last executing test programs: 3.714084189s ago: executing program 4 (id=29356): r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000700)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000080850000000400000095"], &(0x7f00000004c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000000)='kmem_cache_free\x00', r0}, 0x10) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000740)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000001bc0)={0x11, 0x7, &(0x7f0000000540)=ANY=[@ANYBLOB="1800000000020000000000000000000018110000", @ANYRES32=r4, @ANYRES8=r1], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x2a, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000240)={&(0x7f0000000340)='kmem_cache_free\x00', r5}, 0x18) sendmsg$tipc(r3, &(0x7f0000003280)={0x0, 0x0, 0x0}, 0x0) sendmsg$tipc(r3, &(0x7f0000000e40)={0x0, 0x0, 0x0}, 0x0) sendmsg$tipc(r3, &(0x7f0000002700)={0x0, 0x0, 0x0}, 0x0) setsockopt$sock_attach_bpf(r2, 0x1, 0x21, &(0x7f0000000040), 0x4) sendmsg$tipc(r3, &(0x7f0000000240)={0x0, 0x0, 0x0}, 0x0) close(r3) recvmsg(r2, &(0x7f0000000500)={0x0, 0x0, &(0x7f0000000880)=[{&(0x7f0000000600)=""/203, 0xcb}], 0x1}, 0x12121) 2.809254786s ago: executing program 4 (id=29370): socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r0, 0x8914, &(0x7f0000000900)={'bridge0\x00', @remote}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000edff0000000000000000850000000f00000018010000646c012500000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000800000850000000600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x29, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f0000000300)='sched_switch\x00', r1}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000640)={0x1e, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="1800000000000000000000000000000079123b00000000009500000000002000"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24}, 0x80) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'syzkaller0\x00', 0xca58c30f81b6079d}) mkdir(&(0x7f0000000580)='./file0\x00', 0xaa) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r2, 0x8914, &(0x7f0000000900)={'bridge0\x00', @broadcast}) 2.792778447s ago: executing program 4 (id=29372): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)=ANY=[], 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000600)={0x10, 0x3, &(0x7f0000000500)=ANY=[], &(0x7f0000000480)='GPL\x00'}, 0x94) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000100), &(0x7f0000000580), 0x1000, r0}, 0x38) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000001600)={r0, &(0x7f00000006c0), &(0x7f0000001580)=""/83}, 0x20) r1 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000006c0)=ANY=[@ANYBLOB="1b0000000000000000000000000004"], 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, 0x0, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x1, 0x4, 0x7fe2, 0x1, 0x1}, 0x50) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000680), &(0x7f0000000780), 0x6, r2}, 0x38) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000700)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000001000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000003"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={&(0x7f0000000180)='workqueue_activate_work\x00', r4}, 0x10) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x11, 0xc, &(0x7f0000000bc0)=ANY=[@ANYRES16=r4, @ANYBLOB="e6c714034ab5572dfc7fa8b987ba50da57152ea6ce42b07bf57e26676cec18aeb9bae4f9fa5e18bd54aa74a6868d98949019e8c5199559fbc3755283fbe4ad919f65ea6f36c79b0db539ad033e5cd58d1c6403e00950a765e11a720e6c1e58b724c6c7613d5077a35a1980cffde9983b70bb47a58b88a6805cf645c9de2c544d2550f6eae131f1c39892c5f3ecedcffdf66ebe9fc717e121f0a78293c332b90f2978d6f58c7762b434049a080fbdd49302c79c3118a788be78edc3f7f5342d737b4a733455c76b2a0d43cf214420c873bfb38d94e9a67129fda5154fa1e966716c19747bac287109681ea7929396df", @ANYRES16=r3], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1b, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r4, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={&(0x7f0000000180)='workqueue_activate_work\x00', r5}, 0x10) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) setsockopt$sock_attach_bpf(r6, 0x1, 0x1d, &(0x7f00000001c0), 0x4) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000b80)=ANY=[@ANYBLOB], 0x0, 0xfc5f}, 0x28) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x11, 0xf, &(0x7f0000000340)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7020000140000e5b7030000000000008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000000000008500000084000000b70000000000000095"], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000000)='sched_switch\x00', r7}, 0x10) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r8, 0x8914, &(0x7f0000000900)={'bridge0\x00', @remote}) perf_event_open(&(0x7f0000000800)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000003c0), 0x3}, 0x1000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r9, 0x89a1, &(0x7f0000000900)={'bridge0\x00', @broadcast}) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r10, 0x8914, &(0x7f0000000900)={'bridge0\x00', @remote}) bpf$PROG_LOAD(0x5, &(0x7f0000000ec0)={0x0, 0x1ffffffffffffdf4, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000070000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000a5df850000002d00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x8, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r11 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000001c0)=@o_path={&(0x7f0000000000)='./file0\x00', r10, 0x4000, r11}, 0x18) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000300)='sys_enter\x00', r11}, 0x10) 2.63739556s ago: executing program 4 (id=29375): perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8f1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000140)=@base={0x5, 0x6, 0x8, 0xae, 0x0, 0x1, 0x20727ff}, 0x50) bpf$MAP_CREATE(0x0, &(0x7f00000008c0)=@base={0xd, 0x2, 0x4, 0x4006, 0x5, r0, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x8000000}, 0x50) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000006d00000095"], 0x0}, 0x90) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0xc48}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000003480)={0x11, 0x2, &(0x7f00000001c0)=ANY=[@ANYBLOB="17010000a4fc0a000500feff"], &(0x7f0000000000)='GPL\x00', 0x6, 0x89, &(0x7f0000003300)=""/137, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x9}, 0x80) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000200)={r0, 0x58, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000300)={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x200, '\x00', r1, 0xffffffffffffffff, 0x0, 0x2}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000edff0000000000000000850000000f00000018010000646c012500000000000000007b1a"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00', r2}, 0x10) 1.978105143s ago: executing program 2 (id=29382): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="19000000040000000400000005"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000280)={{r0}, &(0x7f0000000040), &(0x7f0000000180)=r1}, 0x20) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r2}, 0x10) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$tipc(r3, &(0x7f0000004440)={&(0x7f0000000ec0)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x2}}, 0x10, 0x0}, 0x20044885) 1.974463222s ago: executing program 2 (id=29383): socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r0, &(0x7f0000001580)={0x0, 0x0, &(0x7f0000001400)=[{&(0x7f0000000080)="3bfdd75fa5717852d59a9367444a2130e72cd4dabc8854532cca0c32a5b9f844a4610c7525650ce3d3b76b15026d93e6dee896115e9364066aa3d14e33ef732b4681335c576902153114bdb9c74b538a71115fb1d1a63d1b04129661b29aab89d0be999a6b7c9bea755adedbf305a79f70b71d3d4c98577b49db4963ce89b0def5e840f459659cb6f86d56b069a5de11d601d348ff88ca6e5e2cfe40176880b33e9e8dbc32ba2e6a99b1b50276dc4f06166000d7069a3cc76f", 0xb9}, {&(0x7f0000000180)="892950e2405ee8629d9384a90f16d1706a3e61f305119f95cac0f1927f4c205b971eb41147cb1f86883d6910e68ac3996551800b3ec64b77f8444b18345a2c8b178eeeba0cde7319a5a46bfe7f5770e019efd9d52069edcced33a758c4e657f3a792dc193a1911b4e82ea800ad7afe03c851a8", 0x73}, {&(0x7f0000000200)="a68cde0d56b170df7710b54f17d9a39c4f98f3547190", 0x20000216}, {&(0x7f0000000240)="45e04400f2b383517a08c397dd0a76e67ecfc8e74573c24dedd3a48fb62418c1412fdcd15e888cb0f5d02e77bfecefda6b064c0bb2b66a9a522e63873dde02330510255eec7dfa1af708cdab59fb71eca786a359a2c3b0cbad35144ec5b069c53f90e43339845dc7fd140c55b0149ab38eb27c140f374bcc2c95b0b121d1a9302f3a01b888243b3fc0d46f0de0", 0x8d}, {&(0x7f0000000300)="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", 0xcb3}], 0x5, &(0x7f0000001480)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @private, @multicast1}}}], 0x20}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x16, 0xb, 0x0, &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @flow_dissector, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0x1c, 0x0, 0x0) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000340)={0x11, 0x3, &(0x7f0000000080)=ANY=[@ANYBLOB="180000000000000000000000000000009500"], &(0x7f0000000000)='syzkaller\x00'}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f00000001c0)='sched_process_wait\x00', r2}, 0x18) bpf$BPF_PROG_DETACH(0x9, &(0x7f00000002c0)={@ifindex, 0xffffffffffffffff, 0x11}, 0x20) recvmsg$unix(r1, &(0x7f0000001140)={0x0, 0x0, &(0x7f0000001040)=[{&(0x7f00000015c0)=""/4096, 0x7ffff000}], 0x1}, 0x40000300) recvmsg(r1, &(0x7f00000013c0)={0x0, 0x0, 0x0}, 0x2) 1.878999114s ago: executing program 4 (id=29386): bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={0xffffffffffffffff, 0x0, &(0x7f0000000440)=""/183}, 0x20) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'ip6gre0\x00', 0x210}) r0 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) r1 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000680)={0x1b, 0x0, 0x0, 0x80000001, 0x0, 0x1, 0x1, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x1, 0x2}, 0x50) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x20800, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000080)={'syzkaller0\x00', 0xf101}) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) close(r3) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000340)) ioctl$SIOCSIFHWADDR(r3, 0x8914, &(0x7f0000002280)={'syzkaller0\x00', @link_local}) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) close(r4) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x11, 0x5, &(0x7f00000000c0)=ANY=[@ANYBLOB="180000000000000000000000ff010000850000000e000000850000005000000095"], &(0x7f0000000100)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000040)='kmem_cache_free\x00', r5}, 0x9) ioctl$SIOCSIFHWADDR(r4, 0x8943, &(0x7f0000002280)={'syzkaller0\x00', @random="0100"}) r6 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000940)=ANY=[@ANYBLOB="0200000004000000080000000100000080000000", @ANYRES32, @ANYBLOB="18e400"/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="00000000040000000000000000000000000000ec3800000000000000"], 0x50) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000400)={{r0, 0xffffffffffffffff}, &(0x7f0000000380), &(0x7f00000003c0)=r0}, 0x20) r9 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000840)={&(0x7f0000000700)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x4a, 0x4a, 0x5, [@array={0x0, 0x0, 0x0, 0x3, 0x0, {0x2, 0x4}}, @datasec={0x1, 0x3, 0x0, 0xf, 0x2, [{0x2, 0x6f88, 0x200}, {0x2, 0x1, 0x3}, {0x2, 0x6, 0x9}], "c90b"}]}, {0x0, [0x2e, 0x61, 0x0]}}, &(0x7f0000000780)=""/152, 0x69, 0x98, 0x0, 0x5}, 0x28) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x4, &(0x7f0000000400)=ANY=[@ANYBLOB="b400000000000000691075000000000004003220000000009500000000000000"], &(0x7f0000000080)='GPL\x00', 0x2, 0x3f7, &(0x7f000000cf3d)=""/195}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000a00)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f00000008c0), &(0x7f0000000900)=r0}, 0x20) r11 = bpf$ITER_CREATE(0x21, &(0x7f0000000b00), 0x8) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff}) recvmsg$unix(r12, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r13, &(0x7f0000000000), 0xfdef) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000bc0)={0x18, 0x21, &(0x7f0000000500)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0xfffffffb, 0x0, 0x0, 0x0, 0x3}, {{0x18, 0x1, 0x1, 0x0, 0x1}}, {}, [@generic={0x0, 0x6, 0x2, 0x1, 0x5}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, r8}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x8}}, @map_idx_val={0x18, 0x2, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, @call={0x85, 0x0, 0x0, 0x92}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x1}, @map_idx_val={0x18, 0x3}, @map_val={0x18, 0x8, 0x2, 0x0, r1, 0x0, 0x0, 0x0, 0xb}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000640)='GPL\x00', 0x8, 0x0, 0x0, 0x41100, 0x4c, '\x00', 0x0, 0x0, r9, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000880)={0x2, 0x9, 0x6}, 0x10, 0x0, 0x0, 0x3, &(0x7f0000000b40)=[r10, r6, r1, r1, r11, r7, r13, r6, r6], &(0x7f0000000b80)=[{0x1, 0x5, 0x9, 0x2}, {0x4, 0x1, 0xc, 0x1}, {0x3, 0x2, 0x10, 0x3}], 0x10, 0xafe}, 0x94) perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x0, 0x0, 0xfd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000, 0x0, @perf_config_ext, 0x800, 0x0, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2ff}, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[], 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1f, 0xc, 0x0, &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x12, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) 1.616014529s ago: executing program 3 (id=29392): bpf$MAP_CREATE_RINGBUF(0x0, 0x0, 0x50) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r0, 0x8914, &(0x7f0000000000)={'veth0_vlan\x00', @random="08f272f808af"}) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="0b00000007000000010001000900000001000000", @ANYRES32, @ANYBLOB="00000000000000000000000000000000000000002ca873a39626a290fa8d49433e7eb0cf7d63b524e789fe5b76cda25182ced290ee513c0994c9ca6b4e76d6e19283fab3e500a4865cf775967e2e", @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r1, &(0x7f0000000080), &(0x7f0000000200)=""/166}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b70800000d0000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x6, 0x9, 0x0, 0x8, 0x18000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000340)}, 0x454, 0xc8, 0x3, 0x6}, 0x0, 0x400000, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r3) recvmsg$unix(r2, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f00000000c0)) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="05000000010000000a00000008"], 0x48) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000002000000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='kmem_cache_free\x00', r5}, 0x10) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r6, 0x8923, &(0x7f0000000000)={'vlan1\x00', @broadcast}) 1.59046241s ago: executing program 3 (id=29393): r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000700)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000080850000000400000095"], &(0x7f00000004c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000000)='kmem_cache_free\x00', r0}, 0x10) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000740)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000001bc0)={0x11, 0x7, &(0x7f0000000540)=ANY=[@ANYBLOB="1800000000020000000000000000000018110000", @ANYRES32=r4, @ANYRES8=r1], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x2a, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000240)={&(0x7f0000000340)='kmem_cache_free\x00', r5}, 0x18) sendmsg$tipc(r3, &(0x7f0000003280)={0x0, 0x0, 0x0}, 0x0) sendmsg$tipc(r3, &(0x7f0000000e40)={0x0, 0x0, 0x0}, 0x0) close(r3) recvmsg(r2, &(0x7f0000000500)={0x0, 0x0, &(0x7f0000000880)=[{&(0x7f0000000600)=""/203, 0xcb}], 0x1}, 0x12121) 1.58102153s ago: executing program 3 (id=29394): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) close(r0) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x2d, 0x0, 0x0, 0x0, 0x10, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback=0x3, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r2 = perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x20, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x7, 0x80}, 0x0, 0x1, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) r3 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000001480)={'syzkaller0\x00', 0x7101}) r4 = perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xad, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b70800000d0000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="09000000070000000080000001"], 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000000)={{r6, 0xffffffffffffffff}, &(0x7f0000000040), &(0x7f0000000280)}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0xd, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000020d0039000000000000b4a518110000", @ANYRES32=r7], 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x31, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000000)='workqueue_queue_work\x00', r8}, 0x10) close(r4) close(r3) r9 = getpid() perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0xd, 0x4, 0x52, 0xe, 0x0, 0xfff, 0x2028, 0x4, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0xad5a, 0x1, @perf_config_ext={0x7, 0x100000000}, 0x102100, 0x8, 0x9, 0x9, 0xffffffff, 0x4, 0x9, 0x0, 0x0, 0x0, 0xa}, r9, 0x0, r2, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="0e0000000400000008000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="000000000000000000000000000000f8ca00"/30], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r10 = bpf$MAP_CREATE(0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="80c90d4118022305000000049d14c5fe51", @ANYRES64=r5, @ANYBLOB='\x00'/20, @ANYBLOB="1fc3e36a76f8180b415e359740dd431ba84f928ca7f181001ed336ae25a7b7dbad5af17203dc1de60b69ea6866329cc131444c3dd613081f2c9a0a86f2e28fb29a5ed80674e9d21eb1860665b10c695bc3a19eaa3a69d34f8747efd8a020d1a19cf7ae9e39174b606d00845257ab0e0ffe2253dd4f70988f05f8fca6d688372c9c905b151f262858f2376d0a7718079105", @ANYRES64=r4, @ANYBLOB='\x00'/28], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r10, @ANYBLOB], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000200)={{r10}, &(0x7f0000000040), &(0x7f0000000280)}, 0x20) r11 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r11}, 0x10) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TUNSETOFFLOAD(r1, 0xc004743e, 0x110e22fff6) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000002400000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000edff0000000000000000850000000f00000018010000646c012500000000000000007b1a"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x90) 1.356062974s ago: executing program 3 (id=29395): bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="02000000040000000800000001"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x20, 0x10, &(0x7f0000000580)=ANY=[@ANYBLOB="18050000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r0, @ANYBLOB="0000000000000000b704000008000000850000007800000095"], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x73cea2d47785b264, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000280)='sched_switch\x00', r1}, 0x18) socketpair$nbd(0x1, 0x1, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, 0x0) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x3, @perf_bp={0x0, 0x4}, 0x6000, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB, @ANYBLOB], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) socketpair$tipc(0x1e, 0x5, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000000900)={0x0, 0x0, 0x0}, 0x0) r2 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r3 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)=ANY=[@ANYRES32=0x0, @ANYBLOB="000000100000000000000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB='\x00'/28], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x11, 0xf, &(0x7f0000000340)=ANY=[@ANYRES32=r3, @ANYBLOB="0000000000000000b7020000140000e5b7030000000000008500000083000000bf090000000000005509010000"], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000040)='erofs_destroy_inode\x00', r2, 0x0, 0xffffffffe}, 0x18) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x11, 0x13, &(0x7f0000000080)=ANY=[@ANYBLOB="1808000000000000000000000000000085100000060000001802b0ff", @ANYRES32, @ANYBLOB="00000000000000006600020000000000180000000000000000000000000000009500040000000000360a020000000000180100002020782500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b50a00000000000085000000060000009500000000000000"], &(0x7f0000000000)='GPL\x00', 0x2, 0xff5c, &(0x7f0000000340)=""/222}, 0x78) r5 = perf_event_open(&(0x7f0000000380)={0x2, 0x80, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, 0x0, &(0x7f0000001080)='syzkaller\x00', 0xfffffffe, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r4, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_FILTER(r5, 0x40082406, &(0x7f0000000540)='(pu&00\t(|') r6 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETIFF(r6, 0x400454ca, &(0x7f0000000140)={'pim6reg1\x00', 0x1}) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={0xffffffffffffffff, 0x0, &(0x7f0000000200)=""/166}, 0x20) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000280)={0x12, 0x3, &(0x7f0000000000)=@framed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x14}, 0x94) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'sit0\x00'}) 1.145245078s ago: executing program 0 (id=29396): perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8f1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000140)=@base={0x5, 0x6, 0x8, 0xae, 0x0, 0x1, 0x20727ff}, 0x50) bpf$MAP_CREATE(0x0, &(0x7f00000008c0)=@base={0xd, 0x2, 0x4, 0x4006, 0x5, r0, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x8000000}, 0x50) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000006d00000095"], 0x0}, 0x90) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0xc48}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000003480)={0x11, 0x2, &(0x7f00000001c0)=ANY=[@ANYBLOB="17010000a4fc0a000500feff"], &(0x7f0000000000)='GPL\x00', 0x6, 0x89, &(0x7f0000003300)=""/137, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x9}, 0x80) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000200)={r0, 0x58, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000300)={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x200, '\x00', r1, 0xffffffffffffffff, 0x0, 0x2}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000edff0000000000000000850000000f00000018010000646c012500000000000000007b1a"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00', r2}, 0x10) 1.099934339s ago: executing program 2 (id=29397): r0 = bpf$MAP_CREATE(0x0, 0x0, 0x50) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r2, &(0x7f0000000f80)={0x0, 0x0, &(0x7f0000000f40)=[{&(0x7f00000042c0)='(', 0x1}], 0x1}, 0x4004020) sendmsg$tipc(r2, &(0x7f0000000680)={&(0x7f00000002c0)=@id={0x1e, 0x3, 0x2, {0x4e23, 0x3}}, 0x10, &(0x7f0000000400)=[{&(0x7f0000000340)="900748feb2d7", 0x6}, {&(0x7f0000000380)="0b02788af409b344acc7e919c87b0756e3da402d72c73349b2dc43ad468d12f95824f61071292f712eb4f5f5088a70d61f8c704a813e591103728a004d37b7113d2904a727dc740a3b091e3d17", 0x4d}, {&(0x7f00000004c0)="352412e712e60584efd2f5c3ff34d74a1905d11e98371b7f64277e232a99b830a405565918c3c850bd3e72d6e891cde1b29811d3408c009a5678b0d97cfc1540542b107583bbd25f3a436a1155ab44cf46efd4fe4385873c0435c1dab90372bb3c02cf1463cf948d99a234acca15b61e82a8ace06867992bdca0a8cc558f14a6e1a0384d32feafd9825751de9121f32d5c7f5e4a97fe74e83909a9abeb56918c6f9553a2644621113f9283fa254a8c0fd1d5f106e0397427802b3a1393b00cb7c7a11b4900", 0xc5}], 0x3, &(0x7f00000005c0)="31a3b04e765465747d9ebdb6fdc38ff6bbf1352565d70a84ce437352159eb697a93fc9099254f22a9c1e53d5069aae34f22722c3a6263d873122c9b5331f015c067b8d6dcf69e6f3dd706778c71bcd79e57b9704165cc692383422e3ab876f31a7131d2d89ada6e21bf66446c90944577bed061fcf043ec50b6f91ab8077440596e93a0b9129e776bf2aa11fe24f0e6f0e32c711547b66fb8854630bae990a10", 0xa0, 0x11}, 0x4004001) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYRESDEC=r1, @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r3 