last executing test programs: 4.068109421s ago: executing program 4 (id=10233): bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000001f40)={0xffffffffffffffff, 0x0, 0x0}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0x1e, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="ada3551d0b1dd91c20181100000004000000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000001"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8943, &(0x7f0000000cc0)='lo:\x96o8\x14d\xa1\xba\xda\xd1\xa0J\x12tQ\xb16\xe3\xd7\\b\x8b\x1f\xa1Y\xad4\x90\x9d`\xd2\x98\x00\x00\x00 \'Y\x17]\x15c\xcaR\xdd\x98OC\x89\xff\xe6\x84\xe2\x05\x80w\xd2|D\x8dK\x14Bx\xcbuH\xc2\xeec\xbf<>Y\x1a\xfc\x1f9OB\x81\x89\xb7l\xed}\xe5\x186\xc5q@n\xb4\xb6s\xb0\x00\x00\x00\x00\x02\b\x00\x00\xda\xef\xecE\xec\xd5I\xb2\x9b\xfe\x8d\x90?\x00\xe9\xe4~g:\xc1\xb2ak\x96\xbb\xa7\xe2\xc0\xdc\xf9Q\b\xeb\x01\x00\x00\x00\xd3\r7\x8e\xabd\x0ftp\x82\xae\xd2\x15\x8e+c\xf6\xbf\xe14>\xa6-\xa5c\xde\xd7\xab\xea\x1f\xd5s2\x9cVF\xd5\x18\xfe\x0f\x8f \x01\x00\x00\xb1\x88\xebW_\xa5\xe1\xf6\x8aj\xca\xf8m\xab\xe8\x99\xeb\xe1\xde\x8at\x1c\x80\xfc\xb0\x95\xa2\xa7\xd7,Y]E8\x83X\xf5F\xdc\x88-\xf5\xb0\xb5^\xdb\x1a\xb6\xaa\x14\xe2\rh^J-\xd1\xfc\xfa 6(%\x1c\xb5\xbf\xb6\x90\xb4\xc2\x7f]/\xb3\xe7\xc9\'\x94\xcfIo\xdf\x04\x95\xb5\x06\x84\x1fH>\xda\xc5\x04 \x94\x88\xeb\'\xd4;6\x7f\xd9\x99-\x1b|G\x8d\xd4\xb9%\xaaQ\xa0K\x10\x1f\x9c,\x113\x7f\x03\x93\xe1\xcc\xe7f\r\xf3\xff0\f\x82%_\x92\x8b\xc4\xb9\xd9\xe7\xf2\xe4\xc1i\x03\x9d\xdd\x1bj\xdf\xacg\xe3\xa0S\xd3\x8a\xe1n\x97\xea\xf5\xa0\'\v\xe9\xa0\xf1 f\xaan\xcf\xb5i\xb6d\xbc\x92\v\xd58\x16\b\xb3_:\xa4!\ny\xc4&\nWMM\xa8\xc4\v\x9f\x01o\xf4\xab&\xb6\x17\x02!\xed\xff\xee$\xc89\x8cB0\xd1\xa8\xd4\xe6K0\xe1\xa3TS\x18\xe6x\x1f%P\x9fU)\x83E\n\x90M\r.\x85gn_\xb2\xe9\x8a\x1c\xe3\x93\xd8\xbc\xb6N\xc3\xe1\xafh\xa0iF\xdcq\xf9\x17\xd9i\x844E\x1a\x13\x9a\xe6\xd3\xab:PM\xfbe\xfe9\xd9\x94\x1dx\xd6\x03b\xf7\x10N\xd1\x93\rU\x7fy\x18tE\xf1*\x9a0Z\x9f\xdc{\x13\xf6\xb7\xf7\xe6=\x9cD\x108\x8eS\xa0\xd0\xa7\tn\xd9\xae\xc0\x18~x[\x85Y\xb2\x82w\x150\x97\xba\xe6\xca\xb1\xa3\x02\x14^\xbdZ\xae\xf5/\xcf\xb8\xea8Uw\x92`\"2\x81j\xbb\x87+\x89\xc50xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r8, 0x8924, &(0x7f0000000000)={'bridge_slave_0\x00', @random="010000201000"}) syz_clone(0x40000000, 0x0, 0x0, 0x0, 0x0, 0x0) 4.057343751s ago: executing program 3 (id=10234): bpf$MAP_GET_NEXT_KEY(0x2, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_GET_NEXT_KEY(0x2, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000edff0000000000000000850000000f00000018010000646c012500000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000800000850000000600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000680)=ANY=[@ANYBLOB="0b00000005000000000400000900000001"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, @void, @value}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='timer_start\x00', r1}, 0x10) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='timer_start\x00', r2}, 0x10) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000940)) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="180000000000000000000000000000008500000050"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000180)='sched_switch\x00', r3}, 0x10) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x21, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r4, &(0x7f0000001580)={0x0, 0x0, &(0x7f0000001400)=[{&(0x7f0000000080)="3bfdd75fa5717852d59a9367444a2130e72cd4dabc8854532cca0c32a5b9f844a4610c7525650ce3d3b76b15026d93e6dee896115e9364066aa3d14e33ef732b4681335c576902153114bdb9c74b538a71115fb1d1a63d1b04129661b29aab89d0be999a6b7c9bea755adedbf305a79f70b71d3d4c98577b49db4963ce89b0def5e840f459659cb6f86d56b069a5de11d601d348ff88ca6e5e2cfe40176880b33e9e8dbc32ba2e6a99b1b50276dc4f06166000d7069a3cc76f", 0xb9}, {&(0x7f0000000180)="892950e2405ee8629d9384a90f16d1706a3e61f305119f95cac0f1927f4c205b971eb41147cb1f86883d6910e68ac3996551800b3ec64b77f8444b18345a2c8b178eeeba0cde7319a5a46bfe7f5770e019efd9d52069edcced33a758c4e657f3a792dc193a1911b4e82ea800ad7afe03c851a8", 0x73}, {&(0x7f0000000200)="a68cde0d56b170df7710b54f17d9a39c4f98f3547190", 0x20000216}, {&(0x7f0000000240)="45e04400f2b383517a08c397dd0a76e67ecfc8e74573c24dedd3a48fb62418c1412fdcd15e888cb0f5d02e77bfecefda6b064c0bb2b66a9a522e63873dde02330510255eec7dfa1af708cdab59fb71eca786a359a2c3b0cbad35144ec5b069c53f90e43339845dc7fd140c55b0149ab38eb27c140f374bcc2c95b0b121d1a9302f3a01b888243b3fc0d46f0de0", 0x8d}, {&(0x7f0000000300)="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", 0xcb3}], 0x5, &(0x7f0000001480)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @private, @multicast1}}}], 0x20}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0xfffffffc, @void, @value}, 0x94) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8946, &(0x7f0000000080)) recvmsg$unix(r5, &(0x7f0000001140)={0x0, 0x0, &(0x7f0000001040)=[{&(0x7f00000015c0)=""/4096, 0x7ffff000}], 0x1}, 0x40000100) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x10, 0x6, &(0x7f0000000000)=@framed={{0x5, 0x0, 0x0, 0x0, 0x0, 0x71, 0x11, 0x17}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @call, @exit], {0x95, 0x0, 0x5a5}}, &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @sk_msg, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x70) 3.672600761s ago: executing program 4 (id=10236): bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16, 0x0, 0x4, 0xff, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r0) r1 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x11, 0xf, &(0x7f0000000340)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b702000014000000b7030000070000008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b70200"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000280)={&(0x7f0000000040)='kmem_cache_free\x00', r2}, 0x10) close(0x4) 3.536715071s ago: executing program 4 (id=10237): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000001000000b703000000000000850000002d00000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='kmem_cache_free\x00', r0}, 0x10) openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000002c0)={0x11, 0x3, &(0x7f0000000140)=@framed, &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000003c0)=@bpf_tracing={0x1a, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="851000000c000000186000000000000000000000000000008510000000000000000000000000000000186000000000000000000000000000001860000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b70200000000000085000000860000001800"/40], &(0x7f0000000080)='GPL\x00', 0x3, 0x9a, &(0x7f0000000180)=""/154, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x1b, 0x0, r1, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x5, 0x400, 0x9, 0x1, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$MAP_CREATE(0x0, &(0x7f0000000740)=ANY=[@ANYBLOB="1e00000005000000010000007140000030060000", @ANYRES32, @ANYBLOB="d5cc00e1fe4687b816d5068ef9ff00", @ANYRES32=0x0, @ANYRES32, @ANYBLOB="0400000004000000050000000300"/28], 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r2], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="160000000000000004000000ff00000000000000", @ANYRES32=0x1, @ANYBLOB="00000000000000e86c00"/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/14], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000880)={0x3, 0xc, &(0x7f0000000b00)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYRES64=r4], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x6, @void, @value}, 0x94) write$cgroup_int(0xffffffffffffffff, &(0x7f00000002c0)=0x3, 0x12) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000003c0)={{r3}, 0x0, 0x0}, 0x20) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000300)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r5}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) perf_event_open(&(0x7f0000000340)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x21, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x80}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x10, 0x2, 0x65bf, &(0x7f00000006c0)) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) perf_event_open(&(0x7f00000005c0)={0x2, 0x80, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x1801, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9426}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE_CONST_STR(0x0, 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)) syz_clone(0xf080200, &(0x7f0000000700)="09319d13b490a07f90e78adb", 0xc, &(0x7f0000000d00), &(0x7f0000000d40), &(0x7f0000000d80)="2c107a801ae09b8e14014c10558e3f9a1687dca3d96a02230f35e3d39e3e23") r6 = bpf$MAP_CREATE(0x0, &(0x7f0000000940)=ANY=[@ANYBLOB="0a00000007000000040000000200000000000000", @ANYRES32=0x1, @ANYBLOB="0000000000000000000000000000000000000000f224ad71cb0ba473653a75ab16940ba91b3b056d5111177b21407084ae59b5e4e9b483f1c5117d1b3356a088fb555fcae2ca9a43ce7a3df8531d23389402f69512af9186cf5f6d07680f54bbee5323e93185bb5fae84b2e52d5b0819f25dc28ec9ea945778e2c2141cb2185106006d126af18cc7b719663c36b8d0d98b", @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000180)={r6, &(0x7f00000006c0), &(0x7f0000000000), 0x2}, 0x20) gettid() socketpair$nbd(0x1, 0x1, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000240)={0xffffffffffffffff, 0xe0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9d, 0x8, 0xfffffffffffffdb8, 0x0}}, 