last executing test programs: 3.08749256s ago: executing program 1 (id=2558): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x1c1341, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1b, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000003c0)={&(0x7f0000000140)='kmem_cache_free\x00', r2}, 0x10) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller0\x00', 0x84aebfbd6349b7f2}) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000340), 0x183081, 0x0) close(r3) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="06000000040000000800000005"], 0x48) perf_event_open(&(0x7f0000000380)={0x2, 0x80, 0x0, 0x0, 0x0, 0x2, 0x0, 0xa, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xffff}, 0x1f8c8, 0xc8, 0x0, 0x3, 0x1bec, 0x0, 0x0, 0x0, 0x0, 0x0, 0x803}, 0xffffffffffffffff, 0x104, 0xffffffffffffffff, 0xa) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[], 0x48) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f00000004c0)=ANY=[@ANYRESHEX=r4, @ANYRES32=r4, @ANYBLOB="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"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x29, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='kmem_cache_free\x00', r5}, 0x10) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r7) recvmsg$unix(r6, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r8, &(0x7f0000000140)=ANY=[@ANYBLOB="8fedcb790700117df37538e486dd6317ce22020000000000000000000000000000007fc5f603ff65ec5deb000071673fa79d93014b8e7781"], 0xfdef) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)) write$cgroup_devices(0xffffffffffffffff, 0x0, 0x9) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1}, 0x10}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) r9 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002c80)={0x3, 0x5, &(0x7f0000000080)=ANY=[@ANYBLOB="18020000000080000000000000000000850000000500000085000000a00000009500000000000000"], &(0x7f0000000000)='syzkaller\x00', 0x4, 0xc7, &(0x7f0000000140)=""/199}, 0x80) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000002c0)={r9, 0x0, 0xe, 0x0, &(0x7f00000008c0)="7a7fa22c2aff88df53ef2a2d280f", 0x0, 0xa00, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000027c0)=ANY=[@ANYBLOB="0400000004000000040000000500010000000000", @ANYRES32, @ANYBLOB='\x00'/13, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) openat$cgroup_ro(r9, &(0x7f0000000280)='cpuacct.usage_sys\x00', 0x0, 0x0) close(0xffffffffffffffff) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) 2.996150857s ago: executing program 0 (id=2563): bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="0200000004000000080000000100000080"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000edff0000000000000000850000000f00000018010000646c012500000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000800000850000000600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x90) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000480)={&(0x7f0000000080)='netlink_extack\x00', r0}, 0x10) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'bond_slave_1\x00'}) socketpair(0x1, 0x1, 0x2, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8922, &(0x7f0000000080)) bpf$PROG_LOAD(0x5, 0x0, 0x0) r2 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={0x0}, 0x18) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000700)='signal_deliver\x00', r2}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={0x0}, 0x18) perf_event_open(&(0x7f00000004c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x180a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x4, 0x0, 0x1}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000380)) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="020000000400000005000000020000000010"], 0x48) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000000010007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={&(0x7f0000000040)='kmem_cache_free\x00', r5}, 0x10) sendmsg$inet(r3, &(0x7f0000000d40)={0x0, 0x0, &(0x7f00000023c0)=[{&(0x7f0000000b40)='?', 0x1}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x8}, 0x20001) r6 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="18000000000000000000000005000080850000007d00000095"], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='sys_enter\x00', r6}, 0x10) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000300)={0xffffffffffffffff}) setsockopt$sock_attach_bpf(r7, 0x1, 0x1d, &(0x7f00000001c0), 0x4) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz1\x00', 0x1ff) r9 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) openat$cgroup_procs(r9, &(0x7f0000000840)='cgroup.procs\x00', 0x2, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000580)=ANY=[@ANYBLOB="0b00000005000000000400000900000001000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="000000001e00000000000000000000000000000000000000000000007648fe75992c90cc789579b52d1ec960c72a8bc9548c7d753100320e17a890879d608428f4138a4eb6af06f17128affc6163824dd1a25e50b939d45d2e51e520a33f710476d2875f559476d53b7f6511bb2091c199bf2ad2dcbbfe16c6b0a81689dd9dd3ca47696f5f5524d1dc7e52b70d20f59ef21693"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) recvmsg(r8, &(0x7f0000000500)={&(0x7f0000000040)=@hci, 0x80, &(0x7f0000000100)=[{&(0x7f0000000400)=""/248, 0x200105d0}], 0x1}, 0x1f00) 2.876475037s ago: executing program 1 (id=2566): bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x10020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x1b, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x27, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000200)={{r1}, &(0x7f0000000180), &(0x7f00000001c0)=r0}, 0x20) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18020000000000000000"], 0x0, 0x0, 0x0, 0x0, 0x41100}, 0x94) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000700)=ANY=[@ANYBLOB="0a000000010000000c00000009"], 0x50) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000180), &(0x7f0000000780), 0x433d, r2}, 0x38) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000580)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000200)='fdb_delete\x00', r3}, 0x10) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r4, 0x8924, &(0x7f0000000000)={'bridge_slave_0\x00', @random="010000201000"}) 2.536695604s ago: executing program 2 (id=2574): perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, @perf_bp={0x0}, 0x1008, 0xc8, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x3cd6da3c}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f0000000300)=ANY=[@ANYBLOB="18000000000000000000000000000000181100", @ANYRES32=r2, @ANYBLOB="0000000000000000b702000002000000850000008600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000700)={&(0x7f00000006c0)='kmem_cache_free\x00', r3}, 0x10) close(r1) recvmsg$unix(r0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r4, &(0x7f0000000580)=ANY=[@ANYBLOB="8fedcb791f6f9875f37538e486dd6317ce81ea038800fe08000e40000200875a65969ff57b00ff02fffffff500000000000000000001e2607e15e697ab"], 0xfdef) 1.528761066s ago: executing program 2 (id=2575): perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0xc8, 0x0, 0x3}, 0x0, 0xb, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000001b40)={0xffffffffffffffff, 0xffffffffffffffff}) close(r1) recvmsg$unix(r0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x68}, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="07000000040000000802000001"], 0x50) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x11, 0x8, &(0x7f0000000740)=ANY=[@ANYBLOB="18000000000000000000000000000000181200", @ANYRES32=r4, @ANYBLOB="0000000000000000b703000000040000850000001b000000b70000000000000095"], &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r5}, 0x18) sendmsg$inet(r3, &(0x7f0000000d40)={0x0, 0x7000000, &(0x7f00000023c0)=[{&(0x7f0000000b40)='?', 0x1}, {0x0, 0x1}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x9}, 0x20001) write$cgroup_subtree(r2, 0x0, 0xfdef) 1.516517177s ago: executing program 0 (id=2576): bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x1b, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x27, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000200)={{r0}, &(0x7f0000000180), &(0x7f00000001c0)}, 0x20) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18020000000000000000"], 0x0, 0x0, 0x0, 0x0, 0x41100}, 0x94) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000700)=ANY=[@ANYBLOB="0a000000010000000c00000009"], 0x50) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000180), &(0x7f0000000780), 0x433d, r1}, 0x38) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r2, 0x8924, &(0x7f0000000000)={'bridge_slave_0\x00', @random="010000201000"}) 1.441389393s ago: executing program 2 (id=2578): bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="0200000004000000080000000100000080"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000edff0000000000000000850000000f00000018010000646c012500000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000800000850000000600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x90) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000480)={&(0x7f0000000080)='netlink_extack\x00', r0}, 0x10) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'bond_slave_1\x00'}) socketpair(0x1, 0x1, 0x2, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8922, &(0x7f0000000080)) bpf$PROG_LOAD(0x5, 0x0, 0x0) r2 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={0x0}, 0x18) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000700)='signal_deliver\x00', r2}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={0x0}, 0x18) perf_event_open(&(0x7f00000004c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x180a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x4, 0x0, 0x1}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000380)) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="020000000400000005000000020000000010"], 0x48) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000", @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000000010007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={&(0x7f0000000040)='kmem_cache_free\x00', r5}, 0x10) sendmsg$inet(r3, &(0x7f0000000d40)={0x0, 0x7000000, &(0x7f00000023c0)=[{&(0x7f0000000b40)='?', 0x1}, {0x0, 0x1}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x9}, 0x20001) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="18000000000000000000000005000080850000007d00000095"], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000300)={0xffffffffffffffff}) setsockopt$sock_attach_bpf(r6, 0x1, 0x1d, &(0x7f00000001c0), 0x4) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz1\x00', 0x1ff) r8 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) openat$cgroup_procs(r8, &(0x7f0000000840)='cgroup.procs\x00', 0x2, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000580)=ANY=[@ANYBLOB="0b00000005000000000400000900000001000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="000000001e00000000000000000000000000000000000000000000007648fe75992c90cc789579b52d1ec960c72a8bc9548c7d753100320e17a890879d608428f4138a4eb6af06f17128affc6163824dd1a25e50b939d45d2e51e520a33f710476d2875f559476d53b7f6511bb2091c199bf2ad2dcbbfe16c6b0a81689dd9dd3ca47696f5f5524d1dc7e52b70d20f59ef21693"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) recvmsg(r7, &(0x7f0000000500)={&(0x7f0000000040)=@hci, 0x80, &(0x7f0000000100)=[{&(0x7f0000000400)=""/248, 0x200105d0}], 0x1}, 0x1f00) 1.381631797s ago: executing program 1 (id=2580): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000008c0)=ANY=[@ANYBLOB="070000000400000020010000010200"], 0x50) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x8, &(0x7f0000000080)=ANY=[@ANYBLOB="18000000bb00551a000000000000000018120000", @ANYRES32=r0, @ANYBLOB="0000000000000000b703000000000000850000001b000000b70000000000000095"], &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x2d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000040)='kmem_cache_free\x00', r1}, 0x18) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r3) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb0000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xc8, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmsg$unix(r2, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[], 0x48) write$cgroup_subtree(r4, &(0x7f0000000500)=ANY=[], 0xfdef) 1.34616882s ago: executing program 4 (id=2581): r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000000000000000000000000000850000002a00000095"], &(0x7f0000000440)='GPL\x00', 0x4, 0x99, &(0x7f0000000480)=""/153}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='kmem_cache_free\x00', r0}, 0x10) sendmsg(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000180)}], 0x1}, 0x14000800) perf_event_open$cgroup(&(0x7f0000000000)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000010000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 1.319876503s ago: executing program 1 (id=2582): bpf$MAP_CREATE(0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000580)='cpuacct.usage_all\x00', 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454da, &(0x7f0000000080)={'batadv0\x00'}) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'dvmrp1\x00', 0x1}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f00000001c0), 0x103442, 0x0) ioctl$TUNSETIFF(r1, 0x400454da, &(0x7f0000000140)={'batadv0\x00'}) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000100)={'pimreg0\x00', 0x1}) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000900)={0x12, 0x0, 0x0, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0xa, '\x00', 0x0, 0xb, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0xfffffffa}, 0x94) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xf, &(0x7f0000000240)=ANY=[@ANYBLOB="1800000000001000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000000000008500000084000000b7000000000000"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f00000006c0)='sched_switch\x00', r3}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000300)='tlb_flush\x00'}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0xa, 0x2, 0x3a, &(0x7f0000000100)) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) socketpair$unix(0x1, 0x2, 0x0, 0x0) close(0xffffffffffffffff) r4 = openat$tun(0xffffffffffffff9c, &(0x7f00000002c0), 0x498180, 0x0) ioctl$TUNSETOFFLOAD(r4, 0x400454d0, 0x15) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xae9, 0x30, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x1}, 0x2000, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000000700)='ns/mnt\x00') socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)) close(0xffffffffffffffff) syz_clone(0x62008000, 0x0, 0x0, 0x0, 0x0, 0x0) 1.268198077s ago: executing program 4 (id=2583): r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x10020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x1b, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000016"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x27, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000200)={{r1}, &(0x7f0000000180), &(0x7f00000001c0)=r0}, 0x20) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18020000000000000000"], 0x0, 0x0, 0x0, 0x0, 0x41100}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000580)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000200)='fdb_delete\x00', r2}, 0x10) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r3, 0x8924, &(0x7f0000000000)={'bridge_slave_0\x00', @random="010000201000"}) 1.267333657s ago: executing program 3 (id=2585): r0 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="1b0000000000000000000000000004"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x11, 0xf, &(0x7f0000000280)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b70200001400a685b7030000000000008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000000000008500000084000000b70000000000000095"], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x40f00, 0x8, '\x00', 0x0, @fallback=0x22, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000040)='kmem_cache_free\x00', r1}, 0x10) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000300)='memory.events\x00', 0x26e1, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000003c0)='hugetlb.2MB.rsvd.usage_in_bytes\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000740)='cpuacct.usage_percpu_sys\x00', 0x26e1, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000002c0)) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000340)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000380)) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0}, 0x94) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000004c0)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000480)) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'syz_tun\x00'}) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000240)) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000440)) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000140)) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000580)) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8946, &(0x7f0000000080)) 1.23216707s ago: executing program 0 (id=2586): perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, @perf_bp={0x0}, 0x1008, 0xc8, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x3cd6da3c}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f0000000300)=ANY=[@ANYBLOB="18000000000000000000000000000000181100", @ANYRES32=r2, @ANYBLOB="0000000000000000b702000002000000850000008600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000700)={&(0x7f00000006c0)='kmem_cache_free\x00', r3}, 0x10) close(r1) recvmsg$unix(r0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r4, &(0x7f0000000580)=ANY=[@ANYBLOB="8fedcb791f6f9875f37538e486dd6317ce81ea038800fe08000e40000200875a65969ff57b00ff02fffffff500000000000000000001e2607e15e697ab"], 0xfdef) 1.23169309s ago: executing program 0 (id=2587): bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="0200000004000000080000000100000080"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000edff0000000000000000850000000f00000018010000646c012500000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000800000850000000600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x90) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000480)={&(0x7f0000000080)='netlink_extack\x00', r0}, 0x10) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'bond_slave_1\x00'}) socketpair(0x1, 0x1, 0x2, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8922, &(0x7f0000000080)) bpf$PROG_LOAD(0x5, 0x0, 0x0) r2 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={0x0}, 0x18) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000700)='signal_deliver\x00', r2}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={0x0}, 0x18) perf_event_open(&(0x7f00000004c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x180a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x4, 0x0, 0x1}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000380)) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="020000000400000005000000020000000010"], 0x48) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000000010007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={&(0x7f0000000040)='kmem_cache_free\x00', r5}, 0x10) sendmsg$inet(r3, &(0x7f0000000d40)={0x0, 0x0, &(0x7f00000023c0)=[{0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x8}, 0x20001) r6 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="18000000000000000000000005000080850000007d00000095"], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='sys_enter\x00', r6}, 0x10) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000300)={0xffffffffffffffff}) setsockopt$sock_attach_bpf(r7, 0x1, 0x1d, &(0x7f00000001c0), 0x4) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz1\x00', 0x1ff) r9 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) openat$cgroup_procs(r9, &(0x7f0000000840)='cgroup.procs\x00', 0x2, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000580)=ANY=[@ANYBLOB="0b00000005000000000400000900000001000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="000000001e00000000000000000000000000000000000000000000007648fe75992c90cc789579b52d1ec960c72a8bc9548c7d753100320e17a890879d608428f4138a4eb6af06f17128affc6163824dd1a25e50b939d45d2e51e520a33f710476d2875f559476d53b7f6511bb2091c199bf2ad2dcbbfe16c6b0a81689dd9dd3ca47696f5f5524d1dc7e52b70d20f59ef21693"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) recvmsg(r8, &(0x7f0000000500)={&(0x7f0000000040)=@hci, 0x80, &(0x7f0000000100)=[{&(0x7f0000000400)=""/248, 0x200105d0}], 0x1}, 0x1f00) 1.216968751s ago: executing program 4 (id=2588): perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0xc8, 0x0, 0x3}, 0x0, 0xb, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000001b40)={0xffffffffffffffff, 0xffffffffffffffff}) close(r1) recvmsg$unix(r0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x68}, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="07000000040000000802000001"], 0x50) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x11, 