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="0200000004000000080000000100000080000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="ffff5f7e"], 0x17) bpf$MAP_LOOKUP_ELEM(0x5, &(0x7f00000000c0)={r3, &(0x7f0000000000), &(0x7f0000000040)=""/73}, 0x70) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000080)={r0, 0x58, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) write$cgroup_int(r5, &(0x7f0000000200), 0x43451) r6 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000240)={0x3, 0x4, 0x4, 0xa, 0x0, r0, 0x400, '\x00', r4, r5, 0x0, 0x0, 0x2}, 0x50) r7 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x1c1341, 0x0) r8 = bpf$PROG_LOAD(0x5, &(0x7f0000000a00)={0x11, 0x7, &(0x7f0000000600)=ANY=[@ANYBLOB="1800000000020000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b702000001"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000240)={&(0x7f0000000340)='kmem_cache_free\x00', r8}, 0x18) bpf$MAP_LOOKUP_BATCH(0x18, &(0x7f0000000900)={&(0x7f00000006c0), &(0x7f0000000700)=""/148, &(0x7f00000007c0)="8eaa966a", &(0x7f0000000800)="2de819a166e554b62d8ae17fa85e4b205a0b4286c1045f04a6eb0f5bc48c602c4564272a3b6ab97c07793d8ae42ade1fdb66be142f32c07bcf17e76f544997587cf1740a62f7bfad4a2c33e8af75102e9e94bb87b3ba252c50d9f2ec7302913437bc2151cff1dc96a2f732a5ffc59bf33140ffbb17d36878cbc8461f430875254dc1340be32fab11cea9bc93c2241610b4eb8949a64b121cb624269c1ba79e5fcc33536678a3a0db0cb7e27b3b3ed7e14268cab3976d1f8ab24d23d4007cc5575f0c89a63d8825673fe165d232fbe99e946bcca7ed9a272dfe318eb723d3156c031ac9ab884cf089e69f4216", 0x1, r6}, 0x38) ioctl$TUNSETIFF(r7, 0x400454ca, &(0x7f00000000c0)={'syzkaller0\x00', 0x84aebfbd6349b7f2}) r9 = bpf$MAP_CREATE(0x0, &(0x7f0000000940)=ANY=[@ANYBLOB="0004000000080000f20100000000000000000000ad283209650310fede043fe1641569738a9468cb8d17cd314638b0d1c9b35f64f0a5aefc918a695152bbd25b48bb0b19f8", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) r10 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x8, &(0x7f0000000740)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r9, @ANYBLOB="0000000000000000b703000000030000850000001b000000b70000000000000095"], &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000140)='kmem_cache_free\x00', r10}, 0x18) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r11 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) close(r11) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) ioctl$SIOCSIFHWADDR(r11, 0x8914, &(0x7f0000002280)={'syzkaller0\x00', @link_local}) bpf$ENABLE_STATS(0x20, 0x0, 0x0) r12 = bpf$MAP_CREATE(0x0, &(0x7f0000010140)=ANY=[@ANYBLOB="170000000000000004000000ff"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r12, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180001003bd42aff00fe03000000000018110000", @ANYRES32=r12, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000058"], 0x0, 0x40000000, 0x0, 0x0, 0x0, 0x60}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000180)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) 1.094435279s ago: executing program 3 (id=29398): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="19000000040000000400000005"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000280)={{r0}, &(0x7f0000000040), &(0x7f0000000180)=r1}, 0x20) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r2}, 0x10) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$tipc(r3, &(0x7f0000004440)={&(0x7f0000000ec0)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x2}}, 0x10, 0x0}, 0x20044885) (fail_nth: 2) 813.122355ms ago: executing program 0 (id=29399): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000740)=ANY=[@ANYBLOB], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f0000000600)=ANY=[@ANYBLOB="1800000000020000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7020000010000008500"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) syz_clone(0x11, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$tipc(r2, &(0x7f0000000e40)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20040018}, 0x0) sendmsg$inet(r2, &(0x7f0000000f80)={0x0, 0x0, &(0x7f0000000f40)}, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x21, &(0x7f0000000040), 0x4) recvmsg(r1, &(0x7f0000000900)={0x0, 0x0, &(0x7f0000000880)=[{&(0x7f0000000600)=""/203, 0xcb}], 0x1}, 0x0) close(r2) 802.125375ms ago: executing program 1 (id=29400): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="160000000000000004000000ff"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x42}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000000)={{r0}, 0x0, &(0x7f0000000040)}, 0x20) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r1}, 0x10) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x1c1341, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f00000000c0)={'syzkaller0\x00', 0x84aebfbd6349b7f2}) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) close(r3) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)) ioctl$SIOCSIFHWADDR(r3, 0x8914, &(0x7f0000002280)={'syzkaller0\x00', @link_local}) write$cgroup_subtree(r2, &(0x7f0000000000)=ANY=[@ANYBLOB="8fedcb5d07081196f37538e486dd6372ce22667f2b00dbf6e97158b33d4fec877f1b6d76745b686158bbcfe8875afdef00010000000029"], 0x66) 792.198495ms ago: executing program 3 (id=29401): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000380)=ANY=[@ANYBLOB="18010000000000000000000000000000850000006d0000001801000020646c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000000085000000"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.throttle.io_serviced_recursive\x00', 0x26e1, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$MAP_CREATE(0x0, 0x0, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16, 0x0, 0x4, 0xff, 0x0, 0x1}, 0x48) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8924, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYRES32=r4, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000900)={0x1b, 0x0, 0x0, 0x8, 0x0, 0xffffffffffffffff, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x4}, 0x50) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000580)=ANY=[@ANYBLOB="0200000004000000080000000100000080000000", @ANYRES32, @ANYBLOB='\x00'/10, @ANYRES32=0x0, @ANYRES32=r1, @ANYBLOB="01000000040000000200"/28], 0x50) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r5}, 0x10) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001780)={&(0x7f0000000000)=ANY=[@ANYBLOB="9feb01001800000000000000140000001400000006000000020000000100000604000000020000000000000000002e3025"], &(0x7f0000000780)=""/4096, 0x32, 0x1000, 0x1}, 0x20) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000058"], 0x0}, 0x90) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000500)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f0000000300)='sched_switch\x00', r6}, 0x10) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002ac0)={0x1a, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="1800000000000000000000000000000095000000000000003f64ecb21ed7d74b542e43ae9f57f61af1c5b6016901992307df92d7c26b05a7da0582d208fd1f57c41cee38c7023e71dc864ab49f7894dd5ee29721d0625ee50c8aeca9b5090d85ff1c5df40229f0981507171aec7dc97abd981893d51a27e8a1033fa344fa3c6c27705648a66a47e0a1bc8fcede095704453c77f6c5370191ab55c423aae05729e69c987cf5f9aa2fd88c9e2114f53b9f82157c197397e43647b083db79f1f2"], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x18, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x20c9}, 0x80) recvmsg(r2, &(0x7f0000000500)={&(0x7f0000000040)=@hci, 0x80, &(0x7f0000000100)=[{&(0x7f0000000400)=""/248, 0x200105d0}], 0x1}, 0x1f00) bpf$PROG_LOAD(0x5, &(0x7f0000000740)={0x11, 0xf, &(0x7f0000000340)=@ringbuf={{}, {}, {}, [], {{}, {}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f00000002c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x1030, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$tipc(r3, &(0x7f0000000240)={0x0, 0xfffffff5, &(0x7f0000000200)=[{&(0x7f0000000140)="a2", 0xfffffdef}], 0x1}, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000040)='sys_enter\x00', r0}, 0x10) unlink(0x0) r7 = bpf$MAP_CREATE(0x0, &(0x7f0000000440)=@base={0x9, 0x40, 0x6, 0x8}, 0x48) bpf$MAP_CREATE(0x0, &(0x7f0000000040)=@base={0xc, 0x4, 0x4, 0xffff7fff, 0x0, r7}, 0x48) openat$tun(0xffffffffffffff9c, &(0x7f0000000200), 0x10000, 0x0) 780.513365ms ago: executing program 4 (id=29402): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000380)=ANY=[@ANYBLOB="18010000000000000000000000000000850000006d0000001801000020646c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007300000095"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.throttle.io_serviced_recursive\x00', 0x26e1, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$MAP_CREATE(0x0, 0x0, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16, 0x0, 0x4, 0xff, 0x0, 0x1}, 0x48) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8924, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYRES32=r4, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0}, 0x94) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000900)={0x1b, 0x0, 0x0, 0x8, 0x0, 0xffffffffffffffff, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x4}, 0x50) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000580)=ANY=[@ANYBLOB="0200000004000000080000000100000080000000", @ANYRES32, @ANYBLOB='\x00'/10, @ANYRES32=0x0, @ANYRES32=r1, @ANYBLOB="01000000040000000200"/28], 0x50) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r5}, 0x10) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000500)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f0000000300)='sched_switch\x00', r6}, 0x10) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002ac0)={0x1a, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="1800000000000000000000000000000095000000000000003f64ecb21ed7d74b542e43ae9f57f61af1c5b6016901992307df92d7c26b05a7da0582d208fd1f57c41cee38c7023e71dc864ab49f7894dd5ee29721d0625ee50c8aeca9b5090d85ff1c5df40229f0981507171aec7dc97abd981893d51a27e8a1033fa344fa3c6c27705648a66a47e0a1bc8fcede095704453c77f6c5370191ab55c423aae05729e69c987cf5f9aa2fd88c9e2114f53b9f82157c197397e43647b083db79f1f2"], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x18, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x20c9}, 0x80) recvmsg(r2, &(0x7f0000000500)={&(0x7f0000000040)=@hci, 0x80, &(0x7f0000000100)=[{&(0x7f0000000400)=""/248, 0x200105d0}], 0x1}, 0x1f00) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x1030, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$tipc(r3, &(0x7f0000000240)={0x0, 0xfffffff5, &(0x7f0000000200)=[{&(0x7f0000000140)="a2", 0xfffffdef}], 0x1}, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000040)='sys_enter\x00', r0}, 0x10) unlink(0x0) r7 = bpf$MAP_CREATE(0x0, &(0x7f0000000440)=@base={0x9, 0x40, 0x6, 0x8}, 0x48) bpf$MAP_CREATE(0x0, &(0x7f0000000040)=@base={0xc, 0x4, 0x4, 0xffff7fff, 0x0, r7}, 0x48) openat$tun(0xffffffffffffff9c, &(0x7f0000000200), 0x10000, 0x0) 780.255175ms ago: executing program 0 (id=29403): bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f0000000540)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b702000003000000850000008600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000000)='sys_enter\x00', r1}, 0x10) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000140)={'pim6reg1\x00', 0x1}) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r3, 0x8914, &(0x7f0000000100)={'pim6reg1\x00', @broadcast}) 637.949507ms ago: executing program 2 (id=29404): r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000700)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000080850000000400000095"], &(0x7f00000004c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000000)='kmem_cache_free\x00', r0}, 0x10) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000740)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000001bc0)={0x11, 0x7, &(0x7f0000000540)=ANY=[@ANYBLOB="1800000000020000000000000000000018110000", @ANYRES32=r4, @ANYRES8=r1], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x2a, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000240)={&(0x7f0000000340)='kmem_cache_free\x00', r5}, 0x18) sendmsg$tipc(r3, &(0x7f0000003280)={0x0, 0x0, 0x0}, 0x0) sendmsg$tipc(r3, &(0x7f0000000e40)={0x0, 0x0, 0x0}, 0x0) close(r3) recvmsg(r2, &(0x7f0000000500)={0x0, 0x0, &(0x7f0000000880)=[{&(0x7f0000000600)=""/203, 0xcb}], 0x1}, 0x12121) 637.317877ms ago: executing program 2 (id=29405): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) close(r0) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x2d, 0x0, 0x0, 0x0, 0x10, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback=0x3, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r2 = perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x20, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x7, 0x80}, 0x0, 0x1, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) r3 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000001480)={'syzkaller0\x00', 0x7101}) r4 = perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xad, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b70800000d0000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="09000000070000000080000001"], 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000000)={{r6, 0xffffffffffffffff}, &(0x7f0000000040), &(0x7f0000000280)}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0xd, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000020d0039000000000000b4a518110000", @ANYRES32=r7], 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x31, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000000)='workqueue_queue_work\x00', r8}, 0x10) close(r4) close(r3) r9 = getpid() perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0xd, 0x4, 0x52, 0xe, 0x0, 0xfff, 0x2028, 0x4, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0xad5a, 0x1, @perf_config_ext={0x7, 0x100000000}, 0x102100, 0x8, 0x9, 0x9, 0xffffffff, 0x4, 0x9, 0x0, 0x0, 0x0, 0xa}, r9, 0x0, r2, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="0e0000000400000008000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="000000000000000000000000000000f8ca00"/30], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r10 = bpf$MAP_CREATE(0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="80c90d4118022305000000049d14c5fe51", @ANYRES64=r5, @ANYBLOB='\x00'/20, @ANYBLOB="1fc3e36a76f8180b415e359740dd431ba84f928ca7f181001ed336ae25a7b7dbad5af17203dc1de60b69ea6866329cc131444c3dd613081f2c9a0a86f2e28fb29a5ed80674e9d21eb1860665b10c695bc3a19eaa3a69d34f8747efd8a020d1a19cf7ae9e39174b606d00845257ab0e0ffe2253dd4f70988f05f8fca6d688372c9c905b151f262858f2376d0a7718079105", @ANYRES64=r4, @ANYBLOB='\x00'/28], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r10, @ANYBLOB], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000200)={{r10}, &(0x7f0000000040), &(0x7f0000000280)}, 0x20) r11 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r11}, 0x10) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TUNSETOFFLOAD(r1, 0xc004743e, 0x110e22fff6) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000002400000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000edff0000000000000000850000000f00000018010000646c012500000000000000007b1a"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x90) 551.6258ms ago: executing program 0 (id=29406): perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8f1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000140)=@base={0x5, 0x6, 0x8, 0xae, 0x0, 0x1, 0x20727ff}, 0x50) bpf$MAP_CREATE(0x0, &(0x7f00000008c0)=@base={0xd, 0x2, 0x4, 0x4006, 0x5, r0, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x8000000}, 0x50) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000006d00000095"], 0x0}, 0x90) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000003480)={0x11, 0x2, &(0x7f00000001c0)=ANY=[@ANYBLOB="17010000a4fc0a000500feff"], &(0x7f0000000000)='GPL\x00', 0x6, 0x89, &(0x7f0000003300)=""/137, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x9}, 0x80) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000200)={r0, 0x58, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000300)={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x200, '\x00', r1, 0xffffffffffffffff, 0x0, 0x2}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000edff0000000000000000850000000f00000018010000646c012500000000000000007b1a"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00', r2}, 0x10) 548.382809ms ago: executing program 1 (id=29407): socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r0, 0x8914, &(0x7f0000000000)={'veth0_vlan\x00', @random="08f272f808af"}) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="0b00000007000000010001000900000001000000", @ANYRES32, @ANYBLOB="00000000000000000000000000000000000000002ca873a39626a290fa8d49433e7eb0cf7d63b524e789fe5b76cda25182ced290ee513c0994c9ca6b4e76d6e19283fab3e500a4865cf775967e2e", @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r1, &(0x7f0000000080), &(0x7f0000000200)=""/166}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b70800000d0000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x6, 0x9, 0x0, 0x8, 0x18000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000340)}, 0x454, 0xc8, 0x3, 0x6}, 0x0, 0x400000, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r3) recvmsg$unix(r2, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f00000000c0)) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="05000000010000000a00000008"], 0x48) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000002000000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='kmem_cache_free\x00', r5}, 0x10) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r6, 0x8923, &(0x7f0000000000)={'vlan1\x00', @broadcast}) 342.140683ms ago: executing program 1 (id=29408): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="0b0000000700000001000100090000"], 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000000)={{r0, 0xffffffffffffffff}, &(0x7f0000000580), &(0x7f00000005c0)}, 0x20) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000001000)={0x11, 0xd, &(0x7f00000002c0)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000003000000650000000800000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000140)='kmem_cache_free\x00', r2}, 0x10) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_config_ext={0x0, 0xe62}, 0x0, 0xc8, 0x0, 0x6, 0x0, 0x0, 0xfffa, 0x0, 0x0, 0x0, 0x69}, 0x0, 0x10, 0xffffffffffffffff, 0x3) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) close(r4) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="8fedcb7907001175f37538e486dd6317ce22000000fffe80000000000000101000007f0c08000000000000000071273fa7b49301641184a907"], 0xfdef) recvmsg$unix(r3, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r5, &(0x7f0000000000)=ANY=[], 0xfdef) 251.356535ms ago: executing program 1 (id=29409): socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)) perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x10000, 0x0, 0x0, 0x0, 0xfffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=@base={0x2, 0x4, 0x4, 0x9}, 0x50) sendmsg$inet(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001d80)=ANY=[@ANYBLOB="28010000000000000100000001"], 0x128}, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000c80)=ANY=[@ANYBLOB], 0x48) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000780)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r1, &(0x7f0000001b00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001d80)=ANY=[], 0x128}, 0x0) recvmsg$unix(r0, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000440)=[@cred={{0x1c}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @rights={{0x10}}], 0x48}, 0x10020) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='blkio.bfq.avg_queue_size\x00', 0x275a, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x2, 0x1f6, 0x0, &(0x7f0000000740)='syzkaller\x00', 0x5, 0x0, 0x0, 0x0, 0xa, '\x00', 0x0, @fallback=0x2a, r2}, 0x94) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) ioctl$TUNSETCARRIER(0xffffffffffffffff, 0x400454e2, &(0x7f0000000000)=0x4b) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'veth1_virt_wifi\x00'}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x8946, &(0x7f0000000080)) 212.912786ms ago: executing program 2 (id=29410): openat$tun(0xffffffffffffff9c, 0x0, 0x1c1842, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000001000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r0, &(0x7f0000001580)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f0000000080)="3bfdd75fa5717852d59a9367444a2130e72cd4dabc8854532cca0c32a5b9f844a4610c7525650ce3d3b76b15026d93e6dee896115e9364066aa3d14e33ef732b4681335c576902153114bdb9c74b538a71115fb1d1a63d1b04129661b29aab89d0be999a6b7c9bea755adedbf305a79f70b71d3d4c98577b49db4963ce89b0def5e840f459659cb6f86d56b069a5de11d601d348ff88ca6e5e2cfe40176880b33e9e8dbc32ba2e6a99b1b50276dc4f06166000d7069a3cc76f", 0xb9}, {&(0x7f0000000180)="892950e2405ee8629d9384a91c16d1706a3e61f305119f95cac0f1927f4c205b971eb41147cb1f86883d6910e68ac3996551800b3ec64b77f8444b18345a2c8b178eeeba0cde7319a5a46bfe7f5770e019efd9d52069edcced33a758c4e657f3a792dc193a1911040000000000000003c851a8", 0x73}, {&(0x7f0000000200)="a68cde0d56b170df7710b54f17d9a39c4f98f3547190", 0x16}, {&(0x7f0000000240)="45e04400f2b383517a08c397dd0a76e67ecfc8e74573c24dedd3a48fb62458c1412fdcd15e888cb0f5d02e77bfecefda6b064c0bb2b66a9a522e63873dde02330510255eec7dfa1af708cdab59fb71eca786a359a2c3b0cbad35144ec5b069c53f90e43339845dc7fd140c55b0149ab38eb27c140f374bcc2c95b0b121d1a9302f3a01b888243b3fc0d46f0de0", 0x8d}, {&(0x7f00000025c0)="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", 0xcb3}, {&(0x7f00000006c0)="97b13f5cf9f584c87e0e637d2ff483a311bb412cb3b03c3d9e97e435f2fceb58ff0402ed7b96244b43386c222917662028d7a01206a1990722ccef1d8f39f7c8ae242e58359217b1c6161ea741445cf16b0c48eb18a6c72174dfb7cd1bd0f409dad5a432bed4afb470da3656dd30", 0x6e}, {&(0x7f00000007c0)="75c37714a0bada8343bceb64ccb6d95a2a37b020e0bf1f6a1de4584223a2f285aaca30a9554cd5cdc1659cb9fec462cc5c2220a7cd891ec3bad99fe3c06e15a109ec0fdb6aeeee5ef8e4bfc28e17984a3860b907d549492d47a447782b7357ea72f4b2c26512a6a33c0247b730a6182ea5a99aee25fcee07f9cb0a80595cd5f744fa6898fdffda5b34b19474b8e853467329e4aea36cfd0e00735d37beb0f895c5688259a8935194eefd3a96d55707133a08f03e14da563160a545396b93341f41c161c93687e28a", 0xc8}, {&(0x7f0000000b00)="1b080b7a30aec939ce8e26e0cbbe37fc064ceef965fd5e3b6739c966492dbdf71c04423d8a403e56dfd224e4e55918a5e31e683fec5cc9460882a0d1628d02d51a8da997073f856e2cd00586c6e8c89c71cf8be6121b0b3a85d597a1afb0cc311f30cc26183c8e594ce5ff62661c9e32cbc9dd9a72985e9857f3bddb52382b6c27ca85d5774cf17b92e2d2097f12a8687e70f90d46381a47706a9124a2cf61b84f26aae22fd4da84ae35b93f7be9fdfdfbf33c59f5c657e9f7e81b81b786082f88af4de07808ff3c954bae", 0xcb}], 0x8, &(0x7f0000001480)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @private, @multicast1}}}], 0x20}, 0x0) recvmsg$unix(r1, &(0x7f0000001140)={0x0, 0x2, &(0x7f0000001040)=[{&(0x7f00000015c0)=""/4096, 0x7ffff000}], 0x1}, 0x40000100) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16, 0x0, 0x4, 0xff, 0x0, 0x1}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0}, 0x90) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r3}, 0x10) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000058"], 0x0}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, 0x0, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000000)='tlb_flush\x00', r4}, 0x10) 168.063087ms ago: executing program 0 (id=29411): perf_event_open$cgroup(&(0x7f0000000000)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1480, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x230}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="0b00000007000000010001000900000001"], 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r0, &(0x7f0000000080), &(0x7f0000000200)=""/166}, 0x20) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000000)={{r0, 0xffffffffffffffff}, &(0x7f0000000580), &(0x7f00000005c0)}, 0x20) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x11, 0xd, &(0x7f00000002c0)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000003000000650000000800000095"], &(0x7f0000000380)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000180)='kfree\x00', r2}, 