0x10) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000001c0)) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000007c0)={0x11, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x41100, 0x20, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) 2.554907411s ago: executing program 3 (id=10240): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f0000001600)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b702000000040002850000"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000001580)={&(0x7f0000000180)='kmem_cache_free\x00', r1}, 0x10) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x1c1341, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000680)={'syzkaller0\x00', 0x84aebfbd6349b7f2}) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'syzkaller0\x00', 0xca58c30f81b6079f}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x8914, &(0x7f0000000080)) write$cgroup_subtree(r2, &(0x7f0000000440)=ANY=[@ANYBLOB="8fedcb5d07081175f37538e488ca"], 0xe) 2.385003751s ago: executing program 4 (id=10241): perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="160000000000000004000000ff00000000000000", @ANYRES32=0x1, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000540)=ANY=[@ANYBLOB="0b0000000500000005000000090000"], 0x50) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0xe, &(0x7f0000001100)=ANY=[@ANYBLOB], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000340), 0x10, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000200)=r1, 0x4) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000140)='sched_switch\x00', r2}, 0x10) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x3, 0xe, &(0x7f0000000200)=ANY=[@ANYBLOB="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"], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sched_cls, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0xffffffffffffff97, 0x10, &(0x7f00000000c0), 0xffffffffffffffc2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x48) 2.289758501s ago: executing program 0 (id=10243): perf_event_open(0x0, 0x0, 0x10, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="8fedcb79100a6c"], 0xfdef) perf_event_open(&(0x7f0000000800)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x22, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0, 0x8}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cgroup.events\x00', 0x26e1, 0x0) openat$ppp(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TUNSETOFFLOAD(r0, 0xc004743e, 0x20001400) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.current\x00', 0x7a05, 0x1700) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) syz_clone(0x2c000000, 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) syz_clone(0x0, 0x0, 0x0, &(0x7f0000000080), &(0x7f0000000200), &(0x7f0000000280)="9878b2c002e3d71ac2106b") bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$LINK_DETACH(0x22, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000400)='./cgroup.net/syz0\x00', 0x200002, 0x0) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x13040, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$TUNSETOFFLOAD(r1, 0xc004743e, 0x20001418) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000002000000b704000000000000850000005700000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xf, &(0x7f0000000300)=@ringbuf={{}, {{0x18, 0x1, 0x1, 0x0, r2}}, {}, [], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f00000001c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) 1.942571651s ago: executing program 2 (id=10245): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f00000009c0)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000083850000007100000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000000)='kfree\x00', r0}, 0x10) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16, 0x0, 0x4, 0x1, 0x0, 0x1, 0x3, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r2) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000a80)={r1, 0x58, &(0x7f0000000a00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000dc0)=@bpf_lsm={0x1d, 0x2, &(0x7f0000000080)=ANY=[@ANYBLOB="180000000500d5547fc6c774"], 0x0, 0x9, 0x0, 0x0, 0x40f00, 0x0, '\x00', r3, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000d00)=[0xffffffffffffffff], 0x0, 0x10, 0x2, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={0x0}, 0x10) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) openat$tun(0xffffffffffffff9c, &(0x7f00000000c0), 0x8040, 0x0) recvmsg(r4, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r6 = openat$cgroup_subtree(r5, &(0x7f0000000200), 0x2, 0x0) write$cgroup_subtree(r6, &(0x7f0000000080)={[{0x2b, 'cpu'}]}, 0x5) write$cgroup_subtree(r6, &(0x7f0000000400)=ANY=[@ANYBLOB='-cpu'], 0x5) write$cgroup_subtree(r6, &(0x7f0000000040)=ANY=[], 0x8) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='blkio.bfq.sectors\x00', 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000005c0)=@base={0x7, 0x4, 0x18, 0xa042, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x18, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000400)=@bpf_lsm={0x6, 0x6, &(0x7f0000000800)=ANY=[@ANYBLOB="1800000000000000000000000000000018200000", @ANYBLOB="00000000000a0000c30000000000000095010000000000003f1fc23e445051619eb877420c189b676541ed002e2442"], &(0x7f0000000180)='syzkaller\x00', 0x5, 0xd2, &(0x7f00000002c0)=""/210, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) 1.874881001s ago: executing program 3 (id=10246): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f00000009c0)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000083850000007100000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000000)='kfree\x00', r0}, 0x10) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16, 0x0, 0x4, 0x1, 0x0, 0x1, 0x3, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r2) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000a80)={r1, 0x58, &(0x7f0000000a00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000dc0)=@bpf_lsm={0x1d, 0x2, &(0x7f0000000080)=ANY=[@ANYBLOB="180000000500d5547fc6c774"], 0x0, 0x9, 0x0, 0x0, 0x40f00, 0x0, '\x00', r3, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000d00)=[0xffffffffffffffff], 0x0, 0x10, 0x2, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={0x0}, 0x10) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) openat$tun(0xffffffffffffff9c, &(0x7f00000000c0), 0x8040, 0x0) recvmsg(r4, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r6 = openat$cgroup_subtree(r5, &(0x7f0000000200), 0x2, 0x0) write$cgroup_subtree(r6, &(0x7f0000000080)={[{0x2b, 'cpu'}]}, 0x5) write$cgroup_subtree(r6, &(0x7f0000000400)=ANY=[@ANYBLOB='-cpu'], 0x5) write$cgroup_subtree(r6, &(0x7f0000000040)=ANY=[], 0x8) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='blkio.bfq.sectors\x00', 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000005c0)=@base={0x7, 0x4, 0x18, 0xa042, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x18, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000400)=@bpf_lsm={0x6, 0x6, &(0x7f0000000800)=ANY=[@ANYBLOB="1800000000000000000000000000000018200000", @ANYBLOB="00000000000a0000c30000000000000095010000000000003f1fc23e445051619eb877420c189b676541ed002e2442"], &(0x7f0000000180)='syzkaller\x00', 0x5, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct]}}, 0x0, 0x26, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x20) 1.574989891s ago: executing program 4 (id=10249): r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0x1b, &(0x7f00000003c0)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x38000, 0x0, 0x0, 0x0, 0x9}, {{0x18, 0x1, 0x1, 0x0, 0x1}}, {}, [@initr0={0x18, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x10}, @jmp={0x5, 0x1, 0x3, 0xb, 0x1, 0xfffffffffffffffe, 0xfffffffffffffff0}, @func={0x85, 0x0, 0x1, 0x0, 0x3}, @tail_call={{0x18, 0x2, 0x1, 0x0, 0x1}}, @call={0x85, 0x0, 0x0, 0x32}, @map_val={0x18, 0x1, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1e}], {{}, {}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000280)='syzkaller\x00', 0xe, 0xf8, &(0x7f00000005c0)=""/248, 0x40f00, 0x19, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x3, &(0x7f00000002c0)=[0x1, 0xffffffffffffffff, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1], &(0x7f0000000300)=[{0x10000000, 0x4, 0x8, 0x6}, {0x2, 0x9, 0xb, 0xa}, {0x0, 0x5, 0x6, 0x9}], 0x10, 0x9, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000004c0)={&(0x7f0000000000)='unmap\x00', r0, 0x0, 0x5}, 0x18) socketpair$tipc(0x1e, 0x4, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$tipc(r2, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000040)="fb", 0x1}], 0x1}, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000540)=@base={0x6, 0x4, 0x8, 0x5, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) r3 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="1b0000000000000000000000000004"], 0x48) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x11, 0xf, &(0x7f0000000340)=ANY=[@ANYBLOB="1803000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b702000014000800b7030000000000008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000000000008500000085000000b70000000000000095"], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='kmem_cache_free\x00', r4}, 0x10) bpf$PROG_LOAD(0x5, 0x0, 0x0) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000840)={&(0x7f0000000800)='kfree_skb\x00', r5}, 