0x8, &(0x7f0000000740)=ANY=[@ANYBLOB="18000000000000000000000000000000181200", @ANYRES32=r4, @ANYBLOB="0000000000000000b703000000040000850000001b000000b70000000000000095"], &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r5}, 0x18) sendmsg$inet(r3, &(0x7f0000000d40)={0x0, 0x7000000, &(0x7f00000023c0)=[{&(0x7f0000000b40)='?', 0x1}, {0x0, 0x1}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x9}, 0x20001) write$cgroup_subtree(r2, 0x0, 0xfdef) 1.185176334s ago: executing program 3 (id=2589): r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0), 0x1c1842, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000180)={'syzkaller0\x00', 0x7101}) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x17, 0x0, 0x4, 0xff, 0x0, 0x1}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0}, 0x90) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000180)='kmem_cache_free\x00', r3}, 0x10) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000058"], 0x0}, 0x90) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000003c0)={&(0x7f0000000140)='kmem_cache_free\x00', r4}, 0x10) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000080)) write$cgroup_devices(r0, &(0x7f0000000440)=ANY=[@ANYBLOB="1e033000dd5c980128856306008e0200000000d801c9e07f85b9d70e037a282b8a24d4d12db481dedfc0f434db6d2ce54e0000000000000101", @ANYRES8=r1], 0xffdd) 1.179051314s ago: executing program 4 (id=2590): bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x10020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x1b, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x27, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000200)={{r1}, &(0x7f0000000180), &(0x7f00000001c0)=r0}, 0x20) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18020000000000000000"], 0x0, 0x0, 0x0, 0x0, 0x41100}, 0x94) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000700)=ANY=[@ANYBLOB="0a000000010000000c00000009"], 0x50) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000180), &(0x7f0000000780), 0x433d, r2}, 0x38) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000580)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000200)='fdb_delete\x00', r3}, 0x10) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r4, 0x8924, &(0x7f0000000000)={'bridge_slave_0\x00', @random="010000201000"}) 1.069768403s ago: executing program 3 (id=2591): bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYRESHEX], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, 0x2}, 0x94) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz1\x00', 0x1ff) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000780)={0xffffffffffffffff, 0x58, &(0x7f0000000680)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0xb) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', r1}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000002000000b7030000faffffff850000002d00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r2 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdir(&(0x7f0000000040)='./file0/../file0/../file0/file0\x00', 0xffffffffffffffa1) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) r3 = openat$cgroup_procs(r0, &(0x7f0000000240)='tasks\x00', 0x2, 0x0) write$cgroup_pid(r3, &(0x7f0000000880), 0x12) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup/syz1\x00', 0x200002, 0x0) openat$cgroup_procs(r4, &(0x7f0000000040)='cgroup.procs\x00', 0x2, 0x0) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000380)=@base={0x1f, 0x40, 0x0, 0x8000, 0x260, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x400000, 0x1}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r5, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000f6000017850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r6}, 0x10) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000940)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000100), 0x237}, 0x48) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000240)={r7, 0x1f2f, 0x18, 0x1e8, &(0x7f00000007c0)="9f44948721919580684010a49e66", 0x0, 0x1e8, 0x0, 0xb1, 0x0, &(0x7f0000000700)="389ceff69d08b0af1cc71b6262d50660bbaf31a7f8cd6a6f911beb65d5fe6b54bf21a66489121f24fefd198059288c9b735e1898e77a7469489a249292c02a72bc193a3008ebdbf4e9dd4ee8fcceef55402c913c8dd0ebece1330aaa93ece835c5044a246a5967e3acd7c950b3b19f351830e545eb9bc3a9c6dd22ce97f1f857cfe8b68a2370b69ea336006b589368f92deb68f3dfc6f2bfee09f8342da437fce5dcdf658e453e3132bb42067575318c39", &(0x7f0000000000), 0x0, 0xe8030000}, 0x23) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000800)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x5}, {0x0, [0x61, 0x2e, 0x2e]}}, 0x0, 0x1d}, 0x28) perf_event_open$cgroup(&(0x7f0000000480)={0x0, 0x80, 0x0, 0x0, 0x3, 0x2, 0x0, 0x4, 0x21000, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x3ff, 0x4, @perf_bp={&(0x7f0000000300), 0xa}, 0x4000, 0x8000000000000001, 0x4, 0x3, 0x6, 0x3f, 0x16ae, 0x0, 0x5, 0x0, 0xffff}, r0, 0x1, r2, 0x7) syz_clone(0x42a00180, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000540)={0x3, 0x4, 0x4, 0xa, 0x0, 0x1, 0x20000000, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x3, 0x2}, 0x50) 766.992807ms ago: executing program 1 (id=2592): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000008c0)=ANY=[@ANYBLOB="070000000400000020010000010200"], 0x50) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x8, &(0x7f0000000080)=ANY=[@ANYBLOB="18000000bb00551a000000000000000018120000", @ANYRES32=r0, @ANYBLOB="0000000000000000b703000000000000850000001b000000b70000000000000095"], &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x2d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000040)='kmem_cache_free\x00', r1}, 0x18) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r3) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb0000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xc8, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmsg$unix(r2, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[], 0x48) write$cgroup_subtree(r4, &(0x7f0000000500)=ANY=[], 0xfdef) 739.23516ms ago: executing program 1 (id=2593): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) perf_event_open(&(0x7f00000003c0)={0x0, 0x80, 0x7f, 0xa8, 0x7, 0xff, 0x0, 0xfffffffffffffff8, 0x490, 0xe, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0xfffffff8, 0x0, @perf_bp={0x0, 0x8}, 0x102000, 0x9, 0xd, 0x7, 0x7, 0x54, 0xd1, 0x0, 0xfffffffa, 0x0, 0x8000000000000001}, 0x0, 0xf, 0xffffffffffffffff, 0x3) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x10020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x5}, 0x0, 0x8, 0x20}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) (async) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="0200000004000000080000000100000080"], 0x50) (async) r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="0200000004000000080000000100000080"], 0x50) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000480)={r0}, 0x4) (async) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000480)={r0}, 0x4) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x18, &(0x7f00000001c0)=ANY=[@ANYBLOB="18000000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000000000018230000", @ANYRES32=r0, @ANYBLOB="0000000000000000b70500000800000085000000a5000000180100002020640500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000a50000000800000095"], &(0x7f0000000600)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000000)='kmem_cache_free\x00', r1}, 0x10) bpf$OBJ_GET_PROG(0x7, &(0x7f00000008c0)=@generic={&(0x7f0000000600)='./file0\x00', 0x0, 0x10}, 0x18) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="020000000400000080000000050000000010"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000260018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000800007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000260018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000800007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000e00)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000000)='workqueue_queue_work\x00', r3}, 0x10) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) setsockopt$sock_attach_bpf(r4, 0x1, 0x1d, &(0x7f00000001c0), 0x4) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f0000002540)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sk_skb}, 0x48) (async) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f0000002540)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sk_skb}, 0x48) 735.66347ms ago: executing program 3 (id=2594): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0xb, 0x8, 0xc, 0xffffbfff, 0x1, 0x1}, 0x48) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000000c0), &(0x7f0000000140), 0x5, r0}, 0x38) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000810018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x37, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r1}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x11, 0x13, &(0x7f0000000080)=ANY=[@ANYBLOB="18080000000000000003000000000000851000000600000018020000", @ANYRES32, @ANYBLOB="00000000000000006600020000000000180000000000000000000000000000009500040000000000360a020000000000180100002020782500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b50a00000000000085000000060000009500000000000000"], &(0x7f0000000000)='GPL\x00', 0x2, 0xff5c, &(0x7f0000000340)=""/222}, 0x78) 666.770976ms ago: executing program 3 (id=2595): bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0500000004000000ff0f000005"], 0x48) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000002ec0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x31, 0x0, &(0x7f0000000100)="b9ff03316844268cb89e14f0080047e0ffff00124000632f77fbac14fe16e000030a07080403fe80000020006558845013", 0x0, 0x24, 0x60000000}, 0x50) perf_event_open(&(0x7f0000000800)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x8}, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000180)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000300)) openat$tun(0xffffffffffffff9c, &(0x7f0000000380), 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x8020}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000800)={0x2, 0x80, 0xca, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000480)={0x2, 0x80, 0xcb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0x0, 0xffffffffffffffff, 0x8) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240)={0x2, 0x4, 0x8, 0x1, 0x80, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x50) openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000002c0)) r1 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="02000000040000000800000001"], 0x34) bpf$MAP_LOOKUP_ELEM(0x5, &(0x7f00000000c0)={r1, &(0x7f0000000000), &(0x7f0000000040)=""/73}, 0x70) 575.487953ms ago: executing program 2 (id=2596): bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x1b, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x27, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000200)={{r0}, &(0x7f0000000180), &(0x7f00000001c0)}, 0x20) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18020000000000000000"], 0x0, 0x0, 0x0, 0x0, 0x41100}, 0x94) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000700)=ANY=[@ANYBLOB="0a000000010000000c00000009"], 0x50) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000180), &(0x7f0000000780), 0x433d, r1}, 0x38) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r2, 0x8924, &(0x7f0000000000)={'bridge_slave_0\x00', @random="010000201000"}) 558.582564ms ago: executing program 3 (id=2597): r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x11, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1801000021000000000000004bc311ec8500000075000000a70000000800000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="18010000070000000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) r2 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f00000000c0)='percpu_alloc_percpu\x00', r1}, 0x10) r3 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f00000000c0)='percpu_alloc_percpu\x00', r0}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000500)=ANY=[@ANYBLOB="0a00000001000000400000002048f7ba8131d90e3561063cb0d333f2fe3dd371ac51c5b367a2ad35c6574df15a52d3fd6c8c4e65f18e7ab76dc4dfebe24639ef46b89e1ef5c1e5cd", @ANYRES8=r2, @ANYRES64=r3], 0x48) syz_open_procfs$namespace(0x0, 0xfffffffffffffffe) r4 = openat$tun(0xffffffffffffff9c, &(0x7f00000007c0), 0x28c000, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f0000000800)={'macvlan0\x00', 0x1000}) r5 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x1c1341, 0x0) r6 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000640)={0x18, 0x4, &(0x7f0000000340)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x94) r7 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f00000003c0)='kmem_cache_free\x00', r6}, 0x10) r8 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) close(r7) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)) ioctl$SIOCSIFHWADDR(r8, 0x8914, &(0x7f0000002280)={'syzkaller0\x00', @link_local}) write$cgroup_subtree(r5, &(0x7f0000000000)=ANY=[@ANYRESOCT=r7], 0xffffffffffffff32) close(0xffffffffffffffff) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[], 0x48) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000280)={0x0}, 0x18) syz_clone(0x11, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$MAP_CREATE_RINGBUF(0x0, 0x0, 0x50) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={0x0}, 0x18) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000009c0)={0xffffffffffffffff}) recvmsg$unix(r9, &(0x7f0000000400)={0x0, 0x0, 0x0}, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) socketpair(0x1a, 0x4, 0xfffffffe, &(0x7f00000002c0)={0x0, 0x0}) ioctl$TUNSETIFF(r5, 0x400454ca, &(0x7f0000000080)={'vlan0\x00', 0x1}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000300)) 335.325802ms ago: executing program 2 (id=2598): perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, @perf_bp={0x0}, 0x1008, 0xc8, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x3cd6da3c}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f0000000300)=ANY=[@ANYBLOB="18000000000000000000000000000000181100", @ANYRES32=r2, @ANYBLOB="0000000000000000b702000002000000850000008600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000700)={&(0x7f00000006c0)='kmem_cache_free\x00', r3}, 0x10) close(r1) recvmsg$unix(r0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r4, &(0x7f0000000580)=ANY=[@ANYBLOB="8fedcb791f6f9875f37538e486dd6317ce81ea038800fe08000e40000200875a65969ff57b00ff02fffffff500000000000000000001e2607e15e697ab"], 0xfdef) 332.691003ms ago: executing program 0 (id=2599): r0 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="1b0000000000000000000000000004"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x11, 0xf, &(0x7f0000000280)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b70200001400a685b7030000000000008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000000000008500000084000000b70000000000000095"], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x40f00, 0x8, '\x00', 0x0, @fallback=0x22, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000040)='kmem_cache_free\x00', r1}, 0x10) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000300)='memory.events\x00', 0x26e1, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000003c0)='hugetlb.2MB.rsvd.usage_in_bytes\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000740)='cpuacct.usage_percpu_sys\x00', 0x26e1, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000002c0)) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000340)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000380)) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0}, 0x94) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000004c0)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000480)) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'syz_tun\x00'}) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000240)) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000440)) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000140)) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000580)) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8946, &(0x7f0000000080)) 184.387035ms ago: executing program 0 (id=2600): perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0xc8, 0x0, 0x3}, 0x0, 0xb, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000001b40)={0xffffffffffffffff, 0xffffffffffffffff}) close(r1) recvmsg$unix(r0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x68}, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="07000000040000000802000001"], 0x50) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x11, 0x8, &(0x7f0000000740)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r4, @ANYBLOB="0000000000000000b703000000040000850000001b000000b70000000000000095"], 0x0, 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r5}, 0x18) sendmsg$inet(r3, &(0x7f0000000d40)={0x0, 0x7000000, &(0x7f00000023c0)=[{&(0x7f0000000b40)='?', 0x1}, {0x0, 0x1}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x9}, 0x20001) write$cgroup_subtree(r2, 0x0, 0xfdef) 169.465716ms ago: executing program 32 (id=2600): perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0xc8, 0x0, 0x3}, 0x0, 0xb, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000001b40)={0xffffffffffffffff, 0xffffffffffffffff}) close(r1) recvmsg$unix(r0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x68}, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="07000000040000000802000001"], 0x50) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x11, 0x8, &(0x7f0000000740)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r4, @ANYBLOB="0000000000000000b703000000040000850000001b000000b70000000000000095"], 0x0, 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r5}, 0x18) sendmsg$inet(r3, &(0x7f0000000d40)={0x0, 0x7000000, &(0x7f00000023c0)=[{&(0x7f0000000b40)='?', 0x1}, {0x0, 0x1}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x9}, 0x20001) write$cgroup_subtree(r2, 0x0, 0xfdef) 160.415986ms ago: executing program 2 (id=2601): r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x10020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x1b, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000016"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x27, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000200)={{r1}, &(0x7f0000000180), &(0x7f00000001c0)=r0}, 0x20) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18020000000000000000"], 0x0, 0x0, 0x0, 0x0, 0x41100}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000580)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000200)='fdb_delete\x00', r2}, 0x10) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r3, 0x8924, &(0x7f0000000000)={'bridge_slave_0\x00', @random="010000201000"}) 130.946699ms ago: executing program 33 (id=2601): r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x10020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x1b, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000016"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x27, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000200)={{r1}, &(0x7f0000000180), &(0x7f00000001c0)=r0}, 0x20) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18020000000000000000"], 0x0, 0x0, 0x0, 0x0, 0x41100}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000580)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000200)='fdb_delete\x00', r2}, 0x10) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r3, 0x8924, &(0x7f0000000000)={'bridge_slave_0\x00', @random="010000201000"}) 127.362439ms ago: executing program 4 (id=2602): r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0), 0x1c1842, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000180)={'syzkaller0\x00', 0x7101}) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'syzkaller0\x00', 0xca58c30f81b6079f}) socketpair(0x1, 0x1, 0x0, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x17, 0x0, 0x4, 0xff, 0x0, 0x1}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0}, 0x90) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000180)='kmem_cache_free\x00', r2}, 0x10) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000058"], 0x0}, 0x90) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000003c0)={&(0x7f0000000140)='kmem_cache_free\x00', r3}, 0x10) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8914, &(0x7f0000000080)) write$cgroup_devices(r0, &(0x7f0000000440)=ANY=[@ANYBLOB="1e033000dd5c980128856306008e0200000000d801c9e07f85b9d70e037a282b8a24d4d12db481dedfc0f434db6d2ce54e0000000000000101", @ANYRES8], 0xffdd) 292.09µs ago: executing program 4 (id=2603): bpf$MAP_CREATE(0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000580)='cpuacct.usage_all\x00', 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454da, &(0x7f0000000080)={'batadv0\x00'}) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'dvmrp1\x00', 0x1}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f00000001c0), 