0x10) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000740)={r0, &(0x7f0000000000), &(0x7f00000000c0)=""/109}, 0x20) syz_clone(0x2c9a4080, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1800000000000000000000004b64ffec850000007d000000850000000f00000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000100)='kfree\x00', r3}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002ac0)={0x1a, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="1800000000000000000000000000000095000000000000003f64ecb21ed7d74b542e43ae9f57f61af1c5b6016901992307df92d7c26b05a7da0582d208fd1f57c41cee38c7023e71dc864ab49f7894dd5ee29721d0625ee50c8aeca9b5090d85ff1c5df40229f0981507171aec7dc97abd981893d51a27e8a1033fa344fa3c6c27705648a66a47e0a1bc8fcede095704453c77f6c5370191ab55c423aae05729e69c987cf5f9aa2fd88c9e2114f53b9f82157c197397e43647b083db79f1f2"], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x18, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x20c9}, 0x80) r4 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000580)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x6, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x5, 0x1}, 0x50) bpf$MAP_LOOKUP_BATCH(0x18, &(0x7f0000000240)={&(0x7f0000000480)="cbb48b0a5af5a4fc73d09d212ede3a341ef7923cb2328239a8b71cac4d5fd767dbe768a785cc12de15d14ae204d4ea7c9b51b9b2547e225753defd6f0cf5dce73cb69f9dbef1c6e99f935150515e46ac329272683f79fea13af40d77d9c333c19ceedaab5540e8dc4115555245955d6a0a9ab2f2b5c176e790409064ba8ed41c6228adb502f6c3fc59f45d566b8c5224b0a90794228e17101a5a95ae03e18a4ab59648a9af3bd40a0b3c646bb0b5a3aa809a90faf9a8ebc0bebe367664aeea0685e79a5222118acb6df55e7fb6534cb66d086fc47eb536a078", &(0x7f0000000000)=""/72, &(0x7f00000002c0)="b8ffe75109284fe56802e792100ef6b31fc742abbd79ca3fbaac04d7277c99e6a1e6b9fa47b5f1a592a186f8f24e8528511d21016837201b3a489ace785cb08bcfb9f5fbf7cbe80e95", &(0x7f0000000140)="5a9e5fb278ad5ce690eeb146068ba72bdd3c8c3502e01e8426d48d53491b5584eb88b9c14cca194a4fcf3e649a", 0x10000, r4}, 0x38) 123.670277ms ago: executing program 1 (id=29412): socketpair$unix(0x1, 0x1, 0x0, 0x0) bpf$ITER_CREATE(0xb, &(0x7f0000000100), 0x0) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x5, 0x400, 0x9, 0x1}, 0x48) bpf$PROG_LOAD(0x5, 0x0, 0x0) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, 0x0}, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x10}}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000040)={0x5, 0x5, &(0x7f00000001c0)=@framed={{0x18, 0x0, 0x0, 0xb0ff, 0x300}, [@ldst={0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1a7fbb}, @ldst={0x6, 0x0, 0x6, 0x0, 0x0, 0xfffffffffffffffe, 0xa000000}]}, &(0x7f0000000000)='syzkaller\x00', 0x5, 0xf4240, &(0x7f0000000100)=""/147}, 0x80) 4.8616ms ago: executing program 1 (id=29413): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000f6000000850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffff58, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYRES16=r0], 0x48) r1 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000180)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0}, 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0xf, &(0x7f0000000340)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b702000014000000b7030000010100008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000000000008500000085000000b70000000000000095"], &(0x7f0000001dc0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x18, '\x00', 0x0, @fallback=0xb, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000080)='sched_switch\x00', r2}, 0x2d) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = bpf$MAP_CREATE(0x0, 0x0, 0xfffffffffffffd63) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x28, 0x6, 0x0, 0x44) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000300)={r3, 0x58, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000400)={0x1b, 0x0, 0x0, 0x9, 0x0, 0xffffffffffffffff, 0x200, '\x00', r4, 0xffffffffffffffff, 0x1, 0x2, 0x1}, 0x50) bpf$MAP_GET_NEXT_KEY(0x4, 0x0, 0x0) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup.net/syz0\x00', 0x200002, 0x0) mkdirat$cgroup(r5, &(0x7f00000003c0)='syz0\x00', 0x1ff) r6 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x20f42, 0x0) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x11, 0x8, &(0x7f0000002400)=ANY=[@ANYBLOB="620af8ffa1dc0021bfa100000000000007010000f8ffffffb702000007000000bd120000000000008500000010000000b70000000000000095000000000000003faf4f2aa3d9b18ed812a2e2c49e8020a6f4e0e4a9446c7670568982b4e020f698393aa0f3881f9c24561f1b2607995daa56f151905ea23c22624c9f87f9793f50bb546040677b0c5077da80fb982c1e9400e693146cea484a415b76966118b64b751a0f241b072e90080008002d75593a286cecc93e64c227c95aa0b784625704f07372c29184ff7f4a7c0000070000006056feb4cc664c0af9360a1f7a5e6b607130c89f18c0c1088d8b8588d72ec29c48b45e0000000000000401d01aa27ae8b09e00e79ab20b0b8ed8fb7a68af2ad0810000000000006fa03c6468978089b302d7ff6023cdcedb5e0125ebbcebdde510cb2364149215108337719acd97cfa107d40224edc5465ad32b77a74e802a0dc6bf25cca242bc6099ad2300000480006ef6c1ff0900000000000010c63a949e8b7955394ffaff03000000000000ab87b1bfeda7be586602d985430cea080000000000000026abfb0767192361448279b05d96a703a660581eecdbf5bcd3de227a167ca17a0faf60fd6ad9b97aa5fa68480366c9c6fd6fa5043aa3926b81e3b59c9b081d6a08000000ea2b1a52496dfcaf99431412fd134a996382a1a04d5bb924cfe5f3185418d605ffff9c4d2ec7c32f2095e63c80aff9fa740b6c7632d5933a1c1fa5605bd7603f2ba2a790d62d6faec2fed44da4928b30142ba1fde5c5d50b83bae645ffa4997da9c77af4c0cb97fca585ec6bf58351d578be00d952aab9c71764b0a8a7583c90b3433b809bdb9fbd48fc877505ebf6c9d13330ca006bce1a84521f14518c9b476fccbd6c712016219848624b87cec2dbe98223d8d9e86c5ea06d108d8f80a0eb4fa39f6b5c02e6d6d90756ff578f57000000009700cf0b4b8bc229413300000000000000000003000000000000000000000000001000000000559711e6e8fcffffffffffffffb2d02edc3e01dd271c896249ed85b980680b09000000000f0000169cdcacc413b48dafb7a2c8cb482bac0ac502d9ba96ffffffd897ef3b7cda42f93d53046da21b40216e14ba2d6af8656b01e17addaedab25b30002abbba7fa725f38400be7c1f001b2cd317902f19e385be9e48dccf1f9f3282830689da6b53b263339863297771d74732d400003341bf4a00fc9fec2271ff01589646efd1cf870cd7bb2366fde4a594290c405ff870ce5dfd3467decb05cfd9fcb32c8ed1dbd9d30a64c108285e71b5565b1768ee58969c41595229df17bcad70fb4021428ce970275d13b78249788f11f761038b75d4fe32b561d46ea3abe0fa7956488bef241875f3b4b6ab7929a57affe760e797724f4fce1093b62d7e8c7123d890decacec55bf404e4e1f74b7eed82571be54c72d978cf906df0042e36acd37d7f9e109f2c06f815312e0cfe222a06f56dd022c074eb8a322fb0bf47c0a8d154b405c37feaf3dd95f6ef2acd1fe582786105c70600000000000000b7561301bb997316dbf17866fb84d4173731efe895ff2e1c5560926e90109b598502d3e959efc71f665c542c9062ece84c99a061887a20639b41c8c12ee86c50804042b3eac1f870b136345cf67ca3fb5aac518a75f9e7d7101da841735e186c489b3a06fb99e0347f23a054de2f4d92d6bd72ee2c9fdc75aaaf1e3e483b4ad05573af403269b4a39ce40293947d9a631bcbf3583784acbda216550d7aec6b79e30cbd128f91e358c3b377327ac9ecc34f24c9ae153ec60ac0694da85bff9f5f4df90400000000000000d6b2c5ea1393fdf24285bf16b99c9cc0ad1857216f1a985f369191ae954febb3df464bfe0f7f3ee9afe7befb89d2777399f5874c553aeb3729cffe86e669261192899d4562db0e22d564ae09bb6d163118e401e024fd452277c3887d6116c6cc9d8046c216c1f895778cb26e22a2a998de44aeadea2a40da8daccf080842a486721737390cbf3a74cb2003016f154772f514216bdf57d2a40d40b51ab67903ec8485b3b8a8c9ae3d14f93100c2e0893862eef552fcde2981f48c482bde8a168c3f5db2fea6f26e4a4304e50c349f4f9ecee27defc93871c5f99a3594191e104d417e60fc3541a2c905a1a95e9571bf38ae1981c4238ecaee6f75cd0a6881bd1517a8250df98674152f94e32409e2a3bce109b6000000000000a1fec9000000d694210d7560eb92d6a97a27602b81f76386f1535bef1497f92186086e29c6bc5a1fad6ec9a31137ab79a404abde7750898b59270bb29b81367ac91bd627e87306703be8672d70d1ab57075228a9f46ed9bd1f00fb8191bbab2dc591dda61f0868afc4294859323e7a45319f18101288a0268893373750d1a8fe64680b0a3fc22dd704e4214d00000000d6c98cd1a9fbe1e7d58c08acaf30065b928a31d2eca55f74a23641f61f2d5b308cf0d031b0c7f0ce21d69993e9960ff5f76015e6009756237badf4e7965bbe2777e808fcba821a00e8c5c39609ff854356cb490000000000c1fee30a3f7a85d1b29e58c77685efc0ceb1c8e5729c66018d169fc03aa188546b3ad2a182068e1e3a0e2505bc7f41019645466ac96e0d0b3bc19faa5449209b085f3c334b47f067bbab40743b2a428f1da1f68df75cf43f8ecc8d3726602111b40e761fd21081920382f14d12ca3c471c784ae7da7eaa69eb7f7f80572fdd11bb1d070080fbc22bf73468788df51710eb0b428ee751c47d8e894f745a868404a0bf35f0121008b722b1eaa6aedfa1bf2e7ccb2d61d5d76331ff5e20fa26b8471d42645288d7226bbd9c9e9e1cc9eb3d541e407cc2dae5e690cd628ab84875f2c50ba830d3f474b079b407000000deff000040430a537a395dc73bda367bf12cb7d81691a5fe8c47be395656a297e9df0e71b967ce7daac4be290159f6bcd75f0dda9de5532e66ae9e48b0ed1254a81faae79b6af6fbb869604d51de44c4e0973171ad47d6c00ebc7603093f000000fdec743af930cd6db49a47613808bad959719c0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f15d6533f78a1f4e2df4ca23d867693fd42de9b49a1b36d48a44ba6a4530e59bec53e876dc660dd63bed8d31c31c37a373d4efd89f0000377b1b1292a893a516dab183ee65744fb8fc4f9ce2242e0f0059161c5e0000000000000000000057d77480e0345effff6413258d1f6eb190aa28cbb4bafe34124172e436b176c7ed4b132fb805d5edd9d188daf28d89c014c3ecca10ae55704544673e1fa03b84f63e022fe755f4007a4a899eaf52c4f491d8e97c862e29e457060000007ac691faee1e0c8fe056a07474e6e5490a7d3c3402000000b60600d837c6befc63ddf2f594ad7cbc56a1e44d218c956a5392a995f1fae8e9f206efbb33854dc70104d74dc07748f9745cb796da2dfb714a0500000000000000faed94fc39acfb3fd25dfa8116a154cd1226e1bb72b59fed817072a0da60160761fd3dffda0f7c592eabd8ab68334d2a1693cb187539049e331272bf5135044df8161400211b8012b6eb1ed5656e83f65509bb4b323c5bd61bff949d3bade2f6ffda1360c2786e16937ab61d6dcafed319c716357d0885f9c6d1f442954c167dd9b4acd9468ce3674c82bbb2e31389179b025dbe063b7f906217b2cf8410c7023aa3e5cc3ba1000000000000000000000000000000006ae6301a2da44394275c582a6516bb92ea1980a0a659f2f1811c8b281c209647c4241f292b20508b215dde27bb2487a6e2b5e4a8ccfab90c23827ef06cbe364073005f8a6d1456aaeb85ffb7858f24eced67a67ab825e863928ed64c83f62ffdaa997657335b63c6b4163aff094059e626766845fd779c9e6cdbbd64c24936615ee68538e8fddd0d90f3a7579579a142c0f7b318264d5c13c31cf475829528267ead38523cab7e1664e8426ca85e82ccf821c8a02a7e7d954d05b68a9c28f79429b09e2bb3681ae2b831e27c735123361c193d66ed4d71f19b199d371ec6bfada7cd370e3fdd3cd980fa1e145fd3f3e96b1feb53c865e1ada08f5d16ed652ee0c7f45352222692fbd679212c225d097aa90f7e1fb1f983415f43e75a19ecf7fd21bfa150ef563aa72ba1c43c5f3d9be128ec26b691f31f9cab931631606a81622f120675c962be2d3b5e95f74f0b209e42e6bdd76e6e725295b1d78d928f6f63c41cbde2ba66ad81168070c8c6e18a6e452a31bdc4a60d637545ed4c8a1c649c3ce54ad3e16304d06a234f5f9311ef0f78924b68dbb4712efdb6974667bdb54f16fd2061b9ba93638dd177227e94e4ebd0ec1d437db948062bf41742000000000000000000305f70dd02fa0c61d5fe6d8ff35389246037e18d34c1375ae04f44f0c2543c772c5ccb137be7dc1874c514b37c668554d77d4ea5ed144a648257f4a0301067bbcd9b91072659d872f26b796e2b81025edb5f45f785e2c2602b248ecdd80f019ca659be7e8ae953325a27564f33c9d458a60be3dab38baab7eb1a66ab1ffd6308f7fd51beb356fe75eb985b7581bb5584c53984ba9c7340f97e8d3825681c53de5f554e595b00000000000000006a8fa9f05d64c4be42f981f00051a39938613067dbd1427e01bfec016e51844cefa8a855bf23ac887b4a88eed6d9443857242f28e31a41d20105fbf3394ff910e734b4d9101265ff729c426e01c1ab13dda8c388b9e6626f19eecb87e39175e85e17000000000000000000009431807e43886903526074e6b40244c938a4c68a38c25ddd7c143b3f14eafe4b28ec66815cf8d1f56aa1424bc9b5d58790298e5b310969e50c222563b54e60854e1bfeef448aca8c5ccbf5546ce4c3cd5a733fec25fb94e1e0f966bcbd28a4d8fe4f556eaa1104a793006619700798354c6ae05025040965e3083562bfa20968c04007d21dc02c9fd1f75e1ff40f439bdde4e784012e52049b483f02f81b88f5f57816b3fecec79cfca8d37203e769759d6b6a56b7605ced8ee18475a77ff0963a565fb6021d216c01b1098e40550a1cfd80e9180100000000000000654cd76ca61fe5ad8a31ec558fdbfa706d5e738bceae81fe777c307d5bc72183a4c2d35732e74dd690c57bdfdc1f069f9491bca7a8c59363799be70018c25ece5ad7307dc7a95c51bc25a8bbe2cf5ddf6aa161693782b0e7feb8a768f391b49d4c978c96dbb52f21c122eba9f17c8bed10591958cf06321a248b5f76ceedfe0d080d6aeadc11b237b3326dd04b86ac37c0d131544888db9e128d059761ad9a393e96c3b41c13c5a381bff187a75de560ba6eb3faa5ff8d2bb3c88f8de5efc2fb2200cfda6d07ceae22577064334fbf76a23e62e6059211d995b879f6b7d3f7fcf03652b81e6b7cdeff947ad185d3c6269ca247b429c3b872a8f1ef60407d29a874f4ec31c9effed55543a65a6b4d778cebcd43b7905f3960140bd783540a7353014bda8e9c7a34a5f428fd1f8eb11e837dd9d586487fdebcb1ecd3a003ff0fda4be617fecf1ff0ef2cdfb7fea73ca18874664d60a4b9423f3297bc8eb91b4ee1d73272abbef3e7a828a7d7ab055a8eb58fe379de85338304e26e3620941b463e9049fd105c74c91cc4d71b0f76e2c2e4825106aa7ce2a3adbbc7a0443ece58e752b47e6f677ec97c5c568a89d6e36b165c39132a0f27080ece2a94c320b002c77f82662675a7713c7067081cac15994698c41ff4754268ae2676384ff799783f55d7e5a1a092a01b965dc99cb7a9d98440c355927629f2bcf9dc2396eb2f5d25829715b24327642ac48f1201014a95e0e65e12cdf27e19043e3c5d3e798375cead35b9a93190a52cdecaaccc854a1d41ef365303f0e9b4fc969c9dab6df5e8a795b140fcc09e8a7b694d12932917facd8ceaa4e2d0d16bb0b95387fcd5ff136d8abddf94daf442bbff744591931872a36cf921ad69f2127386e8b0f9afee4da8d3fbec809fbb3ca0fded2859cf25d4c6155d396c5b9bd1a928923123f63f4c40688eae69990a9419456247"], &(0x7f0000000100)='GPL\x00'}, 0x41) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={&(0x7f0000000080)='task_rename\x00', r7}, 0x10) r8 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x1, 0x4, 0x2, 0xc}, 0x48) r9 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xd, &(0x7f0000000040)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r8, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000001000000850000007d00000095"], &(0x7f00000001c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r10 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x10, 0x4, 0x4, 0x2, 0x0, 0x1}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001540)={{r10}, &(0x7f00000014c0), &(0x7f0000001500)=r9}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000240)=ANY=[@ANYBLOB="1800000000000002000000000000000018090000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000002000000b704000000000000850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x3e, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r11 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000240)=ANY=[], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000001700)={&(0x7f0000000080)='kmem_cache_free\x00', r11}, 0x10) socketpair(0x23, 0x2, 0x145, &(0x7f0000000500)) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="8fedcb7968dd98"], 0xfdef) ioctl$TUNSETIFF(r6, 0x400454ca, &(0x7f0000000140)={'nr0\x00', 0x6132}) write$cgroup_subtree(r6, &(0x7f0000000000)=ANY=[], 0xfe3a) 0s ago: executing program 0 (id=29414): bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x19, 0x4, 0x4, 0x5}, 0x48) (async) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x19, 0x4, 0x4, 0x5}, 0x48) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x11, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1805000000000000000000004b64"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x94) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000740)={0x3, 0x4, 0x4, 0xa, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) (async) r2 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000740)={0x3, 0x4, 0x4, 0xa, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) r3 = bpf$PROG_LOAD(0x5, 0x0, 0x0) close(r3) bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x3, 0x8, &(0x7f0000000000)=@framed={{0x18, 0x6}, [@tail_call={{0x18, 0x2, 0x1, 0x0, r2}}]}, &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sched_cls, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x3, 0x8, &(0x7f0000000000)=@framed={{0x18, 0x6}, [@tail_call={{0x18, 0x2, 0x1, 0x0, r2}}]}, &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sched_cls, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000400)={{r2}, &(0x7f0000000200), &(0x7f00000003c0)=r4}, 0x20) (async) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000400)={{r2}, &(0x7f0000000200), &(0x7f00000003c0)=r4}, 0x20) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000100)={{r2}, &(0x7f0000000080), &(0x7f00000000c0)=r4}, 0x20) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x20, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7, 0x80}, 0x0, 0x1, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) mkdir(&(0x7f0000000000)='./cgroup/file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x0) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) openat$cgroup_subtree(r5, &(0x7f0000003000), 0x201, 0x0) ioctl$SIOCSIFHWADDR(r1, 0x8914, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000013c0)={&(0x7f0000001180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x7, [@typedef={0x2, 0x0, 0x0, 0x8, 0x2}, @struct={0x5, 0x0, 0x0, 0xc}]}, {0x0, [0x0, 0x61, 0x0, 0x0, 0x2e]}}, &(0x7f0000001300)=""/181, 0x37, 0xb5, 0x1}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000880)={{r0}, &(0x7f0000000800), &(0x7f0000000840)=r6}, 0x20) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f00000006c0)='sched_switch\x00', r7}, 0x10) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f00000006c0)='sched_switch\x00', r7}, 0x10) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8f1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r8 = bpf$MAP_CREATE(0x0, &(0x7f0000000140)=@base={0x5, 0x6, 0x8, 0xae, 0x0, 0x1, 0x20727ff}, 0x50) bpf$MAP_CREATE(0x0, &(0x7f00000008c0)=@base={0xd, 0x2, 0x4, 0x4006, 0x5, r8, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x8000000}, 0x50) (async) bpf$MAP_CREATE(0x0, &(0x7f00000008c0)=@base={0xd, 0x2, 0x4, 0x4006, 0x5, r8, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x8000000}, 0x50) kernel console output (not intermixed with test programs): 60][T18290] RBP: 00007ff549308090 R08: 0000000000000000 R09: 0000000000000000 [ 3039.296946][T18290] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 3039.304925][T18290] R13: 00007ff54aaf8128 R14: 00007ff54aaf8090 R15: 00007fffe2ff9b18 [ 3039.345015][T18293] device syzkaller0 entered promiscuous mode [ 3039.657531][T18313] device wg2 entered promiscuous mode [ 3044.240274][T18471] device syzkaller0 entered promiscuous mode [ 3046.025747][T18501] device veth1_macvtap left promiscuous mode [ 3046.045012][T18501] device macsec0 left promiscuous mode [ 3048.552130][T18623] device pim6reg1 entered promiscuous mode [ 3049.040412][T18657] FAULT_INJECTION: forcing a failure. [ 3049.040412][T18657] name failslab, interval 1, probability 0, space 0, times 0 [ 3049.226636][T18657] CPU: 0 PID: 18657 Comm: syz.1.27584 Tainted: G W syzkaller #0 [ 3049.235613][T18657] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/14/2025 [ 3049.245756][T18657] Call Trace: [ 3049.249055][T18657] __dump_stack+0x21/0x24 [ 3049.253412][T18657] dump_stack_lvl+0x169/0x1d8 [ 3049.258093][T18657] ? show_regs_print_info+0x18/0x18 [ 3049.263424][T18657] ? expand_files+0xd3/0x8f0 [ 3049.268014][T18657] dump_stack+0x15/0x1c [ 3049.272327][T18657] should_fail+0x3c1/0x510 [ 3049.276747][T18657] ? perf_event_alloc+0xd0/0x1990 [ 3049.281886][T18657] __should_failslab+0xa4/0xe0 [ 3049.286824][T18657] should_failslab+0x9/0x20 [ 3049.291421][T18657] kmem_cache_alloc_trace+0x3a/0x2e0 [ 3049.296703][T18657] perf_event_alloc+0xd0/0x1990 [ 3049.301664][T18657] ? __alloc_fd+0x498/0x530 [ 3049.306280][T18657] __se_sys_perf_event_open+0x5cc/0x1b10 [ 3049.311913][T18657] ? __x64_sys_perf_event_open+0xd0/0xd0 [ 3049.317824][T18657] ? bpf_trace_run2+0xb8/0x200 [ 3049.322807][T18657] __x64_sys_perf_event_open+0xbf/0xd0 [ 3049.328394][T18657] do_syscall_64+0x31/0x40 [ 3049.333027][T18657] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 3049.339016][T18657] RIP: 0033:0x7f420f753be9 [ 3049.343432][T18657] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 3049.363210][T18657] RSP: 002b:00007f420e1bc038 EFLAGS: 00000246 ORIG_RAX: 000000000000012a [ 3049.371715][T18657] RAX: ffffffffffffffda RBX: 00007f420f98afa0 RCX: 00007f420f753be9 [ 3049.379951][T18657] RDX: 0000000000000000 RSI: ffffffffffffffff RDI: 0000200000000000 [ 3049.387935][T18657] RBP: 00007f420e1bc090 R08: 0000000000000000 R09: 0000000000000000 [ 3049.396015][T18657] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000001 [ 3049.404081][T18657] R13: 00007f420f98b038 R14: 00007f420f98afa0 R15: 00007ffde6f74b58 [ 3049.779580][T18659] bridge0: port 1(bridge_slave_0) entered blocking state [ 3049.787120][T18659] bridge0: port 1(bridge_slave_0) entered disabled state [ 3049.794684][T18659] device bridge_slave_0 entered promiscuous mode [ 3049.813265][T18659] bridge0: port 2(bridge_slave_1) entered blocking state [ 3049.822490][T18659] bridge0: port 2(bridge_slave_1) entered disabled state [ 3049.830100][T18659] device bridge_slave_1 entered promiscuous mode [ 3050.047139][T18659] bridge0: port 2(bridge_slave_1) entered blocking state [ 3050.054282][T18659] bridge0: port 2(bridge_slave_1) entered forwarding state [ 3050.061721][T18659] bridge0: port 1(bridge_slave_0) entered blocking state [ 3050.068873][T18659] bridge0: port 1(bridge_slave_0) entered forwarding state [ 3050.103230][T18691] device veth1_macvtap left promiscuous mode [ 3050.109454][T18691] device macsec0 left promiscuous mode [ 3050.116374][T18691] device veth1_macvtap entered promiscuous mode [ 3050.122755][T18691] device macsec0 entered promiscuous mode [ 3050.130257][ T421] bridge0: port 1(bridge_slave_0) entered disabled state [ 3050.138334][ T421] bridge0: port 2(bridge_slave_1) entered disabled state [ 3050.175534][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 3050.191157][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 3050.200291][ T9] bridge0: port 1(bridge_slave_0) entered blocking state [ 3050.207541][ T9] bridge0: port 1(bridge_slave_0) entered forwarding state [ 3050.280704][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 3050.290300][ T9] bridge0: port 2(bridge_slave_1) entered blocking state [ 3050.297764][ T9] bridge0: port 2(bridge_slave_1) entered forwarding state [ 3050.330296][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 3050.339893][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 3050.357896][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 3050.371120][T18659] device veth0_vlan entered promiscuous mode [ 3050.387472][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 3050.401508][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 3050.409902][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 3050.424312][T18659] device veth1_macvtap entered promiscuous mode [ 3050.580715][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 3050.647051][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 3050.657769][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 3050.775237][T18725] device veth1_macvtap left promiscuous mode [ 3050.790073][T18725] device macsec0 left promiscuous mode [ 3050.860514][T18737] device veth1_macvtap entered promiscuous mode [ 3050.896522][T18737] device macsec0 entered promiscuous mode [ 3050.967931][T18739] device veth1_macvtap left promiscuous mode [ 3050.992581][T18739] device macsec0 left promiscuous mode [ 3051.009174][T18745] device veth0_vlan left promiscuous mode [ 3051.015568][T18745] device veth0_vlan entered promiscuous mode [ 3051.066865][T27925] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 3051.076322][T27925] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 3051.084210][T27925] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 3051.097897][T18739] device veth1_macvtap entered promiscuous mode [ 3051.104279][T18739] device macsec0 entered promiscuous mode [ 3051.220879][T18762] device veth1_macvtap left promiscuous mode [ 3051.235610][T18762] device veth1_macvtap entered promiscuous mode [ 3051.243674][T18762] device macsec0 entered promiscuous mode [ 3052.396050][T18824] device veth1_macvtap left promiscuous mode [ 3052.410207][T18824] device macsec0 left promiscuous mode [ 3052.481308][T18839] device veth1_macvtap entered promiscuous mode [ 3052.501026][T18839] device macsec0 entered promiscuous mode [ 3053.686397][T18892] device veth1_macvtap left promiscuous mode [ 3053.694437][T18892] device macsec0 left promiscuous mode [ 3053.757443][T18900] device veth1_macvtap entered promiscuous mode [ 3053.764110][T18900] device macsec0 entered promiscuous mode [ 3054.995312][T18934] device veth1_macvtap left promiscuous mode [ 3055.013221][T18934] device macsec0 left promiscuous