0x10) recvmsg(r1, &(0x7f0000000b00)={0x0, 0x0, &(0x7f00000008c0)=[{&(0x7f0000000e40)=""/4096, 0x1000}], 0x1}, 0x0) 1.57338866s ago: executing program 4 (id=10250): bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x0, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="180100001c0000000000000000000000850000006d00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000009c0)={0x11, 0x4, 0x0, &(0x7f0000000540)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000440)={&(0x7f0000000340)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x6, [@enum={0x0, 0x2, 0x0, 0x6, 0x4, [{0x5}, {0x3}]}]}, {0x0, [0x0, 0x0, 0x2e, 0x61]}}, &(0x7f0000000380)=""/187, 0x3a, 0xbb, 0x1, 0x0, 0x0, @void, @value}, 0x28) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz1\x00', 0x1ff) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000002000000b7030000faffffff850000002d00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdir(&(0x7f0000000040)='./file0/../file0/../file0/file0\x00', 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x1d, &(0x7f00000001c0), 0x4) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r2 = openat$cgroup_procs(r0, &(0x7f0000000240)='tasks\x00', 0x2, 0x0) write$cgroup_pid(r2, &(0x7f0000000880), 0x12) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup/syz1\x00', 0x200002, 0x0) openat$cgroup_procs(r3, &(0x7f0000000040)='cgroup.procs\x00', 0x2, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000800)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x6, [@typedef={0xc, 0x0, 0x0, 0x8, 0x5}]}, {0x0, [0x0, 0x61, 0x2e, 0x2e]}}, 0x0, 0x2a, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x28) r4 = perf_event_open$cgroup(&(0x7f0000000480)={0x0, 0x80, 0x0, 0x0, 0x3, 0x2, 0x0, 0x4, 0x21000, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x3ff, 0x4, @perf_bp={&(0x7f0000000300), 0xa}, 0x4000, 0x8000000000000001, 0x4, 0x3, 0x6, 0x3f, 0x16ae, 0x0, 0x5, 0x0, 0xffff}, r0, 0x1, r1, 0x7) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x40082406, &(0x7f0000000500)='}>\xca\x00') syz_clone(0x42a00180, 0x0, 0x0, 0x0, 0x0, 0x0) r5 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB="0300000004000000040000000a00000000000000", @ANYRES32=0x1, @ANYBLOB='\x00\x00\x00 \x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="050000000300356b3fac0000020100"/32], 0x50) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000640)={r5, 0x58, &(0x7f00000008c0)}, 0x10) perf_event_open(&(0x7f0000000940)={0x2, 0x80, 0xb6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0xfe, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x126b0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0xfffffffffffffffd, 0x4}, 0x10, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0xffffffff}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x1e) 1.35011134s ago: executing program 2 (id=10251): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000001000000b703000000000000850000002d00000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='kmem_cache_free\x00', r0}, 0x10) openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000002c0)={0x11, 0x3, &(0x7f0000000140)=@framed, &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000003c0)=@bpf_tracing={0x1a, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="851000000c000000186000000000000000000000000000008510000000000000000000000000000000186000000000000000000000000000001860000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b70200000000000085000000860000001800"/40], &(0x7f0000000080)='GPL\x00', 0x3, 0x9a, &(0x7f0000000180)=""/154, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x1b, 0x0, r1, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x5, 0x400, 0x9, 0x1, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$MAP_CREATE(0x0, &(0x7f0000000740)=ANY=[@ANYBLOB="1e00000005000000010000007140000030060000", @ANYRES32, @ANYBLOB="d5cc00e1fe4687b816d5068ef9ff00", @ANYRES32=0x0, @ANYRES32, @ANYBLOB="0400000004000000050000000300"/28], 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r2], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="160000000000000004000000ff00000000000000", @ANYRES32=0x1, @ANYBLOB="00000000000000e86c00"/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/14], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000880)={0x3, 0xc, &(0x7f0000000b00)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYRES64=r4], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x6, @void, @value}, 0x94) write$cgroup_int(0xffffffffffffffff, &(0x7f00000002c0)=0x3, 0x12) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000003c0)={{r3}, 0x0, 0x0}, 0x20) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000300)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r5}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) perf_event_open(&(0x7f0000000340)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x21, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x80}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x10, 0x2, 0x65bf, &(0x7f00000006c0)) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) perf_event_open(&(0x7f00000005c0)={0x2, 0x80, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x1801, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9426}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE_CONST_STR(0x0, 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)) syz_clone(0xf080200, &(0x7f0000000700)="09319d13b490a07f90e78adb", 0xc, &(0x7f0000000d00), &(0x7f0000000d40), &(0x7f0000000d80)="2c107a801ae09b8e14014c10558e3f9a1687dca3d96a02230f35e3d39e3e23") r6 = bpf$MAP_CREATE(0x0, &(0x7f0000000940)=ANY=[@ANYBLOB="0a00000007000000040000000200000000000000", @ANYRES32=0x1, @ANYBLOB="0000000000000000000000000000000000000000f224ad71cb0ba473653a75ab16940ba91b3b056d5111177b21407084ae59b5e4e9b483f1c5117d1b3356a088fb555fcae2ca9a43ce7a3df8531d23389402f69512af9186cf5f6d07680f54bbee5323e93185bb5fae84b2e52d5b0819f25dc28ec9ea945778e2c2141cb2185106006d126af18cc7b719663c36b8d0d98b", @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000180)={r6, &(0x7f00000006c0), &(0x7f0000000000), 0x2}, 0x20) gettid() socketpair$nbd(0x1, 0x1, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000240)={0xffffffffffffffff, 0xe0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9d, 0x8, 0xfffffffffffffdb8, 0x0}}, 0x10) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000001c0)) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000007c0)={0x11, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x41100, 0x20, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) 1.25123841s ago: executing program 0 (id=10252): bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000640)=ANY=[@ANYBLOB="18060000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000003000000b703000000000000850000007300000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000080)='sched_switch\x00', r0}, 0x10) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0xf2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x404, 0x72caf411c2c20a0a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f00000006c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x30, 0x30, 0x9, [@const={0xb, 0x0, 0x0, 0xa, 0x1}, @type_tag={0x6, 0x0, 0x0, 0x12, 0xfffffffe}, @func={0x8, 0x0, 0x0, 0xc, 0x4}, @restrict={0x1}]}, {0x0, [0x30, 0x2e, 0x0, 0x5f, 0x0, 0x5f, 0x61]}}, &(0x7f00000004c0)=""/98, 0x51, 0x62, 0x0, 0x5, 0x10000, @value}, 0x28) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f0000000000)=ANY=[@ANYRESOCT=r1], &(0x7f0000000480)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, r2, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f0000000040)='kmem_cache_free\x00', r3}, 0x10) socketpair$tipc(0x1e, 0x4, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$tipc(r5, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000040)="fb6bba8839fe8bc048c0cdafd1f8a9918bc4055eaaeb6db4ee9bcb25b1811dbf40b3a7da5a8a64db04ed6dd26eea2e37229c339b1f91201c2796173864", 0x3d}], 0x1}, 0x0) recvmsg(r4, &(0x7f0000000b00)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000000)=""/60, 0x3c}], 0x1}, 0x40fd) r6 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000600)={&(0x7f0000000100)=ANY=[@ANYBLOB="9feb0100180000000000000014000000140000000a00000006000000010000060400000003000000000000000000002e00006f"], 0x0, 0x36, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x20) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000000)={0x11, 0x4, 0x4, 0xa, 0x0, 0x1, 0x0, '\x00', 0x0, r6, 0x0, 0x2, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000007c0)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x18, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='kmem_cache_free\x00', r7}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={0x0}, 0x18) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)) r8 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f00000002c0)=ANY=[@ANYBLOB="180000001800ff0f00000000001b0000850000006d000000850000002300000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000080)='sched_switch\x00', r8}, 0x10) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r10 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0xf, 0x4, 0x4, 0x12, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r11 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000340)={0xe, 