 299.663346][ T4039] name failslab, interval 1, probability 0, space 0, times 0 [ 299.677857][ T4039] CPU: 0 PID: 4039 Comm: syz.2.1050 Not tainted syzkaller #0 [ 299.685277][ T4039] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 299.695364][ T4039] Call Trace: [ 299.698658][ T4039] [ 299.701583][ T4039] __dump_stack+0x21/0x24 [ 299.705924][ T4039] dump_stack_lvl+0xee/0x150 [ 299.710525][ T4039] ? __cfi_dump_stack_lvl+0x8/0x8 [ 299.715644][ T4039] ? stack_trace_save+0x98/0xe0 [ 299.720495][ T4039] dump_stack+0x15/0x24 [ 299.724646][ T4039] should_fail_ex+0x3d4/0x520 [ 299.729321][ T4039] __should_failslab+0xac/0xf0 [ 299.734080][ T4039] should_failslab+0x9/0x20 [ 299.738577][ T4039] kmem_cache_alloc_node+0x42/0x340 [ 299.743769][ T4039] ? dup_task_struct+0x5a/0x790 [ 299.748619][ T4039] dup_task_struct+0x5a/0x790 [ 299.753296][ T4039] ? __kasan_check_write+0x14/0x20 [ 299.758416][ T4039] ? recalc_sigpending+0x168/0x1c0 [ 299.763524][ T4039] copy_process+0x5b8/0x3480 [ 299.768110][ T4039] ? __cfi_kstrtouint_from_user+0x10/0x10 [ 299.773827][ T4039] ? __kasan_check_write+0x14/0x20 [ 299.778945][ T4039] ? idle_dummy+0x10/0x10 [ 299.783283][ T4039] kernel_clone+0x23a/0x810 [ 299.787794][ T4039] ? __cfi_kernel_clone+0x10/0x10 [ 299.792819][ T4039] ? __kasan_check_write+0x14/0x20 [ 299.797935][ T4039] ? mutex_unlock+0x89/0x220 [ 299.802521][ T4039] __x64_sys_clone+0x168/0x1b0 [ 299.807288][ T4039] ? __cfi___x64_sys_clone+0x10/0x10 [ 299.812611][ T4039] ? fpregs_assert_state_consistent+0xb1/0xe0 [ 299.818680][ T4039] x64_sys_call+0x990/0x9a0 [ 299.823178][ T4039] do_syscall_64+0x4c/0xa0 [ 299.827587][ T4039] ? clear_bhb_loop+0x30/0x80 [ 299.832263][ T4039] ? clear_bhb_loop+0x30/0x80 [ 299.836940][ T4039] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 299.842830][ T4039] RIP: 0033:0x7f137eb8ebe9 [ 299.847245][ T4039] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 299.866856][ T4039] RSP: 002b:00007f137f95ffe8 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 299.875272][ T4039] RAX: ffffffffffffffda RBX: 00007f137edc5fa0 RCX: 00007f137eb8ebe9 [ 299.883313][ T4039] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000400 [ 299.891289][ T4039] RBP: 00007f137f960090 R08: 0000000000000000 R09: 0000000000000000 [ 299.899258][ T4039] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000001 [ 299.907226][ T4039] R13: 00007f137edc6038 R14: 00007f137edc5fa0 R15: 00007ffe27241368 [ 299.915197][ T4039] [ 307.034394][ T4160] device pim6reg1 entered promiscuous mode [ 308.431179][ C0] sched: RT throttling activated [ 321.441850][ T4174] bridge0: port 1(bridge_slave_0) entered blocking state [ 321.452210][ T4174] bridge0: port 1(bridge_slave_0) entered disabled state [ 321.466237][ T4174] device bridge_slave_0 entered promiscuous mode [ 321.511931][ T4174] bridge0: port 2(bridge_slave_1) entered blocking state [ 321.519131][ T4174] bridge0: port 2(bridge_slave_1) entered disabled state [ 321.546872][ T4174] device bridge_slave_1 entered promiscuous mode [ 321.811641][ T4179] bridge0: port 1(bridge_slave_0) entered blocking state [ 321.839088][ T4179] bridge0: port 1(bridge_slave_0) entered disabled state [ 321.848888][ T4179] device bridge_slave_0 entered promiscuous mode [ 321.926492][ T4179] bridge0: port 2(bridge_slave_1) entered blocking state [ 321.964081][ T4179] bridge0: port 2(bridge_slave_1) entered disabled state [ 321.995182][ T4179] device bridge_slave_1 entered promiscuous mode [ 322.088214][ T4185] bridge0: port 1(bridge_slave_0) entered blocking state [ 322.095411][ T4185] bridge0: port 1(bridge_slave_0) entered disabled state [ 322.102864][ T4185] device bridge_slave_0 entered promiscuous mode [ 322.111090][ T4185] bridge0: port 2(bridge_slave_1) entered blocking state [ 322.118458][ T4185] bridge0: port 2(bridge_slave_1) entered disabled state [ 322.125886][ T4185] device bridge_slave_1 entered promiscuous mode [ 322.276613][ T28] audit: type=1400 audit(1756974170.795:129): avc: denied { create } for pid=4174 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 322.297383][ T28] audit: type=1400 audit(1756974170.795:130): avc: denied { write } for pid=4174 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 322.318096][ T28] audit: type=1400 audit(1756974170.795:131): avc: denied { read } for pid=4174 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 322.513941][ T4192] bridge0: port 1(bridge_slave_0) entered blocking state [ 322.522216][ T4192] bridge0: port 1(bridge_slave_0) entered disabled state [ 322.529747][ T4192] device bridge_slave_0 entered promiscuous mode [ 322.663942][ T346] device veth1_macvtap left promiscuous mode [ 322.670046][ T346] device veth0_vlan left promiscuous mode [ 323.022556][ T4192] bridge0: port 2(bridge_slave_1) entered blocking state [ 323.029608][ T4192] bridge0: port 2(bridge_slave_1) entered disabled state [ 323.042734][ T4192] device bridge_slave_1 entered promiscuous mode [ 323.292584][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 323.311936][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 323.411614][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 323.515870][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 323.587022][ T43] bridge0: port 1(bridge_slave_0) entered blocking state [ 323.594103][ T43] bridge0: port 1(bridge_slave_0) entered forwarding state [ 323.602145][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 323.629730][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 323.638199][ T43] bridge0: port 2(bridge_slave_1) entered blocking state [ 323.645246][ T43] bridge0: port 2(bridge_slave_1) entered forwarding state [ 323.671445][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 323.703998][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 323.773594][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 323.843939][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 323.917004][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 323.952449][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 323.960015][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 323.980167][ T4174] device veth0_vlan entered promiscuous mode [ 324.048126][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 324.056703][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 324.065506][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 324.086645][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 324.097048][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 324.105680][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 324.114706][ T43] bridge0: port 1(bridge_slave_0) entered blocking state [ 324.121781][ T43] bridge0: port 1(bridge_slave_0) entered forwarding state [ 324.131066][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 324.139483][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 324.148001][ T43] bridge0: port 2(bridge_slave_1) entered blocking state [ 324.155074][ T43] bridge0: port 2(bridge_slave_1) entered forwarding state [ 324.162733][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 324.170215][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 324.177909][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 324.218591][ T4174] device veth1_macvtap entered promiscuous mode [ 324.233558][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 324.242621][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 324.250661][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 324.259168][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 324.269788][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 324.278300][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 324.291808][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 324.346237][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 324.363219][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 324.371839][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 324.389863][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 324.398000][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 324.412474][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 324.427382][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 324.441775][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 324.456398][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 324.465174][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 324.482174][ T4179] device veth0_vlan entered promiscuous mode [ 324.514982][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 324.523487][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 324.531071][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 324.539704][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 324.548354][ T43] bridge0: port 1(bridge_slave_0) entered blocking state [ 324.555401][ T43] bridge0: port 1(bridge_slave_0) entered forwarding state [ 324.562848][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 324.571106][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 324.579660][ T43] bridge0: port 2(bridge_slave_1) entered blocking state [ 324.586798][ T43] bridge0: port 2(bridge_slave_1) entered forwarding state [ 324.594158][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 324.602292][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 324.610287][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 324.642604][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 324.650696][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 324.757689][ T343] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 324.765916][ T343] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 324.818481][ T4179] device veth1_macvtap entered promiscuous mode [ 324.881398][ T343] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 324.889123][ T343] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 324.897785][ T343] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 324.950986][ T343] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 324.960190][ T343] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 324.969245][ T343] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 324.979244][ T343] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 325.018028][ T4185] device veth0_vlan entered promiscuous mode [ 325.185555][ T4185] device veth1_macvtap entered promiscuous mode [ 325.312987][ T4244] device sit0 entered promiscuous mode [ 325.984763][ T343] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 326.012116][ T343] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 326.042866][ T343] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 326.064183][ T343] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 326.085687][ T343] bridge0: port 1(bridge_slave_0) entered blocking state [ 326.092799][ T343] bridge0: port 1(bridge_slave_0) entered forwarding state [ 326.224676][ T343] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 326.286083][ T343] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 326.351487][ T343] bridge0: port 2(bridge_slave_1) entered blocking state [ 326.358567][ T343] bridge0: port 2(bridge_slave_1) entered forwarding state [ 326.404228][ T343] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 326.413544][ T343] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 326.421877][ T343] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 326.431425][ T343] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 326.439482][ T343] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 326.448500][ T343] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 326.457862][ T343] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 326.466494][ T343] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 326.475946][ T343] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 326.484899][ T343] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 326.494348][ T343] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 326.604526][ T343] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 326.614450][ T343] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 326.623382][ T343] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 326.690656][ T343] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 326.702355][ T343] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 326.712228][ T343] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 326.721025][ T343] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 326.730841][ T343] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 326.739823][ T343] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 326.751281][ T4192] device veth0_vlan entered promiscuous mode [ 326.814634][ T343] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 326.823545][ T343] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 327.110502][ T346] device bridge_slave_1 left promiscuous mode [ 327.138043][ T346] bridge0: port 2(bridge_slave_1) entered disabled state [ 327.235261][ T346] device bridge_slave_0 left promiscuous mode [ 327.251299][ T346] bridge0: port 1(bridge_slave_0) entered disabled state [ 327.259687][ T346] device bridge_slave_1 left promiscuous mode [ 327.266121][ T346] bridge0: port 2(bridge_slave_1) entered disabled state [ 327.273881][ T346] device bridge_slave_0 left promiscuous mode [ 327.280419][ T346] bridge0: port 1(bridge_slave_0) entered disabled state [ 327.308152][ T346] device bridge_slave_1 left promiscuous mode [ 327.318623][ T346] bridge0: port 2(bridge_slave_1) entered disabled state [ 327.336541][ T346] device bridge_slave_0 left promiscuous mode [ 327.343928][ T346] bridge0: port 1(bridge_slave_0) entered disabled state [ 327.360118][ T346] device veth0_vlan left promiscuous mode [ 327.370948][ T346] device veth0_vlan left promiscuous mode [ 328.384237][ T343] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 328.392930][ T343] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 328.433607][ T4192] device veth1_macvtap entered promiscuous mode [ 328.551921][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 328.573757][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 328.612476][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 328.654508][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 328.677435][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 328.789933][ T4280] device pim6reg1 entered promiscuous mode [ 330.598239][ T28] audit: type=1400 audit(1756974179.115:132): avc: denied { create } for pid=4305 comm="syz.0.1115" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 332.225028][ T28] audit: type=1400 audit(1756974180.745:133): avc: denied { create } for pid=4350 comm="syz.8.1125" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 344.944936][ T4469] device veth0_vlan left promiscuous mode [ 345.034421][ T4469] device veth0_vlan entered promiscuous mode [ 345.097460][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 345.116048][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 345.149534][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 353.874943][ T4564] device syzkaller0 entered promiscuous mode [ 377.210878][ T4854] bridge0: port 1(bridge_slave_0) entered blocking state [ 377.218024][ T4854] bridge0: port 1(bridge_slave_0) entered disabled state [ 377.225464][ T4854] device bridge_slave_0 entered promiscuous mode [ 377.275641][ T4854] bridge0: port 2(bridge_slave_1) entered blocking state [ 377.282794][ T4854] bridge0: port 2(bridge_slave_1) entered disabled state [ 377.290090][ T4854] device