mode [ 3055.065063][T18944] device veth1_macvtap entered promiscuous mode [ 3055.072890][T18944] device macsec0 entered promiscuous mode [ 3055.136027][T18946] device syzkaller0 entered promiscuous mode [ 3055.422203][T18958] syz.1.27693[18958] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 3055.422297][T18958] syz.1.27693[18958] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 3055.455208][T18961] device veth1_macvtap left promiscuous mode [ 3055.479541][T18961] device macsec0 left promiscuous mode [ 3055.507939][T18965] device veth1_macvtap entered promiscuous mode [ 3055.534664][T18965] device macsec0 entered promiscuous mode [ 3055.971321][T18978] device veth1_macvtap left promiscuous mode [ 3055.997412][T18978] device macsec0 left promiscuous mode [ 3056.081651][T18986] device veth1_macvtap entered promiscuous mode [ 3056.111959][T18986] device macsec0 entered promiscuous mode [ 3056.431586][T18998] device veth1_macvtap left promiscuous mode [ 3056.450101][T18998] device macsec0 left promiscuous mode [ 3056.485874][T19000] device veth1_macvtap entered promiscuous mode [ 3056.492891][T19000] device macsec0 entered promiscuous mode [ 3056.890432][T19022] device veth1_macvtap left promiscuous mode [ 3056.899846][T19022] device macsec0 left promiscuous mode [ 3056.926836][T19022] device veth1_macvtap entered promiscuous mode [ 3056.933880][T19022] device macsec0 entered promiscuous mode [ 3057.188348][T19030] device veth1_macvtap left promiscuous mode [ 3057.200024][T19030] device macsec0 left promiscuous mode [ 3057.231489][T19030] device veth1_macvtap entered promiscuous mode [ 3057.239576][T19030] device macsec0 entered promiscuous mode [ 3057.439485][T19046] device veth1_macvtap left promiscuous mode [ 3057.457307][T19046] device macsec0 left promiscuous mode [ 3057.639357][T19051] device veth1_macvtap left promiscuous mode [ 3057.645485][T19051] device macsec0 left promiscuous mode [ 3057.765444][T19056] device veth1_macvtap entered promiscuous mode [ 3057.782941][T19056] device macsec0 entered promiscuous mode [ 3058.069793][T19064] device veth1_macvtap left promiscuous mode [ 3058.077408][T19064] device macsec0 left promiscuous mode [ 3058.101883][T19068] device veth1_macvtap entered promiscuous mode [ 3058.131442][T19068] device macsec0 entered promiscuous mode [ 3058.773805][T19088] bridge0: port 2(bridge_slave_1) entered disabled state [ 3058.781055][T19088] bridge0: port 1(bridge_slave_0) entered disabled state [ 3058.865523][T19088] device bridge_slave_1 left promiscuous mode [ 3058.911881][T19088] bridge0: port 2(bridge_slave_1) entered disabled state [ 3058.943753][T19088] device bridge_slave_0 left promiscuous mode [ 3058.954047][T19088] bridge0: port 1(bridge_slave_0) entered disabled state [ 3059.037419][T19090] device veth1_macvtap left promiscuous mode [ 3059.043519][T19090] device macsec0 left promiscuous mode [ 3059.077501][T19094] device veth1_macvtap entered promiscuous mode [ 3059.084760][T19094] device macsec0 entered promiscuous mode [ 3059.092365][T19096] device veth1_macvtap entered promiscuous mode [ 3059.100381][T19096] device macsec0 entered promiscuous mode [ 3059.107057][T29283] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 3059.411860][T19113] device veth1_macvtap left promiscuous mode [ 3059.418914][T19113] device macsec0 left promiscuous mode [ 3059.454705][T19118] device pim6reg1 entered promiscuous mode [ 3059.465381][T19119] device veth1_macvtap entered promiscuous mode [ 3059.473346][T19119] device macsec0 entered promiscuous mode [ 3059.593159][T19120] bridge0: port 1(bridge_slave_0) entered blocking state [ 3059.606619][T19120] bridge0: port 1(bridge_slave_0) entered disabled state [ 3059.615265][T19120] device bridge_slave_0 entered promiscuous mode [ 3059.638236][T19120] bridge0: port 2(bridge_slave_1) entered blocking state [ 3059.646221][T19120] bridge0: port 2(bridge_slave_1) entered disabled state [ 3059.686260][T19120] device bridge_slave_1 entered promiscuous mode [ 3059.705047][T19132] device veth1_macvtap left promiscuous mode [ 3059.711911][T19132] device macsec0 left promiscuous mode [ 3059.777607][T19134] device pim6reg1 entered promiscuous mode [ 3059.788504][T19132] device veth1_macvtap entered promiscuous mode [ 3059.795302][T19132] device macsec0 entered promiscuous mode [ 3059.909672][T19120] bridge0: port 2(bridge_slave_1) entered blocking state [ 3059.916961][T19120] bridge0: port 2(bridge_slave_1) entered forwarding state [ 3059.924202][T19120] bridge0: port 1(bridge_slave_0) entered blocking state [ 3059.931237][T19120] bridge0: port 1(bridge_slave_0) entered forwarding state [ 3060.026334][T29283] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 3060.043056][T29283] bridge0: port 1(bridge_slave_0) entered disabled state [ 3060.084883][T29283] bridge0: port 2(bridge_slave_1) entered disabled state [ 3060.149448][T29283] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 3060.176001][T29283] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 3060.184914][T29283] bridge0: port 1(bridge_slave_0) entered blocking state [ 3060.192333][T29283] bridge0: port 1(bridge_slave_0) entered forwarding state [ 3060.200433][T29283] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 3060.209185][T29283] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 3060.223654][T29283] bridge0: port 2(bridge_slave_1) entered blocking state [ 3060.230749][T29283] bridge0: port 2(bridge_slave_1) entered forwarding state [ 3060.239033][T19148] device veth1_macvtap left promiscuous mode [ 3060.245026][T19148] device macsec0 left promiscuous mode [ 3060.276127][T19149] device veth1_macvtap entered promiscuous mode [ 3060.291008][T19149] device macsec0 entered promiscuous mode [ 3060.345765][T29283] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 3060.358563][T29283] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 3060.387426][T29283] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 3060.403150][T29283] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 3060.462007][T29283] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 3060.482790][T29283] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 3060.497792][T29283] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 3060.510379][T29283] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 3060.529637][T19120] device veth0_vlan entered promiscuous mode [ 3060.544600][T19120] device veth1_macvtap entered promiscuous mode [ 3060.611418][ T2319] device veth1_macvtap left promiscuous mode [ 3060.648389][T29283] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 3060.656292][T29283] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 3060.663805][T29283] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 3060.672867][T29283] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 3060.681306][T29283] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 3060.755700][T29283] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 3060.764073][T29283] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 3060.783065][T29283] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 3060.792715][T29283] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 3060.906416][T19172] device veth1_macvtap left promiscuous mode [ 3060.918602][T19172] device macsec0 left promiscuous mode [ 3060.978751][T19179] device veth1_macvtap entered promiscuous mode [ 3060.986840][T19179] device macsec0 entered promiscuous mode [ 3061.788153][T19215] FAULT_INJECTION: forcing a failure. [ 3061.788153][T19215] name failslab, interval 1, probability 0, space 0, times 0 [ 3061.801556][T19215] CPU: 1 PID: 19215 Comm: syz.1.27787 Tainted: G W syzkaller #0 [ 3061.810677][T19215] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/14/2025 [ 3061.820831][T19215] Call Trace: [ 3061.824125][T19215] __dump_stack+0x21/0x24 [ 3061.828453][T19215] dump_stack_lvl+0x169/0x1d8 [ 3061.833132][T19215] ? thaw_kernel_threads+0x220/0x220 [ 3061.838418][T19215] ? show_regs_print_info+0x18/0x18 [ 3061.843614][T19215] ? stack_trace_save+0x98/0xe0 [ 3061.848468][T19215] ? stack_trace_snprint+0xf0/0xf0 [ 3061.853592][T19215] dump_stack+0x15/0x1c [ 3061.857760][T19215] should_fail+0x3c1/0x510 [ 3061.862191][T19215] ? __alloc_skb+0x9e/0x520 [ 3061.867040][T19215] __should_failslab+0xa4/0xe0 [ 3061.871817][T19215] should_failslab+0x9/0x20 [ 3061.876509][T19215] kmem_cache_alloc+0x3d/0x2e0 [ 3061.881275][T19215] ? __x64_sys_sendmsg+0x1e2/0x2a0 [ 3061.886399][T19215] ? do_syscall_64+0x31/0x40 [ 3061.891080][T19215] ? entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 3061.897203][T19215] __alloc_skb+0x9e/0x520 [ 3061.901536][T19215] __pskb_copy_fclone+0xa6/0xf70 [ 3061.906574][T19215] tipc_msg_reassemble+0x12e/0x440 [ 3061.911684][T19215] tipc_mcast_xmit+0x1c6/0x1710 [ 3061.916529][T19215] ? iov_iter_advance+0x2a6/0x750 [ 3061.921653][T19215] ? tipc_msg_build+0xd0/0xc90 [ 3061.926511][T19215] ? tipc_bcbase_xmit+0x9d0/0x9d0 [ 3061.931628][T19215] ? _copy_from_iter_full+0x276/0x750 [ 3061.937005][T19215] ? __kasan_check_write+0x14/0x20 [ 3061.942218][T19215] ? __alloc_skb+0x38b/0x520 [ 3061.946813][T19215] ? __check_object_size+0x8e/0x3c0 [ 3061.952008][T19215] ? tipc_msg_build+0x40b/0xc90 [ 3061.956867][T19215] ? _raw_spin_lock_bh+0x8e/0xe0 [ 3061.962070][T19215] ? __local_bh_enable_ip+0x53/0x80 [ 3061.967272][T19215] ? tipc_nametbl_lookup_dst_nodes+0x375/0x7c0 [ 3061.973426][T19215] __tipc_sendmsg+0x1d69/0x2be0 [ 3061.978363][T19215] ? tipc_sk_publish+0x3f0/0x3f0 [ 3061.983305][T19215] ? avc_has_perm+0x234/0x360 [ 3061.988073][T19215] ? wait_woken+0x180/0x180 [ 3061.992580][T19215] ? __kasan_check_write+0x14/0x20 [ 3061.997725][T19215] ? _raw_spin_lock_bh+0x8e/0xe0 [ 3062.002776][T19215] ? _raw_spin_lock_irq+0xe0/0xe0 [ 3062.007810][T19215] ? __local_bh_enable_ip+0x53/0x80 [ 3062.013006][T19215] ? local_bh_enable+0x1f/0x30 [ 3062.017875][T19215] ? lock_sock_nested+0x1f5/0x290 [ 3062.023008][T19215] ? sock_init_data+0xc0/0xc0 [ 3062.027698][T19215] ? kasan_set_track+0x5b/0x70 [ 3062.032519][T19215] ? kasan_set_track+0x4a/0x70 [ 3062.037299][T19215] tipc_sendmsg+0x55/0x70 [ 3062.041631][T19215] ? tipc_recvmsg+0x13a0/0x13a0 [ 3062.046482][T19215] ____sys_sendmsg+0x5a2/0x8c0 [ 3062.051253][T19215] ? __sys_sendmsg_sock+0x40/0x40 [ 3062.056282][T19215] ? import_iovec+0x7c/0xb0 [ 3062.060785][T19215] ___sys_sendmsg+0x1f0/0x260 [ 3062.065466][T19215] ? __sys_sendmsg+0x250/0x250 [ 3062.070316][T19215] ? rw_verify_area+0x1c0/0x360 [ 3062.075348][T19215] ? __fdget+0x1a1/0x230 [ 3062.079681][T19215] __x64_sys_sendmsg+0x1e2/0x2a0 [ 3062.084624][T19215] ? fput+0x1a/0x20 [ 3062.088430][T19215] ? ___sys_sendmsg+0x260/0x260 [ 3062.093391][T19215] ? fpregs_assert_state_consistent+0xb1/0xe0 [ 3062.099472][T19215] do_syscall_64+0x31/0x40 [ 3062.103913][T19215] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 3062.109818][T19215] RIP: 0033:0x7f420f753be9 [ 3062.114235][T19215] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 3062.134298][T19215] RSP: 002b:00007f420e1bc038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 3062.142826][T19215] RAX: ffffffffffffffda RBX: 00007f420f98afa0 RCX: 00007f420f753be9 [ 3062.150922][T19215] RDX: 0000000000000000 RSI: 0000200000004440 RDI: 0000000000000007 [ 3062.159198][T19215] RBP: 00007f420e1bc090 R08: 0000000000000000 R09: 0000000000000000 [ 3062.167432][T19215] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 3062.175509][T19215] R13: 00007f420f98b038 R14: 00007f420f98afa0 R15: 00007ffde6f74b58 [ 3062.347239][T19219] device veth1_macvtap left promiscuous mode [ 3062.353828][T19219] device macsec0 left promiscuous mode [ 3062.401442][T19222] device veth1_macvtap entered promiscuous mode [ 3062.446729][T19222] device macsec0 entered promiscuous mode [ 3062.750402][T19235] device veth1_macvtap left promiscuous mode [ 3062.865039][T19243] device veth1_macvtap entered promiscuous mode [ 3062.871542][T19243] device macsec0 entered promiscuous mode [ 3063.035107][T19249] device veth1_macvtap left promiscuous mode [ 3063.042278][T19249] device macsec0 left promiscuous mode [ 3063.099167][T19249] device veth1_macvtap entered promiscuous mode [ 3063.125413][T19249] device macsec0 entered promiscuous mode [ 3063.494752][T19263] device veth1_macvtap left promiscuous mode [ 3063.504333][T19263] device macsec0 left promiscuous mode [ 3063.624529][T19263] device veth1_macvtap entered promiscuous mode [ 3063.633673][T19263] device macsec0 entered promiscuous mode [ 3064.080100][T19288] device veth1_macvtap left promiscuous mode [ 3064.086279][T19288] device macsec0 left promiscuous mode [ 3064.145653][T19295] device veth1_macvtap entered promiscuous mode [ 3064.170600][T19295] device macsec0 entered promiscuous mode [ 3064.513567][T19307] device veth1_macvtap left promiscuous mode [ 3064.540346][T19307] device macsec0 left promiscuous mode [ 3064.631876][T19312] device veth1_macvtap entered promiscuous mode [ 3064.640592][T19312] device macsec0 entered promiscuous mode [ 3065.091873][T19332] bridge0: port 2(bridge_slave_1) entered disabled state [ 3065.099154][T19332] bridge0: port 1(bridge_slave_0) entered disabled state [ 3065.149605][T19336] device bridge_slave_1 left promiscuous mode [ 3065.184638][T19336] bridge0: port 2(bridge_slave_1) entered disabled state [ 3065.269158][T19336] device bridge_slave_0 left promiscuous mode [ 3065.300845][T19336] bridge0: port 1(bridge_slave_0) entered disabled state [ 3065.792729][T19356] device veth1_macvtap left promiscuous mode [ 3065.817193][T19356] device macsec0 left promiscuous mode [ 3065.854520][T19361] device veth1_macvtap entered promiscuous mode [ 3065.864566][T19361] device macsec0 entered promiscuous mode [ 3066.240751][T19378] device wg2 entered promiscuous mode [ 3066.400807][T19388] device pim6reg1 entered promiscuous mode [ 3066.473731][T19398] device veth1_macvtap left promiscuous mode [ 3066.480351][T19398] device macsec0 left promiscuous mode [ 3066.535936][T19398] device veth1_macvtap entered promiscuous mode [ 3066.606801][T19398] device macsec0 entered promiscuous mode [ 3066.651003][T29283] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 3066.686434][T19407] device veth1_macvtap left promiscuous mode [ 3066.697356][T19407] device macsec0 left promiscuous mode [ 3066.729426][T19403] device veth1_macvtap entered promiscuous mode [ 3066.741381][T19403] device macsec0 entered promiscuous mode [ 3067.325479][T19433] ÿÿÿÿÿÿ: renamed from vlan1 [ 3067.868949][T19441] device veth1_macvtap left promiscuous mode [ 3067.876542][T19441] device macsec0 left promiscuous mode [ 3067.969673][T19444] device veth1_macvtap entered promiscuous mode [ 3067.979486][T19444] device macsec0 entered promiscuous mode [ 3068.049100][T19452] device veth1_macvtap left promiscuous mode [ 3068.056065][T19452] device macsec0 left promiscuous mode [ 3068.085845][T19447] device veth1_macvtap entered promiscuous mode [ 3068.092281][T19447] device macsec0 entered promiscuous mode [ 3068.200274][T19460] device sit0 entered promiscuous mode [ 3068.419416][T19469] ªªªªªª: renamed from vlan0 [ 3068.424218][T19469] FAULT_INJECTION: forcing a failure. [ 3068.424218][T19469] name failslab, interval 1, probability 0, space 0, times 0 [ 3068.437948][T19469] CPU: 1 PID: 19469 Comm: syz.3.27874 Tainted: G W syzkaller #0 [ 3068.446895][T19469] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/14/2025 [ 3068.456986][T19469] Call Trace: [ 3068.460285][T19469] __dump_stack+0x21/0x24 [ 3068.464617][T19469] dump_stack_lvl+0x169/0x1d8 [ 3068.469304][T19469] ? thaw_kernel_threads+0x220/0x220 [ 3068.474718][T19469] ? show_regs_print_info+0x18/0x18 [ 3068.479919][T19469] dump_stack+0x15/0x1c [ 3068.484093][T19469] should_fail+0x3c1/0x510 [ 3068.488683][T19469] ? kobject_get_path+0xbf/0x1f0 [ 3068.493620][T19469] __should_failslab+0xa4/0xe0 [ 3068.498380][T19469] should_failslab+0x9/0x20 [ 3068.502885][T19469] __kmalloc+0x60/0x330 [ 3068.507127][T19469] ? kfree_const+0x39/0x40 [ 3068.511580][T19469] kobject_get_path+0xbf/0x1f0 [ 3068.516347][T19469] kobject_rename+0x17c/0x4d0 [ 3068.521107][T19469] ? kernfs_put+0x449/0x480 [ 3068.525695][T19469] ? kobject_init_and_add+0x190/0x190 [ 3068.531070][T19469] ? sysfs_rename_link_ns+0x170/0x1a0 [ 3068.536538][T19469] device_rename+0x164/0x190 [ 3068.541127][T19469] dev_change_name+0x2a5/0x8c0 [ 3068.545896][T19469] ? dev_alloc_name_ns+0x870/0x870 [ 3068.551009][T19469] dev_ifsioc+0x45b/0xa50 [ 3068.555344][T19469] ? dev_ioctl+0xb80/0xb80 [ 3068.559755][T19469] ? security_capable+0x87/0xb0 [ 3068.564624][T19469] dev_ioctl+0x33d/0xb80 [ 3068.569053][T19469] sock_do_ioctl+0x235/0x330 [ 3068.573668][T19469] ? __bpf_trace_kmem_free+0x6f/0x90 [ 3068.579062][T19469] ? sock_show_fdinfo+0xa0/0xa0 [ 3068.584091][T19469] ? selinux_file_ioctl+0x377/0x480 [ 3068.589309][T19469] ? mutex_trylock+0xa0/0xa0 [ 3068.593915][T19469] ? __fget_files+0x2c4/0x320 [ 3068.598608][T19469] sock_ioctl+0x504/0x710 [ 3068.602937][T19469] ? sock_poll+0x360/0x360 [ 3068.607349][T19469] ? __fget_files+0x2c4/0x320 [ 3068.612028][T19469] ? security_file_ioctl+0x84/0xa0 [ 3068.617146][T19469] ? sock_poll+0x360/0x360 [ 3068.621560][T19469] __se_sys_ioctl+0x121/0x1a0 [ 3068.626236][T19469] __x64_sys_ioctl+0x7b/0x90 [ 3068.631296][T19469] do_syscall_64+0x31/0x40 [ 3068.635735][T19469] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 3068.641720][T19469] RIP: 0033:0x7ff54a8c0be9 [ 3068.646203][T19469] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 3068.665991][T19469] RSP: 002b:00007ff549308038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 3068.674498][T19469] RAX: ffffffffffffffda RBX: 00007ff54aaf8090 RCX: 00007ff54a8c0be9 [ 3068.682631][T19469] RDX: 0000200000000000 RSI: 0000000000008923 RDI: 0000000000000007 [ 3068.690803][T19469] RBP: 00007ff549308090 R08: 0000000000000000 R09: 0000000000000000 [ 3068.698915][T19469] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 3068.706900][T19469] R13: 00007ff54aaf8128 R14: 00007ff54aaf8090 R15: 00007fffe2ff9b18 [ 3068.839544][T19481] device veth1_macvtap left promiscuous mode [ 3068.845770][T19481] device macsec0 left promiscuous mode [ 3068.919974][T19478] device veth1_macvtap entered promiscuous mode [ 3068.927072][T19478] device macsec0 entered promiscuous mode [ 3069.012468][T19490] FAULT_INJECTION: forcing a failure. [ 3069.012468][T19490] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 3069.038722][T19490] CPU: 0 PID: 19490 Comm: syz.1.27881 Tainted: G W syzkaller #0 [ 3069.047781][T19490] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/14/2025 [ 3069.057848][T19490] Call Trace: [ 3069.061144][T19490] __dump_stack+0x21/0x24 [ 3069.065511][T19490] dump_stack_lvl+0x169/0x1d8 [ 3069.070245][T19490] ? thaw_kernel_threads+0x220/0x220 [ 3069.075511][T19490] ? vsnprintf+0x1871/0x1960 [ 3069.080109][T19490] ? show_regs_print_info+0x18/0x18 [ 3069.085286][T19490] dump_stack+0x15/0x1c [ 3069.089439][T19490] should_fail+0x3c1/0x510 [ 3069.093843][T19490] should_fail_usercopy+0x1a/0x20 [ 3069.098847][T19490] _copy_to_user+0x20/0x90 [ 3069.103249][T19490] simple_read_from_buffer+0xe9/0x160 [ 3069.108795][T19490] proc_fail_nth_read+0x19a/0x210 [ 3069.113830][T19490] ? proc_fault_inject_write+0x2f0/0x2f0 [ 3069.119566][T19490] ? rw_verify_area+0x1c0/0x360 [ 3069.124432][T19490] ? proc_fault_inject_write+0x2f0/0x2f0 [ 3069.130059][T19490] vfs_read+0x1fe/0xa10 [ 3069.134209][T19490] ? kernel_read+0x70/0x70 [ 3069.138604][T19490] ? bpf_obj_get_user+0x178/0x440 [ 3069.143697][T19490] ? __kasan_check_write+0x14/0x20 [ 3069.148801][T19490] ? mutex_lock+0x8c/0xe0 [ 3069.153109][T19490] ? mutex_trylock+0xa0/0xa0 [ 3069.157697][T19490] ? __fget_files+0x2c4/0x320 [ 3069.162446][T19490] ? __fdget_pos+0x2d2/0x380 [ 3069.167017][T19490] ? ksys_read+0x71/0x240 [ 3069.171429][T19490] ksys_read+0x140/0x240 [ 3069.175840][T19490] ? vfs_write+0xd60/0xd60 [ 3069.180276][T19490] ? fpu__clear_all+0x20/0x20 [ 3069.185043][T19490] __x64_sys_read+0x7b/0x90 [ 3069.189551][T19490] do_syscall_64+0x31/0x40 [ 3069.194063][T19490] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 3069.199957][T19490] RIP: 0033:0x7f420f7525fc [ 3069.204358][T19490] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 93 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 ef 93 02 00 48 [ 3069.224041][T19490] RSP: 002b:00007f420e1bc030 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 3069.232451][T19490] RAX: ffffffffffffffda RBX: 00007f420f98afa0 RCX: 00007f420f7525fc [ 3069.240843][T19490] RDX: 000000000000000f RSI: 00007f420e1bc0a0 RDI: 0000000000000006 [ 3069.248886][T19490] RBP: 00007f420e1bc090 R08: 0000000000000000 R09: 0000000000000000 [ 3069.256985][T19490] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 3069.265075][T19490] R13: 00007f420f98b038 R14: 00007f420f98afa0 R15: 00007ffde6f74b58 [ 3069.359879][T19498] device veth1_macvtap left promiscuous mode [ 3069.366077][T19498] device macsec0 left promiscuous mode [ 3069.458636][T19506] device veth1_macvtap entered promiscuous mode [ 3069.465029][T19506] device macsec0 entered promiscuous mode [ 3070.201036][T19527] device veth1_macvtap left promiscuous mode [ 3070.209172][T19527] device macsec0 left promiscuous mode [ 3070.247905][T19531] FAULT_INJECTION: forcing a failure. [ 3070.247905][T19531] name failslab, interval 1, probability 0, space 0, times 0 [ 3070.262398][T19531] CPU: 1 PID: 19531 Comm: syz.3.27897 Tainted: G W syzkaller #0 [ 3070.271347][T19531] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/14/2025 [ 3070.281592][T19531] Call Trace: [ 3070.284901][T19531] __dump_stack+0x21/0x24 [ 3070.289341][T19531] dump_stack_lvl+0x169/0x1d8 [ 3070.294287][T19531] ? thaw_kernel_threads+0x220/0x220 [ 3070.299585][T19531] ? show_regs_print_info+0x18/0x18 [ 3070.304791][T19531] dump_stack+0x15/0x1c [ 3070.308961][T19531] should_fail+0x3c1/0x510 [ 3070.313480][T19531] ? kvmalloc_node+0x88/0x130 [ 3070.318166][T19531] __should_failslab+0xa4/0xe0 [ 3070.323031][T19531] should_failslab+0x9/0x20 [ 3070.327548][T19531] __kmalloc+0x60/0x330 [ 3070.331708][T19531] ? kvmalloc_node+0x88/0x130 [ 3070.336452][T19531] kvmalloc_node+0x88/0x130 [ 3070.340971][T19531] pfifo_fast_init+0x3af/0x7a0 [ 3070.345741][T19531] qdisc_create_dflt+0x136/0x3a0 [ 3070.350774][T19531] dev_activate+0x292/0x11c0 [ 3070.355379][T19531] __dev_open+0x3aa/0x4c0 [ 3070.359725][T19531] ? dev_open+0x230/0x230 [ 3070.364067][T19531] ? _raw_spin_unlock_bh+0x51/0x60 [ 3070.369210][T19531] ? dev_set_rx_mode+0x212/0x2c0 [ 3070.374199][T19531] ? __kasan_check_read+0x11/0x20 [ 3070.379239][T19531] __dev_change_flags+0x20a/0x6a0 [ 3070.384277][T19531] ? dev_get_flags+0x1e0/0x1e0 [ 3070.389044][T19531] ? selinux_capable+0x29c/0x380 [ 3070.394003][T19531] ? selinux_capset+0xf0/0xf0 [ 3070.398689][T19531] dev_change_flags+0x88/0x1a0 [ 3070.403641][T19531] dev_ifsioc+0x113/0xa50 [ 3070.407982][T19531] ? dev_ioctl+0xb80/0xb80 [ 3070.412493][T19531] dev_ioctl+0x550/0xb80 [ 3070.416743][T19531] sock_do_ioctl+0x235/0x330 [ 3070.421339][T19531] ? sock_show_fdinfo+0xa0/0xa0 [ 3070.426201][T19531] ? irq_work_queue+0xc1/0x150 [ 3070.430981][T19531] ? selinux_file_ioctl+0x377/0x480 [ 3070.436359][T19531] ? mutex_trylock+0xa0/0xa0 [ 3070.440964][T19531] ? __fget_files+0x2c4/0x320 [ 3070.445742][T19531] sock_ioctl+0x504/0x710 [ 3070.450096][T19531] ? sock_poll+0x360/0x360 [ 3070.454624][T19531] ? __fget_files+0x2c4/0x320 [ 3070.459313][T19531] ? security_file_ioctl+0x84/0xa0 [ 3070.464436][T19531] ? sock_poll+0x360/0x360 [ 3070.468945][T19531] __se_sys_ioctl+0x121/0x1a0 [ 3070.473632][T19531] __x64_sys_ioctl+0x7b/0x90 [ 3070.478336][T19531] do_syscall_64+0x31/0x40 [ 3070.482761][T19531] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 3070.488663][T19531] RIP: 0033:0x7ff54a8c0be9 [ 3070.493089][T19531] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 3070.512777][T19531] RSP: 002b:00007ff549329038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 3070.521270][T19531] RAX: ffffffffffffffda RBX: 00007ff54aaf7fa0 RCX: 00007ff54a8c0be9 [ 3070.529235][T19531] RDX: 0000200000000100 RSI: 0000000000008914 