0x4, &(0x7f0000000400)=ANY=[@ANYBLOB="18020000801000000000000004000000850000002700000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r10, r11, 0x5, 0x0, 0x0, @void, @value}, 0x10) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$inet(r9, &(0x7f0000000980)={0x0, 0x6000, &(0x7f0000000900)=[{&(0x7f0000000640)='U', 0xa00120}], 0x1}, 0x3) 1.222025521s ago: executing program 3 (id=10254): bpf$MAP_CREATE(0x0, 0x0, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x10) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000002000000b704000000000000850000005700000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x17, 0x0, 0x4, 0x3, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r3}, 0x10) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000058"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r4}, 0x10) socketpair$unix(0xa, 0x2, 0x11, &(0x7f0000000100)) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x800, 0xc8, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0xb}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) recvmsg$unix(0xffffffffffffffff, 0x0, 0x0) close(r1) recvmsg$unix(r0, &(0x7f0000000400)={0x0, 0xffffffffffffffbc, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r5, &(0x7f0000000300)=ANY=[@ANYBLOB="8fedcb791f6f9875f37538e486dd6317ce8102038800fe08000e40000200875a65969ff57b00ff020000000000000000000000000001"], 0xfdef) perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0x48, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xb, 0x4}, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0xedba}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r6, &(0x7f0000000500)={&(0x7f0000000040)=@hci, 0x80, &(0x7f0000000100)=[{&(0x7f0000000400)=""/248, 0x200105d0}], 0x1}, 0x1f00) sendmsg$tipc(r7, &(0x7f0000000240)={0x0, 0xfffffff5, &(0x7f0000000200)=[{&(0x7f0000000140)="a2", 0xfffffdef}], 0x1}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cgroup.events\x00', 0x26e1, 0x0) 1.216527731s ago: executing program 0 (id=10255): r0 = bpf$ITER_CREATE(0x21, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x48) openat$cgroup_ro(r0, 0x0, 0x0, 0x0) socketpair(0x0, 0x5, 0x8, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$nbd(0x1, 0x1, 0x0, 0x0) ioctl$TUNDETACHFILTER(0xffffffffffffffff, 0x8901, 0x1000000000000) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xc, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000000008500000022000000180100002020702500000000002020207b0af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007200000095"], 0x0, 0x3, 0x0, 0x0, 0x0, 0x5a, '\x00', 0x0, @fallback=0x2f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x2, 0x4, 0x6, 0x5, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000260018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f00000002c0)='hrtimer_start\x00', r2}, 0x3d) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f00000002c0)='hrtimer_start\x00', r3}, 0x3d) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb52, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xd, 0x2}, 0x2c82}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$tipc(r5, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000c810}, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000240)={0x1, 0x58, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r7 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xa, 0x1, 0x10000008, 0x8, 0x0, 0xffffffffffffffff, 0x0, '\x00', r6, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) openat$tun(0xffffffffffffff9c, &(0x7f0000000340), 0x610400, 0x0) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000400000000000000000018110000", @ANYRES32=r7, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000380)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1d, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='kmem_cache_free\x00', r8}, 0x10) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000280)={{r7}, &(0x7f0000000080), &(0x7f0000000200)='%-010d \x00'}, 0x20) close(r4) 1.065036601s ago: executing program 0 (id=10257): bpf$MAP_CREATE(0x0, 0x0, 0x0) r0 = getpid() bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='cgroup.events\x00', 0x275a, 0x0) ioctl$SIOCSIFHWADDR(r1, 0x4030582b, 0x0) r2 = openat$tun(0xffffffffffffff9c, 0x0, 0x200, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB="160000000000000004000000ff000000200200", @ANYRES32=0x1, @ANYBLOB="00001400000000000001000000000000000000198f234a", @ANYRES32=0x0, @ANYRES8=r0, @ANYBLOB='\x00'/21], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x0, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000020850000002d00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000003c0)={&(0x7f0000000540)='task_rename\x00', r3}, 0x11) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000380)=@base={0x10, 0x4, 0x8, 0x7, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.current\x00', 0x275a, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000e00)={{r4}, &(0x7f0000000d80), &(0x7f0000000dc0)=r5}, 0x20) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x26e1, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r8 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000001180)='cpuset.mem_exclusive\x00', 0x2, 0x0) write$cgroup_int(r8, &(0x7f0000000040)=0xffffffffffff241d, 0x12) r9 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) ioctl$TUNSETIFF(r9, 0x400454ca, &(0x7f0000000200)={'rose0\x00', 0x112}) bpf$MAP_CREATE(0x0, &(0x7f0000000680)=ANY=[@ANYBLOB="00000097f75d201d00005d943ac2", @ANYRES32, @ANYRES32=0x0, @ANYBLOB, @ANYRESHEX=r7], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000003480)={0x11, 0x2, &(0x7f00000006c0)=ANY=[@ANYBLOB="20010000a4fc0a000500fe", @ANYBLOB="3da5097fab21ae702730ca12dbe372d53baac5133f82f4284e3c6e9c26308be10213b8d301294377bf6b726ec8d95a1bcba4e5fa663095ef0f75f19d3509a5ae274c57c08c03b448e276fff3b3efd798f56697483172ca8d0269a2f06082d61976ea5536e9cb47fc354d55d23c05ac16ba3d95", @ANYRESOCT=r2, @ANYRES32=r6], &(0x7f0000000000)='GPL\x00', 0x6, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) close(r9) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500)={0xffffffffffffffff}) ioctl$TUNGETDEVNETNS(r10, 0x8982, 0x20000000) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x12, 0x5, &(0x7f0000000040)=ANY=[@ANYBLOB="460a0000000000006311300000000000180000000000000000000000feffffff0000000000000000"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0xf, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) perf_event_open$cgroup(&(0x7f0000000080)={0x2, 0x80, 0x0, 0x7, 0xd, 0xf, 0x0, 0x2, 0xd7c7a, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x4, 0x0, @perf_bp={&(0x7f0000000240), 0xd}, 0x80c, 0x5, 0xe8c, 0x1, 0x1, 0x9, 0x2, 0x0, 0x4, 0x0, 0x8}, 0xffffffffffffffff, 0xb, r1, 0x4) bpf$MAP_CREATE(0x2000000000000000, &(0x7f0000000140)=ANY=[@ANYBLOB="0500000004000000008000005c21c90000000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="000000000200"/28], 0x50) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000080)) bpf$MAP_CREATE(0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="0900000003000000008000000100000010000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="00001800"/28], 0x50) 986.54799ms ago: executing program 2 (id=10259): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="16000000000000000400000001"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000300)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000058"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000002c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) (async) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000002c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000003c0)={&(0x7f0000000140)='kmem_cache_free\x00', r1}, 0x10) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000003c0)={&(0x7f0000000140)='kmem_cache_free\x00', r1}, 0x10) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0xc8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) openat$cgroup_ro(r2, &(0x7f0000000040)='cgroup.freeze\x00', 0x275a, 0x0) (async) r3 = openat$cgroup_ro(r2, &(0x7f0000000040)='cgroup.freeze\x00', 0x275a, 0x0) write$cgroup_int(r3, 0x0, 0x0) write$cgroup_int(r3, &(0x7f00000000c0), 0x12) write$cgroup_freezer_state(r3, &(0x7f0000000000)='THAWED\x00', 0x7) (async) write$cgroup_freezer_state(r3, &(0x7f0000000000)='THAWED\x00', 0x7) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r5) recvmsg$unix(r4, &(0x7f0000000400)={0x0, 0xffffffffffffffbc, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r6, &(0x7f0000000300)=ANY=[@ANYBLOB="8fedcb791f6f9875f37538e486dd6317ce8102031100fe08000e40000200875a65969ff57b00ff020000000000000000000000000001"], 0xfdef) (async) write$cgroup_subtree(r6, &(0x7f0000000300)=ANY=[@ANYBLOB="8fedcb791f6f9875f37538e486dd6317ce8102031100fe08000e40000200875a65969ff57b00ff020000000000000000000000000001"], 0xfdef) 860.65921ms ago: executing program 2 (id=10261): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x6, 0x4, 0xfff, 0x7, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000400007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r1}, 0x10) r2 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0), 0x1c1842, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'syzkaller0\x00', 0xca58c30f81b6079f}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x8914, &(0x7f0000000080)) write$cgroup_devices(r2, &(0x7f0000000100)=ANY=[@ANYBLOB="1e031800dd5c980128854d4a828e00000000002f"], 