last executing test programs: 5.634675513s ago: executing program 0 (id=1958): socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$sock_attach_bpf(r1, 0x1, 0x10, &(0x7f0000000000), 0x4) write$cgroup_devices(r1, 0x0, 0x0) recvmsg$unix(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000500)=""/4096, 0x1000}], 0x1}, 0x40010000) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0a000000040000000800000008", @ANYBLOB], 0x48) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16, 0x0, 0x4, 0x2, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYRES32=r2], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0xc, 0x0, &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) syz_clone(0x10000000, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r3 = perf_event_open(&(0x7f0000000080)={0x1, 0x41, 0x2, 0x0, 0x0, 0x0, 0x0, 0x91c, 0x4156, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0xfffffffffffffff8, 0x1}, 0x12640, 0x0, 0xfffffffe, 0x6, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) ioctl$PERF_EVENT_IOC_REFRESH(r3, 0x2402, 0x7) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000600)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x6, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000001600000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000082"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @xdp, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={0xffffffffffffffff, 0x2000000, 0xd, 0x0, &(0x7f0000000200)="63eced8e46dc3f0adf33c9f7b9", 0x0, 0x2f00, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f0000000300)='sched_switch\x00', r5}, 0x10) bpf$MAP_CREATE(0x1100000000000000, &(0x7f0000000440)=@base={0x18, 0x4, 0x2, 0x0, 0x201, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0xffffffff, 0x0, 0x0, @void, @value, @void, @value}, 0x48) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x1f, 0x13, &(0x7f0000000080)=@framed={{0x18, 0x8, 0x0, 0x0, 0xffd0}, [@func={0x85, 0x0, 0x1, 0x0, 0x6}, @map_fd={0x18, 0x0, 0x0}, @generic={0x66, 0x8}, @initr0, @exit, @alu={0x6, 0x0, 0x3, 0xa, 0x0, 0x2}, @printk={@x, {}, {}, {}, {}, {0x5, 0x0, 0xb, 0xa}}]}, &(0x7f0000000000)='GPL\x00', 0x2, 0xff5c, &(0x7f0000000340)=""/222, 0x0, 0x8, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x78) 4.636422797s ago: executing program 0 (id=1965): perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0xfe, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=@base={0x9, 0x4, 0xfff, 0x5, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454da, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r1}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18020000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb703000008"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r2 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000dc0)={&(0x7f0000000040)='ext4_unlink_enter\x00', r2}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000c80)=@base={0xb, 0x5, 0x2, 0x4, 0x5, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x800084}, 0xfffffffffffffea9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0xc004743e, 0x20001400) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000040)='mm_page_alloc\x00'}, 0x10) openat$tun(0xffffffffffffff9c, &(0x7f0000000200), 0x20702, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x3, 0x4, 0x4, 0x9, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x3, 0x4, 0x4, 0x98, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000080)={0x18, 0x7, &(0x7f00000001c0)=ANY=[@ANYBLOB="1800000000000000080000000000000218100000", @ANYRES32=r3, @ANYBLOB="000000000000000018100000", @ANYRES32=r4, @ANYBLOB="000000000000000095"], &(0x7f0000000a00)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000004c0)={r5, 0xe0, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000001d00), ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0}}, 0x10) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, &(0x7f0000000100)={'veth0_to_bridge\x00', 0x400}) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000040)={0x5, 0x5, &(0x7f00000001c0)=@framed={{}, [@ldst={0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1a7fbb}, @ldst={0x6, 0x0, 0x6, 0x0, 0x0, 0xfffffffffffffffe, 0xa000000}]}, &(0x7f0000000000)='syzkaller\x00', 0x5, 0xf4240, &(0x7f0000000100)=""/147, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) 4.442475366s ago: executing program 4 (id=1967): bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x0, 0x2000000000000178, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000edff0000000000000000850000000f00000018010000646c012500000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000800000850000000600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x31, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r0}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x18, 0x13, &(0x7f0000000080)=ANY=[@ANYBLOB="180800"], 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) perf_event_open$cgroup(&(0x7f0000000000)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0xfffffff6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 4.353969655s ago: executing program 4 (id=1969): bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000680)='sched_switch\x00', r0}, 0x10) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x15, 0x4, 0x0, &(0x7f0000000080)) bpf$MAP_CREATE(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@union={0x0, 0x0, 0x0, 0x10, 0x1}]}}, 0x0, 0x26, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x20) sendmsg$inet(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001d80)=ANY=[@ANYBLOB="28010000000000000100000001"], 0x128}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001480)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r2, &(0x7f0000000600)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001d80)=ANY=[], 0x128}, 0x0) recvmsg$unix(r1, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000080), 0x100}, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xd, &(0x7f0000000280)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000500000018110000", @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000880)={&(0x7f0000000000)='percpu_alloc_percpu\x00', r3}, 0x10) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x1, 0x4, 0x6, 0xb, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x14, &(0x7f0000000280)=ANY=[@ANYBLOB="1800000000000000000000000000000018010000f4751f2100000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000000400000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$PROG_BIND_MAP(0xa, &(0x7f0000000380)={r5}, 0xc) bpf$PROG_LOAD(0x5, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000300)={0xffffffffffffffff}) bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x9, 0x4, 0x7fe2, 0x1, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) recvmsg$unix(r6, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) syz_clone(0x640c7000, 0x0, 0x0, 0x0, 0x0, 0x0) 3.51363145s ago: executing program 0 (id=1974): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000002010000850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000001"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x5, 0x408, 0xcd, 0x1, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000000)='workqueue_queue_work\x00', r1}, 0x10) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000000)='workqueue_queue_work\x00', r2}, 0x10) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001200)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x4, [@fwd={0x1}]}, {0x0, [0x5f, 0x60]}}, 0x0, 0x28, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x28) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000340)={0xffffffffffffffff}) setsockopt$sock_attach_bpf(r3, 0x1, 0x1d, &(0x7f00000001c0), 0x4) 3.45553108s ago: executing program 2 (id=1977): bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16, 0x0, 0x4, 0x1, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$MAP_CREATE(0x0, 0x0, 0x48) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) r0 = syz_clone(0x20000, &(0x7f0000000000)="1a09220aaf6c1bd6fc8fa13c751260dcc083625a42e6277a552234dbc438c8a7b6", 0x21, &(0x7f0000000040), &(0x7f0000000080), &(0x7f0000000280)="3d87668efc5d577f4e20be6bc15408632356fc34aff5de63552a94d554956a385a2c800c105a36ddde72e66660eca241") bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000300)={r0, 0xffffffffffffffff, 0x0, 0x4, &(0x7f00000002c0)='.!@\x00'}, 0x30) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="170000000000"], 0x48) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000058"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8914, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value=0x2000000}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000180)='sched_switch\x00', r2}, 0x10) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x10}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xb2, 0x2, 0x0, 0x0, 0x0, 0x80000000000, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2}, 0xc42a, 0x0, 0x7, 0x5, 0x0, 0x200000}, 0x0, 0x0, 0xffffffffffffffff, 0x8) 3.42285605s ago: executing program 0 (id=1978): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000002010000850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000001"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x5, 0x408, 0xcd, 0x1, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000000)='workqueue_queue_work\x00', r1}, 0x10) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000000)='workqueue_queue_work\x00', r2}, 0x10) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000340)={0xffffffffffffffff}) setsockopt$sock_attach_bpf(r3, 0x1, 0x1d, &(0x7f00000001c0), 0x4) (fail_nth: 2) 3.284099659s ago: executing program 4 (id=1979): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000400)='signal_generate\x00'}, 0x18) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) perf_event_open(&(0x7f0000000240)={0x2, 0x80, 0x9b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x0, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="18010000000000000000000000000000850000006d00000095"], 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f00000002c0)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) r1 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000e00)={&(0x7f0000000980)='sys_exit\x00', r0}, 0x10) r2 = bpf$ITER_CREATE(0xb, &(0x7f0000000100)={r1}, 0x8) write$cgroup_int(r2, &(0x7f00000001c0)=0x82000000, 0xfffffdef) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x5, 0x400, 0x9, 0x1, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r3], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r4}, 0x10) 2.559036885s ago: executing program 2 (id=1981): socketpair(0x2a, 0xa, 0x6, &(0x7f0000000000)) socketpair(0x25, 0x0, 0x2, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = bpf$ITER_CREATE(0x21, &(0x7f0000000080), 0x8) write$cgroup_type(r1, &(0x7f00000000c0), 0x9) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) r3 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000180)=@generic={&(0x7f0000000140)='./file0\x00', 0x0, 0x10}, 0x18) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000480)={r3, 0xe0, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f00000001c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x2, 0x6, &(0x7f0000000200)=[0x0, 0x0], &(0x7f0000000240)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0xf8, &(0x7f0000000280)=[{}, {}, {}, {}], 0x20, 0x10, &(0x7f00000002c0), &(0x7f0000000300), 0x8, 0x52, 0x8, 0x8, &(0x7f0000000340)}}, 0x10) r6 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000680)=r5, 0x4) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000780)={0x18, 0x18, &(0x7f00000004c0)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x9d9}, {{0x18, 0x1, 0x1, 0x0, r1}}, {}, [@ldst={0x0, 0x3, 0x2, 0xb, 0x5, 0xffffffffffffff80, 0xffffffffffffffff}, @ldst={0x1, 0x3, 0x6, 0x9, 0x4, 0x80, 0x1}, @map_fd={0x18, 0x8, 0x1, 0x0, r0}, @map_fd={0x18, 0x10, 0x1, 0x0, r1}, @map_idx={0x18, 0x4, 0x5, 0x0, 0x2}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x5}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000580)='syzkaller\x00', 0x80000000, 0xb2, &(0x7f00000005c0)=""/178, 0x41000, 0x17, '\x00', 0x0, 0x0, r6, 0x8, &(0x7f0000000740)={0xa, 0x3}, 0x8, 0x10, &(0x7f0000000700)={0x4, 0x9, 0x40, 0x708}, 0x10, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000740), 0x10, 0x1, @void, @value}, 0x94) r7 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000840)={0x2, 0x4, 0x8, 0x1, 0x80, r1, 0x9ec1, '\x00', r4, r0, 0x3, 0x5, 0x0, 0x0, @void, @value, @void, @value}, 0x50) r8 = getpid() write$cgroup_pid(r1, &(0x7f00000008c0)=r8, 0x12) bpf$MAP_LOOKUP_BATCH(0x18, &(0x7f0000000b80)={&(0x7f0000000900)="c8e66954d5c2fcf81c86c9f62338cb5240db52656f271693f1a6b5b2609fc3537ff3e25807ee537e7f1a50cd17a8a245141bf3352386debeb563d44805ce390525c32fb2ac6374cbee84de4a984e4bdd70b90b5a14444bf9", &(0x7f0000000980)=""/246, &(0x7f0000000a80)="80b568de769e1fdc8cca6bb6e644392713fb860eda28f3b251892068af1effbcfab0fc982059c66d0a85c093abda6312caad221b2f029f00c09a6805b650d1e551617f2a3d4d63168a8c4abd137176e47d84fb06a3759656dc96719e", &(0x7f0000000b00)="612c7be5f17c27530a461fd193aabc372dc78f79b814f5b5795952766de0f24c5597467fd0b85125afecfd723d67e1b416470616e9e54851cfda26373380ce90ad221ca6ee0cd9dcd1a22d3301", 0xf74, r7, 0x4}, 0x38) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000c80)={r1, &(0x7f0000000bc0)="9c64ffafa27a33cfcbcc154ff4edc7b36f86182ba5bf5455b0348e0f9f56d982a066ad1252a690d68473b2e035473ade7516b99f2d9b79aa5c146a39d7056086cb365696c7066f30e9f2d570d22c7812d0fe79740adb820127fc7d48e4542f6e5b0cd73cd0a48feb34aea81934a5e3ab868320cf5bfc40dc8b734bfb23cca3decefe"}, 0x20) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000fc0)={&(0x7f0000000cc0)="b80283e6b897aaf2f09102634c5eb27232831f670fb2ac32deb400feb2a81eba5a16962b01cca28f37e1d68e8dfdcdc5d186564efc3f9471a30644e7dd4c60871b74572fd13be48a5ff753c08dd57aaad4a05a144bc39b92ab93de3326005f74cf155e31f2c5570686acfb3a45d1966b544f0491b09b03180435b4d8fd8642c2da3f8b37d418a310251c5237e9774157b8251bf1825edea13f950d8200954a888160dc6ff71ec0ecf53c700f4ac2169f7a96ebab88871630da86e0b6c08d1f600e7409", &(0x7f0000000dc0)=""/132, &(0x7f0000000e80)="3e44ea46868980b60a7e13184094060522ff52c991e5d570014c82ea79f29e0eb83bb09b", &(0x7f0000000ec0)="7f46f76412159cb7e098641b547324d26ce4a87bd93482546d1d273ea1eeac4008f22997e23fa6851ae44454ec6dc7619131401a170b4bcd8ca4210b83733bca94be2961d923e7d292d7e29629f5028315a36ca8af7b6ad2bf071dce73270973f99258d5b4cd428700f64e2f56fe74ab0f2101869031b418b9fe9e2453f8930931074325c16c7d6bfb3b26548dbc3f765da1a59cd82f6bbc6929e4a1d56fc4a9a38f55d23deb02895877eb2c5e21aac22648d23e0e294dea7b1b67afaf3397604bf4f0abaa6b1b4db6", 0x4, r7, 0x4}, 0x38) r9 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000012c0)={0x11, 0x16, &(0x7f0000001040)=@framed={{0x18, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x3}, [@map_val={0x18, 0xb, 0x2, 0x0, r0, 0x0, 0x0, 0x0, 0x1}, @ldst={0x3, 0x3, 0x6, 0x3, 0x3, 0x18, 0xfffffffffffffff0}, @tail_call={{0x18, 0x2, 0x1, 0x0, r1}}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x1}, @alu={0x7, 0x1, 0x6, 0xb, 0x0, 0xfffffffffffffffc}, @printk={@u, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x5}}, @generic={0x5, 0xf, 0x1, 0x5, 0x2}]}, &(0x7f0000001100)='GPL\x00', 0xffff7fff, 0xcc, &(0x7f0000001140)=""/204, 0x40f00, 0x0, '\x00', r4, 0x0, r6, 0x8, 0x0, 0x0, 0x10, &(0x7f0000001240)={0x3, 0x4, 0x324, 0x7f}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000001280)=[r7, r1, r1, r1, r7, r1], 0x0, 0x10, 0x3, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000001380)={&(0x7f0000001000)='scmi_xfer_response_wait\x00', r9, 0x0, 0x1}, 0x18) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000013c0)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) r10 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000001400)={0x1b, 0x0, 0x0, 0x9, 0x0, r7, 0x5, '\x00', r4, r6, 0x0, 0x2, 0x5, 0x0, @void, @value, @void, @value}, 0x50) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000001600)={r7, &(0x7f0000001480)="03d86f49a01d830af037eec680c4083c48ad49290c67d9368e8c2f68f3a854de97b4695c9e1e463f5f16e07c84e9f7a9f07376d073f550a97658cfdc8e777684daa06406ed4fb6c275f71c7ea2864418d96fb8cee84fef6d6ddd2006f5822d51b692e03a10dc1a356f004e", &(0x7f0000001500)=""/204}, 0x20) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001900)={r9, 0xe0, &(0x7f0000001800)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa, &(0x7f0000001640)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x3, 0x5, &(0x7f0000001680)=[0x0, 0x0, 0x0], &(0x7f00000016c0)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x57, &(0x7f0000001700)=[{}, {}, {}, {}, {}, {}, {}, {}], 0x40, 0x10, &(0x7f0000001740), &(0x7f0000001780), 0x8, 0xe5, 0x8, 0x8, &(0x7f00000017c0)}}, 0x10) r12 = openat$cgroup(r2, &(0x7f0000001940)='syz0\x00', 0x200002, 0x0) mkdirat$cgroup(r12, &(0x7f0000001980)='syz0\x00', 0x1ff) syz_clone(0x40000, &(0x7f00000019c0)="0067ab47c0194690be89d6f4d6278464cdb96d289470961cc1ba837037b586aca8b3f66e94ac0cc95812872134159216246a006e878cbd6b715d516510246c7bf524505fb8e36a067d2d339d1849deee04922684dbafb8adb461ef6cf2aff6a0176e90124429f0bf0e40fa29caada87ca1a82b69ae5bd0f4804152d5ba1e6dec873dd2b583c379b26b6a97e91db30a28753f2ab3498f2ff46e4b143a3238a1a2fdc04c4ba4ba3f", 0xa7, &(0x7f0000001a80), &(0x7f0000001ac0), &(0x7f0000001b00)='?Oj') ioctl$SIOCSIFHWADDR(r1, 0x8924, &(0x7f0000001b40)={'gre0\x00', @dev={'\xaa\xaa\xaa\xaa\xaa', 0x1a}}) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000001b80)={0x3ff}, 0x8) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000001bc0)={'macvlan0\x00', 0x4000}) r13 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000001c00)=r5, 0x4) bpf$MAP_CREATE(0x0, &(0x7f0000001c40)=@base={0x20, 0x9, 0x2, 0x7de, 0x10102, r10, 0xd, '\x00', r11, r13, 0x5, 0x2, 0x4, 0x0, @void, @value, @value}, 0x50) perf_event_open(&(0x7f0000001cc0)={0x3, 0x80, 0x6, 0xda, 0x1, 0x0, 0x0, 0x3, 0x2, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x6, 0x2, @perf_config_ext={0x6, 0x4}, 0x8820, 0x6, 0x3, 0x2, 0x7, 0x436, 0x1, 0x0, 0x3, 0x0, 0x64c}, r8, 0xb, r1, 0x3) 2.558235775s ago: executing program 3 (id=1982): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000100)={0x18, 0x4, &(0x7f0000000200)=@raw=[@jmp={0x4, 0x0, 0xd, 0x1, 0x0, 0x0, 0x10}, @initr0, @exit], &(0x7f00000000c0)='GPL\x00', 0x5, 0x9c, &(0x7f0000000000)=""/156, 0x0, 0x6, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000000)) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, 0x0, &(0x7f0000000700)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) socketpair(0x18, 0x0, 0x2, &(0x7f0000000000)) bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0x11, 0x7, &(0x7f0000000240)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b702000003000000850000008600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f00000006c0)='sched_switch\x00', r1}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b7030000e8ffffff850000000400000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x5, 0x4, 0x2, 0xc, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xd, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000000000000000000000850000007d00000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000010b704000000000000850000000100000095"], &(0x7f00000001c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000002c0), 0xc}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) 1.66700033s ago: executing program 3 (id=1984): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x16, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000006bf13f4c1959d219008c52095a", @ANYRES32=r1, @ANYRES16], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x16) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r2}, 0x10) socketpair(0x1, 0x2, 0x0, &(0x7f00000002c0)) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x10, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x6, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r3}, 0x10) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_clone(0x10000000, &(0x7f0000000180), 0x0, &(0x7f00000001c0), &(0x7f0000000280), 0x0) socketpair(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x89a0, &(0x7f0000000080)) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000240)) 1.612227479s ago: executing program 4 (id=1985): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000600)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000009008500000082000000"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000040)='kfree\x00', r1}, 0x10) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000012c0)={0xffffffffffffffff}) sendmsg$inet(r2, &(0x7f0000000a80)={0x0, 0x0, &(0x7f0000000b80)}, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=ANY=[@ANYBLOB], 0x48) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, 0x0, &(0x7f0000000480)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={0x0, r5}, 0x18) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000a00)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000900)={r6, 0x18000000000002a0, 0xc, 0x0, &(0x7f0000000040)="76389e147583ddd0569ba56a", 0x0, 0x0, 0x60000000, 0x0, 0x0, 0x0, 0x0}, 0x50) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r7 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x5, 0x4, 0x8, 0x5, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r7, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f00000007c0)=ANY=[@ANYRESOCT, @ANYRESOCT, @ANYRESDEC=r5, @ANYRESDEC=r7, @ANYRES16=r4, @ANYRESDEC=r2, @ANYRESDEC=r1, @ANYBLOB="48409fd5135af2ea529cbc45073c83622c76f5217122e1f7a60811b24e5a952bf4e6400f77f073bb02869abb00e7567fc430c642261a2fb7d31754be76278c85d37e0d4df7ea8b8b71ddb4a49935ec57897cfe7716d5add0ce12bf8d08d228f0990528c4c751c3f59d4946b594a6d1b199d7e93890678c4970bb308aba192112011e011ec7fcc10ad24c764de18758f0fe0c5343643cd252b4e31d5a354db36335a1"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, @void, @value}, 0x94) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='percpu_alloc_percpu\x00', r8}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x5, 0x4, 0xfff, 0x5, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r9 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000001b40)='sched_switch\x00', r9}, 0x10) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000000300)='ns/mnt\x00') syz_clone(0x10000000, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000001c0)=@base={0x7, 0x4, 0x8, 0x2, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r10 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="02000000040000000400000008"], 0x48) bpf$MAP_CREATE(0x0, &(0x7f0000000040)=@base={0xc, 0x4, 0x4, 0x3abe, 0x0, r10, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0xffffffff, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000000)='kmem_cache_free\x00', r4}, 0x10) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000340)={{r3}, &(0x7f0000000240), &(0x7f0000000300)=r4}, 0x20) 1.611420239s ago: executing program 1 (id=1986): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000600)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000009008500000082000000"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000040)='kfree\x00', r1}, 0x10) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000012c0)={0xffffffffffffffff}) sendmsg$inet(r2, &(0x7f0000000a80)={0x0, 0x0, &(0x7f0000000b80)}, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=ANY=[@ANYBLOB], 0x48) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, 0x0, &(0x7f0000000480)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={0x0, r5}, 0x18) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000a00)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000900)={r6, 0x18000000000002a0, 0xc, 0x0, &(0x7f0000000040)="76389e147583ddd0569ba56a", 0x0, 0x0, 0x60000000, 0x0, 0x0, 0x0, 0x0}, 0x50) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r7 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x5, 0x4, 0x8, 0x5, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r7, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f00000007c0)=ANY=[@ANYRESOCT, @ANYRESOCT, @ANYRESDEC=r5, @ANYRESDEC=r7, @ANYRES16=r4, @ANYRESDEC=r2, @ANYRESDEC=r1, @ANYBLOB="48409fd5135af2ea529cbc45073c83622c76f5217122e1f7a60811b24e5a952bf4e6400f77f073bb02869abb00e7567fc430c642261a2fb7d31754be76278c85d37e0d4df7ea8b8b71ddb4a49935ec57897cfe7716d5add0ce12bf8d08d228f0990528c4c751c3f59d4946b594a6d1b199d7e93890678c4970bb308aba192112011e011ec7fcc10ad24c764de18758f0fe0c5343643cd252b4e31d5a354db36335a1"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, @void, @value}, 0x94) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='percpu_alloc_percpu\x00', r8}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x5, 0x4, 0xfff, 0x5, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r9 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000001b40)='sched_switch\x00', r9}, 0x10) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000000300)='ns/mnt\x00') syz_clone(0x10000000, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000001c0)=@base={0x7, 0x4, 0x8, 0x2, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r10 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="02000000040000000400000008"], 0x48) bpf$MAP_CREATE(0x0, &(0x7f0000000040)=@base={0xc, 0x4, 0x4, 0x3abe, 0x0, r10, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0xffffffff, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000000)='kmem_cache_free\x00', r4}, 0x10) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000340)={{r3}, &(0x7f0000000240), &(0x7f0000000300)=r4}, 0x20) 1.602871139s ago: executing program 2 (id=1987): bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x7, 0x10001, 0x9, 0x1, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x3, 0x0, 0x0, &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sched_cls, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, 0x0, 0x48) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000540)='\x00') r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000b00)=ANY=[@ANYRESOCT, @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa2"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) perf_event_open(&(0x7f00000004c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x11, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1801000021000000000000004bc311ec8500000075000000850000000800000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000740)={0x1a, 0x3, &(0x7f0000000580)=ANY=[@ANYRES16=r1, @ANYBLOB="a549a6f74c9ce3c0e3b9d3dce02d1343f418279abf62d8042c7110ee6a9198684a", @ANYRESDEC=r0, @ANYRES64=r1, @ANYRES8], &(0x7f0000000340)='syzkaller\x00', 0x1, 0xc3, &(0x7f0000000180)=""/195, 0x0, 0x44, '\x00', 0x0, 0x18, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x64, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x4, 0x5, &(0x7f0000000000)=@framed={{0x18, 0x2}, [@call={0x85, 0x0, 0x0, 0x61}, @call={0x85, 0x0, 0x0, 0x7d}]}, &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x46) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000140)={0x9, 0x4, &(0x7f0000000040)=@framed={{}, [@ldst={0x1, 0x0, 0x3, 0x2, 0x1, 0x18}], {0x95, 0x0, 0x700}}, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0xc, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='signal_deliver\x00', r2}, 0x10) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8008a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xc8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x17, &(0x7f0000000440)=[@rights={{0x0, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x0, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred]}, 0x40000060) syz_open_procfs$namespace(0x0, 0xfffffffffffffffe) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f00000002c0)={0xf}, 0x8) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r4 = openat$cgroup_int(r3, &(0x7f0000000100)='cpuset.cpus\x00', 0x2, 0x0) write$cgroup_subtree(r4, &(0x7f0000000280)=ANY=[@ANYBLOB='1-2:5/', @ANYRESOCT=r4, @ANYBLOB='E'], 0x31) 1.539870479s ago: executing program 3 (id=1988): openat$ppp(0xffffffffffffff9c, 0x0, 0x1d7b00, 0x0) bpf$ENABLE_STATS(0x20, 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000840)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000080)={{}, 0x0, &(0x7f00000002c0)}, 0x20) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x52) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000700)='signal_generate\x00', r0}, 