RDI: 0000000000000008 [ 3070.537210][T19531] RBP: 00007ff549329090 R08: 0000000000000000 R09: 0000000000000000 [ 3070.545293][T19531] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 3070.553261][T19531] R13: 00007ff54aaf8038 R14: 00007ff54aaf7fa0 R15: 00007fffe2ff9b18 [ 3070.579675][T19531] pim6reg1: default qdisc (pfifo_fast) fail, fallback to noqueue [ 3070.588172][T19531] device pim6reg1 entered promiscuous mode [ 3070.594503][T19529] device pim6reg1 entered promiscuous mode [ 3070.602878][T19527] device veth1_macvtap entered promiscuous mode [ 3070.616292][T19527] device macsec0 entered promiscuous mode [ 3070.794922][T19539] device veth1_macvtap left promiscuous mode [ 3070.804449][T19539] device macsec0 left promiscuous mode [ 3070.856174][T19547] device veth1_macvtap entered promiscuous mode [ 3070.931255][T19547] device macsec0 entered promiscuous mode [ 3071.027132][T19551] device veth1_macvtap left promiscuous mode [ 3071.033307][T19551] device macsec0 left promiscuous mode [ 3071.074352][T19551] device veth1_macvtap entered promiscuous mode [ 3071.087457][T19551] device macsec0 entered promiscuous mode [ 3071.305373][T19568] device veth1_macvtap left promiscuous mode [ 3071.314063][T19568] device macsec0 left promiscuous mode [ 3071.393653][T19568] device veth1_macvtap entered promiscuous mode [ 3071.409406][T19568] device macsec0 entered promiscuous mode [ 3071.735563][T19581] device sit0 entered promiscuous mode [ 3072.173035][T19606] device veth1_macvtap left promiscuous mode [ 3072.182181][T19606] device macsec0 left promiscuous mode [ 3072.240571][T19606] device veth1_macvtap entered promiscuous mode [ 3072.249008][T19606] device macsec0 entered promiscuous mode [ 3072.388630][T19633] device veth1_macvtap left promiscuous mode [ 3072.403365][T19633] device macsec0 left promiscuous mode [ 3072.461878][T19642] device veth1_macvtap entered promiscuous mode [ 3072.484322][T19642] device macsec0 entered promiscuous mode [ 3072.559221][T19644] device pim6reg1 entered promiscuous mode [ 3072.667966][T19673] FAULT_INJECTION: forcing a failure. [ 3072.667966][T19673] name failslab, interval 1, probability 0, space 0, times 0 [ 3072.706435][T19673] CPU: 0 PID: 19673 Comm: syz.1.27953 Tainted: G W syzkaller #0 [ 3072.715599][T19673] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/14/2025 [ 3072.725657][T19673] Call Trace: [ 3072.728940][T19673] __dump_stack+0x21/0x24 [ 3072.733349][T19673] dump_stack_lvl+0x169/0x1d8 [ 3072.738245][T19673] ? thaw_kernel_threads+0x220/0x220 [ 3072.743522][T19673] ? show_regs_print_info+0x18/0x18 [ 3072.748778][T19673] ? stack_trace_save+0x98/0xe0 [ 3072.753813][T19673] ? stack_trace_snprint+0xf0/0xf0 [ 3072.759006][T19673] dump_stack+0x15/0x1c [ 3072.763167][T19673] should_fail+0x3c1/0x510 [ 3072.767614][T19673] ? __alloc_skb+0x9e/0x520 [ 3072.772459][T19673] __should_failslab+0xa4/0xe0 [ 3072.777386][T19673] should_failslab+0x9/0x20 [ 3072.781878][T19673] kmem_cache_alloc+0x3d/0x2e0 [ 3072.786632][T19673] ? proc_pident_lookup+0x1c0/0x270 [ 3072.791931][T19673] ? proc_tid_base_lookup+0x2b/0x30 [ 3072.797205][T19673] ? path_openat+0x1127/0x3160 [ 3072.801988][T19673] __alloc_skb+0x9e/0x520 [ 3072.806309][T19673] tipc_msg_build+0xd0/0xc90 [ 3072.810891][T19673] ? _raw_spin_lock_bh+0x8e/0xe0 [ 3072.815902][T19673] ? _raw_spin_lock_irq+0xe0/0xe0 [ 3072.820928][T19673] ? __local_bh_enable_ip+0x53/0x80 [ 3072.826311][T19673] ? tipc_nametbl_lookup_dst_nodes+0x375/0x7c0 [ 3072.832470][T19673] __tipc_sendmsg+0x1a14/0x2be0 [ 3072.837409][T19673] ? tipc_sk_publish+0x3f0/0x3f0 [ 3072.842336][T19673] ? avc_has_perm+0x234/0x360 [ 3072.847179][T19673] ? wait_woken+0x180/0x180 [ 3072.851878][T19673] ? __kasan_check_write+0x14/0x20 [ 3072.857008][T19673] ? _raw_spin_lock_bh+0x8e/0xe0 [ 3072.861937][T19673] ? _raw_spin_lock_irq+0xe0/0xe0 [ 3072.867129][T19673] ? __local_bh_enable_ip+0x53/0x80 [ 3072.872631][T19673] ? local_bh_enable+0x1f/0x30 [ 3072.877550][T19673] ? lock_sock_nested+0x1f5/0x290 [ 3072.882673][T19673] ? sock_init_data+0xc0/0xc0 [ 3072.887536][T19673] ? kasan_set_track+0x5b/0x70 [ 3072.892294][T19673] ? kasan_set_track+0x4a/0x70 [ 3072.897054][T19673] tipc_sendmsg+0x55/0x70 [ 3072.901472][T19673] ? tipc_recvmsg+0x13a0/0x13a0 [ 3072.906321][T19673] ____sys_sendmsg+0x5a2/0x8c0 [ 3072.911143][T19673] ? __sys_sendmsg_sock+0x40/0x40 [ 3072.916250][T19673] ? import_iovec+0x7c/0xb0 [ 3072.920927][T19673] ___sys_sendmsg+0x1f0/0x260 [ 3072.925593][T19673] ? __sys_sendmsg+0x250/0x250 [ 3072.930431][T19673] ? rw_verify_area+0x1c0/0x360 [ 3072.935279][T19673] ? __fdget+0x1a1/0x230 [ 3072.939508][T19673] __x64_sys_sendmsg+0x1e2/0x2a0 [ 3072.944453][T19673] ? fput+0x1a/0x20 [ 3072.948248][T19673] ? ___sys_sendmsg+0x260/0x260 [ 3072.953193][T19673] ? fpregs_assert_state_consistent+0xb1/0xe0 [ 3072.959248][T19673] do_syscall_64+0x31/0x40 [ 3072.963659][T19673] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 3072.969630][T19673] RIP: 0033:0x7f420f753be9 [ 3072.974036][T19673] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 3072.993633][T19673] RSP: 002b:00007f420e1bc038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 3073.002169][T19673] RAX: ffffffffffffffda RBX: 00007f420f98afa0 RCX: 00007f420f753be9 [ 3073.010158][T19673] RDX: 0000000000000000 RSI: 0000200000004440 RDI: 0000000000000007 [ 3073.018305][T19673] RBP: 00007f420e1bc090 R08: 0000000000000000 R09: 0000000000000000 [ 3073.026266][T19673] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 3073.034331][T19673] R13: 00007f420f98b038 R14: 00007f420f98afa0 R15: 00007ffde6f74b58 [ 3073.110125][T19675] device veth1_macvtap left promiscuous mode [ 3073.126866][T19675] device macsec0 left promiscuous mode [ 3073.188910][T19675] device veth1_macvtap entered promiscuous mode [ 3073.196143][T19675] device macsec0 entered promiscuous mode [ 3073.637659][T19716] device syzkaller0 entered promiscuous mode [ 3076.131186][T19830] device veth1_macvtap left promiscuous mode [ 3076.138628][T19830] device macsec0 left promiscuous mode [ 3076.164008][T19830] device veth1_macvtap entered promiscuous mode [ 3076.170671][T19830] device macsec0 entered promiscuous mode [ 3076.817512][T19880] device veth1_macvtap left promiscuous mode [ 3076.823639][T19880] device macsec0 left promiscuous mode [ 3076.875090][T19880] device veth1_macvtap entered promiscuous mode [ 3076.881794][T19880] device macsec0 entered promiscuous mode [ 3077.008514][T19892] FAULT_INJECTION: forcing a failure. [ 3077.008514][T19892] name failslab, interval 1, probability 0, space 0, times 0 [ 3077.157776][T19892] CPU: 0 PID: 19892 Comm: syz.4.28037 Tainted: G W syzkaller #0 [ 3077.166841][T19892] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/14/2025 [ 3077.177086][T19892] Call Trace: [ 3077.180416][T19892] __dump_stack+0x21/0x24 [ 3077.184759][T19892] dump_stack_lvl+0x169/0x1d8 [ 3077.189535][T19892] ? thaw_kernel_threads+0x220/0x220 [ 3077.195017][T19892] ? selinux_capable+0x29c/0x380 [ 3077.199965][T19892] ? show_regs_print_info+0x18/0x18 [ 3077.205191][T19892] ? selinux_capset+0xf0/0xf0 [ 3077.209885][T19892] dump_stack+0x15/0x1c [ 3077.214136][T19892] should_fail+0x3c1/0x510 [ 3077.218563][T19892] ? sock_hash_alloc+0x1a1/0x620 [ 3077.223506][T19892] __should_failslab+0xa4/0xe0 [ 3077.228270][T19892] should_failslab+0x9/0x20 [ 3077.232774][T19892] kmem_cache_alloc_trace+0x3a/0x2e0 [ 3077.238076][T19892] sock_hash_alloc+0x1a1/0x620 [ 3077.242842][T19892] map_create+0x44e/0x2090 [ 3077.247259][T19892] __se_sys_bpf+0x203/0x680 [ 3077.251757][T19892] ? __x64_sys_bpf+0x90/0x90 [ 3077.256353][T19892] ? debug_smp_processor_id+0x17/0x20 [ 3077.261731][T19892] ? fpregs_assert_state_consistent+0xb1/0xe0 [ 3077.267879][T19892] __x64_sys_bpf+0x7b/0x90 [ 3077.272372][T19892] do_syscall_64+0x31/0x40 [ 3077.276784][T19892] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 3077.282768][T19892] RIP: 0033:0x7fb5f8a4bbe9 [ 3077.287361][T19892] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 3077.307055][T19892] RSP: 002b:00007fb5f74b4038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 3077.315472][T19892] RAX: ffffffffffffffda RBX: 00007fb5f8c82fa0 RCX: 00007fb5f8a4bbe9 [ 3077.323439][T19892] RDX: 0000000000000050 RSI: 0000200000000180 RDI: 0000000000000000 [ 3077.331492][T19892] RBP: 00007fb5f74b4090 R08: 0000000000000000 R09: 0000000000000000 [ 3077.339457][T19892] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 3077.347591][T19892] R13: 00007fb5f8c83038 R14: 00007fb5f8c82fa0 R15: 00007fffd8d0da08 [ 3077.699704][T19911] device veth1_macvtap left promiscuous mode [ 3077.705736][T19911] device macsec0 left promiscuous mode [ 3077.731378][T19911] device veth1_macvtap entered promiscuous mode [ 3077.746713][T19911] device macsec0 entered promiscuous mode [ 3077.895348][T19930] device veth1_macvtap left promiscuous mode [ 3077.910174][T19930] device macsec0 left promiscuous mode [ 3077.953015][T19930] device veth1_macvtap entered promiscuous mode [ 3077.969623][T19930] device macsec0 entered promiscuous mode [ 3078.090432][T19944] FAULT_INJECTION: forcing a failure. [ 3078.090432][T19944] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 3078.116649][T19944] CPU: 1 PID: 19944 Comm: syz.1.28053 Tainted: G W syzkaller #0 [ 3078.125704][T19944] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/14/2025 [ 3078.135979][T19944] Call Trace: [ 3078.139371][T19944] __dump_stack+0x21/0x24 [ 3078.143704][T19944] dump_stack_lvl+0x169/0x1d8 [ 3078.148616][T19944] ? show_regs_print_info+0x18/0x18 [ 3078.153932][T19944] ? avc_has_perm+0x234/0x360 [ 3078.158615][T19944] dump_stack+0x15/0x1c [ 3078.162959][T19944] should_fail+0x3c1/0x510 [ 3078.167376][T19944] should_fail_usercopy+0x1a/0x20 [ 3078.172670][T19944] _copy_to_iter+0x1df/0xa40 [ 3078.177365][T19944] ? __kasan_check_write+0x14/0x20 [ 3078.182610][T19944] ? __check_object_size+0x2f4/0x3c0 [ 3078.187912][T19944] simple_copy_to_iter+0x50/0x70 [ 3078.192906][T19944] __skb_datagram_iter+0xdb/0x700 [ 3078.197932][T19944] ? tipc_sk_anc_data_recv+0xa6/0x680 [ 3078.203308][T19944] ? skb_copy_datagram_iter+0x150/0x150 [ 3078.208945][T19944] skb_copy_datagram_iter+0x43/0x150 [ 3078.214416][T19944] tipc_recvmsg+0x79b/0x13a0 [ 3078.219167][T19944] ? tipc_send_packet+0xa0/0xa0 [ 3078.224039][T19944] ? security_socket_recvmsg+0x87/0xb0 [ 3078.229533][T19944] ? tipc_send_packet+0xa0/0xa0 [ 3078.234399][T19944] ____sys_recvmsg+0x291/0x580 [ 3078.239180][T19944] ? __sys_recvmsg_sock+0x50/0x50 [ 3078.244215][T19944] ? import_iovec+0x7c/0xb0 [ 3078.248721][T19944] ___sys_recvmsg+0x1af/0x4f0 [ 3078.253418][T19944] ? __sys_recvmsg+0x250/0x250 [ 3078.258301][T19944] ? __fdget+0x1a1/0x230 [ 3078.262556][T19944] __x64_sys_recvmsg+0x1dd/0x2a0 [ 3078.267534][T19944] ? fput+0x1a/0x20 [ 3078.271350][T19944] ? ___sys_recvmsg+0x4f0/0x4f0 [ 3078.276219][T19944] ? fpregs_assert_state_consistent+0xb1/0xe0 [ 3078.282640][T19944] do_syscall_64+0x31/0x40 [ 3078.287066][T19944] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 3078.293052][T19944] RIP: 0033:0x7f420f753be9 [ 3078.297738][T19944] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 3078.317705][T19944] RSP: 002b:00007f420e1bc038 EFLAGS: 00000246 ORIG_RAX: 000000000000002f [ 3078.326220][T19944] RAX: ffffffffffffffda RBX: 00007f420f98afa0 RCX: 00007f420f753be9 [ 3078.334206][T19944] RDX: 0000000000000000 RSI: 0000200000000b00 RDI: 0000000000000003 [ 3078.342210][T19944] RBP: 00007f420e1bc090 R08: 0000000000000000 R09: 0000000000000000 [ 3078.350463][T19944] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 3078.358436][T19944] R13: 00007f420f98b038 R14: 00007f420f98afa0 R15: 00007ffde6f74b58 [ 3078.524551][T19960] syz.1.28059[19960] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 3078.524610][T19960] syz.1.28059[19960] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 3078.588702][T19965] syz.1.28059[19965] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 3078.616954][T19960] syz.1.28059[19960] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 3078.936402][T19980] device veth1_macvtap left promiscuous mode [ 3078.967005][T19980] device macsec0 left promiscuous mode [ 3078.974266][T19983] FAULT_INJECTION: forcing a failure. [ 3078.974266][T19983] name failslab, interval 1, probability 0, space 0, times 0 [ 3079.003637][T19984] device veth1_macvtap entered promiscuous mode [ 3079.016771][T19983] CPU: 1 PID: 19983 Comm: syz.3.28066 Tainted: G W syzkaller #0 [ 3079.025936][T19983] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/14/2025 [ 3079.036182][T19983] Call Trace: [ 3079.039575][T19983] __dump_stack+0x21/0x24 [ 3079.043925][T19983] dump_stack_lvl+0x169/0x1d8 [ 3079.048620][T19983] ? thaw_kernel_threads+0x220/0x220 [ 3079.054408][T19983] ? show_regs_print_info+0x18/0x18 [ 3079.059626][T19983] dump_stack+0x15/0x1c [ 3079.063886][T19983] should_fail+0x3c1/0x510 [ 3079.068302][T19983] ? kvmalloc_node+0x88/0x130 [ 3079.073119][T19983] __should_failslab+0xa4/0xe0 [ 3079.077903][T19983] should_failslab+0x9/0x20 [ 3079.082542][T19983] __kmalloc+0x60/0x330 [ 3079.086792][T19983] ? btf_check_all_metas+0x747/0x820 [ 3079.092080][T19983] ? kvmalloc_node+0x88/0x130 [ 3079.096767][T19983] kvmalloc_node+0x88/0x130 [ 3079.101268][T19983] btf_parse_type_sec+0x1b5/0x15a0 [ 3079.106375][T19983] ? btf_check_sec_info+0x27a/0x330 [ 3079.111653][T19983] ? btf_check_sec_info+0x330/0x330 [ 3079.116933][T19983] ? btf_verifier_log+0x2a0/0x2a0 [ 3079.121952][T19983] ? memcpy+0x56/0x70 [ 3079.125931][T19983] ? btf_parse_hdr+0x5d6/0x7b0 [ 3079.130711][T19983] ? btf_parse_str_sec+0x1aa/0x260 [ 3079.135829][T19983] btf_new_fd+0x562/0xa00 [ 3079.140248][T19983] bpf_btf_load+0x5e/0x70 [ 3079.144590][T19983] __se_sys_bpf+0x48a/0x680 [ 3079.149222][T19983] ? __x64_sys_bpf+0x90/0x90 [ 3079.154085][T19983] __x64_sys_bpf+0x7b/0x90 [ 3079.158535][T19983] do_syscall_64+0x31/0x40 [ 3079.162949][T19983] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 3079.169380][T19983] RIP: 0033:0x7ff54a8c0be9 [ 3079.173885][T19983] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 3079.193757][T19983] RSP: 002b:00007ff549329038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 3079.202183][T19983] RAX: ffffffffffffffda RBX: 00007ff54aaf7fa0 RCX: 00007ff54a8c0be9 [ 3079.210172][T19983] RDX: 0000000000000028 RSI: 0000200000000580 RDI: 0000000000000012 [ 3079.218491][T19983] RBP: 00007ff549329090 R08: 0000000000000000 R09: 0000000000000000 [ 3079.226557][T19983] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 3079.234646][T19983] R13: 00007ff54aaf8038 R14: 00007ff54aaf7fa0 R15: 00007fffe2ff9b18 [ 3079.244848][T19984] device macsec0 entered promiscuous mode [ 3079.756441][T20024] device sit0 entered promiscuous mode [ 3080.016903][T20036] device veth1_macvtap left promiscuous mode [ 3080.024680][T20036] device macsec0 left promiscuous mode [ 3080.110477][T20036] device veth1_macvtap entered promiscuous mode [ 3080.126310][T20036] device macsec0 entered promiscuous mode [ 3080.305292][T20049] FAULT_INJECTION: forcing a failure. [ 3080.305292][T20049] name failslab, interval 1, probability 0, space 0, times 0 [ 3080.324562][T20049] CPU: 0 PID: 20049 Comm: syz.0.28089 Tainted: G W syzkaller #0 [ 3080.333519][T20049] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/14/2025 [ 3080.343600][T20049] Call Trace: [ 3080.346897][T20049] __dump_stack+0x21/0x24 [ 3080.351231][T20049] dump_stack_lvl+0x169/0x1d8 [ 3080.355909][T20049] ? show_regs_print_info+0x18/0x18 [ 3080.361200][T20049] dump_stack+0x15/0x1c [ 3080.365358][T20049] should_fail+0x3c1/0x510 [ 3080.369793][T20049] ? selinux_tun_dev_alloc_security+0x51/0x140 [ 3080.376294][T20049] __should_failslab+0xa4/0xe0 [ 3080.381101][T20049] should_failslab+0x9/0x20 [ 3080.385617][T20049] kmem_cache_alloc_trace+0x3a/0x2e0 [ 3080.391020][T20049] selinux_tun_dev_alloc_security+0x51/0x140 [ 3080.397102][T20049] security_tun_dev_alloc_security+0x62/0x90 [ 3080.403154][T20049] tun_net_init+0x1e1/0x580 [ 3080.407755][T20049] register_netdevice+0x351/0x13c0 [ 3080.412869][T20049] ? memset+0x35/0x40 [ 3080.416858][T20049] ? xdp_rxq_info_reg+0xec/0x2e0 [ 3080.421810][T20049] ? netif_stacked_transfer_operstate+0x220/0x220 [ 3080.428225][T20049] ? alloc_netdev_mqs+0x9c9/0xc80 [ 3080.433259][T20049] tun_set_iff+0x812/0xe00 [ 3080.437678][T20049] __tun_chr_ioctl+0x795/0x1cd0 [ 3080.442617][T20049] ? tun_flow_create+0x320/0x320 [ 3080.447669][T20049] ? __irq_exit_rcu+0x40/0x150 [ 3080.452533][T20049] ? irq_exit_rcu+0x9/0x10 [ 3080.456949][T20049] ? sysvec_apic_timer_interrupt+0xcb/0xe0 [ 3080.462764][T20049] tun_chr_ioctl+0x2a/0x40 [ 3080.467197][T20049] ? tun_chr_poll+0x6b0/0x6b0 [ 3080.471887][T20049] __se_sys_ioctl+0x121/0x1a0 [ 3080.476665][T20049] __x64_sys_ioctl+0x7b/0x90 [ 3080.481288][T20049] do_syscall_64+0x31/0x40 [ 3080.485713][T20049] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 3080.491610][T20049] RIP: 0033:0x7f4a73318be9 [ 3080.496038][T20049] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 3080.515696][T20049] RSP: 002b:00007f4a71d81038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 3080.524254][T20049] RAX: ffffffffffffffda RBX: 00007f4a7354ffa0 RCX: 00007f4a73318be9 [ 3080.532227][T20049] RDX: 0000200000000040 RSI: 00000000400454ca RDI: 0000000000000007 [ 3080.540212][T20049] RBP: 00007f4a71d81090 R08: 0000000000000000 R09: 0000000000000000 [ 3080.548208][T20049] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 3080.556934][T20049] R13: 00007f4a73550038 R14: 00007f4a7354ffa0 R15: 00007ffc8d285898 [ 3081.037402][T20084] device veth1_macvtap left promiscuous mode [ 3081.043612][T20084] device macsec0 left promiscuous mode [ 3081.081801][T20084] device veth1_macvtap entered promiscuous mode [ 3081.091266][T20084] device macsec0 entered promiscuous mode [ 3081.864657][T20128] ÿÿÿÿÿÿ: renamed from vlan1 [ 3081.975789][T20130] device veth1_macvtap left promiscuous mode [ 3081.985962][T20130] device macsec0 left promiscuous mode [ 3082.013110][T20126] device veth1_macvtap left promiscuous mode [ 3082.026282][T20126] device macsec0 left promiscuous mode [ 3082.070685][T20130] device veth1_macvtap entered promiscuous mode [ 3082.079022][T20130] device macsec0 entered promiscuous mode [ 3082.113215][T20135] device veth1_macvtap entered promiscuous mode [ 3082.126690][T20135] device macsec0 entered promiscuous mode [ 3082.588875][T20172] device veth1_macvtap left promiscuous mode [ 3082.595065][T20172] device macsec0 left promiscuous mode [ 3082.678548][T20172] device veth1_macvtap entered promiscuous mode [ 3082.686068][T20172] device macsec0 entered promiscuous mode [ 3083.080502][T20205] device veth1_macvtap left promiscuous mode [ 3083.086786][T20205] device macsec0 left promiscuous mode [ 3083.154902][T20205] device veth1_macvtap entered promiscuous mode [ 3083.163761][T20205] device macsec0 entered promiscuous mode [ 3083.193657][T20208] device veth1_macvtap left promiscuous mode [ 3083.200142][T20208] device macsec0 left promiscuous mode [ 3083.257014][T20219] device veth1_macvtap entered promiscuous mode [ 3083.263475][T20219] device macsec0 entered promiscuous mode [ 3083.309338][T20222] FAULT_INJECTION: forcing a failure. [ 3083.309338][T20222] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 3083.322898][T20222] CPU: 1 PID: 20222 Comm: syz.0.28157 Tainted: G W syzkaller #0 [ 3083.332510][T20222] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/14/2025 [ 3083.342725][T20222] Call Trace: [ 3083.346015][T20222] __dump_stack+0x21/0x24 [ 3083.350332][T20222] dump_stack_lvl+0x169/0x1d8 [ 3083.355140][T20222] ? show_regs_print_info+0x18/0x18 [ 3083.360329][T20222] ? avc_has_perm+0x234/0x360 [ 3083.365180][T20222] dump_stack+0x15/0x1c [ 3083.369329][T20222] should_fail+0x3c1/0x510 [ 3083.373727][T20222] should_fail_usercopy+0x1a/0x20 [ 3083.378770][T20222] _copy_from_user+0x20/0xd0 [ 3083.383459][T20222] sock_setsockopt+0x261/0x2350 [ 3083.388308][T20222] ? __sock_set_mark+0x160/0x160 [ 3083.393267][T20222] ? __cgroup_bpf_run_filter_setsockopt+0x23f/0x970 [ 3083.399856][T20222] ? selinux_socket_getsockopt+0x2e0/0x2e0 [ 3083.405665][T20222] ? __cgroup_bpf_run_filter_sysctl+0x880/0x880 [ 3083.412071][T20222] ? __fget_files+0x2c4/0x320 [ 3083.416760][T20222] ? security_socket_setsockopt+0x82/0xa0 [ 3083.422565][T20222] __sys_setsockopt+0x265/0x460 [ 3083.427514][T20222] ? __ia32_sys_recv+0xb0/0xb0 [ 3083.432372][T20222] ? ksys_write+0x1eb/0x240 [ 3083.436973][T20222] ? fpu__clear_all+0x20/0x20 [ 3083.441646][T20222] __x64_sys_setsockopt+0xbf/0xd0 [ 3083.446666][T20222] do_syscall_64+0x31/0x40 [ 3083.451095][T20222] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 3083.456977][T20222] RIP: 0033:0x7f4a73318be9 [ 3083.461476][T20222] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 3083.481648][T20222] RSP: 002b:00007f4a71d81038 EFLAGS: 00000246 ORIG_RAX: 0000000000000036 [ 3083.490052][T20222] RAX: ffffffffffffffda RBX: 00007f4a7354ffa0 RCX: 00007f4a73318be9 [ 3083.498129][T20222] RDX: 000000000000001d RSI: 0000000000000001 RDI: 0000000000000007 [ 3083.507261][T20222] RBP: 00007f4a71d81090 R08: 0000000000000004 R09: 0000000000000000 [ 3083.515405][T20222] R10: 00002000000001c0 R11: 0000000000000246 R12: 0000000000000001 [ 3083.523467][T20222] R13: 00007f4a73550038 R14: 00007f4a7354ffa0 R15: 00007ffc8d285898 [ 3083.907918][T20247] device veth1_macvtap left promiscuous mode [ 3083.922908][T20247] device macsec0 left promiscuous mode [ 3083.968541][T20247] device veth1_macvtap entered promiscuous mode [ 3084.011676][T20247] device macsec0 entered promiscuous mode [ 3084.163861][T20254] device veth1_macvtap left promiscuous mode [ 3084.175859][T20254] device macsec0 left promiscuous mode [ 3084.220808][T20254] device veth1_macvtap entered promiscuous mode [ 3084.234738][T20254] device macsec0 entered promiscuous mode [ 3084.393831][T20277] syz.2.28182[20277] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 3084.393931][T20277] syz.2.28182[20277] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 3085.377516][T20311] device veth1_macvtap left promiscuous mode [ 3085.395763][T20311] device macsec0 left promiscuous mode [ 3085.442175][T20320] device veth1_macvtap entered promiscuous mode [ 3085.456760][T20320] device macsec0 entered promiscuous mode [ 3085.529430][ T2319] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 3086.636008][T20397] device syzkaller0 entered promiscuous mode [ 3087.065509][T20422] syz.2.28235[20422] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 3087.065595][T20422] syz.2.28235[20422] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 3087.309727][T20434] device veth1_macvtap left promiscuous mode [ 3087.317574][T20438] FAULT_INJECTION: forcing a failure. [ 3087.317574][T20438] name failslab, interval 1, probability 0, space 0, times 0 [ 3087.332040][T20434] device macsec0 left promiscuous mode [ 3087.346751][T20438] CPU: 0 PID: 20438 Comm: syz.3.28242 Tainted: G W syzkaller #0 [ 3087.355703][T20438] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/14/2025 [ 3087.365881][T20438] Call Trace: [ 3087.369214][T20438] __dump_stack+0x21/0x24 [ 3087.373532][T20438] dump_stack_lvl+0x169/0x1d8 [ 3087.378657][T20438] ? show_regs_print_info+0x18/0x18 [ 3087.383909][T20438] dump_stack+0x15/0x1c [ 3087.388186][T20438] should_fail+0x3c1/0x510 [ 3087.392822][T20438] ? sidtab_sid2str_get+0x120/0x2c0 [ 3087.398221][T20438] __should_failslab+0xa4/0xe0 [ 3087.403098][T20438] should_failslab+0x9/0x20 [ 3087.407877][T20438] __kmalloc_track_caller+0x5f/0x320 [ 3087.413171][T20438] kmemdup+0x26/0x60 [ 3087.417277][T20438] sidtab_sid2str_get+0x120/0x2c0 [ 3087.422503][T20438] security_sid_to_context_core+0x2ac/0x480 [ 3087.428492][T20438] security_sid_to_context_force+0x36/0x40 [ 3087.434420][T20438] selinux_inode_init_security+0x65c/0x950 [ 3087.440397][T20438] ? selinux_inode_free_security+0x210/0x210 [ 3087.446511][T20438] ? get_cached_acl+0x274/0x2c0 [ 3087.453302][T20438] ? __irq_exit_rcu+0x40/0x150 [ 3087.458071][T20438] security_inode_init_security+0x151/0x370 [ 3087.465288][T20438] ? shmem_tmpfile+0x100/0x100 [ 