bridge_slave_1 entered promiscuous mode [ 378.117255][ T4855] bridge0: port 1(bridge_slave_0) entered blocking state [ 378.124465][ T4855] bridge0: port 1(bridge_slave_0) entered disabled state [ 378.134167][ T4855] device bridge_slave_0 entered promiscuous mode [ 378.243303][ T4855] bridge0: port 2(bridge_slave_1) entered blocking state [ 378.250361][ T4855] bridge0: port 2(bridge_slave_1) entered disabled state [ 378.309045][ T4855] device bridge_slave_1 entered promiscuous mode [ 378.509701][ T4874] device pim6reg1 entered promiscuous mode [ 378.588602][ T346] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 378.598421][ T346] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 378.617141][ T28] audit: type=1400 audit(1756974227.135:134): avc: denied { create } for pid=4868 comm="syz.6.1261" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=phonet_socket permissive=1 [ 378.683746][ T346] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 378.715139][ T346] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 378.740406][ T346] bridge0: port 1(bridge_slave_0) entered blocking state [ 378.747496][ T346] bridge0: port 1(bridge_slave_0) entered forwarding state [ 378.771368][ T346] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 378.789953][ T346] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 378.807237][ T346] bridge0: port 2(bridge_slave_1) entered blocking state [ 378.814410][ T346] bridge0: port 2(bridge_slave_1) entered forwarding state [ 378.904288][ T346] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 378.912486][ T346] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 378.920674][ T346] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 378.974835][ T334] device bridge_slave_1 left promiscuous mode [ 378.980991][ T334] bridge0: port 2(bridge_slave_1) entered disabled state [ 378.988630][ T334] device bridge_slave_0 left promiscuous mode [ 378.994960][ T334] bridge0: port 1(bridge_slave_0) entered disabled state [ 379.003311][ T334] device bridge_slave_1 left promiscuous mode [ 379.009453][ T334] bridge0: port 2(bridge_slave_1) entered disabled state [ 379.018135][ T334] device bridge_slave_0 left promiscuous mode [ 379.024373][ T334] bridge0: port 1(bridge_slave_0) entered disabled state [ 379.032389][ T334] device veth1_macvtap left promiscuous mode [ 379.038470][ T334] device veth0_vlan left promiscuous mode [ 379.044572][ T334] device veth1_macvtap left promiscuous mode [ 379.050630][ T334] device veth0_vlan left promiscuous mode [ 379.181395][ T4889] device veth1_macvtap left promiscuous mode [ 379.209043][ T4854] device veth0_vlan entered promiscuous mode [ 379.246444][ T346] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 379.269710][ T346] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 379.277535][ T346] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 379.290591][ T346] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 379.298770][ T346] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 379.306942][ T346] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 379.315736][ T346] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 379.327434][ T346] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 379.334950][ T346] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 379.359837][ T4898] device wg2 entered promiscuous mode [ 379.368423][ T4897] device wg2 left promiscuous mode [ 379.437207][ T4900] FAULT_INJECTION: forcing a failure. [ 379.437207][ T4900] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 379.439605][ T4854] device veth1_macvtap entered promiscuous mode [ 379.450612][ T4900] CPU: 1 PID: 4900 Comm: syz.0.1266 Not tainted syzkaller #0 [ 379.464145][ T4900] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 379.474186][ T4900] Call Trace: [ 379.477444][ T4900] [ 379.480364][ T4900] __dump_stack+0x21/0x24 [ 379.484756][ T4900] dump_stack_lvl+0xee/0x150 [ 379.489345][ T4900] ? __cfi_dump_stack_lvl+0x8/0x8 [ 379.494360][ T4900] ? try_charge_memcg+0x24a/0x15b0 [ 379.499470][ T4900] dump_stack+0x15/0x24 [ 379.503613][ T4900] should_fail_ex+0x3d4/0x520 [ 379.508279][ T4900] should_fail_alloc_page+0x61/0x90 [ 379.513467][ T4900] prepare_alloc_pages+0x148/0x5f0 [ 379.518565][ T4900] ? __alloc_pages_bulk+0x9c0/0x9c0 [ 379.523753][ T4900] __alloc_pages+0x124/0x450 [ 379.528325][ T4900] ? __cfi___alloc_pages+0x10/0x10 [ 379.533419][ T4900] ? memcg_rstat_updated+0x56/0x110 [ 379.538603][ T4900] ? folio_add_lru+0x260/0x390 [ 379.543463][ T4900] __folio_alloc+0x12/0x40 [ 379.547894][ T4900] wp_page_copy+0x255/0x15b0 [ 379.552480][ T4900] ? fault_dirty_shared_page+0x310/0x310 [ 379.558099][ T4900] ? vm_normal_page+0x1eb/0x200 [ 379.562934][ T4900] do_wp_page+0x9f2/0xfc0 [ 379.567259][ T4900] handle_mm_fault+0x10e4/0x2640 [ 379.572180][ T4900] ? __cfi_handle_mm_fault+0x10/0x10 [ 379.577453][ T4900] ? down_read_trylock+0x273/0x640 [ 379.582555][ T4900] ? lock_mm_and_find_vma+0x9e/0x320 [ 379.587825][ T4900] ? do_user_addr_fault+0x2ee/0x1050 [ 379.593094][ T4900] do_user_addr_fault+0x63b/0x1050 [ 379.598190][ T4900] exc_page_fault+0x51/0xb0 [ 379.602677][ T4900] asm_exc_page_fault+0x27/0x30 [ 379.607510][ T4900] RIP: 0010:copy_user_enhanced_fast_string+0xa/0x40 [ 379.614082][ T4900] Code: ff c9 75 f2 89 d1 c1 e9 03 83 e2 07 f3 48 a5 89 d1 f3 a4 31 c0 0f 01 ca c3 8d 0c ca 89 ca eb 20 0f 01 cb 83 fa 40 72 38 89 d1 a4 31 c0 0f 01 ca c3 89 ca eb 0a 90 90 90 90 90 90 90 90 90 90 [ 379.633675][ T4900] RSP: 0018:ffffc90000d47cc0 EFLAGS: 00050206 [ 379.639726][ T4900] RAX: ffffffff82636b01 RBX: 0000000000008400 RCX: 0000000000007640 [ 379.647677][ T4900] RDX: 0000000000008400 RSI: ffff888125f40dc0 RDI: 0000200000003000 [ 379.655625][ T4900] RBP: ffffc90000d47ce8 R08: dffffc0000000000 R09: ffffed1024be9080 [ 379.663575][ T4900] R10: 0000000000000000 R11: 0000000000001080 R12: 00007fffffff6c00 [ 379.671525][ T4900] R13: 0000000000000000 R14: 0000200000002240 R15: ffff888125f40000 [ 379.679479][ T4900] ? _copy_from_user+0x31/0xc0 [ 379.684229][ T4900] ? _copy_to_user+0x72/0x90 [ 379.688798][ T4900] map_lookup_elem+0x466/0x5d0 [ 379.693542][ T4900] __sys_bpf+0x49a/0x780 [ 379.697765][ T4900] ? bpf_link_show_fdinfo+0x320/0x320 [ 379.703207][ T4900] ? __cfi_ksys_write+0x10/0x10 [ 379.708041][ T4900] ? debug_smp_processor_id+0x17/0x20 [ 379.713397][ T4900] __x64_sys_bpf+0x7c/0x90 [ 379.717797][ T4900] x64_sys_call+0x488/0x9a0 [ 379.722279][ T4900] do_syscall_64+0x4c/0xa0 [ 379.726670][ T4900] ? clear_bhb_loop+0x30/0x80 [ 379.731329][ T4900] ? clear_bhb_loop+0x30/0x80 [ 379.735995][ T4900] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 379.741868][ T4900] RIP: 0033:0x7f9492d8ebe9 [ 379.746262][ T4900] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 379.765846][ T4900] RSP: 002b:00007f9493cf9038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 379.774238][ T4900] RAX: ffffffffffffffda RBX: 00007f9492fc5fa0 RCX: 00007f9492d8ebe9 [ 379.782194][ T4900] RDX: 0000000000000020 RSI: 0000200000000340 RDI: 0000000000000001 [ 379.790144][ T4900] RBP: 00007f9493cf9090 R08: 0000000000000000 R09: 0000000000000000 [ 379.798303][ T4900] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 379.806260][ T4900] R13: 00007f9492fc6038 R14: 00007f9492fc5fa0 R15: 00007ffd806e6ee8 [ 379.814228][ T4900] [ 379.844875][ T343] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 379.883050][ T343] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 379.900284][ T343] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 379.908517][ T343] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 379.919909][ T343] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 379.970516][ T343] bridge0: port 1(bridge_slave_0) entered blocking state [ 379.977632][ T343] bridge0: port 1(bridge_slave_0) entered forwarding state [ 380.055383][ T343] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 380.067811][ T343] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 380.076117][ T343] bridge0: port 2(bridge_slave_1) entered blocking state [ 380.083187][ T343] bridge0: port 2(bridge_slave_1) entered forwarding state [ 380.161745][ T343] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 380.191722][ T346] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 380.200992][ T346] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 380.210560][ T346] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 380.218867][ T346] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 380.227952][ T346] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 380.236206][ T346] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 380.244501][ T4909] FAULT_INJECTION: forcing a failure. [ 380.244501][ T4909] name failslab, interval 1, probability 0, space 0, times 0 [ 380.271399][ T4909] CPU: 0 PID: 4909 Comm: syz.5.1270 Not tainted syzkaller #0 [ 380.278844][ T4909] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 380.288895][ T4909] Call Trace: [ 380.292170][ T4909] [ 380.295098][ T4909] __dump_stack+0x21/0x24 [ 380.299431][ T4909] dump_stack_lvl+0xee/0x150 [ 380.304022][ T4909] ? __cfi_dump_stack_lvl+0x8/0x8 [ 380.309047][ T4909] dump_stack+0x15/0x24 [ 380.313195][ T4909] should_fail_ex+0x3d4/0x520 [ 380.317881][ T4909] __should_failslab+0xac/0xf0 [ 380.322645][ T4909] ? kvmalloc_node+0x294/0x480 [ 380.327409][ T4909] should_failslab+0x9/0x20 [ 380.331905][ T4909] __kmem_cache_alloc_node+0x3d/0x2c0 [ 380.337279][ T4909] ? kasan_save_alloc_info+0x25/0x30 [ 380.342566][ T4909] ? kvmalloc_node+0x294/0x480 [ 380.347536][ T4909] __kmalloc_node+0xa1/0x1e0 [ 380.352135][ T4909] ? dev_activate+0x2cf/0x1040 [ 380.356895][ T4909] ? __dev_change_flags+0x21b/0x6b0 [ 380.362090][ T4909] kvmalloc_node+0x294/0x480 [ 380.366684][ T4909] ? x64_sys_call+0x58b/0x9a0 [ 380.371358][ T4909] ? do_syscall_64+0x4c/0xa0 [ 380.375941][ T4909] ? __cfi_kvmalloc_node+0x10/0x10 [ 380.381052][ T4909] ? __kasan_check_write+0x14/0x20 [ 380.386166][ T4909] ? qdisc_alloc+0x5ae/0x780 [ 380.390763][ T4909] pfifo_fast_init+0x3af/0x7a0 [ 380.395532][ T4909] qdisc_create_dflt+0x150/0x3b0 [ 380.400475][ T4909] dev_activate+0x2cf/0x1040 [ 380.405064][ T4909] __dev_open+0x3ce/0x4f0 [ 380.409478][ T4909] ? dev_open+0x230/0x230 [ 380.413802][ T4909] ? _raw_spin_unlock_bh+0x50/0x60 [ 380.418913][ T4909] ? dev_set_rx_mode+0x223/0x2c0 [ 380.423850][ T4909] ? __kasan_check_read+0x11/0x20 [ 380.428876][ T4909] __dev_change_flags+0x21b/0x6b0 [ 380.433906][ T4909] ? __cfi___dev_change_flags+0x10/0x10 [ 380.439455][ T4909] dev_change_flags+0x88/0x1a0 [ 380.444217][ T4909] dev_ifsioc+0x159/0xed0 [ 380.448546][ T4909] ? dev_ioctl+0xd10/0xd10 [ 380.452960][ T4909] ? __mutex_lock_slowpath+0xe/0x10 [ 380.458158][ T4909] ? mutex_lock+0xf8/0x1a0 [ 380.462582][ T4909] ? __cfi_mutex_lock+0x10/0x10 [ 380.467430][ T4909] ? dev_get_by_name_rcu+0xe5/0x130 [ 380.472634][ T4909] dev_ioctl+0x556/0xd10 [ 380.476875][ T4909] sock_do_ioctl+0x23f/0x310 [ 380.481465][ T4909] ? sock_show_fdinfo+0xb0/0xb0 [ 380.486314][ T4909] ? selinux_file_ioctl+0x377/0x480 [ 380.491510][ T4909] sock_ioctl+0x4d8/0x6e0 [ 380.495842][ T4909] ? __cfi_sock_ioctl+0x10/0x10 [ 380.500716][ T4909] ? __fget_files+0x2d5/0x330 [ 380.505393][ T4909] ? security_file_ioctl+0x95/0xc0 [ 380.510557][ T4909] ? __cfi_sock_ioctl+0x10/0x10 [ 380.515438][ T4909] __se_sys_ioctl+0x12f/0x1b0 [ 380.520118][ T4909] __x64_sys_ioctl+0x7b/0x90 [ 380.524722][ T4909] x64_sys_call+0x58b/0x9a0 [ 380.529241][ T4909] do_syscall_64+0x4c/0xa0 [ 380.533833][ T4909] ? clear_bhb_loop+0x30/0x80 [ 380.538514][ T4909] ? clear_bhb_loop+0x30/0x80 [ 380.543292][ T4909] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 380.549235][ T4909] RIP: 0033:0x7ff8fc98ebe9 [ 380.553655][ T4909] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 380.573439][ T4909] RSP: 002b:00007ff8fd766038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 380.581878][ T4909] RAX: ffffffffffffffda RBX: 00007ff8fcbc5fa0 RCX: 00007ff8fc98ebe9 [ 380.589852][ T4909] RDX: 0000200000000100 RSI: 0000000000008914 RDI: 0000000000000009 [ 380.597829][ T4909] RBP: 00007ff8fd766090 R08: 0000000000000000 R09: 0000000000000000 [ 380.605800][ T4909] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 380.613779][ T4909] R13: 00007ff8fcbc6038 R14: 00007ff8fcbc5fa0 R15: 00007ffe469e8b88 [ 380.621751][ T4909] [ 380.628216][ T4909] pim6reg1: default qdisc (pfifo_fast) fail, fallback to noqueue [ 380.636105][ T4909] device pim6reg1 entered promiscuous mode [ 380.680905][ T346] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 380.689925][ T346] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 380.721568][ T346] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 380.772278][ T346] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 380.832550][ T4855] device veth0_vlan entered promiscuous mode [ 380.838762][ T346] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 380.847006][ T346] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 380.855236][ T346] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 380.864859][ T346] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 380.948737][ T346] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 380.961552][ T346] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 381.014082][ T4855] device veth1_macvtap entered promiscuous mode [ 381.037086][ T346] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 381.048227][ T346] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 381.089973][ T346] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 381.182575][ T346] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 381.227371][ T346] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 381.702942][ T4932] device pim6reg1 entered promiscuous mode [ 382.798455][ T4959] device syzkaller0 entered promiscuous mode [ 383.387675][ T4971] device syzkaller0 entered promiscuous mode [ 387.572394][ T5074] FAULT_INJECTION: forcing a failure. [ 387.572394][ T5074] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 387.661304][ T5074] CPU: 1 PID: 5074 Comm: syz.2.1325 Not tainted syzkaller #0 [ 387.668718][ T5074] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 387.678777][ T5074] Call Trace: [ 387.682048][ T5074] [ 387.684979][ T5074] __dump_stack+0x21/0x24 [ 387.689303][ T5074] dump_stack_lvl+0xee/0x150 [ 387.693897][ T5074] ? __cfi_dump_stack_lvl+0x8/0x8 [ 387.698917][ T5074] ? __switch_to_asm+0x3a/0x60 [ 387.703759][ T5074] dump_stack+0x15/0x24 [ 387.707920][ T5074] should_fail_ex+0x3d4/0x520 [ 387.712681][ T5074] should_fail+0xb/0x10 [ 387.716845][ T5074] should_fail_usercopy+0x1a/0x20 [ 387.721867][ T5074] _copy_from_user+0x1e/0xc0 [ 387.726451][ T5074] ethtool_set_per_queue+0xb6/0x1c0 [ 387.731644][ T5074] ? ethtool_get_phy_stats+0x4e0/0x4e0 [ 387.737101][ T5074] ? cap_capable+0x1aa/0x230 [ 387.741682][ T5074] ? mutex_lock+0xf8/0x1a0 [ 387.746094][ T5074] ? security_capable+0x99/0xc0 [ 387.750948][ T5074] ? ns_capable+0x8c/0xf0 [ 387.755271][ T5074] dev_ethtool+0x899/0x1190 [ 387.759774][ T5074] ? __cfi_dev_ethtool+0x10/0x10 [ 387.764707][ T5074] ? full_name_hash+0x9d/0xf0 [ 387.769391][ T5074] ? dev_get_by_name_rcu+0xe5/0x130 [ 387.774598][ T5074] dev_ioctl+0x473/0xd10 [ 387.778843][ T5074] sock_do_ioctl+0x23f/0x310 [ 387.783432][ T5074] ? sock_show_fdinfo+0xb0/0xb0 [ 387.788280][ T5074] ? selinux_file_ioctl+0x377/0x480 [ 387.794954][ T5074] sock_ioctl+0x4d8/0x6e0 [ 387.799285][ T5074] ? __cfi_sock_ioctl+0x10/0x10 [ 387.804133][ T5074] ? __fget_files+0x2d5/0x330 [ 387.808892][ T5074] ? security_file_ioctl+0x95/0xc0 [ 387.814039][ T5074] ? __cfi_sock_ioctl+0x10/0x10 [ 387.818977][ T5074] __se_sys_ioctl+0x12f/0x1b0 [ 387.823634][ T5074] __x64_sys_ioctl+0x7b/0x90 [ 387.828203][ T5074] x64_sys_call+0x58b/0x9a0 [ 387.832686][ T5074] do_syscall_64+0x4c/0xa0 [ 387.837078][ T5074] ? clear_bhb_loop+0x30/0x80 [ 387.841743][ T5074] ? clear_bhb_loop+0x30/0x80 [ 387.846420][ T5074] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 387.852313][ T5074] RIP: 0033:0x7fa39378ebe9 [ 387.856720][ T5074] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 387.876313][ T5074] RSP: 002b:00007fa394656038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 387.884718][ T5074] RAX: ffffffffffffffda RBX: 00007fa3939c6090 RCX: 00007fa39378ebe9 [ 387.892673][ T5074] RDX: 0000200000000080 RSI: 0000000000008946 RDI: 000000000000000b [ 387.900627][ T5074] RBP: 00007fa394656090 R08: 0000000000000000 R09: 0000000000000000 [ 387.908582][ T5074] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 387.916539][ T5074] R13: 00007fa3939c6128 R14: 00007fa3939c6090 R15: 00007ffed95b1038 [ 387.924514][ T5074] [ 389.450322][ T5112] device pim6reg1 entered promiscuous mode [ 392.648827][ T28] audit: type=1400 audit(1756974241.165:135): avc: denied { ioctl } for pid=5175 comm="syz.5.1359" path="user:[4026531837]" dev="nsfs" ino=4026531837 ioctlcmd=0xb701 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 394.290737][ T5217] device pim6reg1 entered promiscuous mode [ 395.764124][ T28] audit: type=1400 audit(1756974244.285:136): avc: denied { create } for pid=5236 comm="syz.1.1376" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=x25_socket permissive=1 [ 395.818064][ T5237] device syzkaller0 entered promiscuous mode [ 400.672085][ T28] audit: type=1400 audit(1756974249.185:137): avc: denied { create } for pid=5298 comm="syz.2.1406" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 402.428987][ T5326] FAULT_INJECTION: forcing a failure. [ 402.428987][ T5326] name failslab, interval 1, probability 0, space 0, times 0 [ 402.441941][ T5326] CPU: 1 PID: 5326 Comm: syz.0.1405 Not tainted syzkaller #0 [ 402.449330][ T5326] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 402.459388][ T5326] Call Trace: [ 402.462680][ T5326] [ 402.465609][ T5326] __dump_stack+0x21/0x24 [ 402.469974][ T5326] dump_stack_lvl+0xee/0x150 [ 402.474570][ T5326] ? __cfi_dump_stack_lvl+0x8/0x8 [ 402.479606][ T5326] dump_stack+0x15/0x24 [ 402.483771][ T5326] should_fail_ex+0x3d4/0x520 [ 402.488450][ T5326] ? __alloc_file+0x28/0x2a0 [ 402.493094][ T5326] __should_failslab+0xac/0xf0 [ 402.497869][ T5326] should_failslab+0x9/0x20 [ 402.502376][ T5326] kmem_cache_alloc+0x3b/0x330 [ 402.507148][ T5326] ? __cfi__raw_spin_lock+0x10/0x10 [ 402.512345][ T5326] __alloc_file+0x28/0x2a0 [ 402.516769][ T5326] alloc_empty_file+0x97/0x180 [ 402.521526][ T5326] alloc_file+0x59/0x640 [ 402.525798][ T5326] alloc_file_pseudo+0x17a/0x1f0 [ 402.530729][ T5326] ? __cfi_alloc_file_pseudo+0x10/0x10 [ 402.536182][ T5326] anon_inode_getfd+0xd6/0x1d0 [ 402.540980][ T5326] bpf_map_new_fd+0x5f/0x70 [ 402.545477][ T5326] map_create+0xa2a/0xd80 [ 402.549798][ T5326] __sys_bpf+0x30b/0x780 [ 402.554031][ T5326] ? bpf_link_show_fdinfo+0x320/0x320 [ 402.559404][ T5326] ? __cfi_ksys_write+0x10/0x10 [ 402.564254][ T5326] ? debug_smp_processor_id+0x17/0x20 [ 402.569619][ T5326] __x64_sys_bpf+0x7c/0x90 [ 402.574035][ T5326] x64_sys_call+0x488/0x9a0 [ 402.578531][ T5326] do_syscall_64+0x4c/0xa0 [ 402.582941][ T5326] ? clear_bhb_loop+0x30/0x80 [ 402.587612][ T5326] ? clear_bhb_loop+0x30/0x80 [ 402.592281][ T5326] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 402.598166][ T5326] RIP: 0033:0x7f9492d8ebe9 [ 402.602574][ T5326] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 402.622170][ T5326] RSP: 002b:00007f9493cf9038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 402.630577][ T5326] RAX: ffffffffffffffda RBX: 00007f9492fc5fa0 RCX: 00007f9492d8ebe9 [ 402.638540][ T5326] RDX: 0000000000000048 RSI: 0000200000000440 RDI: 0000000000000000 [ 402.646504][ T5326] RBP: 00007f9493cf9090 R08: 0000000000000000 R09: 0000000000000000 [ 402.654470][ T5326] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 402.662434][ T5326] R13: 00007f9492fc6038 R14: 00007f9492fc5fa0 R15: 00007ffd806e6ee8 [ 402.670410][ T5326] [ 406.089496][ T5388] device pim6reg1 entered promiscuous mode [ 406.243609][ T5387] device syzkaller0 entered promiscuous mode [ 407.749439][ T5426] device pim6reg1 entered promiscuous mode [ 408.155137][ T28] audit: type=1400 audit(1756974256.675:138): avc: denied { create } for pid=5434 comm="syz.5.1442" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netrom_socket permissive=1 [ 410.078538][ T5476] FAULT_INJECTION: forcing a failure. [ 410.078538][ T5476] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 410.103128][ T5476] CPU: 0 PID: 5476 Comm: syz.5.1454 Not tainted syzkaller #0 [ 410.110536][ T5476] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 410.120578][ T5476] Call Trace: [ 410.123860][ T5476] [ 410.126784][ T5476] __dump_stack+0x21/0x24 [ 410.131109][ T5476] dump_stack_lvl+0xee/0x150 [ 410.135695][ T5476] ? __cfi_dump_stack_lvl+0x8/0x8 [ 410.140722][ T5476] ? asm_sysvec_apic_timer_interrupt+0x1b/0x20 [ 410.146874][ T5476] dump_stack+0x15/0x24 [ 410.151033][ T5476] should_fail_ex+0x3d4/0x520 [ 410.155716][ T5476] should_fail+0xb/0x10 [ 410.159877][ T5476] should_fail_usercopy+0x1a/0x20 [ 410.164898][ T5476] copyin+0x20/0xa0 [ 410.168701][ T5476] _copy_from_iter+0x3e2/0xfd0 [ 410.173486][ T5476] ? __kasan_check_write+0x14/0x20 [ 410.178592][ T5476] ? __cfi__copy_from_iter+0x10/0x10 [ 410.183893][ T5476] ? asm_sysvec_apic_timer_interrupt+0x1b/0x20 [ 410.190056][ T5476] ? __check_object_size+0x45a/0x600 [ 410.195338][ T5476] skb_copy_datagram_from_iter+0xf7/0x6b0 [ 410.201053][ T5476] unix_stream_sendmsg+0x4c8/0xa70 [ 410.206170][ T5476] ? __cfi_unix_stream_sendmsg+0x10/0x10 [ 410.211793][ T5476] ? __cfi_unix_stream_sendmsg+0x10/0x10 [ 410.217420][ T5476] ____sys_sendmsg+0x5a9/0x990 [ 410.222170][ T5476] ? __sys_sendmsg_sock+0x40/0x40 [ 410.227182][ T5476] ? import_iovec+0x7c/0xb0 [ 410.231697][ T5476] ___sys_sendmsg+0x21c/0x290 [ 410.236357][ T5476] ? __sys_sendmsg+0x270/0x270 [ 410.241107][ T5476] ? timerqueue_add+0x20e/0x230 [ 410.245950][ T5476] ? __fdget+0x19c/0x220 [ 410.250170][ T5476] __x64_sys_sendmsg+0x1f0/0x2c0 [ 410.255094][ T5476] ? __cfi___x64_sys_sendmsg+0x10/0x10 [ 410.260539][ T5476] ? sched_clock_cpu+0x6e/0x250 [ 410.265407][ T5476] ? debug_smp_processor_id+0x17/0x20 [ 410.270766][ T5476] ? fpregs_assert_state_consistent+0xb1/0xe0 [ 410.276814][ T5476] x64_sys_call+0x171/0x9a0 [ 410.281299][ T5476] do_syscall_64+0x4c/0xa0 [ 410.285689][ T5476] ? clear_bhb_loop+0x30/0x80 [ 410.290345][ T5476] ? clear_bhb_loop+0x30/0x80 [ 410.295000][ T5476] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 410.300885][ T5476] RIP: 0033:0x7ff8fc98ebe9 [ 410.305281][ T5476] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 410.324864][ T5476] RSP: 002b:00007ff8fd766038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 410.333260][ T5476] RAX: ffffffffffffffda RBX: 00007ff8fcbc5fa0 RCX: 00007ff8fc98ebe9 [ 410.341211][ T5476] RDX: 0000000000000003 RSI: 0000200000000980 RDI: 0000000000000003 [ 410.349166][ T5476] RBP: 00007ff8fd766090 R08: 0000000000000000 R09: 0000000000000000 [ 410.357119][ T5476] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 410.365069][ T5476] R13: 00007ff8fcbc6038 R14: 00007ff8fcbc5fa0 R15: 00007ffe469e8b88 [ 410.373054][ T5476] [ 411.037902][ T5497] device sit0 left promiscuous mode [ 411.114104][ T5497] FAULT_INJECTION: forcing a failure. [ 411.114104][ T5497] name failslab, interval 1, probability 0, space 0, times 0 [ 411.126789][ T5497] CPU: 0 PID: 5497 Comm: syz.6.1460 Not tainted syzkaller #0 [ 411.134166][ T5497] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 411.144311][ T5497] Call Trace: [ 411.147680][ T5497] [ 411.150645][ T5497] __dump_stack+0x21/0x24 [ 411.154982][ T5497] dump_stack_lvl+0xee/0x150 [ 411.159589][ T5497] ? __cfi_dump_stack_lvl+0x8/0x8 [ 411.164623][ T5497] dump_stack+0x15/0x24 [ 411.168774][ T5497] should_fail_ex+0x3d4/0x520 [ 411.173455][ T5497] __should_failslab+0xac/0xf0 [ 411.178219][ T5497] should_failslab+0x9/0x20 [ 411.182713][ T5497] kmem_cache_alloc_node+0x42/0x340 [ 411.187910][ T5497] ? __alloc_skb+0xea/0x4b0 [ 411.192412][ T5497] ? memset+0x35/0x40 [ 411.196400][ T5497] __alloc_skb+0xea/0x4b0 [ 411.200734][ T5497] ? __fib6_drop_pcpu_from+0x28b/0x2b0 [ 411.206224][ T5497] inet6_rt_notify+0x2a2/0x470 [ 411.211002][ T5497] ? __kasan_check_read+0x11/0x20 [ 411.216029][ T5497] ? fib6_purge_rt+0x2ed/0x630 [ 411.220794][ T5497] ? atomic_notifier_call_chain+0x108/0x120 [ 411.226676][ T5497] ? __cfi_inet6_rt_notify+0x10/0x10 [ 411.231946][ T5497] ? call_fib_notifiers+0xa0/0xc0 [ 411.236957][ T5497] fib6_del+0xbdd/0xf50 [ 411.241124][ T5497] ? __cfi_fib6_del+0x10/0x10 [ 411.245799][ T5497] ? update_load_avg+0x4c2/0x13f0 [ 411.250819][ T5497] ? fib6_ifdown+0x2eb/0x4e0 [ 411.255406][ T5497] fib6_clean_node+0x2a4/0x530 [ 411.260156][ T5497] ? __cfi_fib6_clean_node+0x10/0x10 [ 411.265424][ T5497] ? __kasan_check_write+0x14/0x20 [ 411.270539][ T5497] ? resched_curr+0x10e/0x380 [ 411.275197][ T5497] fib6_walk_continue+0x50e/0x710 [ 411.280204][ T5497] fib6_walk+0x153/0x290 [ 411.284426][ T5497] fib6_clean_all+0x16a/0x230 [ 411.289079][ T5497] ? tracing_record_taskinfo_sched_switch+0x80/0x3a0 [ 411.295760][ T5497] ? probe_sched_wakeup+0x5e/0x90 [ 411.300764][ T5497] ? __cfi_fib6_ifdown+0x10/0x10 [ 411.305689][ T5497] ? __cfi_fib6_clean_all+0x10/0x10 [ 411.310867][ T5497] ? __cfi_fib6_clean_node+0x10/0x10 [ 411.316139][ T5497] ? __cfi_fib6_ifdown+0x10/0x10 [ 411.321058][ T5497] ? __cfi_preempt_schedule+0x10/0x10 [ 411.326419][ T5497] ? try_to_wake_up+0x613/0x1220 [ 411.331339][ T5497] rt6_disable_ip+0x11b/0x8f0 [ 411.335999][ T5497] ? preempt_schedule_thunk+0x16/0x18 [ 411.341366][ T5497] ? __queue_work+0x9df/0xd30 [ 411.346035][ T5497] ? __cfi_rt6_disable_ip+0x10/0x10 [ 411.351218][ T5497] ? __kasan_check_read+0x11/0x20 [ 411.356241][ T5497] addrconf_ifdown+0x15d/0x1910 [ 411.361075][ T5497] ? sock_ioctl+0x4d8/0x6e0 [ 411.365567][ T5497] ? __se_sys_ioctl+0x12f/0x1b0 [ 411.370402][ T5497] ? __kasan_kmalloc+0x95/0xb0 [ 411.375164][ T5497] ? addrconf_cleanup+0x130/0x130 [ 411.380202][ T5497] ? __kasan_check_write+0x14/0x20 [ 411.385315][ T5497] ? mutex_unlock+0x89/0x220 [ 411.390058][ T5497] ? __cfi_mutex_unlock+0x10/0x10 [ 411.395064][ T5497] ? __cfi_device_cmp+0x10/0x10 [ 411.399899][ T5497] ? masq_device_event+0xd0/0xd0 [ 411.405013][ T5497] addrconf_notify+0x39f/0xe40 [ 411.409762][ T5497] ? ip6mr_device_event+0x1e0/0x200 [ 411.414961][ T5497] raw_notifier_call_chain+0xa1/0x110 [ 411.420318][ T5497] __dev_notify_flags+0x28f/0x500 [ 411.425320][ T5497] ? __cfi___dev_notify_flags+0x10/0x10 [ 411.430843][ T5497] ? __dev_change_flags+0x4cc/0x6b0 [ 411.436024][ T5497] ? __cfi___dev_change_flags+0x10/0x10 [ 411.441548][ T5497] dev_change_flags+0xe8/0x1a0 [ 411.446288][ T5497] dev_ifsioc+0x159/0xed0 [ 411.450596][ T5497] ? dev_ioctl+0xd10/0xd10 [ 411.454989][ T5497] ? __mutex_lock_slowpath+0xe/0x10 [ 411.460183][ T5497] ? mutex_lock+0xf8/0x1a0 [ 411.464577][ T5497] ? __cfi_mutex_lock+0x10/0x10 [ 411.469405][ T5497] ? dev_get_by_name_rcu+0xe5/0x130 [ 411.474589][ T5497] dev_ioctl+0x556/0xd10 [ 411.478815][ T5497] sock_do_ioctl+0x23f/0x310 [ 411.483411][ T5497] ? sock_show_fdinfo+0xb0/0xb0 [ 411.488244][ T5497] ? selinux_file_ioctl+0x377/0x480 [ 411.493514][ T5497] sock_ioctl+0x4d8/0x6e0 [ 411.497823][ T5497] ? __cfi_sock_ioctl+0x10/0x10 [ 411.502659][ T5497] ? __fget_files+0x2d5/0x330 [ 411.507314][ T5497] ? security_file_ioctl+0x95/0xc0 [ 411.512405][ T5497] ? __cfi_sock_ioctl+0x10/0x10 [ 411.517235][ T5497] __se_sys_ioctl+0x12f/0x1b0 [ 411.521890][ T5497] __x64_sys_ioctl+0x7b/0x90 [ 411.526461][ T5497] x64_sys_call+0x58b/0x9a0 [ 411.530953][ T5497] do_syscall_64+0x4c/0xa0 [ 411.535369][ T5497] ? clear_bhb_loop+0x30/0x80 [ 411.540033][ T5497] ? clear_bhb_loop+0x30/0x80 [ 411.544704][ T5497] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 411.550588][ T5497] RIP: 0033:0x7fd750d8ebe9 [ 411.554983][ T5497] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 411.574574][ T5497] RSP: 002b:00007fd751c5e038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 411.582969][ T5497] RAX: ffffffffffffffda RBX: 00007fd750fc5fa0 RCX: 00007fd750d8ebe9 [ 411.590935][ T5497] RDX: 0000200000000040 RSI: 0000000000008914 RDI: 0000000000000008 [ 411.598889][ T5497] RBP: 00007fd751c5e090 R08: 0000000000000000 R09: 0000000000000000 [ 411.606839][ T5497] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 411.614792][ T5497] R13: 00007fd750fc6038 R14: 00007fd750fc5fa0 R15: 00007ffe465cf2d8 [ 411.622747][ T5497] [ 411.764599][ T28] audit: type=1400 audit(1756974260.285:139): avc: denied { create } for pid=5498 comm="syz.1.1461" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=decnet_socket permissive=1 [ 412.349550][ T5515] device syzkaller0 entered promiscuous mode [ 412.764006][ T5524] FAULT_INJECTION: forcing a failure. [ 412.764006][ T5524] name failslab, interval 1, probability 0, space 0, times 0 [ 412.776829][ T5524] CPU: 0 PID: 5524 Comm: syz.5.1467 Not tainted syzkaller #0 [ 412.784206][ T5524] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 412.794244][ T5524] Call Trace: [ 412.797521][ T5524] [ 412.800450][ T5524] __dump_stack+0x21/0x24 [ 412.804779][ T5524] dump_stack_lvl+0xee/0x150 [ 412.809374][ T5524] ? __cfi_dump_stack_lvl+0x8/0x8 [ 412.814410][ T5524] ? avc_has_perm_noaudit+0x2f4/0x460 [ 412.819784][ T5524] dump_stack+0x15/0x24 [ 412.823939][ T5524] should_fail_ex+0x3d4/0x520 [ 412.828616][ T5524] __should_failslab+0xac/0xf0 [ 412.833376][ T5524] ? qdisc_alloc+0x79/0x780 [ 412.837873][ T5524] should_failslab+0x9/0x20 [ 412.842367][ T5524] __kmem_cache_alloc_node+0x3d/0x2c0 [ 412.847739][ T5524] ? qdisc_alloc+0x79/0x780 [ 412.852233][ T5524] __kmalloc_node+0xa1/0x1e0 [ 412.856820][ T5524] qdisc_alloc+0x79/0x780 [ 412.861150][ T5524] ? vlan_device_event+0x49e/0x1ba0 [ 412.866343][ T5524] ? mutex_unlock+0x89/0x220 [ 412.870934][ T5524] ? br_device_event+0x15f/0x770 [ 412.875868][ T5524] qdisc_create_dflt+0x6b/0x3b0 [ 412.880709][ T5524] dev_activate+0x12d/0x1040 [ 412.885294][ T5524] __dev_open+0x3ce/0x4f0 [ 412.889616][ T5524] ? dev_open+0x230/0x230 [ 412.893938][ T5524] ? _raw_spin_unlock_bh+0x50/0x60 [ 412.899041][ T5524] ? dev_set_rx_mode+0x223/0x2c0 [ 412.903971][ T5524] ? __kasan_check_read+0x11/0x20 [ 412.908997][ T5524] __dev_change_flags+0x21b/0x6b0 [ 412.914028][ T5524] ? __cfi___dev_change_flags+0x10/0x10 [ 412.919572][ T5524] dev_change_flags+0x88/0x1a0 [ 412.924329][ T5524] dev_ifsioc+0x159/0xed0 [ 412.928654][ T5524] ? dev_ioctl+0xd10/0xd10 [ 412.933067][ T5524] ? __kasan_check_write+0x14/0x20 [ 412.938178][ T5524] ? mutex_lock+0x8d/0x1a0 [ 412.942585][ T5524] ? __cfi_mutex_lock+0x10/0x10 [ 412.947433][ T5524] ? dev_get_by_name_rcu+0xe5/0x130 [ 412.952629][ T5524] dev_ioctl+0x556/0xd10 [ 412.956868][ T5524] sock_do_ioctl+0x23f/0x310 [ 412.961463][ T5524] ? sock_show_fdinfo+0xb0/0xb0 [ 412.966316][ T5524] ? selinux_file_ioctl+0x377/0x480 [ 412.971521][ T5524] sock_ioctl+0x4d8/0x6e0 [ 412.975882][ T5524] ? __cfi_sock_ioctl+0x10/0x10 [ 412.980731][ T5524] ? __fget_files+0x2d5/0x330 [ 412.985401][ T5524] ? security_file_ioctl+0x95/0xc0 [ 412.990595][ T5524] ? __cfi_sock_ioctl+0x10/0x10 [ 412.995445][ T5524] __se_sys_ioctl+0x12f/0x1b0 [ 413.000114][ T5524] __x64_sys_ioctl+0x7b/0x90 [ 413.004785][ T5524] x64_sys_call+0x58b/0x9a0 [ 413.009284][ T5524] do_syscall_64+0x4c/0xa0 [ 413.013693][ T5524] ? clear_bhb_loop+0x30/0x80 [ 413.018364][ T5524] ? clear_bhb_loop+0x30/0x80 [ 413.023036][ T5524] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 413.028926][ T5524] RIP: 0033:0x7ff8fc98ebe9 [ 413.033337][ T5524] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 413.052938][ T5524] RSP: 002b:00007ff8fd766038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 413.061361][ T5524] RAX: ffffffffffffffda RBX: 00007ff8fcbc5fa0 RCX: 00007ff8fc98ebe9 [ 413.069341][ T5524] RDX: 0000200000000080 RSI: 0000000000008914 RDI: 0000000000000007 [ 413.077319][ T5524] RBP: 00007ff8fd766090 R08: 0000000000000000 R09: 0000000000000000 [ 413.085299][ T5524] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 413.093268][ T5524] R13: 00007ff8fcbc6038 R14: 00007ff8fcbc5fa0 R15: 00007ffe469e8b88 [ 413.101682][ T5524] [ 413.107861][ T5524] syzkaller0: default qdisc (pfifo_fast) fail, fallback to noqueue [ 413.120291][ T5524] device syzkaller0 entered promiscuous mode [ 415.193650][ T5559] device pim6reg1 entered promiscuous mode [ 415.529567][ T5569] FAULT_INJECTION: forcing a failure. [ 415.529567][ T5569] name failslab, interval 1, probability 0, space 0, times 0 [ 415.581135][ T5569] CPU: 1 PID: 5569 Comm: syz.5.1482 Not tainted syzkaller #0 [ 415.588546][ T5569] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 415.598598][ T5569] Call Trace: [ 415.601872][ T5569] [ 415.604795][ T5569] __dump_stack+0x21/0x24 [ 415.609118][ T5569] dump_stack_lvl+0xee/0x150 [ 415.613716][ T5569] ? __cfi_dump_stack_lvl+0x8/0x8 [ 415.618754][ T5569] ? __kasan_check_write+0x14/0x20 [ 415.623873][ T5569] dump_stack+0x15/0x24 [ 415.628022][ T5569] should_fail_ex+0x3d4/0x520 [ 415.632694][ T5569] ? getname_flags+0xb9/0x500 [ 415.637373][ T5569] __should_failslab+0xac/0xf0 [ 415.642131][ T5569] should_failslab+0x9/0x20 [ 415.646623][ T5569] kmem_cache_alloc+0x3b/0x330 [ 415.651385][ T5569] getname_flags+0xb9/0x500 [ 415.655898][ T5569] ? debug_smp_processor_id+0x17/0x20 [ 415.661267][ T5569] __x64_sys_mkdirat+0x7c/0xa0 [ 415.666024][ T5569] x64_sys_call+0x73d/0x9a0 [ 415.670525][ T5569] do_syscall_64+0x4c/0xa0 [ 415.674935][ T5569] ? clear_bhb_loop+0x30/0x80 [ 415.679702][ T5569] ? clear_bhb_loop+0x30/0x80 [ 415.684383][ T5569] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 415.690269][ T5569] RIP: 0033:0x7ff8fc98ebe9 [ 415.694675][ T5569] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 415.714277][ T5569] RSP: 002b:00007ff8fd766038 EFLAGS: 00000246 ORIG_RAX: 0000000000000102 [ 415.722689][ T5569] RAX: ffffffffffffffda RBX: 00007ff8fcbc5fa0 RCX: 00007ff8fc98ebe9 [ 415.730667][ T5569] RDX: 00000000000001ff RSI: 0000200000000000 RDI: ffffffffffffff9c [ 415.738736][ T5569] RBP: 00007ff8fd766090 R08: 0000000000000000 R09: 0000000000000000 [ 415.746702][ T5569] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 415.754669][ T5569] R13: 00007ff8fcbc6038 R14: 00007ff8fcbc5fa0 R15: 00007ffe469e8b88 [ 415.762642][ T5569] [ 417.942124][ T5608] device veth0_vlan left promiscuous mode [ 418.000810][ T5608] device veth0_vlan entered promiscuous mode [ 418.062421][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 418.086623][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 418.098578][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 420.524281][ T5671] device veth0_vlan left promiscuous mode [ 420.636605][ T5671] device veth0_vlan entered promiscuous mode [ 420.889018][ T346] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 420.949043][ T346] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 421.092148][ T346] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 421.793642][ T5702] FAULT_INJECTION: forcing a failure. [ 421.793642][ T5702] name failslab, interval 1, probability 0, space 0, times 0 [ 421.912167][ T5702] CPU: 0 PID: 5702 Comm: syz.0.1520 Not tainted syzkaller #0 [ 421.919578][ T5702] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 421.929713][ T5702] Call Trace: [ 421.932991][ T5702] [ 421.935912][ T5702] __dump_stack+0x21/0x24 [ 421.940234][ T5702] dump_stack_lvl+0xee/0x150 [ 421.944836][ T5702] ? __cfi_dump_stack_lvl+0x8/0x8 [ 421.949868][ T5702] ? __cfi_avc_has_perm_noaudit+0x10/0x10 [ 421.955593][ T5702] dump_stack+0x15/0x24 [ 421.959740][ T5702] should_fail_ex+0x3d4/0x520 [ 421.964415][ T5702] __should_failslab+0xac/0xf0 [ 421.969190][ T5702] should_failslab+0x9/0x20 [ 421.973682][ T5702] kmem_cache_alloc_node+0x42/0x340 [ 421.978875][ T5702] ? __alloc_skb+0xea/0x4b0 [ 421.983374][ T5702] __alloc_skb+0xea/0x4b0 [ 421.987700][ T5702] alloc_skb_with_frags+0xa8/0x620 [ 421.992812][ T5702] sock_alloc_send_pskb+0x853/0x980 [ 421.998005][ T5702] ? __cfi_sock_alloc_send_pskb+0x10/0x10 [ 422.003716][ T5702] ? stack_trace_save+0x98/0xe0 [ 422.008567][ T5702] tun_get_user+0x4e5/0x3320 [ 422.013151][ T5702] ? kstrtoull+0x137/0x1d0 [ 422.017561][ T5702] ? tun_do_read+0x1c20/0x1c20 [ 422.022320][ T5702] ? __kasan_check_write+0x14/0x20 [ 422.027432][ T5702] ? ref_tracker_alloc+0x30f/0x430 [ 422.032540][ T5702] ? __cfi_ref_tracker_alloc+0x10/0x10 [ 422.037996][ T5702] ? avc_policy_seqno+0x1b/0x70 [ 422.042845][ T5702] ? selinux_file_permission+0x2a5/0x510 [ 422.048487][ T5702] tun_chr_write_iter+0x1fb/0x300 [ 422.053524][ T5702] vfs_write+0x5db/0xca0 [ 422.057776][ T5702] ? slab_free_freelist_hook+0xc2/0x190 [ 422.063336][ T5702] ? __cfi_vfs_write+0x10/0x10 [ 422.068110][ T5702] ? __fget_files+0x2d5/0x330 [ 422.072787][ T5702] ? __fdget_pos+0x1f2/0x380 [ 422.077378][ T5702] ? ksys_write+0x71/0x240 [ 422.081799][ T5702] ksys_write+0x140/0x240 [ 422.086129][ T5702] ? __cfi_ksys_write+0x10/0x10 [ 422.090979][ T5702] ? debug_smp_processor_id+0x17/0x20 [ 422.096350][ T5702] __x64_sys_write+0x7b/0x90 [ 422.100949][ T5702] x64_sys_call+0x27b/0x9a0 [ 422.105447][ T5702] do_syscall_64+0x4c/0xa0 [ 422.109854][ T5702] ? clear_bhb_loop+0x30/0x80 [ 422.114524][ T5702] ? clear_bhb_loop+0x30/0x80 [ 422.119194][ T5702] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 422.125087][ T5702] RIP: 0033:0x7f9492d8ebe9 [ 422.129493][ T5702] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 422.149098][ T5702] RSP: 002b:00007f9493cf9038 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 422.157513][ T5702] RAX: ffffffffffffffda RBX: 00007f9492fc5fa0 RCX: 00007f9492d8ebe9 [ 422.165567][ T5702] RDX: 000000000000fdef RSI: 0000200000000000 RDI: 00000000000000c8 [ 422.173550][ T5702] RBP: 00007f9493cf9090 R08: 0000000000000000 R09: 0000000000000000 [ 422.181531][ T5702] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 422.189502][ T5702] R13: 00007f9492fc6038 R14: 00007f9492fc5fa0 R15: 00007ffd806e6ee8 [ 422.197560][ T5702] [ 422.343338][ T5706] FAULT_INJECTION: forcing a failure. [ 422.343338][ T5706] name failslab, interval 1, probability 0, space 0, times 0 [ 422.492162][ T5706] CPU: 1 PID: 5706 Comm: syz.1.1523 Not tainted syzkaller #0 [ 422.499574][ T5706] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 422.509629][ T5706] Call Trace: [ 422.512908][ T5706] [ 422.515829][ T5706] __dump_stack+0x21/0x24 [ 422.520160][ T5706] dump_stack_lvl+0xee/0x150 [ 422.524772][ T5706] ? __cfi_dump_stack_lvl+0x8/0x8 [ 422.529807][ T5706] ? stack_trace_save+0x98/0xe0 [ 422.534659][ T5706] dump_stack+0x15/0x24 [ 422.538818][ T5706] should_fail_ex+0x3d4/0x520 [ 422.543495][ T5706] __should_failslab+0xac/0xf0 [ 422.548265][ T5706] should_failslab+0x9/0x20 [ 422.552772][ T5706] kmem_cache_alloc_node+0x42/0x340 [ 422.557967][ T5706] ? dup_task_struct+0x5a/0x790 [ 422.562822][ T5706] dup_task_struct+0x5a/0x790 [ 422.567499][ T5706] ? __kasan_check_write+0x14/0x20 [ 422.572614][ T5706] ? recalc_sigpending+0x168/0x1c0 [ 422.577729][ T5706] copy_process+0x5b8/0x3480 [ 422.582321][ T5706] ? __cfi_kstrtouint_from_user+0x10/0x10 [ 422.588055][ T5706] ? __kasan_check_write+0x14/0x20 [ 422.593174][ T5706] ? idle_dummy+0x10/0x10 [ 422.597514][ T5706] kernel_clone+0x23a/0x810 [ 422.602017][ T5706] ? __cfi_kernel_clone+0x10/0x10 [ 422.607053][ T5706] ? __kasan_check_write+0x14/0x20 [ 422.612169][ T5706] ? mutex_unlock+0x89/0x220 [ 422.616757][ T5706] __x64_sys_clone+0x168/0x1b0 [ 422.621524][ T5706] ? __cfi___x64_sys_clone+0x10/0x10 [ 422.626819][ T5706] ? fpregs_assert_state_consistent+0xb1/0xe0 [ 422.632903][ T5706] x64_sys_call+0x990/0x9a0 [ 422.637408][ T5706] do_syscall_64+0x4c/0xa0 [ 422.641819][ T5706] ? clear_bhb_loop+0x30/0x80 [ 422.646491][ T5706] ? clear_bhb_loop+0x30/0x80 [ 422.651173][ T5706] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 422.657060][ T5706] RIP: 0033:0x7f850cd8ebe9 [ 422.661481][ T5706] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 422.681086][ T5706] RSP: 002b:00007f850dbbdfe8 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 422.689505][ T5706] RAX: ffffffffffffffda RBX: 00007f850cfc5fa0 RCX: 00007f850cd8ebe9 [ 422.697478][ T5706] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00000000640c7000 [ 422.705447][ T5706] RBP: 00007f850dbbe090 R08: 0000000000000000 R09: 0000000000000000 [ 422.713594][ T5706] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000001 [ 422.721577][ T5706] R13: 00007f850cfc6038 R14: 00007f850cfc5fa0 R15: 00007ffc1cf953d8 [ 422.729553][ T5706] [ 431.232649][ T5830] device pim6reg1 entered promiscuous mode [ 434.213344][ T5869] device veth1_macvtap left promiscuous mode [ 439.725362][ T5949] FAULT_INJECTION: forcing a failure. [ 439.725362][ T5949] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 439.851560][ T5949] CPU: 1 PID: 5949 Comm: syz.6.1599 Not tainted syzkaller #0 [ 439.858970][ T5949] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 439.869023][ T5949] Call Trace: [ 439.872294][ T5949] [ 439.875224][ T5949] __dump_stack+0x21/0x24 [ 439.879548][ T5949] dump_stack_lvl+0xee/0x150 [ 439.884133][ T5949] ? __cfi_dump_stack_lvl+0x8/0x8 [ 439.889156][ T5949] dump_stack+0x15/0x24 [ 439.893302][ T5949] should_fail_ex+0x3d4/0x520 [ 439.897975][ T5949] should_fail+0xb/0x10 [ 439.902125][ T5949] should_fail_usercopy+0x1a/0x20 [ 439.907145][ T5949] _copy_to_user+0x1e/0x90 [ 439.911555][ T5949] simple_read_from_buffer+0xe9/0x160 [ 439.916918][ T5949] proc_fail_nth_read+0x19a/0x210 [ 439.921934][ T5949] ? __cfi_proc_fail_nth_read+0x10/0x10 [ 439.927481][ T5949] ? security_file_permission+0x94/0xb0 [ 439.933021][ T5949] ? __cfi_proc_fail_nth_read+0x10/0x10 [ 439.938561][ T5949] vfs_read+0x26e/0x8c0 [ 439.942720][ T5949] ? __cfi_vfs_read+0x10/0x10 [ 439.947398][ T5949] ? __kasan_check_write+0x14/0x20 [ 439.952515][ T5949] ? mutex_lock+0x8d/0x1a0 [ 439.956936][ T5949] ? __cfi_mutex_lock+0x10/0x10 [ 439.961780][ T5949] ? __fdget_pos+0x2cd/0x380 [ 439.966354][ T5949] ? ksys_read+0x71/0x240 [ 439.970673][ T5949] ksys_read+0x140/0x240 [ 439.974915][ T5949] ? __cfi_ksys_read+0x10/0x10 [ 439.979661][ T5949] ? fpregs_restore_userregs+0x128/0x260 [ 439.985295][ T5949] __x64_sys_read+0x7b/0x90 [ 439.989782][ T5949] x64_sys_call+0x2f/0x9a0 [ 439.994179][ T5949] do_syscall_64+0x4c/0xa0 [ 439.998570][ T5949] ? clear_bhb_loop+0x30/0x80 [ 440.003227][ T5949] ? clear_bhb_loop+0x30/0x80 [ 440.007884][ T5949] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 440.013757][ T5949] RIP: 0033:0x7fd750d8d5fc [ 440.018149][ T5949] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 93 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 ef 93 02 00 48 [ 440.037732][ T5949] RSP: 002b:00007fd751c5e030 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 440.046133][ T5949] RAX: ffffffffffffffda RBX: 00007fd750fc5fa0 RCX: 00007fd750d8d5fc [ 440.054085][ T5949] RDX: 000000000000000f RSI: 00007fd751c5e0a0 RDI: 0000000000000005 [ 440.062037][ T5949] RBP: 00007fd751c5e090 R08: 0000000000000000 R09: 0000000000000000 [ 440.070013][ T5949] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 440.077964][ T5949] R13: 00007fd750fc6038 R14: 00007fd750fc5fa0 R15: 00007ffe465cf2d8 [ 440.085921][ T5949] [ 442.551138][ T6003] device pim6reg1 entered promiscuous mode [ 443.846572][ T6019] device sit0 entered promiscuous mode [ 449.769210][ T6111] device pim6reg1 entered promiscuous mode [ 453.213028][ T6159] device pim6reg1 entered promiscuous mode [ 454.494583][ T6170] device pim6reg1 entered promiscuous mode [ 455.689606][ T6186] device sit0 entered promiscuous mode [ 459.344637][ T6255] device pim6reg1 entered promiscuous mode [ 462.212183][ T6303] device pim6reg1 entered promiscuous mode [ 464.581882][ T6336] device pim6reg1 entered promiscuous mode [ 476.065456][ T6486] device pim6reg1 entered promiscuous mode [ 489.715568][ T6665] device pim6reg1 entered promiscuous mode [ 492.544500][ T6694] syzkaller0: create flow: hash 3400760323 index 1 [ 493.175416][ T6] syzkaller0: tun_net_xmit 76 [ 493.180353][ T6] syzkaller0: tun_net_xmit 48 [ 493.233759][ T6] syzkaller0: tun_net_xmit 76 [ 493.298587][ T6692] syzkaller0: delete flow: hash 3400760323 index 1 [ 497.680212][ T39] syzkaller0: tun_net_xmit 76 [ 497.685232][ T39] syzkaller0: tun_net_xmit 48 [ 497.727917][ T2409] syzkaller0: tun_net_xmit 76 [ 497.859582][ T39] syzkaller0: tun_net_xmit 76 [ 500.603302][ T6800] device pim6reg1 entered promiscuous mode [ 506.333567][ T6855] FAULT_INJECTION: forcing a failure. [ 506.333567][ T6855] name failslab, interval 1, probability 0, space 0, times 0 [ 506.558340][ T6855] CPU: 0 PID: 6855 Comm: syz.6.1871 Not tainted syzkaller #0 [ 506.565751][ T6855] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 506.575811][ T6855] Call Trace: [ 506.579092][ T6855] [ 506.582017][ T6855] __dump_stack+0x21/0x24 [ 506.586362][ T6855] dump_stack_lvl+0xee/0x150 [ 506.590948][ T6855] ? __cfi_dump_stack_lvl+0x8/0x8 [ 506.595976][ T6855] ? stack_trace_save+0x98/0xe0 [ 506.600828][ T6855] dump_stack+0x15/0x24 [ 506.604966][ T6855] should_fail_ex+0x3d4/0x520 [ 506.609631][ T6855] __should_failslab+0xac/0xf0 [ 506.614389][ T6855] should_failslab+0x9/0x20 [ 506.618872][ T6855] kmem_cache_alloc_node+0x42/0x340 [ 506.624053][ T6855] ? dup_task_struct+0x5a/0x790 [ 506.628887][ T6855] ? cgroup_freezing+0x86/0xb0 [ 506.633628][ T6855] dup_task_struct+0x5a/0x790 [ 506.638289][ T6855] ? __kasan_check_write+0x14/0x20 [ 506.643382][ T6855] ? recalc_sigpending+0x168/0x1c0 [ 506.648474][ T6855] copy_process+0x5b8/0x3480 [ 506.653049][ T6855] ? __cfi_kstrtouint_from_user+0x10/0x10 [ 506.658752][ T6855] ? __kasan_check_write+0x14/0x20 [ 506.663848][ T6855] ? idle_dummy+0x10/0x10 [ 506.668164][ T6855] kernel_clone+0x23a/0x810 [ 506.672914][ T6855] ? __cfi_kernel_clone+0x10/0x10 [ 506.677949][ T6855] ? __kasan_check_write+0x14/0x20 [ 506.683048][ T6855] ? mutex_unlock+0x89/0x220 [ 506.687619][ T6855] __x64_sys_clone+0x168/0x1b0 [ 506.692370][ T6855] ? __cfi___x64_sys_clone+0x10/0x10 [ 506.697662][ T6855] ? fpregs_assert_state_consistent+0xb1/0xe0 [ 506.703710][ T6855] x64_sys_call+0x990/0x9a0 [ 506.708211][ T6855] do_syscall_64+0x4c/0xa0 [ 506.712638][ T6855] ? clear_bhb_loop+0x30/0x80 [ 506.717401][ T6855] ? clear_bhb_loop+0x30/0x80 [ 506.722067][ T6855] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 506.727945][ T6855] RIP: 0033:0x7fd750d8ebe9 [ 506.732347][ T6855] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 506.751933][ T6855] RSP: 002b:00007fd751c5dfe8 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 506.760339][ T6855] RAX: ffffffffffffffda RBX: 00007fd750fc5fa0 