0x10) syz_open_procfs$namespace(0x0, 0xfffffffffffffffe) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="0b00000007000000010001000900000001000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="0000000000000000000000f607000000000000000000000006000000"], 0x48) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="1e00000000000000000000008100000000100000", @ANYRES32=0x1, @ANYBLOB="7000000000000000170000090000000000000000", @ANYRES32=0x0, @ANYBLOB="010000000000000001000000010000000000"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000740)={0x0, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="850020000000000018100000", @ANYRES32, @ANYBLOB="1700000000000000950000000000000045"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0xfffffffffffffde2, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'sit0\x00'}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x89f1, &(0x7f0000000080)) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000380)=ANY=[@ANYBLOB="a900cae8fe4f4ed1d0020000000000000089ea053ae923513d4aa50113"], 0x48) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xd, &(0x7f00000002c0)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000100000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000001000000850000000500000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x20, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000340)={&(0x7f0000000200)='mm_page_alloc\x00', r3}, 0x10) openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x690000, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) write$cgroup_type(r4, &(0x7f0000000180), 0x40010) ioctl$TUNSETOFFLOAD(r4, 0xc004743e, 0x20001419) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz1\x00', 0x200002, 0x0) 1.503366809s ago: executing program 3 (id=1989): bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x7, 0x10001, 0x9, 0x1, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340)={0x2, 0x4, 0x8, 0x1, 0x80, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x3, 0x0, 0x0, &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sched_cls, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, 0x0, 0x48) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000540)='\x00') r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000b00)=ANY=[@ANYRESOCT, @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa2"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) perf_event_open(&(0x7f00000004c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x11, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1801000021000000000000004bc311ec8500000075000000850000000800000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000740)={0x1a, 0x3, &(0x7f0000000580)=ANY=[@ANYRES16=r1, @ANYBLOB="a549a6f74c9ce3c0e3b9d3dce02d1343f418279abf62d8042c7110ee6a9198684a", @ANYRESDEC=r0, @ANYRES64=r1, @ANYRES8], &(0x7f0000000340)='syzkaller\x00', 0x1, 0xc3, &(0x7f0000000180)=""/195, 0x0, 0x44, '\x00', 0x0, 0x18, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x64, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x4, 0x5, &(0x7f0000000000)=@framed={{0x18, 0x2}, [@call={0x85, 0x0, 0x0, 0x61}, @call={0x85, 0x0, 0x0, 0x7d}]}, &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x46) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000140)={0x9, 0x4, &(0x7f0000000040)=@framed={{}, [@ldst={0x1, 0x0, 0x3, 0x2, 0x1, 0x18}], {0x95, 0x0, 0x700}}, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0xc, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='signal_deliver\x00', r2}, 0x10) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8008a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xc8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x17, &(0x7f0000000440)=[@rights={{0x0, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x0, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred]}, 0x40000060) syz_open_procfs$namespace(0x0, 0xfffffffffffffffe) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f00000002c0)={0xf}, 0x8) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r4 = openat$cgroup_int(r3, &(0x7f0000000100)='cpuset.cpus\x00', 0x2, 0x0) write$cgroup_subtree(r4, &(0x7f0000000280)=ANY=[@ANYBLOB='1-2:5/', @ANYRESOCT=r4, @ANYBLOB='E'], 0x31) 1.409783538s ago: executing program 1 (id=1990): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000600)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000900850000008200000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000040)='kfree\x00', r1}, 0x10) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000012c0)={0xffffffffffffffff}) sendmsg$inet(r2, &(0x7f0000000a80)={0x0, 0x0, &(0x7f0000000b80)=[{&(0x7f00000004c0)='F', 0x1}], 0x1}, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="0100000002000000e27f000001"], 0x48) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000280)=ANY=[], &(0x7f0000000480)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000000)='kmem_cache_free\x00', r4}, 0x10) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000a00)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000900)={r5, 0x18000000000002a0, 0xe40, 0x0, &(0x7f0000000040)="76389e147583ddd0569ba56a5cfd55", 0x0, 0x0, 0x60000000, 0x0, 0x0, 0x0, 0x0}, 0x50) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x5, 0x4, 0x8, 0x5, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r6, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f00000007c0)=ANY=[@ANYRESOCT, @ANYRESOCT, @ANYRESDEC=r4, @ANYRESDEC=r6, @ANYRES16=r3, @ANYRESDEC=r2, @ANYRESDEC=r1, @ANYBLOB="48409fd5135af2ea529cbc45073c83622c76f5217122e1f7a60811b24e5a952bf4e6400f77f073bb02869abb00e7567fc430c642261a2fb7d31754be76278c85d37e0d4df7ea8b8b71ddb4a49935ec57897cfe7716d5add0ce12bf8d08d228f0990528c4c751c3f59d4946b594a6d1b199d7e93890678c4970bb308aba192112011e011ec7fcc10ad24c764de18758f0fe0c5343643cd252b4e31d5a354db36335a1"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, @void, @value}, 0x94) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='percpu_alloc_percpu\x00', r7}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x5, 0x4, 0xfff, 0x5, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000001b40)='sched_switch\x00', r8}, 0x10) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000000300)='ns/mnt\x00') bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) syz_clone(0x10000000, 0x0, 0x0, 0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='blkio.bfq.time_recursive\x00', 0x275a, 0x0) r9 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="02000000040000000400000008"], 0x48) bpf$MAP_CREATE(0x0, &(0x7f0000000040)=@base={0xc, 0x4, 0x4, 0x3abe, 0x0, r9, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0xffffffff, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000000)='kmem_cache_free\x00', r3}, 0x10) 1.393228428s ago: executing program 4 (id=1991): bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16, 0x0, 0x4, 0x1, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$MAP_CREATE(0x0, 0x0, 0x48) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) r0 = syz_clone(0x20000, &(0x7f0000000000)="1a09220aaf6c1bd6fc8fa13c751260dcc083625a42e6277a552234dbc438c8a7b6", 0x21, &(0x7f0000000040), &(0x7f0000000080), &(0x7f0000000280)="3d87668efc5d577f4e20be6bc15408632356fc34aff5de63552a94d554956a385a2c800c105a36ddde72e66660eca241") bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000300)={r0, 0xffffffffffffffff, 0x0, 0x4, &(0x7f00000002c0)='.!@\x00'}, 0x30) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="170000000000"], 0x48) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000058"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8914, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value=0x2000000}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000180)='sched_switch\x00', r2}, 0x10) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x10}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xb2, 0x2, 0x0, 0x0, 0x0, 0x80000000000, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2}, 0xc42a, 0x0, 0x7, 0x5, 0x0, 0x200000}, 0x0, 0x0, 0xffffffffffffffff, 0x8) 942.884015ms ago: executing program 0 (id=1992): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xb, &(0x7f0000000180)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, @void, @value}, 0x94) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000680)='sched_switch\x00', r0}, 0x10) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x15, 0x4, 0x0, &(0x7f0000000080)) bpf$MAP_CREATE(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@union={0x0, 0x0, 0x0, 0x10, 0x1}]}}, 0x0, 0x26, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x20) sendmsg$inet(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001d80)=ANY=[@ANYBLOB="28010000000000000100000001"], 0x128}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001480)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r2, &(0x7f0000000600)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001d80)=ANY=[], 0x128}, 0x0) recvmsg$unix(r1, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000080), 0x100}, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xd, &(0x7f0000000280)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000500000018110000", @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000880)={&(0x7f0000000000)='percpu_alloc_percpu\x00', r3}, 0x10) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x1, 0x4, 0x6, 0xb, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x14, &(0x7f0000000280)=ANY=[@ANYBLOB="1800000000000000000000000000000018010000f4751f2100000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000000400000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$PROG_BIND_MAP(0xa, &(0x7f0000000380)={r5}, 0xc) bpf$PROG_LOAD(0x5, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000300)={0xffffffffffffffff}) bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x9, 0x4, 0x7fe2, 0x1, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) recvmsg$unix(r6, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) syz_clone(0x640c7000, 0x0, 0x0, 0x0, 0x0, 0x0) 937.931015ms ago: executing program 4 (id=1993): r0 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000280)={0xffffffffffffffff}, 0x4) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xd, 0x0, &(0x7f00000001c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r1 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000080)=ANY=[@ANYBLOB="9feb010018000000000000001c0000001c00000003000000010000000000000e02000000000000000000000000000005"], &(0x7f0000000240)=""/252, 0x37, 0xfc, 0x1, 0x0, 0x0, @void, @value}, 0x28) bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0xa, 0x3, &(0x7f0000008000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x0, 0x7}}, &(0x7f0000000040)='GPL\x00', 0x2, 0x1000, &(0x7f0000014000)=""/4096, 0x0, 0x0, '\x00', 0x0, @fallback, r1, 0x14, &(0x7f00000000c0)={0x0, 0x11}, 0x1, 0x10, &(0x7f0000000000), 0xa, 0x0, 0xffffffffffffffff, 0x4c, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x70) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB, @ANYRES32, @ANYBLOB="0000000000000000b7080000002000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000f00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$MAP_CREATE(0x0, 0x0, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=@base={0x9, 0x4, 0x8, 0x8, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000100000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008400000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000500)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f0000000300)='sched_switch\x00', r3}, 0x10) r4 = gettid() bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f0000000580)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x55, '\x00', 0x0, @sk_skb, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x6}, 0x8, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) perf_event_open(&(0x7f00000000c0)={0x0, 0x80, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x80}, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0xffff}, r4, 0xa, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff}) recvmsg$unix(r5, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)}, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000140)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000003480)={0x11, 0x2, &(0x7f00000001c0)=ANY=[@ANYBLOB="17010000a4fc0a000500feff"], &(0x7f0000000000)='GPL\x00', 0x6, 0x89, &(0x7f0000003300)=""/137, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x300, @void, @value}, 0x80) perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x8}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'syzkaller0\x00', 0xca58c30f81b6079f}) syz_open_procfs$namespace(0x0, &(0x7f0000000180)='ns/pid_for_children\x00') bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB, @ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00', @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/19], 0x48) 840.948055ms ago: executing program 1 (id=1994): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000100)={0x18, 0x4, &(0x7f0000000200)=@raw=[@jmp={0x4, 0x0, 0xd, 0x1, 0x0, 0x0, 0x10}, @initr0, @exit], &(0x7f00000000c0)='GPL\x00', 0x5, 0x9c, &(0x7f0000000000)=""/156, 0x0, 0x6, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000000)) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, 0x0, &(0x7f0000000700)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) socketpair(0x18, 0x0, 0x2, &(0x7f0000000000)) bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0x11, 0x7, &(0x7f0000000240)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b702000003000000850000008600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f00000006c0)='sched_switch\x00', r1}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b7030000e8ffffff850000000400000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x5, 0x4, 0x2, 0xc, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xd, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000000000000000000000850000007d00000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000010b704000000000000850000000100000095"], &(0x7f00000001c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000002c0), 0xc}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) 682.147133ms ago: executing program 2 (id=1995): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x1a, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000f6000000850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000340)={&(0x7f00000002c0)='rpcgss_upcall_msg\x00', r1, 0x0, 0x80}, 0x18) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'pim6reg1\x00', 0x2}) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000006d"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d0000001801000020696c2500000000002020207b1a"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000300)='qdisc_create\x00', r2}, 0x10) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r3, 0x8914, &(0x7f0000000140)={'pim6reg1\x00', @broadcast}) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000b00)=ANY=[], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000260018110000", @ANYRES32=r4], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) openat$cgroup(0xffffffffffffffff, &(0x7f0000000200)='syz1\x00', 0x200002, 0x0) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x18, 0x7, &(0x7f0000000540)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b702000001000000850000008600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) syz_clone(0x640c703f, 0x0, 0x0, 0x0, 0x0, 0x0) 652.733784ms ago: executing program 3 (id=1996): socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)) r0 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000180)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) recvmsg$unix(0xffffffffffffffff, 0x0, 0x0) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0xfdef) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0xf, &(0x7f0000000340)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b702000014000000b7030000010100008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000000000008500000085000000b70000000000000095"], &(0x7f0000001dc0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000080)='sched_switch\x00', r1}, 0x2d) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x3}, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000000040)='ns/cgroup\x00') bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="0500000004000000080000000c"], 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f0000000540)=ANY=[@ANYBLOB="180000000000000000000000000000001811", @ANYRES32, @ANYBLOB="0000000000000000b7020000020000008500000086000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000a80)='kfree\x00', r2}, 0x10) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.swap.events\x00', 0x275a, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000900)) mkdir(0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={0xffffffffffffffff, 0x18000000000002a0, 0x0, 0x0, &(0x7f0000000100), 0x0, 0x8, 0x60000000, 0x0, 0x0, 0x0, 0x0}, 0x50) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="8fedcb7538e475dd6317cebb03c23c00fe80000000000000875a65969ff57b0000040000000000000004"], 0xfe1b) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000740)={0x0, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="850200000000", @ANYRES32, @ANYBLOB="0000000000000000950000000000000045"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0x9, 0x4, 0x6, 0xa, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x2, 0x0, @void, @value, @void, @value}, 0x50) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000070000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000a5df850000002d00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r5 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000500)='workqueue_queue_work\x00', r5}, 0x10) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000580)={{r3}, &(0x7f0000000200), &(0x7f00000004c0)=r4}, 0x20) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000140)={0xe, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="1800000000000000000000000000000071107100000000009500000000000000"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'sit0\x00'}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x89f1, &(0x7f0000000080)) r7 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETIFF(r7, 0x400454ca, &(0x7f0000000000)={'pim6reg1\x00', 0x2}) 599.597773ms ago: executing program 1 (id=1997): bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x1900000000000000, &(0x7f0000000180)=ANY=[@ANYBLOB="1b0000000000000000002176773aa5915d09bc284bc95d63626eea82a2ecf0792581510e", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000020000850000008200000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, 0x0, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000140)='sched_switch\x00', r1}, 0x10) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r2, 0x8914, &(0x7f0000000040)={'bridge_slave_1\x00', @random="70d370117ddb"}) 298.652801ms ago: executing program 1 (id=1998): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000006c0)=@base={0x16, 0x0, 0x4, 0x1, 0x0, 0x1, 0x1, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) r1 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d0000001801000020696c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=@base={0xb, 0x5, 0x2, 0x4, 0x5, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x5, 0xc, &(0x7f0000000b00)=ANY=[@ANYBLOB="1800000000000000000000000000030018110000b632b10340931b2c1ff1acfdb1898fecf3ef3a8dd467e50ff7de23b2a90a4ed65e7b451f0fcd29b5f21d8bcab1e014bfdc57b1b274d0e64df79431362075b3024fd76d730f66da1f02065ca680ce56ac33a37a790099650754a6e88767c67f", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000060000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000030000009500000000000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0xa, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={r4, 0x2000002, 0xe, 0xffffffffffffffa0, &(0x7f0000000200)="63eced8e46dc3f0adf33c9f7b986", 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x37, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r5}, 0x10) r6 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETIFF(r6, 0x400454ca, &(0x7f0000000000)={'pim6reg1\x00', 0x1}) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000002180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r7, 0x8923, &(0x7f0000000800)={'pim6reg1\x00', @link_local={0x1, 0x35}}) r8 = bpf$MAP_CREATE(0x0, &(0x7f0000000940)=ANY=[@ANYBLOB="05003a8785e21ecb4923226492eb00005378d1f4c820fb3a04000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r8, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r9 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r10 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000100)='mm_lru_insertion\x00', r10}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000100)='mm_lru_insertion\x00', r9}, 0x10) r11 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) write$cgroup_type(r11, &(0x7f0000000180), 0x40010) r12 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r12}, 0x10) perf_event_open(&(0x7f0000000280)={0x4, 0x80, 0xb, 0x80, 0x2, 0xfb, 0x0, 0x6, 0x400, 0x9, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1c, 0x0, @perf_bp={&(0x7f0000000040), 0x1}, 0xd0, 0x9, 0x8, 0x0, 0xfffffffffffffff7, 0x6, 0xe167, 0x0, 0xe8c, 0x0, 0x2}, 0x0, 0x10, 0xffffffffffffffff, 0x8) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000740)=@bpf_ext={0x1c, 0x11, &(0x7f00000004c0)=@raw=[@ldst={0x3, 0x3, 0x1, 0x4, 0x2, 0xffffffffffffffc0, 0xfffffffffffffff0}, @initr0={0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, @generic={0xe6, 0xe, 0x9, 0xa, 0x2}, @btf_id={0x18, 0x7, 0x3, 0x0, 0x5}, @cb_func={0x18, 0x7, 0x4, 0x0, 0x1}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x3}, @map_idx={0x18, 0x2, 0x5, 0x0, 0xe}, @tail_call={{0x18, 0x2, 0x1, 0x0, r2}}, @jmp={0x5, 0x1, 0x3, 0x7, 0xb, 0x100, 0x10}], &(0x7f0000000080)='syzkaller\x00', 0x8000, 0x6f, &(0x7f0000000300)=""/111, 0x41000, 0x12, '\x00', 0x0, 0x0, r2, 0x8, 0x0, 0x0, 0x10, &(0x7f00000001c0)={0x3, 0x5, 0x9a7, 0xfffff800}, 0x10, 0x12e90, r1, 0x0, &(0x7f0000000600)=[r11, 0x1, r8, 0x1, r0], 0x0, 0x10, 0x7, @void, @value}, 0x94) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_bp={0x0}, 0xa100, 0xc8, 0xffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r14) recvmsg$unix(r13, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) 129.80235ms ago: executing program 2 (id=1999): openat$ppp(0xffffffffffffff9c, 0x0, 0x1d7b00, 0x0) bpf$ENABLE_STATS(0x20, 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000840)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000080)={{}, 0x0, &(0x7f00000002c0)}, 0x20) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x52) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000700)='signal_generate\x00', r0}, 0x10) syz_open_procfs$namespace(0x0, 0xfffffffffffffffe) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="0b00000007000000010001000900000001000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="0000000000000000000000f607000000000000000000000006000000"], 0x48) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="1e00000000000000000000008100000000100000", @ANYRES32=0x1, @ANYBLOB="7000000000000000170000090000000000000000", @ANYRES32=0x0, @ANYBLOB="010000000000000001000000010000000000"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000740)={0x0, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="850020000000000018100000", @ANYRES32, @ANYBLOB="1700000000000000950000000000000045"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0xfffffffffffffde2, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'sit0\x00'}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x89f1, &(0x7f0000000080)) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000380)=ANY=[@ANYBLOB="a900cae8fe4f4ed1d0020000000000000089ea053ae923513d4aa50113"], 0x48) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xd, &(0x7f00000002c0)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000100000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000001000000850000000500000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x20, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000340)={&(0x7f0000000200)='mm_page_alloc\x00', r3}, 0x10) openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x690000, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) write$cgroup_type(r4, &(0x7f0000000180), 0x40010) ioctl$TUNSETOFFLOAD(r4, 0xc004743e, 0x20001419) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz1\x00', 0x200002, 0x0) 74.78719ms ago: executing program 2 (id=2000): bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000680)={0xffffffffffffffff, 0xe0, &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, &(0x7f0000000340)=[0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x6, 0x1, &(0x7f0000000500)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000540)=[0x0], 0x0, 0x37, &(0x7f0000000580)=[{}, {}, {}], 0x18, 0x10, &(0x7f00000005c0), &(0x7f0000000600), 0x8, 0x40, 0x8, 0x8, &(0x7f0000000640)}}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="0700000000000000000000000000000001000000", @ANYRES32=0x1, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00d\x00\x00\x00\x00\x00'], 0x50) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r1, 0x89f0, &(0x7f0000000900)={'bridge0\x00', @random='\x00\x00\x00 \x00'}) bpf$ITER_CREATE(0x21, &(0x7f00000006c0), 0x8) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000840)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002120207b1af8ff00000000bfa100000000000007010000f8ffffffb702000004000000b7030000000000de850000000400000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000, @void, @value}, 0x94) r3 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='kmem_cache_free\x00', r2}, 0x10) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x70200, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x0, @perf_bp={0x0, 0x7}, 0x1002, 0xc8, 0xfffffffc}, 0x0, 0xfffffffffffffffe, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) close(r5) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002120207b1af8ff00000000bfa100000000000007010000f8ffffffb702000004000000b7030000000000de850000000400000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='kmem_cache_free\x00', r6}, 0x10) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x18000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_bp={0x0}, 0x10498a, 0xc8, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r8) recvmsg$unix(r7, &(0x7f0000000940)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x10}}], 0x10}, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000300)=ANY=[@ANYRESOCT], 0xfdef) close(r3) r9 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="160000000000000004000000ff"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r9, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x42, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000003c0)={{r9}, 0x0, &(0x7f0000000040)}, 0x20) r10 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000700)='signal_deliver\x00', r10}, 0x10) r11 = syz_clone(0x640c7000, 0x0, 0x2f, 0x0, 0x0, 0x0) syz_open_procfs$namespace(0x0, 0xfffffffffffffffe) recvmsg$unix(r4, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000a00)={{}, &(0x7f00000009c0), &(0x7f0000000980)='%pi6 \x00'}, 0x20) syz_open_procfs$namespace(r11, &(0x7f0000000900)='ns/uts\x00') bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x10, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="170100000000b2000500000000000000850000000f00000095"], &(0x7f0000000140)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) write$cgroup_subtree(r12, &(0x7f0000000000)=ANY=[], 0xe) 62.86581ms ago: executing program 0 (id=2001): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000600)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000009008500000082000000"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000040)='kfree\x00', r1}, 0x10) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000012c0)={0xffffffffffffffff}) sendmsg$inet(r2, &(0x7f0000000a80)={0x0, 0x0, &(0x7f0000000b80)}, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=ANY=[@ANYBLOB], 0x48) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, 