3087.470946][T20438] ? security_dentry_create_files_as+0xc0/0xc0 [ 3087.477290][T20438] ? get_acl+0x3f/0x270 [ 3087.481543][T20438] ? __kasan_check_write+0x14/0x20 [ 3087.486771][T20438] ? set_cached_acl+0xdd/0x180 [ 3087.491526][T20438] ? simple_acl_create+0x191/0x1c0 [ 3087.496716][T20438] shmem_mknod+0xbb/0x1c0 [ 3087.501301][T20438] ? selinux_inode_mkdir+0x22/0x30 [ 3087.506871][T20438] shmem_mkdir+0x2e/0x60 [ 3087.511328][T20438] vfs_mkdir+0x4c7/0x6a0 [ 3087.515680][T20438] do_mkdirat+0x14c/0x340 [ 3087.520185][T20438] __x64_sys_mkdir+0x60/0x70 [ 3087.524877][T20438] do_syscall_64+0x31/0x40 [ 3087.529403][T20438] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 3087.535411][T20438] RIP: 0033:0x7ff54a8c0be9 [ 3087.539911][T20438] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 3087.559862][T20438] RSP: 002b:00007ff549329038 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 3087.568383][T20438] RAX: ffffffffffffffda RBX: 00007ff54aaf7fa0 RCX: 00007ff54a8c0be9 [ 3087.576631][T20438] RDX: 0000000000000000 RSI: 0000000000000040 RDI: 0000200000000180 [ 3087.584946][T20438] RBP: 00007ff549329090 R08: 0000000000000000 R09: 0000000000000000 [ 3087.593250][T20438] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 3087.601227][T20438] R13: 00007ff54aaf8038 R14: 00007ff54aaf7fa0 R15: 00007fffe2ff9b18 [ 3087.687333][T20439] device veth1_macvtap entered promiscuous mode [ 3087.718569][T20439] device macsec0 entered promiscuous mode [ 3087.727702][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 3088.617160][T20491] device veth1_macvtap left promiscuous mode [ 3088.656760][T20491] device macsec0 left promiscuous mode [ 3088.727358][T20498] device veth1_macvtap entered promiscuous mode [ 3088.754400][T20498] device macsec0 entered promiscuous mode [ 3089.102467][T20512] device veth1_macvtap left promiscuous mode [ 3089.111973][T20512] device macsec0 left promiscuous mode [ 3089.158766][T20517] device veth1_macvtap entered promiscuous mode [ 3089.171395][T20517] device macsec0 entered promiscuous mode [ 3089.228417][T20522] device veth0_vlan left promiscuous mode [ 3089.246804][T20522] device veth0_vlan entered promiscuous mode [ 3089.519865][T20538] device veth1_macvtap left promiscuous mode [ 3089.560879][T20538] device macsec0 left promiscuous mode [ 3089.641764][T20544] device veth1_macvtap entered promiscuous mode [ 3089.648303][T20544] device macsec0 entered promiscuous mode [ 3090.053172][T20566] device veth1_macvtap left promiscuous mode [ 3090.065224][T20566] device macsec0 left promiscuous mode [ 3090.129636][T20566] device veth1_macvtap entered promiscuous mode [ 3090.144439][T20566] device macsec0 entered promiscuous mode [ 3090.965946][T20614] device veth1_macvtap left promiscuous mode [ 3090.973390][T20614] device macsec0 left promiscuous mode [ 3091.010543][T20614] device veth1_macvtap entered promiscuous mode [ 3091.021835][T20614] device macsec0 entered promiscuous mode [ 3091.832120][T20656] device veth1_macvtap left promiscuous mode [ 3091.864609][T20656] device macsec0 left promiscuous mode [ 3091.902359][T20656] device veth1_macvtap entered promiscuous mode [ 3091.916383][T20656] device macsec0 entered promiscuous mode [ 3092.383649][T20698] device veth1_macvtap left promiscuous mode [ 3092.398653][T20698] device macsec0 left promiscuous mode [ 3092.435285][T20704] device veth1_macvtap entered promiscuous mode [ 3092.448211][T20704] device macsec0 entered promiscuous mode [ 3092.927274][T20735] device wg2 entered promiscuous mode [ 3093.573433][T20757] device veth1_macvtap left promiscuous mode [ 3093.580754][T20757] device macsec0 left promiscuous mode [ 3093.647992][T20757] device veth1_macvtap entered promiscuous mode [ 3093.657835][T20757] device macsec0 entered promiscuous mode [ 3094.935867][T20809] device veth1_macvtap left promiscuous mode [ 3094.948021][T20809] device macsec0 left promiscuous mode [ 3094.977586][T20809] device veth1_macvtap entered promiscuous mode [ 3094.984875][T20809] device macsec0 entered promiscuous mode [ 3096.862267][T20883] device veth1_macvtap left promiscuous mode [ 3096.869474][T20883] device macsec0 left promiscuous mode [ 3096.897910][T20883] device veth1_macvtap entered promiscuous mode [ 3096.905725][T20883] device macsec0 entered promiscuous mode [ 3097.326351][T20909] FAULT_INJECTION: forcing a failure. [ 3097.326351][T20909] name failslab, interval 1, probability 0, space 0, times 0 [ 3097.339550][T20909] CPU: 0 PID: 20909 Comm: syz.4.28419 Tainted: G W syzkaller #0 [ 3097.348853][T20909] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/14/2025 [ 3097.359127][T20909] Call Trace: [ 3097.362543][T20909] __dump_stack+0x21/0x24 [ 3097.366882][T20909] dump_stack_lvl+0x169/0x1d8 [ 3097.371640][T20909] ? show_regs_print_info+0x18/0x18 [ 3097.377157][T20909] ? do_syscall_64+0x31/0x40 [ 3097.382540][T20909] dump_stack+0x15/0x1c [ 3097.386989][T20909] should_fail+0x3c1/0x510 [ 3097.391523][T20909] ? perf_uprobe_init+0x62/0x1a0 [ 3097.396758][T20909] __should_failslab+0xa4/0xe0 [ 3097.401546][T20909] should_failslab+0x9/0x20 [ 3097.406121][T20909] __kmalloc_track_caller+0x5f/0x320 [ 3097.411439][T20909] ? cap_capable+0x19c/0x220 [ 3097.416031][T20909] ? strnlen_user+0xe8/0x1c0 [ 3097.420617][T20909] strndup_user+0x74/0x150 [ 3097.425032][T20909] perf_uprobe_init+0x62/0x1a0 [ 3097.429790][T20909] ? perf_uprobe_event_init+0xd4/0x180 [ 3097.435245][T20909] perf_uprobe_event_init+0xe6/0x180 [ 3097.440613][T20909] perf_try_init_event+0x14a/0x430 [ 3097.445716][T20909] perf_event_alloc+0xcda/0x1990 [ 3097.450749][T20909] __se_sys_perf_event_open+0x5cc/0x1b10 [ 3097.456583][T20909] ? __x64_sys_perf_event_open+0xd0/0xd0 [ 3097.462218][T20909] ? mntput+0x5f/0xc0 [ 3097.466282][T20909] ? fpu__clear_all+0x20/0x20 [ 3097.470953][T20909] __x64_sys_perf_event_open+0xbf/0xd0 [ 3097.476404][T20909] do_syscall_64+0x31/0x40 [ 3097.481188][T20909] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 3097.487124][T20909] RIP: 0033:0x7fb5f8a4bbe9 [ 3097.491532][T20909] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 3097.511302][T20909] RSP: 002b:00007fb5f74b4038 EFLAGS: 00000246 ORIG_RAX: 000000000000012a [ 3097.519710][T20909] RAX: ffffffffffffffda RBX: 00007fb5f8c82fa0 RCX: 00007fb5f8a4bbe9 [ 3097.528020][T20909] RDX: 0000000000000000 RSI: ffffffffffffffff RDI: 0000200000000000 [ 3097.536343][T20909] RBP: 00007fb5f74b4090 R08: 0000000000000000 R09: 0000000000000000 [ 3097.544304][T20909] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000001 [ 3097.552279][T20909] R13: 00007fb5f8c83038 R14: 00007fb5f8c82fa0 R15: 00007fffd8d0da08 [ 3097.706730][T20921] device veth0_vlan left promiscuous mode [ 3097.728007][T20921] device veth0_vlan entered promiscuous mode [ 3097.806769][T29283] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 3097.816103][T29283] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 3097.824022][T29283] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ: link becomes ready [ 3097.957921][T20931] device veth1_macvtap left promiscuous mode [ 3097.964176][T20931] device macsec0 left promiscuous mode [ 3098.066307][T20931] device veth1_macvtap entered promiscuous mode [ 3098.073413][T20931] device macsec0 entered promiscuous mode [ 3098.315144][T20955] device veth1_macvtap left promiscuous mode [ 3098.326201][T20955] device macsec0 left promiscuous mode [ 3098.362705][T20955] device veth1_macvtap entered promiscuous mode [ 3098.369827][T20955] device macsec0 entered promiscuous mode [ 3099.737570][T21022] ÿ: renamed from bond_slave_0 [ 3099.897550][T21024] device sit0 left promiscuous mode [ 3099.912660][T21024] device sit0 entered promiscuous mode [ 3101.269158][T21087] ÿÿÿÿÿÿÛ[haX›Ïè‡: renamed from vlan1 [ 3101.695173][T21101] device veth1_macvtap left promiscuous mode [ 3101.711570][T21101] device macsec0 left promiscuous mode [ 3101.763480][T21101] device veth1_macvtap entered promiscuous mode [ 3101.773490][T21101] device macsec0 entered promiscuous mode [ 3102.060655][T21118] device pim6reg1 entered promiscuous mode [ 3102.768914][T21143] device pim6reg1 entered promiscuous mode [ 3103.151431][T21157] device veth1_macvtap left promiscuous mode [ 3103.161228][T21157] device macsec0 left promiscuous mode [ 3103.195100][T21158] device veth1_macvtap entered promiscuous mode [ 3103.217819][T21158] device macsec0 entered promiscuous mode [ 3103.386355][T21164] device veth1_macvtap left promiscuous mode [ 3103.393010][T21164] device macsec0 left promiscuous mode [ 3103.443359][T21164] device veth1_macvtap entered promiscuous mode [ 3103.472260][T21164] device macsec0 entered promiscuous mode [ 3103.494469][T21167] device veth1_macvtap left promiscuous mode [ 3103.506833][T21167] device macsec0 left promiscuous mode [ 3103.550338][T21171] device veth1_macvtap left promiscuous mode [ 3103.567219][T21171] device macsec0 left promiscuous mode [ 3103.585532][T21167] device veth1_macvtap entered promiscuous mode [ 3103.596868][T21167] device macsec0 entered promiscuous mode [ 3103.625500][T21171] device veth1_macvtap entered promiscuous mode [ 3103.634196][T21171] device macsec0 entered promiscuous mode [ 3103.794771][T21179] device veth1_macvtap left promiscuous mode [ 3103.806130][T21179] device macsec0 left promiscuous mode [ 3103.860778][T21185] device veth1_macvtap entered promiscuous mode [ 3103.898346][T21185] device macsec0 entered promiscuous mode [ 3104.136057][T21194] device veth1_macvtap left promiscuous mode [ 3104.145257][T21194] device macsec0 left promiscuous mode [ 3104.185489][T21194] device veth1_macvtap entered promiscuous mode [ 3104.193137][T21194] device macsec0 entered promiscuous mode [ 3104.253335][T21199] ÿÿÿÿÿÿÛ[haX›Ïè‡: renamed from vlan1 [ 3104.469749][T21216] device veth1_macvtap left promiscuous mode [ 3104.506737][T21216] device macsec0 left promiscuous mode [ 3104.540703][T21217] device veth0_vlan left promiscuous mode [ 3104.554389][T21217] device veth0_vlan entered promiscuous mode [ 3104.599067][T29283] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 3104.614715][T29283] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 3104.622784][T29283] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿÛ[haX›Ïè‡: link becomes ready [ 3104.644110][T21216] device veth1_macvtap entered promiscuous mode [ 3104.652862][T21216] device macsec0 entered promiscuous mode [ 3104.893322][T21234] device veth1_macvtap left promiscuous mode [ 3104.913720][T21234] device macsec0 left promiscuous mode [ 3104.982009][T21240] device veth1_macvtap entered promiscuous mode [ 3104.992255][T21240] device macsec0 entered promiscuous mode [ 3105.829530][T21273] device veth1_macvtap left promiscuous mode [ 3105.836808][T21273] device macsec0 left promiscuous mode [ 3105.919369][T21277] device veth1_macvtap entered promiscuous mode [ 3105.942697][T21277] device macsec0 entered promiscuous mode [ 3106.174445][T21284] device wg2 left promiscuous mode [ 3106.569697][T21298] FAULT_INJECTION: forcing a failure. [ 3106.569697][T21298] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 3106.584489][T21298] CPU: 0 PID: 21298 Comm: syz.4.28569 Tainted: G W syzkaller #0 [ 3106.593435][T21298] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/14/2025 [ 3106.603859][T21298] Call Trace: [ 3106.607172][T21298] __dump_stack+0x21/0x24 [ 3106.611677][T21298] dump_stack_lvl+0x169/0x1d8 [ 3106.616367][T21298] ? show_regs_print_info+0x18/0x18 [ 3106.621754][T21298] dump_stack+0x15/0x1c [ 3106.626008][T21298] should_fail+0x3c1/0x510 [ 3106.630621][T21298] should_fail_usercopy+0x1a/0x20 [ 3106.635734][T21298] _copy_from_user+0x20/0xd0 [ 3106.640423][T21298] generic_map_update_batch+0x450/0x740 [ 3106.646076][T21298] ? bpf_enable_instrumentation+0x50/0x50 [ 3106.652241][T21298] ? __fdget+0x1a1/0x230 [ 3106.656702][T21298] ? bpf_enable_instrumentation+0x50/0x50 [ 3106.662620][T21298] bpf_map_do_batch+0x463/0x5f0 [ 3106.667473][T21298] __se_sys_bpf+0x55a/0x680 [ 3106.672063][T21298] ? __x64_sys_bpf+0x90/0x90 [ 3106.676833][T21298] ? debug_smp_processor_id+0x17/0x20 [ 3106.682473][T21298] ? fpregs_assert_state_consistent+0xb1/0xe0 [ 3106.688735][T21298] __x64_sys_bpf+0x7b/0x90 [ 3106.693140][T21298] do_syscall_64+0x31/0x40 [ 3106.697548][T21298] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 3106.703600][T21298] RIP: 0033:0x7fb5f8a4bbe9 [ 3106.708205][T21298] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 3106.728390][T21298] RSP: 002b:00007fb5f74b4038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 3106.737315][T21298] RAX: ffffffffffffffda RBX: 00007fb5f8c82fa0 RCX: 00007fb5f8a4bbe9 [ 3106.745440][T21298] RDX: 0000000000000038 RSI: 0000200000000340 RDI: 000000000000001a [ 3106.753769][T21298] RBP: 00007fb5f74b4090 R08: 0000000000000000 R09: 0000000000000000 [ 3106.761914][T21298] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 3106.770074][T21298] R13: 00007fb5f8c83038 R14: 00007fb5f8c82fa0 R15: 00007fffd8d0da08 [ 3107.228720][T21314] device veth1_macvtap left promiscuous mode [ 3107.250788][T21314] device macsec0 left promiscuous mode [ 3107.305386][T21323] device veth1_macvtap entered promiscuous mode [ 3107.329879][T21323] device macsec0 entered promiscuous mode [ 3108.144104][T21362] device veth1_macvtap left promiscuous mode [ 3108.169140][T21362] device macsec0 left promiscuous mode [ 3108.209147][T21371] device veth1_macvtap entered promiscuous mode [ 3108.217793][T21371] device macsec0 entered promiscuous mode [ 3108.863490][T21408] device veth1_macvtap left promiscuous mode [ 3108.892923][T21408] device macsec0 left promiscuous mode [ 3108.959393][T21413] device veth1_macvtap entered promiscuous mode [ 3109.012254][T21413] device macsec0 entered promiscuous mode [ 3111.725460][T21552] device veth1_macvtap left promiscuous mode [ 3111.739447][T21552] device macsec0 left promiscuous mode [ 3111.775280][T21552] device veth1_macvtap entered promiscuous mode [ 3111.783577][T21552] device macsec0 entered promiscuous mode [ 3112.460173][T21593] device veth1_macvtap left promiscuous mode [ 3112.477445][T21593] device macsec0 left promiscuous mode [ 3112.536699][T21593] device veth1_macvtap entered promiscuous mode [ 3112.544097][T21593] device macsec0 entered promiscuous mode [ 3113.254907][T21611] device veth1_macvtap left promiscuous mode [ 3113.286753][T21611] device macsec0 left promiscuous mode [ 3113.376130][T21619] device veth1_macvtap entered promiscuous mode [ 3113.398840][T21619] device macsec0 entered promiscuous mode [ 3113.739584][T21635] device veth1_macvtap left promiscuous mode [ 3113.775609][T21637] FAULT_INJECTION: forcing a failure. [ 3113.775609][T21637] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 3113.778054][T21635] device macsec0 left promiscuous mode [ 3113.897043][T21638] device veth1_macvtap entered promiscuous mode [ 3113.903559][T21637] CPU: 1 PID: 21637 Comm: syz.4.28692 Tainted: G W syzkaller #0 [ 3113.912757][T21637] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/14/2025 [ 3113.923008][T21637] Call Trace: [ 3113.926316][T21637] __dump_stack+0x21/0x24 [ 3113.930653][T21637] dump_stack_lvl+0x169/0x1d8 [ 3113.935625][T21637] ? show_regs_print_info+0x18/0x18 [ 3113.941008][T21637] dump_stack+0x15/0x1c [ 3113.945355][T21637] should_fail+0x3c1/0x510 [ 3113.949776][T21637] should_fail_alloc_page+0x4f/0x60 [ 3113.955107][T21637] __alloc_pages_nodemask+0x109/0x5f0 [ 3113.960612][T21637] ? gfp_pfmemalloc_allowed+0x130/0x130 [ 3113.966268][T21637] ? __vmalloc_node_range+0x29f/0x780 [ 3113.971645][T21637] __vmalloc_node_range+0x353/0x780 [ 3113.976923][T21637] bpf_map_area_alloc+0xd5/0xe0 [ 3113.981767][T21637] ? prealloc_init+0x147/0x810 [ 3113.986897][T21637] prealloc_init+0x147/0x810 [ 3113.991856][T21637] ? __kmalloc+0x1a7/0x330 [ 3113.996423][T21637] htab_map_alloc+0x688/0x970 [ 3114.001209][T21637] map_create+0x44e/0x2090 [ 3114.006219][T21637] __se_sys_bpf+0x203/0x680 [ 3114.011003][T21637] ? __x64_sys_bpf+0x90/0x90 [ 3114.015685][T21637] ? fpu__clear_all+0x20/0x20 [ 3114.020356][T21637] __x64_sys_bpf+0x7b/0x90 [ 3114.024766][T21637] do_syscall_64+0x31/0x40 [ 3114.029279][T21637] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 3114.035261][T21637] RIP: 0033:0x7fb5f8a4bbe9 [ 3114.040159][T21637] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 3114.061261][T21637] RSP: 002b:00007fb5f74b4038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 3114.070076][T21637] RAX: ffffffffffffffda RBX: 00007fb5f8c82fa0 RCX: 00007fb5f8a4bbe9 [ 3114.078046][T21637] RDX: 0000000000000050 RSI: 0000200000000840 RDI: 0000000000000000 [ 3114.086011][T21637] RBP: 00007fb5f74b4090 R08: 0000000000000000 R09: 0000000000000000 [ 3114.094173][T21637] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 3114.102240][T21637] R13: 00007fb5f8c83038 R14: 00007fb5f8c82fa0 R15: 00007fffd8d0da08 [ 3114.136856][T21638] device macsec0 entered promiscuous mode [ 3114.356439][T21647] device veth0_vlan left promiscuous mode [ 3114.377894][T21647] device veth0_vlan entered promiscuous mode [ 3114.403306][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 3114.432109][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 3114.459236][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ: link becomes ready [ 3114.568416][ T24] audit: type=1400 audit(1756816517.000:166): avc: denied { setattr } for pid=21654 comm="syz.1.28699" path="pipe:[337354]" dev="pipefs" ino=337354 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=fifo_file permissive=1 [ 3114.823768][T21666] device veth1_macvtap left promiscuous mode [ 3114.831456][T21666] device macsec0 left promiscuous mode [ 3114.890646][T21674] device veth1_macvtap entered promiscuous mode [ 3114.998878][T21674] device macsec0 entered promiscuous mode [ 3115.027201][ T2319] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 3115.103764][T21671] device pim6reg1 entered promiscuous mode [ 3115.966394][T21721] device veth1_macvtap left promiscuous mode [ 3115.981687][T21721] device macsec0 left promiscuous mode [ 3116.040485][T21728] device veth1_macvtap entered promiscuous mode [ 3116.059620][T21728] device macsec0 entered promiscuous mode [ 3116.269516][T21748] device veth1_macvtap left promiscuous mode [ 3116.284169][T21748] device macsec0 left promiscuous mode [ 3116.402232][T21751] device veth1_macvtap entered promiscuous mode [ 3116.426139][T21751] device macsec0 entered promiscuous mode [ 3116.793058][T21761] device syzkaller0 entered promiscuous mode [ 3118.297496][T21829] syz.4.28764[21829] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 3118.297587][T21829] syz.4.28764[21829] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 3118.363834][T21830] device sit0 entered promiscuous mode [ 3118.910711][T21858] syz.1.28775[21858] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 3118.910796][T21858] syz.1.28775[21858] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 3119.078989][T21869] device veth1_macvtap left promiscuous mode [ 3119.108117][T21869] device macsec0 left promiscuous mode [ 3119.142348][T21877] device veth1_macvtap entered promiscuous mode [ 3119.150166][T21877] device macsec0 entered promiscuous mode [ 3119.158767][T29283] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 3120.007272][T21911] device sit0 left promiscuous mode [ 3120.242013][T21912] device sit0 entered promiscuous mode [ 3120.363167][T21919] Ÿë: port 1(veth0_vlan) entered blocking state [ 3120.386682][T21919] Ÿë: port 1(veth0_vlan) entered disabled state [ 3120.740114][T21929] FAULT_INJECTION: forcing a failure. [ 3120.740114][T21929] name failslab, interval 1, probability 0, space 0, times 0 [ 3120.775907][T21929] CPU: 1 PID: 21929 Comm: syz.3.28802 Tainted: G W syzkaller #0 [ 3120.784874][T21929] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/14/2025 [ 3120.795023][T21929] Call Trace: [ 3120.798455][T21929] __dump_stack+0x21/0x24 [ 3120.802879][T21929] dump_stack_lvl+0x169/0x1d8 [ 3120.807562][T21929] ? thaw_kernel_threads+0x220/0x220 [ 3120.813016][T21929] ? show_regs_print_info+0x18/0x18 [ 3120.818298][T21929] dump_stack+0x15/0x1c [ 3120.822687][T21929] should_fail+0x3c1/0x510 [ 3120.827198][T21929] ? __get_vm_area_node+0x113/0x450 [ 3120.832406][T21929] __should_failslab+0xa4/0xe0 [ 3120.837261][T21929] should_failslab+0x9/0x20 [ 3120.842554][T21929] kmem_cache_alloc_trace+0x3a/0x2e0 [ 3120.847830][T21929] __get_vm_area_node+0x113/0x450 [ 3120.852849][T21929] __vmalloc_node_range+0xe0/0x780 [ 3120.857987][T21929] ? bpf_prog_alloc_no_stats+0x3b/0x250 [ 3120.863769][T21929] ? bpf_prog_alloc_no_stats+0x3b/0x250 [ 3120.869312][T21929] __vmalloc+0x79/0x90 [ 3120.873480][T21929] ? bpf_prog_alloc_no_stats+0x3b/0x250 [ 3120.879032][T21929] bpf_prog_alloc_no_stats+0x3b/0x250 [ 3120.884468][T21929] ? bpf_prog_alloc+0x17/0x1f0 [ 3120.889340][T21929] bpf_prog_alloc+0x21/0x1f0 [ 3120.893961][T21929] bpf_prog_load+0x71d/0x1420 [ 3120.898641][T21929] ? map_freeze+0x320/0x320 [ 3120.903170][T21929] ? irq_exit_rcu+0x9/0x10 [ 3120.907605][T21929] ? sysvec_apic_timer_interrupt+0xcb/0xe0 [ 3120.913503][T21929] ? selinux_bpf+0xc7/0xf0 [ 3120.917908][T21929] ? security_bpf+0x82/0xa0 [ 3120.922409][T21929] __se_sys_bpf+0x442/0x680 [ 3120.926899][T21929] ? __x64_sys_bpf+0x90/0x90 [ 3120.931566][T21929] ? __bpf_trace_sys_enter+0x62/0x70 [ 3120.936966][T21929] __x64_sys_bpf+0x7b/0x90 [ 3120.941457][T21929] do_syscall_64+0x31/0x40 [ 3120.945869][T21929] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 3120.951755][T21929] RIP: 0033:0x7ff54a8c0be9 [ 3120.956165][T21929] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 3120.975938][T21929] RSP: 002b:00007ff549329038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 3120.984629][T21929] RAX: ffffffffffffffda RBX: 00007ff54aaf7fa0 RCX: 00007ff54a8c0be9 [ 3120.992679][T21929] RDX: 0000000000000033 RSI: 00002000000000c0 RDI: 0000000000000005 [ 3121.000752][T21929] RBP: 00007ff549329090 R08: 0000000000000000 R09: 0000000000000000 [ 3121.008810][T21929] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 3121.017095][T21929] R13: 00007ff54aaf8038 R14: 00007ff54aaf7fa0 R15: 00007fffe2ff9b18 [ 3121.060505][T21929] syz.3.28802: vmalloc: allocation failure: 4096 bytes, mode:0x100dc0(GFP_USER|__GFP_ZERO), nodemask=(null),cpuset=syz3,mems_allowed=0 [ 3121.076737][T21929] CPU: 1 PID: 21929 Comm: syz.3.28802 Tainted: G W syzkaller #0 [ 3121.085864][T21929] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/14/2025 [ 3121.096112][T21929] Call Trace: [ 3121.099501][T21929] __dump_stack+0x21/0x24 [ 3121.103926][T21929] dump_stack_lvl+0x169/0x1d8 [ 3121.108618][T21929] ? show_regs_print_info+0x18/0x18 [ 3121.113911][T21929] ? pr_cont_kernfs_name+0xe3/0xf0 [ 3121.119043][T21929] dump_stack+0x15/0x1c [ 3121.123293][T21929] warn_alloc+0x1b0/0x1d0 [ 3121.127629][T21929] ? __get_vm_area_node+0x113/0x450 [ 3121.132837][T21929] ? zone_watermark_ok_safe+0x250/0x250 [ 3121.138479][T21929] ? __get_vm_area_node+0x345/0x450 [ 3121.143881][T21929] __vmalloc_node_range+0x27d/0x780 [ 3121.149373][T21929] ? bpf_prog_alloc_no_stats+0x3b/0x250 [ 3121.155109][T21929] __vmalloc+0x79/0x90 [ 3121.159279][T21929] ? bpf_prog_alloc_no_stats+0x3b/0x250 [ 3121.164832][T21929] bpf_prog_alloc_no_stats+0x3b/0x250 [ 3121.170744][T21929] ? bpf_prog_alloc+0x17/0x1f0 [ 3121.175629][T21929] bpf_prog_alloc+0x21/0x1f0 [ 3121.180242][T21929] bpf_prog_load+0x71d/0x1420 [ 3121.185578][T21929] ? map_freeze+0x320/0x320 [ 3121.190619][T21929] ? irq_exit_rcu+0x9/0x10 [ 3121.195225][T21929] ? sysvec_apic_timer_interrupt+0xcb/0xe0 [ 3121.201245][T21929] ? selinux_bpf+0xc7/0xf0 [ 3121.205672][T21929] ? security_bpf+0x82/0xa0 [ 3121.210182][T21929] __se_sys_bpf+0x442/0x680 [ 3121.214695][T21929] ? __x64_sys_bpf+0x90/0x90 [ 3121.219484][T21929] ? __bpf_trace_sys_enter+0x62/0x70 [ 3121.224885][T21929] __x64_sys_bpf+0x7b/0x90 [ 3121.229311][T21929] do_syscall_64+0x31/0x40 [ 3121.233751][T21929] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 3121.239647][T21929] RIP: 0033:0x7ff54a8c0be9 [ 3121.244073][T21929] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 3121.264396][T21929] RSP: 002b:00007ff549329038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 