RCX: 00007fd750d8ebe9 [ 506.768324][ T6855] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000044000000 [ 506.776281][ T6855] RBP: 00007fd751c5e090 R08: 0000000000000000 R09: 0000000000000000 [ 506.784234][ T6855] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000001 [ 506.792205][ T6855] R13: 00007fd750fc6038 R14: 00007fd750fc5fa0 R15: 00007ffe465cf2d8 [ 506.800162][ T6855] [ 509.156669][ T6893] FAULT_INJECTION: forcing a failure. [ 509.156669][ T6893] name failslab, interval 1, probability 0, space 0, times 0 [ 509.169324][ T6893] CPU: 0 PID: 6893 Comm: syz.2.1884 Not tainted syzkaller #0 [ 509.176697][ T6893] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 509.186750][ T6893] Call Trace: [ 509.190030][ T6893] [ 509.192951][ T6893] __dump_stack+0x21/0x24 [ 509.197276][ T6893] dump_stack_lvl+0xee/0x150 [ 509.201865][ T6893] ? __cfi_dump_stack_lvl+0x8/0x8 [ 509.206890][ T6893] ? __kasan_check_read+0x11/0x20 [ 509.211922][ T6893] ? call_rcu+0xb83/0xf90 [ 509.216246][ T6893] dump_stack+0x15/0x24 [ 509.220387][ T6893] should_fail_ex+0x3d4/0x520 [ 509.225066][ T6893] ? fdb_create+0x37/0xdd0 [ 509.229483][ T6893] __should_failslab+0xac/0xf0 [ 509.234247][ T6893] should_failslab+0x9/0x20 [ 509.238743][ T6893] kmem_cache_alloc+0x3b/0x330 [ 509.243513][ T6893] fdb_create+0x37/0xdd0 [ 509.247751][ T6893] ? br_fdb_find_rcu+0x30/0x30 [ 509.252508][ T6893] ? fdb_delete_local+0x3c8/0x480 [ 509.257533][ T6893] fdb_add_local+0x140/0x260 [ 509.262122][ T6893] br_fdb_changeaddr+0x187/0x1c0 [ 509.267047][ T6893] br_device_event+0x33c/0x770 [ 509.271795][ T6893] ? __cfi_br_device_event+0x10/0x10 [ 509.277059][ T6893] ? packet_notifier+0x8cf/0x8e0 [ 509.281978][ T6893] ? ip6mr_device_event+0x1e0/0x200 [ 509.287167][ T6893] raw_notifier_call_chain+0xa1/0x110 [ 509.292522][ T6893] dev_set_mac_address+0x329/0x430 [ 509.297644][ T6893] ? __cfi_dev_set_mac_address+0x10/0x10 [ 509.303254][ T6893] dev_set_mac_address_user+0x31/0x50 [ 509.308604][ T6893] dev_ifsioc+0x770/0xed0 [ 509.312919][ T6893] ? dev_ioctl+0xd10/0xd10 [ 509.317315][ T6893] ? __kasan_check_write+0x14/0x20 [ 509.322413][ T6893] ? mutex_lock+0x8d/0x1a0 [ 509.326807][ T6893] ? __cfi_mutex_lock+0x10/0x10 [ 509.331641][ T6893] ? dev_get_by_name_rcu+0xe5/0x130 [ 509.336823][ T6893] dev_ioctl+0x556/0xd10 [ 509.341047][ T6893] sock_do_ioctl+0x23f/0x310 [ 509.345629][ T6893] ? sock_show_fdinfo+0xb0/0xb0 [ 509.350460][ T6893] ? selinux_file_ioctl+0x377/0x480 [ 509.355641][ T6893] sock_ioctl+0x4d8/0x6e0 [ 509.359962][ T6893] ? __cfi_sock_ioctl+0x10/0x10 [ 509.364794][ T6893] ? __fget_files+0x2d5/0x330 [ 509.369449][ T6893] ? security_file_ioctl+0x95/0xc0 [ 509.374538][ T6893] ? __cfi_sock_ioctl+0x10/0x10 [ 509.379366][ T6893] __se_sys_ioctl+0x12f/0x1b0 [ 509.384193][ T6893] __x64_sys_ioctl+0x7b/0x90 [ 509.388757][ T6893] x64_sys_call+0x58b/0x9a0 [ 509.393240][ T6893] do_syscall_64+0x4c/0xa0 [ 509.397635][ T6893] ? clear_bhb_loop+0x30/0x80 [ 509.402289][ T6893] ? clear_bhb_loop+0x30/0x80 [ 509.406947][ T6893] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 509.412829][ T6893] RIP: 0033:0x7fa39378ebe9 [ 509.417221][ T6893] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 509.436802][ T6893] RSP: 002b:00007fa394677038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 509.445194][ T6893] RAX: ffffffffffffffda RBX: 00007fa3939c5fa0 RCX: 00007fa39378ebe9 [ 509.453404][ T6893] RDX: 0000200000000000 RSI: 0000000000008924 RDI: 000000000000000a [ 509.461352][ T6893] RBP: 00007fa394677090 R08: 0000000000000000 R09: 0000000000000000 [ 509.469299][ T6893] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 509.477245][ T6893] R13: 00007fa3939c6038 R14: 00007fa3939c5fa0 R15: 00007ffed95b1038 [ 509.485200][ T6893] [ 510.763041][ T28] audit: type=1400 audit(1756974359.285:140): avc: denied { create } for pid=6929 comm="syz.0.1896" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 514.973066][ T7000] device pim6reg1 entered promiscuous mode [ 517.109028][ T7051] device pim6reg1 entered promiscuous mode [ 518.650057][ T7067] FAULT_INJECTION: forcing a failure. [ 518.650057][ T7067] name failslab, interval 1, probability 0, space 0, times 0 [ 518.662721][ T7067] CPU: 1 PID: 7067 Comm: syz.0.1942 Not tainted syzkaller #0 [ 518.670091][ T7067] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 518.680141][ T7067] Call Trace: [ 518.683414][ T7067] [ 518.686334][ T7067] __dump_stack+0x21/0x24 [ 518.690656][ T7067] dump_stack_lvl+0xee/0x150 [ 518.695245][ T7067] ? __cfi_dump_stack_lvl+0x8/0x8 [ 518.700269][ T7067] ? __kasan_check_read+0x11/0x20 [ 518.705299][ T7067] ? call_rcu+0xb83/0xf90 [ 518.709624][ T7067] dump_stack+0x15/0x24 [ 518.713769][ T7067] should_fail_ex+0x3d4/0x520 [ 518.718444][ T7067] ? fdb_create+0x37/0xdd0 [ 518.722854][ T7067] __should_failslab+0xac/0xf0 [ 518.727660][ T7067] should_failslab+0x9/0x20 [ 518.732182][ T7067] kmem_cache_alloc+0x3b/0x330 [ 518.736994][ T7067] fdb_create+0x37/0xdd0 [ 518.741241][ T7067] ? br_fdb_find_rcu+0x30/0x30 [ 518.746001][ T7067] ? fdb_delete_local+0x3c8/0x480 [ 518.751009][ T7067] fdb_add_local+0x140/0x260 [ 518.755578][ T7067] br_fdb_changeaddr+0x187/0x1c0 [ 518.760510][ T7067] br_device_event+0x33c/0x770 [ 518.765267][ T7067] ? __cfi_br_device_event+0x10/0x10 [ 518.770527][ T7067] ? packet_notifier+0x8cf/0x8e0 [ 518.775444][ T7067] ? ip6mr_device_event+0x1e0/0x200 [ 518.780658][ T7067] raw_notifier_call_chain+0xa1/0x110 [ 518.786031][ T7067] dev_set_mac_address+0x329/0x430 [ 518.791119][ T7067] ? __cfi_dev_set_mac_address+0x10/0x10 [ 518.796742][ T7067] dev_set_mac_address_user+0x31/0x50 [ 518.802094][ T7067] dev_ifsioc+0x770/0xed0 [ 518.806508][ T7067] ? dev_ioctl+0xd10/0xd10 [ 518.810995][ T7067] ? __kasan_check_write+0x14/0x20 [ 518.816088][ T7067] ? mutex_lock+0x8d/0x1a0 [ 518.820489][ T7067] ? __cfi_mutex_lock+0x10/0x10 [ 518.825322][ T7067] ? dev_get_by_name_rcu+0xe5/0x130 [ 518.830503][ T7067] dev_ioctl+0x556/0xd10 [ 518.834727][ T7067] sock_do_ioctl+0x23f/0x310 [ 518.839295][ T7067] ? sock_show_fdinfo+0xb0/0xb0 [ 518.844126][ T7067] ? selinux_file_ioctl+0x377/0x480 [ 518.849321][ T7067] sock_ioctl+0x4d8/0x6e0 [ 518.853631][ T7067] ? __cfi_sock_ioctl+0x10/0x10 [ 518.858468][ T7067] ? __fget_files+0x2d5/0x330 [ 518.863124][ T7067] ? security_file_ioctl+0x95/0xc0 [ 518.868211][ T7067] ? __cfi_sock_ioctl+0x10/0x10 [ 518.873054][ T7067] __se_sys_ioctl+0x12f/0x1b0 [ 518.877713][ T7067] __x64_sys_ioctl+0x7b/0x90 [ 518.882280][ T7067] x64_sys_call+0x58b/0x9a0 [ 518.886762][ T7067] do_syscall_64+0x4c/0xa0 [ 518.891155][ T7067] ? clear_bhb_loop+0x30/0x80 [ 518.895812][ T7067] ? clear_bhb_loop+0x30/0x80 [ 518.900468][ T7067] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 518.906355][ T7067] RIP: 0033:0x7f9492d8ebe9 [ 518.910749][ T7067] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 518.930329][ T7067] RSP: 002b:00007f9493cf9038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 518.938720][ T7067] RAX: ffffffffffffffda RBX: 00007f9492fc5fa0 RCX: 00007f9492d8ebe9 [ 518.946675][ T7067] RDX: 0000200000000000 RSI: 0000000000008924 RDI: 000000000000000a [ 518.954624][ T7067] RBP: 00007f9493cf9090 R08: 0000000000000000 R09: 0000000000000000 [ 518.962572][ T7067] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 518.970521][ T7067] R13: 00007f9492fc6038 R14: 00007f9492fc5fa0 R15: 00007ffd806e6ee8 [ 518.978473][ T7067] [ 521.603254][ T7112] device pim6reg1 entered promiscuous mode [ 527.052587][ T7203] syz.2.1984[7203] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 527.052661][ T7203] syz.2.1984[7203] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 529.218088][ T7255] device pim6reg1 entered promiscuous mode [ 532.537764][ T7283] device pim6reg1 entered promiscuous mode [ 533.632384][ T7318] device pim6reg1 entered promiscuous mode [ 534.231355][ T7325] FAULT_INJECTION: forcing a failure. [ 534.231355][ T7325] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 534.341275][ T7325] CPU: 0 PID: 7325 Comm: syz.2.2021 Not tainted syzkaller #0 [ 534.348687][ T7325] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 534.358826][ T7325] Call Trace: [ 534.362102][ T7325] [ 534.365028][ T7325] __dump_stack+0x21/0x24 [ 534.369358][ T7325] dump_stack_lvl+0xee/0x150 [ 534.373943][ T7325] ? __cfi_dump_stack_lvl+0x8/0x8 [ 534.378969][ T7325] dump_stack+0x15/0x24 [ 534.383115][ T7325] should_fail_ex+0x3d4/0x520 [ 534.387789][ T7325] should_fail+0xb/0x10 [ 534.391947][ T7325] should_fail_usercopy+0x1a/0x20 [ 534.396967][ T7325] _copy_to_user+0x1e/0x90 [ 534.401421][ T7325] simple_read_from_buffer+0xe9/0x160 [ 534.406788][ T7325] proc_fail_nth_read+0x19a/0x210 [ 534.411806][ T7325] ? __cfi_proc_fail_nth_read+0x10/0x10 [ 534.417349][ T7325] ? security_file_permission+0x94/0xb0 [ 534.422892][ T7325] ? __cfi_proc_fail_nth_read+0x10/0x10 [ 534.428432][ T7325] vfs_read+0x26e/0x8c0 [ 534.432586][ T7325] ? __cfi_vfs_read+0x10/0x10 [ 534.437263][ T7325] ? __kasan_check_write+0x14/0x20 [ 534.442374][ T7325] ? mutex_lock+0x8d/0x1a0 [ 534.446786][ T7325] ? __cfi_mutex_lock+0x10/0x10 [ 534.451642][ T7325] ? __fdget_pos+0x2cd/0x380 [ 534.456225][ T7325] ? ksys_read+0x71/0x240 [ 534.460550][ T7325] ksys_read+0x140/0x240 [ 534.464792][ T7325] ? __cfi_ksys_read+0x10/0x10 [ 534.469556][ T7325] ? fpregs_restore_userregs+0x128/0x260 [ 534.475193][ T7325] __x64_sys_read+0x7b/0x90 [ 534.479694][ T7325] x64_sys_call+0x2f/0x9a0 [ 534.484108][ T7325] do_syscall_64+0x4c/0xa0 [ 534.488515][ T7325] ? clear_bhb_loop+0x30/0x80 [ 534.493185][ T7325] ? clear_bhb_loop+0x30/0x80 [ 534.497901][ T7325] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 534.503791][ T7325] RIP: 0033:0x7fa39378d5fc [ 534.508203][ T7325] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 93 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 ef 93 02 00 48 [ 534.527893][ T7325] RSP: 002b:00007fa394677030 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 534.536327][ T7325] RAX: ffffffffffffffda RBX: 00007fa3939c5fa0 RCX: 00007fa39378d5fc [ 534.544315][ T7325] RDX: 000000000000000f RSI: 00007fa3946770a0 RDI: 0000000000000003 [ 534.552300][ T7325] RBP: 00007fa394677090 R08: 0000000000000000 R09: 0000000000000000 [ 534.560271][ T7325] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 534.568241][ T7325] R13: 00007fa3939c6038 R14: 00007fa3939c5fa0 R15: 00007ffed95b1038 [ 534.576305][ T7325] [ 535.488218][ T7345] FAULT_INJECTION: forcing a failure. [ 535.488218][ T7345] name failslab, interval 1, probability 0, space 0, times 0 [ 535.539032][ T7345] CPU: 1 PID: 7345 Comm: syz.0.2028 Not tainted syzkaller #0 [ 535.546544][ T7345] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 535.556687][ T7345] Call Trace: [ 535.560034][ T7345] [ 535.562965][ T7345] __dump_stack+0x21/0x24 [ 535.567290][ T7345] dump_stack_lvl+0xee/0x150 [ 535.571877][ T7345] ? __cfi_dump_stack_lvl+0x8/0x8 [ 535.576902][ T7345] dump_stack+0x15/0x24 [ 535.581050][ T7345] should_fail_ex+0x3d4/0x520 [ 535.585724][ T7345] ? security_inode_alloc+0x33/0x120 [ 535.591006][ T7345] __should_failslab+0xac/0xf0 [ 535.595766][ T7345] should_failslab+0x9/0x20 [ 535.600260][ T7345] kmem_cache_alloc+0x3b/0x330 [ 535.605020][ T7345] ? slab_pre_alloc_hook+0x30/0x1e0 [ 535.610214][ T7345] security_inode_alloc+0x33/0x120 [ 535.615318][ T7345] inode_init_always+0x6fc/0x960 [ 535.620247][ T7345] new_inode_pseudo+0xa2/0x1f0 [ 535.625003][ T7345] __sock_create+0x12c/0x7c0 [ 535.629592][ T7345] __sys_socketpair+0x218/0x5b0 [ 535.634443][ T7345] __x64_sys_socketpair+0x9b/0xb0 [ 535.639489][ T7345] x64_sys_call+0x6e/0x9a0 [ 535.643888][ T7345] do_syscall_64+0x4c/0xa0 [ 535.648286][ T7345] ? clear_bhb_loop+0x30/0x80 [ 535.652945][ T7345] ? clear_bhb_loop+0x30/0x80 [ 535.657608][ T7345] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 535.663479][ T7345] RIP: 0033:0x7f9492d8ebe9 [ 535.667871][ T7345] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 535.687715][ T7345] RSP: 002b:00007f9493cf9038 EFLAGS: 00000246 ORIG_RAX: 0000000000000035 [ 535.696109][ T7345] RAX: ffffffffffffffda RBX: 00007f9492fc5fa0 RCX: 00007f9492d8ebe9 [ 535.704061][ T7345] RDX: 0000000000000000 RSI: 0000000000000001 RDI: 000000000000000a [ 535.712009][ T7345] RBP: 00007f9493cf9090 R08: 0000000000000000 R09: 0000000000000000 [ 535.719956][ T7345] R10: 0000200000000000 R11: 0000000000000246 R12: 0000000000000001 [ 535.727903][ T7345] R13: 00007f9492fc6038 R14: 00007f9492fc5fa0 R15: 00007ffd806e6ee8 [ 535.735856][ T7345] [ 535.760271][ T7345] socket: no more sockets [ 537.836555][ T7394] device sit0 entered promiscuous mode [ 538.410688][ T7410] device pim6reg1 entered promiscuous mode [ 541.128696][ T7452] device pim6reg1 entered promiscuous mode [ 541.735740][ T7464] device pim6reg1 entered promiscuous mode [ 542.619978][ T7496] FAULT_INJECTION: forcing a failure. [ 542.619978][ T7496] name failslab, interval 1, probability 0, space 0, times 0 [ 542.702559][ T7496] CPU: 1 PID: 7496 Comm: syz.1.2075 Not tainted syzkaller #0 [ 542.709966][ T7496] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 542.720110][ T7496] Call Trace: [ 542.723394][ T7496] [ 542.726325][ T7496] __dump_stack+0x21/0x24 [ 542.730653][ T7496] dump_stack_lvl+0xee/0x150 [ 542.735260][ T7496] ? __cfi_dump_stack_lvl+0x8/0x8 [ 542.740313][ T7496] dump_stack+0x15/0x24 [ 542.744472][ T7496] should_fail_ex+0x3d4/0x520 [ 542.749166][ T7496] ? security_inode_alloc+0x33/0x120 [ 542.754459][ T7496] __should_failslab+0xac/0xf0 [ 542.759401][ T7496] should_failslab+0x9/0x20 [ 542.763902][ T7496] kmem_cache_alloc+0x3b/0x330 [ 542.768666][ T7496] ? slab_pre_alloc_hook+0x30/0x1e0 [ 542.773859][ T7496] security_inode_alloc+0x33/0x120 [ 542.778965][ T7496] inode_init_always+0x6fc/0x960 [ 542.783903][ T7496] new_inode_pseudo+0xa2/0x1f0 [ 542.788659][ T7496] __sock_create+0x12c/0x7c0 [ 542.793247][ T7496] __sys_socketpair+0x218/0x5b0 [ 542.798099][ T7496] __x64_sys_socketpair+0x9b/0xb0 [ 542.803129][ T7496] x64_sys_call+0x6e/0x9a0 [ 542.807546][ T7496] do_syscall_64+0x4c/0xa0 [ 542.811949][ T7496] ? clear_bhb_loop+0x30/0x80 [ 542.816623][ T7496] ? clear_bhb_loop+0x30/0x80 [ 542.821294][ T7496] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 542.827183][ T7496] RIP: 0033:0x7f850cd8ebe9 [ 542.831592][ T7496] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 542.851193][ T7496] RSP: 002b:00007f850dbbe038 EFLAGS: 00000246 ORIG_RAX: 0000000000000035 [ 542.859610][ T7496] RAX: ffffffffffffffda RBX: 00007f850cfc5fa0 RCX: 00007f850cd8ebe9 [ 542.867580][ T7496] RDX: 0000000000000000 RSI: 0000000000000005 RDI: 000000000000001e [ 542.875564][ T7496] RBP: 00007f850dbbe090 R08: 0000000000000000 R09: 0000000000000000 [ 542.883625][ T7496] R10: 0000200000000940 R11: 0000000000000246 R12: 0000000000000001 [ 542.891593][ T7496] R13: 00007f850cfc6038 R14: 00007f850cfc5fa0 R15: 00007ffc1cf953d8 [ 542.899564][ T7496] [ 542.923575][ T7496] socket: no more sockets [ 547.381610][ T7567] device pim6reg1 entered promiscuous mode [ 552.190734][ T7650] device pim6reg1 entered promiscuous mode [ 555.142579][ T7693] device pim6reg1 entered promiscuous mode [ 555.640373][ T7702] device pim6reg1 entered promiscuous mode [ 558.851603][ T7736] device pim6reg1 entered promiscuous mode [ 558.974467][ T7740] device pim6reg1 entered promiscuous mode [ 561.396976][ T7779] device pim6reg1 entered promiscuous mode [ 563.293422][ T7819] device pim6reg1 entered promiscuous mode [ 565.476831][ T7860] device pim6reg1 entered promiscuous mode [ 566.976177][ T7903] device pim6reg1 