0x103442, 0x0) ioctl$TUNSETIFF(r1, 0x400454da, &(0x7f0000000140)={'batadv0\x00'}) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000100)={'pimreg0\x00', 0x1}) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000900)={0x12, 0x0, 0x0, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0xa, '\x00', 0x0, 0xb, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0xfffffffa}, 0x94) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xf, &(0x7f0000000240)=ANY=[@ANYBLOB="1800000000001000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000000000008500000084000000b7000000000000"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f00000006c0)='sched_switch\x00', r3}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000300)='tlb_flush\x00'}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0xa, 0x2, 0x3a, &(0x7f0000000100)) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) socketpair$unix(0x1, 0x2, 0x0, 0x0) close(0xffffffffffffffff) r4 = openat$tun(0xffffffffffffff9c, &(0x7f00000002c0), 0x498180, 0x0) ioctl$TUNSETOFFLOAD(r4, 0x400454d0, 0x15) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xae9, 0x30, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x1}, 0x2000, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000000700)='ns/mnt\x00') socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)) close(0xffffffffffffffff) syz_clone(0x62008000, 0x0, 0x0, 0x0, 0x0, 0x0) 0s ago: executing program 34 (id=2603): bpf$MAP_CREATE(0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000580)='cpuacct.usage_all\x00', 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454da, &(0x7f0000000080)={'batadv0\x00'}) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'dvmrp1\x00', 0x1}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f00000001c0), 0x103442, 0x0) ioctl$TUNSETIFF(r1, 0x400454da, &(0x7f0000000140)={'batadv0\x00'}) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000100)={'pimreg0\x00', 0x1}) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000900)={0x12, 0x0, 0x0, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0xa, '\x00', 0x0, 0xb, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0xfffffffa}, 0x94) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xf, &(0x7f0000000240)=ANY=[@ANYBLOB="1800000000001000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000000000008500000084000000b7000000000000"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f00000006c0)='sched_switch\x00', r3}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000300)='tlb_flush\x00'}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0xa, 0x2, 0x3a, &(0x7f0000000100)) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) socketpair$unix(0x1, 0x2, 0x0, 0x0) close(0xffffffffffffffff) r4 = openat$tun(0xffffffffffffff9c, &(0x7f00000002c0), 0x498180, 0x0) ioctl$TUNSETOFFLOAD(r4, 0x400454d0, 0x15) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xae9, 0x30, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x1}, 0x2000, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000000700)='ns/mnt\x00') socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)) close(0xffffffffffffffff) syz_clone(0x62008000, 0x0, 0x0, 0x0, 0x0, 0x0) kernel console output (not intermixed with test programs): bhb_loop+0x50/0xa0 [ 148.482521][ T3630] ? clear_bhb_loop+0x50/0xa0 [ 148.487197][ T3630] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 148.493198][ T3630] RIP: 0033:0x7fd58126fbe9 [ 148.497802][ T3630] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 148.517502][ T3630] RSP: 002b:00007fd57fcd8038 EFLAGS: 00000246 ORIG_RAX: 0000000000000035 [ 148.525920][ T3630] RAX: ffffffffffffffda RBX: 00007fd581496fa0 RCX: 00007fd58126fbe9 [ 148.533893][ T3630] RDX: 0000000000000011 RSI: 0000000000000002 RDI: 000000000000000a [ 148.542119][ T3630] RBP: 00007fd57fcd8090 R08: 0000000000000000 R09: 0000000000000000 [ 148.550174][ T3630] R10: 0000200000000100 R11: 0000000000000246 R12: 0000000000000001 [ 148.558152][ T3630] R13: 00007fd581497038 R14: 00007fd581496fa0 R15: 00007ffc249d26f8 [ 148.566156][ T3630] [ 148.603989][ T3630] socket: no more sockets [ 148.785526][ T3648] FAULT_INJECTION: forcing a failure. [ 148.785526][ T3648] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 148.798966][ T3648] CPU: 1 PID: 3648 Comm: syz.2.1224 Not tainted 5.15.189-syzkaller-android13-5.15.189_r00 #0 [ 148.809143][ T3648] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 148.819202][ T3648] Call Trace: [ 148.822462][ T3648] [ 148.825375][ T3648] __dump_stack+0x21/0x30 [ 148.829700][ T3648] dump_stack_lvl+0xee/0x150 [ 148.834283][ T3648] ? show_regs_print_info+0x20/0x20 [ 148.839455][ T3648] dump_stack+0x15/0x20 [ 148.843595][ T3648] should_fail+0x3c1/0x510 [ 148.848070][ T3648] should_fail_usercopy+0x1a/0x20 [ 148.853382][ T3648] _copy_from_iter+0x21a/0x1050 [ 148.858340][ T3648] ? kasan_quarantine_put+0x34/0x190 [ 148.863646][ T3648] ? copy_mc_pipe_to_iter+0x770/0x770 [ 148.869008][ T3648] ? pskb_expand_head+0x36c/0x11d0 [ 148.874187][ T3648] ? check_stack_object+0x81/0x140 [ 148.879448][ T3648] ? __kasan_check_read+0x11/0x20 [ 148.884482][ T3648] ? __check_object_size+0x2f4/0x3c0 [ 148.889775][ T3648] skb_copy_datagram_from_iter+0xfa/0x6b0 [ 148.895566][ T3648] tun_get_user+0xc3c/0x33c0 [ 148.900141][ T3648] ? __kasan_unpoison_object_data+0x1/0x20 [ 148.905927][ T3648] ? kmem_cache_free+0x100/0x320 [ 148.910838][ T3648] ? tun_do_read+0x1c40/0x1c40 [ 148.915605][ T3648] ? kstrtouint_from_user+0x1a0/0x200 [ 148.920968][ T3648] ? kstrtol_from_user+0x260/0x260 [ 148.926149][ T3648] ? trace_call_bpf+0x361/0x3c0 [ 148.930991][ T3648] ? avc_policy_seqno+0x1b/0x70 [ 148.935817][ T3648] ? selinux_file_permission+0x2aa/0x510 [ 148.941519][ T3648] tun_chr_write_iter+0x1eb/0x2e0 [ 148.946594][ T3648] vfs_write+0x802/0xf70 [ 148.950849][ T3648] ? file_end_write+0x1b0/0x1b0 [ 148.955687][ T3648] ? __fget_files+0x2c4/0x320 [ 148.960346][ T3648] ? __fdget_pos+0x1f7/0x380 [ 148.965013][ T3648] ? ksys_write+0x71/0x240 [ 148.969505][ T3648] ksys_write+0x140/0x240 [ 148.973820][ T3648] ? __ia32_sys_read+0x90/0x90 [ 148.978569][ T3648] ? __bpf_trace_sys_enter+0x62/0x70 [ 148.983939][ T3648] __x64_sys_write+0x7b/0x90 [ 148.988520][ T3648] x64_sys_call+0x8ef/0x9a0 [ 148.992998][ T3648] do_syscall_64+0x4c/0xa0 [ 148.997389][ T3648] ? clear_bhb_loop+0x50/0xa0 [ 149.002053][ T3648] ? clear_bhb_loop+0x50/0xa0 [ 149.006725][ T3648] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 149.012593][ T3648] RIP: 0033:0x7fd58126fbe9 [ 149.017073][ T3648] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 149.036669][ T3648] RSP: 002b:00007fd57fcd8038 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 149.045065][ T3648] RAX: ffffffffffffffda RBX: 00007fd581496fa0 RCX: 00007fd58126fbe9 [ 149.053017][ T3648] RDX: 000000000000fdef RSI: 0000000000000000 RDI: 0000000000000003 [ 149.060972][ T3648] RBP: 00007fd57fcd8090 R08: 0000000000000000 R09: 0000000000000000 [ 149.068937][ T3648] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 149.076894][ T3648] R13: 00007fd581497038 R14: 00007fd581496fa0 R15: 00007ffc249d26f8 [ 149.084963][ T3648] [ 149.796303][ T3677] FAULT_INJECTION: forcing a failure. [ 149.796303][ T3677] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 149.901142][ T3677] CPU: 1 PID: 3677 Comm: syz.0.1236 Not tainted 5.15.189-syzkaller-android13-5.15.189_r00 #0 [ 149.911446][ T3677] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 149.921613][ T3677] Call Trace: [ 149.924910][ T3677] [ 149.927854][ T3677] __dump_stack+0x21/0x30 [ 149.932204][ T3677] dump_stack_lvl+0xee/0x150 [ 149.937361][ T3677] ? show_regs_print_info+0x20/0x20 [ 149.942671][ T3677] ? stack_trace_save+0x98/0xe0 [ 149.947542][ T3677] dump_stack+0x15/0x20 [ 149.951716][ T3677] should_fail+0x3c1/0x510 [ 149.956145][ T3677] should_fail_alloc_page+0x55/0x80 [ 149.961359][ T3677] prepare_alloc_pages+0x156/0x600 [ 149.966483][ T3677] ? __alloc_pages_bulk+0xab0/0xab0 [ 149.971694][ T3677] __alloc_pages+0x10a/0x440 [ 149.976303][ T3677] ? prep_new_page+0x110/0x110 [ 149.981081][ T3677] kmalloc_order+0x4c/0x160 [ 149.985597][ T3677] ? alloc_skb_with_frags+0xa8/0x620 [ 149.990917][ T3677] kmalloc_order_trace+0x18/0xb0 [ 149.995883][ T3677] __kmalloc_track_caller+0x198/0x2c0 [ 150.001273][ T3677] ? kmem_cache_alloc+0xf7/0x260 [ 150.006231][ T3677] ? alloc_skb_with_frags+0xa8/0x620 [ 150.011531][ T3677] __alloc_skb+0x21a/0x740 [ 150.015960][ T3677] alloc_skb_with_frags+0xa8/0x620 [ 150.021085][ T3677] sock_alloc_send_pskb+0x853/0x980 [ 150.026290][ T3677] ? is_bpf_text_address+0x177/0x190 [ 150.031595][ T3677] ? __kernel_text_address+0xa0/0x100 [ 150.036975][ T3677] ? sock_kzfree_s+0x60/0x60 [ 150.041582][ T3677] ? stack_trace_save+0x98/0xe0 [ 150.046447][ T3677] tun_get_user+0x4e6/0x33c0 [ 150.051049][ T3677] ? __kasan_poison_slab+0x70/0x70 [ 150.056173][ T3677] ? __kasan_check_write+0x14/0x20 [ 150.061296][ T3677] ? tun_do_read+0x1c40/0x1c40 [ 150.066083][ T3677] ? kstrtouint_from_user+0x1a0/0x200 [ 150.071464][ T3677] ? kstrtol_from_user+0x260/0x260 [ 150.076583][ T3677] ? putname+0x111/0x160 [ 150.080846][ T3677] ? avc_policy_seqno+0x1b/0x70 [ 150.085709][ T3677] ? selinux_file_permission+0x2aa/0x510 [ 150.091352][ T3677] tun_chr_write_iter+0x1eb/0x2e0 [ 150.096397][ T3677] vfs_write+0x802/0xf70 [ 150.100649][ T3677] ? file_end_write+0x1b0/0x1b0 [ 150.105508][ T3677] ? __fget_files+0x2c4/0x320 [ 150.110202][ T3677] ? __fdget_pos+0x1f7/0x380 [ 150.114804][ T3677] ? ksys_write+0x71/0x240 [ 150.119228][ T3677] ksys_write+0x140/0x240 [ 150.123567][ T3677] ? __ia32_sys_read+0x90/0x90 [ 150.128347][ T3677] ? debug_smp_processor_id+0x17/0x20 [ 150.133737][ T3677] __x64_sys_write+0x7b/0x90 [ 150.138344][ T3677] x64_sys_call+0x8ef/0x9a0 [ 150.142856][ T3677] do_syscall_64+0x4c/0xa0 [ 150.147280][ T3677] ? clear_bhb_loop+0x50/0xa0 [ 150.151974][ T3677] ? clear_bhb_loop+0x50/0xa0 [ 150.156752][ T3677] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 150.162654][ T3677] RIP: 0033:0x7f59704aebe9 [ 150.167168][ T3677] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 150.186885][ T3677] RSP: 002b:00007f596eef6038 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 150.195326][ T3677] RAX: ffffffffffffffda RBX: 00007f59706d6090 RCX: 00007f59704aebe9 [ 150.203395][ T3677] RDX: 000000000000fdef RSI: 0000200000000280 RDI: 00000000000000c8 [ 150.211560][ T3677] RBP: 00007f596eef6090 R08: 0000000000000000 R09: 0000000000000000 [ 150.219557][ T3677] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 150.227923][ T3677] R13: 00007f59706d6128 R14: 00007f59706d6090 R15: 00007ffe2f786058 [ 150.235920][ T3677] [ 150.443052][ T3685] ÿÿÿÿÿÿþ€: renamed from vlan1 [ 150.818931][ T3700] device syzkaller0 entered promiscuous mode [ 152.482147][ T3767] device sit0 entered promiscuous mode [ 152.610955][ T3769] bridge0: port 2(bridge_slave_1) entered disabled state [ 152.619457][ T3769] bridge0: port 1(bridge_slave_0) entered disabled state [ 153.910478][ T3814] device pim6reg1 entered promiscuous mode [ 154.741653][ T3854] FAULT_INJECTION: forcing a failure. [ 154.741653][ T3854] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 154.755657][ T3854] CPU: 1 PID: 3854 Comm: syz.3.1303 Not tainted 5.15.189-syzkaller-android13-5.15.189_r00 #0 [ 154.765826][ T3854] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 154.775993][ T3854] Call Trace: [ 154.779276][ T3854] [ 154.782211][ T3854] __dump_stack+0x21/0x30 [ 154.786641][ T3854] dump_stack_lvl+0xee/0x150 [ 154.791236][ T3854] ? show_regs_print_info+0x20/0x20 [ 154.796443][ T3854] ? sysvec_apic_timer_interrupt+0x64/0xc0 [ 154.802262][ T3854] dump_stack+0x15/0x20 [ 154.806594][ T3854] should_fail+0x3c1/0x510 [ 154.811031][ T3854] should_fail_alloc_page+0x55/0x80 [ 154.816238][ T3854] prepare_alloc_pages+0x156/0x600 [ 154.821371][ T3854] ? __alloc_pages_bulk+0xab0/0xab0 [ 154.826579][ T3854] ? __schedule+0xb76/0x14c0 [ 154.831331][ T3854] __alloc_pages+0x10a/0x440 [ 154.835942][ T3854] ? prep_new_page+0x110/0x110 [ 154.840732][ T3854] ? preempt_schedule+0xa7/0xb0 [ 154.845608][ T3854] ? schedule_preempt_disabled+0x20/0x20 [ 154.851341][ T3854] pcpu_populate_chunk+0x184/0xcb0 [ 154.856461][ T3854] ? _find_next_bit+0x1b5/0x200 [ 154.861325][ T3854] pcpu_alloc+0xc4d/0x1660 [ 154.865755][ T3854] __alloc_percpu_gfp+0x25/0x30 [ 154.870621][ T3854] bpf_map_alloc_percpu+0xc5/0x150 [ 154.875741][ T3854] htab_map_alloc+0xc1b/0x14f0 [ 154.880517][ T3854] map_create+0x455/0x21b0 [ 154.884944][ T3854] __sys_bpf+0x2cf/0x730 [ 154.889372][ T3854] ? bpf_link_show_fdinfo+0x310/0x310 [ 154.894752][ T3854] ? debug_smp_processor_id+0x17/0x20 [ 154.900243][ T3854] __x64_sys_bpf+0x7c/0x90 [ 154.904760][ T3854] x64_sys_call+0x4b9/0x9a0 [ 154.909269][ T3854] do_syscall_64+0x4c/0xa0 [ 154.913691][ T3854] ? clear_bhb_loop+0x50/0xa0 [ 154.918372][ T3854] ? clear_bhb_loop+0x50/0xa0 [ 154.923056][ T3854] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 154.928963][ T3854] RIP: 0033:0x7f26618d9be9 [ 154.933384][ T3854] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 154.953330][ T3854] RSP: 002b:00007f2660342038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 154.961760][ T3854] RAX: ffffffffffffffda RBX: 00007f2661b00fa0 RCX: 00007f26618d9be9 [ 154.969742][ T3854] RDX: 0000000000000050 RSI: 0000200000000840 RDI: 0000000000000000 [ 154.977821][ T3854] RBP: 00007f2660342090 R08: 0000000000000000 R09: 0000000000000000 [ 154.985798][ T3854] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 154.993783][ T3854] R13: 00007f2661b01038 R14: 00007f2661b00fa0 R15: 00007ffc95147e98 [ 155.001773][ T3854] [ 155.756304][ T3883] device veth0_vlan left promiscuous mode [ 155.781052][ T3883] device veth0_vlan entered promiscuous mode [ 155.820149][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 155.829208][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 155.861088][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 156.204610][ T3905] FAULT_INJECTION: forcing a failure. [ 156.204610][ T3905] name failslab, interval 1, probability 0, space 0, times 0 [ 156.287256][ T3905] CPU: 1 PID: 3905 Comm: syz.3.1326 Not tainted 5.15.189-syzkaller-android13-5.15.189_r00 #0 [ 156.297536][ T3905] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 156.307600][ T3905] Call Trace: [ 156.310886][ T3905] [ 156.313830][ T3905] __dump_stack+0x21/0x30 [ 156.318171][ T3905] dump_stack_lvl+0xee/0x150 [ 156.322775][ T3905] ? show_regs_print_info+0x20/0x20 [ 156.327986][ T3905] dump_stack+0x15/0x20 [ 156.332152][ T3905] should_fail+0x3c1/0x510 [ 156.336592][ T3905] __should_failslab+0xa4/0xe0 [ 156.341368][ T3905] should_failslab+0x9/0x20 [ 156.345882][ T3905] slab_pre_alloc_hook+0x3b/0xe0 [ 156.350838][ T3905] kmem_cache_alloc_trace+0x48/0x270 [ 156.356136][ T3905] ? __hw_addr_add_ex+0x205/0x800 [ 156.361173][ T3905] __hw_addr_add_ex+0x205/0x800 [ 156.366037][ T3905] dev_addr_init+0x138/0x210 [ 156.370731][ T3905] ? dev_addr_flush+0x230/0x230 [ 156.375624][ T3905] ? cap_capable+0x1aa/0x230 [ 156.380275][ T3905] alloc_netdev_mqs+0x11a/0xc90 [ 156.385147][ T3905] ? tun_not_capable+0x1f0/0x1f0 [ 156.390193][ T3905] tun_set_iff+0x535/0xe00 [ 156.394722][ T3905] __tun_chr_ioctl+0x7e8/0x1eb0 [ 156.399591][ T3905] ? tun_flow_create+0x320/0x320 [ 156.404547][ T3905] ? __fget_files+0x2c4/0x320 [ 156.409246][ T3905] tun_chr_ioctl+0x2a/0x40 [ 156.413686][ T3905] ? tun_chr_poll+0x720/0x720 [ 156.418374][ T3905] __se_sys_ioctl+0x121/0x1a0 [ 156.423167][ T3905] __x64_sys_ioctl+0x7b/0x90 [ 156.427786][ T3905] x64_sys_call+0x2f/0x9a0 [ 156.432221][ T3905] do_syscall_64+0x4c/0xa0 [ 156.436661][ T3905] ? clear_bhb_loop+0x50/0xa0 [ 156.441445][ T3905] ? clear_bhb_loop+0x50/0xa0 [ 156.446135][ T3905] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 156.452042][ T3905] RIP: 0033:0x7f26618d9be9 [ 156.456463][ T3905] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 156.476451][ T3905] RSP: 002b:00007f2660342038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 156.485210][ T3905] RAX: ffffffffffffffda RBX: 00007f2661b00fa0 RCX: 00007f26618d9be9 [ 156.493847][ T3905] RDX: 0000200000000040 RSI: 00000000400454ca RDI: 0000000000000003 [ 156.501974][ T3905] RBP: 00007f2660342090 R08: 0000000000000000 R09: 0000000000000000 [ 156.509957][ T3905] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 156.517932][ T3905] R13: 00007f2661b01038 R14: 00007f2661b00fa0 R15: 00007ffc95147e98 [ 156.526006][ T3905] [ 157.440429][ T3949] device wg2 entered promiscuous mode [ 157.611942][ T3959] device veth0_vlan left promiscuous mode [ 157.653881][ T3959] device veth0_vlan entered promiscuous mode [ 157.729418][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 157.745475][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 157.790290][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 159.763245][ T4030] device syzkaller0 entered promiscuous mode [ 160.518165][ T4051] device pim6reg1 entered promiscuous mode [ 167.744865][ T4129] device syzkaller0 entered promiscuous mode [ 167.794281][ T4134] FAULT_INJECTION: forcing a failure. [ 167.794281][ T4134] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 167.817474][ T4134] CPU: 0 PID: 4134 Comm: syz.2.1413 Not tainted 5.15.189-syzkaller-android13-5.15.189_r00 #0 [ 167.827699][ T4134] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 167.837761][ T4134] Call Trace: [ 167.841046][ T4134] [ 167.843991][ T4134] __dump_stack+0x21/0x30 [ 167.848332][ T4134] dump_stack_lvl+0xee/0x150 [ 167.852927][ T4134] ? show_regs_print_info+0x20/0x20 [ 167.858129][ T4134] ? __alloc_pages+0x18f/0x440 [ 167.862914][ T4134] dump_stack+0x15/0x20 [ 167.867073][ T4134] should_fail+0x3c1/0x510 [ 167.871510][ T4134] should_fail_usercopy+0x1a/0x20 [ 167.876537][ T4134] copy_page_from_iter+0x2f6/0x680 [ 167.881657][ T4134] tun_get_user+0x813/0x33c0 [ 167.886259][ T4134] ? __kasan_poison_slab+0x70/0x70 [ 167.891384][ T4134] ? tun_do_read+0x1c40/0x1c40 [ 167.896151][ T4134] ? kstrtouint_from_user+0x1a0/0x200 [ 167.901529][ T4134] ? kstrtol_from_user+0x260/0x260 [ 167.906645][ T4134] ? putname+0x111/0x160 [ 167.910893][ T4134] ? avc_policy_seqno+0x1b/0x70 [ 167.915837][ T4134] ? selinux_file_permission+0x2aa/0x510 [ 167.921488][ T4134] tun_chr_write_iter+0x1eb/0x2e0 [ 167.926526][ T4134] vfs_write+0x802/0xf70 [ 167.930770][ T4134] ? file_end_write+0x1b0/0x1b0 [ 167.935616][ T4134] ? __fget_files+0x2c4/0x320 [ 167.940291][ T4134] ? __fdget_pos+0x1f7/0x380 [ 167.944876][ T4134] ? ksys_write+0x71/0x240 [ 167.949286][ T4134] ksys_write+0x140/0x240 [ 167.953612][ T4134] ? __ia32_sys_read+0x90/0x90 [ 167.958370][ T4134] ? __bpf_trace_sys_enter+0x62/0x70 [ 167.963652][ T4134] __x64_sys_write+0x7b/0x90 [ 167.968342][ T4134] x64_sys_call+0x8ef/0x9a0 [ 167.972849][ T4134] do_syscall_64+0x4c/0xa0 [ 167.977259][ T4134] ? clear_bhb_loop+0x50/0xa0 [ 167.981932][ T4134] ? clear_bhb_loop+0x50/0xa0 [ 167.986605][ T4134] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 167.992493][ T4134] RIP: 0033:0x7fd58126fbe9 [ 167.996907][ T4134] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 168.016593][ T4134] RSP: 002b:00007fd57fcd8038 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 168.025002][ T4134] RAX: ffffffffffffffda RBX: 00007fd581496fa0 RCX: 00007fd58126fbe9 [ 168.032966][ T4134] RDX: 0000000000000015 RSI: 0000200000000000 RDI: 00000000000000c8 [ 168.040927][ T4134] RBP: 00007fd57fcd8090 R08: 0000000000000000 R09: 0000000000000000 [ 168.048891][ T4134] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 168.056854][ T4134] R13: 00007fd581497038 R14: 00007fd581496fa0 R15: 00007ffc249d26f8 [ 168.064921][ T4134] [ 168.762969][ T4174] device sit0 entered promiscuous mode [ 169.178074][ T4194] device sit0 entered promiscuous mode [ 169.451783][ T4205] device sit0 left promiscuous mode [ 169.667033][ T4218] FAULT_INJECTION: forcing a failure. [ 169.667033][ T4218] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 169.761253][ T4218] CPU: 0 PID: 4218 Comm: syz.4.1445 Not tainted 5.15.189-syzkaller-android13-5.15.189_r00 #0 [ 169.771465][ T4218] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 169.781537][ T4218] Call Trace: [ 169.784825][ T4218] [ 169.787758][ T4218] __dump_stack+0x21/0x30 [ 169.792090][ T4218] dump_stack_lvl+0xee/0x150 [ 169.796682][ T4218] ? show_regs_print_info+0x20/0x20 [ 169.801876][ T4218] ? kstrtouint_from_user+0x1a0/0x200 [ 169.807274][ T4218] dump_stack+0x15/0x20 [ 169.811424][ T4218] should_fail+0x3c1/0x510 [ 169.815838][ T4218] should_fail_usercopy+0x1a/0x20 [ 169.820855][ T4218] _copy_from_user+0x20/0xd0 [ 169.825448][ T4218] sock_setsockopt+0x28a/0x2270 [ 169.830294][ T4218] ? proc_fail_nth_read+0x210/0x210 [ 169.835499][ T4218] ? __sock_set_mark+0x160/0x160 [ 169.840455][ T4218] ? selinux_socket_setsockopt+0x21c/0x300 [ 169.846271][ T4218] ? selinux_socket_getsockopt+0x2e0/0x2e0 [ 169.852286][ T4218] ? vfs_write+0xc17/0xf70 [ 169.856711][ T4218] ? __fget_files+0x2c4/0x320 [ 169.861398][ T4218] ? security_socket_setsockopt+0x82/0xa0 [ 169.867128][ T4218] __sys_setsockopt+0x268/0x460 [ 169.872072][ T4218] ? __ia32_sys_recv+0xb0/0xb0 [ 169.876828][ T4218] ? ksys_write+0x1eb/0x240 [ 169.881328][ T4218] ? __ia32_sys_read+0x90/0x90 [ 169.886085][ T4218] ? __bpf_trace_sys_enter+0x62/0x70 [ 169.891363][ T4218] __x64_sys_setsockopt+0xbf/0xd0 [ 169.896384][ T4218] x64_sys_call+0x982/0x9a0 [ 169.900888][ T4218] do_syscall_64+0x4c/0xa0 [ 169.905301][ T4218] ? clear_bhb_loop+0x50/0xa0 [ 169.909977][ T4218] ? clear_bhb_loop+0x50/0xa0 [ 169.914651][ T4218] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 169.920540][ T4218] RIP: 0033:0x7fc93ee10be9 [ 169.924952][ T4218] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 169.944639][ T4218] RSP: 002b:00007fc93d879038 EFLAGS: 00000246 ORIG_RAX: 0000000000000036 [ 169.953077][ T4218] RAX: ffffffffffffffda RBX: 00007fc93f037fa0 RCX: 00007fc93ee10be9 [ 169.961062][ T4218] RDX: 0000000000000032 RSI: 0000000000000001 RDI: 0000000000000007 [ 169.969029][ T4218] RBP: 00007fc93d879090 R08: 0000000000000004 R09: 0000000000000000 [ 169.976992][ T4218] R10: 00002000000000c0 R11: 0000000000000246 R12: 0000000000000001 [ 169.984958][ T4218] R13: 00007fc93f038038 R14: 00007fc93f037fa0 R15: 00007ffc89e2a018 [ 169.992932][ T4218] [ 171.989550][ T4286] device syzkaller0 entered promiscuous mode [ 172.958229][ T30] audit: type=1400 audit(1756440355.525:135): avc: denied { create } for pid=4313 comm="syz.0.1480" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=appletalk_socket permissive=1 [ 174.033101][ T4352] FAULT_INJECTION: forcing a failure. [ 174.033101][ T4352] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 174.145303][ T4352] CPU: 1 PID: 4352 Comm: syz.1.1494 Not tainted 5.15.189-syzkaller-android13-5.15.189_r00 #0 [ 174.155533][ T4352] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 174.165609][ T4352] Call Trace: [ 174.168907][ T4352] [ 174.171859][ T4352] __dump_stack+0x21/0x30 [ 174.176225][ T4352] dump_stack_lvl+0xee/0x150 [ 174.180838][ T4352] ? show_regs_print_info+0x20/0x20 [ 174.186087][ T4352] dump_stack+0x15/0x20 [ 174.190483][ T4352] should_fail+0x3c1/0x510 [ 174.194926][ T4352] should_fail_alloc_page+0x55/0x80 [ 174.200147][ T4352] prepare_alloc_pages+0x156/0x600 [ 174.205287][ T4352] ? __alloc_pages_bulk+0xab0/0xab0 [ 174.210517][ T4352] ? flush_tlb_one_user+0x50/0x50 [ 174.215559][ T4352] ? cgroup_rstat_updated+0xf5/0x370 [ 174.221007][ T4352] __alloc_pages+0x10a/0x440 [ 174.225612][ T4352] ? prep_new_page+0x110/0x110 [ 174.230515][ T4352] wp_page_copy+0x1c9/0x18f0 [ 174.235138][ T4352] ? insert_page_into_pte_locked+0x310/0x310 [ 174.241135][ T4352] ? _raw_spin_lock+0x8e/0xe0 [ 174.245928][ T4352] ? _raw_spin_trylock_bh+0x130/0x130 [ 174.251305][ T4352] ? vm_normal_page+0x1dd/0x1f0 [ 174.256253][ T4352] do_wp_page+0x731/0xc90 [ 174.260590][ T4352] handle_pte_fault+0x73c/0x2680 [ 174.265533][ T4352] ? 