0xffdd) 765.014861ms ago: executing program 1 (id=10262): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x5, 0x4, 0x8, 0x5, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="060000"], 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f00000002c0)='hrtimer_start\x00', r3}, 0x3d) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000005c0)={r2, 0xe0, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000200)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x5, 0x4, &(0x7f0000000280)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000300)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x53, &(0x7f0000000340)=[{}, {}, {}, {}, {}, {}], 0x30, 0x10, &(0x7f0000000380), &(0x7f00000003c0), 0x8, 0x2b, 0x8, 0x8, &(0x7f0000000400)}}, 0x10) r5 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000680)={0x1b, 0x0, 0x0, 0x8, 0x0, r1, 0x101, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x4, 0x0, @void, @value, @void, @value}, 0x50) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000740)={0x18, 0x1, &(0x7f0000000180)=@raw=[@generic={0x10, 0x1, 0x9, 0x2, 0x7f}], &(0x7f00000001c0)='syzkaller\x00', 0x1, 0x1000, &(0x7f0000000a40)=""/4096, 0x41100, 0x0, '\x00', r4, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x9, 0x3}, 0x8, 0x10, &(0x7f0000000640)={0x2, 0x10, 0x10, 0x3}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000700)=[r1, r5], 0x0, 0x10, 0x1, @void, @value}, 0x94) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) 708.82121ms ago: executing program 1 (id=10263): mkdir(0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0xa, 0x3, 0x8, 0x1, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000280)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000000)='kmem_cache_free\x00', r1}, 0x10) socketpair$tipc(0x1e, 0x4, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$tipc(r3, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000580)="fb6b", 0x2}], 0x1}, 0x0) recvmsg(r2, &(0x7f0000000b00)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000000)=""/60, 0x3c}], 0x1, 0x0, 0x500}, 0x40fd) 591.903951ms ago: executing program 1 (id=10264): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f0000001600)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b702000000040002850000008600"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000001580)={&(0x7f0000000180)='kmem_cache_free\x00', r1}, 0x10) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x1c1341, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000680)={'syzkaller0\x00', 0x84aebfbd6349b7f2}) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'syzkaller0\x00', 0xca58c30f81b6079f}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x8914, &(0x7f0000000080)) write$cgroup_subtree(r2, &(0x7f0000000440)=ANY=[@ANYBLOB="8fedcb5d07081175f37538e488ca"], 0xe) 467.26825ms ago: executing program 0 (id=10265): bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000640)=ANY=[@ANYBLOB="18060000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000003000000b703000000000000850000007300000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000080)='sched_switch\x00', r0}, 0x10) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0xf2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x404, 0x72caf411c2c20a0a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f00000006c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x30, 0x30, 0x9, [@const={0xb, 0x0, 0x0, 0xa, 0x1}, @type_tag={0x6, 0x0, 0x0, 0x12, 0xfffffffe}, @func={0x8, 0x0, 0x0, 0xc, 0x4}, @restrict={0x1}]}, {0x0, [0x30, 0x2e, 0x0, 0x5f, 0x0, 0x5f, 0x61]}}, &(0x7f00000004c0)=""/98, 0x51, 0x62, 0x0, 0x5, 0x10000, @value}, 0x28) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f0000000000)=ANY=[@ANYRESOCT=r1], &(0x7f0000000480)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, r2, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f0000000040)='kmem_cache_free\x00', r3}, 0x10) socketpair$tipc(0x1e, 0x4, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$tipc(r5, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000040)="fb6bba8839fe8bc048c0cdafd1f8a9918bc4055eaaeb6db4ee9bcb25b1811dbf40b3a7da5a8a64db04ed6dd26eea2e37229c339b1f91201c2796173864", 0x3d}], 0x1}, 0x0) recvmsg(r4, &(0x7f0000000b00)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000000)=""/60, 0x3c}], 0x1}, 0x40fd) r6 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000600)={&(0x7f0000000100)=ANY=[@ANYBLOB="9feb0100180000000000000014000000140000000a00000006000000010000060400000003000000000000000000002e00006f"], 0x0, 0x36, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x20) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000000)={0x11, 0x4, 0x4, 0xa, 0x0, 0x1, 0x0, '\x00', 0x0, r6, 0x0, 0x2, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000007c0)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x18, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='kmem_cache_free\x00', r7}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={0x0}, 0x18) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)) r8 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f00000002c0)=ANY=[@ANYBLOB="180000001800ff0f00000000001b0000850000006d000000850000002300000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000080)='sched_switch\x00', r8}, 0x10) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r10 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0xf, 0x4, 0x4, 0x12, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r11 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000340)={0xe, 0x4, &(0x7f0000000400)=ANY=[@ANYBLOB="18020000801000000000000004000000850000002700000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r10, r11, 0x5, 0x0, 0x0, @void, @value}, 0x10) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$inet(r9, &(0x7f0000000980)={0x0, 0x6000, &(0x7f0000000900)=[{&(0x7f0000000640)='U', 0xa00120}], 0x1}, 0x3) 349.72356ms ago: executing program 0 (id=10266): r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xb6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x200}, 0x0, 0x0, 0xffffffffffffffff, 0x8) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000000140)=ANY=[@ANYBLOB="850000002a00000025000000000000009500000000000000afcd48d649379071c33390e418ec470db2c6161dba392176dd2963038e1d69ba7ea94c500dc4ef2fad96ed406f21caf5adcf920569c00cc1199684fa7c93836d9ea2cfb0e60436e05425cc4686b066707de94a4f4d5fc79c987d669f381faca0f9d9924be41a9169bdfaf16da915b2e249ee1c6eee84309e7a23c19a39484809539fcb4e0b6eab1aa7d55545a34effa077faa55c59e88254f54077f799bf168301000000bf2255d6a0244d35b213bda84cc172afcc2e47a7d8b85a5e3d77ac463920e231b7ae0da8616d2b7958f91f5da6c025d060ab186d94af98af1da2b5952eb15855933a212304e035f7a35dfc72c81256a55a25f8fe3b28d7e53c78fbfe5ab0255f347160ec83070000000000004015cf10453f6c0b973b81a484ebad04859d928365a7ea3fab2e4b380a00d72bc0480f949c479757306720399379d9271cf555c14d56b51c2298237bebfc08e0d5976a942b846970cfd98b9d4139f1111f2dc5e46ac1c60a9b030074bfbcd4b09012175484135f0e519f0b1e4aaa026d570ecb5e8cddbed65ff702000000a3ff4f8a4cf796b07a6ff61c5552417fd703f7f14d8b78a602ca3cdf6a662d8bc9c89c9120072a5d00dcdd8595356c9b2492aaf1264d4ef4a410c882834867bcd2b6e558d17879570c8ad95a1c57a05f4f979ea13201bafe4f0f6ea508000000a0c548552b5708005647323c78a996810000000571cbb17d9f37282462f0e9c147c0d497c61433c6ccc35601eef97ee611be8c97f4151fcda6cb799c6e924966a7f90bf8fd1e75ee76bd72346cfbb526890aa7fe5e68949a3b30567e54d3504723177dc46c4604bca492ecec37e83efceefd7ca2533659edc8bef9cb85451c6a145074343caea5c4bf690441974b155f5adc681a03c0bbb8358856175e2ce8b0cbbbe3c033e54ffcebde1d9d3d350000000000000000e0f209150a07682c4e14e3a83558df6fe2304a1b63afefdb636e56bbaae4e62136574bc6371a0bb2be1a962aae9c1258da6ef590e1d85ea9e12b3025f43e7e08ccffc5064dea4c39cf4b98e1fc6efb5978f51e16b678eca0b658a56008948e5a61561a9845e4ff29e2bdb1d0b923b272341c5e093fd66a2946501559335781092cf8ce987c56cd31121624d7455f2a3666276c3c0e812b28e2f30d035cee5d0e77a3c72208ec651cc0ae637fa474816bc59d2e2a00092419304b338a987e9d3044d856ce24f370030be3b5f79f030b8d3ebce68663ef5af469abe753314fae31a0445859a5ece8fb11a4ee8e46354c9c3a041a1e7b55c4e81dba1e12289ee34463aaf28345bde0c195bc9f022ca8ce37ed85464c31679043e7f9d04bb5cb51da0b7958989fd70f241262d0af3246eb4fc4bda345360200000001fbddeacd3adaa4d2715e21c772ccd44341f7fd53df58ae791ee8b489a7c9efe3625a9d971b5997485d6a063dc6f7359e2eccc2fb39d419de1a7b5c9dc22c96295a0600adf59d44e58eb1c60b3475be31a9b7cf42b6402312d2725b8d9fa700a86407e79ae29d2c117ca65fc86c2dce97aa03279a66ec87122219b0f796ab92b1adecae50fdb408c8a80f7f02f750d6c977a1919f9f69a6cfefdf879d447df53f3b9b70d10355b07466d1ef0056b5af553d18a6cd50feeb7bfad9b7be3283b6450d264e77124d18d4f5987baab97a9bfbd8f185b5631820420b75b6522c0e21c882c66f4f25ffb6d95e07de02205fca4f18a2eb5b63e45d5d80fe52734093ae5aa3c0b4f3f45bfff201000000000000002e31560e5b741445ea2a1acee2e98c9f3427834ba0a765d20b30f87af976a46f9a9a1ac7dea1ea6845f9aa66237e0dacc107f532348cc2116473381e961f3d9c8c21579fe3245097c280abe51427b9f6cd72b5da6d0252803c66730cd5eac907f09b1a4090631e1b9e16587bb5f721303e6b89e5c54d680ac66d09af0a1f5b83e69a39265964279d174b0000000000000000000000fa08ad0731ba49fbf981f8265e7f1f4c2d97f4680b135f87c228ce69418a282b6caa2481a0df1774fa7d94944bb92d2b89f73f0e8b63f6316c5762f3288bc970720f48b5647dd177db6810fae0533496b6d58da50ee80a6b9a7438978c5465113f668eb4484350048289d07dbef325d3221a7cb35f812f257941a9781e3214c2a3dcf89d99844b762a9cf17548c54fccad2c7ae8072b82e0880815daf966bd5343c1635e123f868a7167cfcff33320253af570f4ef9c0254afdd89ac3943562b530dd88da8a94013bbaf204bebc38055adc39f07f7c22711f4d1f6dcc928d1578a093c072e0b92babc76f47ee367e745a024a2278319d9a4d1378482b74c516647652bfb6e93002494a5cd74e2a9a4734487062437da23e1efa6ef7674108aaa3ffac859c3577c2637bb3bdc69bc365b1f20dba96b8acca62f3f80045318de0facf2ed44b814e842c2a520159bb6c320cec0910c0b8bd3d547bdfba2e0bb24d117ed0388afd37affbad2f9c77c9c1314a16ffe64f5e3744a2fffd7039670f5706e589a4c3868ffd08cd0e05023f4d8f95712207450e39a7550f42419bf30b31cac3fa1404e449c1cee0fff0d86a98dc9bf38a1e0b4fa5225dae5e781b43545b51681b2158f41bab16f8a7df758b00ffa6e8522bd83e320ff897f177367278a1f0cdbde082d9983308b40c39740b6fd1ba4aa10c3a19c7374278d00"/1952], &(0x7f0000000000)='GPL\x00', 