entered promiscuous mode [ 567.094236][ T7905] device pim6reg1 entered promiscuous mode [ 568.352761][ T7942] device pim6reg1 entered promiscuous mode [ 579.596693][ T8136] device pim6reg1 entered promiscuous mode [ 586.512506][ T8225] device pim6reg1 entered promiscuous mode [ 592.582460][ T8294] device pim6reg1 entered promiscuous mode [ 593.115520][ T8308] device pim6reg1 entered promiscuous mode [ 596.822656][ T8339] device pim6reg1 entered promiscuous mode [ 602.012067][ T8418] device sit0 entered promiscuous mode [ 602.224553][ T8429] device pim6reg1 entered promiscuous mode [ 604.612032][ T8466] device pim6reg1 entered promiscuous mode [ 604.709961][ T8471] device sit0 left promiscuous mode [ 604.747481][ T8473] device pim6reg1 entered promiscuous mode [ 604.761599][ T8471] device sit0 entered promiscuous mode [ 608.372122][ T8527] device pim6reg1 entered promiscuous mode [ 608.497662][ T8533] device pim6reg1 entered promiscuous mode [ 611.803770][ T8570] device pim6reg1 entered promiscuous mode [ 614.220615][ T8623] device sit0 left promiscuous mode [ 614.873620][ T8624] device sit0 entered promiscuous mode [ 615.438879][ T8646] device pim6reg1 entered promiscuous mode [ 616.732441][ T8687] device pim6reg1 entered promiscuous mode [ 618.509360][ T8737] device pim6reg1 entered promiscuous mode [ 624.233538][ T8810] device pim6reg1 entered promiscuous mode [ 627.757399][ T8873] device sit0 left promiscuous mode [ 628.022022][ T8873] device sit0 entered promiscuous mode [ 628.242741][ T8885] device pim6reg1 entered promiscuous mode [ 631.692798][ T8943] device sit0 entered promiscuous mode [ 632.388515][ T8957] device sit0 left promiscuous mode [ 632.494746][ T8953] device sit0 entered promiscuous mode [ 632.760015][ T8967] device pim6reg1 entered promiscuous mode [ 632.783634][ T8975] device sit0 left promiscuous mode [ 632.959270][ T8976] device sit0 entered promiscuous mode [ 633.215589][ T8986] device sit0 left promiscuous mode [ 633.816343][ T9005] device sit0 left promiscuous mode [ 634.066020][ T9001] device sit0 entered promiscuous mode [ 634.816189][ T9034] device pim6reg1 entered promiscuous mode [ 636.827354][ T9083] device pim6reg1 entered promiscuous mode [ 637.036034][ T9086] device sit0 left promiscuous mode [ 638.113962][ T9088] device sit0 entered promiscuous mode [ 638.913856][ T9115] FAULT_INJECTION: forcing a failure. [ 638.913856][ T9115] name failslab, interval 1, probability 0, space 0, times 0 [ 638.926993][ T9115] CPU: 1 PID: 9115 Comm: syz.5.2581 Not tainted syzkaller #0 [ 638.934367][ T9115] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 638.944417][ T9115] Call Trace: [ 638.947685][ T9115] [ 638.950605][ T9115] __dump_stack+0x21/0x24 [ 638.954931][ T9115] dump_stack_lvl+0xee/0x150 [ 638.959524][ T9115] ? __cfi_dump_stack_lvl+0x8/0x8 [ 638.964545][ T9115] ? avc_has_perm+0x158/0x240 [ 638.969226][ T9115] ? __x64_sys_socketpair+0x9b/0xb0 [ 638.974424][ T9115] dump_stack+0x15/0x24 [ 638.978572][ T9115] should_fail_ex+0x3d4/0x520 [ 638.983248][ T9115] __should_failslab+0xac/0xf0 [ 638.988016][ T9115] should_failslab+0x9/0x20 [ 638.992508][ T9115] slab_pre_alloc_hook+0x30/0x1e0 [ 638.997515][ T9115] kmem_cache_alloc_lru+0x49/0x280 [ 639.002608][ T9115] ? sock_alloc_inode+0x28/0xc0 [ 639.007437][ T9115] sock_alloc_inode+0x28/0xc0 [ 639.012092][ T9115] ? __cfi_sock_alloc_inode+0x10/0x10 [ 639.017469][ T9115] new_inode_pseudo+0x70/0x1f0 [ 639.022216][ T9115] __sock_create+0x12c/0x7c0 [ 639.026800][ T9115] __sys_socketpair+0x218/0x5b0 [ 639.031636][ T9115] __x64_sys_socketpair+0x9b/0xb0 [ 639.036642][ T9115] x64_sys_call+0x6e/0x9a0 [ 639.041067][ T9115] do_syscall_64+0x4c/0xa0 [ 639.045482][ T9115] ? clear_bhb_loop+0x30/0x80 [ 639.050143][ T9115] ? clear_bhb_loop+0x30/0x80 [ 639.054804][ T9115] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 639.060677][ T9115] RIP: 0033:0x7ff8fc98ebe9 [ 639.065071][ T9115] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 639.084656][ T9115] RSP: 002b:00007ff8fd766038 EFLAGS: 00000246 ORIG_RAX: 0000000000000035 [ 639.093057][ T9115] RAX: ffffffffffffffda RBX: 00007ff8fcbc5fa0 RCX: 00007ff8fc98ebe9 [ 639.101040][ T9115] RDX: 0000000000000000 RSI: 0000000000000005 RDI: 0000000000000001 [ 639.108993][ T9115] RBP: 00007ff8fd766090 R08: 0000000000000000 R09: 0000000000000000 [ 639.116944][ T9115] R10: 00002000000029c0 R11: 0000000000000246 R12: 0000000000000001 [ 639.124981][ T9115] R13: 00007ff8fcbc6038 R14: 00007ff8fcbc5fa0 R15: 00007ffe469e8b88 [ 639.132936][ T9115] [ 639.136282][ T9115] socket: no more sockets [ 639.280100][ T9123] device pim6reg1 entered promiscuous mode [ 640.349500][ T9148] device pim6reg1 entered promiscuous mode [ 641.847675][ T9190] device pim6reg1 entered promiscuous mode [ 641.946018][ T9184] device sit0 entered promiscuous mode [ 643.193205][ T9210] device sit0 left promiscuous mode [ 643.634051][ T9207] device sit0 entered promiscuous mode [ 645.340179][ T9254] device sit0 left promiscuous mode [ 645.623035][ T28] audit: type=1400 audit(1756974494.145:141): avc: denied { create } for pid=9262 comm="syz.1.2633" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bluetooth_socket permissive=1 [ 645.786040][ T9251] device sit0 entered promiscuous mode [ 646.413569][ T9279] FAULT_INJECTION: forcing a failure. [ 646.413569][ T9279] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 646.447129][ T9279] CPU: 0 PID: 9279 Comm: syz.0.2636 Not tainted syzkaller #0 [ 646.454517][ T9279] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 646.464558][ T9279] Call Trace: [ 646.467834][ T9279] [ 646.470763][ T9279] __dump_stack+0x21/0x24 [ 646.475091][ T9279] dump_stack_lvl+0xee/0x150 [ 646.479679][ T9279] ? __cfi_dump_stack_lvl+0x8/0x8 [ 646.484699][ T9279] ? finish_task_switch+0x16b/0x7b0 [ 646.489889][ T9279] ? __switch_to_asm+0x3a/0x60 [ 646.494638][ T9279] dump_stack+0x15/0x24 [ 646.498773][ T9279] should_fail_ex+0x3d4/0x520 [ 646.503430][ T9279] should_fail+0xb/0x10 [ 646.507568][ T9279] should_fail_usercopy+0x1a/0x20 [ 646.512572][ T9279] _copy_from_user+0x1e/0xc0 [ 646.517142][ T9279] ip_tunnel_siocdevprivate+0xa3/0x1d0 [ 646.522584][ T9279] ? __cfi_ip_tunnel_siocdevprivate+0x10/0x10 [ 646.528631][ T9279] ? __mutex_lock+0x47a/0x16d0 [ 646.533375][ T9279] ipip6_tunnel_siocdevprivate+0x1de/0xc80 [ 646.539159][ T9279] ? __ww_mutex_lock_interruptible_slowpath+0x20/0x20 [ 646.545900][ T9279] ? __cfi_ipip6_tunnel_siocdevprivate+0x10/0x10 [ 646.552206][ T9279] ? full_name_hash+0x9d/0xf0 [ 646.556865][ T9279] dev_ifsioc+0xbc4/0xed0 [ 646.561256][ T9279] ? ioctl_has_perm+0x391/0x4c0 [ 646.566085][ T9279] ? dev_ioctl+0xd10/0xd10 [ 646.570486][ T9279] ? __mutex_lock_slowpath+0xe/0x10 [ 646.575664][ T9279] ? mutex_lock+0xf8/0x1a0 [ 646.580057][ T9279] ? __cfi_mutex_lock+0x10/0x10 [ 646.584924][ T9279] ? dev_get_by_name_rcu+0xe5/0x130 [ 646.590205][ T9279] dev_ioctl+0x5f3/0xd10 [ 646.594442][ T9279] sock_ioctl+0x675/0x6e0 [ 646.598771][ T9279] ? __cfi_sock_ioctl+0x10/0x10 [ 646.603609][ T9279] ? security_file_ioctl+0x95/0xc0 [ 646.608704][ T9279] ? __cfi_sock_ioctl+0x10/0x10 [ 646.613540][ T9279] __se_sys_ioctl+0x12f/0x1b0 [ 646.618199][ T9279] __x64_sys_ioctl+0x7b/0x90 [ 646.622762][ T9279] x64_sys_call+0x58b/0x9a0 [ 646.627245][ T9279] do_syscall_64+0x4c/0xa0 [ 646.631641][ T9279] ? clear_bhb_loop+0x30/0x80 [ 646.636296][ T9279] ? clear_bhb_loop+0x30/0x80 [ 646.640953][ T9279] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 646.646823][ T9279] RIP: 0033:0x7f9492d8ebe9 [ 646.651219][ T9279] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 646.670801][ T9279] RSP: 002b:00007f9493cd8038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 646.679200][ T9279] RAX: ffffffffffffffda RBX: 00007f9492fc6090 RCX: 00007f9492d8ebe9 [ 646.687169][ T9279] RDX: 0000200000000080 RSI: 00000000000089f2 RDI: 0000000000000005 [ 646.695121][ T9279] RBP: 00007f9493cd8090 R08: 0000000000000000 R09: 0000000000000000 [ 646.703074][ T9279] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 646.711027][ T9279] R13: 00007f9492fc6128 R14: 00007f9492fc6090 R15: 00007ffd806e6ee8 [ 646.718986][ T9279] [ 647.162983][ T9298] device sit0 left promiscuous mode [ 647.583339][ T9298] device sit0 entered promiscuous mode [ 649.282760][ T9335] pim6reg: tun_chr_ioctl cmd 1074812118 [ 651.271586][ T9379] device sit0 left promiscuous mode [ 651.504061][ T9379] device sit0 entered promiscuous mode [ 651.522134][ T9388] device pim6reg1 entered promiscuous mode [ 651.745862][ T9390] FAULT_INJECTION: forcing a failure. [ 651.745862][ T9390] name failslab, interval 1, probability 0, space 0, times 0 [ 651.811529][ T9390] CPU: 1 PID: 9390 Comm: syz.6.2671 Not tainted syzkaller #0 [ 651.818972][ T9390] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 651.829113][ T9390] Call Trace: [ 651.832388][ T9390] [ 651.835319][ T9390] __dump_stack+0x21/0x24 [ 651.839648][ T9390] dump_stack_lvl+0xee/0x150 [ 651.844284][ T9390] ? __cfi_dump_stack_lvl+0x8/0x8 [ 651.849311][ T9390] dump_stack+0x15/0x24 [ 651.853474][ T9390] should_fail_ex+0x3d4/0x520 [ 651.858143][ T9390] ? security_inode_alloc+0x33/0x120 [ 651.863421][ T9390] __should_failslab+0xac/0xf0 [ 651.868202][ T9390] should_failslab+0x9/0x20 [ 651.872687][ T9390] kmem_cache_alloc+0x3b/0x330 [ 651.877448][ T9390] security_inode_alloc+0x33/0x120 [ 651.882540][ T9390] inode_init_always+0x6fc/0x960 [ 651.887478][ T9390] new_inode_pseudo+0xa2/0x1f0 [ 651.892240][ T9390] __sock_create+0x12c/0x7c0 [ 651.896825][ T9390] __sys_socketpair+0x218/0x5b0 [ 651.901667][ T9390] __x64_sys_socketpair+0x9b/0xb0 [ 651.906681][ T9390] x64_sys_call+0x6e/0x9a0 [ 651.911082][ T9390] do_syscall_64+0x4c/0xa0 [ 651.915483][ T9390] ? clear_bhb_loop+0x30/0x80 [ 651.920139][ T9390] ? clear_bhb_loop+0x30/0x80 [ 651.924795][ T9390] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 651.930757][ T9390] RIP: 0033:0x7fd750d8ebe9 [ 651.935152][ T9390] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 651.954738][ T9390] RSP: 002b:00007fd751c5e038 EFLAGS: 00000246 ORIG_RAX: 0000000000000035 [ 651.963131][ T9390] RAX: ffffffffffffffda RBX: 00007fd750fc5fa0 RCX: 00007fd750d8ebe9 [ 651.971094][ T9390] RDX: 0000000000000002 RSI: 0000000000000000 RDI: 0000000000000018 [ 651.979046][ T9390] RBP: 00007fd751c5e090 R08: 0000000000000000 R09: 0000000000000000 [ 651.987018][ T9390] R10: 0000200000000000 R11: 0000000000000246 R12: 0000000000000001 [ 651.994970][ T9390] R13: 00007fd750fc6038 R14: 00007fd750fc5fa0 R15: 00007ffe465cf2d8 [ 652.002926][ T9390] [ 652.132939][ T9399] device pim6reg1 entered promiscuous mode [ 653.003435][ T9390] socket: no more sockets [ 653.083662][ T9413] FAULT_INJECTION: forcing a failure. [ 653.083662][ T9413] name failslab, interval 1, probability 0, space 0, times 0 [ 653.101106][ T9413] CPU: 1 PID: 9413 Comm: syz.5.2678 Not tainted syzkaller #0 [ 653.108514][ T9413] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 653.118581][ T9413] Call Trace: [ 653.121869][ T9413] [ 653.124810][ T9413] __dump_stack+0x21/0x24 [ 653.129135][ T9413] dump_stack_lvl+0xee/0x150 [ 653.133733][ T9413] ? __cfi_dump_stack_lvl+0x8/0x8 [ 653.138763][ T9413] dump_stack+0x15/0x24 [ 653.142949][ T9413] should_fail_ex+0x3d4/0x520 [ 653.147663][ T9413] ? security_inode_alloc+0x33/0x120 [ 653.152956][ T9413] __should_failslab+0xac/0xf0 [ 653.157723][ T9413] should_failslab+0x9/0x20 [ 653.162308][ T9413] kmem_cache_alloc+0x3b/0x330 [ 653.167069][ T9413] ? slab_pre_alloc_hook+0x30/0x1e0 [ 653.172268][ T9413] security_inode_alloc+0x33/0x120 [ 653.177374][ T9413] inode_init_always+0x6fc/0x960 [ 653.182303][ T9413] new_inode_pseudo+0xa2/0x1f0 [ 653.187060][ T9413] __sock_create+0x12c/0x7c0 [ 653.191649][ T9413] __sys_socketpair+0x218/0x5b0 [ 653.196505][ T9413] __x64_sys_socketpair+0x9b/0xb0 [ 653.201528][ T9413] x64_sys_call+0x6e/0x9a0 [ 653.205938][ T9413] do_syscall_64+0x4c/0xa0 [ 653.210347][ T9413] ? clear_bhb_loop+0x30/0x80 [ 653.215032][ T9413] ? clear_bhb_loop+0x30/0x80 [ 653.219717][ T9413] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 653.225618][ T9413] RIP: 0033:0x7ff8fc98ebe9 [ 653.230033][ T9413] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 653.249638][ T9413] RSP: 002b:00007ff8fd766038 EFLAGS: 00000246 ORIG_RAX: 0000000000000035 [ 653.258053][ T9413] RAX: ffffffffffffffda RBX: 00007ff8fcbc5fa0 RCX: 00007ff8fc98ebe9 [ 653.266020][ T9413] RDX: 0000000000000000 RSI: 0000000000000005 RDI: 000000000000001e [ 653.273984][ T9413] RBP: 00007ff8fd766090 R08: 0000000000000000 R09: 0000000000000000 [ 653.281953][ T9413] R10: 0000200000000940 R11: 0000000000000246 R12: 0000000000000001 [ 653.290011][ T9413] R13: 00007ff8fcbc6038 R14: 00007ff8fcbc5fa0 R15: 00007ffe469e8b88 [ 653.297982][ T9413] [ 653.379383][ T9413] socket: no more sockets [ 654.910765][ T9436] device sit0 left promiscuous mode [ 655.354589][ T9441] device pim6reg1 entered promiscuous mode [ 655.657505][ T9451] device sit0 left promiscuous mode [ 656.162536][ T9449] device sit0 entered promiscuous mode [ 656.937621][ T9470] device sit0 left promiscuous mode [ 657.101407][ T9472] device sit0 entered promiscuous mode [ 658.542098][ T9487] device pim6reg1 entered promiscuous mode [ 659.102535][ T9510] device sit0 left promiscuous mode [ 659.419715][ T9510] device sit0 entered promiscuous mode [ 663.125404][ T9567] device sit0 left promiscuous mode [ 665.293924][ T9591] device pim6reg1 entered promiscuous mode [ 665.559436][ T9595] bond_slave_1: mtu less than device minimum [ 666.115551][ T28] audit: type=1400 audit(1756974514.635:142): avc: denied { create } for pid=9588 comm="syz.1.2729" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rose_socket permissive=1 [ 667.098224][ T9610] device sit0 left promiscuous mode [ 669.393191][ T9636] device pim6reg1 entered promiscuous mode [ 674.616727][ T9687] device veth1_macvtap left promiscuous mode [ 674.871697][ T9685] device wg2 entered promiscuous mode [ 675.768184][ T9702] device sit0 entered promiscuous mode [ 678.302338][ T9735] device sit0 left promiscuous mode [ 678.412874][ T9735] device sit0 entered promiscuous mode [ 679.191647][ T9732] device pim6reg1 entered promiscuous mode [ 679.694627][ T9766] device sit0 left promiscuous mode [ 679.893857][ T9767] device sit0 left promiscuous mode [ 679.968183][ T9770] device sit0 entered promiscuous mode [ 679.980614][ T9773] device sit0 entered promiscuous mode [ 684.463084][ T9830] device sit0 entered promiscuous mode [ 684.957863][ T9839] device sit0 entered promiscuous mode [ 686.150584][ T9864] device sit0 left promiscuous mode [ 686.400205][ T9869] device sit0 entered promiscuous mode [ 686.606109][ T9878] device pim6reg1 entered promiscuous mode [ 686.628068][ T9876] device sit0 left promiscuous mode [ 686.969374][ T9880] device sit0 entered promiscuous mode [ 687.017786][ T9872] device veth0_vlan left promiscuous mode [ 687.027402][ T9872] device veth0_vlan entered promiscuous mode [ 687.284365][ T346] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 687.310554][ T346] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 687.427633][ T346] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 687.783797][ T9910] device sit0 left promiscuous mode [ 688.207891][ T9909] device sit0 entered promiscuous mode [ 688.738760][ T9913] device sit0 left promiscuous mode [ 688.877869][ T9912] device sit0 entered promiscuous mode [ 689.156500][ T9928] device pim6reg1 entered promiscuous mode [ 689.219261][ T9932] device sit0 left promiscuous mode [ 