0x0, &(0x7f0000000480)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={0x0, r5}, 0x18) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000a00)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000900)={r6, 0x18000000000002a0, 0xc, 0x0, &(0x7f0000000040)="76389e147583ddd0569ba56a", 0x0, 0x0, 0x60000000, 0x0, 0x0, 0x0, 0x0}, 0x50) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r7 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x5, 0x4, 0x8, 0x5, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r7, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f00000007c0)=ANY=[@ANYRESOCT, @ANYRESOCT, @ANYRESDEC=r5, @ANYRESDEC=r7, @ANYRES16=r4, @ANYRESDEC=r2, @ANYRESDEC=r1, @ANYBLOB="48409fd5135af2ea529cbc45073c83622c76f5217122e1f7a60811b24e5a952bf4e6400f77f073bb02869abb00e7567fc430c642261a2fb7d31754be76278c85d37e0d4df7ea8b8b71ddb4a49935ec57897cfe7716d5add0ce12bf8d08d228f0990528c4c751c3f59d4946b594a6d1b199d7e93890678c4970bb308aba192112011e011ec7fcc10ad24c764de18758f0fe0c5343643cd252b4e31d5a354db36335a1"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, @void, @value}, 0x94) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='percpu_alloc_percpu\x00', r8}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x5, 0x4, 0xfff, 0x5, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r9 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000001b40)='sched_switch\x00', r9}, 0x10) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000000300)='ns/mnt\x00') syz_clone(0x10000000, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000001c0)=@base={0x7, 0x4, 0x8, 0x2, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r10 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="02000000040000000400000008"], 0x48) bpf$MAP_CREATE(0x0, &(0x7f0000000040)=@base={0xc, 0x4, 0x4, 0x3abe, 0x0, r10, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0xffffffff, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000000)='kmem_cache_free\x00', r4}, 0x10) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000340)={{r3}, &(0x7f0000000240), &(0x7f0000000300)=r4}, 0x20) 398.409µs ago: executing program 3 (id=2002): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x8, 0x0, &(0x7f0000000c80)=ANY=[@ANYRES32], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x13, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r1 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000040)='kmem_cache_free\x00', r0}, 0x10) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cgroup.events\x00', 0x26e1, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000d00)=ANY=[@ANYBLOB="020000000400000006"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYRES64=r1, @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000800007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000380)=ANY=[@ANYRES32], 0x50) socketpair(0xf, 0x3, 0x2, &(0x7f00000001c0)) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000002010000850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r5 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r4}, 0x10) socketpair(0xf, 0x3, 0x2, &(0x7f0000000040)) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'syzkaller0\x00', 0xca58c30f81b6079f}) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x0, 0xc, &(0x7f00000003c0)=ANY=[@ANYRES16=r3], 0x0, 0x0, 0x0, 0x0, 0x41100, 0x14, '\x00', 0x0, @fallback=0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @void, @value}, 0x94) perf_event_open(&(0x7f0000000080)={0x5, 0x80, 0x99, 0x1, 0x0, 0x3, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc, 0x4, @perf_config_ext={0x0, 0x6}, 0x0, 0x8, 0x0, 0x8, 0x7fffffff, 0x0, 0x4, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0xb) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x0, 0x4, &(0x7f0000000040)=ANY=[@ANYRESDEC=r5], 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r6 = gettid() perf_event_open(&(0x7f0000000340)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x21, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r6, 0xafffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x8, r5, 0x1) r7 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) (fail_nth: 5) r8 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000440)={r7, 0x0, &(0x7f0000000180)=""/212}, 0x20) r9 = openat$cgroup_int(r8, &(0x7f0000000100)='cpuset.cpus\x00', 0x2, 0x0) write$cgroup_subtree(r9, &(0x7f0000000280)=ANY=[], 0x31) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000100)=ANY=[], 0x0, 0x4a, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x28) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000300)='sched_switch\x00'}, 0x10) bpf$MAP_CREATE(0x2000000000000000, &(0x7f0000000140)=ANY=[], 0x48) 0s ago: executing program 1 (id=2003): r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x7, 0x10002, 0x9, 0x1, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x0, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x7}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r1, &(0x7f0000000080), &(0x7f0000000200)=""/166}, 0x20) (async, rerun: 64) bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) (rerun: 64) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000040)='mm_page_alloc\x00', r2}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000680)={0x0, 0x0, 0x0, 0x0, 0x0, 0x5d, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x800084}, 0xfffffffffffffea9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) (async) ioctl$TUNSETOFFLOAD(r0, 0xc004743e, 0x20001400) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.controllers\x00', 0x26e1, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) (async) r4 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000000c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x0, '\x00', 0x0, r3, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$MAP_LOOKUP_ELEM(0x5, &(0x7f00000000c0)={r4, &(0x7f0000000000), &(0x7f0000000040)=""/73}, 0x70) ioctl$TUNSETOFFLOAD(r0, 0x40047451, 0x2000000c) kernel console output (not intermixed with test programs): Warning: Permanently added '10.128.0.146' (ED25519) to the list of known hosts. [ 20.402438][ T24] audit: type=1400 audit(1738077563.530:66): avc: denied { mounton } for pid=274 comm="syz-executor" path="/syzcgroup/unified" dev="sda1" ino=1925 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 20.403424][ T274] cgroup: Unknown subsys name 'net' [ 20.424911][ T24] audit: type=1400 audit(1738077563.530:67): avc: denied { mount } for pid=274 comm="syz-executor" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 20.451760][ T24] audit: type=1400 audit(1738077563.560:68): avc: denied { unmount } for pid=274 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 20.451944][ T274] cgroup: Unknown subsys name 'devices' [ 20.687142][ T274] cgroup: Unknown subsys name 'hugetlb' [ 20.692545][ T274] cgroup: Unknown subsys name 'rlimit' [ 20.889629][ T24] audit: type=1400 audit(1738077564.020:69): avc: denied { setattr } for pid=274 comm="syz-executor" name="raw-gadget" dev="devtmpfs" ino=249 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 20.912591][ T24] audit: type=1400 audit(1738077564.020:70): avc: denied { mounton } for pid=274 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1 Setting up swapspace version 1, size = 127995904 bytes [ 20.919739][ T277] SELinux: Context root:object_r:swapfile_t is not valid (left unmapped). [ 20.937353][ T24] audit: type=1400 audit(1738077564.020:71): avc: denied { mount } for pid=274 comm="syz-executor" name="/" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=filesystem permissive=1 [ 20.968401][ T24] audit: type=1400 audit(1738077564.070:72): avc: denied { relabelto } for pid=277 comm="mkswap" name="swap-file" dev="sda1" ino=1928 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 20.968411][ T274] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 21.002070][ T24] audit: type=1400 audit(1738077564.070:73): avc: denied { write } for pid=277 comm="mkswap" path="/root/swap-file" dev="sda1" ino=1928 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 21.027431][ T24] audit: type=1400 audit(1738077564.070:74): avc: denied { read } for pid=274 comm="syz-executor" name="swap-file" dev="sda1" ino=1928 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 21.052660][ T24] audit: type=1400 audit(1738077564.070:75): avc: denied { open } for pid=274 comm="syz-executor" path="/root/swap-file" dev="sda1" ino=1928 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 21.459522][ T283] bridge0: port 1(bridge_slave_0) entered blocking state [ 21.466524][ T283] bridge0: port 1(bridge_slave_0) entered disabled state [ 21.473589][ T283] device bridge_slave_0 entered promiscuous mode [ 21.482007][ T283] bridge0: port 2(bridge_slave_1) entered blocking state [ 21.488851][ T283] bridge0: port 2(bridge_slave_1) entered disabled state [ 21.496029][ T283] device bridge_slave_1 entered promiscuous mode [ 21.549351][ T284] bridge0: port 1(bridge_slave_0) entered blocking state [ 21.556211][ T284] bridge0: port 1(bridge_slave_0) entered disabled state [ 21.563260][ T284] device bridge_slave_0 entered promiscuous mode [ 21.571057][ T284] bridge0: port 2(bridge_slave_1) entered blocking state [ 21.577914][ T284] bridge0: port 2(bridge_slave_1) entered disabled state [ 21.585088][ T284] device bridge_slave_1 entered promiscuous mode [ 21.614355][ T286] bridge0: port 1(bridge_slave_0) entered blocking state [ 21.621231][ T286] bridge0: port 1(bridge_slave_0) entered disabled state [ 21.628540][ T286] device bridge_slave_0 entered promiscuous mode [ 21.635085][ T286] bridge0: port 2(bridge_slave_1) entered blocking state [ 21.642022][ T286] bridge0: port 2(bridge_slave_1) entered disabled state [ 21.649024][ T286] device bridge_slave_1 entered promiscuous mode [ 21.698173][ T285] bridge0: port 1(bridge_slave_0) entered blocking state [ 21.705011][ T285] bridge0: port 1(bridge_slave_0) entered disabled state [ 21.712201][ T285] device bridge_slave_0 entered promiscuous mode [ 21.720811][ T285] bridge0: port 2(bridge_slave_1) entered blocking state [ 21.727658][ T285] bridge0: port 2(bridge_slave_1) entered disabled state [ 21.734808][ T285] device bridge_slave_1 entered promiscuous mode [ 21.759458][ T287] bridge0: port 1(bridge_slave_0) entered blocking state [ 21.766392][ T287] bridge0: port 1(bridge_slave_0) entered disabled state [ 21.773472][ T287] device bridge_slave_0 entered promiscuous mode [ 21.781948][ T287] bridge0: port 2(bridge_slave_1) entered blocking state [ 21.788899][ T287] bridge0: port 2(bridge_slave_1) entered disabled state [ 21.796000][ T287] device bridge_slave_1 entered promiscuous mode [ 21.859942][ T283] bridge0: port 2(bridge_slave_1) entered blocking state [ 21.866807][ T283] bridge0: port 2(bridge_slave_1) entered forwarding state [ 21.873869][ T283] bridge0: port 1(bridge_slave_0) entered blocking state [ 21.880687][ T283] bridge0: port 1(bridge_slave_0) entered forwarding state [ 21.901216][ T284] bridge0: port 2(bridge_slave_1) entered blocking state [ 21.908074][ T284] bridge0: port 2(bridge_slave_1) entered forwarding state [ 21.915135][ T284] bridge0: port 1(bridge_slave_0) entered blocking state [ 21.921964][ T284] bridge0: port 1(bridge_slave_0) entered forwarding state [ 21.946319][ T286] bridge0: port 2(bridge_slave_1) entered blocking state [ 21.953152][ T286] bridge0: port 2(bridge_slave_1) entered forwarding state [ 21.960260][ T286] bridge0: port 1(bridge_slave_0) entered blocking state [ 21.967048][ T286] bridge0: port 1(bridge_slave_0) entered forwarding state [ 21.978842][ T285] bridge0: port 2(bridge_slave_1) entered blocking state [ 21.985684][ T285] bridge0: port 2(bridge_slave_1) entered forwarding state [ 21.992748][ T285] bridge0: port 1(bridge_slave_0) entered blocking state [ 21.999593][ T285] bridge0: port 1(bridge_slave_0) entered forwarding state [ 22.011704][ T49] bridge0: port 1(bridge_slave_0) entered disabled state [ 22.018732][ T49] bridge0: port 2(bridge_slave_1) entered disabled state [ 22.025778][ T49] bridge0: port 1(bridge_slave_0) entered disabled state [ 22.032729][ T49] bridge0: port 2(bridge_slave_1) entered disabled state [ 22.040018][ T49] bridge0: port 1(bridge_slave_0) entered disabled state [ 22.047123][ T49] bridge0: port 2(bridge_slave_1) entered disabled state [ 22.054119][ T49] bridge0: port 1(bridge_slave_0) entered disabled state [ 22.061074][ T49] bridge0: port 2(bridge_slave_1) entered disabled state [ 22.068506][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 22.075686][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 22.106761][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 22.114437][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 22.121957][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 22.130328][ T49] bridge0: port 1(bridge_slave_0) entered blocking state [ 22.137180][ T49] bridge0: port 1(bridge_slave_0) entered forwarding state [ 22.144763][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 22.152887][ T49] bridge0: port 2(bridge_slave_1) entered blocking state [ 22.159729][ T49] bridge0: port 2(bridge_slave_1) entered forwarding state [ 22.166841][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 22.174454][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 22.182443][ T49] bridge0: port 1(bridge_slave_0) entered blocking state [ 22.189281][ T49] bridge0: port 1(bridge_slave_0) entered forwarding state [ 22.196475][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 22.204363][ T49] bridge0: port 2(bridge_slave_1) entered blocking state [ 22.211124][ T49] bridge0: port 2(bridge_slave_1) entered forwarding state [ 22.222055][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 22.230066][ T49] bridge0: port 1(bridge_slave_0) entered blocking state [ 22.236896][ T49] bridge0: port 1(bridge_slave_0) entered forwarding state [ 22.244060][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 22.253167][ T49] bridge0: port 2(bridge_slave_1) entered blocking state [ 22.260016][ T49] bridge0: port 2(bridge_slave_1) entered forwarding state [ 22.274267][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 22.292125][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 22.299903][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 22.308169][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 22.317207][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 22.331105][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 22.338275][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 22.346285][ T49] bridge0: port 1(bridge_slave_0) entered blocking state [ 22.353096][ T49] bridge0: port 1(bridge_slave_0) entered forwarding state [ 22.360586][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 22.368535][ T49] bridge0: port 1(bridge_slave_0) entered blocking state [ 22.375344][ T49] bridge0: port 1(bridge_slave_0) entered forwarding state [ 22.382636][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 22.390570][ T49] bridge0: port 2(bridge_slave_1) entered blocking state [ 22.397399][ T49] bridge0: port 2(bridge_slave_1) entered forwarding state [ 22.404569][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 22.426963][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 22.434942][ T49] bridge0: port 2(bridge_slave_1) entered blocking state [ 22.441781][ T49] bridge0: port 2(bridge_slave_1) entered forwarding state [ 22.449604][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 22.457804][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 22.465455][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 22.473338][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 22.489148][ T286] device veth0_vlan entered promiscuous mode [ 22.496738][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 22.504602][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 22.511905][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 22.519557][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 22.527798][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 22.542108][ T283] device veth0_vlan entered promiscuous mode [ 22.548908][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 22.557050][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 22.565055][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 22.573019][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 22.581083][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 22.588316][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 22.603633][ T287] device veth0_vlan entered promiscuous mode [ 22.611011][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 22.619004][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 22.627064][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 22.635064][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 22.643932][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 22.652275][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 22.660506][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 22.668259][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 22.676191][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 22.683347][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 22.696194][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 22.704319][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 22.712424][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 22.720252][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 22.727998][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 22.735174][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 22.745240][ T286] device veth1_macvtap entered promiscuous mode [ 22.751608][ T284] device veth0_vlan entered promiscuous mode [ 22.760242][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 22.767969][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 22.776038][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 22.783928][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 22.792052][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 22.802006][ T285] device veth0_vlan entered promiscuous mode [ 22.810317][ T283] device veth1_macvtap entered promiscuous mode [ 22.818056][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 22.825439][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 22.833345][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 22.841261][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 22.848680][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 22.857672][ T287] device veth1_macvtap entered promiscuous mode [ 22.871109][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 22.878580][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 22.887070][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 22.895073][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 22.903132][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 22.911354][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 22.919396][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 22.927519][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 22.935406][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 22.949825][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 22.957916][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 22.966229][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 22.974346][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 22.988287][ T285] device veth1_macvtap entered promiscuous mode [ 22.996922][ T284] device veth1_macvtap entered promiscuous mode [ 23.004915][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 23.005282][ T287] request_module fs-gadgetfs succeeded, but still no fs? [ 23.013250][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 23.027840][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 23.036212][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 23.044029][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 23.052486][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 23.068657][ T307] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 23.076664][ T307] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 23.085367][ T287] cgroup: cgroup: disabling cgroup2 socket matching due to net_prio or net_cls activation [ 23.097972][ T307] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 23.109909][ T307] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 23.118287][ T307] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 23.126795][ T307] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 23.134894][ T307] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 23.143689][ T307] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 23.385668][ C1] hrtimer: interrupt took 27328 ns [ 24.238479][ T382] device wg2 entered promiscuous mode [ 24.264329][ T378] device wg2 entered promiscuous mode [ 25.601650][ T24] kauditd_printk_skb: 42 callbacks suppressed [ 25.601661][ T24] audit: type=1400 audit(1738077568.730:118): avc: denied { write } for pid=421 comm="syz.0.39" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=1 [ 26.243420][ T440] ÿÿÿÿÿÿ: renamed from vlan1 [ 26.483142][ T461] device wg2 entered promiscuous mode [ 26.669397][ T470] FAULT_INJECTION: forcing a failure. [ 26.669397][ T470] name fail_usercopy, interval 1, probability 0, space 0, times 1 [ 26.830877][ T470] CPU: 1 PID: 470 Comm: syz.2.54 Not tainted 5.10.233-syzkaller-00881-gfbe98d68b6b3 #0 [ 26.840325][ T470] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 12/27/2024 [ 26.850229][ T470] Call Trace: [ 26.853361][ T470] dump_stack_lvl+0x1e2/0x24b [ 26.857859][ T470] ? bfq_pos_tree_add_move+0x43b/0x43b [ 26.863157][ T470] ? is_bpf_text_address+0x172/0x190 [ 26.868273][ T470] dump_stack+0x15/0x17 [ 26.872266][ T470] should_fail+0x3c6/0x510 [ 26.876519][ T470] should_fail_usercopy+0x1a/0x20 [ 26.881475][ T470] _copy_from_user+0x20/0xd0 [ 26.885902][ T470] __se_sys_bpf+0x232/0x11cb0 [ 26.890419][ T470] ? stack_trace_save+0x113/0x1c0 [ 26.895278][ T470] ? terminate_walk+0x407/0x4f0 [ 26.899967][ T470] ? stack_trace_snprint+0xf0/0xf0 [ 26.904911][ T470] ? kmem_cache_free+0xa9/0x1e0 [ 26.909595][ T470] ? kmem_cache_free+0xa9/0x1e0 [ 26.914282][ T470] ? kasan_set_track+0x5d/0x70 [ 26.918879][ T470] ? __x64_sys_bpf+0x90/0x90 [ 26.923306][ T470] ? __kasan_slab_free+0x11/0x20 [ 26.928080][ T470] ? slab_free_freelist_hook+0xc0/0x190 [ 26.933461][ T470] ? kmem_cache_free+0xa9/0x1e0 [ 26.938147][ T470] ? putname+0xe7/0x140 [ 26.942142][ T470] ? do_sys_openat2+0x1fc/0x710 [ 26.946829][ T470] ? __x64_sys_openat+0x243/0x290 [ 26.951685][ T470] ? do_syscall_64+0x34/0x70 [ 26.956114][ T470] ? _kstrtoull+0x3a0/0x4a0 [ 26.960461][ T470] ? kstrtouint_from_user+0x20a/0x2a0 [ 26.965664][ T470] ? kstrtol_from_user+0x310/0x310 [ 26.970610][ T470] ? memset+0x35/0x40 [ 26.974430][ T470] ? __fsnotify_parent+0x4b9/0x6c0 [ 26.979376][ T470] ? fsnotify_set_children_dentry_flags+0x210/0x210 [ 26.985804][ T470] ? proc_fail_nth_write+0x20b/0x290 [ 26.990920][ T470] ? proc_fail_nth_read+0x210/0x210 [ 26.995978][ T470] ? security_file_permission+0x86/0xb0 [ 27.001333][ T470] ? rw_verify_area+0x1c3/0x360 [ 27.006021][ T470] ? preempt_count_add+0x92/0x1a0 [ 27.010880][ T470] ? vfs_write+0x852/0xe70 [ 27.015133][ T470] ? kmem_cache_free+0xa9/0x1e0 [ 27.019818][ T470] ? kernel_write+0x3d0/0x3d0 [ 27.024331][ T470] ? __kasan_check_write+0x14/0x20 [ 27.029282][ T470] ? mutex_lock+0xa5/0x110 [ 27.033534][ T470] ? mutex_trylock+0xa0/0xa0 [ 27.037971][ T470] ? __kasan_check_write+0x14/0x20 [ 27.042907][ T470] ? fput_many+0x160/0x1b0 [ 27.047165][ T470] ? debug_smp_processor_id+0x17/0x20 [ 27.052365][ T470] __x64_sys_bpf+0x7b/0x90 [ 27.056618][ T470] do_syscall_64+0x34/0x70 [ 27.060873][ T470] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 27.066599][ T470] RIP: 0033:0x7f659f7b5da9 [ 27.070853][ T470] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 27.090294][ T470] RSP: 002b:00007f659de20038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 27.098535][ T470] RAX: ffffffffffffffda RBX: 00007f659f9cefa0 RCX: 00007f659f7b5da9 [ 27.106352][ T470] RDX: 0000000000000080 RSI: 0000000020000340 RDI: 0000000000000005 [ 27.114165][ T470] RBP: 00007f659de20090 R08: 0000000000000000 R09: 0000000000000000 [ 27.121973][ T470] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 27.129796][ T470] R13: 0000000000000001 R14: 00007f659f9cefa0 R15: 00007ffe17b03a18 [ 27.527635][ T24] audit: type=1400 audit(1738077570.650:119): avc: denied { create } for pid=484 comm="syz.2.59" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 27.624429][ T502] device veth1_macvtap left promiscuous mode [ 27.718377][ T518] device wg2 entered promiscuous mode [ 27.753082][ T24] audit: type=1400 audit(1738077570.880:120): avc: denied { create } for pid=522 comm="syz.0.75" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 27.922844][ T524] cgroup: syz.0.75 (524) created nested cgroup for controller "memory" which has incomplete hierarchy support. Nested cgroups may change behavior in the future. [ 27.940152][ T524] cgroup: "memory" requires setting use_hierarchy to 1 on the root [ 29.703094][ T601] FAULT_INJECTION: forcing a failure. [ 29.703094][ T601] name failslab, interval 1, probability 0, space 0, times 1 [ 29.716120][ T601] CPU: 1 PID: 601 Comm: syz.0.101 Not tainted 5.10.233-syzkaller-00881-gfbe98d68b6b3 #0 [ 29.725646][ T601] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 12/27/2024 [ 29.735540][ T601] Call Trace: [ 29.738709][ T601] dump_stack_lvl+0x1e2/0x24b [ 29.743171][ T601] ? panic+0x812/0x812 [ 29.747077][ T601] ? mutex_lock+0xa5/0x110 [ 29.751330][ T601] ? bfq_pos_tree_add_move+0x43b/0x43b [ 29.756627][ T601] dump_stack+0x15/0x17 [ 29.760619][ T601] should_fail+0x3c6/0x510 [ 29.764873][ T601] ? getname_flags+0xba/0x520 [ 29.769393][ T601] __should_failslab+0xa4/0xe0 [ 29.773993][ T601] should_failslab+0x9/0x20 [ 29.778333][ T601] kmem_cache_alloc+0x3d/0x2e0 [ 29.782931][ T601] getname_flags+0xba/0x520 [ 29.787266][ T601] __x64_sys_unlink+0x3c/0x50 [ 29.791774][ T601] do_syscall_64+0x34/0x70 [ 29.796024][ T601] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 29.801753][ T601] RIP: 0033:0x7f9a75babda9 [ 29.806005][ T601] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 29.825444][ T601] RSP: 002b:00007f9a74216038 EFLAGS: 00000246 ORIG_RAX: 0000000000000057 [ 29.833689][ T601] RAX: ffffffffffffffda RBX: 00007f9a75dc4fa0 RCX: 00007f9a75babda9 [ 29.841500][ T601] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 29.849311][ T601] RBP: 00007f9a74216090 R08: 0000000000000000 R09: 0000000000000000 [ 29.857122][ T601] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 29.864933][ T601] R13: 0000000000000000 R14: 00007f9a75dc4fa0 R15: 00007fff5c18dea8 [ 30.080966][ T626] bridge0: port 2(bridge_slave_1) entered disabled state [ 30.457981][ T641] device pim6reg1 entered promiscuous mode [ 30.470602][ T24] audit: type=1400 audit(1738077573.600:121): avc: denied { ioctl } for pid=643 comm="syz.0.120" path="socket:[15325]" dev="sockfs" ino=15325 ioctlcmd=0x8914 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 30.771601][ T672] device pim6reg1 entered promiscuous mode [ 30.822991][ T687] device pim6reg1 entered promiscuous mode [ 31.969007][ T702] FAULT_INJECTION: forcing a failure. [ 31.969007][ T702] name failslab, interval 1, probability 0, space 0, times 0 [ 31.981602][ T702] CPU: 0 PID: 702 Comm: syz.2.143 Not tainted 5.10.233-syzkaller-00881-gfbe98d68b6b3 #0 [ 31.991117][ T702] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 12/27/2024 [ 32.001012][ T702] Call Trace: [ 32.004147][ T702] dump_stack_lvl+0x1e2/0x24b [ 32.008663][ T702] ? bfq_pos_tree_add_move+0x43b/0x43b [ 32.013952][ T702] dump_stack+0x15/0x17 [ 32.017935][ T702] should_fail+0x3c6/0x510 [ 32.022207][ T702] ? kvasprintf_const+0x13b/0x190 [ 32.027056][ T702] __should_failslab+0xa4/0xe0 [ 32.031769][ T702] should_failslab+0x9/0x20 [ 32.036094][ T702] __kmalloc_track_caller+0x5f/0x320 [ 32.041214][ T702] ? xdp_reg_mem_model+0x40/0x40 [ 32.045988][ T702] kstrdup_const+0x55/0x90 [ 32.050242][ T702] kvasprintf_const+0x13b/0x190 [ 32.054927][ T702] kobject_set_name_vargs+0x61/0x120 [ 32.060047][ T702] dev_set_name+0xd1/0x120 [ 32.064299][ T702] ? __hrtimer_init+0x17c/0x260 [ 32.068984][ T702] ? __hrtimer_init+0x16d/0x260 [ 32.073672][ T702] ? get_device+0x30/0x30 [ 32.077836][ T702] ? hrtimer_init+0x33/0x160 [ 32.082263][ T702] ? pm_runtime_init+0x275/0x350 [ 32.087036][ T702] ? device_initialize+0x1e1/0x420 [ 32.091985][ T702] netdev_register_kobject+0xb2/0x320 [ 32.097193][ T702] ? raw_notifier_call_chain+0xdf/0xf0 [ 32.102485][ T702] register_netdevice+0xe9b/0x13f0 [ 32.107435][ T702] ? __kasan_kmalloc+0x9/0x10 [ 32.111946][ T702] ? netif_stacked_transfer_operstate+0x240/0x240 [ 32.118194][ T702] ? alloc_netdev_mqs+0xa0f/0xcd0 [ 32.123056][ T702] tun_set_iff+0x816/0xdb0 [ 32.127311][ T702] __tun_chr_ioctl+0x8b3/0x2260 [ 32.131994][ T702] ? tun_flow_create+0x320/0x320 [ 32.136771][ T702] ? __fget_files+0x31e/0x380 [ 32.141282][ T702] tun_chr_ioctl+0x2a/0x40 [ 32.145531][ T702] ? tun_chr_poll+0x670/0x670 [ 32.150049][ T702] __se_sys_ioctl+0x114/0x190 [ 32.154564][ T702] __x64_sys_ioctl+0x7b/0x90 [ 32.158987][ T702] do_syscall_64+0x34/0x70 [ 32.163244][ T702] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 32.168968][ T702] RIP: 0033:0x7f659f7b5da9 [ 32.173222][ T702] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 32.192665][ T702] RSP: 002b:00007f659de20038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 32.200904][ T702] RAX: ffffffffffffffda RBX: 00007f659f9cefa0 RCX: 00007f659f7b5da9 [ 32.208716][ T702] RDX: 0000000020000000 RSI: 00000000400454ca RDI: 0000000000000006 [ 32.216526][ T702] RBP: 00007f659de20090 R08: 0000000000000000 R09: 0000000000000000 [ 32.224339][ T702] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 32.232151][ T702] R13: 0000000000000000 R14: 00007f659f9cefa0 R15: 00007ffe17b03a18 [ 32.748523][ T734] FAULT_INJECTION: forcing a failure. [ 32.748523][ T734] name fail_page_alloc, interval 1, probability 0, space 0, times 1 [ 32.848031][ T734] CPU: 0 PID: 734 Comm: syz.4.153 Not tainted 5.10.233-syzkaller-00881-gfbe98d68b6b3 #0 [ 32.857559][ T734] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 12/27/2024 [ 32.867455][ T734] Call Trace: [ 32.870589][ T734] dump_stack_lvl+0x1e2/0x24b [ 32.875094][ T734] ? bfq_pos_tree_add_move+0x43b/0x43b [ 32.880389][ T734] dump_stack+0x15/0x17 [ 32.884382][ T734] should_fail+0x3c6/0x510 [ 32.888641][ T734] should_fail_alloc_page+0x52/0x60 [ 32.893667][ T734] __alloc_pages_nodemask+0x1b3/0xaf0 [ 32.898874][ T734] ? irq_exit_rcu+0x9/0x10 [ 32.903128][ T734] ? gfp_pfmemalloc_allowed+0x120/0x120 [ 32.908514][ T734] ? avc_lookup+0x32/0x2f0 [ 32.912761][ T734] ? avc_has_perm_noaudit+0x117/0x240 [ 32.917973][ T734] shmem_alloc_page+0x257/0x420 [ 32.922654][ T734] ? put_page+0xd0/0xd0 [ 32.926652][ T734] ? percpu_counter_add_batch+0x13d/0x160 [ 32.932204][ T734] shmem_alloc_and_acct_page+0x395/0x8e0 [ 32.937673][ T734] ? shmem_swapin_page+0x1950/0x1950 [ 32.942798][ T734] ? __irq_exit_rcu+0x40/0x150 [ 32.947392][ T734] ? irq_exit_rcu+0x9/0x10 [ 32.951642][ T734] ? sysvec_apic_timer_interrupt+0xcb/0xe0 [ 32.957286][ T734] ? asm_sysvec_apic_timer_interrupt+0x12/0x20 [ 32.963274][ T734] ? find_get_entry+0x163/0x4c0 [ 32.967961][ T734] ? find_lock_entry+0x3e/0x200 [ 32.972651][ T734] ? find_lock_entry+0x1da/0x200 [ 32.977509][ T734] ? find_lock_entry+0x1df/0x200 [ 32.982281][ T734] shmem_getpage_gfp+0x891/0x2480 [ 32.987144][ T734] ? __kasan_check_write+0x14/0x20 [ 32.992092][ T734] ? shmem_getpage+0xa0/0xa0 [ 32.996513][ T734] ? iov_iter_fault_in_readable+0x31f/0x4f0 [ 33.002246][ T734] shmem_write_begin+0xca/0x1b0 [ 33.006932][ T734] generic_perform_write+0x2cd/0x570 [ 33.012051][ T734] ? __mark_inode_dirty+0x3a6/0x9d0 [ 33.017086][ T734] ? grab_cache_page_write_begin+0xa0/0xa0 [ 33.022730][ T734] ? file_remove_privs+0x570/0x570 [ 33.027679][ T734] ? generic_file_write_iter+0x9f/0x1c0 [ 33.033058][ T734] __generic_file_write_iter+0x23c/0x560 [ 33.038532][ T734] ? generic_write_checks+0x3b9/0x470 [ 33.043733][ T734] generic_file_write_iter+0xaf/0x1c0 [ 33.048941][ T734] vfs_write+0xb4c/0xe70 [ 33.053017][ T734] ? __hrtimer_run_queues+0x438/0xa50 [ 33.058226][ T734] ? kernel_write+0x3d0/0x3d0 [ 33.062738][ T734] ? mutex_trylock+0xa0/0xa0 [ 33.067170][ T734] ? __fdget_pos+0x2e7/0x3a0 [ 33.071587][ T734] ? ksys_write+0x77/0x2c0 [ 33.075839][ T734] ksys_write+0x199/0x2c0 [ 33.080015][ T734] ? kvm_sched_clock_read+0x18/0x40 [ 33.085045][ T734] ? __ia32_sys_read+0x90/0x90 [ 33.089649][ T734] ? debug_smp_processor_id+0x17/0x20 [ 33.094853][ T734] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 33.100758][ T734] __x64_sys_write+0x7b/0x90 [ 33.105187][ T734] do_syscall_64+0x34/0x70 [ 33.109438][ T734] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 33.115164][ T734] RIP: 0033:0x7f23cd486da9 [ 33.119411][ T734] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 33.138853][ T734] RSP: 002b:00007f23cbaf1038 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 33.147101][ T734] RAX: ffffffffffffffda RBX: 00007f23cd69ffa0 RCX: 00007f23cd486da9 [ 33.154904][ T734] RDX: 0000000000040001 RSI: 0000000020000180 RDI: 000000000000000a [ 33.162718][ T734] RBP: 00007f23cbaf1090 R08: 0000000000000000 R09: 0000000000000000 [ 33.170528][ T734] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 33.178347][ T734] R13: 0000000000000000 R14: 00007f23cd69ffa0 R15: 00007fffe85a0458 [ 33.256853][ T763] device pim6reg1 entered promiscuous mode [ 33.335520][ T24] audit: type=1400 audit(1738077576.460:122): avc: denied { read write } for pid=771 comm="syz.1.166" name="cgroup.subtree_control" dev="cgroup2" ino=197 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 [ 33.495733][ T24] audit: type=1400 audit(1738077576.460:123): avc: denied { open } for pid=771 comm="syz.1.166" path="" dev="cgroup2" ino=197 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 [ 33.577676][ T789] FAULT_INJECTION: forcing a failure. [ 33.577676][ T789] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 33.713403][ T789] CPU: 1 PID: 789 Comm: syz.2.171 Not tainted 5.10.233-syzkaller-00881-gfbe98d68b6b3 #0 [ 33.722939][ T789] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 12/27/2024 [ 33.732828][ T789] Call Trace: [ 33.735963][ T789] dump_stack_lvl+0x1e2/0x24b [ 33.740476][ T789] ? bfq_pos_tree_add_move+0x43b/0x43b [ 33.745762][ T789] ? 0xffffffffa00189b8 [ 33.747026][ T791] device syzkaller0 entered promiscuous mode [ 33.749759][ T789] ? is_bpf_text_address+0x172/0x190 [ 33.749770][ T789] dump_stack+0x15/0x17 [ 33.749787][ T789] should_fail+0x3c6/0x510 [ 33.768950][ T789] should_fail_usercopy+0x1a/0x20 [ 33.773800][ T789] _copy_from_user+0x20/0xd0 [ 33.778229][ T789] __se_sys_bpf+0x232/0x11cb0 [ 33.782738][ T789] ? stack_trace_save+0x113/0x1c0 [ 33.787610][ T789] ? terminate_walk+0x407/0x4f0 [ 33.792288][ T789] ? stack_trace_snprint+0xf0/0xf0 [ 33.797240][ T789] ? kmem_cache_free+0xa9/0x1e0 [ 33.801922][ T789] ? kmem_cache_free+0xa9/0x1e0 [ 33.806606][ T789] ? kasan_set_track+0x5d/0x70 [ 33.811208][ T789] ? __x64_sys_bpf+0x90/0x90 [ 33.815641][ T789] ? __kasan_slab_free+0x11/0x20 [ 33.820415][ T789] ? slab_free_freelist_hook+0xc0/0x190 [ 33.825800][ T789] ? kmem_cache_free+0xa9/0x1e0 [ 33.830480][ T789] ? putname+0xe7/0x140 [ 33.834468][ T789] ? do_sys_openat2+0x1fc/0x710 [ 33.839156][ T789] ? __x64_sys_openat+0x243/0x290 [ 33.844013][ T789] ? do_syscall_64+0x34/0x70 [ 33.848443][ T789] ? _kstrtoull+0x3a0/0x4a0 [ 33.852781][ T789] ? kstrtouint_from_user+0x20a/0x2a0 [ 33.857989][ T789] ? kstrtol_from_user+0x310/0x310 [ 33.862933][ T789] ? memset+0x35/0x40 [ 33.866760][ T789] ? __fsnotify_parent+0x4b9/0x6c0 [ 33.871706][ T789] ? fsnotify_set_children_dentry_flags+0x210/0x210 [ 33.878127][ T789] ? proc_fail_nth_write+0x20b/0x290 [ 33.883247][ T789] ? proc_fail_nth_read+0x210/0x210 [ 33.888287][ T789] ? security_file_permission+0x86/0xb0 [ 33.893659][ T789] ? rw_verify_area+0x1c3/0x360 [ 33.898345][ T789] ? preempt_count_add+0x92/0x1a0 [ 33.903207][ T789] ? vfs_write+0x852/0xe70 [ 33.907460][ T789] ? kmem_cache_free+0xa9/0x1e0 [ 33.912151][ T789] ? kernel_write+0x3d0/0x3d0 [ 33.916662][ T789] ? __kasan_check_write+0x14/0x20 [ 33.921605][ T789] ? mutex_lock+0xa5/0x110 [ 33.925858][ T789] ? mutex_trylock+0xa0/0xa0 [ 33.930284][ T789] ? __kasan_check_write+0x14/0x20 [ 33.935229][ T789] ? fput_many+0x160/0x1b0 [ 33.939488][ T789] ? debug_smp_processor_id+0x17/0x20 [ 33.944690][ T789] __x64_sys_bpf+0x7b/0x90 [ 33.948946][ T789] do_syscall_64+0x34/0x70 [ 33.953198][ T789] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 33.958922][ T789] RIP: 0033:0x7f659f7b5da9 [ 33.963178][ T789] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 33.982620][ T789] RSP: 002b:00007f659de20038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 33.990864][ T789] RAX: ffffffffffffffda RBX: 00007f659f9cefa0 RCX: 00007f659f7b5da9 [ 33.998673][ T789] RDX: 000000000000000c RSI: 00000000200004c0 RDI: 000000000000000a [ 34.006483][ T789] RBP: 00007f659de20090 R08: 0000000000000000 R09: 0000000000000000 [ 34.014295][ T789] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 34.022108][ T789] R13: 0000000000000000 R14: 00007f659f9cefa0 R15: 00007ffe17b03a18 [ 34.060914][ T799] syz.4.174[799] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 34.060993][ T799] syz.4.174[799] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 34.158497][ T806] device pim6reg1 entered promiscuous mode [ 34.187186][ T804] bridge0: port 2(bridge_slave_1) entered disabled state [ 34.194151][ T804] bridge0: port 1(bridge_slave_0) entered disabled state [ 34.205493][ T804] device bridge_slave_1 left promiscuous mode [ 34.211692][ T804] bridge0: port 2(bridge_slave_1) entered disabled state [ 34.219352][ T804] device bridge_slave_0 left promiscuous mode [ 34.225343][ T804] bridge0: port 1(bridge_slave_0) entered disabled state [ 34.989699][ T838] syz.2.188[838] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 34.989752][ T838] syz.2.188[838] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 35.746020][ T866] ªªªªªª: renamed from vlan0 [ 36.133832][ T877] device pim6reg1 entered promiscuous mode [ 36.151477][ T882] device sit0 entered promiscuous mode [ 36.203401][ T888] device wg2 left promiscuous mode [ 36.238144][ T888] device wg2 entered promiscuous mode [ 36.379103][ T908] FAULT_INJECTION: forcing a failure. [ 36.379103][ T908] name failslab, interval 1, probability 0, space 0, times 0 [ 36.391567][ T908] CPU: 1 PID: 908 Comm: syz.2.213 Not tainted 5.10.233-syzkaller-00881-gfbe98d68b6b3 #0 [ 36.401038][ T908] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 12/27/2024 [ 36.410931][ T908] Call Trace: [ 36.414064][ T908] dump_stack_lvl+0x1e2/0x24b [ 36.418572][ T908] ? bfq_pos_tree_add_move+0x43b/0x43b [ 36.423870][ T908] dump_stack+0x15/0x17 [ 36.427878][ T908] should_fail+0x3c6/0x510 [ 36.432127][ T908] ? kobject_uevent_env+0x269/0x700 [ 36.437164][ T908] __should_failslab+0xa4/0xe0 [ 36.441759][ T908] should_failslab+0x9/0x20 [ 36.446093][ T908] kmem_cache_alloc_trace+0x3a/0x2e0 [ 36.451211][ T908] ? __kasan_check_write+0x14/0x20 [ 36.456156][ T908] kobject_uevent_env+0x269/0x700 [ 36.461016][ T908] kobject_uevent+0x1f/0x30 [ 36.465355][ T908] __kobject_del+0xee/0x300 [ 36.469696][ T908] kobject_put+0x1cc/0x260 [ 36.473950][ T908] net_rx_queue_update_kobjects+0x3b6/0x430 [ 36.479697][ T908] netdev_unregister_kobject+0x109/0x250 [ 36.485159][ T908] unregister_netdevice_many+0x1276/0x17d0 [ 36.490800][ T908] ? alloc_netdev_mqs+0xcd0/0xcd0 [ 36.495657][ T908] ? add_timer+0x68/0x80 [ 36.499743][ T908] ? __queue_delayed_work+0x16d/0x1f0 [ 36.504938][ T908] ? __kasan_check_read+0x11/0x20 [ 36.509798][ T908] unregister_netdevice_queue+0x2e6/0x350 [ 36.515347][ T908] ? linkwatch_urgent_event+0x65/0x4d0 [ 36.520643][ T908] ? list_netdevice+0x4c0/0x4c0 [ 36.525333][ T908] __tun_detach+0xd14/0x1510 [ 36.529757][ T908] ? mutex_trylock+0xa0/0xa0 [ 36.534183][ T908] ? tun_chr_open+0x530/0x530 [ 36.538696][ T908] tun_chr_close+0x92/0x140 [ 36.543053][ T908] __fput+0x33d/0x7b0 [ 36.546861][ T908] ____fput+0x15/0x20 [ 36.550675][ T908] task_work_run+0x129/0x190 [ 36.555104][ T908] exit_to_user_mode_loop+0xbf/0xd0 [ 36.560139][ T908] syscall_exit_to_user_mode+0xa2/0x1a0 [ 36.565516][ T908] do_syscall_64+0x40/0x70 [ 36.569770][ T908] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 36.575495][ T908] RIP: 0033:0x7f659f7b5da9 [ 36.579748][ T908] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 36.599187][ T908] RSP: 002b:00007f659de20038 EFLAGS: 00000246 ORIG_RAX: 0000000000000003 [ 36.607432][ T908] RAX: 0000000000000000 RBX: 00007f659f9cefa0 RCX: 00007f659f7b5da9 [ 36.615242][ T908] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000004 [ 36.623053][ T908] RBP: 00007f659de20090 R08: 0000000000000000 R09: 0000000000000000 [ 36.630864][ T908] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 36.638675][ T908] R13: 0000000000000000 R14: 00007f659f9cefa0 R15: 00007ffe17b03a18 [ 36.650798][ T909] device sit0 entered promiscuous mode [ 37.392473][ T933] device wg2 left promiscuous mode [ 37.404313][ T933] device wg2 entered promiscuous mode [ 37.864394][ T958] device pim6reg1 entered promiscuous mode [ 38.098501][ T960] device pim6reg1 entered promiscuous mode [ 38.375440][ T24] audit: type=1400 audit(1738077581.490:124): avc: denied { create } for pid=962 comm="syz.2.235" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=pppox_socket permissive=1 [ 38.452111][ T24] audit: type=1400 audit(1738077581.580:125): avc: denied { create } for pid=976 comm="syz.4.241" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 38.531960][ T24] audit: type=1400 audit(1738077581.600:126): avc: denied { write } for pid=976 comm="syz.4.241" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 38.535232][ T982] device pim6reg1 entered promiscuous mode [ 38.551495][ T24] audit: type=1400 audit(1738077581.630:127): avc: denied { create } for pid=974 comm="syz.0.240" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 38.673255][ T988] ªªªªªª: renamed from vlan0 [ 39.205894][ T24] audit: type=1400 audit(1738077582.340:128): avc: denied { write } for pid=1008 comm="syz.1.252" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 39.350595][ T24] audit: type=1400 audit(1738077582.480:129): avc: denied { read } for pid=77 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 39.666649][ T24] audit: type=1400 audit(1738077582.640:130): avc: denied { setopt } for pid=1014 comm="syz.1.253" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 39.831421][ T24] audit: type=1400 audit(1738077582.960:131): avc: denied { read } for pid=1036 comm="syz.2.262" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 39.876902][ T1044] device wg2 left promiscuous mode [ 39.936072][ T1044] device wg2 entered promiscuous mode [ 40.117550][ T1070] syz.1.274[1070] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 40.117599][ T1070] syz.1.274[1070] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 40.129911][ T1070] FAULT_INJECTION: forcing a failure. [ 40.129911][ T1070] name failslab, interval 1, probability 0, space 0, times 0 [ 40.166683][ T1070] CPU: 0 PID: 1070 Comm: syz.1.274 Not tainted 5.10.233-syzkaller-00881-gfbe98d68b6b3 #0 [ 40.176384][ T1070] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 12/27/2024 [ 40.186272][ T1070] Call Trace: [ 40.189409][ T1070] dump_stack_lvl+0x1e2/0x24b [ 40.193915][ T1070] ? panic+0x812/0x812 [ 40.197824][ T1070] ? bfq_pos_tree_add_move+0x43b/0x43b [ 40.203116][ T1070] ? proc_fail_nth_read+0x210/0x210 [ 40.208153][ T1070] ? security_file_permission+0x86/0xb0 [ 40.213532][ T1070] dump_stack+0x15/0x17 [ 40.217523][ T1070] should_fail+0x3c6/0x510 [ 40.221776][ T1070] ? sock_alloc_inode+0x1b/0xb0 [ 40.226479][ T1070] __should_failslab+0xa4/0xe0 [ 40.231066][ T1070] should_failslab+0x9/0x20 [ 40.235403][ T1070] kmem_cache_alloc+0x3d/0x2e0 [ 40.240004][ T1070] ? sockfs_init_fs_context+0xb0/0xb0 [ 40.245228][ T1070] sock_alloc_inode+0x1b/0xb0 [ 40.249727][ T1070] ? sockfs_init_fs_context+0xb0/0xb0 [ 40.254935][ T1070] new_inode_pseudo+0x64/0x220 [ 40.259545][ T1070] __sock_create+0x135/0x760 [ 40.263964][ T1070] ? get_unused_fd_flags+0x94/0xa0 [ 40.268909][ T1070] __sys_socketpair+0x29f/0x6e0 [ 40.273592][ T1070] ? __ia32_sys_socket+0x90/0x90 [ 40.278371][ T1070] ? switch_fpu_return+0x1e4/0x3c0 [ 40.283325][ T1070] ? fpu__clear_all+0x20/0x20 [ 40.287830][ T1070] __x64_sys_socketpair+0x9b/0xb0 [ 40.292687][ T1070] do_syscall_64+0x34/0x70 [ 40.296936][ T1070] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 40.302664][ T1070] RIP: 0033:0x7fd742c5dda9 [ 40.306921][ T1070] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 40.326362][ T1070] RSP: 002b:00007fd7412c8038 EFLAGS: 00000246 ORIG_RAX: 0000000000000035 [ 40.334604][ T1070] RAX: ffffffffffffffda RBX: 00007fd742e76fa0 RCX: 00007fd742c5dda9 [ 40.342413][ T1070] RDX: 0000000000000000 RSI: 0000000000000005 RDI: 000000000000001e [ 40.350225][ T1070] RBP: 00007fd7412c8090 R08: 0000000000000000 R09: 0000000000000000 [ 40.358037][ T1070] R10: 0000000020000940 R11: 0000000000000246 R12: 0000000000000001 [ 40.365855][ T1070] R13: 0000000000000000 R14: 00007fd742e76fa0 R15: 00007ffde54f7548 [ 40.378580][ T1070] socket: no more sockets [ 40.802028][ T24] audit: type=1400 audit(1738077583.930:132): avc: denied { create } for pid=1103 comm="syz.2.287" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 41.016859][ T1101] device syzkaller0 entered promiscuous mode [ 41.120710][ T1122] FAULT_INJECTION: forcing a failure. [ 41.120710][ T1122] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 41.137919][ T1122] CPU: 0 PID: 1122 Comm: syz.3.292 Not tainted 5.10.233-syzkaller-00881-gfbe98d68b6b3 #0 [ 41.147528][ T1122] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 12/27/2024 [ 41.157418][ T1122] Call Trace: [ 41.160552][ T1122] dump_stack_lvl+0x1e2/0x24b [ 41.165057][ T1122] ? bfq_pos_tree_add_move+0x43b/0x43b [ 41.170355][ T1122] dump_stack+0x15/0x17 [ 41.174348][ T1122] should_fail+0x3c6/0x510 [ 41.178612][ T1122] should_fail_alloc_page+0x52/0x60 [ 41.183632][ T1122] __alloc_pages_nodemask+0x1b3/0xaf0 [ 41.188841][ T1122] ? __kernel_text_address+0x9b/0x110 [ 41.194047][ T1122] ? gfp_pfmemalloc_allowed+0x120/0x120 [ 41.199430][ T1122] ? stack_trace_save+0x113/0x1c0 [ 41.204288][ T1122] ? avc_has_perm_noaudit+0x117/0x240 [ 41.209497][ T1122] shmem_alloc_page+0x257/0x420 [ 41.214181][ T1122] ? put_page+0xd0/0xd0 [ 41.218178][ T1122] ? percpu_counter_add_batch+0x13d/0x160 [ 41.223730][ T1122] shmem_alloc_and_acct_page+0x395/0x8e0 [ 41.229198][ T1122] ? shmem_swapin_page+0x1950/0x1950 [ 41.234318][ T1122] ? find_get_entry+0x44c/0x4c0 [ 41.239008][ T1122] ? page_cache_prev_miss+0x410/0x410 [ 41.244214][ T1122] ? down_read_trylock+0x179/0x1d0 [ 41.249158][ T1122] ? find_lock_entry+0x1df/0x200 [ 41.253932][ T1122] shmem_getpage_gfp+0x891/0x2480 [ 41.258796][ T1122] ? __kasan_check_write+0x14/0x20 [ 41.263745][ T1122] ? shmem_getpage+0xa0/0xa0 [ 41.268168][ T1122] ? iov_iter_fault_in_readable+0x31f/0x4f0 [ 41.273897][ T1122] shmem_write_begin+0xca/0x1b0 [ 41.278583][ T1122] generic_perform_write+0x2cd/0x570 [ 41.283706][ T1122] ? grab_cache_page_write_begin+0xa0/0xa0 [ 41.289345][ T1122] ? file_remove_privs+0x570/0x570 [ 41.294303][ T1122] ? __kasan_check_write+0x14/0x20 [ 41.299247][ T1122] __generic_file_write_iter+0x23c/0x560 [ 41.304707][ T1122] ? generic_write_checks+0x3b9/0x470 [ 41.309914][ T1122] generic_file_write_iter+0xaf/0x1c0 [ 41.315119][ T1122] vfs_write+0xb4c/0xe70 [ 41.319206][ T1122] ? kernel_write+0x3d0/0x3d0 [ 41.323719][ T1122] ? mutex_trylock+0xa0/0xa0 [ 41.328140][ T1122] ? __fdget_pos+0x2e7/0x3a0 [ 41.332565][ T1122] ? ksys_write+0x77/0x2c0 [ 41.336837][ T1122] ksys_write+0x199/0x2c0 [ 41.340984][ T1122] ? __ia32_sys_read+0x90/0x90 [ 41.345592][ T1122] ? debug_smp_processor_id+0x17/0x20 [ 41.350803][ T1122] __x64_sys_write+0x7b/0x90 [ 41.355219][ T1122] do_syscall_64+0x34/0x70 [ 41.359471][ T1122] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 41.365198][ T1122] RIP: 0033:0x7ff9470f6da9 [ 41.369453][ T1122] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 41.388891][ T1122] RSP: 002b:00007ff945761038 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 41.397137][ T1122] RAX: ffffffffffffffda RBX: 00007ff94730ffa0 RCX: 00007ff9470f6da9 [ 41.404958][ T1122] RDX: 0000000000040010 RSI: 0000000020000180 RDI: 0000000000000007 [ 41.412771][ T1122] RBP: 00007ff945761090 R08: 0000000000000000 R09: 0000000000000000 [ 41.420578][ T1122] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 41.428389][ T1122] R13: 0000000000000000 R14: 00007ff94730ffa0 R15: 00007ffc6b9eeb88 [ 41.498622][ T1133] device wg2 left promiscuous mode [ 41.509122][ T1133] device wg2 entered promiscuous mode [ 41.544407][ T24] audit: type=1400 audit(1738077584.670:133): avc: denied { create } for pid=1126 comm="syz.4.294" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netrom_socket permissive=1 [ 41.705960][ T1146] FAULT_INJECTION: forcing a failure. [ 41.705960][ T1146] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 41.918769][ T1146] CPU: 1 PID: 1146 Comm: syz.2.301 Not tainted 5.10.233-syzkaller-00881-gfbe98d68b6b3 #0 [ 41.928391][ T1146] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 12/27/2024 [ 41.938283][ T1146] Call Trace: [ 41.941543][ T1146] dump_stack_lvl+0x1e2/0x24b [ 41.946034][ T1146] ? bfq_pos_tree_add_move+0x43b/0x43b [ 41.951344][ T1146] ? __alloc_pages_nodemask+0x435/0xaf0 [ 41.956718][ T1146] dump_stack+0x15/0x17 [ 41.960704][ T1146] should_fail+0x3c6/0x510 [ 41.964957][ T1146] should_fail_usercopy+0x1a/0x20 [ 41.969818][ T1146] copy_page_from_iter+0x398/0x6e0 [ 41.974766][ T1146] pipe_write+0x92b/0x18c0 [ 41.979026][ T1146] ? pipe_read+0x1040/0x1040 [ 41.983433][ T1146] ? fsnotify_perm+0x67/0x4e0 [ 41.987949][ T1146] ? security_file_permission+0x7b/0xb0 [ 41.993327][ T1146] ? security_file_permission+0x86/0xb0 [ 41.998706][ T1146] ? iov_iter_init+0x3f/0x120 [ 42.003230][ T1146] vfs_write+0xb4c/0xe70 [ 42.007303][ T1146] ? kernel_write+0x3d0/0x3d0 [ 42.011814][ T1146] ? __fdget_pos+0x209/0x3a0 [ 42.016249][ T1146] ? ksys_write+0x77/0x2c0 [ 42.020489][ T1146] ksys_write+0x199/0x2c0 [ 42.024655][ T1146] ? __ia32_sys_read+0x90/0x90 [ 42.029344][ T1146] ? debug_smp_processor_id+0x17/0x20 [ 42.034548][ T1146] __x64_sys_write+0x7b/0x90 [ 42.038976][ T1146] do_syscall_64+0x34/0x70 [ 42.043227][ T1146] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 42.048954][ T1146] RIP: 0033:0x7f659f7b5da9 [ 42.053209][ T1146] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 42.072649][ T1146] RSP: 002b:00007f659de20038 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 42.080901][ T1146] RAX: ffffffffffffffda RBX: 00007f659f9cefa0 RCX: 00007f659f7b5da9 [ 42.088708][ T1146] RDX: 00000000fffffdef RSI: 00000000200001c0 RDI: 0000000000000000 [ 42.096521][ T1146] RBP: 00007f659de20090 R08: 0000000000000000 R09: 0000000000000000 [ 42.104326][ T1146] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 42.112139][ T1146] R13: 0000000000000000 R14: 00007f659f9cefa0 R15: 00007ffe17b03a18 [ 42.486176][ T1181] device wg2 entered promiscuous mode [ 42.496147][ T1173] device wg2 left promiscuous mode [ 42.515528][ T1175] device pim6reg1 entered promiscuous mode [ 43.324118][ T1212] device syzkaller0 entered promiscuous mode [ 43.407712][ T24] audit: type=1400 audit(1738077586.540:134): avc: denied { create } for pid=1217 comm="syz.2.322" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=dccp_socket permissive=1 [ 44.040982][ T24] audit: type=1400 audit(1738077587.170:135): avc: denied { create } for pid=1248 comm="syz.0.335" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=qipcrtr_socket permissive=1 [ 44.062696][ T1247] device pim6reg1 entered promiscuous mode [ 44.083618][ T24] audit: type=1400 audit(1738077587.190:136): avc: denied { create } for pid=1248 comm="syz.0.335" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=caif_socket permissive=1 [ 44.179757][ T1252] device wg2 left promiscuous mode [ 44.226077][ T1259] syz.2.337 uses obsolete (PF_INET,SOCK_PACKET) [ 44.241663][ T24] audit: type=1400 audit(1738077587.370:137): avc: denied { create } for pid=1257 comm="syz.2.337" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 44.326590][ T1265] device wg2 left promiscuous mode [ 44.332622][ T1263] ------------[ cut here ]------------ [ 44.342328][ T1263] trace type BPF program uses run-time allocation [ 44.350526][ T1265] device wg2 entered promiscuous mode [ 44.359943][ T1263] WARNING: CPU: 0 PID: 1263 at kernel/bpf/verifier.c:10496 check_map_prog_compatibility+0x65b/0x7c0 [ 44.375157][ T24] audit: type=1400 audit(1738077587.500:138): avc: denied { remove_name } for pid=77 comm="syslogd" name="messages" dev="tmpfs" ino=2 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 44.420429][ T1263] Modules linked in: [ 44.424166][ T1263] CPU: 0 PID: 1263 Comm: syz.1.339 Not tainted 5.10.233-syzkaller-00881-gfbe98d68b6b3 #0 [ 44.502683][ T1263] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 12/27/2024 [ 44.522118][ T24] audit: type=1400 audit(1738077587.500:139): avc: denied { rename } for pid=77 comm="syslogd" name="messages" dev="tmpfs" ino=2 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 44.548980][ T1263] RIP: 0010:check_map_prog_compatibility+0x65b/0x7c0 [ 44.665975][ T1263] Code: c8 e9 84 fe ff ff e8 b4 f6 ee ff 31 db e9 85 fe ff ff e8 a8 f6 ee ff c6 05 9f 29 65 05 01 48 c7 c7 40 7e 45 85 e8 e5 6b c2 ff <0f> 0b e9 42 fc ff ff 89 d9 80 e1 07 80 c1 03 38 c1 0f 8c 17 fa ff [ 44.686713][ T1263] RSP: 0018:ffffc9000104ef90 EFLAGS: 00010246 [ 44.758738][ T1263] RAX: e91ace722256af00 RBX: ffff88810b624800 RCX: 0000000000080000 [ 44.879914][ T1288] syz.0.349[1288] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 44.879965][ T1288] syz.0.349[1288] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 44.887932][ T1263] RDX: ffffc9000154b000 RSI: 000000000000081d RDI: 000000000000081e [ 45.022311][ T1263] RBP: ffffc9000104efd0 R08: ffffffff81523288 R09: ffffed103ee0a5f8 [ 45.030795][ T1263] R10: 0000000000000000 R11: dffffc0000000001 R12: 0000000000000011 [ 45.202467][ T1263] R13: 1ffff92000025c04 R14: ffff88810ac4c000 R15: ffffc9000012e020 [ 45.210347][ T1263] FS: 00007fd7412c86c0(0000) GS:ffff8881f7100000(0000) knlGS:0000000000000000 [ 45.219159][ T1263] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 45.225611][ T1263] CR2: 00007f23cd69ff80 CR3: 00000001110e0000 CR4: 00000000003506a0 [ 45.233616][ T1263] DR0: 0000000020000300 DR1: 0000000000000000 DR2: 0000000000000000 [ 45.241821][ T1263] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000600 [ 45.294040][ T1263] Call Trace: [ 45.297330][ T1263] ? show_regs+0x58/0x60 [ 45.301434][ T1263] ? __warn+0x160/0x2f0 [ 45.305447][ T1263] ? check_map_prog_compatibility+0x65b/0x7c0 [ 45.311366][ T1263] ? report_bug+0x3d9/0x5b0 [ 45.316189][ T1263] ? check_map_prog_compatibility+0x65b/0x7c0 [ 45.322122][ T1263] ? handle_bug+0x41/0x70 [ 45.326743][ T1263] ? exc_invalid_op+0x1b/0x50 [ 45.331268][ T1263] ? asm_exc_invalid_op+0x12/0x20 [ 45.336355][ T1263] ? wake_up_klogd+0xb8/0xf0 [ 45.342092][ T1263] ? check_map_prog_compatibility+0x65b/0x7c0 [ 45.348244][ T1263] ? __fdget+0x1bc/0x240 [ 45.352395][ T1263] resolve_pseudo_ldimm64+0x586/0x1020 [ 45.358361][ T1263] ? bpf_check+0xf230/0xf230 [ 45.362854][ T1263] ? kvmalloc_node+0x82/0x130 [ 45.367496][ T1263] bpf_check+0xaeca/0xf230 [ 45.372621][ T1299] FAULT_INJECTION: forcing a failure. [ 45.372621][ T1299] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 45.386075][ T1263] ? stack_depot_save+0xe/0x10 [ 45.390701][ T1263] ? __se_sys_bpf+0x9856/0x11cb0 [ 45.395461][ T1263] ? bpf_prog_5cb5524816e22ab1+0x78/0xd58 [ 45.401355][ T1299] CPU: 0 PID: 1299 Comm: syz.2.352 Not tainted 5.10.233-syzkaller-00881-gfbe98d68b6b3 #0 [ 45.410952][ T1299] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 12/27/2024 [ 45.420842][ T1299] Call Trace: [ 45.423981][ T1299] dump_stack_lvl+0x1e2/0x24b [ 45.425943][ T1263] ? is_bpf_text_address+0x172/0x190 [ 45.428492][ T1299] ? bfq_pos_tree_add_move+0x43b/0x43b [ 45.433611][ T1263] ? bpf_get_btf_vmlinux+0x60/0x60 [ 45.438902][ T1299] dump_stack+0x15/0x17 [ 45.438911][ T1299] should_fail+0x3c6/0x510 [ 45.438919][ T1299] should_fail_alloc_page+0x52/0x60 [ 45.438926][ T1299] __alloc_pages_nodemask+0x1b3/0xaf0 [ 45.438944][ T1299] ? gfp_pfmemalloc_allowed+0x120/0x120 [ 45.438961][ T1299] kmalloc_order+0x4c/0x170 [ 45.443857][ T1263] ? __kernel_text_address+0x9b/0x110 [ 45.447841][ T1299] kmalloc_order_trace+0x18/0x90 [ 45.447852][ T1299] ? alloc_skb_with_frags+0xa1/0x570 [ 45.447871][ T1299] __kmalloc_track_caller+0x1dd/0x320 [ 45.452098][ T1263] ? unwind_get_return_address+0x4d/0x90 [ 45.457120][ T1299] ? __alloc_skb+0x80/0x510 [ 45.457130][ T1299] ? alloc_skb_with_frags+0xa1/0x570 [ 45.457137][ T1299] __alloc_skb+0xbc/0x510 [ 45.457154][ T1299] alloc_skb_with_frags+0xa1/0x570 [ 45.462336][ T1263] ? arch_stack_walk+0xf3/0x140 [ 45.467714][ T1299] ? is_bpf_text_address+0x172/0x190 [ 45.467731][ T1299] sock_alloc_send_pskb+0x915/0xa50 [ 45.472058][ T1263] ? stack_trace_save+0x113/0x1c0 [ 45.477259][ T1299] ? sock_kzfree_s+0x60/0x60 [ 45.477274][ T1299] ? stack_trace_save+0x113/0x1c0 [ 45.482038][ T1263] ? stack_trace_snprint+0xf0/0xf0 [ 45.487153][ T1299] ? terminate_walk+0x407/0x4f0 [ 45.487162][ T1299] ? stack_trace_snprint+0xf0/0xf0 [ 45.487178][ T1299] tun_get_user+0xe90/0x38f0 [ 45.492366][ T1263] ? stack_trace_snprint+0xf0/0xf0 [ 45.497830][ T1299] ? _kstrtoull+0x3a0/0x4a0 [ 45.497839][ T1299] ? tun_do_read+0x1f60/0x1f60 [ 45.497854][ T1299] ? kstrtouint_from_user+0x20a/0x2a0 [ 45.502192][ T1263] ? selinux_bpf_prog_alloc+0x51/0x140 [ 45.507292][ T1299] ? kstrtol_from_user+0x310/0x310 [ 45.507304][ T1299] ? avc_policy_seqno+0x1b/0x70 [ 45.507312][ T1299] ? selinux_file_permission+0x2bb/0x560 [ 45.507328][ T1299] ? fsnotify_perm+0x67/0x4e0 [ 45.511459][ T1263] ? selinux_bpf_prog_alloc+0x51/0x140 [ 45.516402][ T1299] tun_chr_write_iter+0x1a8/0x250 [ 45.516413][ T1299] vfs_write+0xb4c/0xe70 [ 45.516422][ T1299] ? kernel_write+0x3d0/0x3d0 [ 45.516433][ T1299] ? __fdget_pos+0x209/0x3a0 [ 45.516440][ T1299] ? ksys_write+0x77/0x2c0 [ 45.516454][ T1299] ksys_write+0x199/0x2c0 [ 45.521474][ T1263] ? ____kasan_kmalloc+0xed/0x110 [ 45.526213][ T1299] ? __ia32_sys_read+0x90/0x90 [ 45.526225][ T1299] ? debug_smp_processor_id+0x17/0x20 [ 45.526233][ T1299] __x64_sys_write+0x7b/0x90 [ 45.526249][ T1299] do_syscall_64+0x34/0x70 [ 45.531265][ T1263] ? ____kasan_kmalloc+0xdb/0x110 [ 45.536104][ T1299] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 45.536112][ T1299] RIP: 0033:0x7f659f7b5da9 [ 45.536121][ T1299] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 45.536133][ T1299] RSP: 002b:00007f659de20038 EFLAGS: 00000246 [ 45.540542][ T1263] ? __kasan_kmalloc+0x9/0x10 [ 45.545389][ T1299] ORIG_RAX: 0000000000000001 [ 45.550796][ T1263] ? kmem_cache_alloc_trace+0x18a/0x2e0 [ 45.555464][ T1299] RAX: ffffffffffffffda RBX: 00007f659f9cefa0 RCX: 00007f659f7b5da9 [ 45.560441][ T1263] ? selinux_bpf_prog_alloc+0x51/0x140 [ 45.564834][ T1299] RDX: 000000000000fdef RSI: 00000000200005c0 RDI: 00000000000000c8 [ 45.570689][ T1263] ? security_bpf_prog_alloc+0x62/0x90 [ 45.574120][ T1299] RBP: 00007f659de20090 R08: 0000000000000000 R09: 0000000000000000 [ 45.578751][ T1263] ? __se_sys_bpf+0x9f8c/0x11cb0 [ 45.583932][ T1299] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 45.589233][ T1263] ? __x64_sys_bpf+0x7b/0x90 [ 45.594168][ T1299] R13: 0000000000000000 R14: 00007f659f9cefa0 R15: 00007ffe17b03a18 [ 45.598885][ T1263] ? do_syscall_64+0x34/0x70 [ 45.782243][ T1263] ? entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 45.788178][ T1263] ? __kasan_kmalloc+0x9/0x10 [ 45.792652][ T1263] __se_sys_bpf+0x107a2/0x11cb0 [ 45.797355][ T1263] ? futex_wait+0x6a0/0x7c0 [ 45.805816][ T1263] ? __x64_sys_bpf+0x90/0x90 [ 45.810241][ T1263] ? do_futex+0x17b0/0x17b0 [ 45.814569][ T1263] ? do_futex+0x139a/0x17b0 [ 45.818937][ T1263] ? futex_exit_release+0x1e0/0x1e0 [ 45.823944][ T1263] ? __kasan_check_read+0x11/0x20 [ 45.828833][ T1263] ? __kasan_slab_free+0x11/0x20 [ 45.833722][ T1263] ? rcu_gp_kthread_wake+0x90/0x90 [ 45.838843][ T1263] ? __se_sys_futex+0x355/0x470 [ 45.843677][ T1263] ? fpu__clear_all+0x20/0x20 [ 45.855168][ T1263] ? __kasan_check_read+0x11/0x20 [ 45.867688][ T1263] __x64_sys_bpf+0x7b/0x90 [ 45.887457][ T1263] do_syscall_64+0x34/0x70 [ 45.906049][ T1263] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 45.917941][ T1263] RIP: 0033:0x7fd742c5dda9 [ 45.926447][ T1263] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 45.956641][ T1263] RSP: 002b:00007fd7412c8038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 45.970042][ T1263] RAX: ffffffffffffffda RBX: 00007fd742e76fa0 RCX: 00007fd742c5dda9 [ 45.978030][ T1263] RDX: 0000000000000090 RSI: 00000000200000c0 RDI: 0000000000000005 [ 45.985996][ T1263] RBP: 00007fd742cdf2a0 R08: 0000000000000000 R09: 0000000000000000 [ 45.993825][ T1263] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 46.001777][ T1263] R13: 0000000000000000 R14: 00007fd742e76fa0 R15: 00007ffde54f7548 [ 46.009918][ T1263] ---[ end trace 1a7cced91f8b79b2 ]--- [ 46.097758][ T1330] device bridge_slave_1 entered promiscuous mode [ 46.105939][ T1316] device pim6reg1 entered promiscuous mode [ 46.196305][ T1340] FAULT_INJECTION: forcing a failure. [ 46.196305][ T1340] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 46.244845][ T1340] CPU: 0 PID: 1340 Comm: syz.0.369 Tainted: G W 5.10.233-syzkaller-00881-gfbe98d68b6b3 #0 [ 46.255867][ T1340] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 12/27/2024 [ 46.265753][ T1340] Call Trace: [ 46.268886][ T1340] dump_stack_lvl+0x1e2/0x24b [ 46.273392][ T1340] ? bfq_pos_tree_add_move+0x43b/0x43b [ 46.278690][ T1340] dump_stack+0x15/0x17 [ 46.282675][ T1340] should_fail+0x3c6/0x510 [ 46.286931][ T1340] should_fail_usercopy+0x1a/0x20 [ 46.291790][ T1340] copy_page_from_iter+0x398/0x6e0 [ 46.296742][ T1340] tun_get_user+0x755/0x38f0 [ 46.301162][ T1340] ? bad_area_nosemaphore+0x2d/0x40 [ 46.306199][ T1340] ? _kstrtoull+0x3a0/0x4a0 [ 46.310536][ T1340] ? tun_do_read+0x1f60/0x1f60 [ 46.315134][ T1340] ? kstrtouint_from_user+0x20a/0x2a0 [ 46.320342][ T1340] ? kstrtol_from_user+0x310/0x310 [ 46.325291][ T1340] ? copy_from_kernel_nofault+0x2af/0x2e0 [ 46.330852][ T1340] ? avc_policy_seqno+0x1b/0x70 [ 46.335531][ T1340] ? selinux_file_permission+0x2bb/0x560 [ 46.340999][ T1340] ? fsnotify_perm+0x67/0x4e0 [ 46.345512][ T1340] tun_chr_write_iter+0x1a8/0x250 [ 46.350379][ T1340] vfs_write+0xb4c/0xe70 [ 46.354453][ T1340] ? kernel_write+0x3d0/0x3d0 [ 46.358968][ T1340] ? __fdget_pos+0x209/0x3a0 [ 46.363390][ T1340] ? ksys_write+0x77/0x2c0 [ 46.367644][ T1340] ksys_write+0x199/0x2c0 [ 46.371809][ T1340] ? __ia32_sys_read+0x90/0x90 [ 46.376424][ T1340] ? debug_smp_processor_id+0x17/0x20 [ 46.381620][ T1340] __x64_sys_write+0x7b/0x90 [ 46.386044][ T1340] do_syscall_64+0x34/0x70 [ 46.390298][ T1340] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 46.396025][ T1340] RIP: 0033:0x7f9a75babda9 [ 46.400280][ T1340] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 46.419724][ T1340] RSP: 002b:00007f9a74216038 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 46.427962][ T1340] RAX: ffffffffffffffda RBX: 00007f9a75dc4fa0 RCX: 00007f9a75babda9 [ 46.435772][ T1340] RDX: 000000000000000e RSI: 0000000020000000 RDI: 00000000000000c8 [ 46.443583][ T1340] RBP: 00007f9a74216090 R08: 0000000000000000 R09: 0000000000000000 [ 46.451399][ T1340] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 46.459207][ T1340] R13: 0000000000000000 R14: 00007f9a75dc4fa0 R15: 00007fff5c18dea8 [ 46.525988][ T24] audit: type=1400 audit(1738077589.660:140): avc: denied { create } for pid=1346 comm="syz.4.373" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 46.549753][ T1347] bridge0: port 2(bridge_slave_1) entered disabled state [ 46.706006][ T1357] FAULT_INJECTION: forcing a failure. [ 46.706006][ T1357] name failslab, interval 1, probability 0, space 0, times 0 [ 46.756175][ T1357] CPU: 0 PID: 1357 Comm: syz.2.375 Tainted: G W 5.10.233-syzkaller-00881-gfbe98d68b6b3 #0 [ 46.767183][ T1357] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 12/27/2024 [ 46.777074][ T1357] Call Trace: [ 46.780212][ T1357] dump_stack_lvl+0x1e2/0x24b [ 46.784726][ T1357] ? panic+0x812/0x812 [ 46.788622][ T1357] ? do_syscall_64+0x34/0x70 [ 46.793047][ T1357] ? bfq_pos_tree_add_move+0x43b/0x43b [ 46.798342][ T1357] dump_stack+0x15/0x17 [ 46.802335][ T1357] should_fail+0x3c6/0x510 [ 46.806590][ T1357] ? __get_vm_area_node+0x116/0x470 [ 46.811635][ T1357] __should_failslab+0xa4/0xe0 [ 46.816222][ T1357] should_failslab+0x9/0x20 [ 46.820561][ T1357] kmem_cache_alloc_trace+0x3a/0x2e0 [ 46.825689][ T1357] __get_vm_area_node+0x116/0x470 [ 46.830544][ T1357] __vmalloc_node_range+0xdc/0x7c0 [ 46.835491][ T1357] ? copy_process+0x5c8/0x3340 [ 46.840092][ T1357] ? kmem_cache_alloc+0x168/0x2e0 [ 46.844951][ T1357] ? __kasan_check_write+0x14/0x20 [ 46.849900][ T1357] dup_task_struct+0x429/0xc30 [ 46.854495][ T1357] ? copy_process+0x5c8/0x3340 [ 46.859102][ T1357] copy_process+0x5c8/0x3340 [ 46.863523][ T1357] ? proc_fail_nth_write+0x20b/0x290 [ 46.868646][ T1357] ? proc_fail_nth_read+0x210/0x210 [ 46.873764][ T1357] ? security_file_permission+0x86/0xb0 [ 46.879145][ T1357] ? rw_verify_area+0x1c3/0x360 [ 46.883832][ T1357] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 46.888778][ T1357] ? vfs_write+0x852/0xe70 [ 46.893040][ T1357] ? kmem_cache_free+0xa9/0x1e0 [ 46.897722][ T1357] kernel_clone+0x21e/0x9e0 [ 46.902065][ T1357] ? __kasan_check_write+0x14/0x20 [ 46.907002][ T1357] ? create_io_thread+0x1e0/0x1e0 [ 46.911864][ T1357] __x64_sys_clone+0x23f/0x290 [ 46.916458][ T1357] ? __do_sys_vfork+0x130/0x130 [ 46.921147][ T1357] ? debug_smp_processor_id+0x17/0x20 [ 46.926353][ T1357] do_syscall_64+0x34/0x70 [ 46.930607][ T1357] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 46.936332][ T1357] RIP: 0033:0x7f659f7b5da9 [ 46.940588][ T1357] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 46.960028][ T1357] RSP: 002b:00007f659de1ffe8 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 46.968275][ T1357] RAX: ffffffffffffffda RBX: 00007f659f9cefa0 RCX: 00007f659f7b5da9 [ 46.976097][ T1357] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000042000000 [ 46.983900][ T1357] RBP: 00007f659de20090 R08: 0000000000000000 R09: 0000000000000000 [ 46.991707][ T1357] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000001 [ 46.999519][ T1357] R13: 0000000000000000 R14: 00007f659f9cefa0 R15: 00007ffe17b03a18 [ 47.010281][ T1357] syz.2.375: vmalloc: allocation failure: 32768 bytes, mode:0xdc0(GFP_KERNEL|__GFP_ZERO), nodemask=(null),cpuset=syz2,mems_allowed=0 [ 47.024049][ T1357] CPU: 0 PID: 1357 Comm: syz.2.375 Tainted: G W 5.10.233-syzkaller-00881-gfbe98d68b6b3 #0 [ 47.035038][ T1357] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 12/27/2024 [ 47.044929][ T1357] Call Trace: [ 47.048062][ T1357] dump_stack_lvl+0x1e2/0x24b [ 47.052572][ T1357] ? wake_up_klogd+0xb8/0xf0 [ 47.057002][ T1357] ? bfq_pos_tree_add_move+0x43b/0x43b [ 47.062294][ T1357] ? pr_cont_kernfs_name+0xf0/0x100 [ 47.067326][ T1357] dump_stack+0x15/0x17 [ 47.071316][ T1357] warn_alloc+0x21a/0x390 [ 47.075483][ T1357] ? __get_vm_area_node+0x116/0x470 [ 47.080515][ T1357] ? zone_watermark_ok_safe+0x2b0/0x2b0 [ 47.085901][ T1357] ? __get_vm_area_node+0x34b/0x470 [ 47.090941][ T1357] __vmalloc_node_range+0x287/0x7c0 [ 47.095966][ T1357] ? kmem_cache_alloc+0x168/0x2e0 [ 47.100828][ T1357] ? __kasan_check_write+0x14/0x20 [ 47.105775][ T1357] dup_task_struct+0x429/0xc30 [ 47.110370][ T1357] ? copy_process+0x5c8/0x3340 [ 47.114979][ T1357] copy_process+0x5c8/0x3340 [ 47.119402][ T1357] ? proc_fail_nth_write+0x20b/0x290 [ 47.124521][ T1357] ? proc_fail_nth_read+0x210/0x210 [ 47.129553][ T1357] ? security_file_permission+0x86/0xb0 [ 47.134935][ T1357] ? rw_verify_area+0x1c3/0x360 [ 47.139621][ T1357] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 47.144567][ T1357] ? vfs_write+0x852/0xe70 [ 47.148823][ T1357] ? kmem_cache_free+0xa9/0x1e0 [ 47.153510][ T1357] kernel_clone+0x21e/0x9e0 [ 47.157848][ T1357] ? __kasan_check_write+0x14/0x20 [ 47.162796][ T1357] ? create_io_thread+0x1e0/0x1e0 [ 47.167657][ T1357] __x64_sys_clone+0x23f/0x290 [ 47.172255][ T1357] ? __do_sys_vfork+0x130/0x130 [ 47.176945][ T1357] ? debug_smp_processor_id+0x17/0x20 [ 47.182152][ T1357] do_syscall_64+0x34/0x70 [ 47.186405][ T1357] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 47.192127][ T1357] RIP: 0033:0x7f659f7b5da9 [ 47.196384][ T1357] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 47.215824][ T1357] RSP: 002b:00007f659de1ffe8 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 47.224071][ T1357] RAX: ffffffffffffffda RBX: 00007f659f9cefa0 RCX: 00007f659f7b5da9 [ 47.231877][ T1357] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000042000000 [ 47.239693][ T1357] RBP: 00007f659de20090 R08: 0000000000000000 R09: 0000000000000000 [ 47.247503][ T1357] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000001 [ 47.255311][ T1357] R13: 0000000000000000 R14: 00007f659f9cefa0 R15: 00007ffe17b03a18 [ 47.346338][ T1362] device veth0_vlan left promiscuous mode [ 47.352130][ T1362] device veth0_vlan entered promiscuous mode [ 47.363400][ T1357] Mem-Info: [ 47.369122][ T1357] active_anon:91 inactive_anon:6656 isolated_anon:0 [ 47.369122][ T1357] active_file:3561 inactive_file:3562 isolated_file:0 [ 47.369122][ T1357] unevictable:0 dirty:1821 writeback:0 [ 47.369122][ T1357] slab_reclaimable:7109 slab_unreclaimable:73565 [ 47.369122][ T1357] mapped:28834 shmem:216 pagetables:574 bounce:0 [ 47.369122][ T1357] free:1583242 free_pcp:1014 free_cma:0 [ 47.371578][ T307] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 47.408586][ T1357] Node 0 active_anon:364kB inactive_anon:26624kB active_file:14244kB inactive_file:14248kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:115336kB dirty:7284kB writeback:0kB shmem:864kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 0kB writeback_tmp:0kB kernel_stack:4160kB all_unreclaimable? no [ 47.460973][ T1357] DMA32 free:2983352kB min:62624kB low:78280kB high:93936kB reserved_highatomic:0KB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:3145324kB managed:2984748kB mlocked:0kB pagetables:0kB bounce:0kB free_pcp:1396kB local_pcp:1344kB free_cma:0kB [ 47.489778][ T1357] lowmem_reserve[]: 0 3941 3941 [ 47.494540][ T1357] Normal free:3357504kB min:84828kB low:106032kB high:127236kB reserved_highatomic:0KB active_anon:364kB inactive_anon:20324kB active_file:14244kB inactive_file:14248kB unevictable:0kB writepending:7284kB present:5242880kB managed:4035856kB mlocked:0kB pagetables:2296kB bounce:0kB free_pcp:2496kB local_pcp:1288kB free_cma:0kB [ 47.556491][ T1367] FAULT_INJECTION: forcing a failure. [ 47.556491][ T1367] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 47.576562][ T1357] lowmem_reserve[]: 0 0 0 [ 47.580736][ T1357] DMA32: 4*4kB (UM) 5*8kB (M) 4*16kB (M) 8*32kB (UM) 7*64kB (UM) 5*128kB (UM) 6*256kB (UM) 5*512kB (M) 6*1024kB (UM) 3*2048kB (UM) 724*4096kB (M) = 2983352kB [ 47.590531][ T307] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 47.597608][ T1357] Normal: 177*4kB (UM) 157*8kB (UM) 288*16kB (UM) 59*32kB (UME) 38*64kB (UME) 35*128kB (UME) 28*256kB (UME) 21*512kB (UME) 4*1024kB (UME) 3*2048kB (UME) 809*4096kB (M) = 3357196kB [ 47.603834][ T1367] CPU: 1 PID: 1367 Comm: syz.3.378 Tainted: G W 5.10.233-syzkaller-00881-gfbe98d68b6b3 #0 [ 47.621011][ T1357] 7464 total pagecache pages [ 47.631930][ T1367] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 12/27/2024 [ 47.631934][ T1367] Call Trace: [ 47.631952][ T1367] dump_stack_lvl+0x1e2/0x24b [ 47.631961][ T1367] ? panic+0x812/0x812 [ 47.631969][ T1367] ? bfq_pos_tree_add_move+0x43b/0x43b [ 47.631984][ T1367] dump_stack+0x15/0x17 [ 47.636418][ T1357] 0 pages in swap cache [ 47.646251][ T1367] should_fail+0x3c6/0x510 [ 47.646269][ T1367] should_fail_usercopy+0x1a/0x20 [ 47.649652][ T1357] Swap cache stats: add 0, delete 0, find 0/0 [ 47.653899][ T1367] strncpy_from_user+0x24/0x2d0 [ 47.658919][ T1357] Free swap = 124996kB [ 47.663097][ T1367] ? getname_flags+0xba/0x520 [ 47.663106][ T1367] getname_flags+0xf2/0x520 [ 47.663122][ T1367] getname+0x19/0x20 [ 47.667145][ T1357] Total swap = 124996kB [ 47.671082][ T1367] do_sys_openat2+0xd7/0x710 [ 47.675464][ T1357] 2097051 pages RAM [ 47.681361][ T1367] ? mutex_trylock+0xa0/0xa0 [ 47.681371][ T1367] ? do_sys_open+0x220/0x220 [ 47.681381][ T1367] ? __kasan_check_write+0x14/0x20 [ 47.681391][ T1367] ? ksys_write+0x260/0x2c0 [ 47.681407][ T1367] __x64_sys_openat+0x243/0x290 [ 47.687333][ T1357] 0 pages HighMem/MovableOnly [ 47.691951][ T1367] ? __ia32_sys_open+0x270/0x270 [ 47.695947][ T1357] 341900 pages reserved [ 47.700450][ T1367] ? debug_smp_processor_id+0x17/0x20 [ 47.700461][ T1367] do_syscall_64+0x34/0x70 [ 47.700477][ T1367] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 47.704824][ T1357] 0 pages cma reserved [ 47.708523][ T1367] RIP: 0033:0x7ff9470f6da9 [ 47.708533][ T1367] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 47.708539][ T1367] RSP: 002b:00007ff945761038 EFLAGS: 00000246 ORIG_RAX: 0000000000000101 [ 47.708550][ T1367] RAX: ffffffffffffffda RBX: 00007ff94730ffa0 RCX: 00007ff9470f6da9 [ 47.708556][ T1367] RDX: 00000000000026e1 RSI: 0000000020000180 RDI: ffffffffffffff9c [ 47.708561][ T1367] RBP: 00007ff945761090 R08: 0000000000000000 R09: 0000000000000000 [ 47.708566][ T1367] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 47.708579][ T1367] R13: 0000000000000000 R14: 00007ff94730ffa0 R15: 00007ffc6b9eeb88 [ 47.750441][ T307] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 47.862720][ T1379] device sit0 left promiscuous mode [ 47.886761][ T1380] device sit0 entered promiscuous mode [ 48.110990][ T1388] syz.2.384[1388] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 48.111041][ T1388] syz.2.384[1388] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 49.234721][ T1399] FAULT_INJECTION: forcing a failure. [ 49.234721][ T1399] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 49.258586][ T1399] CPU: 1 PID: 1399 Comm: syz.2.387 Tainted: G W 5.10.233-syzkaller-00881-gfbe98d68b6b3 #0 [ 49.269596][ T1399] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 12/27/2024 [ 49.279487][ T1399] Call Trace: [ 49.282621][ T1399] dump_stack_lvl+0x1e2/0x24b [ 49.287128][ T1399] ? bfq_pos_tree_add_move+0x43b/0x43b [ 49.292424][ T1399] ? _raw_spin_unlock_irqrestore+0x5b/0x80 [ 49.298063][ T1399] dump_stack+0x15/0x17 [ 49.302056][ T1399] should_fail+0x3c6/0x510 [ 49.306308][ T1399] should_fail_usercopy+0x1a/0x20 [ 49.311167][ T1399] strncpy_from_user+0x24/0x2d0 [ 49.315854][ T1399] ? update_load_avg+0x541/0x1690 [ 49.320715][ T1399] strncpy_from_user_nofault+0x73/0x150 [ 49.326096][ T1399] bpf_probe_read_compat_str+0xec/0x180 [ 49.331478][ T1399] bpf_prog_c1796171ffc7efef+0x35/0xa84 [ 49.336863][ T1399] bpf_trace_run3+0x198/0x2c0 [ 49.341371][ T1399] ? bpf_trace_run2+0x280/0x280 [ 49.346060][ T1399] ? __this_cpu_preempt_check+0x13/0x20 [ 49.351439][ T1399] ? tracing_record_taskinfo_sched_switch+0x84/0x390 [ 49.357948][ T1399] ? __bpf_trace_sched_wakeup_template+0x10/0x10 [ 49.364109][ T1399] __bpf_trace_sched_switch+0xb/0x10 [ 49.369233][ T1399] __traceiter_sched_switch+0x85/0xc0 [ 49.374439][ T1399] __schedule+0x10be/0x1330 [ 49.378780][ T1399] ? release_firmware_map_entry+0x18d/0x18d [ 49.384507][ T1399] ? _raw_write_unlock_irq+0x30/0x60 [ 49.389626][ T1399] preempt_schedule_irq+0xc7/0x140 [ 49.394574][ T1399] ? preempt_schedule_notrace+0x140/0x140 [ 49.400129][ T1399] ? __irq_exit_rcu+0x40/0x150 [ 49.404729][ T1399] irqentry_exit+0x4f/0x60 [ 49.408981][ T1399] sysvec_apic_timer_interrupt+0xcb/0xe0 [ 49.414450][ T1399] asm_sysvec_apic_timer_interrupt+0x12/0x20 [ 49.420266][ T1399] RIP: 0010:iov_iter_fault_in_readable+0x0/0x4f0 [ 49.426428][ T1399] Code: eb 0a e8 93 2f 19 ff b8 ea ff ff ff 48 83 c4 10 5b 41 5c 41 5d 41 5e 41 5f 5d c3 cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc <55> 48 89 e5 41 57 41 56 41 55 41 54 53 48 83 e4 e0 48 81 ec a0 00 [ 49.445866][ T1399] RSP: 0018:ffffc90000dd7a38 EFLAGS: 00000297 [ 49.451768][ T1399] RAX: 1ffff920001bafb0 RBX: 0000000000001000 RCX: ffff88823ff02ed0 [ 49.459579][ T1399] RDX: ffffffff85473538 RSI: 0000000000001000 RDI: ffffc90000dd7d70 [ 49.467401][ T1399] RBP: ffffc90000dd7ba0 R08: ffffffff818fb565 R09: ffffed1047fe05cb [ 49.475209][ T1399] R10: 0000000000000000 R11: dffffc0000000001 R12: dffffc0000000000 [ 49.483015][ T1399] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000001000 [ 49.490839][ T1399] ? __generic_file_write_iter+0x1f5/0x560 [ 49.496472][ T1399] ? generic_perform_write+0x1d4/0x570 [ 49.501766][ T1399] ? grab_cache_page_write_begin+0xa0/0xa0 [ 49.507428][ T1399] ? file_remove_privs+0x570/0x570 [ 49.512352][ T1399] ? file_remove_privs+0x371/0x570 [ 49.517298][ T1399] __generic_file_write_iter+0x23c/0x560 [ 49.522767][ T1399] ? generic_write_checks+0x3b9/0x470 [ 49.527975][ T1399] generic_file_write_iter+0xaf/0x1c0 [ 49.533179][ T1399] vfs_write+0xb4c/0xe70 [ 49.537261][ T1399] ? kernel_write+0x3d0/0x3d0 [ 49.541777][ T1399] ? mutex_trylock+0xa0/0xa0 [ 49.546199][ T1399] ? __fdget_pos+0x2e7/0x3a0 [ 49.550624][ T1399] ? ksys_write+0x77/0x2c0 [ 49.554880][ T1399] ksys_write+0x199/0x2c0 [ 49.559048][ T1399] ? __kasan_check_write+0x14/0x20 [ 49.563993][ T1399] ? __ia32_sys_read+0x90/0x90 [ 49.568590][ T1399] ? __kasan_check_read+0x11/0x20 [ 49.573455][ T1399] ? asm_sysvec_apic_timer_interrupt+0xa/0x20 [ 49.579353][ T1399] __x64_sys_write+0x7b/0x90 [ 49.583785][ T1399] do_syscall_64+0x34/0x70 [ 49.588034][ T1399] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 49.593769][ T1399] RIP: 0033:0x7f659f7b5da9 [ 49.598013][ T1399] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 49.617455][ T1399] RSP: 002b:00007f659de20038 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 49.625698][ T1399] RAX: ffffffffffffffda RBX: 00007f659f9cefa0 RCX: 00007f659f7b5da9 [ 49.633508][ T1399] RDX: 0000000000040001 RSI: 0000000020000180 RDI: 000000000000000a [ 49.641319][ T1399] RBP: 00007f659de20090 R08: 0000000000000000 R09: 0000000000000000 [ 49.649131][ T1399] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 49.656944][ T1399] R13: 0000000000000000 R14: 00007f659f9cefa0 R15: 00007ffe17b03a18 [ 51.434626][ T1423] device syzkaller0 entered promiscuous mode [ 53.955343][ T1480] FAULT_INJECTION: forcing a failure. [ 53.955343][ T1480] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 54.088842][ T1480] CPU: 1 PID: 1480 Comm: syz.2.412 Tainted: G W 5.10.233-syzkaller-00881-gfbe98d68b6b3 #0 [ 54.099854][ T1480] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 12/27/2024 [ 54.109742][ T1480] Call Trace: [ 54.112879][ T1480] dump_stack_lvl+0x1e2/0x24b [ 54.117392][ T1480] ? bfq_pos_tree_add_move+0x43b/0x43b [ 54.122679][ T1480] ? 0xffffffffa00022f4 [ 54.126679][ T1480] ? is_bpf_text_address+0x172/0x190 [ 54.131795][ T1480] dump_stack+0x15/0x17 [ 54.135788][ T1480] should_fail+0x3c6/0x510 [ 54.140044][ T1480] should_fail_usercopy+0x1a/0x20 [ 54.144898][ T1480] _copy_from_user+0x20/0xd0 [ 54.149328][ T1480] __se_sys_bpf+0x232/0x11cb0 [ 54.153843][ T1480] ? stack_trace_save+0x113/0x1c0 [ 54.158700][ T1480] ? terminate_walk+0x407/0x4f0 [ 54.163390][ T1480] ? stack_trace_snprint+0xf0/0xf0 [ 54.168336][ T1480] ? kmem_cache_free+0xa9/0x1e0 [ 54.173014][ T1480] ? kmem_cache_free+0xa9/0x1e0 [ 54.177701][ T1480] ? kasan_set_track+0x5d/0x70 [ 54.182300][ T1480] ? __x64_sys_bpf+0x90/0x90 [ 54.186726][ T1480] ? __kasan_slab_free+0x11/0x20 [ 54.191499][ T1480] ? slab_free_freelist_hook+0xc0/0x190 [ 54.196881][ T1480] ? kmem_cache_free+0xa9/0x1e0 [ 54.201566][ T1480] ? putname+0xe7/0x140 [ 54.205559][ T1480] ? do_sys_openat2+0x1fc/0x710 [ 54.210247][ T1480] ? __x64_sys_openat+0x243/0x290 [ 54.215108][ T1480] ? do_syscall_64+0x34/0x70 [ 54.219536][ T1480] ? _kstrtoull+0x3a0/0x4a0 [ 54.223872][ T1480] ? kstrtouint_from_user+0x20a/0x2a0 [ 54.229084][ T1480] ? kstrtol_from_user+0x310/0x310 [ 54.234029][ T1480] ? memset+0x35/0x40 [ 54.237849][ T1480] ? __fsnotify_parent+0x4b9/0x6c0 [ 54.242795][ T1480] ? fsnotify_set_children_dentry_flags+0x210/0x210 [ 54.249216][ T1480] ? proc_fail_nth_write+0x20b/0x290 [ 54.254338][ T1480] ? proc_fail_nth_read+0x210/0x210 [ 54.259369][ T1480] ? security_file_permission+0x86/0xb0 [ 54.264752][ T1480] ? rw_verify_area+0x1c3/0x360 [ 54.269442][ T1480] ? preempt_count_add+0x92/0x1a0 [ 54.274298][ T1480] ? vfs_write+0x852/0xe70 [ 54.278555][ T1480] ? kmem_cache_free+0xa9/0x1e0 [ 54.283240][ T1480] ? kernel_write+0x3d0/0x3d0 [ 54.287752][ T1480] ? __kasan_check_write+0x14/0x20 [ 54.292699][ T1480] ? mutex_lock+0xa5/0x110 [ 54.296954][ T1480] ? mutex_trylock+0xa0/0xa0 [ 54.301378][ T1480] ? __kasan_check_write+0x14/0x20 [ 54.306326][ T1480] ? fput_many+0x160/0x1b0 [ 54.310585][ T1480] ? debug_smp_processor_id+0x17/0x20 [ 54.315786][ T1480] __x64_sys_bpf+0x7b/0x90 [ 54.320037][ T1480] do_syscall_64+0x34/0x70 [ 54.324291][ T1480] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 54.330018][ T1480] RIP: 0033:0x7f659f7b5da9 [ 54.334271][ T1480] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 54.353709][ T1480] RSP: 002b:00007f659de20038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 54.361957][ T1480] RAX: ffffffffffffffda RBX: 00007f659f9cefa0 RCX: 00007f659f7b5da9 [ 54.369766][ T1480] RDX: 0000000000000020 RSI: 00000000200000c0 RDI: 0000000000000005 [ 54.377577][ T1480] RBP: 00007f659de20090 R08: 0000000000000000 R09: 0000000000000000 [ 54.385390][ T1480] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 54.393202][ T1480] R13: 0000000000000000 R14: 00007f659f9cefa0 R15: 00007ffe17b03a18 [ 54.834406][ T1489] syz.3.415[1489] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 54.834459][ T1489] syz.3.415[1489] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 55.604858][ T1503] syz.4.419[1503] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 55.673332][ T1501] device sit0 entered promiscuous mode [ 55.696649][ T1503] syz.4.419[1503] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 60.635771][ T24] audit: type=1400 audit(1738077603.760:141): avc: denied { tracepoint } for pid=1586 comm="syz.1.444" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=1 [ 61.266673][ T1611] syz.4.449[1611] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 61.266739][ T1611] syz.4.449[1611] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 63.885226][ T1647] syz.1.459[1647] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 64.117526][ T1647] syz.1.459[1647] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 65.449073][ T24] audit: type=1400 audit(1738077608.570:142): avc: denied { create } for pid=1666 comm="syz.3.464" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rxrpc_socket permissive=1 [ 65.676061][ T1674] syz.0.465[1674] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 65.676115][ T1674] syz.0.465[1674] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 66.781423][ T1683] syz.1.468[1683] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 67.015771][ T1683] syz.1.468[1683] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 77.048917][ T24] audit: type=1400 audit(1738077620.170:143): avc: denied { create } for pid=1783 comm="syz.3.497" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 77.769814][ T1791] ªªªªªª: renamed from vlan0 [ 86.921779][ T24] audit: type=1400 audit(1738077630.050:144): avc: denied { cpu } for pid=1974 comm="syz.3.553" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=1 [ 87.005023][ T1976] device veth1_macvtap left promiscuous mode [ 87.040172][ T1976] device macsec0 entered promiscuous mode [ 95.202548][ T2089] FAULT_INJECTION: forcing a failure. [ 95.202548][ T2089] name failslab, interval 1, probability 0, space 0, times 0 [ 95.561574][ T2089] CPU: 0 PID: 2089 Comm: syz.2.585 Tainted: G W 5.10.233-syzkaller-00881-gfbe98d68b6b3 #0 [ 95.572586][ T2089] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 12/27/2024 [ 95.582472][ T2089] Call Trace: [ 95.585608][ T2089] dump_stack_lvl+0x1e2/0x24b [ 95.590118][ T2089] ? bfq_pos_tree_add_move+0x43b/0x43b [ 95.595414][ T2089] dump_stack+0x15/0x17 [ 95.599402][ T2089] should_fail+0x3c6/0x510 [ 95.603655][ T2089] ? htab_map_alloc+0x98/0x950 [ 95.608264][ T2089] __should_failslab+0xa4/0xe0 [ 95.612857][ T2089] should_failslab+0x9/0x20 [ 95.617194][ T2089] kmem_cache_alloc_trace+0x3a/0x2e0 [ 95.622316][ T2089] htab_map_alloc+0x98/0x950 [ 95.626746][ T2089] ? bpf_map_meta_alloc+0x16b/0x760 [ 95.631777][ T2089] htab_of_map_alloc+0x55/0xc0 [ 95.636375][ T2089] __se_sys_bpf+0x620f/0x11cb0 [ 95.640975][ T2089] ? stack_trace_save+0x113/0x1c0 [ 95.645835][ T2089] ? terminate_walk+0x407/0x4f0 [ 95.650520][ T2089] ? stack_trace_snprint+0xf0/0xf0 [ 95.655474][ T2089] ? kmem_cache_free+0xa9/0x1e0 [ 95.660156][ T2089] ? kmem_cache_free+0xa9/0x1e0 [ 95.664843][ T2089] ? kasan_set_track+0x5d/0x70 [ 95.669441][ T2089] ? __x64_sys_bpf+0x90/0x90 [ 95.673872][ T2089] ? __kasan_slab_free+0x11/0x20 [ 95.678648][ T2089] ? slab_free_freelist_hook+0xc0/0x190 [ 95.684023][ T2089] ? kmem_cache_free+0xa9/0x1e0 [ 95.688708][ T2089] ? putname+0xe7/0x140 [ 95.692699][ T2089] ? do_sys_openat2+0x1fc/0x710 [ 95.697392][ T2089] ? __x64_sys_openat+0x243/0x290 [ 95.702257][ T2089] ? do_syscall_64+0x34/0x70 [ 95.706675][ T2089] ? _kstrtoull+0x3a0/0x4a0 [ 95.711016][ T2089] ? kstrtouint_from_user+0x20a/0x2a0 [ 95.716229][ T2089] ? kstrtol_from_user+0x310/0x310 [ 95.721176][ T2089] ? memset+0x35/0x40 [ 95.724993][ T2089] ? __fsnotify_parent+0x4b9/0x6c0 [ 95.729940][ T2089] ? fsnotify_set_children_dentry_flags+0x210/0x210 [ 95.736359][ T2089] ? proc_fail_nth_write+0x20b/0x290 [ 95.741483][ T2089] ? proc_fail_nth_read+0x210/0x210 [ 95.746513][ T2089] ? security_file_permission+0x86/0xb0 [ 95.751900][ T2089] ? rw_verify_area+0x1c3/0x360 [ 95.756589][ T2089] ? preempt_count_add+0x92/0x1a0 [ 95.761451][ T2089] ? vfs_write+0x852/0xe70 [ 95.765697][ T2089] ? kmem_cache_free+0xa9/0x1e0 [ 95.770380][ T2089] ? kernel_write+0x3d0/0x3d0 [ 95.774907][ T2089] ? __kasan_check_write+0x14/0x20 [ 95.779839][ T2089] ? mutex_lock+0xa5/0x110 [ 95.784096][ T2089] ? mutex_trylock+0xa0/0xa0 [ 95.788526][ T2089] ? __kasan_check_write+0x14/0x20 [ 95.793475][ T2089] ? fput_many+0x160/0x1b0 [ 95.797727][ T2089] ? debug_smp_processor_id+0x17/0x20 [ 95.802941][ T2089] __x64_sys_bpf+0x7b/0x90 [ 95.807188][ T2089] do_syscall_64+0x34/0x70 [ 95.811453][ T2089] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 95.817164][ T2089] RIP: 0033:0x7f659f7b5da9 [ 95.821425][ T2089] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 95.840876][ T2089] RSP: 002b:00007f659de20038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 95.849104][ T2089] RAX: ffffffffffffffda RBX: 00007f659f9cefa0 RCX: 00007f659f7b5da9 [ 95.856913][ T2089] RDX: 0000000000000050 RSI: 00000000200008c0 RDI: 0c00000000000000 [ 95.864720][ T2089] RBP: 00007f659de20090 R08: 0000000000000000 R09: 0000000000000000 [ 95.872532][ T2089] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 95.880347][ T2089] R13: 0000000000000000 R14: 00007f659f9cefa0 R15: 00007ffe17b03a18 [ 100.805483][ T24] audit: type=1400 audit(1738077643.930:145): avc: denied { create } for pid=2171 comm="syz.3.607" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=phonet_socket permissive=1 [ 100.946278][ T2183] FAULT_INJECTION: forcing a failure. [ 100.946278][ T2183] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 101.101137][ T2183] CPU: 1 PID: 2183 Comm: syz.4.609 Tainted: G W 5.10.233-syzkaller-00881-gfbe98d68b6b3 #0 [ 101.112148][ T2183] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 12/27/2024 [ 101.122036][ T2183] Call Trace: [ 101.125174][ T2183] dump_stack_lvl+0x1e2/0x24b [ 101.129683][ T2183] ? bfq_pos_tree_add_move+0x43b/0x43b [ 101.134977][ T2183] dump_stack+0x15/0x17 [ 101.138966][ T2183] should_fail+0x3c6/0x510 [ 101.143220][ T2183] should_fail_alloc_page+0x52/0x60 [ 101.148253][ T2183] __alloc_pages_nodemask+0x1b3/0xaf0 [ 101.153459][ T2183] ? __kernel_text_address+0x9b/0x110 [ 101.158673][ T2183] ? gfp_pfmemalloc_allowed+0x120/0x120 [ 101.164054][ T2183] ? stack_trace_save+0x113/0x1c0 [ 101.168911][ T2183] ? avc_has_perm_noaudit+0x117/0x240 [ 101.174118][ T2183] shmem_alloc_page+0x257/0x420 [ 101.178801][ T2183] ? put_page+0xd0/0xd0 [ 101.182801][ T2183] ? percpu_counter_add_batch+0x13d/0x160 [ 101.188352][ T2183] shmem_alloc_and_acct_page+0x395/0x8e0 [ 101.193820][ T2183] ? shmem_swapin_page+0x1950/0x1950 [ 101.198943][ T2183] ? find_get_entry+0x44c/0x4c0 [ 101.203628][ T2183] ? page_cache_prev_miss+0x410/0x410 [ 101.208839][ T2183] ? down_read_trylock+0x179/0x1d0 [ 101.213783][ T2183] ? find_lock_entry+0x1df/0x200 [ 101.218562][ T2183] shmem_getpage_gfp+0x891/0x2480 [ 101.223419][ T2183] ? __kasan_check_write+0x14/0x20 [ 101.228370][ T2183] ? shmem_getpage+0xa0/0xa0 [ 101.232787][ T2183] ? iov_iter_fault_in_readable+0x31f/0x4f0 [ 101.238520][ T2183] shmem_write_begin+0xca/0x1b0 [ 101.243207][ T2183] generic_perform_write+0x2cd/0x570 [ 101.248330][ T2183] ? grab_cache_page_write_begin+0xa0/0xa0 [ 101.253964][ T2183] ? file_remove_privs+0x570/0x570 [ 101.258914][ T2183] ? __kasan_check_write+0x14/0x20 [ 101.263862][ T2183] __generic_file_write_iter+0x23c/0x560 [ 101.269324][ T2183] ? generic_write_checks+0x3b9/0x470 [ 101.274540][ T2183] generic_file_write_iter+0xaf/0x1c0 [ 101.279742][ T2183] vfs_write+0xb4c/0xe70 [ 101.283824][ T2183] ? kernel_write+0x3d0/0x3d0 [ 101.288336][ T2183] ? mutex_trylock+0xa0/0xa0 [ 101.292762][ T2183] ? __fdget_pos+0x2e7/0x3a0 [ 101.297186][ T2183] ? ksys_write+0x77/0x2c0 [ 101.301440][ T2183] ksys_write+0x199/0x2c0 [ 101.305608][ T2183] ? __ia32_sys_read+0x90/0x90 [ 101.310213][ T2183] ? debug_smp_processor_id+0x17/0x20 [ 101.315415][ T2183] __x64_sys_write+0x7b/0x90 [ 101.319851][ T2183] do_syscall_64+0x34/0x70 [ 101.324097][ T2183] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 101.329815][ T2183] RIP: 0033:0x7f23cd486da9 [ 101.334069][ T2183] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 101.353507][ T2183] RSP: 002b:00007f23cbad0038 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 101.361752][ T2183] RAX: ffffffffffffffda RBX: 00007f23cd6a0080 RCX: 00007f23cd486da9 [ 101.369562][ T2183] RDX: 0000000000040001 RSI: 0000000020000180 RDI: 000000000000000c [ 101.377373][ T2183] RBP: 00007f23cbad0090 R08: 0000000000000000 R09: 0000000000000000 [ 101.385184][ T2183] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 101.392999][ T2183] R13: 0000000000000000 R14: 00007f23cd6a0080 R15: 00007fffe85a0458 [ 101.523186][ T2190] FAULT_INJECTION: forcing a failure. [ 101.523186][ T2190] name failslab, interval 1, probability 0, space 0, times 0 [ 101.535789][ T2190] CPU: 1 PID: 2190 Comm: syz.3.611 Tainted: G W 5.10.233-syzkaller-00881-gfbe98d68b6b3 #0 [ 101.546777][ T2190] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 12/27/2024 [ 101.556669][ T2190] Call Trace: [ 101.559801][ T2190] dump_stack_lvl+0x1e2/0x24b [ 101.564307][ T2190] ? panic+0x812/0x812 [ 101.568212][ T2190] ? bfq_pos_tree_add_move+0x43b/0x43b [ 101.573507][ T2190] ? ___ratelimit+0xb5/0x580 [ 101.577933][ T2190] dump_stack+0x15/0x17 [ 101.581924][ T2190] should_fail+0x3c6/0x510 [ 101.586180][ T2190] ? dev_addr_init+0xe0/0x3f0 [ 101.590692][ T2190] __should_failslab+0xa4/0xe0 [ 101.595296][ T2190] should_failslab+0x9/0x20 [ 101.599632][ T2190] kmem_cache_alloc_trace+0x3a/0x2e0 [ 101.604752][ T2190] dev_addr_init+0xe0/0x3f0 [ 101.609090][ T2190] alloc_netdev_mqs+0x129/0xcd0 [ 101.613779][ T2190] ? tun_not_capable+0x210/0x210 [ 101.618550][ T2190] tun_set_iff+0x54e/0xdb0 [ 101.622803][ T2190] __tun_chr_ioctl+0x8b3/0x2260 [ 101.627494][ T2190] ? tun_flow_create+0x320/0x320 [ 101.632263][ T2190] ? __fget_files+0x31e/0x380 [ 101.636778][ T2190] tun_chr_ioctl+0x2a/0x40 [ 101.641029][ T2190] ? tun_chr_poll+0x670/0x670 [ 101.645544][ T2190] __se_sys_ioctl+0x114/0x190 [ 101.650055][ T2190] __x64_sys_ioctl+0x7b/0x90 [ 101.654482][ T2190] do_syscall_64+0x34/0x70 [ 101.658736][ T2190] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 101.664467][ T2190] RIP: 0033:0x7ff9470f6da9 [ 101.668717][ T2190] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 101.688166][ T2190] RSP: 002b:00007ff945761038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 101.696405][ T2190] RAX: ffffffffffffffda RBX: 00007ff94730ffa0 RCX: 00007ff9470f6da9 [ 101.704218][ T2190] RDX: 00000000200006c0 RSI: 00000000400454ca RDI: 0000000000000004 [ 101.712026][ T2190] RBP: 00007ff945761090 R08: 0000000000000000 R09: 0000000000000000 [ 101.719835][ T2190] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 101.727644][ T2190] R13: 0000000000000000 R14: 00007ff94730ffa0 R15: 00007ffc6b9eeb88 [ 102.050761][ T2207] bridge0: port 2(bridge_slave_1) entered disabled state [ 103.474390][ T2217] device veth0_vlan left promiscuous mode [ 103.624614][ T2217] device veth0_vlan entered promiscuous mode [ 103.726782][ T307] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 103.737355][ T307] IPv6: ADDRCONF(NETDEV_CHANGE): ªªªªªª: link becomes ready [ 103.749014][ T307] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 104.830033][ T2250] device veth0_vlan left promiscuous mode [ 104.866842][ T2250] device veth0_vlan entered promiscuous mode [ 104.881104][ T1354] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 104.889582][ T1354] IPv6: ADDRCONF(NETDEV_CHANGE): ªªªªªª: link becomes ready [ 104.898260][ T1354] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 104.985153][ T2260] device syzkaller0 entered promiscuous mode [ 105.217292][ T2267] device pim6reg1 entered promiscuous mode [ 105.262233][ T24] audit: type=1400 audit(1738077648.390:146): avc: denied { ioctl } for pid=2270 comm="syz.3.635" path="pid:[4026532439]" dev="nsfs" ino=4026532439 ioctlcmd=0xb701 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 105.851264][ T2286] device bond_slave_1 entered promiscuous mode [ 105.895321][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): bond_slave_1: link becomes ready [ 105.916772][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 105.971555][ T24] audit: type=1400 audit(1738077649.100:147): avc: denied { ioctl } for pid=2289 comm="syz.4.641" path="socket:[21956]" dev="sockfs" ino=21956 ioctlcmd=0x8914 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 106.221244][ T2302] syz.0.644 (2302) used obsolete PPPIOCDETACH ioctl [ 108.538023][ T2352] syz.0.656[2352] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 108.547954][ T2352] device veth0_vlan left promiscuous mode [ 108.745357][ T2352] device veth0_vlan entered promiscuous mode [ 109.095824][ T307] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 109.112588][ T307] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 109.233708][ T307] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ: link becomes ready [ 109.722487][ T2375] FAULT_INJECTION: forcing a failure. [ 109.722487][ T2375] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 109.791869][ T2375] CPU: 0 PID: 2375 Comm: syz.0.663 Tainted: G W 5.10.233-syzkaller-00881-gfbe98d68b6b3 #0 [ 109.802875][ T2375] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 12/27/2024 [ 109.812763][ T2375] Call Trace: [ 109.815898][ T2375] dump_stack_lvl+0x1e2/0x24b [ 109.820404][ T2375] ? bfq_pos_tree_add_move+0x43b/0x43b [ 109.825701][ T2375] ? memset+0x35/0x40 [ 109.829515][ T2375] dump_stack+0x15/0x17 [ 109.833510][ T2375] should_fail+0x3c6/0x510 [ 109.837762][ T2375] should_fail_usercopy+0x1a/0x20 [ 109.842620][ T2375] _copy_from_user+0x20/0xd0 [ 109.847049][ T2375] __se_sys_bpf+0x232/0x11cb0 [ 109.851565][ T2375] ? perf_event_output_forward+0x14e/0x1b0 [ 109.857204][ T2375] ? perf_prepare_sample+0x1af0/0x1af0 [ 109.862497][ T2375] ? sched_clock+0x3a/0x40 [ 109.866749][ T2375] ? sched_clock_cpu+0x1b/0x3b0 [ 109.871436][ T2375] ? __x64_sys_bpf+0x90/0x90 [ 109.875864][ T2375] ? __this_cpu_preempt_check+0x13/0x20 [ 109.881247][ T2375] ? __perf_event_account_interrupt+0x18f/0x2c0 [ 109.887319][ T2375] ? hrtimer_forward+0x1a6/0x2c0 [ 109.892095][ T2375] ? perf_swevent_hrtimer+0x4b8/0x560 [ 109.897301][ T2375] ? asm_sysvec_apic_timer_interrupt+0x12/0x20 [ 109.903288][ T2375] ? cpu_clock_event_read+0x50/0x50 [ 109.908326][ T2375] ? timerqueue_add+0x24c/0x270 [ 109.913011][ T2375] ? enqueue_hrtimer+0xad/0x200 [ 109.917698][ T2375] ? __hrtimer_run_queues+0x438/0xa50 [ 109.922905][ T2375] ? __hrtimer_run_queues+0x9ea/0xa50 [ 109.928113][ T2375] ? ktime_get+0x10e/0x140 [ 109.932363][ T2375] ? lapic_next_event+0x5f/0x70 [ 109.937052][ T2375] ? clockevents_program_event+0x214/0x2c0 [ 109.942704][ T2375] ? hrtimer_interrupt+0x6a8/0x8b0 [ 109.947645][ T2375] ? debug_smp_processor_id+0x17/0x20 [ 109.952850][ T2375] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 109.958748][ T2375] __x64_sys_bpf+0x7b/0x90 [ 109.963000][ T2375] do_syscall_64+0x34/0x70 [ 109.967255][ T2375] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 109.972981][ T2375] RIP: 0033:0x7f9a75babda9 [ 109.977236][ T2375] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 109.996688][ T2375] RSP: 002b:00007f9a74216038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 110.005066][ T2375] RAX: ffffffffffffffda RBX: 00007f9a75dc4fa0 RCX: 00007f9a75babda9 [ 110.012864][ T2375] RDX: 0000000000000020 RSI: 0000000020000200 RDI: 0000000000000002 [ 110.020679][ T2375] RBP: 00007f9a74216090 R08: 0000000000000000 R09: 0000000000000000 [ 110.028486][ T2375] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 110.036296][ T2375] R13: 0000000000000000 R14: 00007f9a75dc4fa0 R15: 00007fff5c18dea8 [ 110.201027][ T2381] device pim6reg1 entered promiscuous mode [ 110.756813][ T2413] device veth1_macvtap left promiscuous mode [ 110.808137][ T2413] device macsec0 entered promiscuous mode [ 111.806996][ T2432] device syzkaller0 entered promiscuous mode [ 111.916124][ T2431] device macsec0 left promiscuous mode [ 112.001368][ T2446] syz.3.685[2446] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 112.001498][ T2446] syz.3.685[2446] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 112.292735][ T2459] device pim6reg1 entered promiscuous mode [ 112.936650][ T2478] FAULT_INJECTION: forcing a failure. [ 112.936650][ T2478] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 113.058635][ T2478] CPU: 0 PID: 2478 Comm: syz.2.696 Tainted: G W 5.10.233-syzkaller-00881-gfbe98d68b6b3 #0 [ 113.069641][ T2478] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 12/27/2024 [ 113.079532][ T2478] Call Trace: [ 113.082663][ T2478] dump_stack_lvl+0x1e2/0x24b [ 113.087170][ T2478] ? bfq_pos_tree_add_move+0x43b/0x43b [ 113.092462][ T2478] ? __alloc_pages_nodemask+0x435/0xaf0 [ 113.097845][ T2478] dump_stack+0x15/0x17 [ 113.101837][ T2478] should_fail+0x3c6/0x510 [ 113.106090][ T2478] should_fail_usercopy+0x1a/0x20 [ 113.110951][ T2478] copy_page_from_iter+0x398/0x6e0 [ 113.115903][ T2478] pipe_write+0x92b/0x18c0 [ 113.120153][ T2478] ? pipe_read+0x1040/0x1040 [ 113.124580][ T2478] ? fsnotify_perm+0x67/0x4e0 [ 113.129088][ T2478] ? security_file_permission+0x7b/0xb0 [ 113.134469][ T2478] ? security_file_permission+0x86/0xb0 [ 113.139851][ T2478] ? iov_iter_init+0x3f/0x120 [ 113.144364][ T2478] vfs_write+0xb4c/0xe70 [ 113.148445][ T2478] ? kernel_write+0x3d0/0x3d0 [ 113.152961][ T2478] ? __fdget_pos+0x209/0x3a0 [ 113.157381][ T2478] ? ksys_write+0x77/0x2c0 [ 113.161635][ T2478] ksys_write+0x199/0x2c0 [ 113.165807][ T2478] ? __ia32_sys_read+0x90/0x90 [ 113.170404][ T2478] ? debug_smp_processor_id+0x17/0x20 [ 113.175611][ T2478] __x64_sys_write+0x7b/0x90 [ 113.180037][ T2478] do_syscall_64+0x34/0x70 [ 113.184289][ T2478] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 113.190014][ T2478] RIP: 0033:0x7f659f7b5da9 [ 113.194269][ T2478] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 113.213803][ T2478] RSP: 002b:00007f659de20038 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 113.222137][ T2478] RAX: ffffffffffffffda RBX: 00007f659f9cefa0 RCX: 00007f659f7b5da9 [ 113.229947][ T2478] RDX: 000000000000fdef RSI: 0000000020000000 RDI: 0000000000000000 [ 113.237758][ T2478] RBP: 00007f659de20090 R08: 0000000000000000 R09: 0000000000000000 [ 113.245570][ T2478] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 113.253381][ T2478] R13: 0000000000000000 R14: 00007f659f9cefa0 R15: 00007ffe17b03a18 [ 113.907765][ T2513] ªªªªªª: renamed from vlan0 [ 113.986841][ T2522] FAULT_INJECTION: forcing a failure. [ 113.986841][ T2522] name failslab, interval 1, probability 0, space 0, times 0 [ 114.018624][ T2522] CPU: 0 PID: 2522 Comm: syz.1.709 Tainted: G W 5.10.233-syzkaller-00881-gfbe98d68b6b3 #0 [ 114.029630][ T2522] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 12/27/2024 [ 114.039518][ T2522] Call Trace: [ 114.042667][ T2522] dump_stack_lvl+0x1e2/0x24b [ 114.047157][ T2522] ? panic+0x812/0x812 [ 114.051061][ T2522] ? bfq_pos_tree_add_move+0x43b/0x43b [ 114.056357][ T2522] dump_stack+0x15/0x17 [ 114.060350][ T2522] should_fail+0x3c6/0x510 [ 114.064602][ T2522] ? alloc_skb_with_frags+0xa1/0x570 [ 114.069724][ T2522] __should_failslab+0xa4/0xe0 [ 114.074321][ T2522] should_failslab+0x9/0x20 [ 114.078664][ T2522] __kmalloc_track_caller+0x5f/0x320 [ 114.083781][ T2522] ? kmem_cache_alloc+0x168/0x2e0 [ 114.088642][ T2522] ? __alloc_skb+0x80/0x510 [ 114.092980][ T2522] ? alloc_skb_with_frags+0xa1/0x570 [ 114.098103][ T2522] __alloc_skb+0xbc/0x510 [ 114.102274][ T2522] ? avc_has_perm+0x275/0x400 [ 114.106784][ T2522] alloc_skb_with_frags+0xa1/0x570 [ 114.111728][ T2522] ? avc_has_perm_noaudit+0x240/0x240 [ 114.116938][ T2522] sock_alloc_send_pskb+0x915/0xa50 [ 114.121974][ T2522] ? sock_kzfree_s+0x60/0x60 [ 114.126397][ T2522] ? __kasan_check_write+0x14/0x20 [ 114.131346][ T2522] ? _raw_spin_lock+0xa4/0x1b0 [ 114.135944][ T2522] ? _raw_spin_trylock_bh+0x190/0x190 [ 114.141153][ T2522] unix_dgram_sendmsg+0x700/0x1f90 [ 114.146101][ T2522] ? selinux_socket_accept+0x5b0/0x5b0 [ 114.151394][ T2522] ? unix_dgram_poll+0x610/0x610 [ 114.156166][ T2522] ? kasan_set_track+0x5d/0x70 [ 114.160853][ T2522] ? kasan_set_track+0x4b/0x70 [ 114.165453][ T2522] ? security_socket_sendmsg+0x82/0xb0 [ 114.170748][ T2522] ? unix_dgram_poll+0x610/0x610 [ 114.175521][ T2522] ____sys_sendmsg+0x59e/0x8f0 [ 114.180123][ T2522] ? __sys_sendmsg_sock+0x40/0x40 [ 114.184982][ T2522] ? import_iovec+0xe5/0x120 [ 114.189408][ T2522] ___sys_sendmsg+0x252/0x2e0 [ 114.193925][ T2522] ? __sys_sendmsg+0x280/0x280 [ 114.198533][ T2522] ? rw_verify_area+0x1c3/0x360 [ 114.203214][ T2522] ? __fdget+0x1bc/0x240 [ 114.207285][ T2522] __se_sys_sendmsg+0x1b1/0x280 [ 114.211976][ T2522] ? __x64_sys_sendmsg+0x90/0x90 [ 114.216749][ T2522] ? ksys_write+0x260/0x2c0 [ 114.221089][ T2522] ? debug_smp_processor_id+0x17/0x20 [ 114.226295][ T2522] __x64_sys_sendmsg+0x7b/0x90 [ 114.230895][ T2522] do_syscall_64+0x34/0x70 [ 114.235147][ T2522] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 114.240874][ T2522] RIP: 0033:0x7fd742c5dda9 [ 114.245130][ T2522] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 114.264569][ T2522] RSP: 002b:00007fd7412c8038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 114.272811][ T2522] RAX: ffffffffffffffda RBX: 00007fd742e76fa0 RCX: 00007fd742c5dda9 [ 114.280623][ T2522] RDX: 0000000000000000 RSI: 0000000020000b40 RDI: 0000000000000006 [ 114.288436][ T2522] RBP: 00007fd7412c8090 R08: 0000000000000000 R09: 0000000000000000 [ 114.296243][ T2522] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 114.304057][ T2522] R13: 0000000000000000 R14: 00007fd742e76fa0 R15: 00007ffde54f7548 [ 116.962185][ T2629] syz.2.744[2629] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 116.962240][ T2629] syz.2.744[2629] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 117.188916][ T2634] device sit0 entered promiscuous mode [ 122.845976][ T2750] bridge0: port 1(bridge_slave_0) entered disabled state [ 124.187904][ T2790] FAULT_INJECTION: forcing a failure. [ 124.187904][ T2790] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 124.219479][ T2790] CPU: 1 PID: 2790 Comm: syz.3.792 Tainted: G W 5.10.233-syzkaller-00881-gfbe98d68b6b3 #0 [ 124.230488][ T2790] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 12/27/2024 [ 124.240389][ T2790] Call Trace: [ 124.243529][ T2790] dump_stack_lvl+0x1e2/0x24b [ 124.248023][ T2790] ? bfq_pos_tree_add_move+0x43b/0x43b [ 124.253319][ T2790] dump_stack+0x15/0x17 [ 124.257305][ T2790] should_fail+0x3c6/0x510 [ 124.261562][ T2790] should_fail_alloc_page+0x52/0x60 [ 124.266595][ T2790] __alloc_pages_nodemask+0x1b3/0xaf0 [ 124.271803][ T2790] ? __kernel_text_address+0x9b/0x110 [ 124.277012][ T2790] ? gfp_pfmemalloc_allowed+0x120/0x120 [ 124.282391][ T2790] ? stack_trace_save+0x113/0x1c0 [ 124.287256][ T2790] ? avc_has_perm_noaudit+0x117/0x240 [ 124.292470][ T2790] shmem_alloc_page+0x257/0x420 [ 124.297150][ T2790] ? put_page+0xd0/0xd0 [ 124.301147][ T2790] ? percpu_counter_add_batch+0x13d/0x160 [ 124.306697][ T2790] shmem_alloc_and_acct_page+0x395/0x8e0 [ 124.312165][ T2790] ? shmem_swapin_page+0x1950/0x1950 [ 124.317288][ T2790] ? find_get_entry+0x44c/0x4c0 [ 124.321968][ T2790] ? page_cache_prev_miss+0x410/0x410 [ 124.327179][ T2790] ? down_read_trylock+0x179/0x1d0 [ 124.332121][ T2790] ? find_lock_entry+0x1df/0x200 [ 124.336899][ T2790] shmem_getpage_gfp+0x891/0x2480 [ 124.341756][ T2790] ? __kasan_check_write+0x14/0x20 [ 124.346712][ T2790] ? shmem_getpage+0xa0/0xa0 [ 124.351135][ T2790] ? iov_iter_fault_in_readable+0x31f/0x4f0 [ 124.356862][ T2790] shmem_write_begin+0xca/0x1b0 [ 124.361549][ T2790] generic_perform_write+0x2cd/0x570 [ 124.366669][ T2790] ? grab_cache_page_write_begin+0xa0/0xa0 [ 124.372328][ T2790] ? file_remove_privs+0x570/0x570 [ 124.377256][ T2790] ? __kasan_check_write+0x14/0x20 [ 124.382200][ T2790] __generic_file_write_iter+0x23c/0x560 [ 124.387665][ T2790] ? generic_write_checks+0x3b9/0x470 [ 124.392906][ T2790] generic_file_write_iter+0xaf/0x1c0 [ 124.398083][ T2790] vfs_write+0xb4c/0xe70 [ 124.402250][ T2790] ? kernel_write+0x3d0/0x3d0 [ 124.406760][ T2790] ? mutex_trylock+0xa0/0xa0 [ 124.411187][ T2790] ? __fdget_pos+0x2e7/0x3a0 [ 124.415606][ T2790] ? ksys_write+0x77/0x2c0 [ 124.419859][ T2790] ksys_write+0x199/0x2c0 [ 124.424031][ T2790] ? __ia32_sys_read+0x90/0x90 [ 124.428630][ T2790] ? debug_smp_processor_id+0x17/0x20 [ 124.433833][ T2790] __x64_sys_write+0x7b/0x90 [ 124.438263][ T2790] do_syscall_64+0x34/0x70 [ 124.442516][ T2790] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 124.448240][ T2790] RIP: 0033:0x7ff9470f6da9 [ 124.452496][ T2790] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 124.471935][ T2790] RSP: 002b:00007ff945761038 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 124.480179][ T2790] RAX: ffffffffffffffda RBX: 00007ff94730ffa0 RCX: 00007ff9470f6da9 [ 124.487992][ T2790] RDX: 0000000000040010 RSI: 0000000020000180 RDI: 0000000000000007 [ 124.495801][ T2790] RBP: 00007ff945761090 R08: 0000000000000000 R09: 0000000000000000 [ 124.503612][ T2790] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 124.511426][ T2790] R13: 0000000000000000 R14: 00007ff94730ffa0 R15: 00007ffc6b9eeb88 [ 129.941443][ T2959] FAULT_INJECTION: forcing a failure. [ 129.941443][ T2959] name failslab, interval 1, probability 0, space 0, times 0 [ 129.953883][ T2959] CPU: 0 PID: 2959 Comm: syz.0.848 Tainted: G W 5.10.233-syzkaller-00881-gfbe98d68b6b3 #0 [ 129.964867][ T2959] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 12/27/2024 [ 129.974757][ T2959] Call Trace: [ 129.977886][ T2959] dump_stack_lvl+0x1e2/0x24b [ 129.982395][ T2959] ? panic+0x812/0x812 [ 129.986302][ T2959] ? bfq_pos_tree_add_move+0x43b/0x43b [ 129.991590][ T2959] ? fib6_table_lookup+0x986/0xaf0 [ 129.996537][ T2959] dump_stack+0x15/0x17 [ 130.000529][ T2959] should_fail+0x3c6/0x510 [ 130.004784][ T2959] ? dst_alloc+0x17d/0x590 [ 130.009037][ T2959] __should_failslab+0xa4/0xe0 [ 130.013635][ T2959] should_failslab+0x9/0x20 [ 130.017978][ T2959] kmem_cache_alloc+0x3d/0x2e0 [ 130.022576][ T2959] ? fib6_select_path+0x140/0x560 [ 130.027435][ T2959] ? ipv6_sysctl_rtcache_flush+0xf0/0xf0 [ 130.032910][ T2959] dst_alloc+0x17d/0x590 [ 130.036983][ T2959] ip6_pol_route+0xc2a/0x14b0 [ 130.041496][ T2959] ? fib6_table_lookup+0xaf0/0xaf0 [ 130.046443][ T2959] ? stack_trace_save+0x113/0x1c0 [ 130.051302][ T2959] ? stack_trace_snprint+0xf0/0xf0 [ 130.056251][ T2959] ip6_pol_route_output+0x50/0x80 [ 130.061114][ T2959] fib6_rule_lookup+0x371/0x620 [ 130.065798][ T2959] ? ip6_route_output_flags_noref+0x2f0/0x2f0 [ 130.071702][ T2959] ? fib6_lookup+0x3f0/0x3f0 [ 130.076126][ T2959] ? skb_copy_bits+0x8d/0x7f0 [ 130.080638][ T2959] ? ip6_route_input+0x726/0xb00 [ 130.085410][ T2959] ? ip6_rcv_finish+0x14f/0x350 [ 130.090095][ T2959] ? ipv6_rcv+0xee/0x270 [ 130.094180][ T2959] ? __netif_receive_skb+0x1c6/0x530 [ 130.099300][ T2959] ? netif_receive_skb+0xb0/0x480 [ 130.104158][ T2959] ? tun_rx_batched+0x6d9/0x870 [ 130.108845][ T2959] ? tun_get_user+0x2bf3/0x38f0 [ 130.113532][ T2959] ? tun_chr_write_iter+0x1a8/0x250 [ 130.118566][ T2959] ? ksys_write+0x199/0x2c0 [ 130.122911][ T2959] ? __ipv6_addr_type+0x116/0x2f0 [ 130.127769][ T2959] ip6_route_output_flags_noref+0x252/0x2f0 [ 130.133495][ T2959] ip6_route_output_flags+0x3f/0x220 [ 130.138617][ T2959] icmpv6_rt_has_prefsrc+0x4a/0x1f0 [ 130.143650][ T2959] icmp6_send+0xc70/0x1e00 [ 130.147909][ T2959] ? icmpv6_push_pending_frames+0x450/0x450 [ 130.153630][ T2959] ? ip6_rt_copy_init+0x627/0x810 [ 130.158493][ T2959] ? ip6_pol_route+0xa8f/0x14b0 [ 130.163177][ T2959] ? fib6_table_lookup+0xaf0/0xaf0 [ 130.168126][ T2959] ? alloc_skb_with_frags+0xa1/0x570 [ 130.173243][ T2959] ? local_bh_enable+0x1f/0x30 [ 130.177850][ T2959] ? ip6t_do_table+0x162c/0x1800 [ 130.182616][ T2959] ? __local_bh_enable_ip+0x53/0x80 [ 130.187668][ T2959] ? local_bh_enable+0x1f/0x30 [ 130.192252][ T2959] icmpv6_param_prob+0x31/0x40 [ 130.196854][ T2959] ip6_parse_tlv+0x730/0x800 [ 130.201280][ T2959] ipv6_destopt_rcv+0x3a3/0x7d0 [ 130.205971][ T2959] ip6_protocol_deliver_rcu+0xa57/0x12f0 [ 130.211433][ T2959] ? ip6table_filter_hook+0x69/0x80 [ 130.216471][ T2959] ip6_input+0xdc/0x260 [ 130.220459][ T2959] ? ip6_protocol_deliver_rcu+0x12f0/0x12f0 [ 130.226187][ T2959] ? ip6_input+0x260/0x260 [ 130.230440][ T2959] ? ip6table_raw_hook+0x69/0x80 [ 130.235215][ T2959] ip6_rcv_finish+0x185/0x350 [ 130.239729][ T2959] ipv6_rcv+0xee/0x270 [ 130.243634][ T2959] ? ip6_rcv_finish+0x350/0x350 [ 130.248320][ T2959] ? refcount_add+0x80/0x80 [ 130.252659][ T2959] ? down_read_trylock+0x179/0x1d0 [ 130.257606][ T2959] ? kasan_poison+0x5d/0x70 [ 130.262039][ T2959] ? __kasan_kmalloc_large+0xad/0xc0 [ 130.267161][ T2959] ? __init_rwsem+0x1c0/0x1c0 [ 130.271672][ T2959] ? ip6_rcv_finish+0x350/0x350 [ 130.276359][ T2959] __netif_receive_skb+0x1c6/0x530 [ 130.281309][ T2959] ? __kasan_check_write+0x14/0x20 [ 130.286256][ T2959] ? exc_page_fault+0x33d/0x5b0 [ 130.290940][ T2959] ? deliver_ptype_list_skb+0x3c0/0x3c0 [ 130.296336][ T2959] ? asm_exc_page_fault+0x1e/0x30 [ 130.301182][ T2959] ? _copy_from_iter+0x1b1/0xd10 [ 130.305958][ T2959] netif_receive_skb+0xb0/0x480 [ 130.310642][ T2959] ? _copy_from_iter+0x3e6/0xd10 [ 130.315416][ T2959] ? netif_receive_skb_core+0x210/0x210 [ 130.320799][ T2959] ? sock_alloc_send_pskb+0x936/0xa50 [ 130.326011][ T2959] tun_rx_batched+0x6d9/0x870 [ 130.330517][ T2959] ? eth_type_trans+0x2e4/0x620 [ 130.335203][ T2959] ? local_bh_enable+0x30/0x30 [ 130.339807][ T2959] ? bpf_do_trace_printk+0x128/0x270 [ 130.344925][ T2959] tun_get_user+0x2bf3/0x38f0 [ 130.349441][ T2959] ? _kstrtoull+0x3a0/0x4a0 [ 130.353778][ T2959] ? tun_do_read+0x1f60/0x1f60 [ 130.358377][ T2959] ? kstrtouint_from_user+0x20a/0x2a0 [ 130.363585][ T2959] ? kstrtol_from_user+0x310/0x310 [ 130.368543][ T2959] ? avc_policy_seqno+0x1b/0x70 [ 130.373218][ T2959] ? selinux_file_permission+0x2bb/0x560 [ 130.378695][ T2959] ? fsnotify_perm+0x67/0x4e0 [ 130.383290][ T2959] tun_chr_write_iter+0x1a8/0x250 [ 130.388150][ T2959] vfs_write+0xb4c/0xe70 [ 130.392226][ T2959] ? putname+0xe7/0x140 [ 130.396218][ T2959] ? __traceiter_kmem_cache_free+0x2e/0x50 [ 130.401866][ T2959] ? kernel_write+0x3d0/0x3d0 [ 130.406376][ T2959] ? __fdget_pos+0x209/0x3a0 [ 130.410804][ T2959] ? ksys_write+0x77/0x2c0 [ 130.415052][ T2959] ksys_write+0x199/0x2c0 [ 130.419225][ T2959] ? __ia32_sys_read+0x90/0x90 [ 130.423821][ T2959] ? debug_smp_processor_id+0x17/0x20 [ 130.429025][ T2959] __x64_sys_write+0x7b/0x90 [ 130.433451][ T2959] do_syscall_64+0x34/0x70 [ 130.437705][ T2959] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 130.443435][ T2959] RIP: 0033:0x7f9a75babda9 [ 130.447689][ T2959] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 