0xffffffffa0026eec [ 174.269682][ T4352] ? is_bpf_text_address+0x177/0x190 [ 174.274966][ T4352] ? fault_around_bytes_set+0xc0/0xc0 [ 174.280337][ T4352] do_handle_mm_fault+0x1a6d/0x1d50 [ 174.285640][ T4352] ? numa_migrate_prep+0xd0/0xd0 [ 174.290662][ T4352] ? __find_vma+0x30/0x150 [ 174.295074][ T4352] do_user_addr_fault+0x841/0x1180 [ 174.300188][ T4352] ? do_kern_addr_fault+0x80/0x80 [ 174.305212][ T4352] ? new_inode_pseudo+0x91/0x210 [ 174.310230][ T4352] ? new_inode+0x28/0x1e0 [ 174.314554][ T4352] ? proc_pid_make_inode+0x27/0x1d0 [ 174.319763][ T4352] ? proc_pident_instantiate+0x69/0x2b0 [ 174.325305][ T4352] ? proc_pident_lookup+0x1c0/0x270 [ 174.330499][ T4352] ? proc_tid_base_lookup+0x2b/0x30 [ 174.335873][ T4352] ? path_openat+0xfcf/0x2f10 [ 174.340740][ T4352] ? do_filp_open+0x1b3/0x3e0 [ 174.345423][ T4352] ? do_sys_openat2+0x14c/0x7b0 [ 174.350285][ T4352] ? __x64_sys_openat+0x136/0x160 [ 174.355304][ T4352] ? x64_sys_call+0x219/0x9a0 [ 174.359987][ T4352] ? entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 174.366063][ T4352] exc_page_fault+0x51/0xb0 [ 174.370682][ T4352] asm_exc_page_fault+0x27/0x30 [ 174.375532][ T4352] RIP: 0010:copy_user_enhanced_fast_string+0xe/0x40 [ 174.382128][ T4352] Code: 89 d1 c1 e9 03 83 e2 07 f3 48 a5 89 d1 f3 a4 31 c0 0f 01 ca c3 90 90 90 90 90 90 90 0f 01 cb 83 fa 40 0f 82 70 ff ff ff 89 d1 a4 31 c0 0f 01 ca c3 90 90 90 90 90 90 90 90 90 90 89 d1 83 f8 [ 174.401747][ T4352] RSP: 0018:ffffc900010af678 EFLAGS: 00050206 [ 174.407826][ T4352] RAX: ffffffff8249ea01 RBX: ffff88811b0200c8 RCX: 000000000000e50f [ 174.415881][ T4352] RDX: 000000000000ff0f RSI: ffff88811b021ac8 RDI: 0000200000002000 [ 174.423848][ T4352] RBP: ffffc900010af7c8 R08: dffffc0000000000 R09: ffffed1023605ffb [ 174.431904][ T4352] R10: 0000000000000000 R11: 0000000000001fd8 R12: 000020000001050f [ 174.440060][ T4352] R13: 000000000000ff0f R14: 0000200000000600 R15: 0000000000000000 [ 174.448075][ T4352] ? _copy_to_iter+0x1b1/0x1070 [ 174.452940][ T4352] ? _copy_to_iter+0x296/0x1070 [ 174.457787][ T4352] ? memcpy+0x56/0x70 [ 174.461779][ T4352] ? avc_has_perm_noaudit+0x2f4/0x460 [ 174.467178][ T4352] ? iov_iter_init+0x180/0x180 [ 174.472045][ T4352] ? __kasan_check_write+0x14/0x20 [ 174.477162][ T4352] ? _raw_spin_lock_bh+0x8e/0xe0 [ 174.482124][ T4352] ? check_stack_object+0x81/0x140 [ 174.487252][ T4352] ? __check_object_size+0x2f4/0x3c0 [ 174.492543][ T4352] simple_copy_to_iter+0x50/0x70 [ 174.497506][ T4352] __skb_datagram_iter+0xe0/0x710 [ 174.502545][ T4352] ? tsk_importance+0x150/0x150 [ 174.507397][ T4352] ? skb_copy_datagram_iter+0x150/0x150 [ 174.512946][ T4352] skb_copy_datagram_iter+0x40/0x150 [ 174.518237][ T4352] tipc_recvmsg+0x79b/0x13a0 [ 174.522855][ T4352] ? tipc_send_packet+0xa0/0xa0 [ 174.527816][ T4352] ? kvfree_call_rcu+0x57a/0x7e0 [ 174.532847][ T4352] ? security_socket_recvmsg+0x87/0xb0 [ 174.538306][ T4352] ? tipc_send_packet+0xa0/0xa0 [ 174.543159][ T4352] ____sys_recvmsg+0x291/0x580 [ 174.547923][ T4352] ? __sys_recvmsg_sock+0x50/0x50 [ 174.552950][ T4352] ? memset+0x35/0x40 [ 174.556929][ T4352] ? import_iovec+0x7c/0xb0 [ 174.561426][ T4352] ___sys_recvmsg+0x1af/0x4f0 [ 174.566096][ T4352] ? __sys_recvmsg+0x250/0x250 [ 174.570862][ T4352] ? vfs_write+0xc17/0xf70 [ 174.575278][ T4352] ? __fdget+0x1a1/0x230 [ 174.579621][ T4352] __x64_sys_recvmsg+0x1df/0x2a0 [ 174.584650][ T4352] ? ___sys_recvmsg+0x4f0/0x4f0 [ 174.589496][ T4352] ? ksys_write+0x1eb/0x240 [ 174.593992][ T4352] ? fpregs_assert_state_consistent+0xb1/0xe0 [ 174.600058][ T4352] x64_sys_call+0x705/0x9a0 [ 174.604584][ T4352] do_syscall_64+0x4c/0xa0 [ 174.609095][ T4352] ? clear_bhb_loop+0x50/0xa0 [ 174.613795][ T4352] ? clear_bhb_loop+0x50/0xa0 [ 174.618484][ T4352] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 174.624479][ T4352] RIP: 0033:0x7fb072a8fbe9 [ 174.628894][ T4352] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 174.648581][ T4352] RSP: 002b:00007fb0714f8038 EFLAGS: 00000246 ORIG_RAX: 000000000000002f [ 174.656998][ T4352] RAX: ffffffffffffffda RBX: 00007fb072cb6fa0 RCX: 00007fb072a8fbe9 [ 174.664965][ T4352] RDX: 0000000000000000 RSI: 0000200000000900 RDI: 0000000000000006 [ 174.672932][ T4352] RBP: 00007fb0714f8090 R08: 0000000000000000 R09: 0000000000000000 [ 174.680981][ T4352] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 174.688951][ T4352] R13: 00007fb072cb7038 R14: 00007fb072cb6fa0 R15: 00007ffd9cbe7b68 [ 174.696921][ T4352] [ 177.286693][ T4435] FAULT_INJECTION: forcing a failure. [ 177.286693][ T4435] name failslab, interval 1, probability 0, space 0, times 0 [ 177.302348][ T4435] CPU: 1 PID: 4435 Comm: syz.3.1525 Not tainted 5.15.189-syzkaller-android13-5.15.189_r00 #0 [ 177.312540][ T4435] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 177.322618][ T4435] Call Trace: [ 177.325904][ T4435] [ 177.328840][ T4435] __dump_stack+0x21/0x30 [ 177.333181][ T4435] dump_stack_lvl+0xee/0x150 [ 177.337776][ T4435] ? show_regs_print_info+0x20/0x20 [ 177.343068][ T4435] dump_stack+0x15/0x20 [ 177.347231][ T4435] should_fail+0x3c1/0x510 [ 177.351664][ T4435] __should_failslab+0xa4/0xe0 [ 177.356447][ T4435] should_failslab+0x9/0x20 [ 177.360954][ T4435] slab_pre_alloc_hook+0x3b/0xe0 [ 177.365901][ T4435] ? __alloc_skb+0xe0/0x740 [ 177.370408][ T4435] kmem_cache_alloc+0x44/0x260 [ 177.375178][ T4435] __alloc_skb+0xe0/0x740 [ 177.379523][ T4435] br_info_notify+0xae/0x170 [ 177.384158][ T4435] br_ifinfo_notify+0x2a/0x40 [ 177.388842][ T4435] br_device_event+0x6af/0x790 [ 177.393616][ T4435] ? br_boolopt_multi_get+0xf0/0xf0 [ 177.399186][ T4435] ? packet_notifier+0x8bc/0x8d0 [ 177.404152][ T4435] ? addrconf_notify+0x37b/0xde0 [ 177.409099][ T4435] raw_notifier_call_chain+0x90/0x100 [ 177.414492][ T4435] dev_set_mac_address+0x318/0x420 [ 177.419613][ T4435] ? dev_pre_changeaddr_notify+0x1c0/0x1c0 [ 177.425562][ T4435] dev_set_mac_address_user+0x31/0x50 [ 177.430962][ T4435] dev_ifsioc+0x757/0xe70 [ 177.435305][ T4435] ? dev_ioctl+0xd10/0xd10 [ 177.439735][ T4435] ? __mutex_lock_slowpath+0xe/0x10 [ 177.444939][ T4435] ? mutex_lock+0x100/0x1a0 [ 177.449449][ T4435] ? wait_for_completion_killable_timeout+0x10/0x10 [ 177.456051][ T4435] ? dev_get_by_name_rcu+0xc8/0xf0 [ 177.461185][ T4435] dev_ioctl+0x560/0xd10 [ 177.465445][ T4435] sock_do_ioctl+0x22e/0x300 [ 177.470042][ T4435] ? sock_show_fdinfo+0xa0/0xa0 [ 177.474907][ T4435] ? selinux_file_ioctl+0x377/0x480 [ 177.480116][ T4435] sock_ioctl+0x4bc/0x6b0 [ 177.484457][ T4435] ? sock_poll+0x3d0/0x3d0 [ 177.488971][ T4435] ? __fget_files+0x2c4/0x320 [ 177.493654][ T4435] ? security_file_ioctl+0x84/0xa0 [ 177.498777][ T4435] ? sock_poll+0x3d0/0x3d0 [ 177.503197][ T4435] __se_sys_ioctl+0x121/0x1a0 [ 177.507901][ T4435] __x64_sys_ioctl+0x7b/0x90 [ 177.512582][ T4435] x64_sys_call+0x2f/0x9a0 [ 177.517092][ T4435] do_syscall_64+0x4c/0xa0 [ 177.521606][ T4435] ? clear_bhb_loop+0x50/0xa0 [ 177.526290][ T4435] ? clear_bhb_loop+0x50/0xa0 [ 177.530976][ T4435] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 177.536871][ T4435] RIP: 0033:0x7f26618d9be9 [ 177.541297][ T4435] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 177.561004][ T4435] RSP: 002b:00007f2660342038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 177.569515][ T4435] RAX: ffffffffffffffda RBX: 00007f2661b00fa0 RCX: 00007f26618d9be9 [ 177.577587][ T4435] RDX: 0000200000000000 RSI: 0000000000008924 RDI: 0000000000000007 [ 177.585570][ T4435] RBP: 00007f2660342090 R08: 0000000000000000 R09: 0000000000000000 [ 177.593551][ T4435] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 177.601522][ T4435] R13: 00007f2661b01038 R14: 00007f2661b00fa0 R15: 00007ffc95147e98 [ 177.609505][ T4435] [ 178.647189][ T4462] device sit0 entered promiscuous mode [ 178.927180][ T4466] device veth0_vlan left promiscuous mode [ 178.936447][ T4466] device veth0_vlan entered promiscuous mode [ 178.962308][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 178.975337][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 178.986013][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿþ€: link becomes ready [ 182.975911][ T4549] device wg2 left promiscuous mode [ 183.049323][ T4557] device sit0 left promiscuous mode [ 183.114164][ T4557] device sit0 entered promiscuous mode [ 183.251325][ T4561] device sit0 entered promiscuous mode [ 184.130358][ T4606] device sit0 left promiscuous mode [ 184.203001][ T4608] device sit0 entered promiscuous mode [ 185.383735][ T4634] device syzkaller0 entered promiscuous mode [ 186.087278][ T4653] device sit0 entered promiscuous mode [ 186.314752][ T4665] FAULT_INJECTION: forcing a failure. [ 186.314752][ T4665] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 186.383695][ T4665] CPU: 0 PID: 4665 Comm: syz.2.1611 Not tainted 5.15.189-syzkaller-android13-5.15.189_r00 #0 [ 186.394068][ T4665] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 186.404318][ T4665] Call Trace: [ 186.407619][ T4665] [ 186.410558][ T4665] __dump_stack+0x21/0x30 [ 186.414912][ T4665] dump_stack_lvl+0xee/0x150 [ 186.419518][ T4665] ? show_regs_print_info+0x20/0x20 [ 186.424728][ T4665] ? gfp_zone+0x41/0x100 [ 186.428980][ T4665] dump_stack+0x15/0x20 [ 186.433146][ T4665] should_fail+0x3c1/0x510 [ 186.437570][ T4665] should_fail_alloc_page+0x55/0x80 [ 186.442784][ T4665] prepare_alloc_pages+0x156/0x600 [ 186.447912][ T4665] ? __alloc_pages_bulk+0xab0/0xab0 [ 186.453122][ T4665] ? memset_erms+0xb/0x10 [ 186.457466][ T4665] __alloc_pages+0x10a/0x440 [ 186.462070][ T4665] ? irqentry_exit+0x37/0x40 [ 186.466765][ T4665] ? prep_new_page+0x110/0x110 [ 186.471542][ T4665] ? __alloc_pages_bulk+0x1/0xab0 [ 186.476590][ T4665] __vmalloc_node_range+0x505/0xaf0 [ 186.481833][ T4665] bpf_map_area_alloc+0xd5/0xe0 [ 186.486711][ T4665] ? array_map_alloc+0x27c/0x6d0 [ 186.491661][ T4665] array_map_alloc+0x27c/0x6d0 [ 186.496420][ T4665] ? bpf_map_meta_alloc+0x161/0x8c0 [ 186.501617][ T4665] array_of_map_alloc+0x55/0xc0 [ 186.506461][ T4665] map_create+0x455/0x21b0 [ 186.510885][ T4665] __sys_bpf+0x2cf/0x730 [ 186.515119][ T4665] ? bpf_link_show_fdinfo+0x310/0x310 [ 186.520492][ T4665] ? debug_smp_processor_id+0x17/0x20 [ 186.525864][ T4665] __x64_sys_bpf+0x7c/0x90 [ 186.530273][ T4665] x64_sys_call+0x4b9/0x9a0 [ 186.534858][ T4665] do_syscall_64+0x4c/0xa0 [ 186.539287][ T4665] ? clear_bhb_loop+0x50/0xa0 [ 186.544236][ T4665] ? clear_bhb_loop+0x50/0xa0 [ 186.548915][ T4665] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 186.554806][ T4665] RIP: 0033:0x7fd58126fbe9 [ 186.559257][ T4665] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 186.578865][ T4665] RSP: 002b:00007fd57fcd8038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 186.587290][ T4665] RAX: ffffffffffffffda RBX: 00007fd581496fa0 RCX: 00007fd58126fbe9 [ 186.595267][ T4665] RDX: 0000000000000050 RSI: 0000200000000540 RDI: 0000000000000000 [ 186.603320][ T4665] RBP: 00007fd57fcd8090 R08: 0000000000000000 R09: 0000000000000000 [ 186.611282][ T4665] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 186.619256][ T4665] R13: 00007fd581497038 R14: 00007fd581496fa0 R15: 00007ffc249d26f8 [ 186.627232][ T4665] [ 186.736310][ T4667] device sit0 left promiscuous mode [ 186.836823][ T4675] device sit0 entered promiscuous mode [ 186.893688][ T4673] device sit0 left promiscuous mode [ 186.970114][ T4673] device sit0 entered promiscuous mode [ 187.191197][ T4700] FAULT_INJECTION: forcing a failure. [ 187.191197][ T4700] name failslab, interval 1, probability 0, space 0, times 0 [ 187.203990][ T4700] CPU: 0 PID: 4700 Comm: syz.1.1622 Not tainted 5.15.189-syzkaller-android13-5.15.189_r00 #0 [ 187.214163][ T4700] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 187.224667][ T4700] Call Trace: [ 187.227958][ T4700] [ 187.230896][ T4700] __dump_stack+0x21/0x30 [ 187.235414][ T4700] dump_stack_lvl+0xee/0x150 [ 187.240013][ T4700] ? show_regs_print_info+0x20/0x20 [ 187.245223][ T4700] dump_stack+0x15/0x20 [ 187.249398][ T4700] should_fail+0x3c1/0x510 [ 187.253833][ T4700] ? skb_copy+0x13e/0x720 [ 187.258173][ T4700] __should_failslab+0xa4/0xe0 [ 187.262945][ T4700] should_failslab+0x9/0x20 [ 187.267456][ T4700] slab_pre_alloc_hook+0x3b/0xe0 [ 187.272399][ T4700] ? skb_copy+0x13e/0x720 [ 187.276753][ T4700] ? skb_copy+0x13e/0x720 [ 187.281089][ T4700] __kmalloc_track_caller+0x6c/0x2c0 [ 187.286387][ T4700] ? skb_copy+0x13e/0x720 [ 187.290732][ T4700] ? skb_copy+0x13e/0x720 [ 187.295069][ T4700] __alloc_skb+0x21a/0x740 [ 187.299497][ T4700] skb_copy+0x13e/0x720 [ 187.303838][ T4700] ? __kasan_kmalloc+0xec/0x110 [ 187.308698][ T4700] ? __kasan_kmalloc+0xda/0x110 [ 187.313556][ T4700] ? memcpy+0x56/0x70 [ 187.317546][ T4700] tipc_buf_append+0x6dd/0x900 [ 187.322321][ T4700] ? tipc_msg_create+0x4e0/0x4e0 [ 187.327280][ T4700] ? skb_clone+0x202/0x360 [ 187.331714][ T4700] tipc_msg_reassemble+0x282/0x440 [ 187.336846][ T4700] tipc_mcast_xmit+0x1c6/0x1710 [ 187.341710][ T4700] ? kasan_unpoison+0x67/0x90 [ 187.346397][ T4700] ? tipc_bcbase_xmit+0x9d0/0x9d0 [ 187.351444][ T4700] ? check_stack_object+0x81/0x140 [ 187.356571][ T4700] ? __check_object_size+0x2f4/0x3c0 [ 187.361866][ T4700] ? tipc_msg_build+0xba1/0xfb0 [ 187.366736][ T4700] __tipc_sendmsg+0x1d81/0x2680 [ 187.371601][ T4700] ? _raw_spin_lock+0xe0/0xe0 [ 187.376298][ T4700] ? local_bh_enable+0x30/0x30 [ 187.381084][ T4700] ? wait_woken+0x170/0x170 [ 187.385600][ T4700] ? avc_has_perm+0x158/0x240 [ 187.390376][ T4700] ? __kasan_check_write+0x14/0x20 [ 187.395503][ T4700] ? _raw_spin_lock_bh+0x8e/0xe0 [ 187.400453][ T4700] ? _raw_spin_lock_irq+0xe0/0xe0 [ 187.405495][ T4700] ? unwind_get_return_address+0x4d/0x90 [ 187.411163][ T4700] ? stack_trace_save+0xe0/0xe0 [ 187.416041][ T4700] ? __local_bh_enable_ip+0x58/0x80 [ 187.421261][ T4700] ? lock_sock_nested+0x1f1/0x290 [ 187.426502][ T4700] ? sock_init_data+0xc0/0xc0 [ 187.431194][ T4700] ? stack_trace_save+0x98/0xe0 [ 187.436236][ T4700] tipc_sendmsg+0x55/0x70 [ 187.440583][ T4700] ? tipc_recvmsg+0x13a0/0x13a0 [ 187.445444][ T4700] ____sys_sendmsg+0x5a2/0x8c0 [ 187.450226][ T4700] ? __sys_sendmsg_sock+0x40/0x40 [ 187.455267][ T4700] ? import_iovec+0x7c/0xb0 [ 187.459804][ T4700] ___sys_sendmsg+0x1f0/0x260 [ 187.464510][ T4700] ? __sys_sendmsg+0x250/0x250 [ 187.469316][ T4700] ? __fdget+0x1a1/0x230 [ 187.473591][ T4700] __x64_sys_sendmsg+0x1e2/0x2a0 [ 187.478552][ T4700] ? ___sys_sendmsg+0x260/0x260 [ 187.483431][ T4700] ? ksys_write+0x1eb/0x240 [ 187.487961][ T4700] ? fpregs_assert_state_consistent+0xb1/0xe0 [ 187.494040][ T4700] x64_sys_call+0x4b/0x9a0 [ 187.498528][ T4700] do_syscall_64+0x4c/0xa0 [ 187.502923][ T4700] ? clear_bhb_loop+0x50/0xa0 [ 187.507593][ T4700] ? clear_bhb_loop+0x50/0xa0 [ 187.512246][ T4700] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 187.518118][ T4700] RIP: 0033:0x7fb072a8fbe9 [ 187.522516][ T4700] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 187.542282][ T4700] RSP: 002b:00007fb0714f8038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 187.550803][ T4700] RAX: ffffffffffffffda RBX: 00007fb072cb6fa0 RCX: 00007fb072a8fbe9 [ 187.558858][ T4700] RDX: 0000000000000000 RSI: 0000200000004440 RDI: 0000000000000007 [ 187.566865][ T4700] RBP: 00007fb0714f8090 R08: 0000000000000000 R09: 0000000000000000 [ 187.574946][ T4700] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 187.583005][ T4700] R13: 00007fb072cb7038 R14: 00007fb072cb6fa0 R15: 00007ffd9cbe7b68 [ 187.590999][ T4700] [ 187.604693][ T4700] tipc: Failed do clone local mcast rcv buffer [ 189.228617][ T4771] device syzkaller0 entered promiscuous mode [ 189.551720][ T30] audit: type=1400 audit(1756440372.115:136): avc: denied { create } for pid=4777 comm="syz.0.1652" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=ax25_socket permissive=1 [ 189.839952][ T4801] device syzkaller0 entered promiscuous mode [ 189.898314][ T4803] FAULT_INJECTION: forcing a failure. [ 189.898314][ T4803] name failslab, interval 1, probability 0, space 0, times 0 [ 189.911100][ T4803] CPU: 0 PID: 4803 Comm: syz.2.1664 Not tainted 5.15.189-syzkaller-android13-5.15.189_r00 #0 [ 189.921478][ T4803] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 189.931551][ T4803] Call Trace: [ 189.934845][ T4803] [ 189.937791][ T4803] __dump_stack+0x21/0x30 [ 189.942160][ T4803] dump_stack_lvl+0xee/0x150 [ 189.946768][ T4803] ? show_regs_print_info+0x20/0x20 [ 189.951985][ T4803] dump_stack+0x15/0x20 [ 189.956151][ T4803] should_fail+0x3c1/0x510 [ 189.960669][ T4803] __should_failslab+0xa4/0xe0 [ 189.965537][ T4803] should_failslab+0x9/0x20 [ 189.970143][ T4803] slab_pre_alloc_hook+0x3b/0xe0 [ 189.975096][ T4803] ? dst_alloc+0x15c/0x1d0 [ 189.979527][ T4803] kmem_cache_alloc+0x44/0x260 [ 189.984307][ T4803] ? ipv6_sysctl_rtcache_flush+0x100/0x100 [ 189.990129][ T4803] dst_alloc+0x15c/0x1d0 [ 189.994389][ T4803] ip6_pol_route+0x960/0x1110 [ 189.999089][ T4803] ? fib6_table_lookup+0x9f0/0x9f0 [ 190.004208][ T4803] ? do_handle_mm_fault+0xf39/0x1d50 [ 190.009507][ T4803] ? prep_new_page+0x3b/0x110 [ 190.014207][ T4803] ip6_pol_route_input+0x56/0x80 [ 190.019156][ T4803] fib6_rule_lookup+0x1c6/0x560 [ 190.023996][ T4803] ? ip6_route_input_lookup+0xd0/0xd0 [ 190.029366][ T4803] ? fib6_lookup+0x2a0/0x2a0 [ 190.034042][ T4803] ? ip6t_do_table+0x12fe/0x14c0 [ 190.039038][ T4803] ip6_route_input+0x591/0x820 [ 190.043834][ T4803] ? ip6_multipath_l3_keys+0x5f0/0x5f0 [ 190.049333][ T4803] ? ip6table_mangle_table_init+0x60/0x60 [ 190.055078][ T4803] ip6_rcv_finish+0x156/0x360 [ 190.059789][ T4803] ipv6_rcv+0xe9/0x210 [ 190.063886][ T4803] ? irqentry_exit+0x37/0x40 [ 190.068507][ T4803] ? ip6_rcv_finish+0x360/0x360 [ 190.073377][ T4803] ? refcount_add+0x80/0x80 [ 190.077876][ T4803] ? _copy_from_iter+0x201/0x1050 [ 190.082879][ T4803] ? ip6_rcv_finish+0x360/0x360 [ 190.087720][ T4803] __netif_receive_skb+0xc8/0x280 [ 190.092772][ T4803] ? _copy_from_iter+0x4ae/0x1050 [ 190.097812][ T4803] ? __kasan_check_write+0x14/0x20 [ 190.103077][ T4803] netif_receive_skb+0x98/0x3d0 [ 190.107966][ T4803] ? netif_receive_skb_core+0x100/0x100 [ 190.113537][ T4803] ? virtio_net_hdr_to_skb+0x9df/0x11c0 [ 190.119106][ T4803] tun_rx_batched+0x5e8/0x710 [ 190.123802][ T4803] ? local_bh_enable+0x30/0x30 [ 190.128589][ T4803] tun_get_user+0x279c/0x33c0 [ 190.133284][ T4803] ? tun_do_read+0x1c40/0x1c40 [ 190.138063][ T4803] ? kstrtouint_from_user+0x1a0/0x200 [ 190.143453][ T4803] ? kstrtol_from_user+0x260/0x260 [ 190.148568][ T4803] ? putname+0x111/0x160 [ 190.152819][ T4803] ? avc_policy_seqno+0x1b/0x70 [ 190.157666][ T4803] ? selinux_file_permission+0x2aa/0x510 [ 190.163308][ T4803] tun_chr_write_iter+0x1eb/0x2e0 [ 190.168366][ T4803] vfs_write+0x802/0xf70 [ 190.172625][ T4803] ? file_end_write+0x1b0/0x1b0 [ 190.177479][ T4803] ? __fget_files+0x2c4/0x320 [ 190.182156][ T4803] ? __fdget_pos+0x1f7/0x380 [ 190.186739][ T4803] ? ksys_write+0x71/0x240 [ 190.191302][ T4803] ksys_write+0x140/0x240 [ 190.195649][ T4803] ? __ia32_sys_read+0x90/0x90 [ 190.200423][ T4803] ? debug_smp_processor_id+0x17/0x20 [ 190.205814][ T4803] __x64_sys_write+0x7b/0x90 [ 190.210515][ T4803] x64_sys_call+0x8ef/0x9a0 [ 190.215379][ T4803] do_syscall_64+0x4c/0xa0 [ 190.219793][ T4803] ? clear_bhb_loop+0x50/0xa0 [ 190.224664][ T4803] ? clear_bhb_loop+0x50/0xa0 [ 190.229367][ T4803] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 190.235276][ T4803] RIP: 0033:0x7fd58126fbe9 [ 190.239867][ T4803] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 190.259554][ T4803] RSP: 002b:00007fd57fcd8038 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 190.267961][ T4803] RAX: ffffffffffffffda RBX: 00007fd581496fa0 RCX: 00007fd58126fbe9 [ 190.275956][ T4803] RDX: 000000000000fdef RSI: 00002000000004c0 RDI: 00000000000000c8 [ 190.283932][ T4803] RBP: 00007fd57fcd8090 R08: 0000000000000000 R09: 0000000000000000 [ 190.291912][ T4803] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 190.300002][ T4803] R13: 00007fd581497038 R14: 00007fd581496fa0 R15: 00007ffc249d26f8 [ 190.308187][ T4803] [ 190.533915][ T4828] device syzkaller0 entered promiscuous mode [ 190.640024][ T4840] device sit0 left promiscuous mode [ 190.715104][ T4840] device sit0 entered promiscuous mode [ 191.210405][ T4872] device syzkaller0 entered promiscuous mode [ 191.558438][ T4887] FAULT_INJECTION: forcing a failure. [ 191.558438][ T4887] name failslab, interval 1, probability 0, space 0, times 0 [ 191.634662][ T4887] CPU: 0 PID: 4887 Comm: syz.4.1698 Not tainted 5.15.189-syzkaller-android13-5.15.189_r00 #0 [ 191.644882][ T4887] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 191.655041][ T4887] Call Trace: [ 191.658337][ T4887] [ 191.661480][ T4887] __dump_stack+0x21/0x30 [ 191.665837][ T4887] dump_stack_lvl+0xee/0x150 [ 191.670461][ T4887] ? show_regs_print_info+0x20/0x20 [ 191.675673][ T4887] dump_stack+0x15/0x20 [ 191.680018][ T4887] should_fail+0x3c1/0x510 [ 191.684445][ T4887] ? alloc_skb_with_frags+0xa8/0x620 [ 191.689915][ T4887] __should_failslab+0xa4/0xe0 [ 191.694700][ T4887] should_failslab+0x9/0x20 [ 191.699211][ T4887] slab_pre_alloc_hook+0x3b/0xe0 [ 191.704165][ T4887] ? alloc_skb_with_frags+0xa8/0x620 [ 191.709551][ T4887] ? alloc_skb_with_frags+0xa8/0x620 [ 191.714846][ T4887] __kmalloc_track_caller+0x6c/0x2c0 [ 191.720148][ T4887] ? alloc_skb_with_frags+0xa8/0x620 [ 191.725446][ T4887] ? alloc_skb_with_frags+0xa8/0x620 [ 191.730749][ T4887] __alloc_skb+0x21a/0x740 [ 191.735269][ T4887] alloc_skb_with_frags+0xa8/0x620 [ 191.740486][ T4887] ? memcpy+0x56/0x70 [ 191.744485][ T4887] ? avc_has_perm_noaudit+0x2f4/0x460 [ 191.749900][ T4887] sock_alloc_send_pskb+0x853/0x980 [ 191.755115][ T4887] ? sock_kzfree_s+0x60/0x60 [ 191.759714][ T4887] ? asm_sysvec_apic_timer_interrupt+0x1b/0x20 [ 191.765887][ T4887] unix_stream_sendmsg+0x41b/0xc80 [ 191.771102][ T4887] ? unix_show_fdinfo+0xa0/0xa0 [ 191.775965][ T4887] ? security_socket_sendmsg+0x82/0xa0 [ 191.781437][ T4887] ? unix_show_fdinfo+0xa0/0xa0 [ 191.786293][ T4887] ____sys_sendmsg+0x5a2/0x8c0 [ 191.791085][ T4887] ? __sys_sendmsg_sock+0x40/0x40 [ 191.796130][ T4887] ? import_iovec+0x7c/0xb0 [ 191.800656][ T4887] ___sys_sendmsg+0x1f0/0x260 [ 191.805355][ T4887] ? __sys_sendmsg+0x250/0x250 [ 191.810146][ T4887] ? __fdget+0x1a1/0x230 [ 191.814583][ T4887] __x64_sys_sendmsg+0x1e2/0x2a0 [ 191.819532][ T4887] ? ___sys_sendmsg+0x260/0x260 [ 191.824392][ T4887] ? debug_smp_processor_id+0x17/0x20 [ 191.829780][ T4887] ? fpregs_assert_state_consistent+0xb1/0xe0 [ 191.835857][ T4887] x64_sys_call+0x4b/0x9a0 [ 191.840315][ T4887] do_syscall_64+0x4c/0xa0 [ 191.844756][ T4887] ? clear_bhb_loop+0x50/0xa0 [ 191.849443][ T4887] ? clear_bhb_loop+0x50/0xa0 [ 191.854216][ T4887] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 191.860127][ T4887] RIP: 0033:0x7fc93ee10be9 [ 191.864554][ T4887] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 191.884177][ T4887] RSP: 002b:00007fc93d879038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 191.892904][ T4887] RAX: ffffffffffffffda RBX: 00007fc93f037fa0 RCX: 00007fc93ee10be9 [ 191.900894][ T4887] RDX: 803e000000000000 RSI: 0000200000000500 RDI: 0000000000000005 [ 191.908975][ T4887] RBP: 00007fc93d879090 R08: 0000000000000000 R09: 0000000000000000 [ 191.916962][ T4887] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 191.924948][ T4887] R13: 00007fc93f038038 R14: 00007fc93f037fa0 R15: 00007ffc89e2a018 [ 191.932945][ T4887] [ 192.562105][ T4915] device syzkaller0 entered promiscuous mode [ 192.977743][ T4923] device sit0 left promiscuous mode [ 193.223288][ T4927] device syzkaller0 entered promiscuous mode [ 194.010749][ T4955] device syzkaller0 entered promiscuous mode [ 194.216742][ T4968] device pim6reg1 entered promiscuous mode [ 194.989603][ T5004] device syzkaller0 entered promiscuous mode [ 195.756858][ T5030] FAULT_INJECTION: forcing a failure. [ 195.756858][ T5030] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 195.826335][ T5030] CPU: 0 PID: 5030 Comm: syz.0.1748 Not tainted 5.15.189-syzkaller-android13-5.15.189_r00 #0 [ 195.837076][ T5030] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 195.847135][ T5030] Call Trace: [ 195.850413][ T5030] [ 195.853341][ T5030] __dump_stack+0x21/0x30 [ 195.857686][ T5030] dump_stack_lvl+0xee/0x150 [ 195.862276][ T5030] ? show_regs_print_info+0x20/0x20 [ 195.867560][ T5030] dump_stack+0x15/0x20 [ 195.871890][ T5030] should_fail+0x3c1/0x510 [ 195.876302][ T5030] should_fail_usercopy+0x1a/0x20 [ 195.881320][ T5030] _copy_to_user+0x20/0x90 [ 195.885733][ T5030] simple_read_from_buffer+0xe9/0x160 [ 195.891203][ T5030] proc_fail_nth_read+0x19a/0x210 [ 195.896227][ T5030] ? proc_fault_inject_write+0x2f0/0x2f0 [ 195.902046][ T5030] ? security_file_permission+0x83/0xa0 [ 195.907678][ T5030] ? proc_fault_inject_write+0x2f0/0x2f0 [ 195.913305][ T5030] vfs_read+0x282/0xbe0 [ 195.917458][ T5030] ? kernel_read+0x1f0/0x1f0 [ 195.922213][ T5030] ? __kasan_check_write+0x14/0x20 [ 195.927324][ T5030] ? mutex_lock+0x95/0x1a0 [ 195.931735][ T5030] ? wait_for_completion_killable_timeout+0x10/0x10 [ 195.938324][ T5030] ? __fget_files+0x2c4/0x320 [ 195.943021][ T5030] ? __fdget_pos+0x2d2/0x380 [ 195.947623][ T5030] ? ksys_read+0x71/0x240 [ 195.951961][ T5030] ksys_read+0x140/0x240 [ 195.956199][ T5030] ? vfs_write+0xf70/0xf70 [ 195.960613][ T5030] ? debug_smp_processor_id+0x17/0x20 [ 195.966088][ T5030] __x64_sys_read+0x7b/0x90 [ 195.970765][ T5030] x64_sys_call+0x96d/0x9a0 [ 195.975272][ T5030] do_syscall_64+0x4c/0xa0 [ 195.979683][ T5030] ? clear_bhb_loop+0x50/0xa0 [ 195.984363][ T5030] ? clear_bhb_loop+0x50/0xa0 [ 195.989035][ T5030] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 195.994919][ T5030] RIP: 0033:0x7f59704ad5fc [ 195.999341][ T5030] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 93 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 ef 93 02 00 48 [ 196.019027][ T5030] RSP: 002b:00007f596eef6030 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 196.027435][ T5030] RAX: ffffffffffffffda RBX: 00007f59706d6090 RCX: 00007f59704ad5fc [ 196.035416][ T5030] RDX: 000000000000000f RSI: 00007f596eef60a0 RDI: 0000000000000006 [ 196.043385][ T5030] RBP: 00007f596eef6090 R08: 0000000000000000 R09: 0000000000000000 [ 196.051356][ T5030] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 196.059319][ T5030] R13: 00007f59706d6128 R14: 00007f59706d6090 R15: 00007ffe2f786058 [ 196.067289][ T5030] [ 196.192964][ T5043] device syzkaller0 entered promiscuous mode [ 197.319078][ T5074] device syzkaller0 entered promiscuous mode [ 197.679820][ T5083] device syzkaller0 entered promiscuous mode [ 198.339105][ T5111] FAULT_INJECTION: forcing a failure. [ 198.339105][ T5111] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 198.353435][ T5111] CPU: 1 PID: 5111 Comm: syz.3.1775 Not tainted 5.15.189-syzkaller-android13-5.15.189_r00 #0 [ 198.363613][ T5111] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 198.373698][ T5111] Call Trace: [ 198.377005][ T5111] [ 198.379947][ T5111] __dump_stack+0x21/0x30 [ 198.384380][ T5111] dump_stack_lvl+0xee/0x150 [ 198.388998][ T5111] ? show_regs_print_info+0x20/0x20 [ 198.394215][ T5111] dump_stack+0x15/0x20 [ 198.398376][ T5111] should_fail+0x3c1/0x510 [ 198.402781][ T5111] should_fail_alloc_page+0x55/0x80 [ 198.408073][ T5111] prepare_alloc_pages+0x156/0x600 [ 198.413198][ T5111] ? __alloc_pages_bulk+0xab0/0xab0 [ 198.418412][ T5111] ? flush_tlb_one_user+0x50/0x50 [ 198.423461][ T5111] ? cgroup_rstat_updated+0xf5/0x370 [ 198.428755][ T5111] __alloc_pages+0x10a/0x440 [ 198.433480][ T5111] ? prep_new_page+0x110/0x110 [ 198.438337][ T5111] wp_page_copy+0x1c9/0x18f0 [ 198.442932][ T5111] ? insert_page_into_pte_locked+0x310/0x310 [ 198.448921][ T5111] ? _raw_spin_lock+0x8e/0xe0 [ 198.453599][ T5111] ? _raw_spin_trylock_bh+0x130/0x130 [ 198.458991][ T5111] ? vm_normal_page+0x1dd/0x1f0 [ 198.463919][ T5111] do_wp_page+0x731/0xc90 [ 198.468245][ T5111] handle_pte_fault+0x73c/0x2680 [ 198.473178][ T5111] ? 0xffffffffa0026000 [ 198.477414][ T5111] ? is_bpf_text_address+0x177/0x190 [ 198.482697][ T5111] ? fault_around_bytes_set+0xc0/0xc0 [ 198.488067][ T5111] do_handle_mm_fault+0x1a6d/0x1d50 [ 198.493264][ T5111] ? numa_migrate_prep+0xd0/0xd0 [ 198.498287][ T5111] ? __find_vma+0x30/0x150 [ 198.502709][ T5111] do_user_addr_fault+0x841/0x1180 [ 198.508022][ T5111] ? do_kern_addr_fault+0x80/0x80 [ 198.513048][ T5111] ? new_inode_pseudo+0x91/0x210 [ 198.517984][ T5111] ? new_inode+0x28/0x1e0 [ 198.522314][ T5111] ? proc_pid_make_inode+0x27/0x1d0 [ 198.527530][ T5111] ? proc_pident_instantiate+0x69/0x2b0 [ 198.533170][ T5111] ? proc_pident_lookup+0x1c0/0x270 [ 198.538381][ T5111] ? proc_tid_base_lookup+0x2b/0x30 [ 198.543599][ T5111] ? path_openat+0xfcf/0x2f10 [ 198.548271][ T5111] ? do_filp_open+0x1b3/0x3e0 [ 198.553030][ T5111] ? do_sys_openat2+0x14c/0x7b0 [ 198.557886][ T5111] ? __x64_sys_openat+0x136/0x160 [ 198.562915][ T5111] ? x64_sys_call+0x219/0x9a0 [ 198.567640][ T5111] ? entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 198.573804][ T5111] exc_page_fault+0x51/0xb0 [ 198.578309][ T5111] asm_exc_page_fault+0x27/0x30 [ 198.583154][ T5111] RIP: 0010:copy_user_enhanced_fast_string+0xe/0x40 [ 198.589741][ T5111] Code: 89 d1 c1 e9 03 83 e2 07 f3 48 a5 89 d1 f3 a4 31 c0 0f 01 ca c3 90 90 90 90 90 90 90 0f 01 cb 83 fa 40 0f 82 70 ff ff ff 89 d1 a4 31 c0 0f 01 ca c3 90 90 90 90 90 90 90 90 90 90 89 d1 83 f8 [ 198.609352][ T5111] RSP: 0018:ffffc90000b87678 EFLAGS: 00050206 [ 198.615421][ T5111] RAX: ffffffff8249ea01 RBX: ffff88810fac00c8 RCX: 000000000000e50f [ 198.623390][ T5111] RDX: 000000000000ff0f RSI: ffff88810fac1ac8 RDI: 0000200000002000 [ 198.631360][ T5111] RBP: ffffc90000b877c8 R08: dffffc0000000000 R09: ffffed1021f59ffb [ 198.639452][ T5111] R10: 0000000000000000 R11: 0000000000001fd8 R12: 000020000001050f [ 198.647438][ T5111] R13: 000000000000ff0f R14: 0000200000000600 R15: 0000000000000000 [ 198.655431][ T5111] ? _copy_to_iter+0x1b1/0x1070 [ 198.660426][ T5111] ? _copy_to_iter+0x296/0x1070 [ 198.665278][ T5111] ? memcpy+0x56/0x70 [ 198.669267][ T5111] ? avc_has_perm_noaudit+0x2f4/0x460 [ 198.674638][ T5111] ? iov_iter_init+0x180/0x180 [ 198.679397][ T5111] ? __kasan_check_write+0x14/0x20 [ 198.684593][ T5111] ? _raw_spin_lock_bh+0x8e/0xe0 [ 198.689532][ T5111] ? check_stack_object+0x81/0x140 [ 198.694821][ T5111] ? __check_object_size+0x2f4/0x3c0 [ 198.700101][ T5111] simple_copy_to_iter+0x50/0x70 [ 198.705035][ T5111] __skb_datagram_iter+0xe0/0x710 [ 198.710061][ T5111] ? tsk_importance+0x150/0x150 [ 198.714904][ T5111] ? skb_copy_datagram_iter+0x150/0x150 [ 198.720445][ T5111] skb_copy_datagram_iter+0x40/0x150 [ 198.725725][ T5111] tipc_recvmsg+0x79b/0x13a0 [ 198.730310][ T5111] ? tipc_send_packet+0xa0/0xa0 [ 198.735157][ T5111] ? security_socket_recvmsg+0x87/0xb0 [ 198.740612][ T5111] ? tipc_send_packet+0xa0/0xa0 [ 198.745454][ T5111] ____sys_recvmsg+0x291/0x580 [ 198.750303][ T5111] ? __sys_recvmsg_sock+0x50/0x50 [ 198.755584][ T5111] ? memset+0x35/0x40 [ 198.759561][ T5111] ? import_iovec+0x7c/0xb0 [ 198.764233][ T5111] ___sys_recvmsg+0x1af/0x4f0 [ 198.769084][ T5111] ? __sys_recvmsg+0x250/0x250 [ 198.773848][ T5111] ? vfs_write+0xc17/0xf70 [ 198.778268][ T5111] ? __fdget+0x1a1/0x230 [ 198.782506][ T5111] __x64_sys_recvmsg+0x1df/0x2a0 [ 198.787440][ T5111] ? ___sys_recvmsg+0x4f0/0x4f0 [ 198.792282][ T5111] ? ksys_write+0x1eb/0x240 [ 198.796788][ T5111] ? fpregs_assert_state_consistent+0xb1/0xe0 [ 198.802851][ T5111] x64_sys_call+0x705/0x9a0 [ 198.807782][ T5111] do_syscall_64+0x4c/0xa0 [ 198.812196][ T5111] ? clear_bhb_loop+0x50/0xa0 [ 198.816871][ T5111] ? clear_bhb_loop+0x50/0xa0 [ 198.821549][ T5111] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 198.827453][ T5111] RIP: 0033:0x7f26618d9be9 [ 198.831861][ T5111] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 198.851458][ T5111] RSP: 002b:00007f2660342038 EFLAGS: 00000246 ORIG_RAX: 000000000000002f [ 198.859994][ T5111] RAX: ffffffffffffffda RBX: 00007f2661b00fa0 RCX: 00007f26618d9be9 [ 198.868046][ T5111] RDX: 0000000000000000 RSI: 0000200000000900 RDI: 0000000000000004 [ 198.876016][ T5111] RBP: 00007f2660342090 R08: 0000000000000000 R09: 0000000000000000 [ 198.883980][ T5111] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 198.891948][ T5111] R13: 00007f2661b01038 R14: 00007f2661b00fa0 R15: 00007ffc95147e98 [ 198.899962][ T5111] [ 199.226419][ T5127] device syzkaller0 entered promiscuous mode [ 199.429131][ T5146] FAULT_INJECTION: forcing a failure. [ 199.429131][ T5146] name failslab, interval 1, probability 0, space 0, times 0 [ 199.504673][ T5146] CPU: 0 PID: 5146 Comm: syz.2.1789 Not tainted 5.15.189-syzkaller-android13-5.15.189_r00 #0 [ 199.514877][ T5146] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 199.525019][ T5146] Call Trace: [ 199.528298][ T5146] [ 199.531223][ T5146] __dump_stack+0x21/0x30 [ 199.535557][ T5146] dump_stack_lvl+0xee/0x150 [ 199.540139][ T5146] ? show_regs_print_info+0x20/0x20 [ 199.545347][ T5146] dump_stack+0x15/0x20 [ 199.549495][ T5146] should_fail+0x3c1/0x510 [ 199.553913][ T5146] ? tipc_msg_build+0xd1/0xfb0 [ 199.558800][ T5146] __should_failslab+0xa4/0xe0 [ 199.563561][ T5146] should_failslab+0x9/0x20 [ 199.568147][ T5146] slab_pre_alloc_hook+0x3b/0xe0 [ 199.573085][ T5146] ? tipc_msg_build+0xd1/0xfb0 [ 199.577840][ T5146] ? tipc_msg_build+0xd1/0xfb0 [ 199.582596][ T5146] __kmalloc_track_caller+0x6c/0x2c0 [ 199.587916][ T5146] ? tipc_msg_build+0xd1/0xfb0 [ 199.592670][ T5146] ? tipc_msg_build+0xd1/0xfb0 [ 199.597424][ T5146] __alloc_skb+0x21a/0x740 [ 199.601850][ T5146] tipc_msg_build+0xd1/0xfb0 [ 199.606432][ T5146] ? tipc_node_get_mtu+0x2b0/0x2b0 [ 199.611557][ T5146] ? tipc_in_scope+0x51/0xd0 [ 199.616147][ T5146] ? tipc_nametbl_lookup_anycast+0x2ec/0x1050 [ 199.622215][ T5146] __tipc_sendmsg+0x1651/0x2680 [ 199.627066][ T5146] ? _raw_spin_lock+0xe0/0xe0 [ 199.631740][ T5146] ? local_bh_enable+0x30/0x30 [ 199.636499][ T5146] ? avc_has_perm+0x158/0x240 [ 199.641176][ T5146] ? __kasan_check_write+0x14/0x20 [ 199.646278][ T5146] ? _raw_spin_lock_bh+0x8e/0xe0 [ 199.651206][ T5146] ? _raw_spin_lock_irq+0xe0/0xe0 [ 199.656220][ T5146] ? unwind_get_return_address+0x4d/0x90 [ 199.661846][ T5146] ? stack_trace_save+0xe0/0xe0 [ 199.666689][ T5146] ? __local_bh_enable_ip+0x58/0x80 [ 199.671883][ T5146] ? lock_sock_nested+0x1f1/0x290 [ 199.676994][ T5146] ? sock_init_data+0xc0/0xc0 [ 199.681661][ T5146] ? stack_trace_save+0x98/0xe0 [ 199.686502][ T5146] ? wait_woken+0x170/0x170 [ 199.691024][ T5146] tipc_sendmsg+0x55/0x70 [ 199.695352][ T5146] ? tipc_recvmsg+0x13a0/0x13a0 [ 199.700200][ T5146] ____sys_sendmsg+0x5a2/0x8c0 [ 199.704965][ T5146] ? __sys_sendmsg_sock+0x40/0x40 [ 199.710008][ T5146] ? kstrtouint_from_user+0x1a0/0x200 [ 199.715376][ T5146] ? import_iovec+0x7c/0xb0 [ 199.720162][ T5146] ___sys_sendmsg+0x1f0/0x260 [ 199.724858][ T5146] ? __sys_sendmsg+0x250/0x250 [ 199.729640][ T5146] ? __fdget+0x1a1/0x230 [ 199.733890][ T5146] __x64_sys_sendmsg+0x1e2/0x2a0 [ 199.738840][ T5146] ? ___sys_sendmsg+0x260/0x260 [ 199.743709][ T5146] ? ksys_write+0x1eb/0x240 [ 199.748333][ T5146] ? fpregs_assert_state_consistent+0xb1/0xe0 [ 199.754403][ T5146] x64_sys_call+0x4b/0x9a0 [ 199.758816][ T5146] do_syscall_64+0x4c/0xa0 [ 199.763225][ T5146] ? clear_bhb_loop+0x50/0xa0 [ 199.767907][ T5146] ? clear_bhb_loop+0x50/0xa0 [ 199.772584][ T5146] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 199.778476][ T5146] RIP: 0033:0x7fd58126fbe9 [ 199.782885][ T5146] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 199.802761][ T5146] RSP: 002b:00007fd57fcd8038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 199.811256][ T5146] RAX: ffffffffffffffda RBX: 00007fd581496fa0 RCX: 00007fd58126fbe9 [ 199.819224][ T5146] RDX: 0000000000000000 RSI: 0000200000000280 RDI: 0000000000000007 [ 199.827368][ T5146] RBP: 00007fd57fcd8090 R08: 0000000000000000 R09: 0000000000000000 [ 199.835353][ T5146] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 199.843408][ T5146] R13: 00007fd581497038 R14: 00007fd581496fa0 R15: 00007ffc249d26f8 [ 199.851381][ T5146] [ 200.562258][ T5178] device syzkaller0 entered promiscuous mode [ 201.372678][ T5210] device syzkaller0 entered promiscuous mode [ 201.476664][ T5216] FAULT_INJECTION: forcing a failure. [ 201.476664][ T5216] name failslab, interval 1, probability 0, space 0, times 0 [ 201.489344][ T5216] CPU: 0 PID: 5216 Comm: syz.3.1813 Not tainted 5.15.189-syzkaller-android13-5.15.189_r00 #0 [ 201.499859][ T5216] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 201.509936][ T5216] Call Trace: [ 201.513227][ T5216] [ 201.516153][ T5216] __dump_stack+0x21/0x30 [ 201.520487][ T5216] dump_stack_lvl+0xee/0x150 [ 201.525068][ T5216] ? show_regs_print_info+0x20/0x20 [ 201.530262][ T5216] ? kfree_skb+0xc1/0x2f0 [ 201.534586][ T5216] dump_stack+0x15/0x20 [ 201.538738][ T5216] should_fail+0x3c1/0x510 [ 201.543173][ T5216] __should_failslab+0xa4/0xe0 [ 201.547940][ T5216] should_failslab+0x9/0x20 [ 201.552529][ T5216] slab_pre_alloc_hook+0x3b/0xe0 [ 201.557468][ T5216] ? dst_alloc+0x15c/0x1d0 [ 201.561888][ T5216] kmem_cache_alloc+0x44/0x260 [ 201.566649][ T5216] dst_alloc+0x15c/0x1d0 [ 201.570888][ T5216] ip_route_output_key_hash_rcu+0x11db/0x2060 [ 201.576957][ T5216] ip_route_output_key_hash+0x123/0x1c0 [ 201.582525][ T5216] ? ip_route_input_rcu+0x24b0/0x24b0 [ 201.587980][ T5216] vti6_tnl_xmit+0xd83/0x1870 [ 201.592655][ T5216] ? __kernel_text_address+0xa0/0x100 [ 201.598021][ T5216] ? skb_network_protocol+0x501/0x740 [ 201.603404][ T5216] ? vti6_dev_uninit+0x340/0x340 [ 201.608345][ T5216] ? stack_trace_save+0x98/0xe0 [ 201.613193][ T5216] ? netif_skb_features+0x831/0xb90 [ 201.618392][ T5216] dev_hard_start_xmit+0x244/0x670 [ 201.623503][ T5216] __dev_queue_xmit+0x17bd/0x2d80 [ 201.628526][ T5216] ? dev_queue_xmit+0x20/0x20 [ 201.633197][ T5216] ? __kasan_check_write+0x14/0x20 [ 201.638305][ T5216] ? skb_release_data+0x1c6/0xa10 [ 201.643331][ T5216] ? __kasan_check_write+0x14/0x20 [ 201.648442][ T5216] ? pskb_expand_head+0xbe6/0x11d0 [ 201.653640][ T5216] dev_queue_xmit+0x17/0x20 [ 201.658135][ T5216] __bpf_redirect+0x68a/0xe60 [ 201.662819][ T5216] bpf_clone_redirect+0x242/0x380 [ 201.667853][ T5216] bpf_prog_6893982b85ceadf7+0x56/0xd04 [ 201.673394][ T5216] ? __kasan_slab_alloc+0xcf/0xf0 [ 201.678409][ T5216] ? __kasan_slab_alloc+0xbd/0xf0 [ 201.683429][ T5216] ? slab_post_alloc_hook+0x4f/0x2b0 [ 201.688760][ T5216] ? kmem_cache_alloc+0xf7/0x260 [ 201.693691][ T5216] ? __build_skb+0x2d/0x310 [ 201.698195][ T5216] ? build_skb+0x24/0x200 [ 201.702516][ T5216] ? bpf_prog_test_run_skb+0x279/0x1150 [ 201.708055][ T5216] ? bpf_prog_test_run+0x3d5/0x620 [ 201.713173][ T5216] ? __sys_bpf+0x52c/0x730 [ 201.717579][ T5216] ? __x64_sys_bpf+0x7c/0x90 [ 201.722171][ T5216] ? x64_sys_call+0x4b9/0x9a0 [ 201.726854][ T5216] ? do_syscall_64+0x4c/0xa0 [ 201.731550][ T5216] ? entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 201.737629][ T5216] ? __kasan_check_read+0x11/0x20 [ 