689.324479][ T9932] device sit0 entered promiscuous mode [ 693.840277][T10003] device sit0 left promiscuous mode [ 694.265270][T10005] device sit0 entered promiscuous mode [ 697.567963][T10074] device sit0 left promiscuous mode [ 697.653774][T10076] device sit0 entered promiscuous mode [ 698.570893][T10081] device sit0 left promiscuous mode [ 699.062361][T10082] device sit0 entered promiscuous mode [ 703.159854][T10131] device sit0 left promiscuous mode [ 703.458274][T10126] device sit0 entered promiscuous mode [ 704.294279][T10141] device sit0 left promiscuous mode [ 704.621265][T10142] device sit0 entered promiscuous mode [ 708.695073][T10176] device sit0 left promiscuous mode [ 708.893013][T10179] device sit0 entered promiscuous mode [ 709.177988][T10183] device sit0 left promiscuous mode [ 709.709295][T10184] device sit0 entered promiscuous mode [ 709.870160][T10191] device sit0 left promiscuous mode [ 713.528284][T10248] device sit0 left promiscuous mode [ 713.557492][T10248] device sit0 entered promiscuous mode [ 715.652994][T10260] device sit0 left promiscuous mode [ 723.461455][T10327] device sit0 left promiscuous mode [ 724.714335][T10340] device sit0 left promiscuous mode [ 740.090002][T10437] device syzkaller0 entered promiscuous mode [ 740.601857][T10450] device pim6reg1 entered promiscuous mode [ 741.058057][T10457] bond_slave_1: mtu less than device minimum [ 741.964665][T10461] device pim6reg1 entered promiscuous mode [ 749.185592][T10510] ÿ: renamed from bond_slave_0 [ 750.705994][T10540] bridge0: port 1(bridge_slave_0) entered blocking state [ 750.713178][T10540] bridge0: port 1(bridge_slave_0) entered disabled state [ 750.720721][T10540] device bridge_slave_0 entered promiscuous mode [ 750.802908][T10540] bridge0: port 2(bridge_slave_1) entered blocking state [ 750.812237][T10540] bridge0: port 2(bridge_slave_1) entered disabled state [ 750.819705][T10540] device bridge_slave_1 entered promiscuous mode [ 750.995867][T10540] bridge0: port 2(bridge_slave_1) entered blocking state [ 751.002942][T10540] bridge0: port 2(bridge_slave_1) entered forwarding state [ 751.010172][T10540] bridge0: port 1(bridge_slave_0) entered blocking state [ 751.017212][T10540] bridge0: port 1(bridge_slave_0) entered forwarding state [ 751.054298][T10046] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 751.062481][T10046] bridge0: port 1(bridge_slave_0) entered disabled state [ 751.069740][T10046] bridge0: port 2(bridge_slave_1) entered disabled state [ 751.078803][T10046] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 751.087441][T10046] bridge0: port 1(bridge_slave_0) entered blocking state [ 751.094503][T10046] bridge0: port 1(bridge_slave_0) entered forwarding state [ 751.105535][T10046] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 751.115295][T10046] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 751.123933][T10046] bridge0: port 2(bridge_slave_1) entered blocking state [ 751.130978][T10046] bridge0: port 2(bridge_slave_1) entered forwarding state [ 751.255746][T10046] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 751.276866][T10046] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 751.401984][T10046] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 751.434994][T10046] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 751.477367][T10540] device veth0_vlan entered promiscuous mode [ 751.564190][T10046] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 751.596680][T10046] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 751.711881][T10046] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 751.818999][T10046] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 751.921766][T10046] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 752.001002][T10046] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 752.039417][T10540] device veth1_macvtap entered promiscuous mode [ 752.151470][T10046] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 752.245242][T10046] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 752.360836][T10046] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 752.583918][ T346] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 752.592644][ T346] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 752.923155][ T346] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 752.941850][ T346] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 753.275388][ T343] device bridge_slave_1 left promiscuous mode [ 753.282375][ T343] bridge0: port 2(bridge_slave_1) entered disabled state [ 753.332956][ T343] device bridge_slave_0 left promiscuous mode [ 753.404712][ T343] bridge0: port 1(bridge_slave_0) entered disabled state [ 753.478921][ T343] device veth1_macvtap left promiscuous mode [ 758.188571][T10616] device sit0 left promiscuous mode [ 769.567424][T10753] device pim6reg1 entered promiscuous mode [ 777.861753][T10863] device pim6reg1 entered promiscuous mode [ 783.957808][T10908] bond_slave_1: mtu less than device minimum [ 785.265043][T10930] device pim6reg1 entered promiscuous mode [ 789.408768][ T346] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 790.508539][T10974] device wg2 entered promiscuous mode [ 807.297587][T11161] device wg2 left promiscuous mode [ 807.450529][T11162] device wg2 entered promiscuous mode [ 809.681821][T11181] device wg2 left promiscuous mode [ 809.862427][T11181] device wg2 entered promiscuous mode [ 810.614763][T11190] device syzkaller0 entered promiscuous mode [ 811.982936][ T28] audit: type=1400 audit(1756974660.505:143): avc: denied { create } for pid=11218 comm="syz.2.3204" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 813.006236][T11230] FAULT_INJECTION: forcing a failure. [ 813.006236][T11230] name failslab, interval 1, probability 0, space 0, times 0 [ 813.019045][T11230] CPU: 1 PID: 11230 Comm: syz.2.3208 Not tainted syzkaller #0 [ 813.026567][T11230] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 813.036665][T11230] Call Trace: [ 813.040059][T11230] [ 813.042994][T11230] __dump_stack+0x21/0x24 [ 813.047342][T11230] dump_stack_lvl+0xee/0x150 [ 813.052003][T11230] ? __cfi_dump_stack_lvl+0x8/0x8 [ 813.057054][T11230] dump_stack+0x15/0x24 [ 813.061223][T11230] should_fail_ex+0x3d4/0x520 [ 813.065901][T11230] ? __alloc_file+0x28/0x2a0 [ 813.070506][T11230] __should_failslab+0xac/0xf0 [ 813.075267][T11230] should_failslab+0x9/0x20 [ 813.079768][T11230] kmem_cache_alloc+0x3b/0x330 [ 813.084536][T11230] ? __cfi__raw_spin_lock+0x10/0x10 [ 813.089747][T11230] __alloc_file+0x28/0x2a0 [ 813.094170][T11230] alloc_empty_file+0x97/0x180 [ 813.098955][T11230] alloc_file+0x59/0x640 [ 813.103254][T11230] alloc_file_pseudo+0x17a/0x1f0 [ 813.108200][T11230] ? __cfi_alloc_file_pseudo+0x10/0x10 [ 813.113674][T11230] anon_inode_getfd+0xd6/0x1d0 [ 813.118442][T11230] bpf_map_new_fd+0x5f/0x70 [ 813.122948][T11230] map_create+0xa2a/0xd80 [ 813.127272][T11230] __sys_bpf+0x30b/0x780 [ 813.131508][T11230] ? bpf_link_show_fdinfo+0x320/0x320 [ 813.136879][T11230] ? __cfi_ksys_write+0x10/0x10 [ 813.141733][T11230] ? debug_smp_processor_id+0x17/0x20 [ 813.147113][T11230] __x64_sys_bpf+0x7c/0x90 [ 813.151536][T11230] x64_sys_call+0x488/0x9a0 [ 813.156061][T11230] do_syscall_64+0x4c/0xa0 [ 813.160495][T11230] ? clear_bhb_loop+0x30/0x80 [ 813.165170][T11230] ? clear_bhb_loop+0x30/0x80 [ 813.169847][T11230] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 813.175739][T11230] RIP: 0033:0x7fa39378ebe9 [ 813.180154][T11230] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 813.199756][T11230] RSP: 002b:00007fa394677038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 813.208178][T11230] RAX: ffffffffffffffda RBX: 00007fa3939c5fa0 RCX: 00007fa39378ebe9 [ 813.216149][T11230] RDX: 0000000000000039 RSI: 0000200000000500 RDI: 0000000000000000 [ 813.224115][T11230] RBP: 00007fa394677090 R08: 0000000000000000 R09: 0000000000000000 [ 813.232080][T11230] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 813.240131][T11230] R13: 00007fa3939c6038 R14: 00007fa3939c5fa0 R15: 00007ffed95b1038 [ 813.248111][T11230] [ 823.625880][T11348] device wg2 entered promiscuous mode [ 824.314158][T11337] device veth0_vlan left promiscuous mode [ 824.413487][T11337] device veth0_vlan entered promiscuous mode [ 824.480382][ T346] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 824.526126][ T346] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 824.598626][ T346] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 825.389414][T11382] device wg2 left promiscuous mode [ 825.513429][T11387] device wg2 entered promiscuous mode [ 829.369324][T11440] device wg2 left promiscuous mode [ 829.499226][T11440] device wg2 entered promiscuous mode [ 832.477216][T11520] device wg2 left promiscuous mode [ 832.631087][T11520] device wg2 entered promiscuous mode [ 833.334554][T11540] FAULT_INJECTION: forcing a failure. [ 833.334554][T11540] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 833.495015][T11540] CPU: 0 PID: 11540 Comm: syz.0.3302 Not tainted syzkaller #0 [ 833.502514][T11540] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 833.512563][T11540] Call Trace: [ 833.515833][T11540] [ 833.518767][T11540] __dump_stack+0x21/0x24 [ 833.523097][T11540] dump_stack_lvl+0xee/0x150 [ 833.527696][T11540] ? __cfi_dump_stack_lvl+0x8/0x8 [ 833.532731][T11540] dump_stack+0x15/0x24 [ 833.536887][T11540] should_fail_ex+0x3d4/0x520 [ 833.541576][T11540] should_fail+0xb/0x10 [ 833.545727][T11540] should_fail_usercopy+0x1a/0x20 [ 833.550747][T11540] _copy_to_user+0x1e/0x90 [ 833.555297][T11540] simple_read_from_buffer+0xe9/0x160 [ 833.560652][T11540] proc_fail_nth_read+0x19a/0x210 [ 833.565658][T11540] ? __cfi_proc_fail_nth_read+0x10/0x10 [ 833.571199][T11540] ? security_file_permission+0x94/0xb0 [ 833.576726][T11540] ? __cfi_proc_fail_nth_read+0x10/0x10 [ 833.582265][T11540] vfs_read+0x26e/0x8c0 [ 833.586412][T11540] ? __cfi_vfs_read+0x10/0x10 [ 833.591072][T11540] ? __kasan_check_write+0x14/0x20 [ 833.596170][T11540] ? mutex_lock+0x8d/0x1a0 [ 833.600573][T11540] ? __cfi_mutex_lock+0x10/0x10 [ 833.605405][T11540] ? __fdget_pos+0x2cd/0x380 [ 833.609971][T11540] ? ksys_read+0x71/0x240 [ 833.614285][T11540] ksys_read+0x140/0x240 [ 833.618510][T11540] ? __cfi_ksys_read+0x10/0x10 [ 833.623255][T11540] ? __bpf_trace_sys_enter+0x62/0x70 [ 833.628521][T11540] __x64_sys_read+0x7b/0x90 [ 833.633007][T11540] x64_sys_call+0x2f/0x9a0 [ 833.637409][T11540] do_syscall_64+0x4c/0xa0 [ 833.641822][T11540] ? clear_bhb_loop+0x30/0x80 [ 833.646486][T11540] ? clear_bhb_loop+0x30/0x80 [ 833.651156][T11540] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 833.657037][T11540] RIP: 0033:0x7fba5758d5fc [ 833.661429][T11540] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 93 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 ef 93 02 00 48 [ 833.681014][T11540] RSP: 002b:00007fba5849a030 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 833.689406][T11540] RAX: ffffffffffffffda RBX: 00007fba577c5fa0 RCX: 00007fba5758d5fc [ 833.697355][T11540] RDX: 000000000000000f RSI: 00007fba5849a0a0 RDI: 0000000000000007 [ 833.705309][T11540] RBP: 00007fba5849a090 R08: 0000000000000000 R09: 0000000000000000 [ 833.713271][T11540] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 833.721218][T11540] R13: 00007fba577c6038 R14: 00007fba577c5fa0 R15: 00007ffec16a4ca8 [ 833.729177][T11540] [ 834.345175][T11551] FAULT_INJECTION: forcing a failure. [ 834.345175][T11551] name failslab, interval 1, probability 0, space 0, times 0 [ 834.431490][T11551] CPU: 0 PID: 11551 Comm: syz.0.3306 Not tainted syzkaller #0 [ 834.438988][T11551] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 834.449078][T11551] Call Trace: [ 834.452352][T11551] [ 834.455275][T11551] __dump_stack+0x21/0x24 [ 834.459605][T11551] dump_stack_lvl+0xee/0x150 [ 834.464192][T11551] ? __cfi_dump_stack_lvl+0x8/0x8 [ 834.469218][T11551] dump_stack+0x15/0x24 [ 834.473363][T11551] should_fail_ex+0x3d4/0x520 [ 834.478038][T11551] ? prepare_creds+0x2f/0x640 [ 834.482722][T11551] __should_failslab+0xac/0xf0 [ 834.487497][T11551] should_failslab+0x9/0x20 [ 834.491993][T11551] kmem_cache_alloc+0x3b/0x330 [ 834.496754][T11551] prepare_creds+0x2f/0x640 [ 834.501262][T11551] ? memcpy+0x56/0x70 [ 834.505245][T11551] copy_creds+0xe4/0x640 [ 834.509491][T11551] copy_process+0x828/0x3480 [ 834.514078][T11551] ? __cfi_kstrtouint_from_user+0x10/0x10 [ 834.519798][T11551] ? __kasan_check_write+0x14/0x20 [ 834.524908][T11551] ? idle_dummy+0x10/0x10 [ 834.529238][T11551] kernel_clone+0x23a/0x810 [ 834.533738][T11551] ? __cfi_kernel_clone+0x10/0x10 [ 834.538772][T11551] ? __kasan_check_write+0x14/0x20 [ 834.543880][T11551] ? mutex_unlock+0x89/0x220 [ 834.548463][T11551] __x64_sys_clone+0x168/0x1b0 [ 834.553224][T11551] ? __cfi___x64_sys_clone+0x10/0x10 [ 834.558508][T11551] ? fpregs_assert_state_consistent+0xb1/0xe0 [ 834.564597][T11551] x64_sys_call+0x990/0x9a0 [ 834.569097][T11551] do_syscall_64+0x4c/0xa0 [ 834.573501][T11551] ? clear_bhb_loop+0x30/0x80 [ 834.578171][T11551] ? clear_bhb_loop+0x30/0x80 [ 834.582847][T11551] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 834.588749][T11551] RIP: 0033:0x7fba5758ebe9 [ 834.593176][T11551] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 834.612783][T11551] RSP: 002b:00007fba58499fe8 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 834.621197][T11551] RAX: ffffffffffffffda RBX: 00007fba577c5fa0 RCX: 00007fba5758ebe9 [ 834.629167][T11551] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000400 [ 834.637141][T11551] RBP: 00007fba5849a090 R08: 0000000000000000 R09: 0000000000000000 [ 834.645120][T11551] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000001 [ 834.653094][T11551] R13: 00007fba577c6038 R14: 00007fba577c5fa0 R15: 00007ffec16a4ca8 [ 834.661070][T11551] [ 835.156139][T11566] device wg2 left promiscuous mode [ 835.421363][T11565] device wg2 entered promiscuous mode [ 836.281877][T11581] FAULT_INJECTION: forcing a failure. [ 836.281877][T11581] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 836.358485][T11581] CPU: 1 PID: 11581 Comm: syz.0.3314 Not tainted syzkaller #0 [ 836.365988][T11581] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 836.376038][T11581] Call Trace: [ 836.379311][T11581] [ 836.382241][T11581] __dump_stack+0x21/0x24 [ 836.386565][T11581] dump_stack_lvl+0xee/0x150 [ 836.391152][T11581] ? __cfi_dump_stack_lvl+0x8/0x8 [ 836.396186][T11581] dump_stack+0x15/0x24 [ 836.400339][T11581] should_fail_ex+0x3d4/0x520 [ 836.405023][T11581] should_fail+0xb/0x10 [ 836.409176][T11581] should_fail_usercopy+0x1a/0x20 [ 836.414194][T11581] _copy_to_user+0x1e/0x90 [ 836.418603][T11581] simple_read_from_buffer+0xe9/0x160 [ 836.423969][T11581] proc_fail_nth_read+0x19a/0x210 [ 836.428986][T11581] ? __cfi_proc_fail_nth_read+0x10/0x10 [ 836.434526][T11581] ? security_file_permission+0x94/0xb0 [ 836.440070][T11581] ? __cfi_proc_fail_nth_read+0x10/0x10 [ 836.445605][T11581] vfs_read+0x26e/0x8c0 [ 836.449763][T11581] ? __cfi_vfs_read+0x10/0x10 [ 836.454434][T11581] ? __kasan_check_write+0x14/0x20 [ 836.459548][T11581] ? mutex_lock+0x8d/0x1a0 [ 836.463958][T11581] ? __cfi_mutex_lock+0x10/0x10 [ 836.468804][T11581] ? __fdget_pos+0x2cd/0x380 [ 836.473382][T11581] ? ksys_read+0x71/0x240 [ 836.477712][T11581] ksys_read+0x140/0x240 [ 836.481949][T11581] ? __cfi_ksys_read+0x10/0x10 [ 836.486707][T11581] ? fput+0x154/0x1a0 [ 836.490680][T11581] ? debug_smp_processor_id+0x17/0x20 [ 836.496046][T11581] __x64_sys_read+0x7b/0x90 [ 