3121.273390][T21929] RAX: ffffffffffffffda RBX: 00007ff54aaf7fa0 RCX: 00007ff54a8c0be9 [ 3121.281472][T21929] RDX: 0000000000000033 RSI: 00002000000000c0 RDI: 0000000000000005 [ 3121.289556][T21929] RBP: 00007ff549329090 R08: 0000000000000000 R09: 0000000000000000 [ 3121.297625][T21929] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 3121.305615][T21929] R13: 00007ff54aaf8038 R14: 00007ff54aaf7fa0 R15: 00007fffe2ff9b18 [ 3121.359617][T21929] Mem-Info: [ 3121.363216][T21929] active_anon:42 inactive_anon:22988 isolated_anon:0 [ 3121.363216][T21929] active_file:28007 inactive_file:6485 isolated_file:0 [ 3121.363216][T21929] unevictable:0 dirty:219 writeback:0 [ 3121.363216][T21929] slab_reclaimable:7757 slab_unreclaimable:72899 [ 3121.363216][T21929] mapped:30846 shmem:161 pagetables:681 bounce:0 [ 3121.363216][T21929] free:1541994 free_pcp:1214 free_cma:0 [ 3121.402312][T21929] Node 0 active_anon:168kB inactive_anon:91952kB active_file:112028kB inactive_file:25940kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:123384kB dirty:876kB writeback:0kB shmem:644kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 0kB writeback_tmp:0kB kernel_stack:5216kB all_unreclaimable? no [ 3121.433857][T21929] DMA32 free:2985936kB min:62668kB low:78332kB high:93996kB reserved_highatomic:0KB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:3145324kB managed:2988784kB mlocked:0kB pagetables:0kB bounce:0kB free_pcp:2848kB local_pcp:1460kB free_cma:0kB [ 3121.463474][T21929] lowmem_reserve[]: 0 3941 3941 [ 3121.469123][T21929] Normal free:3181864kB min:84784kB low:105980kB high:127176kB reserved_highatomic:0KB active_anon:168kB inactive_anon:92092kB active_file:112036kB inactive_file:25940kB unevictable:0kB writepending:880kB present:5242880kB managed:4036368kB mlocked:0kB pagetables:2764kB bounce:0kB free_pcp:1940kB local_pcp:1120kB free_cma:0kB [ 3121.500427][T21929] lowmem_reserve[]: 0 0 0 [ 3121.509542][T21929] DMA32: 6*4kB (UM) 5*8kB (M) 5*16kB (M) 8*32kB (UM) 9*64kB (UM) 6*128kB (UM) 7*256kB (UM) 5*512kB (M) 4*1024kB (UM) 3*2048kB (UM) 725*4096kB (M) = 2985936kB [ 3121.526177][T21929] Normal: 960*4kB (UME) 582*8kB (UME) 754*16kB (UME) 342*32kB (UME) 663*64kB (UME) 283*128kB (UME) 105*256kB (UME) 19*512kB (UM) 17*1024kB (UM) 4*2048kB (UM) 735*4096kB (UM) = 3182928kB [ 3121.545232][T21929] 34655 total pagecache pages [ 3121.550620][T21929] 0 pages in swap cache [ 3121.554815][T21929] Swap cache stats: add 0, delete 0, find 0/0 [ 3121.566701][T21929] Free swap = 124996kB [ 3121.570954][T21929] Total swap = 124996kB [ 3121.575214][T21929] 2097051 pages RAM [ 3121.602797][T21929] 0 pages HighMem/MovableOnly [ 3121.615322][T21929] 340763 pages reserved [ 3121.625554][T21929] 0 pages cma reserved [ 3121.843151][T21960] device pim6reg1 entered promiscuous mode [ 3122.690033][T22007] device pim6reg1 entered promiscuous mode [ 3122.716664][T22007] FAULT_INJECTION: forcing a failure. [ 3122.716664][T22007] name failslab, interval 1, probability 0, space 0, times 0 [ 3122.730044][T22007] CPU: 0 PID: 22007 Comm: syz.4.28833 Tainted: G W syzkaller #0 [ 3122.739680][T22007] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/14/2025 [ 3122.749976][T22007] Call Trace: [ 3122.753520][T22007] __dump_stack+0x21/0x24 [ 3122.757872][T22007] dump_stack_lvl+0x169/0x1d8 [ 3122.762718][T22007] ? thaw_kernel_threads+0x220/0x220 [ 3122.768382][T22007] ? wake_up_klogd+0xbe/0xf0 [ 3122.773095][T22007] ? show_regs_print_info+0x18/0x18 [ 3122.778405][T22007] ? vprintk_emit+0x26a/0x320 [ 3122.783275][T22007] ? __kmalloc+0x1a7/0x330 [ 3122.787893][T22007] dump_stack+0x15/0x1c [ 3122.792157][T22007] should_fail+0x3c1/0x510 [ 3122.796591][T22007] ? __alloc_skb+0x9e/0x520 [ 3122.801109][T22007] __should_failslab+0xa4/0xe0 [ 3122.805878][T22007] should_failslab+0x9/0x20 [ 3122.810651][T22007] kmem_cache_alloc+0x3d/0x2e0 [ 3122.815421][T22007] __alloc_skb+0x9e/0x520 [ 3122.819761][T22007] rtmsg_ifinfo_build_skb+0x7c/0x180 [ 3122.825065][T22007] rtmsg_ifinfo+0x7a/0x130 [ 3122.829675][T22007] __dev_notify_flags+0xdb/0x500 [ 3122.835187][T22007] ? __dev_change_flags+0x6a0/0x6a0 [ 3122.840429][T22007] ? __dev_change_flags+0x513/0x6a0 [ 3122.845684][T22007] ? dev_get_flags+0x1e0/0x1e0 [ 3122.850522][T22007] ? __ww_mutex_lock_interruptible_slowpath+0x20/0x20 [ 3122.857900][T22007] dev_change_flags+0xe8/0x1a0 [ 3122.862948][T22007] dev_ifsioc+0x113/0xa50 [ 3122.867356][T22007] ? dev_ioctl+0xb80/0xb80 [ 3122.871783][T22007] dev_ioctl+0x550/0xb80 [ 3122.876035][T22007] sock_do_ioctl+0x235/0x330 [ 3122.880630][T22007] ? __kasan_slab_free+0x11/0x20 [ 3122.885753][T22007] ? sock_show_fdinfo+0xa0/0xa0 [ 3122.890624][T22007] ? selinux_file_ioctl+0x377/0x480 [ 3122.895829][T22007] ? mutex_trylock+0xa0/0xa0 [ 3122.900419][T22007] ? __fget_files+0x2c4/0x320 [ 3122.905102][T22007] sock_ioctl+0x504/0x710 [ 3122.909435][T22007] ? sock_poll+0x360/0x360 [ 3122.914033][T22007] ? __fget_files+0x2c4/0x320 [ 3122.918722][T22007] ? security_file_ioctl+0x84/0xa0 [ 3122.923838][T22007] ? sock_poll+0x360/0x360 [ 3122.928257][T22007] __se_sys_ioctl+0x121/0x1a0 [ 3122.932946][T22007] __x64_sys_ioctl+0x7b/0x90 [ 3122.937538][T22007] do_syscall_64+0x31/0x40 [ 3122.941958][T22007] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 3122.947863][T22007] RIP: 0033:0x7fb5f8a4bbe9 [ 3122.952461][T22007] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 3122.972273][T22007] RSP: 002b:00007fb5f74b4038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 3122.980844][T22007] RAX: ffffffffffffffda RBX: 00007fb5f8c82fa0 RCX: 00007fb5f8a4bbe9 [ 3122.988922][T22007] RDX: 0000200000000100 RSI: 0000000000008914 RDI: 0000000000000008 [ 3122.997107][T22007] RBP: 00007fb5f74b4090 R08: 0000000000000000 R09: 0000000000000000 [ 3123.005271][T22007] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 3123.013328][T22007] R13: 00007fb5f8c83038 R14: 00007fb5f8c82fa0 R15: 00007fffd8d0da08 [ 3123.634419][T22032] device syzkaller0 entered promiscuous mode [ 3124.198050][ T24] audit: type=1400 audit(1756816526.630:167): avc: denied { create } for pid=22050 comm="syz.1.28849" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=isdn_socket permissive=1 [ 3124.292271][ T24] audit: type=1400 audit(1756816526.660:168): avc: denied { create } for pid=22050 comm="syz.1.28849" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=isdn_socket permissive=1 [ 3124.317314][T22059] FAULT_INJECTION: forcing a failure. [ 3124.317314][T22059] name failslab, interval 1, probability 0, space 0, times 0 [ 3124.388445][T22059] CPU: 1 PID: 22059 Comm: syz.3.28851 Tainted: G W syzkaller #0 [ 3124.397414][T22059] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/14/2025 [ 3124.407476][T22059] Call Trace: [ 3124.410774][T22059] __dump_stack+0x21/0x24 [ 3124.415216][T22059] dump_stack_lvl+0x169/0x1d8 [ 3124.420008][T22059] ? show_regs_print_info+0x18/0x18 [ 3124.425615][T22059] dump_stack+0x15/0x1c [ 3124.429973][T22059] should_fail+0x3c1/0x510 [ 3124.434389][T22059] ? tipc_msg_build+0xd0/0xc90 [ 3124.439153][T22059] __should_failslab+0xa4/0xe0 [ 3124.444209][T22059] should_failslab+0x9/0x20 [ 3124.448704][T22059] __kmalloc_track_caller+0x5f/0x320 [ 3124.454111][T22059] ? kmem_cache_alloc+0x165/0x2e0 [ 3124.459148][T22059] ? proc_pident_lookup+0x1c0/0x270 [ 3124.464342][T22059] ? __alloc_skb+0x9e/0x520 [ 3124.468847][T22059] ? tipc_msg_build+0xd0/0xc90 [ 3124.473608][T22059] __alloc_skb+0xdc/0x520 [ 3124.477928][T22059] tipc_msg_build+0xd0/0xc90 [ 3124.482523][T22059] ? _raw_spin_lock_bh+0x8e/0xe0 [ 3124.487546][T22059] ? _raw_spin_lock_irq+0xe0/0xe0 [ 3124.492650][T22059] ? __local_bh_enable_ip+0x53/0x80 [ 3124.497879][T22059] ? tipc_nametbl_lookup_dst_nodes+0x375/0x7c0 [ 3124.504070][T22059] __tipc_sendmsg+0x1a14/0x2be0 [ 3124.509020][T22059] ? tipc_sk_publish+0x3f0/0x3f0 [ 3124.513947][T22059] ? avc_has_perm+0x234/0x360 [ 3124.518715][T22059] ? wait_woken+0x180/0x180 [ 3124.523212][T22059] ? __kasan_check_write+0x14/0x20 [ 3124.528460][T22059] ? _raw_spin_lock_bh+0x8e/0xe0 [ 3124.534020][T22059] ? _raw_spin_lock_irq+0xe0/0xe0 [ 3124.539591][T22059] ? __local_bh_enable_ip+0x53/0x80 [ 3124.544903][T22059] ? local_bh_enable+0x1f/0x30 [ 3124.549762][T22059] ? lock_sock_nested+0x1f5/0x290 [ 3124.555000][T22059] ? sock_init_data+0xc0/0xc0 [ 3124.560092][T22059] tipc_sendmsg+0x55/0x70 [ 3124.565411][T22059] ? tipc_recvmsg+0x13a0/0x13a0 [ 3124.570700][T22059] ____sys_sendmsg+0x5a2/0x8c0 [ 3124.576359][T22059] ? __sys_sendmsg_sock+0x40/0x40 [ 3124.581648][T22059] ? import_iovec+0x7c/0xb0 [ 3124.586387][T22059] ___sys_sendmsg+0x1f0/0x260 [ 3124.591169][T22059] ? __sys_sendmsg+0x250/0x250 [ 3124.596026][T22059] ? __fdget+0x1a1/0x230 [ 3124.600267][T22059] __x64_sys_sendmsg+0x1e2/0x2a0 [ 3124.605194][T22059] ? ___sys_sendmsg+0x260/0x260 [ 3124.610059][T22059] ? syscall_trace_enter+0x108/0x170 [ 3124.615371][T22059] do_syscall_64+0x31/0x40 [ 3124.619787][T22059] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 3124.625853][T22059] RIP: 0033:0x7ff54a8c0be9 [ 3124.630531][T22059] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 3124.650475][T22059] RSP: 002b:00007ff549329038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 3124.661337][T22059] RAX: ffffffffffffffda RBX: 00007ff54aaf7fa0 RCX: 00007ff54a8c0be9 [ 3124.669485][T22059] RDX: 0000000000000000 RSI: 0000200000004440 RDI: 0000000000000007 [ 3124.677539][T22059] RBP: 00007ff549329090 R08: 0000000000000000 R09: 0000000000000000 [ 3124.685936][T22059] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 3124.693990][T22059] R13: 00007ff54aaf8038 R14: 00007ff54aaf7fa0 R15: 00007fffe2ff9b18 [ 3125.091714][T22075] device pim6reg1 entered promiscuous mode [ 3125.428186][T22087] device veth1_macvtap left promiscuous mode [ 3125.455620][T22087] device macsec0 left promiscuous mode [ 3125.511451][T22093] device veth1_macvtap entered promiscuous mode [ 3125.536200][T22093] device macsec0 entered promiscuous mode [ 3126.707492][T22137] device pim6reg1 entered promiscuous mode [ 3126.723600][T22138] device pim6reg1 entered promiscuous mode [ 3127.300821][T22174] device veth1_macvtap left promiscuous mode [ 3127.348325][T22177] device pim6reg1 entered promiscuous mode [ 3127.608641][T22188] device pim6reg1 entered promiscuous mode [ 3127.616357][T22188] FAULT_INJECTION: forcing a failure. [ 3127.616357][T22188] name failslab, interval 1, probability 0, space 0, times 0 [ 3127.632202][T22188] CPU: 0 PID: 22188 Comm: syz.0.28897 Tainted: G W syzkaller #0 [ 3127.641465][T22188] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/14/2025 [ 3127.652435][T22188] Call Trace: [ 3127.656058][T22188] __dump_stack+0x21/0x24 [ 3127.660585][T22188] dump_stack_lvl+0x169/0x1d8 [ 3127.665546][T22188] ? thaw_kernel_threads+0x220/0x220 [ 3127.670971][T22188] ? wake_up_klogd+0xbe/0xf0 [ 3127.675610][T22188] ? show_regs_print_info+0x18/0x18 [ 3127.680814][T22188] ? vprintk_emit+0x26a/0x320 [ 3127.685502][T22188] ? __kmalloc+0x1a7/0x330 [ 3127.690094][T22188] dump_stack+0x15/0x1c [ 3127.694432][T22188] should_fail+0x3c1/0x510 [ 3127.698879][T22188] ? __alloc_skb+0x9e/0x520 [ 3127.703383][T22188] __should_failslab+0xa4/0xe0 [ 3127.708268][T22188] should_failslab+0x9/0x20 [ 3127.712958][T22188] kmem_cache_alloc+0x3d/0x2e0 [ 3127.718219][T22188] __alloc_skb+0x9e/0x520 [ 3127.722652][T22188] rtmsg_ifinfo_build_skb+0x7c/0x180 [ 3127.727956][T22188] rtmsg_ifinfo+0x7a/0x130 [ 3127.732473][T22188] __dev_notify_flags+0xdb/0x500 [ 3127.737415][T22188] ? __dev_change_flags+0x6a0/0x6a0 [ 3127.742720][T22188] ? __dev_change_flags+0x513/0x6a0 [ 3127.747948][T22188] ? dev_get_flags+0x1e0/0x1e0 [ 3127.752816][T22188] ? __ww_mutex_lock_interruptible_slowpath+0x20/0x20 [ 3127.759587][T22188] dev_change_flags+0xe8/0x1a0 [ 3127.764454][T22188] dev_ifsioc+0x113/0xa50 [ 3127.769057][T22188] ? dev_ioctl+0xb80/0xb80 [ 3127.773878][T22188] dev_ioctl+0x550/0xb80 [ 3127.778699][T22188] sock_do_ioctl+0x235/0x330 [ 3127.783315][T22188] ? sock_show_fdinfo+0xa0/0xa0 [ 3127.788278][T22188] ? selinux_file_ioctl+0x377/0x480 [ 3127.793674][T22188] ? mutex_trylock+0xa0/0xa0 [ 3127.798281][T22188] ? __fget_files+0x2c4/0x320 [ 3127.802974][T22188] sock_ioctl+0x504/0x710 [ 3127.807572][T22188] ? sock_poll+0x360/0x360 [ 3127.812091][T22188] ? __fget_files+0x2c4/0x320 [ 3127.816949][T22188] ? security_file_ioctl+0x84/0xa0 [ 3127.822078][T22188] ? sock_poll+0x360/0x360 [ 3127.826515][T22188] __se_sys_ioctl+0x121/0x1a0 [ 3127.831406][T22188] __x64_sys_ioctl+0x7b/0x90 [ 3127.836003][T22188] do_syscall_64+0x31/0x40 [ 3127.840771][T22188] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 3127.846695][T22188] RIP: 0033:0x7f4a73318be9 [ 3127.851362][T22188] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 3127.871173][T22188] RSP: 002b:00007f4a71d81038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 3127.879681][T22188] RAX: ffffffffffffffda RBX: 00007f4a7354ffa0 RCX: 00007f4a73318be9 [ 3127.887650][T22188] RDX: 0000200000000100 RSI: 0000000000008914 RDI: 0000000000000008 [ 3127.896198][T22188] RBP: 00007f4a71d81090 R08: 0000000000000000 R09: 0000000000000000 [ 3127.904180][T22188] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 3127.912230][T22188] R13: 00007f4a73550038 R14: 00007f4a7354ffa0 R15: 00007ffc8d285898 [ 3127.938512][T22196] FAULT_INJECTION: forcing a failure. [ 3127.938512][T22196] name failslab, interval 1, probability 0, space 0, times 0 [ 3127.997562][T22196] CPU: 1 PID: 22196 Comm: syz.4.28899 Tainted: G W syzkaller #0 [ 3128.006626][T22196] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/14/2025 [ 3128.016775][T22196] Call Trace: [ 3128.020077][T22196] __dump_stack+0x21/0x24 [ 3128.024481][T22196] dump_stack_lvl+0x169/0x1d8 [ 3128.029157][T22196] ? show_regs_print_info+0x18/0x18 [ 3128.034347][T22196] dump_stack+0x15/0x1c [ 3128.038532][T22196] should_fail+0x3c1/0x510 [ 3128.043032][T22196] ? __get_vm_area_node+0x113/0x450 [ 3128.048230][T22196] __should_failslab+0xa4/0xe0 [ 3128.053084][T22196] should_failslab+0x9/0x20 [ 3128.057577][T22196] kmem_cache_alloc_trace+0x3a/0x2e0 [ 3128.063130][T22196] __get_vm_area_node+0x113/0x450 [ 3128.068242][T22196] __vmalloc_node_range+0xe0/0x780 [ 3128.073525][T22196] ? sock_hash_alloc+0x36c/0x620 [ 3128.078546][T22196] ? entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 3128.084613][T22196] ? bpf_map_init_from_attr+0x13b/0x350 [ 3128.090148][T22196] bpf_map_area_alloc+0xd5/0xe0 [ 3128.095067][T22196] ? sock_hash_alloc+0x36c/0x620 [ 3128.100082][T22196] sock_hash_alloc+0x36c/0x620 [ 3128.104864][T22196] map_create+0x44e/0x2090 [ 3128.109368][T22196] __se_sys_bpf+0x203/0x680 [ 3128.113856][T22196] ? __x64_sys_bpf+0x90/0x90 [ 3128.118528][T22196] __x64_sys_bpf+0x7b/0x90 [ 3128.122932][T22196] do_syscall_64+0x31/0x40 [ 3128.127337][T22196] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 3128.133492][T22196] RIP: 0033:0x7fb5f8a4bbe9 [ 3128.137987][T22196] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 3128.158632][T22196] RSP: 002b:00007fb5f74b4038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 3128.167735][T22196] RAX: ffffffffffffffda RBX: 00007fb5f8c82fa0 RCX: 00007fb5f8a4bbe9 [ 3128.175710][T22196] RDX: 0000000000000050 RSI: 0000200000000180 RDI: 0000000000000000 [ 3128.184487][T22196] RBP: 00007fb5f74b4090 R08: 0000000000000000 R09: 0000000000000000 [ 3128.192652][T22196] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 3128.200897][T22196] R13: 00007fb5f8c83038 R14: 00007fb5f8c82fa0 R15: 00007fffd8d0da08 [ 3128.600808][T22218] device pim6reg1 entered promiscuous mode [ 3128.860230][T22233] FAULT_INJECTION: forcing a failure. [ 3128.860230][T22233] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 3129.010321][T22233] CPU: 0 PID: 22233 Comm: syz.2.28912 Tainted: G W syzkaller #0 [ 3129.019567][T22233] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/14/2025 [ 3129.029727][T22233] Call Trace: [ 3129.033028][T22233] __dump_stack+0x21/0x24 [ 3129.037364][T22233] dump_stack_lvl+0x169/0x1d8 [ 3129.042322][T22233] ? thaw_kernel_threads+0x220/0x220 [ 3129.047703][T22233] ? vsnprintf+0x1871/0x1960 [ 3129.052297][T22233] ? show_regs_print_info+0x18/0x18 [ 3129.057726][T22233] dump_stack+0x15/0x1c [ 3129.062148][T22233] should_fail+0x3c1/0x510 [ 3129.066918][T22233] should_fail_usercopy+0x1a/0x20 [ 3129.072079][T22233] _copy_to_user+0x20/0x90 [ 3129.076509][T22233] simple_read_from_buffer+0xe9/0x160 [ 3129.081885][T22233] proc_fail_nth_read+0x19a/0x210 [ 3129.086918][T22233] ? proc_fault_inject_write+0x2f0/0x2f0 [ 3129.092653][T22233] ? rw_verify_area+0x1c0/0x360 [ 3129.097507][T22233] ? proc_fault_inject_write+0x2f0/0x2f0 [ 3129.103142][T22233] vfs_read+0x1fe/0xa10 [ 3129.107597][T22233] ? kernel_read+0x70/0x70 [ 3129.112019][T22233] ? security_file_free+0xc7/0xe0 [ 3129.117283][T22233] ? __kasan_check_write+0x14/0x20 [ 3129.122511][T22233] ? mutex_lock+0x8c/0xe0 [ 3129.126931][T22233] ? mutex_trylock+0xa0/0xa0 [ 3129.131689][T22233] ? __fget_files+0x2c4/0x320 [ 3129.136365][T22233] ? __fdget_pos+0x2d2/0x380 [ 3129.140950][T22233] ? ksys_read+0x71/0x240 [ 3129.145299][T22233] ksys_read+0x140/0x240 [ 3129.149711][T22233] ? vfs_write+0xd60/0xd60 [ 3129.154229][T22233] ? ____fput+0x15/0x20 [ 3129.158410][T22233] __x64_sys_read+0x7b/0x90 [ 3129.163213][T22233] do_syscall_64+0x31/0x40 [ 3129.167737][T22233] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 3129.173712][T22233] RIP: 0033:0x7f8cd2ee35fc [ 3129.178127][T22233] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 93 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 ef 93 02 00 48 [ 3129.197942][T22233] RSP: 002b:00007f8cd194d030 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 3129.206439][T22233] RAX: ffffffffffffffda RBX: 00007f8cd311bfa0 RCX: 00007f8cd2ee35fc [ 3129.214415][T22233] RDX: 000000000000000f RSI: 00007f8cd194d0a0 RDI: 0000000000000007 [ 3129.222394][T22233] RBP: 00007f8cd194d090 R08: 0000000000000000 R09: 0000000000000000 [ 3129.230447][T22233] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 3129.238414][T22233] R13: 00007f8cd311c038 R14: 00007f8cd311bfa0 R15: 00007ffccc12ce08 [ 3129.283045][T22239] ÿÿÿÿÿÿÛ[haX›Ïè‡: renamed from vlan1 [ 3129.663778][T22252] device pim6reg1 entered promiscuous mode [ 3130.338376][T22288] FAULT_INJECTION: forcing a failure. [ 3130.338376][T22288] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 3130.416706][T22288] CPU: 1 PID: 22288 Comm: syz.2.28933 Tainted: G W syzkaller #0 [ 3130.425949][T22288] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/14/2025 [ 3130.436097][T22288] Call Trace: [ 3130.439383][T22288] __dump_stack+0x21/0x24 [ 3130.443876][T22288] dump_stack_lvl+0x169/0x1d8 [ 3130.448628][T22288] ? thaw_kernel_threads+0x220/0x220 [ 3130.453902][T22288] ? vsnprintf+0x1871/0x1960 [ 3130.458519][T22288] ? show_regs_print_info+0x18/0x18 [ 3130.463884][T22288] dump_stack+0x15/0x1c [ 3130.468211][T22288] should_fail+0x3c1/0x510 [ 3130.472804][T22288] should_fail_usercopy+0x1a/0x20 [ 3130.477907][T22288] _copy_to_user+0x20/0x90 [ 3130.482321][T22288] simple_read_from_buffer+0xe9/0x160 [ 3130.487771][T22288] proc_fail_nth_read+0x19a/0x210 [ 3130.492784][T22288] ? proc_fault_inject_write+0x2f0/0x2f0 [ 3130.498507][T22288] ? rw_verify_area+0x1c0/0x360 [ 3130.503443][T22288] ? proc_fault_inject_write+0x2f0/0x2f0 [ 3130.509060][T22288] vfs_read+0x1fe/0xa10 [ 3130.513206][T22288] ? kernel_read+0x70/0x70 [ 3130.517709][T22288] ? security_file_free+0xc7/0xe0 [ 3130.522817][T22288] ? __kasan_check_write+0x14/0x20 [ 3130.527919][T22288] ? mutex_lock+0x8c/0xe0 [ 3130.532409][T22288] ? mutex_trylock+0xa0/0xa0 [ 3130.536997][T22288] ? __fget_files+0x2c4/0x320 [ 3130.541751][T22288] ? __fdget_pos+0x2d2/0x380 [ 3130.546506][T22288] ? ksys_read+0x71/0x240 [ 3130.551010][T22288] ksys_read+0x140/0x240 [ 3130.555419][T22288] ? vfs_write+0xd60/0xd60 [ 3130.559925][T22288] ? ____fput+0x15/0x20 [ 3130.564080][T22288] __x64_sys_read+0x7b/0x90 [ 3130.569245][T22288] do_syscall_64+0x31/0x40 [ 3130.573750][T22288] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 3130.579650][T22288] RIP: 0033:0x7f8cd2ee35fc [ 3130.584143][T22288] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 93 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 ef 93 02 00 48 [ 3130.604105][T22288] RSP: 002b:00007f8cd194d030 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 3130.612524][T22288] RAX: ffffffffffffffda RBX: 00007f8cd311bfa0 RCX: 00007f8cd2ee35fc [ 3130.620775][T22288] RDX: 000000000000000f RSI: 00007f8cd194d0a0 RDI: 0000000000000008 [ 3130.628837][T22288] RBP: 00007f8cd194d090 R08: 0000000000000000 R09: 0000000000000000 [ 3130.637120][T22288] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 3130.645180][T22288] R13: 00007f8cd311c038 R14: 00007f8cd311bfa0 R15: 00007ffccc12ce08 [ 3130.732235][T22293] device veth1_macvtap left promiscuous mode [ 3130.751324][T22293] device macsec0 left promiscuous mode [ 3130.797806][T22293] device veth1_macvtap entered promiscuous mode [ 3130.804904][T22293] device macsec0 entered promiscuous mode [ 3131.203591][T22317] device veth1_macvtap left promiscuous mode [ 3131.215618][T22317] device macsec0 left promiscuous mode [ 3131.277819][T22317] device veth1_macvtap entered promiscuous mode [ 3131.284620][T22317] device macsec0 entered promiscuous mode [ 3131.493234][T22338] FAULT_INJECTION: forcing a failure. [ 3131.493234][T22338] name failslab, interval 1, probability 0, space 0, times 0 [ 3131.535110][T22338] CPU: 1 PID: 22338 Comm: syz.0.28953 Tainted: G W syzkaller #0 [ 3131.544081][T22338] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/14/2025 [ 3131.554323][T22338] Call Trace: [ 3131.557712][T22338] __dump_stack+0x21/0x24 [ 3131.562286][T22338] dump_stack_lvl+0x169/0x1d8 [ 3131.566974][T22338] ? thaw_kernel_threads+0x220/0x220 [ 3131.572362][T22338] ? selinux_tun_dev_alloc_security+0x51/0x140 [ 3131.578528][T22338] ? show_regs_print_info+0x18/0x18 [ 3131.583902][T22338] ? __kasan_kmalloc+0xec/0x110 [ 3131.588754][T22338] ? kmem_cache_alloc_trace+0x184/0x2e0 [ 3131.594383][T22338] ? selinux_tun_dev_alloc_security+0x51/0x140 [ 3131.601454][T22338] ? security_tun_dev_alloc_security+0x62/0x90 [ 3131.607620][T22338] ? register_netdevice+0x351/0x13c0 [ 3131.613280][T22338] dump_stack+0x15/0x1c [ 3131.617448][T22338] should_fail+0x3c1/0x510 [ 3131.621868][T22338] ? kvmalloc_node+0x88/0x130 [ 3131.626567][T22338] __should_failslab+0xa4/0xe0 [ 3131.631431][T22338] should_failslab+0x9/0x20 [ 3131.635973][T22338] __kmalloc+0x60/0x330 [ 3131.640131][T22338] ? _raw_spin_lock+0xe0/0xe0 [ 3131.644815][T22338] ? sched_clock+0x3a/0x40 [ 3131.649360][T22338] kvmalloc_node+0x88/0x130 [ 3131.653963][T22338] tun_attach+0x8ae/0x1520 [ 3131.658414][T22338] ? __kasan_check_write+0x14/0x20 [ 3131.663526][T22338] ? enqueue_timer+0x1b6/0x480 [ 3131.668521][T22338] tun_net_init+0x45b/0x580 [ 3131.673109][T22338] register_netdevice+0x351/0x13c0 [ 3131.678315][T22338] ? asm_sysvec_apic_timer_interrupt+0x12/0x20 [ 3131.684491][T22338] ? memset+0x35/0x40 [ 3131.688494][T22338] ? xdp_rxq_info_reg+0xec/0x2e0 [ 3131.693545][T22338] ? netif_stacked_transfer_operstate+0x220/0x220 [ 3131.699964][T22338] ? alloc_netdev_mqs+0x9c9/0xc80 [ 3131.705035][T22338] tun_set_iff+0x812/0xe00 [ 3131.709583][T22338] __tun_chr_ioctl+0x795/0x1cd0 [ 3131.714534][T22338] ? tun_flow_create+0x320/0x320 [ 3131.719472][T22338] ? sched_clock_cpu+0x1b/0x3d0 [ 3131.724412][T22338] ? __fget_files+0x2c4/0x320 [ 3131.729441][T22338] tun_chr_ioctl+0x2a/0x40 [ 3131.733858][T22338] ? tun_chr_poll+0x6b0/0x6b0 [ 3131.738537][T22338] __se_sys_ioctl+0x121/0x1a0 [ 3131.743228][T22338] __x64_sys_ioctl+0x7b/0x90 [ 3131.748214][T22338] do_syscall_64+0x31/0x40 [ 3131.752646][T22338] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 3131.758723][T22338] RIP: 0033:0x7f4a73318be9 [ 3131.763246][T22338] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 3131.782994][T22338] RSP: 002b:00007f4a71d81038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 3131.791706][T22338] RAX: ffffffffffffffda RBX: 00007f4a7354ffa0 RCX: 00007f4a73318be9 [ 3131.799760][T22338] RDX: 