130.467125][ T2959] RSP: 002b:00007f9a74216038 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 130.475369][ T2959] RAX: ffffffffffffffda RBX: 00007f9a75dc4fa0 RCX: 00007f9a75babda9 [ 130.483181][ T2959] RDX: 000000000000fdef RSI: 0000000020000000 RDI: 00000000000000c8 [ 130.490991][ T2959] RBP: 00007f9a74216090 R08: 0000000000000000 R09: 0000000000000000 [ 130.498805][ T2959] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 130.506616][ T2959] R13: 0000000000000000 R14: 00007f9a75dc4fa0 R15: 00007fff5c18dea8 [ 131.699203][ T2995] FAULT_INJECTION: forcing a failure. [ 131.699203][ T2995] name failslab, interval 1, probability 0, space 0, times 0 [ 131.727460][ T2997] device bond_slave_1 entered promiscuous mode [ 131.733815][ T1354] IPv6: ADDRCONF(NETDEV_CHANGE): bond_slave_1: link becomes ready [ 131.745143][ T1354] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 131.817419][ T2995] CPU: 1 PID: 2995 Comm: syz.3.860 Tainted: G W 5.10.233-syzkaller-00881-gfbe98d68b6b3 #0 [ 131.828431][ T2995] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 12/27/2024 [ 131.838318][ T2995] Call Trace: [ 131.841451][ T2995] dump_stack_lvl+0x1e2/0x24b [ 131.845960][ T2995] ? bfq_pos_tree_add_move+0x43b/0x43b [ 131.851253][ T2995] ? kmem_cache_free+0xa9/0x1e0 [ 131.855937][ T2995] ? kasan_set_track+0x5d/0x70 [ 131.860537][ T2995] ? kasan_set_free_info+0x23/0x40 [ 131.865484][ T2995] dump_stack+0x15/0x17 [ 131.869475][ T2995] should_fail+0x3c6/0x510 [ 131.873729][ T2995] ? dup_task_struct+0x57/0xc30 [ 131.878418][ T2995] __should_failslab+0xa4/0xe0 [ 131.883017][ T2995] should_failslab+0x9/0x20 [ 131.887357][ T2995] kmem_cache_alloc+0x3d/0x2e0 [ 131.891956][ T2995] ? __kasan_check_write+0x14/0x20 [ 131.896902][ T2995] ? _raw_spin_lock_irq+0xa5/0x1b0 [ 131.901850][ T2995] dup_task_struct+0x57/0xc30 [ 131.906377][ T2995] ? __kasan_check_write+0x14/0x20 [ 131.911315][ T2995] copy_process+0x5c8/0x3340 [ 131.915742][ T2995] ? proc_fail_nth_write+0x20b/0x290 [ 131.920859][ T2995] ? proc_fail_nth_read+0x210/0x210 [ 131.925890][ T2995] ? security_file_permission+0x86/0xb0 [ 131.931271][ T2995] ? rw_verify_area+0x1c3/0x360 [ 131.935960][ T2995] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 131.940905][ T2995] ? vfs_write+0x852/0xe70 [ 131.945162][ T2995] ? kmem_cache_free+0x1c0/0x1e0 [ 131.949932][ T2995] kernel_clone+0x21e/0x9e0 [ 131.954273][ T2995] ? __kasan_check_write+0x14/0x20 [ 131.959218][ T2995] ? create_io_thread+0x1e0/0x1e0 [ 131.964081][ T2995] __x64_sys_clone+0x23f/0x290 [ 131.968680][ T2995] ? __do_sys_vfork+0x130/0x130 [ 131.973370][ T2995] ? debug_smp_processor_id+0x17/0x20 [ 131.978575][ T2995] do_syscall_64+0x34/0x70 [ 131.982826][ T2995] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 131.988554][ T2995] RIP: 0033:0x7ff9470f6da9 [ 131.992814][ T2995] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 132.012246][ T2995] RSP: 002b:00007ff945760fe8 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 132.020495][ T2995] RAX: ffffffffffffffda RBX: 00007ff94730ffa0 RCX: 00007ff9470f6da9 [ 132.028303][ T2995] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000022023400 [ 132.036114][ T2995] RBP: 00007ff945761090 R08: 0000000000000000 R09: 0000000000000000 [ 132.044010][ T2995] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000001 [ 132.051823][ T2995] R13: 0000000000000001 R14: 00007ff94730ffa0 R15: 00007ffc6b9eeb88 [ 132.068524][ T3001] ªªªªªª: renamed from vlan0 [ 132.612321][ T3036] device sit0 entered promiscuous mode [ 132.710864][ T3032] device syzkaller0 entered promiscuous mode [ 134.756783][ T3097] syz.0.891[3097] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 134.756838][ T3097] syz.0.891[3097] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 145.484935][ T3340] device wg2 entered promiscuous mode [ 149.413894][ T3464] device veth1_macvtap left promiscuous mode [ 150.290607][ T3485] device pim6reg1 entered promiscuous mode [ 152.974587][ T3554] syz.4.1038[3554] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 152.994769][ T3554] device veth0_vlan left promiscuous mode [ 153.115051][ T3554] device veth0_vlan entered promiscuous mode [ 153.141709][ T307] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 153.166286][ T307] IPv6: ADDRCONF(NETDEV_CHANGE): ªªªªªª: link becomes ready [ 153.174955][ T307] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 154.795156][ T3606] device wg2 entered promiscuous mode [ 156.092784][ T3636] device macsec0 entered promiscuous mode [ 157.716337][ T3669] device sit0 left promiscuous mode [ 157.864179][ T3671] device sit0 entered promiscuous mode [ 158.133753][ T3678] syz.0.1079[3678] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 158.133817][ T3678] syz.0.1079[3678] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 169.276693][ T3938] syz.2.1164[3938] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 169.389852][ T3938] syz.2.1164[3938] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 171.081896][ T3984] syz.2.1178[3984] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 171.205997][ T3984] syz.2.1178[3984] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 171.973300][ T4011] tap0: tun_chr_ioctl cmd 1074025678 [ 172.101821][ T4011] tap0: group set to 512 [ 172.855633][ T4029] syz.3.1193[4029] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 172.855887][ T4029] syz.3.1193[4029] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 175.468044][ T24] audit: type=1400 audit(1738077718.590:148): avc: denied { append } for pid=4104 comm="syz.4.1218" name="ppp" dev="devtmpfs" ino=149 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ppp_device_t tclass=chr_file permissive=1 [ 177.150507][ T4121] device syzkaller0 entered promiscuous mode [ 183.587754][ T4319] FAULT_INJECTION: forcing a failure. [ 183.587754][ T4319] name failslab, interval 1, probability 0, space 0, times 0 [ 183.600194][ T4319] CPU: 1 PID: 4319 Comm: syz.4.1285 Tainted: G W 5.10.233-syzkaller-00881-gfbe98d68b6b3 #0 [ 183.611260][ T4319] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 12/27/2024 [ 183.621152][ T4319] Call Trace: [ 183.624288][ T4319] dump_stack_lvl+0x1e2/0x24b [ 183.628803][ T4319] ? panic+0x812/0x812 [ 183.632701][ T4319] ? bfq_pos_tree_add_move+0x43b/0x43b [ 183.637996][ T4319] ? fib6_table_lookup+0x986/0xaf0 [ 183.643123][ T4319] dump_stack+0x15/0x17 [ 183.647110][ T4319] should_fail+0x3c6/0x510 [ 183.651363][ T4319] ? dst_alloc+0x17d/0x590 [ 183.655623][ T4319] __should_failslab+0xa4/0xe0 [ 183.660223][ T4319] should_failslab+0x9/0x20 [ 183.664554][ T4319] kmem_cache_alloc+0x3d/0x2e0 [ 183.669151][ T4319] ? arch_stack_walk+0xf3/0x140 [ 183.673845][ T4319] ? fib6_select_path+0x140/0x560 [ 183.678700][ T4319] ? ipv6_sysctl_rtcache_flush+0xf0/0xf0 [ 183.684167][ T4319] dst_alloc+0x17d/0x590 [ 183.688244][ T4319] ip6_pol_route+0xc2a/0x14b0 [ 183.692759][ T4319] ? __alloc_pages_nodemask+0x435/0xaf0 [ 183.698142][ T4319] ? fib6_table_lookup+0xaf0/0xaf0 [ 183.703086][ T4319] ? alloc_skb_with_frags+0xa1/0x570 [ 183.708207][ T4319] ? sched_clock_cpu+0x1b/0x3b0 [ 183.712892][ T4319] ? __kasan_check_write+0x14/0x20 [ 183.717845][ T4319] ip6_pol_route_input+0x55/0x80 [ 183.722615][ T4319] fib6_rule_lookup+0x25a/0x620 [ 183.727298][ T4319] ? ip6_route_input_lookup+0xd0/0xd0 [ 183.732509][ T4319] ? fib6_lookup+0x3f0/0x3f0 [ 183.736934][ T4319] ? __local_bh_enable_ip+0x53/0x80 [ 183.741964][ T4319] ? local_bh_enable+0x1f/0x30 [ 183.746566][ T4319] ? ip6t_do_table+0x162c/0x1800 [ 183.751345][ T4319] ? ip6_route_input+0x248/0xb00 [ 183.756118][ T4319] ? __ipv6_addr_type+0x15e/0x2f0 [ 183.760974][ T4319] ip6_route_input+0x726/0xb00 [ 183.765578][ T4319] ? ip6_multipath_l3_keys+0x610/0x610 [ 183.770873][ T4319] ? ip6table_raw_hook+0x69/0x80 [ 183.775652][ T4319] ip6_rcv_finish+0x14f/0x350 [ 183.780153][ T4319] ipv6_rcv+0xee/0x270 [ 183.784060][ T4319] ? ip6_rcv_finish+0x350/0x350 [ 183.788761][ T4319] ? refcount_add+0x80/0x80 [ 183.793094][ T4319] ? down_read_trylock+0x179/0x1d0 [ 183.798037][ T4319] ? kasan_poison+0x5d/0x70 [ 183.802375][ T4319] ? __kasan_kmalloc_large+0xad/0xc0 [ 183.807498][ T4319] ? __init_rwsem+0x1c0/0x1c0 [ 183.812020][ T4319] ? ip6_rcv_finish+0x350/0x350 [ 183.816701][ T4319] __netif_receive_skb+0x1c6/0x530 [ 183.821653][ T4319] ? __kasan_check_write+0x14/0x20 [ 183.826599][ T4319] ? exc_page_fault+0x33d/0x5b0 [ 183.831277][ T4319] ? deliver_ptype_list_skb+0x3c0/0x3c0 [ 183.836663][ T4319] ? asm_exc_page_fault+0x1e/0x30 [ 183.841648][ T4319] ? _copy_from_iter+0x1b1/0xd10 [ 183.846419][ T4319] netif_receive_skb+0xb0/0x480 [ 183.851098][ T4319] ? _copy_from_iter+0x3e6/0xd10 [ 183.855878][ T4319] ? netif_receive_skb_core+0x210/0x210 [ 183.861256][ T4319] ? sock_alloc_send_pskb+0x936/0xa50 [ 183.866466][ T4319] tun_rx_batched+0x6d9/0x870 [ 183.870975][ T4319] ? eth_type_trans+0x2e4/0x620 [ 183.875662][ T4319] ? local_bh_enable+0x30/0x30 [ 183.880261][ T4319] tun_get_user+0x2bf3/0x38f0 [ 183.884775][ T4319] ? kmem_cache_free+0xa9/0x1e0 [ 183.889460][ T4319] ? do_sys_openat2+0x1fc/0x710 [ 183.894143][ T4319] ? _kstrtoull+0x3a0/0x4a0 [ 183.898483][ T4319] ? tun_do_read+0x1f60/0x1f60 [ 183.903077][ T4319] ? kstrtouint_from_user+0x20a/0x2a0 [ 183.908291][ T4319] ? kstrtol_from_user+0x310/0x310 [ 183.913242][ T4319] ? avc_policy_seqno+0x1b/0x70 [ 183.917923][ T4319] ? selinux_file_permission+0x2bb/0x560 [ 183.923388][ T4319] ? fsnotify_perm+0x67/0x4e0 [ 183.927903][ T4319] tun_chr_write_iter+0x1a8/0x250 [ 183.932764][ T4319] vfs_write+0xb4c/0xe70 [ 183.936841][ T4319] ? kernel_write+0x3d0/0x3d0 [ 183.941358][ T4319] ? __fdget_pos+0x209/0x3a0 [ 183.945779][ T4319] ? ksys_write+0x77/0x2c0 [ 183.950030][ T4319] ksys_write+0x199/0x2c0 [ 183.954197][ T4319] ? __ia32_sys_read+0x90/0x90 [ 183.958801][ T4319] ? debug_smp_processor_id+0x17/0x20 [ 183.964008][ T4319] __x64_sys_write+0x7b/0x90 [ 183.968432][ T4319] do_syscall_64+0x34/0x70 [ 183.972687][ T4319] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 183.978412][ T4319] RIP: 0033:0x7f23cd486da9 [ 183.982665][ T4319] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 184.002104][ T4319] RSP: 002b:00007f23cbaf1038 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 184.010352][ T4319] RAX: ffffffffffffffda RBX: 00007f23cd69ffa0 RCX: 00007f23cd486da9 [ 184.018161][ T4319] RDX: 000000000000fdef RSI: 00000000200005c0 RDI: 00000000000000c8 [ 184.025973][ T4319] RBP: 00007f23cbaf1090 R08: 0000000000000000 R09: 0000000000000000 [ 184.033782][ T4319] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 184.041599][ T4319] R13: 0000000000000000 R14: 00007f23cd69ffa0 R15: 00007fffe85a0458 [ 184.637423][ T4326] device wg2 left promiscuous mode [ 184.728445][ T4333] FAULT_INJECTION: forcing a failure. [ 184.728445][ T4333] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 184.741288][ T4333] CPU: 1 PID: 4333 Comm: syz.1.1290 Tainted: G W 5.10.233-syzkaller-00881-gfbe98d68b6b3 #0 [ 184.752383][ T4333] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 12/27/2024 [ 184.762281][ T4333] Call Trace: [ 184.765405][ T4333] dump_stack_lvl+0x1e2/0x24b [ 184.769913][ T4333] ? bfq_pos_tree_add_move+0x43b/0x43b [ 184.775207][ T4333] dump_stack+0x15/0x17 [ 184.779200][ T4333] should_fail+0x3c6/0x510 [ 184.783454][ T4333] should_fail_usercopy+0x1a/0x20 [ 184.788314][ T4333] strncpy_from_user+0x24/0x2d0 [ 184.792999][ T4333] strncpy_from_user_nofault+0x73/0x150 [ 184.798381][ T4333] bpf_probe_read_user_str+0x2a/0x70 [ 184.803502][ T4333] bpf_prog_1f2a558f99cc9b3e+0x35/0x3c0 [ 184.808882][ T4333] bpf_trace_run3+0x121/0x2c0 [ 184.813395][ T4333] ? bpf_trace_run2+0x280/0x280 [ 184.818083][ T4333] ? __this_cpu_preempt_check+0x13/0x20 [ 184.823462][ T4333] ? tracing_record_taskinfo_sched_switch+0x84/0x390 [ 184.829972][ T4333] ? __bpf_trace_sched_wakeup_template+0x10/0x10 [ 184.836134][ T4333] __bpf_trace_sched_switch+0xb/0x10 [ 184.841258][ T4333] __traceiter_sched_switch+0x85/0xc0 [ 184.846462][ T4333] __schedule+0x10be/0x1330 [ 184.850801][ T4333] ? release_firmware_map_entry+0x18d/0x18d [ 184.856531][ T4333] ? kvm_sched_clock_read+0x18/0x40 [ 184.861567][ T4333] ? sched_clock+0x3a/0x40 [ 184.865826][ T4333] preempt_schedule_irq+0xc7/0x140 [ 184.870762][ T4333] ? preempt_schedule_notrace+0x140/0x140 [ 184.876322][ T4333] ? __irq_exit_rcu+0x40/0x150 [ 184.880919][ T4333] irqentry_exit+0x4f/0x60 [ 184.885170][ T4333] sysvec_apic_timer_interrupt+0xcb/0xe0 [ 184.890640][ T4333] asm_sysvec_apic_timer_interrupt+0x12/0x20 [ 184.896455][ T4333] RIP: 0010:kernfs_iop_permission+0x25/0x3b0 [ 184.902280][ T4333] Code: 0f 1f 44 00 00 55 48 89 e5 41 57 41 56 41 55 41 54 53 48 83 ec 18 41 89 f6 49 89 fc e8 e4 b0 97 ff 44 89 f6 81 e6 80 00 00 00 <31> ff e8 84 b4 97 ff 44 89 f0 25 80 00 00 00 0f 85 b9 01 00 00 48 [ 184.921707][ T4333] RSP: 0018:ffffc90000edf960 EFLAGS: 00000246 [ 184.927609][ T4333] RAX: ffffffff81d30dbc RBX: 1ffff11023815800 RCX: ffff88811b5bbb40 [ 184.935593][ T4333] RDX: 0000000000000000 RSI: 0000000000000000 RDI: ffff88811c0ac000 [ 184.943404][ T4333] RBP: ffffc90000edf9a0 R08: ffffffff81b37b3c R09: fffff520001dbf76 [ 184.951216][ T4333] R10: 0000000000000000 R11: dffffc0000000001 R12: ffff88811c0ac000 [ 184.959025][ T4333] R13: dffffc0000000000 R14: 0000000000000001 R15: 0000000000000001 [ 184.966846][ T4333] ? inode_permission+0x7c/0x500 [ 184.971612][ T4333] ? kernfs_iop_permission+0x1c/0x3b0 [ 184.976822][ T4333] ? security_inode_permission+0xb0/0xf0 [ 184.982287][ T4333] inode_permission+0x278/0x500 [ 184.986972][ T4333] ? kernfs_evict_inode+0x60/0x60 [ 184.991837][ T4333] link_path_walk+0x241/0xbd0 [ 184.996350][ T4333] ? handle_lookup_down+0x130/0x130 [ 185.001381][ T4333] filename_parentat+0x264/0x670 [ 185.006156][ T4333] ? kern_path_locked+0x450/0x450 [ 185.011018][ T4333] filename_create+0xf7/0x750 [ 185.015530][ T4333] ? __check_object_size+0x2e6/0x3c0 [ 185.020650][ T4333] ? kern_path_create+0x40/0x40 [ 185.025337][ T4333] do_mkdirat+0xcc/0x2c0 [ 185.029418][ T4333] ? kvm_sched_clock_read+0x18/0x40 [ 185.034454][ T4333] ? do_mknodat+0x450/0x450 [ 185.038788][ T4333] ? debug_smp_processor_id+0x17/0x20 [ 185.043996][ T4333] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 185.049907][ T4333] __x64_sys_mkdirat+0x7b/0x90 [ 185.054499][ T4333] do_syscall_64+0x34/0x70 [ 185.058750][ T4333] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 185.064479][ T4333] RIP: 0033:0x7fd742c5dda9 [ 185.068734][ T4333] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 185.088175][ T4333] RSP: 002b:00007fd7412c8038 EFLAGS: 00000246 ORIG_RAX: 0000000000000102 [ 185.096415][ T4333] RAX: ffffffffffffffda RBX: 00007fd742e76fa0 RCX: 00007fd742c5dda9 [ 185.104231][ T4333] RDX: 00000000000001ff RSI: 0000000020000000 RDI: ffffffffffffff9c [ 185.112036][ T4333] RBP: 00007fd7412c8090 R08: 0000000000000000 R09: 0000000000000000 [ 185.119852][ T4333] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 185.127660][ T4333] R13: 0000000000000000 R14: 00007fd742e76fa0 R15: 00007ffde54f7548 [ 185.174610][ T4331] device syzkaller0 entered promiscuous mode [ 185.206425][ T4326] device wg2 entered promiscuous mode [ 185.967272][ T4366] FAULT_INJECTION: forcing a failure. [ 185.967272][ T4366] name failslab, interval 1, probability 0, space 0, times 0 [ 185.993314][ T4366] CPU: 1 PID: 4366 Comm: syz.3.1301 Tainted: G W 5.10.233-syzkaller-00881-gfbe98d68b6b3 #0 [ 186.004404][ T4366] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 12/27/2024 [ 186.014293][ T4366] Call Trace: [ 186.017433][ T4366] dump_stack_lvl+0x1e2/0x24b [ 186.021935][ T4366] ? panic+0x812/0x812 [ 186.025840][ T4366] ? bfq_pos_tree_add_move+0x43b/0x43b [ 186.031137][ T4366] ? unwind_get_return_address+0x4d/0x90 [ 186.036603][ T4366] ? arch_stack_walk+0xf3/0x140 [ 186.041290][ T4366] dump_stack+0x15/0x17 [ 186.045300][ T4366] should_fail+0x3c6/0x510 [ 186.049544][ T4366] ? __alloc_skb+0x80/0x510 [ 186.053889][ T4366] __should_failslab+0xa4/0xe0 [ 186.058482][ T4366] should_failslab+0x9/0x20 [ 186.062817][ T4366] kmem_cache_alloc+0x3d/0x2e0 [ 186.067417][ T4366] __alloc_skb+0x80/0x510 [ 186.071584][ T4366] tipc_buf_acquire+0x2b/0xe0 [ 186.076096][ T4366] tipc_msg_build+0x817/0x1040 [ 186.080691][ T4366] ? proc_pident_instantiate+0x7a/0x2e0 [ 186.086074][ T4366] ? proc_pident_lookup+0x1c4/0x260 [ 186.091123][ T4366] ? __kasan_check_write+0x14/0x20 [ 186.096054][ T4366] ? _raw_spin_lock_bh+0xa4/0x1b0 [ 186.100929][ T4366] ? tipc_msg_fragment+0x760/0x760 [ 186.105866][ T4366] ? __local_bh_enable_ip+0x53/0x80 [ 186.110898][ T4366] ? tipc_nametbl_lookup_dst_nodes+0x375/0x7e0 [ 186.116889][ T4366] __tipc_sendmsg+0x2403/0x3ab0 [ 186.121579][ T4366] ? avc_has_perm_noaudit+0x240/0x240 [ 186.126788][ T4366] ? tipc_sk_publish+0x3e0/0x3e0 [ 186.131556][ T4366] ? avc_has_perm+0x14d/0x400 [ 186.136067][ T4366] ? memcpy+0x56/0x70 [ 186.139892][ T4366] ? avc_has_perm+0x275/0x400 [ 186.144397][ T4366] ? wait_woken+0x250/0x250 [ 186.148736][ T4366] ? avc_has_perm_noaudit+0x240/0x240 [ 186.153957][ T4366] ? unwind_get_return_address+0x4d/0x90 [ 186.159415][ T4366] ? __kasan_check_write+0x14/0x20 [ 186.164359][ T4366] ? _raw_spin_lock_bh+0xa4/0x1b0 [ 186.169218][ T4366] ? _raw_spin_lock_irq+0x1b0/0x1b0 [ 186.174260][ T4366] ? __local_bh_enable_ip+0x53/0x80 [ 186.179286][ T4366] ? local_bh_enable+0x1f/0x30 [ 186.183890][ T4366] ? lock_sock_nested+0x26a/0x300 [ 186.188749][ T4366] ? sock_init_data+0xc0/0xc0 [ 186.193350][ T4366] ? kmem_cache_free+0xa9/0x1e0 [ 186.198036][ T4366] ? check_stack_object+0x114/0x130 [ 186.203071][ T4366] tipc_sendmsg+0x55/0x70 [ 186.207232][ T4366] ? tipc_recvmsg+0x13b0/0x13b0 [ 186.211920][ T4366] ____sys_sendmsg+0x59e/0x8f0 [ 186.216526][ T4366] ? __sys_sendmsg_sock+0x40/0x40 [ 186.221382][ T4366] ? import_iovec+0xe5/0x120 [ 186.225808][ T4366] ___sys_sendmsg+0x252/0x2e0 [ 186.230320][ T4366] ? __sys_sendmsg+0x280/0x280 [ 186.234924][ T4366] ? rw_verify_area+0x1c3/0x360 [ 186.239622][ T4366] ? __fdget+0x1bc/0x240 [ 186.243687][ T4366] __se_sys_sendmsg+0x1b1/0x280 [ 186.248374][ T4366] ? __x64_sys_sendmsg+0x90/0x90 [ 186.253144][ T4366] ? ksys_write+0x260/0x2c0 [ 186.257491][ T4366] ? debug_smp_processor_id+0x17/0x20 [ 186.262697][ T4366] __x64_sys_sendmsg+0x7b/0x90 [ 186.267292][ T4366] do_syscall_64+0x34/0x70 [ 186.271550][ T4366] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 186.277275][ T4366] RIP: 0033:0x7ff9470f6da9 [ 186.281528][ T4366] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 186.300969][ T4366] RSP: 002b:00007ff945761038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 186.309215][ T4366] RAX: ffffffffffffffda RBX: 00007ff94730ffa0 RCX: 00007ff9470f6da9 [ 186.317021][ T4366] RDX: 0000000000000000 RSI: 0000000020003a00 RDI: 0000000000000003 [ 186.324832][ T4366] RBP: 00007ff945761090 R08: 0000000000000000 R09: 0000000000000000 [ 186.332646][ T4366] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 186.340456][ T4366] R13: 0000000000000000 R14: 00007ff94730ffa0 R15: 00007ffc6b9eeb88 [ 186.362258][ T4370] device pim6reg1 entered promiscuous mode [ 186.690786][ T4372] device wg2 left promiscuous mode [ 186.710740][ T4374] device wg2 entered promiscuous mode [ 186.896888][ T4393] device sit0 left promiscuous mode [ 186.984389][ T4393] device sit0 entered promiscuous mode [ 189.847266][ T4481] FAULT_INJECTION: forcing a failure. [ 189.847266][ T4481] name failslab, interval 1, probability 0, space 0, times 0 [ 189.863075][ T4481] CPU: 1 PID: 4481 Comm: syz.2.1335 Tainted: G W 5.10.233-syzkaller-00881-gfbe98d68b6b3 #0 [ 189.874162][ T4481] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 12/27/2024 [ 189.884063][ T4481] Call Trace: [ 189.887184][ T4481] dump_stack_lvl+0x1e2/0x24b [ 189.891694][ T4481] ? panic+0x812/0x812 [ 189.895598][ T4481] ? bfq_pos_tree_add_move+0x43b/0x43b [ 189.900901][ T4481] ? __kasan_check_write+0x14/0x20 [ 189.905842][ T4481] ? calc_wheel_index+0x16b/0xa40 [ 189.910705][ T4481] ? tun_chr_ioctl+0x2a/0x40 [ 189.915130][ T4481] ? __se_sys_ioctl+0x114/0x190 [ 189.919820][ T4481] dump_stack+0x15/0x17 [ 189.923804][ T4481] should_fail+0x3c6/0x510 [ 189.928063][ T4481] ? kvmalloc_node+0x82/0x130 [ 189.932589][ T4481] __should_failslab+0xa4/0xe0 [ 189.937176][ T4481] should_failslab+0x9/0x20 [ 189.941522][ T4481] __kmalloc+0x60/0x330 [ 189.945503][ T4481] ? _raw_spin_unlock_irqrestore+0x5b/0x80 [ 189.951148][ T4481] kvmalloc_node+0x82/0x130 [ 189.955485][ T4481] tun_attach+0x8a9/0x1560 [ 189.959745][ T4481] ? mod_timer_pending+0x30/0x30 [ 189.964512][ T4481] ? selinux_tun_dev_alloc_security+0x51/0x140 [ 189.970506][ T4481] tun_net_init+0x411/0x550 [ 189.974840][ T4481] register_netdevice+0x346/0x13f0 [ 189.979791][ T4481] ? xdp_rxq_info_reg+0xec/0x2e0 [ 189.984563][ T4481] ? netif_stacked_transfer_operstate+0x240/0x240 [ 189.990815][ T4481] tun_set_iff+0x816/0xdb0 [ 189.995065][ T4481] __tun_chr_ioctl+0x8b3/0x2260 [ 189.999757][ T4481] ? tun_flow_create+0x320/0x320 [ 190.004525][ T4481] ? __fget_files+0x31e/0x380 [ 190.009037][ T4481] tun_chr_ioctl+0x2a/0x40 [ 190.013290][ T4481] ? tun_chr_poll+0x670/0x670 [ 190.017800][ T4481] __se_sys_ioctl+0x114/0x190 [ 190.022318][ T4481] __x64_sys_ioctl+0x7b/0x90 [ 190.026748][ T4481] do_syscall_64+0x34/0x70 [ 190.030992][ T4481] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 190.036718][ T4481] RIP: 0033:0x7f659f7b5da9 [ 190.040973][ T4481] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 190.060418][ T4481] RSP: 002b:00007f659ddff038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 190.068664][ T4481] RAX: ffffffffffffffda RBX: 00007f659f9cf080 RCX: 00007f659f7b5da9 [ 190.076472][ T4481] RDX: 0000000020000140 RSI: 00000000400454ca RDI: 0000000000000003 [ 190.084284][ T4481] RBP: 00007f659ddff090 R08: 0000000000000000 R09: 0000000000000000 [ 190.092090][ T4481] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 190.099901][ T4481] R13: 0000000000000000 R14: 00007f659f9cf080 R15: 00007ffe17b03a18 [ 192.713820][ T4531] device veth0_vlan left promiscuous mode [ 192.734430][ T4531] device veth0_vlan entered promiscuous mode [ 192.755287][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 192.846512][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): ªªªªªª: link becomes ready [ 192.986439][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 193.126316][ T4529] device pim6reg1 entered promiscuous mode [ 195.182027][ T4586] device wg2 left promiscuous mode [ 196.618954][ T4633] device bond_slave_1 entered promiscuous mode [ 196.649143][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): bond_slave_1: link becomes ready [ 196.667533][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 196.706890][ T4636] FAULT_INJECTION: forcing a failure. [ 196.706890][ T4636] name failslab, interval 1, probability 0, space 0, times 0 [ 196.754004][ T4636] CPU: 0 PID: 4636 Comm: syz.1.1384 Tainted: G W 5.10.233-syzkaller-00881-gfbe98d68b6b3 #0 [ 196.765104][ T4636] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 12/27/2024 [ 196.774994][ T4636] Call Trace: [ 196.778132][ T4636] dump_stack_lvl+0x1e2/0x24b [ 196.782652][ T4636] ? bfq_pos_tree_add_move+0x43b/0x43b [ 196.787935][ T4636] ? pcpu_memcg_post_alloc_hook+0x1c8/0x360 [ 196.793675][ T4636] ? trace_raw_output_percpu_destroy_chunk+0xc0/0xc0 [ 196.800170][ T4636] ? find_next_bit+0xc7/0x100 [ 196.804683][ T4636] dump_stack+0x15/0x17 [ 196.808675][ T4636] should_fail+0x3c6/0x510 [ 196.812927][ T4636] ? kvmalloc_node+0x82/0x130 [ 196.817443][ T4636] __should_failslab+0xa4/0xe0 [ 196.822041][ T4636] should_failslab+0x9/0x20 [ 196.826377][ T4636] __kmalloc+0x60/0x330 [ 196.830375][ T4636] kvmalloc_node+0x82/0x130 [ 196.834712][ T4636] pfifo_fast_init+0x110/0x7a0 [ 196.839313][ T4636] qdisc_create_dflt+0x138/0x3d0 [ 196.844091][ T4636] ? _raw_spin_lock+0xa4/0x1b0 [ 196.848684][ T4636] dev_activate+0x2e0/0x1310 [ 196.853113][ T4636] __dev_open+0x3bf/0x4e0 [ 196.857279][ T4636] ? dev_open+0x260/0x260 [ 196.861438][ T4636] ? _raw_spin_unlock_bh+0x51/0x60 [ 196.866381][ T4636] ? dev_set_rx_mode+0x245/0x2e0 [ 196.871156][ T4636] ? __kasan_check_read+0x11/0x20 [ 196.876022][ T4636] __dev_change_flags+0x1db/0x6e0 [ 196.880878][ T4636] ? __ww_mutex_lock_interruptible_slowpath+0x20/0x20 [ 196.887472][ T4636] ? dev_get_flags+0x1e0/0x1e0 [ 196.892080][ T4636] ? selinux_capset+0xf0/0xf0 [ 196.896594][ T4636] dev_change_flags+0x8c/0x1a0 [ 196.901186][ T4636] dev_ifsioc+0x115/0xae0 [ 196.905351][ T4636] ? dev_ioctl+0xb40/0xb40 [ 196.909602][ T4636] ? dev_get_by_name_rcu+0xc5/0xf0 [ 196.914552][ T4636] dev_ioctl+0x526/0xb40 [ 196.918630][ T4636] sock_do_ioctl+0x295/0x3a0 [ 196.923063][ T4636] ? sock_show_fdinfo+0xa0/0xa0 [ 196.927741][ T4636] ? kernel_write+0x3d0/0x3d0 [ 196.932256][ T4636] ? selinux_file_ioctl+0x3cc/0x540 [ 196.937295][ T4636] sock_ioctl+0x4a6/0x760 [ 196.941454][ T4636] ? sock_poll+0x340/0x340 [ 196.945709][ T4636] ? security_file_ioctl+0x84/0xb0 [ 196.950654][ T4636] ? sock_poll+0x340/0x340 [ 196.954907][ T4636] __se_sys_ioctl+0x114/0x190 [ 196.959423][ T4636] __x64_sys_ioctl+0x7b/0x90 [ 196.963848][ T4636] do_syscall_64+0x34/0x70 [ 196.968100][ T4636] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 196.973827][ T4636] RIP: 0033:0x7fd742c5dda9 [ 196.978084][ T4636] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 196.997524][ T4636] RSP: 002b:00007fd7412c8038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 197.005764][ T4636] RAX: ffffffffffffffda RBX: 00007fd742e76fa0 RCX: 00007fd742c5dda9 [ 197.013575][ T4636] RDX: 0000000020000140 RSI: 0000000000008914 RDI: 000000000000000a [ 197.021388][ T4636] RBP: 00007fd7412c8090 R08: 0000000000000000 R09: 0000000000000000 [ 197.029197][ T4636] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 197.037011][ T4636] R13: 0000000000000000 R14: 00007fd742e76fa0 R15: 00007ffde54f7548 [ 197.887623][ T4636] device pim6reg1 entered promiscuous mode [ 200.955975][ T4748] device sit0 left promiscuous mode [ 201.037753][ T4748] device sit0 entered promiscuous mode [ 202.257838][ T4798] FAULT_INJECTION: forcing a failure. [ 202.257838][ T4798] name failslab, interval 1, probability 0, space 0, times 0 [ 202.286881][ T4798] CPU: 0 PID: 4798 Comm: syz.2.1436 Tainted: G W 5.10.233-syzkaller-00881-gfbe98d68b6b3 #0 [ 202.297978][ T4798] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 12/27/2024 [ 202.307870][ T4798] Call Trace: [ 202.311006][ T4798] dump_stack_lvl+0x1e2/0x24b [ 202.315513][ T4798] ? panic+0x812/0x812 [ 202.319417][ T4798] ? bfq_pos_tree_add_move+0x43b/0x43b [ 202.324709][ T4798] dump_stack+0x15/0x17 [ 202.328702][ T4798] should_fail+0x3c6/0x510 [ 202.332951][ T4798] ? __se_sys_bpf+0x4beb/0x11cb0 [ 202.337721][ T4798] __should_failslab+0xa4/0xe0 [ 202.342321][ T4798] should_failslab+0x9/0x20 [ 202.346663][ T4798] __kmalloc_track_caller+0x5f/0x320 [ 202.351781][ T4798] memdup_user+0x25/0xb0 [ 202.355885][ T4798] __se_sys_bpf+0x4beb/0x11cb0 [ 202.360464][ T4798] ? perf_prepare_sample+0x1af0/0x1af0 [ 202.365760][ T4798] ? kvm_sched_clock_read+0x18/0x40 [ 202.370788][ T4798] ? __x64_sys_bpf+0x90/0x90 [ 202.375215][ T4798] ? __this_cpu_preempt_check+0x13/0x20 [ 202.380688][ T4798] ? __perf_event_account_interrupt+0x18f/0x2c0 [ 202.386761][ T4798] ? hrtimer_forward+0x1a6/0x2c0 [ 202.391534][ T4798] ? perf_swevent_hrtimer+0x4b8/0x560 [ 202.396738][ T4798] ? cpu_clock_event_read+0x50/0x50 [ 202.401775][ T4798] ? timerqueue_add+0x24c/0x270 [ 202.406458][ T4798] ? enqueue_hrtimer+0xad/0x200 [ 202.411143][ T4798] ? __hrtimer_run_queues+0x438/0xa50 [ 202.416357][ T4798] ? kvm_sched_clock_read+0x18/0x40 [ 202.421388][ T4798] ? sched_clock+0x3a/0x40 [ 202.425643][ T4798] ? sched_clock_cpu+0x1b/0x3b0 [ 202.430331][ T4798] ? sched_clock+0x3a/0x40 [ 202.434582][ T4798] ? __irq_exit_rcu+0x40/0x150 [ 202.439185][ T4798] __x64_sys_bpf+0x7b/0x90 [ 202.443432][ T4798] do_syscall_64+0x34/0x70 [ 202.447685][ T4798] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 202.453414][ T4798] RIP: 0033:0x7f659f7b5da9 [ 202.457668][ T4798] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 202.477112][ T4798] RSP: 002b:00007f659de20038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 202.485352][ T4798] RAX: ffffffffffffffda RBX: 00007f659f9cefa0 RCX: 00007f659f7b5da9 [ 202.493165][ T4798] RDX: 0000000000000020 RSI: 0000000020000200 RDI: 0000000000000002 [ 202.500975][ T4798] RBP: 00007f659de20090 R08: 0000000000000000 R09: 0000000000000000 [ 202.508797][ T4798] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 202.516598][ T4798] R13: 0000000000000000 R14: 00007f659f9cefa0 R15: 00007ffe17b03a18 [ 202.735482][ T4812] device syzkaller0 entered promiscuous mode [ 203.117242][ T4832] device macsec0 entered promiscuous mode [ 203.122848][ T4832] FAULT_INJECTION: forcing a failure. [ 203.122848][ T4832] name failslab, interval 1, probability 0, space 0, times 0 [ 203.209149][ T4832] CPU: 0 PID: 4832 Comm: syz.3.1446 Tainted: G W 5.10.233-syzkaller-00881-gfbe98d68b6b3 #0 [ 203.220250][ T4832] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 12/27/2024 [ 203.230143][ T4832] Call Trace: [ 203.233278][ T4832] dump_stack_lvl+0x1e2/0x24b [ 203.237785][ T4832] ? bfq_pos_tree_add_move+0x43b/0x43b [ 203.243093][ T4832] ? skb_trim+0x90/0x1b0 [ 203.247158][ T4832] dump_stack+0x15/0x17 [ 203.251147][ T4832] should_fail+0x3c6/0x510 [ 203.255402][ T4832] ? netlink_trim+0x19b/0x230 [ 203.259915][ T4832] __should_failslab+0xa4/0xe0 [ 203.264521][ T4832] should_failslab+0x9/0x20 [ 203.268858][ T4832] __kmalloc_track_caller+0x5f/0x320 [ 203.273974][ T4832] ? netlink_trim+0x19b/0x230 [ 203.278488][ T4832] pskb_expand_head+0x12b/0x1180 [ 203.283262][ T4832] netlink_trim+0x19b/0x230 [ 203.287599][ T4832] netlink_broadcast_filtered+0x66/0x1270 [ 203.293152][ T4832] ? __kasan_check_write+0x14/0x20 [ 203.298099][ T4832] ? rtmsg_ifinfo_build_skb+0xd4/0x180 [ 203.303391][ T4832] nlmsg_notify+0x101/0x1c0 [ 203.307729][ T4832] rtmsg_ifinfo+0xe7/0x120 [ 203.311982][ T4832] __dev_notify_flags+0xdd/0x610 [ 203.316759][ T4832] ? __dev_change_flags+0x6e0/0x6e0 [ 203.321788][ T4832] ? __dev_change_flags+0x508/0x6e0 [ 203.326826][ T4832] ? dev_get_flags+0x1e0/0x1e0 [ 203.331427][ T4832] ? selinux_capable+0x2f1/0x430 [ 203.336199][ T4832] ? selinux_capset+0xf0/0xf0 [ 203.340713][ T4832] dev_change_flags+0xf0/0x1a0 [ 203.345312][ T4832] dev_ifsioc+0x115/0xae0 [ 203.349477][ T4832] ? dev_ioctl+0xb40/0xb40 [ 203.353731][ T4832] ? dev_get_by_name_rcu+0xc5/0xf0 [ 203.358676][ T4832] dev_ioctl+0x526/0xb40 [ 203.362760][ T4832] sock_do_ioctl+0x295/0x3a0 [ 203.367185][ T4832] ? sock_show_fdinfo+0xa0/0xa0 [ 203.371869][ T4832] ? kernel_write+0x3d0/0x3d0 [ 203.376384][ T4832] ? selinux_file_ioctl+0x3cc/0x540 [ 203.381415][ T4832] sock_ioctl+0x4a6/0x760 [ 203.385585][ T4832] ? sock_poll+0x340/0x340 [ 203.389838][ T4832] ? security_file_ioctl+0x84/0xb0 [ 203.394782][ T4832] ? sock_poll+0x340/0x340 [ 203.399037][ T4832] __se_sys_ioctl+0x114/0x190 [ 203.403549][ T4832] __x64_sys_ioctl+0x7b/0x90 [ 203.407976][ T4832] do_syscall_64+0x34/0x70 [ 203.412226][ T4832] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 203.417956][ T4832] RIP: 0033:0x7ff9470f6da9 [ 203.422211][ T4832] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 203.441648][ T4832] RSP: 002b:00007ff945761038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 203.449895][ T4832] RAX: ffffffffffffffda RBX: 00007ff94730ffa0 RCX: 00007ff9470f6da9 [ 203.457703][ T4832] RDX: 0000000020000040 RSI: 0000000000008914 RDI: 0000000000000007 [ 203.465514][ T4832] RBP: 00007ff945761090 R08: 0000000000000000 R09: 0000000000000000 [ 203.473325][ T4832] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 203.481140][ T4832] R13: 0000000000000000 R14: 00007ff94730ffa0 R15: 00007ffc6b9eeb88 [ 204.851193][ T4885] device veth1_macvtap left promiscuous mode [ 205.217697][ T4906] device sit0 left promiscuous mode [ 205.323957][ T4909] device sit0 entered promiscuous mode [ 211.335982][ T5027] FAULT_INJECTION: forcing a failure. [ 211.335982][ T5027] name failslab, interval 1, probability 0, space 0, times 0 [ 211.462033][ T5027] CPU: 1 PID: 5027 Comm: syz.1.1508 Tainted: G W 5.10.233-syzkaller-00881-gfbe98d68b6b3 #0 [ 211.473128][ T5027] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 12/27/2024 [ 211.483024][ T5027] Call Trace: [ 211.486153][ T5027] dump_stack_lvl+0x1e2/0x24b [ 211.490660][ T5027] ? bfq_pos_tree_add_move+0x43b/0x43b [ 211.495951][ T5027] dump_stack+0x15/0x17 [ 211.499964][ T5027] should_fail+0x3c6/0x510 [ 211.504207][ T5027] ? __kernfs_new_node+0xdb/0x700 [ 211.509064][ T5027] __should_failslab+0xa4/0xe0 [ 211.513678][ T5027] should_failslab+0x9/0x20 [ 211.518008][ T5027] kmem_cache_alloc+0x3d/0x2e0 [ 211.522604][ T5027] __kernfs_new_node+0xdb/0x700 [ 211.527284][ T5027] ? arch_stack_walk+0xf3/0x140 [ 211.531969][ T5027] ? make_kgid+0x1f2/0x6f0 [ 211.536221][ T5027] ? kernfs_new_node+0x230/0x230 [ 211.541014][ T5027] ? from_kuid_munged+0x7b0/0x7b0 [ 211.545861][ T5027] ? stack_trace_save+0x113/0x1c0 [ 211.550725][ T5027] ? tun_net_init+0x411/0x550 [ 211.555231][ T5027] ? register_netdevice+0x346/0x13f0 [ 211.560349][ T5027] ? stack_trace_snprint+0xf0/0xf0 [ 211.565297][ T5027] kernfs_new_node+0x130/0x230 [ 211.569899][ T5027] kernfs_create_dir_ns+0x44/0x130 [ 211.574843][ T5027] sysfs_create_dir_ns+0x185/0x390 [ 211.579789][ T5027] ? sysfs_warn_dup+0xa0/0xa0 [ 211.584304][ T5027] ? net_namespace+0xd/0x40 [ 211.588648][ T5027] kobject_add_internal+0x763/0xd90 [ 211.593679][ T5027] kobject_add+0x14e/0x210 [ 211.597930][ T5027] ? _raw_spin_lock+0xa4/0x1b0 [ 211.602702][ T5027] ? kobject_init+0x1e0/0x1e0 [ 211.607217][ T5027] ? __kasan_check_write+0x14/0x20 [ 211.612161][ T5027] ? mutex_unlock+0x1c/0x40 [ 211.616506][ T5027] ? get_device_parent+0x2a1/0x410 [ 211.621448][ T5027] device_add+0x3be/0xbc0 [ 211.625648][ T5027] netdev_register_kobject+0x177/0x320 [ 211.630925][ T5027] ? raw_notifier_call_chain+0xdf/0xf0 [ 211.636309][ T5027] register_netdevice+0xe9b/0x13f0 [ 211.641250][ T5027] ? __kasan_kmalloc+0x9/0x10 [ 211.645765][ T5027] ? netif_stacked_transfer_operstate+0x240/0x240 [ 211.652005][ T5027] ? alloc_netdev_mqs+0xa0f/0xcd0 [ 211.656873][ T5027] tun_set_iff+0x816/0xdb0 [ 211.661125][ T5027] __tun_chr_ioctl+0x8b3/0x2260 [ 211.665810][ T5027] ? tun_flow_create+0x320/0x320 [ 211.670583][ T5027] ? __fget_files+0x31e/0x380 [ 211.675098][ T5027] tun_chr_ioctl+0x2a/0x40 [ 211.679347][ T5027] ? tun_chr_poll+0x670/0x670 [ 211.683860][ T5027] __se_sys_ioctl+0x114/0x190 [ 211.688376][ T5027] __x64_sys_ioctl+0x7b/0x90 [ 211.692799][ T5027] do_syscall_64+0x34/0x70 [ 211.697055][ T5027] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 211.702779][ T5027] RIP: 0033:0x7fd742c5dda9 [ 211.707034][ T5027] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 211.726474][ T5027] RSP: 002b:00007fd7412c8038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 211.734719][ T5027] RAX: ffffffffffffffda RBX: 00007fd742e76fa0 RCX: 00007fd742c5dda9 [ 211.742530][ T5027] RDX: 0000000020000000 RSI: 00000000400454ca RDI: 0000000000000004 [ 211.750342][ T5027] RBP: 00007fd7412c8090 R08: 0000000000000000 R09: 0000000000000000 [ 211.758152][ T5027] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 211.765964][ T5027] R13: 0000000000000000 R14: 00007fd742e76fa0 R15: 00007ffde54f7548 [ 211.776400][ T24] audit: type=1400 audit(1738077754.900:149): avc: denied { unlink } for pid=77 comm="syslogd" name="messages.0" dev="tmpfs" ino=2 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 212.125754][ T5027] kobject_add_internal failed for tun0 (error: -12 parent: net) [ 214.991685][ T5108] FAULT_INJECTION: forcing a failure. [ 214.991685][ T5108] name failslab, interval 1, probability 0, space 0, times 0 [ 215.130137][ T5108] CPU: 1 PID: 5108 Comm: syz.2.1533 Tainted: G W 5.10.233-syzkaller-00881-gfbe98d68b6b3 #0 [ 215.141325][ T5108] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 12/27/2024 [ 215.151217][ T5108] Call Trace: [ 215.154355][ T5108] dump_stack_lvl+0x1e2/0x24b [ 215.158861][ T5108] ? panic+0x812/0x812 [ 215.162762][ T5108] ? bfq_pos_tree_add_move+0x43b/0x43b [ 215.168062][ T5108] ? unwind_get_return_address+0x4d/0x90 [ 215.173528][ T5108] ? arch_stack_walk+0xf3/0x140 [ 215.178215][ T5108] dump_stack+0x15/0x17 [ 215.182201][ T5108] should_fail+0x3c6/0x510 [ 215.186457][ T5108] ? __alloc_skb+0x80/0x510 [ 215.190798][ T5108] __should_failslab+0xa4/0xe0 [ 215.195395][ T5108] should_failslab+0x9/0x20 [ 215.199738][ T5108] kmem_cache_alloc+0x3d/0x2e0 [ 215.204338][ T5108] __alloc_skb+0x80/0x510 [ 215.208504][ T5108] tipc_buf_acquire+0x2b/0xe0 [ 215.213010][ T5108] tipc_msg_build+0x817/0x1040 [ 215.217613][ T5108] ? proc_pident_instantiate+0x7a/0x2e0 [ 215.222995][ T5108] ? proc_pident_lookup+0x1c4/0x260 [ 215.228031][ T5108] ? __kasan_check_write+0x14/0x20 [ 215.232974][ T5108] ? _raw_spin_lock_bh+0xa4/0x1b0 [ 215.237838][ T5108] ? tipc_msg_fragment+0x760/0x760 [ 215.242785][ T5108] ? __local_bh_enable_ip+0x53/0x80 [ 215.247815][ T5108] ? tipc_nametbl_lookup_dst_nodes+0x375/0x7e0 [ 215.253804][ T5108] __tipc_sendmsg+0x2403/0x3ab0 [ 215.258490][ T5108] ? avc_has_perm_noaudit+0x240/0x240 [ 215.263696][ T5108] ? tipc_sk_publish+0x3e0/0x3e0 [ 215.268469][ T5108] ? avc_has_perm+0x14d/0x400 [ 215.272988][ T5108] ? memcpy+0x56/0x70 [ 215.276810][ T5108] ? avc_has_perm+0x275/0x400 [ 215.281318][ T5108] ? wait_woken+0x250/0x250 [ 215.285652][ T5108] ? avc_has_perm_noaudit+0x240/0x240 [ 215.290867][ T5108] ? unwind_get_return_address+0x4d/0x90 [ 215.296333][ T5108] ? __kasan_check_write+0x14/0x20 [ 215.301277][ T5108] ? _raw_spin_lock_bh+0xa4/0x1b0 [ 215.306141][ T5108] ? _raw_spin_lock_irq+0x1b0/0x1b0 [ 215.311180][ T5108] ? __local_bh_enable_ip+0x53/0x80 [ 215.316205][ T5108] ? local_bh_enable+0x1f/0x30 [ 215.320804][ T5108] ? lock_sock_nested+0x26a/0x300 [ 215.325667][ T5108] ? sock_init_data+0xc0/0xc0 [ 215.330183][ T5108] ? kmem_cache_free+0xa9/0x1e0 [ 215.334868][ T5108] ? check_stack_object+0x114/0x130 [ 215.339900][ T5108] tipc_sendmsg+0x55/0x70 [ 215.344064][ T5108] ? tipc_recvmsg+0x13b0/0x13b0 [ 215.348752][ T5108] ____sys_sendmsg+0x59e/0x8f0 [ 215.353357][ T5108] ? __sys_sendmsg_sock+0x40/0x40 [ 215.358217][ T5108] ? import_iovec+0xe5/0x120 [ 215.362641][ T5108] ___sys_sendmsg+0x252/0x2e0 [ 215.367246][ T5108] ? __sys_sendmsg+0x280/0x280 [ 215.371840][ T5108] ? rw_verify_area+0x1c3/0x360 [ 215.376532][ T5108] ? __fdget+0x1bc/0x240 [ 215.380606][ T5108] __se_sys_sendmsg+0x1b1/0x280 [ 215.385294][ T5108] ? __x64_sys_sendmsg+0x90/0x90 [ 215.390067][ T5108] ? ksys_write+0x260/0x2c0 [ 215.394413][ T5108] ? debug_smp_processor_id+0x17/0x20 [ 215.399611][ T5108] __x64_sys_sendmsg+0x7b/0x90 [ 215.404211][ T5108] do_syscall_64+0x34/0x70 [ 215.408464][ T5108] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 215.414191][ T5108] RIP: 0033:0x7f659f7b5da9 [ 215.418443][ T5108] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 215.437889][ T5108] RSP: 002b:00007f659ddff038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 215.446132][ T5108] RAX: ffffffffffffffda RBX: 00007f659f9cf080 RCX: 00007f659f7b5da9 [ 215.453941][ T5108] RDX: 0000000000000000 RSI: 0000000020004440 RDI: 0000000000000004 [ 215.461755][ T5108] RBP: 00007f659ddff090 R08: 0000000000000000 R09: 0000000000000000 [ 215.469567][ T5108] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 215.477375][ T5108] R13: 0000000000000000 R14: 00007f659f9cf080 R15: 00007ffe17b03a18 [ 215.901697][ T24] audit: type=1400 audit(1738077759.030:150): avc: denied { create } for pid=5119 comm="syz.1.1537" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 217.347161][ T5169] device pim6reg1 entered promiscuous mode [ 218.682304][ T5213] device pim6reg1 entered promiscuous mode [ 218.713178][ T5218] device syzkaller0 entered promiscuous mode [ 222.878475][ T5343] device syzkaller0 entered promiscuous mode [ 226.351862][ T5443] device syzkaller0 entered promiscuous mode [ 226.743406][ T5472] FAULT_INJECTION: forcing a failure. [ 226.743406][ T5472] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 226.759475][ T5472] CPU: 1 PID: 5472 Comm: syz.3.1653 Tainted: G W 5.10.233-syzkaller-00881-gfbe98d68b6b3 #0 [ 226.770559][ T5472] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 12/27/2024 [ 226.780452][ T5472] Call Trace: [ 226.783587][ T5472] dump_stack_lvl+0x1e2/0x24b [ 226.788089][ T5472] ? bfq_pos_tree_add_move+0x43b/0x43b [ 226.793387][ T5472] dump_stack+0x15/0x17 [ 226.797381][ T5472] should_fail+0x3c6/0x510 [ 226.801626][ T5472] should_fail_usercopy+0x1a/0x20 [ 226.806489][ T5472] _copy_to_user+0x20/0x90 [ 226.810741][ T5472] simple_read_from_buffer+0xc7/0x150 [ 226.815952][ T5472] proc_fail_nth_read+0x1a3/0x210 [ 226.820808][ T5472] ? proc_fault_inject_write+0x390/0x390 [ 226.826275][ T5472] ? proc_fault_inject_write+0x390/0x390 [ 226.831744][ T5472] vfs_read+0x200/0xba0 [ 226.835739][ T5472] ? kernel_read+0x70/0x70 [ 226.839990][ T5472] ? __irq_exit_rcu+0x40/0x150 [ 226.844589][ T5472] ? irq_exit_rcu+0x9/0x10 [ 226.848842][ T5472] ? sysvec_apic_timer_interrupt+0xcb/0xe0 [ 226.854483][ T5472] ? asm_sysvec_apic_timer_interrupt+0x12/0x20 [ 226.860473][ T5472] ? ksys_read+0xfd/0x2c0 [ 226.864638][ T5472] ksys_read+0x199/0x2c0 [ 226.868718][ T5472] ? kvm_sched_clock_read+0x18/0x40 [ 226.873752][ T5472] ? vfs_write+0xe70/0xe70 [ 226.878007][ T5472] ? debug_smp_processor_id+0x17/0x20 [ 226.883211][ T5472] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 226.889115][ T5472] __x64_sys_read+0x7b/0x90 [ 226.893453][ T5472] do_syscall_64+0x34/0x70 [ 226.897704][ T5472] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 226.903432][ T5472] RIP: 0033:0x7ff9470f57bc [ 226.907688][ T5472] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 93 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 ef 93 02 00 48 [ 226.927127][ T5472] RSP: 002b:00007ff945761030 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 226.935376][ T5472] RAX: ffffffffffffffda RBX: 00007ff94730ffa0 RCX: 00007ff9470f57bc [ 226.943185][ T5472] RDX: 000000000000000f RSI: 00007ff9457610a0 RDI: 000000000000000c [ 226.951003][ T5472] RBP: 00007ff945761090 R08: 0000000000000000 R09: 0000000000000000 [ 226.958802][ T5472] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 226.966616][ T5472] R13: 0000000000000000 R14: 00007ff94730ffa0 R15: 00007ffc6b9eeb88 [ 229.875884][ T5579] syz.4.1685[5579] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 229.875933][ T5579] syz.4.1685[5579] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 229.916613][ T5579] FAULT_INJECTION: forcing a failure. [ 229.916613][ T5579] name failslab, interval 1, probability 0, space 0, times 0 [ 230.154992][ T5579] CPU: 0 PID: 5579 Comm: syz.4.1685 Tainted: G W 5.10.233-syzkaller-00881-gfbe98d68b6b3 #0 [ 230.166092][ T5579] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 12/27/2024 [ 230.175981][ T5579] Call Trace: [ 230.179119][ T5579] dump_stack_lvl+0x1e2/0x24b [ 230.183622][ T5579] ? bfq_pos_tree_add_move+0x43b/0x43b [ 230.188915][ T5579] ? do_syscall_64+0x34/0x70 [ 230.193344][ T5579] dump_stack+0x15/0x17 [ 230.197340][ T5579] should_fail+0x3c6/0x510 [ 230.201588][ T5579] ? sk_prot_alloc+0x5f/0x370 [ 230.206101][ T5579] __should_failslab+0xa4/0xe0 [ 230.210701][ T5579] should_failslab+0x9/0x20 [ 230.215039][ T5579] kmem_cache_alloc+0x3d/0x2e0 [ 230.219638][ T5579] sk_prot_alloc+0x5f/0x370 [ 230.223978][ T5579] sk_alloc+0x38/0x4d0 [ 230.227890][ T5579] ? slab_post_alloc_hook+0x80/0x2f0 [ 230.233006][ T5579] tipc_sk_create+0x103/0x1e70 [ 230.237606][ T5579] ? security_inode_alloc+0x29/0x120 [ 230.242725][ T5579] ? __kasan_check_write+0x14/0x20 [ 230.247677][ T5579] ? _raw_spin_lock+0xa4/0x1b0 [ 230.252276][ T5579] ? _raw_spin_trylock_bh+0x190/0x190 [ 230.257480][ T5579] ? security_inode_alloc+0xc0/0x120 [ 230.262603][ T5579] ? inode_init_always+0x77e/0x9f0 [ 230.267549][ T5579] __sock_create+0x3a6/0x760 [ 230.271977][ T5579] __sys_socketpair+0x29f/0x6e0 [ 230.276665][ T5579] ? __ia32_sys_socket+0x90/0x90 [ 230.281437][ T5579] ? __ia32_sys_read+0x90/0x90 [ 230.286040][ T5579] __x64_sys_socketpair+0x9b/0xb0 [ 230.290898][ T5579] do_syscall_64+0x34/0x70 [ 230.295147][ T5579] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 230.300874][ T5579] RIP: 0033:0x7f23cd486da9 [ 230.305133][ T5579] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 230.324571][ T5579] RSP: 002b:00007f23cbaf1038 EFLAGS: 00000246 ORIG_RAX: 0000000000000035 [ 230.332815][ T5579] RAX: ffffffffffffffda RBX: 00007f23cd69ffa0 RCX: 00007f23cd486da9 [ 230.340621][ T5579] RDX: 0000000000000000 RSI: 0000000000000005 RDI: 000000000000001e [ 230.348436][ T5579] RBP: 00007f23cbaf1090 R08: 0000000000000000 R09: 0000000000000000 [ 230.356245][ T5579] R10: 0000000020000940 R11: 0000000000000246 R12: 0000000000000001 [ 230.364057][ T5579] R13: 0000000000000000 R14: 00007f23cd69ffa0 R15: 00007fffe85a0458 [ 234.155472][ T5704] FAULT_INJECTION: forcing a failure. [ 234.155472][ T5704] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 234.168305][ T5704] CPU: 1 PID: 5704 Comm: syz.0.1728 Tainted: G W 5.10.233-syzkaller-00881-gfbe98d68b6b3 #0 [ 234.179402][ T5704] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 12/27/2024 [ 234.189306][ T5704] Call Trace: [ 234.192435][ T5704] dump_stack_lvl+0x1e2/0x24b [ 234.196939][ T5704] ? bfq_pos_tree_add_move+0x43b/0x43b [ 234.202247][ T5704] dump_stack+0x15/0x17 [ 234.206226][ T5704] should_fail+0x3c6/0x510 [ 234.210477][ T5704] should_fail_usercopy+0x1a/0x20 [ 234.215339][ T5704] strncpy_from_user+0x24/0x2d0 [ 234.220028][ T5704] strncpy_from_user_nofault+0x73/0x150 [ 234.225411][ T5704] bpf_probe_read_user_str+0x2a/0x70 [ 234.230531][ T5704] bpf_prog_1f2a558f99cc9b3e+0x35/0x3c0 [ 234.235907][ T5704] bpf_trace_run3+0x121/0x2c0 [ 234.240422][ T5704] ? bpf_trace_run2+0x280/0x280 [ 234.245107][ T5704] ? __this_cpu_preempt_check+0x13/0x20 [ 234.250490][ T5704] ? tracing_record_taskinfo_sched_switch+0x84/0x390 [ 234.257000][ T5704] ? __bpf_trace_sched_wakeup_template+0x10/0x10 [ 234.263161][ T5704] __bpf_trace_sched_switch+0xb/0x10 [ 234.268280][ T5704] __traceiter_sched_switch+0x85/0xc0 [ 234.273489][ T5704] __schedule+0x10be/0x1330 [ 234.277828][ T5704] ? release_firmware_map_entry+0x18d/0x18d [ 234.283558][ T5704] preempt_schedule_irq+0xc7/0x140 [ 234.288499][ T5704] ? preempt_schedule_notrace+0x140/0x140 [ 234.294196][ T5704] irqentry_exit+0x4f/0x60 [ 234.298441][ T5704] sysvec_reschedule_ipi+0x83/0x160 [ 234.303474][ T5704] asm_sysvec_reschedule_ipi+0x12/0x20 [ 234.308767][ T5704] RIP: 0010:dup_task_struct+0x50b/0xc30 [ 234.314146][ T5704] Code: f7 43 80 3c 26 00 74 08 4c 89 ef e8 0f 71 6a 00 49 8b 5d 00 48 89 d8 48 c1 e8 03 42 80 3c 20 00 74 08 48 89 df e8 95 71 6a 00 <48> c7 03 9d 6e ac 57 e8 e9 19 74 01 49 89 c4 49 81 e4 00 ff ff ff [ 234.333586][ T5704] RSP: 0018:ffffc90000ebfae0 EFLAGS: 00000246 [ 234.339486][ T5704] RAX: 1ffff920001f4000 RBX: ffffc90000fa0000 RCX: ffffffff813dec4e [ 234.347296][ T5704] RDX: 0000000000000001 RSI: 0000000000000008 RDI: ffff888115324f00 [ 234.355106][ T5704] RBP: ffffc90000ebfb30 R08: dffffc0000000000 R09: ffffed1022a649e1 [ 234.362918][ T5704] R10: 0000000000000000 R11: dffffc0000000001 R12: dffffc0000000000 [ 234.370816][ T5704] R13: ffff888115324f18 R14: 1ffff11022a649e3 R15: ffff888115324f00 [ 234.378634][ T5704] ? dup_task_struct+0x4de/0xc30 [ 234.383408][ T5704] copy_process+0x5c8/0x3340 [ 234.387829][ T5704] ? proc_fail_nth_write+0x20b/0x290 [ 234.392949][ T5704] ? proc_fail_nth_read+0x210/0x210 [ 234.397982][ T5704] ? security_file_permission+0x86/0xb0 [ 234.403367][ T5704] ? rw_verify_area+0x1c3/0x360 [ 234.408053][ T5704] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 234.413000][ T5704] ? vfs_write+0x852/0xe70 [ 234.417253][ T5704] ? kmem_cache_free+0xa9/0x1e0 [ 234.421938][ T5704] kernel_clone+0x21e/0x9e0 [ 234.426278][ T5704] ? __kasan_check_write+0x14/0x20 [ 234.431225][ T5704] ? create_io_thread+0x1e0/0x1e0 [ 234.436087][ T5704] __x64_sys_clone+0x23f/0x290 [ 234.440685][ T5704] ? __do_sys_vfork+0x130/0x130 [ 234.445379][ T5704] ? debug_smp_processor_id+0x17/0x20 [ 234.450581][ T5704] do_syscall_64+0x34/0x70 [ 234.454832][ T5704] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 234.460559][ T5704] RIP: 0033:0x7f9a75babda9 [ 234.464814][ T5704] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 234.484253][ T5704] RSP: 002b:00007f9a74215fe8 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 234.492498][ T5704] RAX: ffffffffffffffda RBX: 00007f9a75dc4fa0 RCX: 00007f9a75babda9 [ 234.500309][ T5704] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000022023400 [ 234.508120][ T5704] RBP: 00007f9a74216090 R08: 0000000000000000 R09: 0000000000000000 [ 234.515933][ T5704] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000001 [ 234.523742][ T5704] R13: 0000000000000001 R14: 00007f9a75dc4fa0 R15: 00007fff5c18dea8 [ 248.180515][ T6072] device syzkaller0 entered promiscuous mode [ 254.054048][ T6187] device syzkaller0 entered promiscuous mode [ 255.900591][ T6229] device wg2 left promiscuous mode [ 255.950592][ T6228] device wg2 entered promiscuous mode [ 256.020260][ T6235] FAULT_INJECTION: forcing a failure. [ 256.020260][ T6235] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 256.226011][ T6235] CPU: 1 PID: 6235 Comm: syz.0.1885 Tainted: G W 5.10.233-syzkaller-00881-gfbe98d68b6b3 #0 [ 256.237125][ T6235] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 12/27/2024 [ 256.247012][ T6235] Call Trace: [ 256.250150][ T6235] dump_stack_lvl+0x1e2/0x24b [ 256.254651][ T6235] ? bfq_pos_tree_add_move+0x43b/0x43b [ 256.259951][ T6235] ? avc_has_perm+0x275/0x400 [ 256.264460][ T6235] ? memset+0x35/0x40 [ 256.268277][ T6235] dump_stack+0x15/0x17 [ 256.272271][ T6235] should_fail+0x3c6/0x510 [ 256.276523][ T6235] should_fail_usercopy+0x1a/0x20 [ 256.281385][ T6235] _copy_from_user+0x20/0xd0 [ 256.285810][ T6235] sock_setsockopt+0x294/0x2e00 [ 256.290504][ T6235] ? __sock_set_mark+0x160/0x160 [ 256.295270][ T6235] ? selinux_socket_getsockopt+0x340/0x340 [ 256.300913][ T6235] ? kmem_cache_free+0xa9/0x1e0 [ 256.305604][ T6235] ? security_socket_setsockopt+0x82/0xb0 [ 256.311154][ T6235] __sys_setsockopt+0x441/0x870 [ 256.315839][ T6235] ? __ia32_sys_recv+0xb0/0xb0 [ 256.320441][ T6235] __x64_sys_setsockopt+0xbf/0xd0 [ 256.325299][ T6235] do_syscall_64+0x34/0x70 [ 256.329555][ T6235] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 256.335275][ T6235] RIP: 0033:0x7f9a75babda9 [ 256.339531][ T6235] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 256.358983][ T6235] RSP: 002b:00007f9a74216038 EFLAGS: 00000246 ORIG_RAX: 0000000000000036 [ 256.367218][ T6235] RAX: ffffffffffffffda RBX: 00007f9a75dc4fa0 RCX: 00007f9a75babda9 [ 256.375032][ T6235] RDX: 000000000000001d RSI: 0000000000000001 RDI: 0000000000000006 [ 256.382837][ T6235] RBP: 00007f9a74216090 R08: 0000000000000004 R09: 0000000000000000 [ 256.390648][ T6235] R10: 00000000200001c0 R11: 0000000000000246 R12: 0000000000000001 [ 256.398462][ T6235] R13: 0000000000000000 R14: 00007f9a75dc4fa0 R15: 00007fff5c18dea8 [ 261.998861][ T6355] device syzkaller0 entered promiscuous mode [ 264.037032][ T6408] FAULT_INJECTION: forcing a failure. [ 264.037032][ T6408] name failslab, interval 1, probability 0, space 0, times 0 [ 264.131092][ T6408] CPU: 0 PID: 6408 Comm: syz.0.1938 Tainted: G W 5.10.233-syzkaller-00881-gfbe98d68b6b3 #0 [ 264.142197][ T6408] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 12/27/2024 [ 264.152083][ T6408] Call Trace: [ 264.155219][ T6408] dump_stack_lvl+0x1e2/0x24b [ 264.159736][ T6408] ? bfq_pos_tree_add_move+0x43b/0x43b [ 264.165025][ T6408] ? kmem_cache_free+0xa9/0x1e0 [ 264.169709][ T6408] ? kasan_set_track+0x5d/0x70 [ 264.174312][ T6408] ? kasan_set_free_info+0x23/0x40 [ 264.179258][ T6408] dump_stack+0x15/0x17 [ 264.183244][ T6408] should_fail+0x3c6/0x510 [ 264.187502][ T6408] ? dup_task_struct+0x57/0xc30 [ 264.192188][ T6408] __should_failslab+0xa4/0xe0 [ 264.196787][ T6408] should_failslab+0x9/0x20 [ 264.201127][ T6408] kmem_cache_alloc+0x3d/0x2e0 [ 264.205818][ T6408] ? __kasan_check_write+0x14/0x20 [ 264.210758][ T6408] ? _raw_spin_lock_irq+0xa5/0x1b0 [ 264.215708][ T6408] dup_task_struct+0x57/0xc30 [ 264.220223][ T6408] ? __kasan_check_write+0x14/0x20 [ 264.225168][ T6408] copy_process+0x5c8/0x3340 [ 264.229594][ T6408] ? proc_fail_nth_write+0x20b/0x290 [ 264.234716][ T6408] ? proc_fail_nth_read+0x210/0x210 [ 264.239749][ T6408] ? security_file_permission+0x86/0xb0 [ 264.245129][ T6408] ? rw_verify_area+0x1c3/0x360 [ 264.249819][ T6408] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 264.254765][ T6408] ? vfs_write+0x852/0xe70 [ 264.259015][ T6408] ? kmem_cache_free+0xa9/0x1e0 [ 264.263703][ T6408] kernel_clone+0x21e/0x9e0 [ 264.268045][ T6408] ? __kasan_check_write+0x14/0x20 [ 264.272991][ T6408] ? create_io_thread+0x1e0/0x1e0 [ 264.277850][ T6408] __x64_sys_clone+0x23f/0x290 [ 264.282466][ T6408] ? __do_sys_vfork+0x130/0x130 [ 264.287142][ T6408] ? debug_smp_processor_id+0x17/0x20 [ 264.292344][ T6408] do_syscall_64+0x34/0x70 [ 264.296600][ T6408] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 264.302321][ T6408] RIP: 0033:0x7f9a75babda9 [ 264.306576][ T6408] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 264.326018][ T6408] RSP: 002b:00007f9a74215fe8 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 264.334265][ T6408] RAX: ffffffffffffffda RBX: 00007f9a75dc4fa0 RCX: 00007f9a75babda9 [ 264.342075][ T6408] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000040000000 [ 264.349892][ T6408] RBP: 00007f9a74216090 R08: 0000000000000000 R09: 0000000000000000 [ 264.357695][ T6408] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000001 [ 264.365507][ T6408] R13: 0000000000000000 R14: 00007f9a75dc4fa0 R15: 00007fff5c18dea8 [ 268.159069][ T24] audit: type=1400 audit(1738077811.290:151): avc: denied { create } for pid=6520 comm="syz.2.1973" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bluetooth_socket permissive=1 [ 269.009864][ T6538] FAULT_INJECTION: forcing a failure. [ 269.009864][ T6538] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 269.148787][ T6538] CPU: 1 PID: 6538 Comm: syz.0.1978 Tainted: G W 5.10.233-syzkaller-00881-gfbe98d68b6b3 #0 [ 269.159895][ T6538] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 12/27/2024 [ 269.169782][ T6538] Call Trace: [ 269.172915][ T6538] dump_stack_lvl+0x1e2/0x24b [ 269.177431][ T6538] ? bfq_pos_tree_add_move+0x43b/0x43b [ 269.182717][ T6538] dump_stack+0x15/0x17 [ 269.186712][ T6538] should_fail+0x3c6/0x510 [ 269.190965][ T6538] should_fail_usercopy+0x1a/0x20 [ 269.195825][ T6538] _copy_to_user+0x20/0x90 [ 269.200077][ T6538] simple_read_from_buffer+0xc7/0x150 [ 269.205287][ T6538] proc_fail_nth_read+0x1a3/0x210 [ 269.210146][ T6538] ? proc_fault_inject_write+0x390/0x390 [ 269.215611][ T6538] ? security_file_permission+0x86/0xb0 [ 269.220992][ T6538] ? rw_verify_area+0x1c3/0x360 [ 269.225681][ T6538] ? proc_fault_inject_write+0x390/0x390 [ 269.231149][ T6538] vfs_read+0x200/0xba0 [ 269.235144][ T6538] ? kernel_read+0x70/0x70 [ 269.239392][ T6538] ? __kasan_check_write+0x14/0x20 [ 269.244339][ T6538] ? mutex_lock+0xa5/0x110 [ 269.248594][ T6538] ? mutex_trylock+0xa0/0xa0 [ 269.253018][ T6538] ? __fdget_pos+0x2e7/0x3a0 [ 269.257446][ T6538] ? ksys_read+0x77/0x2c0 [ 269.261611][ T6538] ksys_read+0x199/0x2c0 [ 269.265691][ T6538] ? __ia32_sys_recv+0xb0/0xb0 [ 269.270290][ T6538] ? vfs_write+0xe70/0xe70 [ 269.274543][ T6538] ? debug_smp_processor_id+0x17/0x20 [ 269.279750][ T6538] __x64_sys_read+0x7b/0x90 [ 269.284092][ T6538] do_syscall_64+0x34/0x70 [ 269.288342][ T6538] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 269.294067][ T6538] RIP: 0033:0x7f9a75baa7bc [ 269.298321][ T6538] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 93 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 ef 93 02 00 48 [ 269.317766][ T6538] RSP: 002b:00007f9a74216030 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 269.326008][ T6538] RAX: ffffffffffffffda RBX: 00007f9a75dc4fa0 RCX: 00007f9a75baa7bc [ 269.333819][ T6538] RDX: 000000000000000f RSI: 00007f9a742160a0 RDI: 000000000000000a [ 269.341631][ T6538] RBP: 00007f9a74216090 R08: 0000000000000000 R09: 0000000000000000 [ 269.349441][ T6538] R10: 00000000200001c0 R11: 0000000000000246 R12: 0000000000000001 [ 269.357250][ T6538] R13: 0000000000000000 R14: 00007f9a75dc4fa0 R15: 00007fff5c18dea8 [ 271.288836][ T6589] device pim6reg1 entered promiscuous mode [ 271.441685][ T6594] bridge0: port 2(bridge_slave_1) entered disabled state [ 271.792787][ T6599] Â: renamed from pim6reg1