0x5, 0x252, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x0, @perf_bp={0x0}, 0x801}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r3 = bpf$ITER_CREATE(0x21, &(0x7f0000000040)={r2}, 0x8) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={0x0, r3}, 0x10) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x17, 0x0, 0x4, 0xff, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f0000000140)={'pim6reg1\x00', 0x1}) r5 = openat$cgroup_devices(r2, &(0x7f0000000900)='devices.deny\x00', 0x2, 0x0) write$cgroup_devices(r5, &(0x7f0000000940)={'a', ' *:* ', 'w\x00'}, 0x8) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_CREATE_TAIL_CALL(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="0900000000000000e27f00000100000000000000", @ANYRES32, @ANYBLOB="000000000000008000"/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r6 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000140)='sched_switch\x00', r6}, 0x10) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x3b, &(0x7f0000000000)='/proc/sys/net/ipv4\x00\x00s/sync_\x00le\xf44.\xab%nN\xd4\xa2\x88\x00\xd11=\x11\xc8\xdd\x15\xcc\xd2\xf1d\'%\x11c\x91l,'}, 0x30) r7 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) openat$cgroup_ro(r7, &(0x7f0000000080)='memory.numa_stat\x00', 0x80040, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000000), 0x4) bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8914, &(0x7f0000000100)={'pim6reg1\x00', @broadcast}) 321.13103ms ago: executing program 1 (id=10267): socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$tipc(r1, &(0x7f0000000280)={0x0, 0x0, 0x0}, 0x0) close(r1) close(r0) 314.62547ms ago: executing program 2 (id=10268): bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000640)=ANY=[@ANYBLOB="18060000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000003000000b703000000000000850000007300000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000080)='sched_switch\x00', r0}, 0x10) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0xf2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x404, 0x72caf411c2c20a0a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f00000006c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x30, 0x30, 0x9, [@const={0xb, 0x0, 0x0, 0xa, 0x1}, @type_tag={0x6, 0x0, 0x0, 0x12, 0xfffffffe}, @func={0x8, 0x0, 0x0, 0xc, 0x4}, @restrict={0x1}]}, {0x0, [0x30, 0x2e, 0x0, 0x5f, 0x0, 0x5f, 0x61]}}, &(0x7f00000004c0)=""/98, 0x51, 0x62, 0x0, 0x5, 0x10000, @value}, 0x28) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f0000000000)=ANY=[@ANYRESOCT], &(0x7f0000000480)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, r1, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f0000000040)='kmem_cache_free\x00', r2}, 0x10) socketpair$tipc(0x1e, 0x4, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$tipc(r4, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000040)="fb6bba8839fe8bc048c0cdafd1f8a9918bc4055eaaeb6db4ee9bcb25b1811dbf40b3a7da5a8a64db04ed6dd26eea2e37229c339b1f91201c2796173864", 0x3d}], 0x1}, 0x0) recvmsg(r3, &(0x7f0000000b00)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000000)=""/60, 0x3c}], 0x1}, 0x40fd) r5 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000600)={&(0x7f0000000100)=ANY=[@ANYBLOB="9feb0100180000000000000014000000140000000a00000006000000010000060400000003000000000000000000002e00006f"], 0x0, 0x36, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x20) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000000)={0x11, 0x4, 0x4, 0xa, 0x0, 0x1, 0x0, '\x00', 0x0, r5, 0x0, 0x2, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000007c0)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x18, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='kmem_cache_free\x00', r6}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={0x0}, 0x18) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)) r7 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f00000002c0)=ANY=[@ANYBLOB="180000001800ff0f00000000001b0000850000006d000000850000002300000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000080)='sched_switch\x00', r7}, 0x10) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r9 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0xf, 0x4, 0x4, 0x12, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r10 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000340)={0xe, 0x4, &(0x7f0000000400)=ANY=[@ANYBLOB="18020000801000000000000004000000850000002700000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r9, r10, 0x5, 0x0, 0x0, @void, @value}, 0x10) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$inet(r8, &(0x7f0000000980)={0x0, 0x6000, &(0x7f0000000900)=[{&(0x7f0000000640)='U', 0xa00120}], 0x1}, 0x3) 302.19008ms ago: executing program 1 (id=10269): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000edff0000000000000000850000000f00000018010000646c012500000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000800000850000000600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) close(r1) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000000), 0x4) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000080)='percpu_create_chunk\x00', r0}, 0x10) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000080)='percpu_create_chunk\x00', r2}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000840)=ANY=[@ANYBLOB="0a00000001010000ff7f0000cc00000000000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\b\x00\x00\x00'], 0x48) ioctl$TUNSETCARRIER(0xffffffffffffffff, 0x400454e2, &(0x7f0000000180)=0x1) 200.26283ms ago: executing program 3 (id=10270): bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16, 0x0, 0x4, 0xff, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r0) r1 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x11, 0xf, &(0x7f0000000340)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b702000014000000b7030000070000008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b702000000000000850000008500"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000280)={&(0x7f0000000040)='kmem_cache_free\x00', r2}, 0x10) close(0x4) 8.46999ms ago: executing program 2 (id=10271): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000002300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x367, @void, @value}, 0x90) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x5, 0x400, 0x9, 0x1, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x1a, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x35, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r1}, 0x10) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000001000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r2, &(0x7f0000001580)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f0000000080)="3bfdd75fa5717852d59a9367444a2130e72cd4dabc8854532cca0c32a5b9f844a4610c7525650ce3d3b76b15026d93e6dee896115e9364066aa3d14e33ef732b4681335c576902153114bdb9c74b538a71115fb1d1a63d1b04129661b29aab89d0be999a6b7c9bea755adedbf305a79f70b71d3d4c98577b49db4963ce89b0def5e840f459659cb6f86d56b069a5de11d601d348ff88ca6e5e2cfe40176880b33e9e8dbc32ba2e6a99b1b50276dc4f06166000d7069a3cc76f", 0xb9}, {&(0x7f0000000180)="892950e2405ee8629d9384a91c16d1706a3e61f305119f95cac0f1927f4c205b971eb41147cb1f86883d6910e68ac3996551800b3ec64b77f8444b18345a2c8b178eeeba0cde7319a5a46bfe7f5770e019efd9d52069edcced33a758c4e657f3a792dc193a1911040000000000000003c851a8", 0x73}, {&(0x7f0000000200)="a68cde0d56b170df7710b54f17d9a39c4f98f3547190", 0x16}, {&(0x7f0000000240)="45e04400f2b383517a08c397dd0a76e67ecfc8e74573c24dedd3a48fb62458c1412fdcd15e888cb0f5d02e77bfecefda6b064c0bb2b66a9a522e63873dde02330510255eec7dfa1af708cdab59fb71eca786a359a2c3b0cbad35144ec5b069c53f90e43339845dc7fd140c55b0149ab38eb27c140f374bcc2c95b0b1", 