0000200000000040 RSI: 00000000400454ca RDI: 0000000000000007 [ 3131.808039][T22338] RBP: 00007f4a71d81090 R08: 0000000000000000 R09: 0000000000000000 [ 3131.816261][T22338] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 3131.824247][T22338] R13: 00007f4a73550038 R14: 00007f4a7354ffa0 R15: 00007ffc8d285898 [ 3134.061306][T22469] device syzkaller0 entered promiscuous mode [ 3135.130771][T22525] device pim6reg1 entered promiscuous mode [ 3135.507244][T22541] syz.0.29030[22541] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 3135.507350][T22541] syz.0.29030[22541] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 3135.551643][T22545] device syzkaller0 entered promiscuous mode [ 3139.226115][T22697] bridge0: port 1(bridge_slave_0) entered blocking state [ 3139.233515][T22697] bridge0: port 1(bridge_slave_0) entered disabled state [ 3139.241228][T22697] device bridge_slave_0 entered promiscuous mode [ 3139.291481][T22697] bridge0: port 2(bridge_slave_1) entered blocking state [ 3139.299042][T22697] bridge0: port 2(bridge_slave_1) entered disabled state [ 3139.317384][T22697] device bridge_slave_1 entered promiscuous mode [ 3139.390714][T22697] bridge0: port 2(bridge_slave_1) entered blocking state [ 3139.397819][T22697] bridge0: port 2(bridge_slave_1) entered forwarding state [ 3139.405258][T22697] bridge0: port 1(bridge_slave_0) entered blocking state [ 3139.412477][T22697] bridge0: port 1(bridge_slave_0) entered forwarding state [ 3139.440753][T29283] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 3139.450775][T29283] bridge0: port 1(bridge_slave_0) entered disabled state [ 3139.459160][T29283] bridge0: port 2(bridge_slave_1) entered disabled state [ 3139.511642][T29283] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 3139.545963][T29283] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 3139.582742][T29283] bridge0: port 1(bridge_slave_0) entered blocking state [ 3139.589870][T29283] bridge0: port 1(bridge_slave_0) entered forwarding state [ 3139.605321][T29283] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 3139.615105][T29283] bridge0: port 2(bridge_slave_1) entered blocking state [ 3139.622199][T29283] bridge0: port 2(bridge_slave_1) entered forwarding state [ 3139.630322][T29283] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 3139.639698][T29283] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 3139.649998][T29283] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 3139.658615][T29283] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 3139.727557][T22697] device veth0_vlan entered promiscuous mode [ 3139.739405][T29283] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 3139.753079][T29283] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 3139.767843][T22697] device veth1_macvtap entered promiscuous mode [ 3139.802307][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 3139.811093][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 3139.820499][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 3139.828465][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 3139.837187][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 3139.847975][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 3139.856509][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 3140.629007][T22771] device pim6reg1 entered promiscuous mode [ 3140.725306][T22774] syz.0.29112[22774] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 3140.725364][T22774] syz.0.29112[22774] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 3140.827922][T22780] device pim6reg1 entered promiscuous mode [ 3141.465589][T22810] bridge0: port 2(bridge_slave_1) entered disabled state [ 3141.473084][T22810] bridge0: port 1(bridge_slave_0) entered disabled state [ 3141.569501][T22810] device bridge_slave_1 left promiscuous mode [ 3141.603650][T22810] bridge0: port 2(bridge_slave_1) entered disabled state [ 3141.659297][T22810] device bridge_slave_0 left promiscuous mode [ 3141.684010][T22810] bridge0: port 1(bridge_slave_0) entered disabled state [ 3141.854346][T22825] device pim6reg1 entered promiscuous mode [ 3142.689784][T22872] FAULT_INJECTION: forcing a failure. [ 3142.689784][T22872] name failslab, interval 1, probability 0, space 0, times 0 [ 3142.710440][T22872] CPU: 0 PID: 22872 Comm: syz.3.29150 Tainted: G W syzkaller #0 [ 3142.719607][T22872] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/14/2025 [ 3142.729772][T22872] Call Trace: [ 3142.733281][T22872] __dump_stack+0x21/0x24 [ 3142.737795][T22872] dump_stack_lvl+0x169/0x1d8 [ 3142.742501][T22872] ? asm_sysvec_apic_timer_interrupt+0x12/0x20 [ 3142.748758][T22872] ? show_regs_print_info+0x18/0x18 [ 3142.754235][T22872] ? dump_stack+0x9/0x1c [ 3142.758498][T22872] dump_stack+0x15/0x1c [ 3142.762927][T22872] should_fail+0x3c1/0x510 [ 3142.767352][T22872] ? kvmalloc_node+0x88/0x130 [ 3142.772054][T22872] __should_failslab+0xa4/0xe0 [ 3142.776827][T22872] should_failslab+0x9/0x20 [ 3142.781360][T22872] __kmalloc+0x60/0x330 [ 3142.785534][T22872] kvmalloc_node+0x88/0x130 [ 3142.790169][T22872] simple_xattr_alloc+0x43/0xa0 [ 3142.795138][T22872] shmem_initxattrs+0x8d/0x1e0 [ 3142.800050][T22872] ? irq_exit_rcu+0x9/0x10 [ 3142.804492][T22872] security_inode_init_security+0x254/0x370 [ 3142.810494][T22872] ? shmem_tmpfile+0x100/0x100 [ 3142.815511][T22872] ? security_dentry_create_files_as+0xc0/0xc0 [ 3142.821771][T22872] ? get_acl+0x3f/0x270 [ 3142.826080][T22872] ? __kasan_check_write+0x14/0x20 [ 3142.831206][T22872] ? set_cached_acl+0xdd/0x180 [ 3142.836021][T22872] ? simple_acl_create+0x191/0x1c0 [ 3142.841145][T22872] shmem_mknod+0xbb/0x1c0 [ 3142.845489][T22872] ? selinux_inode_mkdir+0x22/0x30 [ 3142.850718][T22872] shmem_mkdir+0x2e/0x60 [ 3142.854980][T22872] vfs_mkdir+0x4c7/0x6a0 [ 3142.859624][T22872] do_mkdirat+0x14c/0x340 [ 3142.863960][T22872] __x64_sys_mkdir+0x60/0x70 [ 3142.868727][T22872] do_syscall_64+0x31/0x40 [ 3142.873165][T22872] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 3142.879153][T22872] RIP: 0033:0x7f467bdabbe9 [ 3142.883580][T22872] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 3142.903371][T22872] RSP: 002b:00007f467a814038 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 3142.911797][T22872] RAX: ffffffffffffffda RBX: 00007f467bfe2fa0 RCX: 00007f467bdabbe9 [ 3142.920130][T22872] RDX: 0000000000000000 RSI: 0000000000000040 RDI: 0000200000000180 [ 3142.928213][T22872] RBP: 00007f467a814090 R08: 0000000000000000 R09: 0000000000000000 [ 3142.936191][T22872] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 3142.944276][T22872] R13: 00007f467bfe3038 R14: 00007f467bfe2fa0 R15: 00007ffd2eec7eb8 [ 3143.423706][T22898] FAULT_INJECTION: forcing a failure. [ 3143.423706][T22898] name failslab, interval 1, probability 0, space 0, times 0 [ 3143.573980][T22898] CPU: 0 PID: 22898 Comm: syz.3.29159 Tainted: G W syzkaller #0 [ 3143.583258][T22898] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/14/2025 [ 3143.593587][T22898] Call Trace: [ 3143.596890][T22898] __dump_stack+0x21/0x24 [ 3143.601503][T22898] dump_stack_lvl+0x169/0x1d8 [ 3143.606199][T22898] ? thaw_kernel_threads+0x220/0x220 [ 3143.611633][T22898] ? show_regs_print_info+0x18/0x18 [ 3143.616844][T22898] dump_stack+0x15/0x1c [ 3143.621167][T22898] should_fail+0x3c1/0x510 [ 3143.625660][T22898] ? __build_skb+0x2d/0x310 [ 3143.630152][T22898] __should_failslab+0xa4/0xe0 [ 3143.635019][T22898] should_failslab+0x9/0x20 [ 3143.639510][T22898] kmem_cache_alloc+0x3d/0x2e0 [ 3143.644482][T22898] __build_skb+0x2d/0x310 [ 3143.648982][T22898] build_skb+0x24/0x200 [ 3143.653179][T22898] ? tun_get_user+0x7ff/0x3090 [ 3143.658187][T22898] tun_get_user+0x818/0x3090 [ 3143.662889][T22898] ? tun_do_read+0x1c00/0x1c00 [ 3143.668108][T22898] ? kstrtouint_from_user+0x1a0/0x200 [ 3143.673741][T22898] ? __fsnotify_parent+0x5f5/0x6c0 [ 3143.678849][T22898] ? avc_policy_seqno+0x1b/0x70 [ 3143.684067][T22898] ? selinux_file_permission+0x2a5/0x510 [ 3143.689977][T22898] ? fsnotify_perm+0x66/0x4b0 [ 3143.694673][T22898] tun_chr_write_iter+0x1bf/0x270 [ 3143.699784][T22898] vfs_write+0x725/0xd60 [ 3143.704037][T22898] ? kernel_write+0x3c0/0x3c0 [ 3143.708708][T22898] ? __fget_files+0x2c4/0x320 [ 3143.713464][T22898] ? __fdget_pos+0x1f7/0x380 [ 3143.718045][T22898] ? ksys_write+0x71/0x240 [ 3143.722462][T22898] ksys_write+0x140/0x240 [ 3143.726778][T22898] ? __ia32_sys_read+0x90/0x90 [ 3143.731535][T22898] ? fpu__clear_all+0x20/0x20 [ 3143.736200][T22898] __x64_sys_write+0x7b/0x90 [ 3143.740787][T22898] do_syscall_64+0x31/0x40 [ 3143.745199][T22898] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 3143.751168][T22898] RIP: 0033:0x7f467bdabbe9 [ 3143.755574][T22898] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 3143.775435][T22898] RSP: 002b:00007f467a814038 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 3143.783847][T22898] RAX: ffffffffffffffda RBX: 00007f467bfe2fa0 RCX: 00007f467bdabbe9 [ 3143.791991][T22898] RDX: 000000000000000e RSI: 0000200000000000 RDI: 00000000000000c8 [ 3143.800139][T22898] RBP: 00007f467a814090 R08: 0000000000000000 R09: 0000000000000000 [ 3143.808399][T22898] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 3143.816363][T22898] R13: 00007f467bfe3038 R14: 00007f467bfe2fa0 R15: 00007ffd2eec7eb8 [ 3145.273583][T22961] syz.1.29181[22961] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 3145.273669][T22961] syz.1.29181[22961] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 3148.533818][T23100] device veth1_macvtap left promiscuous mode [ 3148.552183][T23100] device macsec0 left promiscuous mode [ 3148.583500][T23100] device veth1_macvtap entered promiscuous mode [ 3148.596838][T23100] device macsec0 entered promiscuous mode [ 3152.574116][T23240] device pim6reg1 entered promiscuous mode [ 3152.615868][T23240] A6±ÿ: renamed from team_slave_1 [ 3152.972282][T23256] device pim6reg1 entered promiscuous mode [ 3154.804670][T23305] device pim6reg1 entered promiscuous mode [ 3156.072067][T23359] FAULT_INJECTION: forcing a failure. [ 3156.072067][T23359] name failslab, interval 1, probability 0, space 0, times 0 [ 3156.139698][T23359] CPU: 0 PID: 23359 Comm: syz.3.29323 Tainted: G W syzkaller #0 [ 3156.148898][T23359] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/14/2025 [ 3156.159317][T23359] Call Trace: [ 3156.162900][T23359] __dump_stack+0x21/0x24 [ 3156.167244][T23359] dump_stack_lvl+0x169/0x1d8 [ 3156.171922][T23359] ? show_regs_print_info+0x18/0x18 [ 3156.177123][T23359] dump_stack+0x15/0x1c [ 3156.181286][T23359] should_fail+0x3c1/0x510 [ 3156.185962][T23359] ? __alloc_skb+0x9e/0x520 [ 3156.190859][T23359] __should_failslab+0xa4/0xe0 [ 3156.195631][T23359] should_failslab+0x9/0x20 [ 3156.200313][T23359] kmem_cache_alloc+0x3d/0x2e0 [ 3156.205253][T23359] __alloc_skb+0x9e/0x520 [ 3156.210357][T23359] tipc_msg_create+0x44/0x550 [ 3156.215801][T23359] ? tipc_node_remove_conn+0x2d5/0x400 [ 3156.221413][T23359] __tipc_shutdown+0xbfa/0x1520 [ 3156.226431][T23359] ? tipc_recvstream+0xe80/0xe80 [ 3156.231843][T23359] ? wait_woken+0x180/0x180 [ 3156.236533][T23359] tipc_release+0x79/0x1490 [ 3156.241239][T23359] sock_close+0xe0/0x270 [ 3156.245467][T23359] ? sock_mmap+0xa0/0xa0 [ 3156.249722][T23359] __fput+0x2fb/0x770 [ 3156.253825][T23359] ____fput+0x15/0x20 [ 3156.257816][T23359] task_work_run+0x127/0x190 [ 3156.262756][T23359] exit_to_user_mode_loop+0xcb/0xe0 [ 3156.268056][T23359] syscall_exit_to_user_mode+0x68/0x90 [ 3156.273614][T23359] do_syscall_64+0x3d/0x40 [ 3156.278241][T23359] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 3156.284632][T23359] RIP: 0033:0x7f467bdabbe9 [ 3156.289350][T23359] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 3156.309963][T23359] RSP: 002b:00007f467a814038 EFLAGS: 00000246 ORIG_RAX: 0000000000000003 [ 3156.318408][T23359] RAX: 0000000000000000 RBX: 00007f467bfe2fa0 RCX: 00007f467bdabbe9 [ 3156.326492][T23359] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000005 [ 3156.334485][T23359] RBP: 00007f467a814090 R08: 0000000000000000 R09: 0000000000000000 [ 3156.342547][T23359] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 3156.350532][T23359] R13: 00007f467bfe3038 R14: 00007f467bfe2fa0 R15: 00007ffd2eec7eb8 [ 3156.470543][T23368] device wg2 left promiscuous mode [ 3156.512081][T23368] device wg2 entered promiscuous mode [ 3156.536160][T23368] syz.1.29327[23368] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 3156.537700][T23368] syz.1.29327[23368] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 3157.155496][T23396] device veth0_vlan left promiscuous mode [ 3157.248843][T23396] device veth0_vlan entered promiscuous mode [ 3157.286664][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 3157.305382][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 3157.325009][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ: link becomes ready [ 3157.858878][T23433] device veth0_vlan left promiscuous mode [ 3157.895163][T23433] device veth0_vlan entered promiscuous mode [ 3157.917137][T27925] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 3157.927234][T27925] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 3157.939170][T27925] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿÛ[haX›Ïè‡: link becomes ready [ 3157.965110][T23440] FAULT_INJECTION: forcing a failure. [ 3157.965110][T23440] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 3157.978590][T23440] CPU: 1 PID: 23440 Comm: syz.0.29354 Tainted: G W syzkaller #0 [ 3157.987725][T23440] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/14/2025 [ 3157.997797][T23440] Call Trace: [ 3158.001120][T23440] __dump_stack+0x21/0x24 [ 3158.005562][T23440] dump_stack_lvl+0x169/0x1d8 [ 3158.010355][T23440] ? thaw_kernel_threads+0x220/0x220 [ 3158.015657][T23440] ? vsnprintf+0x1871/0x1960 [ 3158.020356][T23440] ? show_regs_print_info+0x18/0x18 [ 3158.025579][T23440] dump_stack+0x15/0x1c [ 3158.029770][T23440] should_fail+0x3c1/0x510 [ 3158.034288][T23440] should_fail_usercopy+0x1a/0x20 [ 3158.039505][T23440] _copy_to_user+0x20/0x90 [ 3158.044052][T23440] simple_read_from_buffer+0xe9/0x160 [ 3158.049566][T23440] proc_fail_nth_read+0x19a/0x210 [ 3158.054697][T23440] ? proc_fault_inject_write+0x2f0/0x2f0 [ 3158.060523][T23440] ? rw_verify_area+0x1c0/0x360 [ 3158.065566][T23440] ? proc_fault_inject_write+0x2f0/0x2f0 [ 3158.071308][T23440] vfs_read+0x1fe/0xa10 [ 3158.075493][T23440] ? kernel_read+0x70/0x70 [ 3158.080085][T23440] ? __kasan_check_write+0x14/0x20 [ 3158.085301][T23440] ? mutex_lock+0x8c/0xe0 [ 3158.089651][T23440] ? mutex_trylock+0xa0/0xa0 [ 3158.094663][T23440] ? __fget_files+0x2c4/0x320 [ 3158.099369][T23440] ? __fdget_pos+0x2d2/0x380 [ 3158.104075][T23440] ? ksys_read+0x71/0x240 [ 3158.108430][T23440] ksys_read+0x140/0x240 [ 3158.112797][T23440] ? vfs_write+0xd60/0xd60 [ 3158.117320][T23440] ? ____fput+0x15/0x20 [ 3158.121530][T23440] __x64_sys_read+0x7b/0x90 [ 3158.126060][T23440] do_syscall_64+0x31/0x40 [ 3158.130502][T23440] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 3158.136408][T23440] RIP: 0033:0x7f4a733175fc [ 3158.141005][T23440] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 93 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 ef 93 02 00 48 [ 3158.161248][T23440] RSP: 002b:00007f4a71d81030 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 3158.169849][T23440] RAX: ffffffffffffffda RBX: 00007f4a7354ffa0 RCX: 00007f4a733175fc [ 3158.178111][T23440] RDX: 000000000000000f RSI: 00007f4a71d810a0 RDI: 000000000000000a [ 3158.186316][T23440] RBP: 00007f4a71d81090 R08: 0000000000000000 R09: 0000000000000000 [ 3158.194410][T23440] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 3158.202589][T23440] R13: 00007f4a73550038 R14: 00007f4a7354ffa0 R15: 00007ffc8d285898 [ 3158.896038][T23463] device pim6reg1 entered promiscuous mode [ 3159.472724][T23487] device sit0 left promiscuous mode [ 3159.558269][T23487] device sit0 entered promiscuous mode [ 3160.312547][T23537] device pim6reg1 entered promiscuous mode [ 3160.396755][T23539] ÿÿÿÿÿÿ: renamed from vlan1 [ 3160.916971][T23552] FAULT_INJECTION: forcing a failure. [ 3160.916971][T23552] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 3160.940041][T23552] CPU: 1 PID: 23552 Comm: syz.3.29398 Tainted: G W syzkaller #0 [ 3160.949020][T23552] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/14/2025 [ 3160.959080][T23552] Call Trace: [ 3160.962502][T23552] __dump_stack+0x21/0x24 [ 3160.967049][T23552] dump_stack_lvl+0x169/0x1d8 [ 3160.971734][T23552] ? show_regs_print_info+0x18/0x18 [ 3160.976932][T23552] ? stack_trace_save+0x98/0xe0 [ 3160.981790][T23552] dump_stack+0x15/0x1c [ 3160.985951][T23552] should_fail+0x3c1/0x510 [ 3160.990386][T23552] should_fail_usercopy+0x1a/0x20 [ 3160.995515][T23552] _copy_from_user+0x20/0xd0 [ 3161.000205][T23552] __copy_msghdr_from_user+0x448/0x5e0 [ 3161.005671][T23552] ? __ia32_sys_shutdown+0x1e0/0x1e0 [ 3161.011182][T23552] ? __fsnotify_parent+0x5f5/0x6c0 [ 3161.016369][T23552] ___sys_sendmsg+0x156/0x260 [ 3161.021146][T23552] ? __sys_sendmsg+0x250/0x250 [ 3161.025916][T23552] ? rw_verify_area+0x1c0/0x360 [ 3161.031257][T23552] ? __fdget+0x1a1/0x230 [ 3161.035529][T23552] __x64_sys_sendmsg+0x1e2/0x2a0 [ 3161.040460][T23552] ? fput+0x1a/0x20 [ 3161.044266][T23552] ? ___sys_sendmsg+0x260/0x260 [ 3161.049112][T23552] ? fpregs_assert_state_consistent+0xb1/0xe0 [ 3161.055186][T23552] do_syscall_64+0x31/0x40 [ 3161.059681][T23552] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 3161.065752][T23552] RIP: 0033:0x7f467bdabbe9 [ 3161.070177][T23552] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 3161.089796][T23552] RSP: 002b:00007f467a814038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 3161.098391][T23552] RAX: ffffffffffffffda RBX: 00007f467bfe2fa0 RCX: 00007f467bdabbe9 [ 3161.106477][T23552] RDX: 0000000020044885 RSI: 0000200000004440 RDI: 0000000000000008 [ 3161.114524][T23552] RBP: 00007f467a814090 R08: 0000000000000000 R09: 0000000000000000 [ 3161.122491][T23552] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 3161.130543][T23552] R13: 00007f467bfe3038 R14: 00007f467bfe2fa0 R15: 00007ffd2eec7eb8 [ 3161.156890][ T24] audit: type=1400 audit(1756816563.580:169): avc: denied { getattr } for pid=23555 comm="dhcpcd-run-hook" path="/run/dhcpcd/hook-state/resolv.conf/eth0.dhcp" dev="tmpfs" ino=426 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 3161.227109][ T24] audit: type=1400 audit(1756816563.630:170): avc: denied { unlink } for pid=23563 comm="rm" name="eth0.dhcp" dev="tmpfs" ino=426 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 3161.248095][T23575] device pim6reg1 entered promiscuous mode [ 3161.322159][ T24] audit: type=1400 audit(1756816563.640:171): avc: denied { create } for pid=23555 comm="dhcpcd-run-hook" name="eth0.dhcp" scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 3161.362046][ T24] audit: type=1400 audit(1756816563.640:172): avc: denied { write open } for pid=23555 comm="dhcpcd-run-hook" path="/run/dhcpcd/hook-state/resolv.conf/eth0.dhcp" dev="tmpfs" ino=87546 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 3161.506304][ T24] audit: type=1400 audit(1756816563.740:173): avc: denied { read } for pid=23576 comm="sed" name="eth0.dhcp" dev="tmpfs" ino=87546 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 3161.613498][ T24] audit: type=1400 audit(1756816564.030:174): avc: denied { append } for pid=23555 comm="dhcpcd-run-hook" name="resolv.conf.eth0.dhcp" dev="tmpfs" ino=87559 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 3162.038925][T23625] ------------[ cut here ]------------ [ 3162.130258][T23625] kernel BUG at kernel/bpf/arraymap.c:980! [ 3162.206771][T23625] invalid opcode: 0000 [#1] PREEMPT SMP KASAN [ 3162.213081][T23625] CPU: 0 PID: 23625 Comm: syz.0.29414 Tainted: G W syzkaller #0 [ 3162.222120][T23625] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/14/2025 [ 3162.232190][T23625] RIP: 0010:prog_array_map_poke_run+0x6f4/0x710 [ 3162.238453][T23625] Code: 95 e9 ff eb 05 e8 0c 95 e9 ff 48 83 c4 58 5b 41 5c 41 5d 41 5e 41 5f 5d c3 e8 f8 94 e9 ff 0f 0b e9 78 f9 ff ff e8 ec 94 e9 ff <0f> 0b e8 e5 94 e9 ff 0f 0b e8 de 94 e9 ff 0f 0b e8 d7 94 e9 ff 0f [ 3162.258137][T23625] RSP: 0018:ffffc900011efc30 EFLAGS: 00010293 [ 3162.264776][T23625] RAX: ffffffff817a0bf4 RBX: ffff888117a54450 RCX: ffff88811e94e2c0 [ 3162.273033][T23625] RDX: 0000000000000000 RSI: 00000000fffffff0 RDI: 00000000ffffffea [ 3162.280997][T23625] RBP: ffffc900011efcb0 R08: dffffc0000000000 R09: fffffbfff0c5d491 [ 3162.288996][T23625] R10: fffffbfff0c5d491 R11: 1ffffffff0c5d490 R12: ffffffffa0084d00 [ 3162.297058][T23625] R13: ffff888123fe2800 R14: 0000000000000001 R15: 00000000fffffff0 [ 3162.305033][T23625] FS: 00007f4a71d3f6c0(0000) GS:ffff8881f7000000(0000) knlGS:0000000000000000 [ 3162.313954][T23625] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 3162.320531][T23625] CR2: 0000200000585000 CR3: 000000011f202000 CR4: 00000000003506b0 [ 3162.328521][T23625] DR0: 0000000000000000 DR1: 0000200000000300 DR2: 0000000000000000 [ 3162.336597][T23625] DR3: 0000000000000000 DR6: 00000000ffff0ff0 DR7: 0000000000000600 [ 3162.344641][T23625] Call Trace: [ 3162.347944][T23625] ? bpf_prog_4b8b081278bac347+0xb/0x23c [ 3162.353577][T23625] bpf_fd_array_map_update_elem+0x21f/0x330 [ 3162.359556][T23625] bpf_map_update_value+0xb4/0x430 [ 3162.364656][T23625] map_update_elem+0x4a1/0x5e0 [ 3162.369419][T23625] __se_sys_bpf+0x398/0x680 [ 3162.374088][T23625] ? __x64_sys_bpf+0x90/0x90 [ 3162.378880][T23625] ? do_user_addr_fault+0x791/0xc80 [ 3162.384115][T23625] ? __bpf_trace_sys_enter+0x62/0x70 [ 3162.389420][T23625] __x64_sys_bpf+0x7b/0x90 [ 3162.393852][T23625] do_syscall_64+0x31/0x40 [ 3162.398260][T23625] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 3162.404145][T23625] RIP: 0033:0x7f4a73318be9 [ 3162.408550][T23625] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 3162.428408][T23625] RSP: 002b:00007f4a71d3f038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 3162.436826][T23625] RAX: ffffffffffffffda RBX: 00007f4a73550180 RCX: 00007f4a73318be9 [ 3162.444807][T23625] RDX: 0000000000000020 RSI: 0000200000000400 RDI: 0000000000000002 [ 3162.452857][T23625] RBP: 00007f4a7339be19 R08: 0000000000000000 R09: 0000000000000000 [ 3162.460906][T23625] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 3162.469012][T23625] R13: 00007f4a73550218 R14: 00007f4a73550180 R15: 00007ffc8d285898 [ 3162.477159][T23625] Modules linked in: [ 3162.507391][T23625] ---[ end trace bc9d8db6c89d7a6b ]--- [ 3162.519684][T23625] RIP: 0010:prog_array_map_poke_run+0x6f4/0x710 [ 3162.526245][T23625] Code: 95 e9 ff eb 05 e8 0c 95 e9 ff 48 83 c4 58 5b 41 5c 41 5d 41 5e 41 5f 5d c3 e8 f8 94 e9 ff 0f 0b e9 78 f9 ff ff e8 ec 94 e9 ff <0f> 0b e8 e5 94 e9 ff 0f 0b e8 de 94 e9 ff 0f 0b e8 d7 94 e9 ff 0f [ 3162.546972][T23625] RSP: 0018:ffffc900011efc30 EFLAGS: 00010293 [ 3162.553207][T23625] RAX: ffffffff817a0bf4 RBX: ffff888117a54450 RCX: ffff88811e94e2c0 [ 3162.562244][T23625] RDX: 0000000000000000 RSI: 00000000fffffff0 RDI: 00000000ffffffea [ 3162.571112][T23625] RBP: ffffc900011efcb0 R08: dffffc0000000000 R09: fffffbfff0c5d491 [ 3162.579430][T23625] R10: fffffbfff0c5d491 R11: 1ffffffff0c5d490 R12: ffffffffa0084d00 [ 3162.589917][T23625] R13: ffff888123fe2800 R14: 0000000000000001 R15: 00000000fffffff0 [ 3162.598098][T23625] FS: 00007f4a71d3f6c0(0000) GS:ffff8881f7000000(0000) knlGS:0000000000000000 [ 3162.607661][T23625] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 3162.614352][T23625] CR2: 00007fb5f8c51198 CR3: 000000011f202000 CR4: 00000000003506b0 [ 3162.622713][T23625] DR0: 0000000000000000 DR1: 0000200000000300 DR2: 0000000000000000 [ 3162.630890][T23625] DR3: 0000000000000000 DR6: 00000000ffff0ff0 DR7: 0000000000000600 [ 3162.638966][T23625] Kernel panic - not syncing: Fatal exception [ 3162.640001][ T24] audit: type=1400 audit(1756816565.070:175): avc: denied { read } for pid=77 comm="syslogd" name="log" dev="sda1" ino=2010 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 3162.645264][T23625] Kernel Offset: disabled [ 3162.671734][T23625] Rebooting in 86400 seconds..