201.742656][ T5216] ? bpf_test_timer_continue+0x146/0x4a0 [ 201.748462][ T5216] bpf_test_run+0x33d/0x8d0 [ 201.752966][ T5216] ? convert___skb_to_skb+0x4f0/0x4f0 [ 201.758340][ T5216] ? eth_get_headlen+0x1f0/0x1f0 [ 201.763278][ T5216] ? convert___skb_to_skb+0x41/0x4f0 [ 201.768559][ T5216] bpf_prog_test_run_skb+0x9ec/0x1150 [ 201.773930][ T5216] ? __bpf_prog_test_run_raw_tp+0x2b0/0x2b0 [ 201.779834][ T5216] bpf_prog_test_run+0x3d5/0x620 [ 201.784765][ T5216] ? bpf_prog_query+0x230/0x230 [ 201.789614][ T5216] ? selinux_bpf+0xce/0xf0 [ 201.794025][ T5216] ? security_bpf+0x82/0xa0 [ 201.798526][ T5216] __sys_bpf+0x52c/0x730 [ 201.802762][ T5216] ? bpf_link_show_fdinfo+0x310/0x310 [ 201.808126][ T5216] ? bpf_trace_run2+0xb5/0x1b0 [ 201.812889][ T5216] ? __bpf_trace_sys_enter+0x62/0x70 [ 201.818173][ T5216] __x64_sys_bpf+0x7c/0x90 [ 201.822678][ T5216] x64_sys_call+0x4b9/0x9a0 [ 201.827265][ T5216] do_syscall_64+0x4c/0xa0 [ 201.831673][ T5216] ? clear_bhb_loop+0x50/0xa0 [ 201.836356][ T5216] ? clear_bhb_loop+0x50/0xa0 [ 201.841038][ T5216] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 201.846926][ T5216] RIP: 0033:0x7f26618d9be9 [ 201.851426][ T5216] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 201.871120][ T5216] RSP: 002b:00007f2660342038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 201.879545][ T5216] RAX: ffffffffffffffda RBX: 00007f2661b00fa0 RCX: 00007f26618d9be9 [ 201.887542][ T5216] RDX: 000000000000002c RSI: 0000200000000080 RDI: 000000000000000a [ 201.895507][ T5216] RBP: 00007f2660342090 R08: 0000000000000000 R09: 0000000000000000 [ 201.903471][ T5216] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 201.911780][ T5216] R13: 00007f2661b01038 R14: 00007f2661b00fa0 R15: 00007ffc95147e98 [ 201.919749][ T5216] [ 202.430730][ T5247] device syzkaller0 entered promiscuous mode [ 202.676674][ T5257] device syzkaller0 entered promiscuous mode [ 203.211268][ T5279] FAULT_INJECTION: forcing a failure. [ 203.211268][ T5279] name failslab, interval 1, probability 0, space 0, times 0 [ 203.285998][ T5279] CPU: 0 PID: 5279 Comm: syz.1.1838 Not tainted 5.15.189-syzkaller-android13-5.15.189_r00 #0 [ 203.296201][ T5279] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 203.306270][ T5279] Call Trace: [ 203.309558][ T5279] [ 203.312497][ T5279] __dump_stack+0x21/0x30 [ 203.316844][ T5279] dump_stack_lvl+0xee/0x150 [ 203.321442][ T5279] ? show_regs_print_info+0x20/0x20 [ 203.326651][ T5279] dump_stack+0x15/0x20 [ 203.330826][ T5279] should_fail+0x3c1/0x510 [ 203.335275][ T5279] __should_failslab+0xa4/0xe0 [ 203.340162][ T5279] should_failslab+0x9/0x20 [ 203.344696][ T5279] slab_pre_alloc_hook+0x3b/0xe0 [ 203.349654][ T5279] __kmalloc+0x6d/0x2c0 [ 203.353829][ T5279] ? kvmalloc_node+0x206/0x300 [ 203.358616][ T5279] kvmalloc_node+0x206/0x300 [ 203.363222][ T5279] ? vm_mmap+0xb0/0xb0 [ 203.367294][ T5279] ? kmem_cache_alloc_trace+0x119/0x270 [ 203.372833][ T5279] ? alloc_fdtable+0xb4/0x2b0 [ 203.377509][ T5279] alloc_fdtable+0x167/0x2b0 [ 203.382097][ T5279] dup_fd+0x870/0xb20 [ 203.386173][ T5279] copy_files+0x76/0xe0 [ 203.390322][ T5279] copy_process+0x10ac/0x3210 [ 203.394993][ T5279] ? kstrtol_from_user+0x260/0x260 [ 203.400102][ T5279] ? __kasan_check_write+0x14/0x20 [ 203.405212][ T5279] ? __pidfd_prepare+0x150/0x150 [ 203.410244][ T5279] ? _raw_spin_unlock_irqrestore+0x5b/0x80 [ 203.416071][ T5279] ? __bpf_ringbuf_reserve+0x417/0x4e0 [ 203.421543][ T5279] ? security_file_permission+0x83/0xa0 [ 203.427095][ T5279] kernel_clone+0x23f/0x940 [ 203.431705][ T5279] ? bpf_ringbuf_notify+0x30/0x30 [ 203.436812][ T5279] ? create_io_thread+0x130/0x130 [ 203.441831][ T5279] ? bpf_ringbuf_submit+0x11c/0x170 [ 203.447023][ T5279] __x64_sys_clone+0x176/0x1d0 [ 203.451787][ T5279] ? __ia32_sys_vfork+0xf0/0xf0 [ 203.456635][ T5279] ? __bpf_trace_sys_enter+0x62/0x70 [ 203.461918][ T5279] ? trace_sys_enter+0x3d/0x50 [ 203.466676][ T5279] x64_sys_call+0x41f/0x9a0 [ 203.471183][ T5279] do_syscall_64+0x4c/0xa0 [ 203.475680][ T5279] ? clear_bhb_loop+0x50/0xa0 [ 203.480352][ T5279] ? clear_bhb_loop+0x50/0xa0 [ 203.485030][ T5279] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 203.490938][ T5279] RIP: 0033:0x7fb072a8fbe9 [ 203.495363][ T5279] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 203.515047][ T5279] RSP: 002b:00007fb0714f7fe8 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 203.523462][ T5279] RAX: ffffffffffffffda RBX: 00007fb072cb6fa0 RCX: 00007fb072a8fbe9 [ 203.531439][ T5279] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00000000c2002000 [ 203.539405][ T5279] RBP: 00007fb0714f8090 R08: 0000000000000000 R09: 0000000000000000 [ 203.547375][ T5279] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000001 [ 203.555338][ T5279] R13: 00007fb072cb7038 R14: 00007fb072cb6fa0 R15: 00007ffd9cbe7b68 [ 203.563313][ T5279] [ 203.648280][ T5295] device syzkaller0 entered promiscuous mode [ 203.670193][ T5296] device syzkaller0 entered promiscuous mode [ 203.793557][ T5310] device sit0 left promiscuous mode [ 203.813955][ T5312] ip6_vti0: mtu greater than device maximum [ 203.852087][ T5315] FAULT_INJECTION: forcing a failure. [ 203.852087][ T5315] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 203.866225][ T5315] CPU: 0 PID: 5315 Comm: syz.3.1853 Not tainted 5.15.189-syzkaller-android13-5.15.189_r00 #0 [ 203.876665][ T5315] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 203.886832][ T5315] Call Trace: [ 203.890222][ T5315] [ 203.893162][ T5315] __dump_stack+0x21/0x30 [ 203.897515][ T5315] dump_stack_lvl+0xee/0x150 [ 203.902115][ T5315] ? show_regs_print_info+0x20/0x20 [ 203.907325][ T5315] ? migrate_enable+0x192/0x260 [ 203.912198][ T5315] ? migrate_disable+0x180/0x180 [ 203.917167][ T5315] dump_stack+0x15/0x20 [ 203.921341][ T5315] should_fail+0x3c1/0x510 [ 203.925817][ T5315] should_fail_usercopy+0x1a/0x20 [ 203.930861][ T5315] _copy_from_user+0x20/0xd0 [ 203.935463][ T5315] generic_map_update_batch+0x44f/0x740 [ 203.941025][ T5315] ? generic_map_delete_batch+0x510/0x510 [ 203.946846][ T5315] ? __fdget+0x1a1/0x230 [ 203.951102][ T5315] ? generic_map_delete_batch+0x510/0x510 [ 203.956835][ T5315] bpf_map_do_batch+0x463/0x5f0 [ 203.961694][ T5315] __sys_bpf+0x5e3/0x730 [ 203.965943][ T5315] ? bpf_link_show_fdinfo+0x310/0x310 [ 203.971330][ T5315] ? bpf_trace_run2+0xb5/0x1b0 [ 203.976108][ T5315] ? __bpf_trace_sys_enter+0x62/0x70 [ 203.981404][ T5315] __x64_sys_bpf+0x7c/0x90 [ 203.985834][ T5315] x64_sys_call+0x4b9/0x9a0 [ 203.990349][ T5315] do_syscall_64+0x4c/0xa0 [ 203.994774][ T5315] ? clear_bhb_loop+0x50/0xa0 [ 203.999467][ T5315] ? clear_bhb_loop+0x50/0xa0 [ 204.004154][ T5315] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 204.010074][ T5315] RIP: 0033:0x7f26618d9be9 [ 204.014498][ T5315] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 204.034205][ T5315] RSP: 002b:00007f2660342038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 204.042634][ T5315] RAX: ffffffffffffffda RBX: 00007f2661b00fa0 RCX: 00007f26618d9be9 [ 204.050713][ T5315] RDX: 0000000000000038 RSI: 0000200000000200 RDI: 000000000000001a [ 204.058782][ T5315] RBP: 00007f2660342090 R08: 0000000000000000 R09: 0000000000000000 [ 204.066849][ T5315] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 204.074827][ T5315] R13: 00007f2661b01038 R14: 00007f2661b00fa0 R15: 00007ffc95147e98 [ 204.082808][ T5315] [ 204.431564][ T5333] device syzkaller0 entered promiscuous mode [ 204.883168][ T5353] GPL: port 1(erspan0) entered blocking state [ 204.910372][ T5353] GPL: port 1(erspan0) entered disabled state [ 204.968497][ T5353] device erspan0 entered promiscuous mode [ 205.194509][ T30] audit: type=1400 audit(1756440387.755:137): avc: denied { ioctl } for pid=5362 comm="syz.2.1873" path="user:[4026531837]" dev="nsfs" ino=4026531837 ioctlcmd=0xb701 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 205.637580][ T5378] FAULT_INJECTION: forcing a failure. [ 205.637580][ T5378] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 205.687526][ T5378] CPU: 1 PID: 5378 Comm: syz.2.1879 Not tainted 5.15.189-syzkaller-android13-5.15.189_r00 #0 [ 205.697910][ T5378] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 205.708088][ T5378] Call Trace: [ 205.711379][ T5378] [ 205.714303][ T5378] __dump_stack+0x21/0x30 [ 205.718661][ T5378] dump_stack_lvl+0xee/0x150 [ 205.723281][ T5378] ? show_regs_print_info+0x20/0x20 [ 205.728507][ T5378] ? stack_trace_save+0x98/0xe0 [ 205.733385][ T5378] dump_stack+0x15/0x20 [ 205.737573][ T5378] should_fail+0x3c1/0x510 [ 205.742014][ T5378] should_fail_alloc_page+0x55/0x80 [ 205.747360][ T5378] prepare_alloc_pages+0x156/0x600 [ 205.752500][ T5378] ? __alloc_pages_bulk+0xab0/0xab0 [ 205.757703][ T5378] __alloc_pages+0x10a/0x440 [ 205.762315][ T5378] ? prep_new_page+0x110/0x110 [ 205.767080][ T5378] kmalloc_order+0x4c/0x160 [ 205.771576][ T5378] ? alloc_skb_with_frags+0xa8/0x620 [ 205.776854][ T5378] kmalloc_order_trace+0x18/0xb0 [ 205.781782][ T5378] __kmalloc_track_caller+0x198/0x2c0 [ 205.787148][ T5378] ? kmem_cache_alloc+0xf7/0x260 [ 205.792081][ T5378] ? alloc_skb_with_frags+0xa8/0x620 [ 205.797448][ T5378] __alloc_skb+0x21a/0x740 [ 205.801950][ T5378] alloc_skb_with_frags+0xa8/0x620 [ 205.807057][ T5378] sock_alloc_send_pskb+0x853/0x980 [ 205.812255][ T5378] ? is_bpf_text_address+0x177/0x190 [ 205.817535][ T5378] ? __kernel_text_address+0xa0/0x100 [ 205.822901][ T5378] ? sock_kzfree_s+0x60/0x60 [ 205.827493][ T5378] ? stack_trace_save+0x98/0xe0 [ 205.832340][ T5378] tun_get_user+0x4e6/0x33c0 [ 205.836929][ T5378] ? __kasan_poison_slab+0x70/0x70 [ 205.842140][ T5378] ? kmem_cache_free+0x100/0x320 [ 205.847076][ T5378] ? tun_do_read+0x1c40/0x1c40 [ 205.851849][ T5378] ? kstrtouint_from_user+0x1a0/0x200 [ 205.857213][ T5378] ? kstrtol_from_user+0x260/0x260 [ 205.862319][ T5378] ? putname+0x111/0x160 [ 205.866557][ T5378] ? avc_policy_seqno+0x1b/0x70 [ 205.871403][ T5378] ? selinux_file_permission+0x2aa/0x510 [ 205.877032][ T5378] tun_chr_write_iter+0x1eb/0x2e0 [ 205.882052][ T5378] vfs_write+0x802/0xf70 [ 205.886289][ T5378] ? file_end_write+0x1b0/0x1b0 [ 205.891131][ T5378] ? __fget_files+0x2c4/0x320 [ 205.895811][ T5378] ? __fdget_pos+0x1f7/0x380 [ 205.900410][ T5378] ? ksys_write+0x71/0x240 [ 205.904821][ T5378] ksys_write+0x140/0x240 [ 205.909152][ T5378] ? __ia32_sys_read+0x90/0x90 [ 205.913911][ T5378] ? debug_smp_processor_id+0x17/0x20 [ 205.919295][ T5378] __x64_sys_write+0x7b/0x90 [ 205.923880][ T5378] x64_sys_call+0x8ef/0x9a0 [ 205.928376][ T5378] do_syscall_64+0x4c/0xa0 [ 205.932795][ T5378] ? clear_bhb_loop+0x50/0xa0 [ 205.937471][ T5378] ? clear_bhb_loop+0x50/0xa0 [ 205.942141][ T5378] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 205.948036][ T5378] RIP: 0033:0x7fd58126fbe9 [ 205.952449][ T5378] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 205.972257][ T5378] RSP: 002b:00007fd57fcd8038 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 205.980682][ T5378] RAX: ffffffffffffffda RBX: 00007fd581496fa0 RCX: 00007fd58126fbe9 [ 205.988662][ T5378] RDX: 000000000000fdef RSI: 0000200000000000 RDI: 00000000000000c8 [ 205.996630][ T5378] RBP: 00007fd57fcd8090 R08: 0000000000000000 R09: 0000000000000000 [ 206.004598][ T5378] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 206.012649][ T5378] R13: 00007fd581497038 R14: 00007fd581496fa0 R15: 00007ffc249d26f8 [ 206.020622][ T5378] [ 206.151719][ T30] audit: type=1400 audit(1756440388.715:138): avc: denied { create } for pid=5402 comm="syz.2.1890" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 206.316721][ T5409] syzkaller0: refused to change device tx_queue_len [ 206.659783][ T5431] bridge0: port 2(bridge_slave_1) entered disabled state [ 206.667051][ T5431] bridge0: port 1(bridge_slave_0) entered disabled state [ 206.961856][ T5435] bridge0: port 2(bridge_slave_1) entered blocking state [ 206.969017][ T5435] bridge0: port 2(bridge_slave_1) entered forwarding state [ 206.976338][ T5435] bridge0: port 1(bridge_slave_0) entered blocking state [ 206.983391][ T5435] bridge0: port 1(bridge_slave_0) entered forwarding state [ 206.999887][ T5435] device bridge0 entered promiscuous mode [ 207.036303][ T5457] FAULT_INJECTION: forcing a failure. [ 207.036303][ T5457] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 207.060811][ T5457] CPU: 1 PID: 5457 Comm: syz.2.1908 Not tainted 5.15.189-syzkaller-android13-5.15.189_r00 #0 [ 207.071107][ T5457] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 207.081188][ T5457] Call Trace: [ 207.084492][ T5457] [ 207.087463][ T5457] __dump_stack+0x21/0x30 [ 207.091778][ T5457] dump_stack_lvl+0xee/0x150 [ 207.096345][ T5457] ? show_regs_print_info+0x20/0x20 [ 207.101525][ T5457] ? vfs_write+0xc17/0xf70 [ 207.106022][ T5457] dump_stack+0x15/0x20 [ 207.110159][ T5457] should_fail+0x3c1/0x510 [ 207.114590][ T5457] should_fail_usercopy+0x1a/0x20 [ 207.119609][ T5457] _copy_from_user+0x20/0xd0 [ 207.124197][ T5457] __sys_bpf+0x233/0x730 [ 207.128552][ T5457] ? bpf_link_show_fdinfo+0x310/0x310 [ 207.133960][ T5457] ? debug_smp_processor_id+0x17/0x20 [ 207.139356][ T5457] __x64_sys_bpf+0x7c/0x90 [ 207.143783][ T5457] x64_sys_call+0x4b9/0x9a0 [ 207.148302][ T5457] do_syscall_64+0x4c/0xa0 [ 207.152738][ T5457] ? clear_bhb_loop+0x50/0xa0 [ 207.157429][ T5457] ? clear_bhb_loop+0x50/0xa0 [ 207.162121][ T5457] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 207.168025][ T5457] RIP: 0033:0x7fd58126fbe9 [ 207.172448][ T5457] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 207.192332][ T5457] RSP: 002b:00007fd57fcd8038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 207.200851][ T5457] RAX: ffffffffffffffda RBX: 00007fd581496fa0 RCX: 00007fd58126fbe9 [ 207.208833][ T5457] RDX: 0000000000000048 RSI: 0000200000000040 RDI: 0000000000000000 [ 207.216801][ T5457] RBP: 00007fd57fcd8090 R08: 0000000000000000 R09: 0000000000000000 [ 207.224776][ T5457] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 207.232744][ T5457] R13: 00007fd581497038 R14: 00007fd581496fa0 R15: 00007ffc249d26f8 [ 207.240720][ T5457] [ 208.207402][ T5528] device sit0 left promiscuous mode [ 208.212934][ T5531] FAULT_INJECTION: forcing a failure. [ 208.212934][ T5531] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 208.238358][ T5529] device sit0 entered promiscuous mode [ 208.298829][ T5531] CPU: 1 PID: 5531 Comm: syz.0.1935 Not tainted 5.15.189-syzkaller-android13-5.15.189_r00 #0 [ 208.309032][ T5531] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 208.319105][ T5531] Call Trace: [ 208.322400][ T5531] [ 208.325341][ T5531] __dump_stack+0x21/0x30 [ 208.329688][ T5531] dump_stack_lvl+0xee/0x150 [ 208.334307][ T5531] ? show_regs_print_info+0x20/0x20 [ 208.339530][ T5531] dump_stack+0x15/0x20 [ 208.343694][ T5531] should_fail+0x3c1/0x510 [ 208.348120][ T5531] should_fail_alloc_page+0x55/0x80 [ 208.353325][ T5531] prepare_alloc_pages+0x156/0x600 [ 208.358450][ T5531] ? __alloc_pages_bulk+0xab0/0xab0 [ 208.363661][ T5531] ? slab_post_alloc_hook+0x4f/0x2b0 [ 208.369087][ T5531] ? alloc_vmap_area+0x17a/0x1990 [ 208.374126][ T5531] ? __get_vm_area_node+0x14e/0x350 [ 208.379329][ T5531] ? __vmalloc_node_range+0xdf/0xaf0 [ 208.384622][ T5531] ? dev_map_create_hash+0x26/0x1c0 [ 208.389841][ T5531] __alloc_pages+0x10a/0x440 [ 208.394444][ T5531] ? prep_new_page+0x110/0x110 [ 208.399245][ T5531] ? __kasan_check_write+0x14/0x20 [ 208.404375][ T5531] __get_free_pages+0x10/0x30 [ 208.409079][ T5531] kasan_populate_vmalloc_pte+0x29/0x120 [ 208.414730][ T5531] __apply_to_page_range+0x8b0/0xbf0 [ 208.420037][ T5531] ? kasan_populate_vmalloc+0x70/0x70 [ 208.425510][ T5531] ? kasan_populate_vmalloc+0x70/0x70 [ 208.430979][ T5531] apply_to_page_range+0x3b/0x50 [ 208.435929][ T5531] kasan_populate_vmalloc+0x60/0x70 [ 208.441134][ T5531] alloc_vmap_area+0x185c/0x1990 [ 208.446084][ T5531] ? vm_map_ram+0xa60/0xa60 [ 208.450591][ T5531] ? kmem_cache_alloc_trace+0x119/0x270 [ 208.456147][ T5531] __get_vm_area_node+0x14e/0x350 [ 208.461269][ T5531] __vmalloc_node_range+0xdf/0xaf0 [ 208.466388][ T5531] ? dev_map_create_hash+0x26/0x1c0 [ 208.471602][ T5531] bpf_map_area_alloc+0xd5/0xe0 [ 208.476469][ T5531] ? dev_map_create_hash+0x26/0x1c0 [ 208.481686][ T5531] dev_map_create_hash+0x26/0x1c0 [ 208.486732][ T5531] dev_map_alloc+0x2d4/0x560 [ 208.491345][ T5531] map_create+0x455/0x21b0 [ 208.495772][ T5531] __sys_bpf+0x2cf/0x730 [ 208.500027][ T5531] ? bpf_link_show_fdinfo+0x310/0x310 [ 208.505412][ T5531] ? debug_smp_processor_id+0x17/0x20 [ 208.510793][ T5531] __x64_sys_bpf+0x7c/0x90 [ 208.515218][ T5531] x64_sys_call+0x4b9/0x9a0 [ 208.519736][ T5531] do_syscall_64+0x4c/0xa0 [ 208.524167][ T5531] ? clear_bhb_loop+0x50/0xa0 [ 208.528859][ T5531] ? clear_bhb_loop+0x50/0xa0 [ 208.533643][ T5531] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 208.539554][ T5531] RIP: 0033:0x7f59704aebe9 [ 208.543981][ T5531] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 208.563684][ T5531] RSP: 002b:00007f596ef17038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 208.572115][ T5531] RAX: ffffffffffffffda RBX: 00007f59706d5fa0 RCX: 00007f59704aebe9 [ 208.580099][ T5531] RDX: 0000000000000048 RSI: 0000200000000580 RDI: 0000000000000000 [ 208.588165][ T5531] RBP: 00007f596ef17090 R08: 0000000000000000 R09: 0000000000000000 [ 208.596257][ T5531] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 208.604329][ T5531] R13: 00007f59706d6038 R14: 00007f59706d5fa0 R15: 00007ffe2f786058 [ 208.612422][ T5531] [ 209.252069][ T5568] device sit0 entered promiscuous mode [ 210.000884][ T5611] device veth0_vlan left promiscuous mode [ 210.007376][ T5611] device veth0_vlan entered promiscuous mode [ 210.247237][ T5622] FAULT_INJECTION: forcing a failure. [ 210.247237][ T5622] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 210.269533][ T5622] CPU: 1 PID: 5622 Comm: syz.1.1968 Not tainted 5.15.189-syzkaller-android13-5.15.189_r00 #0 [ 210.279855][ T5622] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 210.290010][ T5622] Call Trace: [ 210.293303][ T5622] [ 210.296233][ T5622] __dump_stack+0x21/0x30 [ 210.300567][ T5622] dump_stack_lvl+0xee/0x150 [ 210.305437][ T5622] ? show_regs_print_info+0x20/0x20 [ 210.310654][ T5622] dump_stack+0x15/0x20 [ 210.314815][ T5622] should_fail+0x3c1/0x510 [ 210.319245][ T5622] should_fail_alloc_page+0x55/0x80 [ 210.324456][ T5622] prepare_alloc_pages+0x156/0x600 [ 210.329583][ T5622] ? __alloc_pages_bulk+0xab0/0xab0 [ 210.334777][ T5622] ? __alloc_pages_bulk+0x47f/0xab0 [ 210.339970][ T5622] __alloc_pages+0x10a/0x440 [ 210.344557][ T5622] ? prep_new_page+0x110/0x110 [ 210.349312][ T5622] ? __vmalloc_node_range+0x375/0xaf0 [ 210.354676][ T5622] __vmalloc_node_range+0x505/0xaf0 [ 210.359868][ T5622] bpf_map_area_alloc+0xd5/0xe0 [ 210.364715][ T5622] ? htab_map_alloc+0xb29/0x14f0 [ 210.369735][ T5622] htab_map_alloc+0xb29/0x14f0 [ 210.374495][ T5622] map_create+0x455/0x21b0 [ 210.378909][ T5622] __sys_bpf+0x2cf/0x730 [ 210.383221][ T5622] ? bpf_link_show_fdinfo+0x310/0x310 [ 210.388698][ T5622] ? debug_smp_processor_id+0x17/0x20 [ 210.394090][ T5622] __x64_sys_bpf+0x7c/0x90 [ 210.398684][ T5622] x64_sys_call+0x4b9/0x9a0 [ 210.403189][ T5622] do_syscall_64+0x4c/0xa0 [ 210.407599][ T5622] ? clear_bhb_loop+0x50/0xa0 [ 210.412287][ T5622] ? clear_bhb_loop+0x50/0xa0 [ 210.416993][ T5622] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 210.422901][ T5622] RIP: 0033:0x7fb072a8fbe9 [ 210.427410][ T5622] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 210.447022][ T5622] RSP: 002b:00007fb0714f8038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 210.455491][ T5622] RAX: ffffffffffffffda RBX: 00007fb072cb6fa0 RCX: 00007fb072a8fbe9 [ 210.463472][ T5622] RDX: 0000000000000050 RSI: 0000200000000380 RDI: 0000000000000000 [ 210.471440][ T5622] RBP: 00007fb0714f8090 R08: 0000000000000000 R09: 0000000000000000 [ 210.479402][ T5622] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 210.487369][ T5622] R13: 00007fb072cb7038 R14: 00007fb072cb6fa0 R15: 00007ffd9cbe7b68 [ 210.495429][ T5622] [ 211.203311][ T5661] FAULT_INJECTION: forcing a failure. [ 211.203311][ T5661] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 211.235042][ T5661] CPU: 1 PID: 5661 Comm: syz.3.1981 Not tainted 5.15.189-syzkaller-android13-5.15.189_r00 #0 [ 211.245265][ T5661] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 211.255343][ T5661] Call Trace: [ 211.258638][ T5661] [ 211.261605][ T5661] __dump_stack+0x21/0x30 [ 211.265964][ T5661] dump_stack_lvl+0xee/0x150 [ 211.270574][ T5661] ? show_regs_print_info+0x20/0x20 [ 211.275798][ T5661] dump_stack+0x15/0x20 [ 211.279980][ T5661] should_fail+0x3c1/0x510 [ 211.284418][ T5661] should_fail_alloc_page+0x55/0x80 [ 211.289637][ T5661] prepare_alloc_pages+0x156/0x600 [ 211.294761][ T5661] ? __alloc_pages_bulk+0xab0/0xab0 [ 211.299964][ T5661] ? __alloc_pages_bulk+0x47f/0xab0 [ 211.305156][ T5661] __alloc_pages+0x10a/0x440 [ 211.309741][ T5661] ? prep_new_page+0x110/0x110 [ 211.314498][ T5661] ? __vmalloc_node_range+0x375/0xaf0 [ 211.319869][ T5661] __vmalloc_node_range+0x505/0xaf0 [ 211.325064][ T5661] bpf_map_area_alloc+0xd5/0xe0 [ 211.329917][ T5661] ? htab_map_alloc+0xb29/0x14f0 [ 211.334848][ T5661] htab_map_alloc+0xb29/0x14f0 [ 211.339613][ T5661] map_create+0x455/0x21b0 [ 211.344025][ T5661] __sys_bpf+0x2cf/0x730 [ 211.348262][ T5661] ? bpf_link_show_fdinfo+0x310/0x310 [ 211.353631][ T5661] ? debug_smp_processor_id+0x17/0x20 [ 211.359000][ T5661] __x64_sys_bpf+0x7c/0x90 [ 211.363414][ T5661] x64_sys_call+0x4b9/0x9a0 [ 211.367910][ T5661] do_syscall_64+0x4c/0xa0 [ 211.372323][ T5661] ? clear_bhb_loop+0x50/0xa0 [ 211.376993][ T5661] ? clear_bhb_loop+0x50/0xa0 [ 211.381665][ T5661] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 211.387549][ T5661] RIP: 0033:0x7f26618d9be9 [ 211.391955][ T5661] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 211.411669][ T5661] RSP: 002b:00007f2660342038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 211.420180][ T5661] RAX: ffffffffffffffda RBX: 00007f2661b00fa0 RCX: 00007f26618d9be9 [ 211.428341][ T5661] RDX: 0000000000000050 RSI: 0000200000000380 RDI: 0000000000000000 [ 211.436307][ T5661] RBP: 00007f2660342090 R08: 0000000000000000 R09: 0000000000000000 [ 211.444273][ T5661] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 211.452329][ T5661] R13: 00007f2661b01038 R14: 00007f2661b00fa0 R15: 00007ffc95147e98 [ 211.460761][ T5661] [ 211.596368][ T5683] FAULT_INJECTION: forcing a failure. [ 211.596368][ T5683] name failslab, interval 1, probability 0, space 0, times 0 [ 211.632630][ T5683] CPU: 0 PID: 5683 Comm: syz.3.1989 Not tainted 5.15.189-syzkaller-android13-5.15.189_r00 #0 [ 211.642842][ T5683] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 211.653009][ T5683] Call Trace: [ 211.656415][ T5683] [ 211.659365][ T5683] __dump_stack+0x21/0x30 [ 211.663721][ T5683] dump_stack_lvl+0xee/0x150 [ 211.668337][ T5683] ? show_regs_print_info+0x20/0x20 [ 211.673571][ T5683] dump_stack+0x15/0x20 [ 211.677807][ T5683] should_fail+0x3c1/0x510 [ 211.682253][ T5683] __should_failslab+0xa4/0xe0 [ 211.687040][ T5683] should_failslab+0x9/0x20 [ 211.691647][ T5683] slab_pre_alloc_hook+0x3b/0xe0 [ 211.696608][ T5683] ? sk_prot_alloc+0x5f/0x320 [ 211.701312][ T5683] kmem_cache_alloc+0x44/0x260 [ 211.706109][ T5683] sk_prot_alloc+0x5f/0x320 [ 211.710639][ T5683] ? __sanitizer_cov_trace_pc+0x1/0x60 [ 211.716118][ T5683] sk_alloc+0x38/0x430 [ 211.720205][ T5683] unix_create1+0xb7/0x610 [ 211.724636][ T5683] unix_create+0x15c/0x220 [ 211.729077][ T5683] __sock_create+0x38d/0x7a0 [ 211.733684][ T5683] __sys_socketpair+0x218/0x590 [ 211.738560][ T5683] __x64_sys_socketpair+0x9b/0xb0 [ 211.743607][ T5683] x64_sys_call+0x36/0x9a0 [ 211.748151][ T5683] do_syscall_64+0x4c/0xa0 [ 211.752591][ T5683] ? clear_bhb_loop+0x50/0xa0 [ 211.757297][ T5683] ? clear_bhb_loop+0x50/0xa0 [ 211.761998][ T5683] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 211.767914][ T5683] RIP: 0033:0x7f26618d9be9 [ 211.772354][ T5683] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 211.791982][ T5683] RSP: 002b:00007f2660342038 EFLAGS: 00000246 ORIG_RAX: 0000000000000035 [ 211.800419][ T5683] RAX: ffffffffffffffda RBX: 00007f2661b00fa0 RCX: 00007f26618d9be9 [ 211.808415][ T5683] RDX: 0000000000000000 RSI: 0000000000000001 RDI: 0000000000000001 [ 211.816595][ T5683] RBP: 00007f2660342090 R08: 0000000000000000 R09: 0000000000000000 [ 211.824587][ T5683] R10: 0000200000000000 R11: 0000000000000246 R12: 0000000000000001 [ 211.832578][ T5683] R13: 00007f2661b01038 R14: 00007f2661b00fa0 R15: 00007ffc95147e98 [ 211.840583][ T5683] [ 213.390642][ T5767] syz.2.2021[5767] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 213.390711][ T5767] syz.2.2021[5767] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 213.502281][ T5779] FAULT_INJECTION: forcing a failure. [ 213.502281][ T5779] name failslab, interval 1, probability 0, space 0, times 0 [ 213.531972][ T5779] CPU: 0 PID: 5779 Comm: syz.4.2025 Not tainted 5.15.189-syzkaller-android13-5.15.189_r00 #0 [ 213.542167][ T5779] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 213.552228][ T5779] Call Trace: [ 213.555505][ T5779] [ 213.558434][ T5779] __dump_stack+0x21/0x30 [ 213.562774][ T5779] dump_stack_lvl+0xee/0x150 [ 213.567360][ T5779] ? show_regs_print_info+0x20/0x20 [ 213.572557][ T5779] dump_stack+0x15/0x20 [ 213.576708][ T5779] should_fail+0x3c1/0x510 [ 213.581116][ T5779] ? ppp_write+0xb6/0x3b0 [ 213.585448][ T5779] __should_failslab+0xa4/0xe0 [ 213.590232][ T5779] should_failslab+0x9/0x20 [ 213.594746][ T5779] slab_pre_alloc_hook+0x3b/0xe0 [ 213.599686][ T5779] ? ppp_write+0xb6/0x3b0 [ 213.604012][ T5779] ? ppp_write+0xb6/0x3b0 [ 213.608332][ T5779] __kmalloc_track_caller+0x6c/0x2c0 [ 213.613612][ T5779] ? ppp_write+0xb6/0x3b0 [ 213.618117][ T5779] ? ppp_write+0xb6/0x3b0 [ 213.622437][ T5779] __alloc_skb+0x21a/0x740 [ 213.626849][ T5779] ppp_write+0xb6/0x3b0 [ 213.631005][ T5779] ? security_file_permission+0x83/0xa0 [ 213.636717][ T5779] ? ppp_read+0x6f0/0x6f0 [ 213.641069][ T5779] vfs_write+0x3ee/0xf70 [ 213.645307][ T5779] ? file_end_write+0x1b0/0x1b0 [ 213.650152][ T5779] ? __fget_files+0x2c4/0x320 [ 213.654913][ T5779] ? __fdget_pos+0x1f7/0x380 [ 213.659502][ T5779] ? ksys_write+0x71/0x240 [ 213.663996][ T5779] ksys_write+0x140/0x240 [ 213.668319][ T5779] ? __ia32_sys_read+0x90/0x90 [ 213.673080][ T5779] ? __bpf_trace_sys_enter+0x62/0x70 [ 213.678445][ T5779] ? __traceiter_sys_enter+0x2a/0x40 [ 213.683724][ T5779] __x64_sys_write+0x7b/0x90 [ 213.688307][ T5779] x64_sys_call+0x8ef/0x9a0 [ 213.692802][ T5779] do_syscall_64+0x4c/0xa0 [ 213.697212][ T5779] ? clear_bhb_loop+0x50/0xa0 [ 213.701884][ T5779] ? clear_bhb_loop+0x50/0xa0 [ 213.706747][ T5779] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 213.712726][ T5779] RIP: 0033:0x7fc93ee10be9 [ 213.717137][ T5779] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 213.736740][ T5779] RSP: 002b:00007fc93d879038 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 213.745149][ T5779] RAX: ffffffffffffffda RBX: 00007fc93f037fa0 RCX: 00007fc93ee10be9 [ 213.753203][ T5779] RDX: 0000000000000009 RSI: 0000200000000280 RDI: 0000000000000007 [ 213.761173][ T5779] RBP: 00007fc93d879090 R08: 0000000000000000 R09: 0000000000000000 [ 213.769139][ T5779] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 213.777194][ T5779] R13: 00007fc93f038038 R14: 00007fc93f037fa0 R15: 00007ffc89e2a018 [ 213.785168][ T5779] [ 214.195145][ T5812] device sit0 left promiscuous mode [ 214.286666][ T5812] device sit0 entered promiscuous mode [ 214.770680][ T5842] device wg2 entered promiscuous mode [ 215.027331][ T30] audit: type=1400 audit(1756440397.595:139): avc: denied { create } for pid=5854 comm="syz.1.2056" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=caif_socket permissive=1 [ 215.310322][ T5876] FAULT_INJECTION: forcing a failure. [ 215.310322][ T5876] name failslab, interval 1, probability 0, space 0, times 0 [ 215.323152][ T5876] CPU: 1 PID: 5876 Comm: syz.4.2066 Not tainted 5.15.189-syzkaller-android13-5.15.189_r00 #0 [ 215.333409][ T5876] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 215.343565][ T5876] Call Trace: [ 215.346883][ T5876] [ 215.349834][ T5876] __dump_stack+0x21/0x30 [ 215.354194][ T5876] dump_stack_lvl+0xee/0x150 [ 215.358800][ T5876] ? show_regs_print_info+0x20/0x20 [ 215.364017][ T5876] ? __kernel_text_address+0xa0/0x100 [ 215.369574][ T5876] dump_stack+0x15/0x20 [ 215.373738][ T5876] should_fail+0x3c1/0x510 [ 215.378169][ T5876] __should_failslab+0xa4/0xe0 [ 215.383040][ T5876] should_failslab+0x9/0x20 [ 215.387549][ T5876] slab_pre_alloc_hook+0x3b/0xe0 [ 215.392498][ T5876] ? dst_alloc+0x15c/0x1d0 [ 215.396923][ T5876] kmem_cache_alloc+0x44/0x260 [ 215.401685][ T5876] dst_alloc+0x15c/0x1d0 [ 215.405924][ T5876] ip_route_output_key_hash_rcu+0x11db/0x2060 [ 215.411988][ T5876] ip_route_output_flow+0x123/0x2d0 [ 215.417184][ T5876] ? ipv4_sk_update_pmtu+0x1320/0x1320 [ 215.422824][ T5876] ip_tunnel_xmit+0x6c0/0x21c0 [ 215.427587][ T5876] ? ip_tunnel_xmit+0x50/0x21c0 [ 215.432428][ T5876] ? unwind_get_return_address+0x4d/0x90 [ 215.438067][ T5876] ? ip4_dst_hoplimit+0x110/0x110 [ 215.443109][ T5876] ? skb_network_protocol+0x501/0x740 [ 215.448587][ T5876] ? gre_build_header+0x229/0x850 [ 215.453703][ T5876] ipgre_xmit+0x7c0/0xb30 [ 215.458044][ T5876] dev_hard_start_xmit+0x244/0x670 [ 215.463184][ T5876] __dev_queue_xmit+0x17bd/0x2d80 [ 215.468224][ T5876] ? dev_queue_xmit+0x20/0x20 [ 215.472986][ T5876] ? __kasan_check_write+0x14/0x20 [ 215.478178][ T5876] ? skb_release_data+0x1c6/0xa10 [ 215.483201][ T5876] ? __kasan_check_write+0x14/0x20 [ 215.488305][ T5876] ? pskb_expand_head+0xbe6/0x11d0 [ 215.493416][ T5876] dev_queue_xmit+0x17/0x20 [ 215.497916][ T5876] __bpf_redirect+0x68a/0xe60 [ 215.502592][ T5876] bpf_clone_redirect+0x242/0x380 [ 215.507614][ T5876] bpf_prog_973cd02a7a0e8181+0x56/0x8a8 [ 215.513156][ T5876] ? __kasan_slab_alloc+0xcf/0xf0 [ 215.518180][ T5876] ? __kasan_slab_alloc+0xbd/0xf0 [ 215.523196][ T5876] ? slab_post_alloc_hook+0x4f/0x2b0 [ 215.528476][ T5876] ? kmem_cache_alloc+0xf7/0x260 [ 215.533408][ T5876] ? __build_skb+0x2d/0x310 [ 215.537904][ T5876] ? build_skb+0x24/0x200 [ 215.542229][ T5876] ? bpf_prog_test_run_skb+0x279/0x1150 [ 215.547768][ T5876] ? bpf_prog_test_run+0x3d5/0x620 [ 215.552884][ T5876] ? __sys_bpf+0x52c/0x730 [ 215.557295][ T5876] ? __x64_sys_bpf+0x7c/0x90 [ 215.561879][ T5876] ? x64_sys_call+0x4b9/0x9a0 [ 215.566653][ T5876] ? do_syscall_64+0x4c/0xa0 [ 215.571265][ T5876] ? entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 215.577347][ T5876] ? ktime_get+0x12f/0x160 [ 215.581770][ T5876] bpf_test_run+0x33d/0x8d0 [ 215.586273][ T5876] ? convert___skb_to_skb+0x4f0/0x4f0 [ 215.591665][ T5876] ? eth_get_headlen+0x1f0/0x1f0 [ 215.596596][ T5876] ? convert___skb_to_skb+0x41/0x4f0 [ 215.601964][ T5876] bpf_prog_test_run_skb+0x9ec/0x1150 [ 215.607334][ T5876] ? __bpf_prog_test_run_raw_tp+0x2b0/0x2b0 [ 215.613220][ T5876] bpf_prog_test_run+0x3d5/0x620 [ 215.618325][ T5876] ? bpf_prog_query+0x230/0x230 [ 215.623177][ T5876] ? selinux_bpf+0xce/0xf0 [ 215.627590][ T5876] ? security_bpf+0x82/0xa0 [ 215.632087][ T5876] __sys_bpf+0x52c/0x730 [ 215.636407][ T5876] ? bpf_link_show_fdinfo+0x310/0x310 [ 215.641775][ T5876] ? debug_smp_processor_id+0x17/0x20 [ 215.647141][ T5876] __x64_sys_bpf+0x7c/0x90 [ 215.651548][ T5876] x64_sys_call+0x4b9/0x9a0 [ 215.656046][ T5876] do_syscall_64+0x4c/0xa0 [ 215.660460][ T5876] ? clear_bhb_loop+0x50/0xa0 [ 215.665138][ T5876] ? clear_bhb_loop+0x50/0xa0 [ 215.669821][ T5876] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 215.675721][ T5876] RIP: 0033:0x7fc93ee10be9 [ 215.680135][ T5876] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 215.699737][ T5876] RSP: 002b:00007fc93d879038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 215.708228][ T5876] RAX: ffffffffffffffda RBX: 00007fc93f037fa0 RCX: 00007fc93ee10be9 [ 215.716193][ T5876] RDX: 000000000000002c RSI: 0000200000000080 RDI: 000000000000000a [ 215.724159][ T5876] RBP: 00007fc93d879090 R08: 0000000000000000 R09: 0000000000000000 [ 215.732131][ T5876] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 215.740095][ T5876] R13: 00007fc93f038038 R14: 00007fc93f037fa0 R15: 00007ffc89e2a018 [ 215.748155][ T5876] [ 215.850572][ T5880] device sit0 left promiscuous mode [ 215.991080][ T5887] device sit0 entered promiscuous mode [ 216.173819][ T5902] device veth0_vlan left promiscuous mode [ 216.182650][ T5902] device veth0_vlan entered promiscuous mode [ 216.428825][ T5919] bond_slave_1: mtu less than device minimum [ 216.535974][ T5924] device syzkaller0 entered promiscuous mode [ 218.563331][ C0] sched: RT throttling activated [ 221.620969][ T5975] device veth0_vlan left promiscuous mode [ 221.634138][ T5975] device veth0_vlan entered promiscuous mode [ 221.664083][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 221.672435][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 221.687294][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 221.970241][ T6009] device veth0_vlan left promiscuous mode [ 221.998498][ T6009] device veth0_vlan entered promiscuous mode [ 222.058883][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 222.067372][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 222.081480][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿþ€: link becomes ready [ 222.592900][ T6032] bond_slave_1: mtu less than device minimum [ 222.872296][ T6040] device veth0_vlan left promiscuous mode [ 222.890028][ T6040] device veth0_vlan entered promiscuous mode [ 222.945077][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 222.956542][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 222.984301][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 223.554033][ T6072] FAULT_INJECTION: forcing a failure. [ 223.554033][ T6072] name failslab, interval 1, probability 0, space 0, times 0 [ 223.567231][ T6072] CPU: 1 PID: 6072 Comm: syz.3.2146 Not tainted 5.15.189-syzkaller-android13-5.15.189_r00 #0 [ 223.577413][ T6072] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 223.587487][ T6072] Call Trace: [ 223.590784][ T6072] [ 223.593817][ T6072] __dump_stack+0x21/0x30 [ 223.598156][ T6072] dump_stack_lvl+0xee/0x150 [ 223.602751][ T6072] ? show_regs_print_info+0x20/0x20 [ 223.607963][ T6072] dump_stack+0x15/0x20 [ 223.612135][ T6072] should_fail+0x3c1/0x510 [ 223.616552][ T6072] __should_failslab+0xa4/0xe0 [ 223.621421][ T6072] should_failslab+0x9/0x20 [ 223.625952][ T6072] slab_pre_alloc_hook+0x3b/0xe0 [ 223.630907][ T6072] ? __alloc_skb+0xe0/0x740 [ 223.635424][ T6072] kmem_cache_alloc+0x44/0x260 [ 223.640201][ T6072] __alloc_skb+0xe0/0x740 [ 223.644550][ T6072] fdb_notify+0x78/0x130 [ 223.648802][ T6072] fdb_delete+0x896/0xb00 [ 223.653143][ T6072] fdb_delete_local+0x3c8/0x480 [ 223.658003][ T6072] br_fdb_changeaddr+0x1b3/0x1c0 [ 223.662948][ T6072] br_device_event+0x335/0x790 [ 223.667734][ T6072] ? br_boolopt_multi_get+0xf0/0xf0 [ 223.672943][ T6072] ? packet_notifier+0x8bc/0x8d0 [ 223.677892][ T6072] ? addrconf_notify+0x37b/0xde0 [ 223.682840][ T6072] raw_notifier_call_chain+0x90/0x100 [ 223.688253][ T6072] dev_set_mac_address+0x318/0x420 [ 223.693469][ T6072] ? dev_pre_changeaddr_notify+0x1c0/0x1c0 [ 223.699301][ T6072] ? dev_set_mac_address_user+0x17/0x50 [ 223.704865][ T6072] dev_set_mac_address_user+0x31/0x50 [ 223.710524][ T6072] dev_ifsioc+0x757/0xe70 [ 223.714964][ T6072] ? dev_ioctl+0xd10/0xd10 [ 223.719400][ T6072] ? __kasan_check_write+0x14/0x20 [ 223.724521][ T6072] ? mutex_lock+0x95/0x1a0 [ 223.728945][ T6072] ? wait_for_completion_killable_timeout+0x10/0x10 [ 223.735566][ T6072] ? dev_get_by_name_rcu+0xc8/0xf0 [ 223.740694][ T6072] dev_ioctl+0x560/0xd10 [ 223.744949][ T6072] sock_do_ioctl+0x22e/0x300 [ 223.749560][ T6072] ? sock_show_fdinfo+0xa0/0xa0 [ 223.754421][ T6072] ? selinux_file_ioctl+0x377/0x480 [ 223.759632][ T6072] ? ktime_get+0x12f/0x160 [ 223.764053][ T6072] ? lapic_next_event+0x5f/0x70 [ 223.768914][ T6072] sock_ioctl+0x4bc/0x6b0 [ 223.773261][ T6072] ? sock_poll+0x3d0/0x3d0 [ 223.777688][ T6072] ? __fget_files+0x2c4/0x320 [ 223.782381][ T6072] ? security_file_ioctl+0x84/0xa0 [ 223.787506][ T6072] ? sock_poll+0x3d0/0x3d0 [ 223.792092][ T6072] __se_sys_ioctl+0x121/0x1a0 [ 223.796773][ T6072] __x64_sys_ioctl+0x7b/0x90 [ 223.801371][ T6072] x64_sys_call+0x2f/0x9a0 [ 223.805797][ T6072] do_syscall_64+0x4c/0xa0 [ 223.810220][ T6072] ? clear_bhb_loop+0x50/0xa0 [ 223.814910][ T6072] ? clear_bhb_loop+0x50/0xa0 [ 223.819599][ T6072] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 223.825620][ T6072] RIP: 0033:0x7f26618d9be9 [ 223.830057][ T6072] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 223.849703][ T6072] RSP: 002b:00007f2660342038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 223.858223][ T6072] RAX: ffffffffffffffda RBX: 00007f2661b00fa0 RCX: 00007f26618d9be9 [ 223.866214][ T6072] RDX: 0000200000000000 RSI: 0000000000008924 RDI: 000000000000000a [ 223.874287][ T6072] RBP: 00007f2660342090 R08: 0000000000000000 R09: 0000000000000000 [ 223.882262][ T6072] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 223.890240][ T6072] R13: 00007f2661b01038 R14: 00007f2661b00fa0 R15: 00007ffc95147e98 [ 223.898317][ T6072] [ 225.504632][ T6143] FAULT_INJECTION: forcing a failure. [ 225.504632][ T6143] name failslab, interval 1, probability 0, space 0, times 0 [ 225.510487][ T6138] FAULT_INJECTION: forcing a failure. [ 225.510487][ T6138] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 225.539246][ T6143] CPU: 1 PID: 6143 Comm: syz.2.2176 Not tainted 5.15.189-syzkaller-android13-5.15.189_r00 #0 [ 225.549464][ T6143] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 225.559861][ T6143] Call Trace: [ 225.563160][ T6143] [ 225.566108][ T6143] __dump_stack+0x21/0x30 [ 225.570463][ T6143] dump_stack_lvl+0xee/0x150 [ 225.575089][ T6143] ? show_regs_print_info+0x20/0x20 [ 225.580305][ T6143] ? avc_denied+0x1b0/0x1b0 [ 225.584830][ T6143] dump_stack+0x15/0x20 [ 225.588994][ T6143] should_fail+0x3c1/0x510 [ 225.593417][ T6143] __should_failslab+0xa4/0xe0 [ 225.598191][ T6143] should_failslab+0x9/0x20 [ 225.602746][ T6143] slab_pre_alloc_hook+0x3b/0xe0 [ 225.607788][ T6143] ? vm_area_dup+0x26/0x210 [ 225.612325][ T6143] kmem_cache_alloc+0x44/0x260 [ 225.617099][ T6143] vm_area_dup+0x26/0x210 [ 225.621447][ T6143] copy_mm+0x93a/0x1390 [ 225.625615][ T6143] ? copy_signal+0x600/0x600 [ 225.630213][ T6143] ? __init_rwsem+0xfc/0x1d0 [ 225.634816][ T6143] ? copy_signal+0x4cb/0x600 [ 225.639416][ T6143] copy_process+0x115c/0x3210 [ 225.644111][ T6143] ? __kasan_check_write+0x14/0x20 [ 225.649232][ T6143] ? __pidfd_prepare+0x150/0x150 [ 225.654179][ T6143] ? security_file_permission+0x83/0xa0 [ 225.659739][ T6143] kernel_clone+0x23f/0x940 [ 225.664272][ T6143] ? create_io_thread+0x130/0x130 [ 225.669310][ T6143] ? __kasan_check_write+0x14/0x20 [ 225.674432][ T6143] ? mutex_unlock+0x89/0x220 [ 225.679034][ T6143] __x64_sys_clone+0x176/0x1d0 [ 225.683809][ T6143] ? __kasan_check_write+0x14/0x20 [ 225.688929][ T6143] ? __ia32_sys_vfork+0xf0/0xf0 [ 225.693797][ T6143] ? fpregs_assert_state_consistent+0xb1/0xe0 [ 225.699879][ T6143] x64_sys_call+0x41f/0x9a0 [ 225.704393][ T6143] do_syscall_64+0x4c/0xa0 [ 225.708821][ T6143] ? clear_bhb_loop+0x50/0xa0 [ 225.713509][ T6143] ? clear_bhb_loop+0x50/0xa0 [ 225.718195][ T6143] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 225.724101][ T6143] RIP: 0033:0x7fd58126fbe9 [ 225.728540][ T6143] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 225.748166][ T6143] RSP: 002b:00007fd57fcd7fe8 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 225.756596][ T6143] RAX: ffffffffffffffda RBX: 00007fd581496fa0 RCX: 00007fd58126fbe9 [ 225.764575][ T6143] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00000000640c7000 [ 225.772556][ T6143] RBP: 00007fd57fcd8090 R08: 0000000000000000 R09: 0000000000000000 [ 225.780532][ T6143] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000002 [ 225.788513][ T6143] R13: 00007fd581497038 R14: 00007fd581496fa0 R15: 00007ffc249d26f8 [ 225.796498][ T6143] [ 225.800773][ T6138] CPU: 1 PID: 6138 Comm: syz.1.2173 Not tainted 5.15.189-syzkaller-android13-5.15.189_r00 #0 [ 225.810950][ T6138] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 225.821015][ T6138] Call Trace: [ 225.824299][ T6138] [ 225.827324][ T6138] __dump_stack+0x21/0x30 [ 225.831671][ T6138] dump_stack_lvl+0xee/0x150 [ 225.836270][ T6138] ? show_regs_print_info+0x20/0x20 [ 225.841567][ T6138] ? bpf_cgroup_storage_free+0x8f/0xb0 [ 225.847045][ T6138] dump_stack+0x15/0x20 [ 225.851213][ T6138] should_fail+0x3c1/0x510 [ 225.855724][ T6138] should_fail_usercopy+0x1a/0x20 [ 225.860845][ T6138] _copy_to_user+0x20/0x90 [ 225.865273][ T6138] bpf_test_finish+0x1ae/0x3b0 [ 225.870052][ T6138] ? convert_skb_to___skb+0x360/0x360 [ 225.875435][ T6138] ? convert_skb_to___skb+0x203/0x360 [ 225.880818][ T6138] bpf_prog_test_run_skb+0xbba/0x1150 [ 225.886201][ T6138] ? __bpf_prog_test_run_raw_tp+0x2b0/0x2b0 [ 225.892103][ T6138] bpf_prog_test_run+0x3d5/0x620 [ 225.897051][ T6138] ? bpf_prog_query+0x230/0x230 [ 225.901919][ T6138] ? selinux_bpf+0xce/0xf0 [ 225.906353][ T6138] ? security_bpf+0x82/0xa0 [ 225.910862][ T6138] __sys_bpf+0x52c/0x730 [ 225.915131][ T6138] ? bpf_link_show_fdinfo+0x310/0x310 [ 225.920512][ T6138] ? bpf_trace_run2+0xb5/0x1b0 [ 225.925288][ T6138] ? __bpf_trace_sys_enter+0x62/0x70 [ 225.930589][ T6138] __x64_sys_bpf+0x7c/0x90 [ 225.935013][ T6138] x64_sys_call+0x4b9/0x9a0 [ 225.939531][ T6138] do_syscall_64+0x4c/0xa0 [ 225.943961][ T6138] ? clear_bhb_loop+0x50/0xa0 [ 225.948732][ T6138] ? clear_bhb_loop+0x50/0xa0 [ 225.953434][ T6138] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 225.959358][ T6138] RIP: 0033:0x7fb072a8fbe9 [ 225.963793][ T6138] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 225.983432][ T6138] RSP: 