0x7c}, {&(0x7f00000025c0)="87fb74cf4d67adbbd062637f514c1f5eb18d7b442e6457a356c6cb1f71a43dfae773c8489cce5145f92615d4bdb13ef54d6ae90ec7733180fcf5adf3e13fdb05b57b748bd14eda042a97fdd84498304a504a0a159b972e8200c2d0f536a3465ec498ed12b924bd134057df36129d3ebe3dd3ce9f0671e5278143e4afa3d43f444681de1b5f9725fca34fa357fe2154981666fb9dc202fc17a0199eb1c25bdd1005e590e84783ee9894c888998dc25a83c14aeee31d114acfa0bcd235d571cd765f4b9259ba43e6fc30291d8a642146c4771898030b736aeee6b247abb0784b154e104e7dcda401f9b1736fea30a41a4153fe6a9a525bd0a3487571f914f05b590e242341ade289d8f5b842c6be4a93c2755dfd47174def782a2f8f61c068b5a012f02c0801601e860def788121e8808c01fed4c920a3698d0d684920918c95b17f76bbcb4f265c931d8f79560ff8114b70f4dd6791e2ed70cfeb89905791b88be26efe1c5c66b7b50b3d2be0dbc066dfc31618f9507f6f340b85a2f76a6dcac9d6ccc289ace5e5fecd25afe22ffa451f5e365ab33cc985f2e9d7f7fb1be4794740a94215d7db14b0ffcec19e5e3c5ae0d8578ef3b65d2a7a77a11e390a6c3a6b391061c886b961e3c2f42d62047bfe1356a44b840d3d956105f4c0fa95db08c4933f00de77cdc057c28b41fecfc8398c442be1ad065954f6c9dfeb2fd7207e8548a00a1d50bdf522d2abfdafd71723616a34830fbfa8fc81e0c2639cc12f363a4919b7a00ac8189dad3e7e54122a2ef430f623658d5e281c9a19442995bb9b0e3f7d13e3016b6f9523be196bf23bbcc5ec802f43ef8b651d688d9d5a44f35c9847e4c32bce3e9ebed2326adadc76f06a195db32c80b3090d7cd65c9d8518ba4e528c5eb5c7a1c5695b21595fa8a8621734bfda8afddd65e1f37a1990220a00fa9bd2c22b0117ceb08ae6af3c944c2eca924abfddad065d1472d0c3f742a49b1e78c669471873706ad157d831d7482b773f07b0673a6ce1e227a7a4d13744bf459434c0ab1c323a38b1a84cbf1ce9741f2b8fdcc2e073e56171603d035aacd83e71d5132831f4f1e8bf517979f132a33fd03783272e9b8c96dfa4e1d320a58d82acfc8d3d53a5a52daafe4dc8be08f4ad53e11cc21374b6ff4ff5ea2ecc5d3f7c057f74f0098e57d990090475cdaffdef0da917653ed10fb70b94b72e5b4d95cbea0fc1dd2579635ad6ab545ba4d7b6d2f5442bdb78beb6c8ed62942a439117025b4566b48d9f3a17fdf4577e8606a4bc4c26557e58312fd2d1a541ebec3e5ae28eef8b2ab0597083716dd12889335570ee7839530eee879d9b137606cd4dd7103991671b4464bb68529eb19fb7a8845e3491bfbac688a87cf0744f429ea112014402915c4c1f6bae08d689d3cb7d641d7befe8fc74a2242310a9a367a39531b4c86da5b39df524e52f33ff9c40b48cb196ffc9ca855b6e698ade8a83e52b9ddc5031ff09e1907e4f8b0d07e64e1fb8e427f8819a7be907aa216bf8e2a4c7cc87ed53bf9490d4cc788b91f3b9f705e984a7e62c7a495e8421b97c39dc954b35468f17c6682334f4e16308448f457faeffff6d1f818522fa441d3a48168bdb12ffebace436a3915b63076cb6a655718647f87eaaf313b5bbd430421eed3a2215e439600a56eac8c65291eb103326a8034662bd337ab51577d9110ec7151be5cc9c54b2a30891acac5ad006ed537dbeb8f16eecbde7cf4e71373faf3c36b772f6d7ea9346875c8cf1049d49d4f8eb01b946c11e8c8e3ab2015f282167acddcc77fff03e1be9134252af0abfe538b4d25fc4ff874b52b9fb0996b5f32b4141dbd30578ff46e13ef6c63fc1620f62cb11a3dce401993976c272a5f62fde3f2a0e654d19e7a39dcdb622b9526d2a15cc18e6f817c916a00775353dd9c8954e66d0445b59bb0f5e6e3b46447232f52a0e398b057d123ef503afcbd48544db6434d2025bfc8dab72262a4fa5426a03061e7f8966e0086ff8ab5a91ab59f19b830394ee8bc76d6fb4816b8f4cde35b7eb9d3811228d51c54828f97fd1e648196c81bc73ed56249a59f318704e84656a6cedd2b8c1e1808d1cc648749abc643131e494c01336d4a14b8609656f2c972dc23c5c2e43fe40119fb88b5ec2aade35c03646e347354c493de8ab3672ccf94af0df333c6678299129d79be0eec281c5b3858ce3995566a390b674635b356692e3e9c53a089638ba0d69e772b7b410a5ae03de12e7de755ee559e1707b7b8003aabc8e2ce03c01e3183ff2d93262f6d5ceaafecdae66bc7cb3952c5a6571d864d502f281db5a228695badca5d022fdb6da56ab15dc377d1c1f8581ff56e28c2b2a84edb629547d28275c2ed571103b4ca7cdeb0776ba9f9dffcd78d21c3d4caa9289ed199672f4e7b912068c49c817114c37d37ea03954bae87d1ddae3da2ad85feb2fbb735b75a51f7bee5c8d88cc7bf64700d1a46ec6b631ae22ac7b06730a86a26bdcb992e1c7b50142de96b14a8468e4514068a30896fc677fddefaebb125c693a8d460469c7fe535f844781940f66d6abd091191c3122d584f5b0f5b0d443713d7d5186124d73de28aca30b719d4a55e09d259bddbf16995aeb1000880890afbd24d4066b0398985a40999de22ce176348e1c1f57eaf75b92a1e4f1482e89a00ac2cc36b20e36af9ec310599c19a5b1d6f8fadba104c58c801c6633315f82ebfa88faddd0b693e2f827f586c1cc5538e93bcf10f81af6dd7ee727df3b5018c0b4e31e40d040a47503b6ace4d29a1162ce487351825255f5584aff7cbd421f85c3d9fbb3784abd9848f16028b68f0d32ed8bb80106e8cc4acb939ff88bd39976d166b2addebf628b3fcd056da2f60e1b90f7a32702954921908ebccb683622a1f574ceba6951bef5e751c338c8279318dc28e36b9fc2bb17c3ad08aceb00fc388e6db112a738f86a4a1eb11526e1b9d73250b326285ed47c4398d93a3933d9a784249b65ad7d78a1f81d96ef36493ed693045a2150a8eb43cecc0c93e7d20b15b39a0646b081c2923b816365b7fbb41683a41732d942c5aa12faf876ec7f036becde8f3295af6dacff38d076d8e06260fee167703bb610745374a2758a6b88e465ca77d1f3105ae8b6b04a1eb509fb178d6249dbbc84d5d1d069278449a89d03e4a9a395d8170c329a296cfc329798cb9b9f1078d098cf3f989fd4ec53e013fbe917df35292d44fb1f3da4da4432a1847d4721514ade8cda5e5c0b51183580fc35266a970ebba74faeda56d4dcb56df51f96ad237452cedbd0cb2bee112713c3d450835811bf3da9745136d428e148fd0932dc77c8d8e61a16c625241fad8425b4ece394eedd5f165bd94923bfa1172be8edc8a4fcaae5f77ee8cc510192b27964da09c3e84efb4bc7154da1a24da8b7e544b42278d2574687ec76143afa6cf193d52a2a7f4c20ee57b6056a1337d5e408117a6cf1ab49c8980f39597f69902085d3e8d374d44e6ab4ed1185a26be2bc7281e9cfbbeb6bed899aa1924d3faa06d95999fbeaf2337494e0c2c39eef5a73fcde84459a9ea48d4e015d9e5bb5839354967ce02f637bc8678d2595b9a918fc36b927d7501f0ac2e3471ce02b5df355689c87f191ef5390900a41deec29984e45a878ece964b0009aad561316fc3b30ce1b49266d32eb17cd30f3e17e1f59014e8c518940dd0a093d1349c1a7c2581963bbe0ba372b6426e81c33c71b2ec8141c5713e52a37fff0a417a5b259e1420d9fb6a731f5baa0cc494221947895aa8fa14745a986a366bff9d0c239a19f85372497565b5b703da16439019df5f3d29f4247fb528854c9648630f03e9dedde5a08a47728ea6a4d42e62eff6fa3bd402325e0f4387b60171c37c180f958ad80955779c899517e7ea76eed00598e01552eaaf08b723daf9d466e8c57af43a15a46528b1119f5074aa3c51f77357ebe158275bc06b89640d7ce3c0a03af01418d7dc6ae8a1be8ab08c1722d66d1e9277480b8b178447667c024f9b78f8a878a2d7cf8e83e5104f6964b2907a989abafc7d7d0df941abf3d7283b6a11d46c2911a42182ec27ab785d92946e1ee8ef44846d561850d2a98c305c382f36d4cfc9b2bfd3b86ef21a0d187adcafbec8268c7d662a34dda1c83c4967097743133bc8c587edf249f5668c34ddb112fa4eb1bea9c8f6a000f1f34428b54688a5e214a7919868b25dbe930e86a243ecf54afe0b518c647d04873d2cf62cb2ab27f00015537a4fd2ea3dc8777abdf3284622347016566da0b9c406ca8c40694e4013a53fbf2e803d51b0bbe5e9df5fc74f66be618856357ccf803c53ed0e3b3fe79f69f0ede9b565d8f7a8ce5aa8cbb4e8fa61be3fd00ffb07e45065498925c14c0b311942d4ed951ad6237aadb5405bc7b2d79e1fd295b7c2ed8efa883e44c86a5053e2f421c6d4dc0c47d3a05d911db37d6efdb8e50fb3f06139ac147bc7162c21aece79eaf72e9779f19eb5395cec3d15a7594ea70a6b373d98651d2215b210f037ea3f8a57ded74474f6fdb64a08b56af52168da70b30aee03472cd8bee5af04cad7303004a4aba464b99", 0xcb3}, {0x0}, {&(0x7f00000007c0)}, {&(0x7f0000000b00)="1b080b7a30aec939ce8e26e0cbbe37fc064ceef965fd5e3b6739c966492dbdf71c04423d8a403e56dfd224e4e55918a5e31e683fec5cc9460882a0d1628d02d51a8da997073f856e2cd00586c6e8c89c71cf8be6121b0b3a85d597a1afb0cc311f30cc26183c8e594ce5ff62661c9e32cbc9dd9a72985e9857f3bddb52382b6c27ca85d5774cf17b92e2d2097f12a8687e70f90d46381a47706a9124a2cf61b84f26aae22fd4da84ae35b93f7be9fdfdfbf33c59f5c657e9f7e81b81b786082f88af4de07808ff3c954bae", 0xcb}], 0x8, &(0x7f0000001480)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @private, @multicast1}}}], 0x20}, 0x0) syz_open_procfs$namespace(0x0, 0xfffffffffffffffe) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmsg$unix(r3, &(0x7f0000001140)={0x0, 0x2, &(0x7f0000001040)=[{&(0x7f00000015c0)=""/4096, 0x7ffff000}], 0x1}, 0x40000100) 439.03µs ago: executing program 1 (id=10272): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="180000000000000000000000000000001801000020207025000000002dba513d7b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000008fd8850000000400000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000000)={0xffffffffffffffff, 0xe0, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0}}, 0x10) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="0b00000007000000010001000900000001"], 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r0, &(0x7f0000000080), &(0x7f0000000200)=""/166}, 0x20) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000000)={{r0, 0xffffffffffffffff}, &(0x7f0000000580), &(0x7f00000005c0)}, 0x20) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x11, 0xd, &(0x7f00000002c0)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000003000000650000000800000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000140)='kmem_cache_free\x00', r2}, 0x10) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000740)={r0, &(0x7f0000000000), &(0x7f00000000c0)=""/109}, 0x20) mkdir(0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x6, 0x80, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}, 0x0, 0x0, 0x0, 0x996037d4553c1849}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='workqueue_activate_work\x00', r3}, 0x10) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x1, 0x4, 0x7fe2, 0x1, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000004c0)="c8", &(0x7f0000000900), 0x5, r4}, 0x38) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xd, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sock_ops, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={&(0x7f0000000180)='workqueue_activate_work\x00', r5}, 0x10) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0x0, @perf_config_ext}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000680)={&(0x7f0000000500)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x54, 0x54, 0x4, [@type_tag={0xf, 0x0, 0x0, 0x12, 0x2}, @ptr={0x3, 0x0, 0x0, 0x2, 0x3}, @array={0x0, 0x0, 0x0, 0x3, 0x0, {0x5, 0x3, 0x101}}, @array={0x0, 0x0, 0x0, 0x3, 0x0, {0x4, 0x1, 0x1}}, @const={0xd, 0x0, 0x0, 0xa, 0x5}]}, {0x0, [0x5f, 0x5f]}}, &(0x7f0000000600)=""/116, 0x70, 0x74, 0x1, 0x4c, 0x0, @void, @value}, 0x28) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000500)=ANY=[@ANYBLOB="1800000000000000000000000000000018010000786c6c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000002d00000095"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x3) bpf$MAP_CREATE(0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="090000000800000004000000094000000a000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="0000000000000000000043ee77fdfc5eba0f3c704d00"/39], 0x48) r7 