836.500551][T11581] x64_sys_call+0x2f/0x9a0 [ 836.504963][T11581] do_syscall_64+0x4c/0xa0 [ 836.509372][T11581] ? clear_bhb_loop+0x30/0x80 [ 836.514054][T11581] ? clear_bhb_loop+0x30/0x80 [ 836.518725][T11581] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 836.524611][T11581] RIP: 0033:0x7fba5758d5fc [ 836.529020][T11581] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 93 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 ef 93 02 00 48 [ 836.548635][T11581] RSP: 002b:00007fba58479030 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 836.557058][T11581] RAX: ffffffffffffffda RBX: 00007fba577c6090 RCX: 00007fba5758d5fc [ 836.565029][T11581] RDX: 000000000000000f RSI: 00007fba584790a0 RDI: 0000000000000004 [ 836.572997][T11581] RBP: 00007fba58479090 R08: 0000000000000000 R09: 0000000000000000 [ 836.580963][T11581] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 836.588933][T11581] R13: 00007fba577c6128 R14: 00007fba577c6090 R15: 00007ffec16a4ca8 [ 836.596907][T11581] [ 838.453875][T11599] device pim6reg1 entered promiscuous mode [ 838.800318][T11612] device wg2 left promiscuous mode [ 838.876832][T11612] device wg2 entered promiscuous mode [ 840.643551][T11639] device syzkaller0 entered promiscuous mode [ 841.654148][T11668] device wg2 entered promiscuous mode [ 844.045699][T11718] device wg2 left promiscuous mode [ 844.249153][T11718] device wg2 entered promiscuous mode [ 847.908691][T11781] device wg2 left promiscuous mode [ 847.945267][T11781] device wg2 entered promiscuous mode [ 848.773445][T11811] device wg2 left promiscuous mode [ 848.901410][T11809] device wg2 entered promiscuous mode [ 849.432021][T11826] device wg2 left promiscuous mode [ 849.443040][T11830] device wg2 entered promiscuous mode [ 853.298348][T11902] device pim6reg1 entered promiscuous mode [ 854.340785][T11924] device pim6reg1 entered promiscuous mode [ 855.238588][T11932] device wg2 entered promiscuous mode [ 855.356690][T11930] FAULT_INJECTION: forcing a failure. [ 855.356690][T11930] name failslab, interval 1, probability 0, space 0, times 0 [ 855.393631][T11938] device wg2 left promiscuous mode [ 855.430408][T11930] CPU: 0 PID: 11930 Comm: syz.0.3420 Not tainted syzkaller #0 [ 855.437904][T11930] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 855.447963][T11930] Call Trace: [ 855.451239][T11930] [ 855.454179][T11930] __dump_stack+0x21/0x24 [ 855.458522][T11930] dump_stack_lvl+0xee/0x150 [ 855.463119][T11930] ? __cfi_dump_stack_lvl+0x8/0x8 [ 855.468154][T11930] ? avc_has_perm+0x158/0x240 [ 855.472837][T11930] dump_stack+0x15/0x24 [ 855.476988][T11930] should_fail_ex+0x3d4/0x520 [ 855.481671][T11930] __should_failslab+0xac/0xf0 [ 855.486433][T11930] ? __get_vm_area_node+0x12c/0x360 [ 855.491634][T11930] should_failslab+0x9/0x20 [ 855.496166][T11930] __kmem_cache_alloc_node+0x3d/0x2c0 [ 855.501531][T11930] ? __get_vm_area_node+0x12c/0x360 [ 855.506715][T11930] kmalloc_node_trace+0x26/0xb0 [ 855.511550][T11930] __get_vm_area_node+0x12c/0x360 [ 855.516730][T11930] __vmalloc_node_range+0x326/0x13d0 [ 855.521994][T11930] ? bpf_prog_alloc_no_stats+0x3e/0x3f0 [ 855.527519][T11930] ? arch_stack_walk+0xfc/0x150 [ 855.532389][T11930] ? __cfi_avc_has_perm_noaudit+0x10/0x10 [ 855.538089][T11930] ? stack_trace_save+0x98/0xe0 [ 855.542921][T11930] ? __cfi___vmalloc_node_range+0x10/0x10 [ 855.548625][T11930] ? __cfi_selinux_capable+0x10/0x10 [ 855.553897][T11930] ? bpf_prog_alloc_no_stats+0x3e/0x3f0 [ 855.559424][T11930] __vmalloc+0x79/0x90 [ 855.563472][T11930] ? bpf_prog_alloc_no_stats+0x3e/0x3f0 [ 855.568996][T11930] bpf_prog_alloc_no_stats+0x3e/0x3f0 [ 855.574383][T11930] ? security_capable+0x99/0xc0 [ 855.579226][T11930] bpf_prog_alloc+0x22/0x1c0 [ 855.583796][T11930] bpf_prog_load+0x7c6/0x15a0 [ 855.588452][T11930] ? map_freeze+0x390/0x390 [ 855.592934][T11930] ? selinux_bpf+0xc7/0xf0 [ 855.597326][T11930] ? security_bpf+0x93/0xb0 [ 855.601806][T11930] __sys_bpf+0x504/0x780 [ 855.606023][T11930] ? bpf_link_show_fdinfo+0x320/0x320 [ 855.611374][T11930] ? __cfi_ksys_write+0x10/0x10 [ 855.616210][T11930] ? debug_smp_processor_id+0x17/0x20 [ 855.621564][T11930] __x64_sys_bpf+0x7c/0x90 [ 855.625969][T11930] x64_sys_call+0x488/0x9a0 [ 855.630453][T11930] do_syscall_64+0x4c/0xa0 [ 855.634846][T11930] ? clear_bhb_loop+0x30/0x80 [ 855.639509][T11930] ? clear_bhb_loop+0x30/0x80 [ 855.644167][T11930] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 855.650041][T11930] RIP: 0033:0x7fba5758ebe9 [ 855.654434][T11930] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 855.674015][T11930] RSP: 002b:00007fba58479038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 855.682406][T11930] RAX: ffffffffffffffda RBX: 00007fba577c6090 RCX: 00007fba5758ebe9 [ 855.690356][T11930] RDX: 0000000000000090 RSI: 00002000000000c0 RDI: 0000000000000005 [ 855.698304][T11930] RBP: 00007fba58479090 R08: 0000000000000000 R09: 0000000000000000 [ 855.706251][T11930] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 855.714217][T11930] R13: 00007fba577c6128 R14: 00007fba577c6090 R15: 00007ffec16a4ca8 [ 855.722693][T11930] [ 855.773392][T11938] device wg2 entered promiscuous mode [ 855.911930][T11930] syz.0.3420: vmalloc error: size 4096, vm_struct allocation failed, mode:0x500dc0(GFP_USER|__GFP_ZERO|__GFP_ACCOUNT), nodemask=(null),cpuset=syz0,mems_allowed=0 [ 856.541517][T11930] CPU: 1 PID: 11930 Comm: syz.0.3420 Not tainted syzkaller #0 [ 856.549022][T11930] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 856.559073][T11930] Call Trace: [ 856.562348][T11930] [ 856.565273][T11930] __dump_stack+0x21/0x24 [ 856.569595][T11930] dump_stack_lvl+0xee/0x150 [ 856.574184][T11930] ? __cfi_dump_stack_lvl+0x8/0x8 [ 856.579213][T11930] ? pr_cont_kernfs_name+0x133/0x160 [ 856.584503][T11930] dump_stack+0x15/0x24 [ 856.588652][T11930] warn_alloc+0x1b0/0x1d0 [ 856.592975][T11930] ? should_failslab+0x9/0x20 [ 856.597645][T11930] ? __cfi_warn_alloc+0x10/0x10 [ 856.602498][T11930] ? kmalloc_node_trace+0x3d/0xb0 [ 856.607521][T11930] ? __get_vm_area_node+0x353/0x360 [ 856.612737][T11930] __vmalloc_node_range+0x34b/0x13d0 [ 856.618010][T11930] ? arch_stack_walk+0xfc/0x150 [ 856.622860][T11930] ? __cfi_avc_has_perm_noaudit+0x10/0x10 [ 856.628577][T11930] ? stack_trace_save+0x98/0xe0 [ 856.633427][T11930] ? __cfi___vmalloc_node_range+0x10/0x10 [ 856.639135][T11930] ? __cfi_selinux_capable+0x10/0x10 [ 856.644419][T11930] ? bpf_prog_alloc_no_stats+0x3e/0x3f0 [ 856.649974][T11930] __vmalloc+0x79/0x90 [ 856.654034][T11930] ? bpf_prog_alloc_no_stats+0x3e/0x3f0 [ 856.659574][T11930] bpf_prog_alloc_no_stats+0x3e/0x3f0 [ 856.664949][T11930] ? security_capable+0x99/0xc0 [ 856.669799][T11930] bpf_prog_alloc+0x22/0x1c0 [ 856.674392][T11930] bpf_prog_load+0x7c6/0x15a0 [ 856.679065][T11930] ? map_freeze+0x390/0x390 [ 856.683564][T11930] ? selinux_bpf+0xc7/0xf0 [ 856.687974][T11930] ? security_bpf+0x93/0xb0 [ 856.692477][T11930] __sys_bpf+0x504/0x780 [ 856.696716][T11930] ? bpf_link_show_fdinfo+0x320/0x320 [ 856.702086][T11930] ? __cfi_ksys_write+0x10/0x10 [ 856.706939][T11930] ? debug_smp_processor_id+0x17/0x20 [ 856.712310][T11930] __x64_sys_bpf+0x7c/0x90 [ 856.716725][T11930] x64_sys_call+0x488/0x9a0 [ 856.721221][T11930] do_syscall_64+0x4c/0xa0 [ 856.725632][T11930] ? clear_bhb_loop+0x30/0x80 [ 856.730303][T11930] ? clear_bhb_loop+0x30/0x80 [ 856.734977][T11930] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 856.740889][T11930] RIP: 0033:0x7fba5758ebe9 [ 856.745298][T11930] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 856.764900][T11930] RSP: 002b:00007fba58479038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 856.773412][T11930] RAX: ffffffffffffffda RBX: 00007fba577c6090 RCX: 00007fba5758ebe9 [ 856.781380][T11930] RDX: 0000000000000090 RSI: 00002000000000c0 RDI: 0000000000000005 [ 856.789351][T11930] RBP: 00007fba58479090 R08: 0000000000000000 R09: 0000000000000000 [ 856.797317][T11930] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 856.805286][T11930] R13: 00007fba577c6128 R14: 00007fba577c6090 R15: 00007ffec16a4ca8 [ 856.813262][T11930] [ 857.251555][T11930] Mem-Info: [ 857.254835][T11930] active_anon:8826 inactive_anon:0 isolated_anon:0 [ 857.254835][T11930] active_file:27042 inactive_file:2542 isolated_file:0 [ 857.254835][T11930] unevictable:0 dirty:278 writeback:0 [ 857.254835][T11930] slab_reclaimable:7813 slab_unreclaimable:75917 [ 857.254835][T11930] mapped:30127 shmem:163 pagetables:688 [ 857.254835][T11930] sec_pagetables:0 bounce:0 [ 857.254835][T11930] kernel_misc_reclaimable:0 [ 857.254835][T11930] free:1510872 free_pcp:10574 free_cma:0 [ 857.374110][T11930] Node 0 active_anon:35404kB inactive_anon:0kB active_file:108168kB inactive_file:10168kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:120508kB dirty:1112kB writeback:0kB shmem:652kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 0kB writeback_tmp:0kB kernel_stack:5292kB pagetables:2652kB sec_pagetables:0kB all_unreclaimable? no [ 857.461250][T11930] DMA32 free:2968532kB boost:0kB min:31288kB low:39108kB high:46928kB reserved_highatomic:0KB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:3145324kB managed:2974204kB mlocked:0kB bounce:0kB free_pcp:5672kB local_pcp:5612kB free_cma:0kB [ 857.489745][T11930] lowmem_reserve[]: 0 3932 3932 3932 [ 857.503606][T11930] Normal free:3074956kB boost:0kB min:42436kB low:53044kB high:63652kB reserved_highatomic:0KB active_anon:35404kB inactive_anon:0kB active_file:108168kB inactive_file:10168kB unevictable:0kB writepending:1112kB present:5242880kB managed:4026656kB mlocked:0kB bounce:0kB free_pcp:35684kB local_pcp:12828kB free_cma:0kB [ 858.091538][T11930] lowmem_reserve[]: 0 0 0 0 [ 858.096319][T11930] DMA32: 3*4kB (M) 1*8kB (M) 2*16kB (M) 3*32kB (M) 3*64kB (M) 3*128kB (M) 3*256kB (M) 3*512kB (M) 4*1024kB (UM) 2*2048kB (M) 722*4096kB (M) = 2968532kB [ 858.297601][T11930] Normal: 872*4kB (ME) 1018*8kB (ME) 702*16kB (ME) 940*32kB (UME) 509*64kB (UME) 439*128kB (UME) 403*256kB (UME) 151*512kB (UM) 54*1024kB (UME) 17*2048kB (UM) 650*4096kB (UM) = 3074704kB [ 858.539827][T11930] 29747 total pagecache pages [ 858.591855][T11930] 0 pages in swap cache [ 858.596187][T11930] Free swap = 124996kB [ 858.600694][T11930] Total swap = 124996kB [ 858.621569][T11930] 2097051 pages RAM [ 858.645862][T11930] 0 pages HighMem/MovableOnly [ 858.761310][T11930] 346836 pages reserved [ 858.765645][T11930] 0 pages cma reserved [ 859.607850][T11987] device pim6reg1 entered promiscuous mode [ 860.137667][ T28] audit: type=1400 audit(1756974708.655:144): avc: denied { create } for pid=11998 comm="syz.0.3440" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 860.282250][T12005] device wg2 left promiscuous mode [ 860.294464][T12005] device wg2 entered promiscuous mode [ 861.381148][T12023] device wg2 left promiscuous mode [ 861.471780][T12023] device wg2 entered promiscuous mode [ 865.053429][ T28] audit: type=1400 audit(1756974713.575:145): avc: denied { read } for pid=12064 comm="poweroff" name="log" dev="sda1" ino=2010 scontext=system_u:system_r:acpid_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 Stopping sshd: stopped /usr/sbin/sshd (pid 194) OK Stopping crond: stopped /usr/sbin/crond (pid 187) OK Stopping dhcpcd... stopped /sbin/dhcpcd (pid 141) [ 866.825892][ T28] audit: type=1400 audit(1756974715.345:146): avc: denied { search } for pid=12090 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 Stopping network: [ 867.000492][T12094] device syzkaller0 entered promiscuous mode [ 867.401221][ T28] audit: type=1400 audit(1756974715.915:147): avc: denied { write } for pid=142 comm="dhcpcd" name="dhcpcd" dev="tmpfs" ino=488 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 867.671246][ T28] audit: type=1400 audit(1756974715.915:148): avc: denied { remove_name } for pid=142 comm="dhcpcd" name="sock" dev="tmpfs" ino=490 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 867.875178][ T28] audit: type=1400 audit(1756974715.915:149): avc: denied { unlink } for pid=142 comm="dhcpcd" name="sock" dev="tmpfs" ino=490 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=sock_file permissive=1 [ 868.050710][ T28] audit: type=1400 audit(1756974715.945:150): avc: denied { unlink } for pid=142 comm="dhcpcd" name="pid" dev="tmpfs" ino=489 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 umount: can't remount debugfs read-only umount: tmpfs busy - remounted read-only [ 868.936037][ T103] udevd[103]: could not unlink /run/udev/queue: Read-only file system umount: selinuxfs busy - remounted read-only [ 869.014501][ T4740] udevd[4740]: Failed to create symlink /run/udev/watch/3496: Read-only file system [ 869.037473][ T103] udevd[103]: could not touch /run/udev/queue: Read-only file system [ 869.055107][T12133] device wg2 left promiscuous mode [ 869.074976][ T4740] udevd[4740]: Failed to create symlink /run/udev/watch/3496: Read-only file system [ 869.101354][ T103] udevd[103]: could not touch /run/udev/queue: Read-only file system [ 869.122845][T12133] device wg2 entered promiscuous mode [ 869.128449][ T103] udevd[103]: could not unlink /run/udev/queue: Read-only file system umount: sysfs busy - remounted read-only umount: devtmpfs busy - remounted read-only umount: can't remount /dev/root read-only[ 869.181426][ T103] udevd[103]: could not unlink /run/udev/queue: Read-only file system Connection to 10.128.1.103 closed by remote host. [ 869.206043][ T28] audit: type=1400 audit(1756974717.725:151): avc: denied { write } for pid=275 comm="syz-executor" path="pipe:[14076]" dev="pipefs" ino=14076 scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:sshd_t tclass=fifo_file permissive=1 [ 869.232896][ T103] udevd[103]: could not unlink /run/udev/queue: Read-only file system Sent SIGTERM to all processes acpid: exiting Sent SIGKILL to all processes Requesting system poweroff [ 870.362033][ T10] device bridge_slave_1 left promiscuous mode [ 870.368134][ T10] bridge0: port 2(bridge_slave_1) entered disabled state [ 870.375400][ T10] device bridge_slave_0 left promiscuous mode [ 870.381497][ T10] bridge0: port 1(bridge_slave_0) entered disabled state [ 870.389041][ T10] device bridge_slave_1 left promiscuous mode [ 870.395162][ T10] bridge0: port 2(bridge_slave_1) entered disabled state [ 870.402491][ T10] device bridge_slave_0 left promiscuous mode [ 870.408562][ T10] bridge0: port 1(bridge_slave_0) entered disabled state [ 870.416211][ T10] device bridge_slave_1 left promiscuous mode [ 870.422346][ T10] bridge0: port 2(bridge_slave_1) entered disabled state [ 870.429559][ T10] device bridge_slave_0 left promiscuous mode [ 870.435667][ T10] bridge0: port 1(bridge_slave_0) entered disabled state [ 870.443233][ T10] device bridge_slave_1 left promiscuous mode [ 870.449300][ T10] bridge0: port 2(bridge_slave_1) entered disabled state [ 870.456626][ T10] device bridge_slave_0 left promiscuous mode [ 870.462799][ T10] bridge0: port 1(bridge_slave_0) entered disabled state [ 870.470779][ T10] device veth1_macvtap left promiscuous mode [ 870.476950][ T10] device veth0_vlan left promiscuous mode [ 870.482857][ T10] device veth0_vlan left promiscuous mode [ 870.488696][ T10] device veth1_macvtap left promiscuous mode [ 870.494743][ T10] device veth0_vlan left promiscuous mode [ 871.307942][T12136] kvm: exiting hardware virtualization [ 871.314178][T12136] sd 0:0:1:0: [sda] Synchronizing SCSI cache [ 871.321002][T12136] ACPI: PM: Preparing to enter system sleep state S5 [ 871.328025][T12136] reboot: Power down serialport: VM disconnected.