002b:00007fb0714f8038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 225.991867][ T6138] RAX: ffffffffffffffda RBX: 00007fb072cb6fa0 RCX: 00007fb072a8fbe9 [ 225.999947][ T6138] RDX: 0000000000000050 RSI: 0000200000000c40 RDI: 000000000000000a [ 226.007938][ T6138] RBP: 00007fb0714f8090 R08: 0000000000000000 R09: 0000000000000000 [ 226.016030][ T6138] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 226.024103][ T6138] R13: 00007fb072cb7038 R14: 00007fb072cb6fa0 R15: 00007ffd9cbe7b68 [ 226.032093][ T6138] [ 226.200065][ T6157] FAULT_INJECTION: forcing a failure. [ 226.200065][ T6157] name failslab, interval 1, probability 0, space 0, times 0 [ 226.223538][ T6157] CPU: 1 PID: 6157 Comm: syz.0.2182 Not tainted 5.15.189-syzkaller-android13-5.15.189_r00 #0 [ 226.233820][ T6157] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 226.243893][ T6157] Call Trace: [ 226.247187][ T6157] [ 226.250135][ T6157] __dump_stack+0x21/0x30 [ 226.254494][ T6157] dump_stack_lvl+0xee/0x150 [ 226.259192][ T6157] ? show_regs_print_info+0x20/0x20 [ 226.264421][ T6157] dump_stack+0x15/0x20 [ 226.268595][ T6157] should_fail+0x3c1/0x510 [ 226.273021][ T6157] __should_failslab+0xa4/0xe0 [ 226.277885][ T6157] should_failslab+0x9/0x20 [ 226.282402][ T6157] slab_pre_alloc_hook+0x3b/0xe0 [ 226.287630][ T6157] ? sk_prot_alloc+0x5f/0x320 [ 226.292315][ T6157] kmem_cache_alloc+0x44/0x260 [ 226.297095][ T6157] ? sysvec_apic_timer_interrupt+0x64/0xc0 [ 226.302915][ T6157] sk_prot_alloc+0x5f/0x320 [ 226.307427][ T6157] sk_alloc+0x38/0x430 [ 226.311506][ T6157] inet6_create+0x5c4/0x1020 [ 226.316107][ T6157] __sock_create+0x38d/0x7a0 [ 226.320717][ T6157] __sys_socketpair+0x1a1/0x590 [ 226.325574][ T6157] __x64_sys_socketpair+0x9b/0xb0 [ 226.330627][ T6157] x64_sys_call+0x36/0x9a0 [ 226.335063][ T6157] do_syscall_64+0x4c/0xa0 [ 226.339489][ T6157] ? clear_bhb_loop+0x50/0xa0 [ 226.344179][ T6157] ? clear_bhb_loop+0x50/0xa0 [ 226.348864][ T6157] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 226.354768][ T6157] RIP: 0033:0x7f59704aebe9 [ 226.359193][ T6157] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 226.378920][ T6157] RSP: 002b:00007f596ef17038 EFLAGS: 00000246 ORIG_RAX: 0000000000000035 [ 226.387444][ T6157] RAX: ffffffffffffffda RBX: 00007f59706d5fa0 RCX: 00007f59704aebe9 [ 226.395427][ T6157] RDX: 0000000000000011 RSI: 0000000000000002 RDI: 000000000000000a [ 226.403411][ T6157] RBP: 00007f596ef17090 R08: 0000000000000000 R09: 0000000000000000 [ 226.411477][ T6157] R10: 0000200000000100 R11: 0000000000000246 R12: 0000000000000001 [ 226.419571][ T6157] R13: 00007f59706d6038 R14: 00007f59706d5fa0 R15: 00007ffe2f786058 [ 226.427573][ T6157] [ 226.451555][ T6155] device syzkaller0 entered promiscuous mode [ 226.709161][ T6180] FAULT_INJECTION: forcing a failure. [ 226.709161][ T6180] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 226.763483][ T6180] CPU: 0 PID: 6180 Comm: syz.2.2190 Not tainted 5.15.189-syzkaller-android13-5.15.189_r00 #0 [ 226.773768][ T6180] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 226.783830][ T6180] Call Trace: [ 226.787113][ T6180] [ 226.790049][ T6180] __dump_stack+0x21/0x30 [ 226.794393][ T6180] dump_stack_lvl+0xee/0x150 [ 226.799085][ T6180] ? show_regs_print_info+0x20/0x20 [ 226.804377][ T6180] dump_stack+0x15/0x20 [ 226.808650][ T6180] should_fail+0x3c1/0x510 [ 226.813076][ T6180] should_fail_usercopy+0x1a/0x20 [ 226.818107][ T6180] _copy_to_user+0x20/0x90 [ 226.822531][ T6180] simple_read_from_buffer+0xe9/0x160 [ 226.827907][ T6180] proc_fail_nth_read+0x19a/0x210 [ 226.833122][ T6180] ? proc_fault_inject_write+0x2f0/0x2f0 [ 226.838763][ T6180] ? security_file_permission+0x83/0xa0 [ 226.844403][ T6180] ? proc_fault_inject_write+0x2f0/0x2f0 [ 226.850129][ T6180] vfs_read+0x282/0xbe0 [ 226.854300][ T6180] ? kernel_read+0x1f0/0x1f0 [ 226.858896][ T6180] ? __kasan_check_write+0x14/0x20 [ 226.864016][ T6180] ? mutex_lock+0x95/0x1a0 [ 226.868438][ T6180] ? wait_for_completion_killable_timeout+0x10/0x10 [ 226.875032][ T6180] ? __fget_files+0x2c4/0x320 [ 226.879722][ T6180] ? __fdget_pos+0x2d2/0x380 [ 226.884328][ T6180] ? ksys_read+0x71/0x240 [ 226.888662][ T6180] ksys_read+0x140/0x240 [ 226.892910][ T6180] ? vfs_write+0xf70/0xf70 [ 226.897335][ T6180] ? __bpf_trace_sys_enter+0x62/0x70 [ 226.902637][ T6180] ? __traceiter_sys_enter+0x2a/0x40 [ 226.908017][ T6180] __x64_sys_read+0x7b/0x90 [ 226.912523][ T6180] x64_sys_call+0x96d/0x9a0 [ 226.917031][ T6180] do_syscall_64+0x4c/0xa0 [ 226.921453][ T6180] ? clear_bhb_loop+0x50/0xa0 [ 226.926140][ T6180] ? clear_bhb_loop+0x50/0xa0 [ 226.930825][ T6180] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 226.936728][ T6180] RIP: 0033:0x7fd58126e5fc [ 226.941152][ T6180] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 93 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 ef 93 02 00 48 [ 226.960764][ T6180] RSP: 002b:00007fd57fcd8030 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 226.969187][ T6180] RAX: ffffffffffffffda RBX: 00007fd581496fa0 RCX: 00007fd58126e5fc [ 226.977165][ T6180] RDX: 000000000000000f RSI: 00007fd57fcd80a0 RDI: 0000000000000006 [ 226.985148][ T6180] RBP: 00007fd57fcd8090 R08: 0000000000000000 R09: 0000000000000000 [ 226.993122][ T6180] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 227.001100][ T6180] R13: 00007fd581497038 R14: 00007fd581496fa0 R15: 00007ffc249d26f8 [ 227.009083][ T6180] [ 227.425799][ T6208] FAULT_INJECTION: forcing a failure. [ 227.425799][ T6208] name failslab, interval 1, probability 0, space 0, times 0 [ 227.532677][ T6208] CPU: 1 PID: 6208 Comm: syz.0.2200 Not tainted 5.15.189-syzkaller-android13-5.15.189_r00 #0 [ 227.542884][ T6208] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 227.553038][ T6208] Call Trace: [ 227.556322][ T6208] [ 227.559355][ T6208] __dump_stack+0x21/0x30 [ 227.563743][ T6208] dump_stack_lvl+0xee/0x150 [ 227.568349][ T6208] ? show_regs_print_info+0x20/0x20 [ 227.573649][ T6208] ? avc_has_perm_noaudit+0x2f4/0x460 [ 227.579036][ T6208] dump_stack+0x15/0x20 [ 227.583282][ T6208] should_fail+0x3c1/0x510 [ 227.587701][ T6208] __should_failslab+0xa4/0xe0 [ 227.592472][ T6208] should_failslab+0x9/0x20 [ 227.597412][ T6208] slab_pre_alloc_hook+0x3b/0xe0 [ 227.602344][ T6208] ? __alloc_skb+0xe0/0x740 [ 227.606928][ T6208] kmem_cache_alloc+0x44/0x260 [ 227.611691][ T6208] __alloc_skb+0xe0/0x740 [ 227.616107][ T6208] alloc_skb_with_frags+0xa8/0x620 [ 227.621219][ T6208] sock_alloc_send_pskb+0x853/0x980 [ 227.626414][ T6208] ? sock_kzfree_s+0x60/0x60 [ 227.630997][ T6208] ? _raw_spin_lock+0x8e/0xe0 [ 227.635670][ T6208] ? _raw_spin_trylock_bh+0x130/0x130 [ 227.641048][ T6208] ? bpf_prog_8f4d9728dfbc680e+0x21/0xe24 [ 227.646762][ T6208] ? arch_perf_update_userpage+0x3b0/0x3b0 [ 227.652568][ T6208] ? stack_trace_save+0x98/0xe0 [ 227.657412][ T6208] tun_get_user+0x4e6/0x33c0 [ 227.661999][ T6208] ? debug_smp_processor_id+0x17/0x20 [ 227.667369][ T6208] ? tun_do_read+0x1c40/0x1c40 [ 227.672126][ T6208] ? kstrtouint_from_user+0x1a0/0x200 [ 227.677579][ T6208] ? kstrtol_from_user+0x260/0x260 [ 227.682775][ T6208] ? bpf_get_stackid_raw_tp+0x175/0x1b0 [ 227.688314][ T6208] ? avc_policy_seqno+0x1b/0x70 [ 227.693168][ T6208] ? selinux_file_permission+0x2aa/0x510 [ 227.698799][ T6208] tun_chr_write_iter+0x1eb/0x2e0 [ 227.703823][ T6208] vfs_write+0x802/0xf70 [ 227.708151][ T6208] ? file_end_write+0x1b0/0x1b0 [ 227.713004][ T6208] ? __fget_files+0x2c4/0x320 [ 227.717679][ T6208] ? __fdget_pos+0x1f7/0x380 [ 227.722265][ T6208] ? ksys_write+0x71/0x240 [ 227.726679][ T6208] ksys_write+0x140/0x240 [ 227.731000][ T6208] ? __ia32_sys_read+0x90/0x90 [ 227.735759][ T6208] ? __bpf_trace_sys_enter+0x62/0x70 [ 227.741037][ T6208] __x64_sys_write+0x7b/0x90 [ 227.745708][ T6208] x64_sys_call+0x8ef/0x9a0 [ 227.750209][ T6208] do_syscall_64+0x4c/0xa0 [ 227.754622][ T6208] ? clear_bhb_loop+0x50/0xa0 [ 227.759296][ T6208] ? clear_bhb_loop+0x50/0xa0 [ 227.763971][ T6208] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 227.769867][ T6208] RIP: 0033:0x7f59704aebe9 [ 227.774280][ T6208] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 227.793967][ T6208] RSP: 002b:00007f596ef17038 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 227.802385][ T6208] RAX: ffffffffffffffda RBX: 00007f59706d5fa0 RCX: 00007f59704aebe9 [ 227.810438][ T6208] RDX: 000000000000fdef RSI: 0000200000000500 RDI: 00000000000000c8 [ 227.818407][ T6208] RBP: 00007f596ef17090 R08: 0000000000000000 R09: 0000000000000000 [ 227.826373][ T6208] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 227.834343][ T6208] R13: 00007f59706d6038 R14: 00007f59706d5fa0 R15: 00007ffe2f786058 [ 227.842319][ T6208] [ 228.114167][ T6240] FAULT_INJECTION: forcing a failure. [ 228.114167][ T6240] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 228.174334][ T6240] CPU: 1 PID: 6240 Comm: syz.3.2212 Not tainted 5.15.189-syzkaller-android13-5.15.189_r00 #0 [ 228.184540][ T6240] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 228.194790][ T6240] Call Trace: [ 228.198066][ T6240] [ 228.200995][ T6240] __dump_stack+0x21/0x30 [ 228.205327][ T6240] dump_stack_lvl+0xee/0x150 [ 228.209923][ T6240] ? show_regs_print_info+0x20/0x20 [ 228.215120][ T6240] dump_stack+0x15/0x20 [ 228.219272][ T6240] should_fail+0x3c1/0x510 [ 228.223683][ T6240] should_fail_usercopy+0x1a/0x20 [ 228.228699][ T6240] _copy_from_iter+0x21a/0x1050 [ 228.233540][ T6240] ? __kasan_check_write+0x14/0x20 [ 228.238651][ T6240] ? skb_set_owner_w+0x24d/0x370 [ 228.243589][ T6240] ? copy_mc_pipe_to_iter+0x770/0x770 [ 228.248968][ T6240] ? __kernel_text_address+0xa0/0x100 [ 228.254336][ T6240] ? check_stack_object+0x81/0x140 [ 228.259445][ T6240] ? __kasan_check_read+0x11/0x20 [ 228.264461][ T6240] ? __check_object_size+0x2f4/0x3c0 [ 228.269739][ T6240] skb_copy_datagram_from_iter+0xfa/0x6b0 [ 228.275458][ T6240] ? skb_put+0x10e/0x1f0 [ 228.279715][ T6240] tun_get_user+0xc3c/0x33c0 [ 228.284309][ T6240] ? __kasan_poison_slab+0x70/0x70 [ 228.289412][ T6240] ? __kasan_check_write+0x14/0x20 [ 228.294514][ T6240] ? tun_do_read+0x1c40/0x1c40 [ 228.299275][ T6240] ? kstrtouint_from_user+0x1a0/0x200 [ 228.304641][ T6240] ? kstrtol_from_user+0x260/0x260 [ 228.309748][ T6240] ? putname+0x111/0x160 [ 228.313990][ T6240] ? avc_policy_seqno+0x1b/0x70 [ 228.318834][ T6240] ? selinux_file_permission+0x2aa/0x510 [ 228.324460][ T6240] tun_chr_write_iter+0x1eb/0x2e0 [ 228.329480][ T6240] vfs_write+0x802/0xf70 [ 228.333725][ T6240] ? file_end_write+0x1b0/0x1b0 [ 228.338578][ T6240] ? __fget_files+0x2c4/0x320 [ 228.343252][ T6240] ? __fdget_pos+0x1f7/0x380 [ 228.347838][ T6240] ? ksys_write+0x71/0x240 [ 228.352242][ T6240] ksys_write+0x140/0x240 [ 228.356564][ T6240] ? __ia32_sys_read+0x90/0x90 [ 228.361325][ T6240] ? __bpf_trace_sys_enter+0x62/0x70 [ 228.366601][ T6240] __x64_sys_write+0x7b/0x90 [ 228.371193][ T6240] x64_sys_call+0x8ef/0x9a0 [ 228.375730][ T6240] do_syscall_64+0x4c/0xa0 [ 228.380331][ T6240] ? clear_bhb_loop+0x50/0xa0 [ 228.385179][ T6240] ? clear_bhb_loop+0x50/0xa0 [ 228.389856][ T6240] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 228.395744][ T6240] RIP: 0033:0x7f26618d9be9 [ 228.400165][ T6240] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 228.420115][ T6240] RSP: 002b:00007f2660321038 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 228.428540][ T6240] RAX: ffffffffffffffda RBX: 00007f2661b01090 RCX: 00007f26618d9be9 [ 228.436666][ T6240] RDX: 000000000000fdef RSI: 0000200000000280 RDI: 00000000000000c8 [ 228.444812][ T6240] RBP: 00007f2660321090 R08: 0000000000000000 R09: 0000000000000000 [ 228.452878][ T6240] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 228.460851][ T6240] R13: 00007f2661b01128 R14: 00007f2661b01090 R15: 00007ffc95147e98 [ 228.468832][ T6240] [ 231.722126][ T6361] device sit0 entered promiscuous mode [ 233.251922][ T6385] device veth1_macvtap left promiscuous mode [ 233.416467][ T6385] device veth1_macvtap entered promiscuous mode [ 233.435995][ T6385] device macsec0 entered promiscuous mode [ 233.495437][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 233.620325][ T6401] device syzkaller0 entered promiscuous mode [ 234.571292][ T6450] device syzkaller0 entered promiscuous mode [ 241.168094][ T6650] FAULT_INJECTION: forcing a failure. [ 241.168094][ T6650] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 241.183137][ T6650] CPU: 1 PID: 6650 Comm: syz.0.2380 Not tainted 5.15.189-syzkaller-android13-5.15.189_r00 #0 [ 241.193328][ T6650] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 241.203409][ T6650] Call Trace: [ 241.206693][ T6650] [ 241.209637][ T6650] __dump_stack+0x21/0x30 [ 241.213998][ T6650] dump_stack_lvl+0xee/0x150 [ 241.218631][ T6650] ? show_regs_print_info+0x20/0x20 [ 241.223820][ T6650] ? __this_cpu_preempt_check+0x13/0x20 [ 241.229383][ T6650] ? __perf_event_task_sched_in+0x1fb/0x280 [ 241.235276][ T6650] dump_stack+0x15/0x20 [ 241.239431][ T6650] should_fail+0x3c1/0x510 [ 241.243842][ T6650] should_fail_alloc_page+0x55/0x80 [ 241.249033][ T6650] prepare_alloc_pages+0x156/0x600 [ 241.254139][ T6650] ? __alloc_pages_bulk+0xab0/0xab0 [ 241.259339][ T6650] ? pcpu_chunk_refresh_hint+0x7e5/0x930 [ 241.264969][ T6650] __alloc_pages+0x10a/0x440 [ 241.269554][ T6650] ? prep_new_page+0x110/0x110 [ 241.274315][ T6650] pcpu_populate_chunk+0x184/0xcb0 [ 241.279421][ T6650] ? _find_next_bit+0x1b5/0x200 [ 241.284269][ T6650] pcpu_alloc+0xc4d/0x1660 [ 241.288682][ T6650] __alloc_percpu_gfp+0x25/0x30 [ 241.293528][ T6650] bpf_map_alloc_percpu+0xc5/0x150 [ 241.298636][ T6650] htab_map_alloc+0xc1b/0x14f0 [ 241.303405][ T6650] map_create+0x455/0x21b0 [ 241.307830][ T6650] __sys_bpf+0x2cf/0x730 [ 241.312099][ T6650] ? bpf_link_show_fdinfo+0x310/0x310 [ 241.317522][ T6650] ? debug_smp_processor_id+0x17/0x20 [ 241.322903][ T6650] __x64_sys_bpf+0x7c/0x90 [ 241.327404][ T6650] x64_sys_call+0x4b9/0x9a0 [ 241.331902][ T6650] do_syscall_64+0x4c/0xa0 [ 241.336320][ T6650] ? clear_bhb_loop+0x50/0xa0 [ 241.341015][ T6650] ? clear_bhb_loop+0x50/0xa0 [ 241.345707][ T6650] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 241.351708][ T6650] RIP: 0033:0x7f59704aebe9 [ 241.356134][ T6650] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 241.375880][ T6650] RSP: 002b:00007f596ef17038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 241.384306][ T6650] RAX: ffffffffffffffda RBX: 00007f59706d5fa0 RCX: 00007f59704aebe9 [ 241.392276][ T6650] RDX: 0000000000000050 RSI: 0000200000000840 RDI: 0000000000000000 [ 241.400242][ T6650] RBP: 00007f596ef17090 R08: 0000000000000000 R09: 0000000000000000 [ 241.408213][ T6650] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 241.416178][ T6650] R13: 00007f59706d6038 R14: 00007f59706d5fa0 R15: 00007ffe2f786058 [ 241.424159][ T6650] [ 243.591550][ T6749] device syzkaller0 entered promiscuous mode [ 244.264292][ T6783] FAULT_INJECTION: forcing a failure. [ 244.264292][ T6783] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 244.353402][ T6783] CPU: 1 PID: 6783 Comm: syz.4.2432 Not tainted 5.15.189-syzkaller-android13-5.15.189_r00 #0 [ 244.363585][ T6783] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 244.373652][ T6783] Call Trace: [ 244.376943][ T6783] [ 244.379888][ T6783] __dump_stack+0x21/0x30 [ 244.384235][ T6783] dump_stack_lvl+0xee/0x150 [ 244.388829][ T6783] ? show_regs_print_info+0x20/0x20 [ 244.394043][ T6783] ? stack_trace_save+0x98/0xe0 [ 244.398915][ T6783] ? __stack_depot_save+0x34/0x480 [ 244.404053][ T6783] dump_stack+0x15/0x20 [ 244.408226][ T6783] should_fail+0x3c1/0x510 [ 244.412660][ T6783] should_fail_alloc_page+0x55/0x80 [ 244.417877][ T6783] prepare_alloc_pages+0x156/0x600 [ 244.423001][ T6783] ? __alloc_pages_bulk+0xab0/0xab0 [ 244.428215][ T6783] __alloc_pages+0x10a/0x440 [ 244.432919][ T6783] ? prep_new_page+0x110/0x110 [ 244.437696][ T6783] kmalloc_order+0x4c/0x160 [ 244.442206][ T6783] ? memcpy+0x56/0x70 [ 244.446188][ T6783] kmalloc_order_trace+0x18/0xb0 [ 244.451120][ T6783] __kmalloc+0x199/0x2c0 [ 244.455359][ T6783] kvmalloc_node+0x206/0x300 [ 244.459944][ T6783] ? dev_addr_flush+0x230/0x230 [ 244.464798][ T6783] ? vm_mmap+0xb0/0xb0 [ 244.468863][ T6783] ? memset+0x35/0x40 [ 244.472840][ T6783] alloc_netdev_mqs+0x5be/0xc90 [ 244.477686][ T6783] ? tun_not_capable+0x1f0/0x1f0 [ 244.482629][ T6783] tun_set_iff+0x535/0xe00 [ 244.487042][ T6783] __tun_chr_ioctl+0x7e8/0x1eb0 [ 244.491888][ T6783] ? tun_flow_create+0x320/0x320 [ 244.496822][ T6783] ? mutex_unlock+0x89/0x220 [ 244.501411][ T6783] ? __fget_files+0x2c4/0x320 [ 244.506522][ T6783] tun_chr_ioctl+0x2a/0x40 [ 244.510969][ T6783] ? tun_chr_poll+0x720/0x720 [ 244.515815][ T6783] __se_sys_ioctl+0x121/0x1a0 [ 244.520493][ T6783] __x64_sys_ioctl+0x7b/0x90 [ 244.525090][ T6783] x64_sys_call+0x2f/0x9a0 [ 244.529503][ T6783] do_syscall_64+0x4c/0xa0 [ 244.533918][ T6783] ? clear_bhb_loop+0x50/0xa0 [ 244.538593][ T6783] ? clear_bhb_loop+0x50/0xa0 [ 244.543264][ T6783] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 244.549240][ T6783] RIP: 0033:0x7fc93ee10be9 [ 244.553662][ T6783] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 244.573442][ T6783] RSP: 002b:00007fc93d879038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 244.581854][ T6783] RAX: ffffffffffffffda RBX: 00007fc93f037fa0 RCX: 00007fc93ee10be9 [ 244.589824][ T6783] RDX: 0000200000000040 RSI: 00000000400454ca RDI: 0000000000000003 [ 244.598487][ T6783] RBP: 00007fc93d879090 R08: 0000000000000000 R09: 0000000000000000 [ 244.606456][ T6783] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 244.614422][ T6783] R13: 00007fc93f038038 R14: 00007fc93f037fa0 R15: 00007ffc89e2a018 [ 244.622397][ T6783] [ 248.194322][ T6813] device veth1_macvtap left promiscuous mode [ 248.289159][ T6813] device veth1_macvtap entered promiscuous mode [ 248.323042][ T6813] device macsec0 entered promiscuous mode [ 250.782060][ T6879] device syzkaller0 entered promiscuous mode [ 253.291537][ T6975] device syzkaller0 entered promiscuous mode [ 259.405847][ T30] audit: type=1400 audit(1756440441.975:140): avc: denied { create } for pid=7187 comm="syz.3.2597" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1 [ 259.516828][ T283] device syz_tun left promiscuous mode [ 259.539268][ T283] Ÿë: port 1(syz_tun) entered disabled state [ 259.593934][ T283] syz-executor (283) used greatest stack depth: 21792 bytes left [ 259.624116][ T285] syz-executor (285) used greatest stack depth: 21760 bytes left SYZFAIL: repeatedly failed to execute the program proc=5 req=2610 state=1 status=7 (errno 9: Bad file descriptor) [ 259.886567][ T30] audit: type=1400 audit(1756440442.455:141): avc: denied { write } for pid=274 comm="syz-executor" path="pipe:[14053]" dev="pipefs" ino=14053 scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:sshd_t tclass=fifo_file permissive=1 [ 259.985611][ T7191] device syz_tun left promiscuous mode [ 259.991126][ T7191] Ÿë: port 1(syz_tun) entered disabled state [ 260.096996][ T284] syz-executor (284) used greatest stack depth: 20864 bytes left [ 261.014978][ T45] GPL: port 1(erspan0) entered disabled state [ 261.022961][ T45] device erspan0 left promiscuous mode [ 261.028492][ T45] GPL: port 1(erspan0) entered disabled state [ 261.334235][ T45] device bridge_slave_1 left promiscuous mode [ 261.340344][ T45] bridge0: port 2(bridge_slave_1) entered disabled state [ 261.347686][ T45] device bridge_slave_0 left promiscuous mode [ 261.353809][ T45] bridge0: port 1(bridge_slave_0) entered disabled state [ 261.361667][ T45] device veth0_to_team left promiscuous mode [ 261.367931][ T45] GPL: port 2(veth0_to_team) entered disabled state [ 261.374981][ T45] device bridge_slave_1 left promiscuous mode [ 261.381137][ T45] bridge0: port 2(bridge_slave_1) entered disabled state [ 261.388799][ T45] device bridge_slave_0 left promiscuous mode [ 261.395091][ T45] bridge0: port 1(bridge_slave_0) entered disabled state [ 261.402687][ T45] device bridge_slave_1 left promiscuous mode [ 261.408958][ T45] bridge0: port 2(bridge_slave_1) entered disabled state [ 261.416221][ T45] device bridge_slave_0 left promiscuous mode [ 261.422307][ T45] bridge0: port 1(bridge_slave_0) entered disabled state [ 261.430001][ T45] device veth0_to_team left promiscuous mode [ 261.436146][ T45] GPL: port 1(veth0_to_team) entered disabled state [ 261.443576][ T45] device bridge_slave_1 left promiscuous mode [ 261.449781][ T45] bridge0: port 2(bridge_slave_1) entered disabled state [ 261.457277][ T45] device bridge_slave_0 left promiscuous mode [ 261.463413][ T45] bridge0: port 1(bridge_slave_0) entered disabled state [ 261.471309][ T45] device veth1_macvtap left promiscuous mode [ 261.477456][ T45] device veth0_vlan left promiscuous mode [ 261.483353][ T45] device veth0_vlan left promiscuous mode [ 261.489270][ T45] device veth1_macvtap left promiscuous mode [ 261.495538][ T45] device veth1_macvtap left promiscuous mode [ 261.501511][ T45] device veth0_vlan left promiscuous mode