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1801000011000000000000000000000018120000", @ANYRES32=r7, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000f6000000850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x24, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000000300)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18000000000000000000000000000000850000006d"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r8 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000300)='sys_enter\x00', r8}, 0x10) bpf$ITER_CREATE(0x21, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r6}, 0x10) 0s ago: executing program 3 (id=10273): r0 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x11, 0xf, &(0x7f0000000280)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b70200001400a685b7030000000000008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000000000008500000084000000b70000000000000095"], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x40f00, 0x8, '\x00', 0x0, @fallback=0x22, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000040)='kmem_cache_free\x00', r1}, 0x10) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x1c1341, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f00000000c0)={'syzkaller0\x00', 0x84aebfbd6349b7f2}) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) close(r3) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000029c0)) ioctl$SIOCSIFHWADDR(r3, 0x8914, &(0x7f0000002280)={'syzkaller0\x00', @link_local}) write$cgroup_subtree(r2, &(0x7f0000000440)=ANY=[@ANYBLOB="8fedcb5d07081175f37538e486dd6372ce22fdb932"], 0x36) kernel console output (not intermixed with test programs): ress+0x172/0x190 [ 1026.851040][T22292] sock_alloc_send_pskb+0x915/0xa50 [ 1026.856167][T22292] ? sock_kzfree_s+0x60/0x60 [ 1026.861246][T22292] ? stack_trace_save+0x113/0x1c0 [ 1026.866114][T22292] ? terminate_walk+0x407/0x4f0 [ 1026.871065][T22292] ? stack_trace_snprint+0xf0/0xf0 [ 1026.876707][T22292] tun_get_user+0xe90/0x38f0 [ 1026.881140][T22292] ? kmem_cache_free+0xa9/0x1e0 [ 1026.886006][T22292] ? _kstrtoull+0x3a0/0x4a0 [ 1026.890321][T22292] ? tun_do_read+0x1f60/0x1f60 [ 1026.894912][T22292] ? kstrtouint_from_user+0x20a/0x2a0 [ 1026.900138][T22292] ? kstrtol_from_user+0x310/0x310 [ 1026.905075][T22292] ? bpf_ringbuf_output+0x80/0x1f0 [ 1026.910019][T22292] ? avc_policy_seqno+0x1b/0x70 [ 1026.914706][T22292] ? selinux_file_permission+0x2bb/0x560 [ 1026.920172][T22292] ? fsnotify_perm+0x67/0x4e0 [ 1026.924688][T22292] tun_chr_write_iter+0x1a8/0x250 [ 1026.929544][T22292] vfs_write+0xb4c/0xe70 [ 1026.933628][T22292] ? kernel_write+0x3d0/0x3d0 [ 1026.938163][T22292] ? __fdget_pos+0x209/0x3a0 [ 1026.942567][T22292] ? ksys_write+0x77/0x2c0 [ 1026.946933][T22292] ksys_write+0x199/0x2c0 [ 1026.951643][T22292] ? __ia32_sys_read+0x90/0x90 [ 1026.956259][T22292] ? debug_smp_processor_id+0x17/0x20 [ 1026.961445][T22292] __x64_sys_write+0x7b/0x90 [ 1026.965897][T22292] do_syscall_64+0x34/0x70 [ 1026.970128][T22292] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 1026.975847][T22292] RIP: 0033:0x7faea9150819 [ 1026.981186][T22292] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 1027.000826][T22292] RSP: 002b:00007faea77c9038 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 1027.009151][T22292] RAX: ffffffffffffffda RBX: 00007faea9307fa0 RCX: 00007faea9150819 [ 1027.017219][T22292] RDX: 000000000000fdef RSI: 0000000020000000 RDI: 00000000000000c8 [ 1027.025284][T22292] RBP: 00007faea77c9090 R08: 0000000000000000 R09: 0000000000000000 [ 1027.033282][T22292] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1027.041790][T22292] R13: 0000000000000000 R14: 00007faea9307fa0 R15: 00007fff367d4908 [ 1027.566998][ T24] audit: type=1400 audit(1732157343.020:153): avc: denied { create } for pid=22310 comm="syz.2.7327" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rxrpc_socket permissive=1 [ 1034.593877][T22526] device veth0_to_bond entered promiscuous mode [ 1035.805513][T22578] FAULT_INJECTION: forcing a failure. [ 1035.805513][T22578] name failslab, interval 1, probability 0, space 0, times 0 [ 1035.835330][T22578] CPU: 1 PID: 22578 Comm: syz.0.7421 Tainted: G W 5.10.226-syzkaller-00001-g6a01908517df #0 [ 1035.846738][T22578] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 1035.856623][T22578] Call Trace: [ 1035.859761][T22578] dump_stack_lvl+0x1e2/0x24b [ 1035.864426][T22578] ? bfq_pos_tree_add_move+0x43b/0x43b [ 1035.869720][T22578] ? do_syscall_64+0x34/0x70 [ 1035.874270][T22578] dump_stack+0x15/0x17 [ 1035.878251][T22578] should_fail+0x3c6/0x510 [ 1035.882713][T22578] ? sk_prot_alloc+0x5f/0x370 [ 1035.887226][T22578] __should_failslab+0xa4/0xe0 [ 1035.891833][T22578] should_failslab+0x9/0x20 [ 1035.896162][T22578] kmem_cache_alloc+0x3d/0x2e0 [ 1035.900761][T22578] sk_prot_alloc+0x5f/0x370 [ 1035.905099][T22578] sk_alloc+0x38/0x4d0 [ 1035.909010][T22578] ? slab_post_alloc_hook+0x80/0x2f0 [ 1035.914127][T22578] tipc_sk_create+0x103/0x1e70 [ 1035.918742][T22578] ? security_inode_alloc+0x29/0x120 [ 1035.923888][T22578] ? __kasan_check_write+0x14/0x20 [ 1035.928812][T22578] ? _raw_spin_lock+0xa4/0x1b0 [ 1035.934039][T22578] ? _raw_spin_trylock_bh+0x190/0x190 [ 1035.939342][T22578] ? security_inode_alloc+0xc0/0x120 [ 1035.944455][T22578] ? inode_init_always+0x77e/0x9f0 [ 1035.949402][T22578] __sock_create+0x3a6/0x760 [ 1035.953847][T22578] __sys_socketpair+0x313/0x6e0 [ 1035.958688][T22578] ? __ia32_sys_socket+0x90/0x90 [ 1035.963460][T22578] ? __ia32_sys_read+0x90/0x90 [ 1035.968063][T22578] __x64_sys_socketpair+0x9b/0xb0 [ 1035.973006][T22578] do_syscall_64+0x34/0x70 [ 1035.977259][T22578] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 1035.983449][T22578] RIP: 0033:0x7fcf59792819 [ 1035.987701][T22578] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 1036.007361][T22578] RSP: 002b:00007fcf57e0b038 EFLAGS: 00000246 ORIG_RAX: 0000000000000035 [ 1036.015589][T22578] RAX: ffffffffffffffda RBX: 00007fcf59949fa0 RCX: 00007fcf59792819 [ 1036.023398][T22578] RDX: 0000000000000000 RSI: 0000000000000005 RDI: 000000000000001e [ 1036.031211][T22578] RBP: 00007fcf57e0b090 R08: 0000000000000000 R09: 0000000000000000 [ 1036.039025][T22578] R10: 0000000020000940 R11: 0000000000000246 R12: 0000000000000001 [ 1036.046837][T22578] R13: 0000000000000000 R14: 00007fcf59949fa0 R15: 00007ffdbf6874f8 [ 1036.936007][T22604] FAULT_INJECTION: forcing a failure. [ 1036.936007][T22604] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1037.011817][T22606] syz.2.7431[22606] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1037.011873][T22606] syz.2.7431[22606] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1037.085236][T22604] CPU: 0 PID: 22604 Comm: syz.0.7430 Tainted: G W 5.10.226-syzkaller-00001-g6a01908517df #0 [ 1037.107738][T22604] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 1037.117629][T22604] Call Trace: [ 1037.120936][T22604] dump_stack_lvl+0x1e2/0x24b [ 1037.125445][T22604] ? panic+0x812/0x812 [ 1037.129351][T22604] ? bfq_pos_tree_add_move+0x43b/0x43b [ 1037.134648][T22604] dump_stack+0x15/0x17 [ 1037.138637][T22604] should_fail+0x3c6/0x510 [ 1037.142891][T22604] should_fail_usercopy+0x1a/0x20 [ 1037.147749][T22604] strncpy_from_user+0x24/0x2d0 [ 1037.152438][T22604] ? bpf_trace_printk+0xa7d/0xd50 [ 1037.157295][T22604] ? getname_flags+0xba/0x520 [ 1037.161810][T22604] getname_flags+0xf2/0x520 [ 1037.166148][T22604] getname+0x19/0x20 [ 1037.169878][T22604] do_sys_openat2+0xd7/0x710 [ 1037.174308][T22604] ? do_sys_open+0x220/0x220 [ 1037.178738][T22604] ? bpf_trace_run2+0xf4/0x280 [ 1037.183338][T22604] __x64_sys_openat+0x243/0x290 [ 1037.188022][T22604] ? __ia32_sys_open+0x270/0x270 [ 1037.192796][T22604] ? __bpf_trace_sys_enter+0x62/0x70 [ 1037.197920][T22604] ? syscall_enter_from_user_mode+0x144/0x1a0 [ 1037.203986][T22604] do_syscall_64+0x34/0x70 [ 1037.208196][T22604] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 1037.214109][T22604] RIP: 0033:0x7fcf59792819 [ 1037.218355][T22604] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 1037.237788][T22604] RSP: 002b:00007fcf57e0b038 EFLAGS: 00000246 ORIG_RAX: 0000000000000101 [ 1037.246037][T22604] RAX: ffffffffffffffda RBX: 00007fcf59949fa0 RCX: 00007fcf59792819 [ 1037.253831][T22604] RDX: 0000000000000201 RSI: 0000000020003000 RDI: 0000000000000003 [ 1037.261640][T22604] RBP: 00007fcf57e0b090 R08: 0000000000000000 R09: 0000000000000000 [ 1037.269449][T22604] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1037.277267][T22604] R13: 0000000000000000 R14: 00007fcf59949fa0 R15: 00007ffdbf6874f8 [ 1037.463825][T22606] device syzkaller0 entered promiscuous mode [ 1046.091122][T22753] device pim6reg1 entered promiscuous mode [ 1048.942374][T22835] device syzkaller0 entered promiscuous mode [ 1050.708969][T22904] device syzkaller0 entered promiscuous mode [ 1050.755483][T22910] device veth0_to_team entered promiscuous mode [ 1052.031171][T22940] device syzkaller0 entered promiscuous mode [ 1054.563813][T22999] device syzkaller0 entered promiscuous mode [ 1056.750927][T23078] device pim6reg1 entered promiscuous mode [ 1056.814664][ T24] audit: type=1400 audit(1732157372.270:154): avc: denied { create } for pid=23072 comm="syz.0.7587" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rose_socket permissive=1 [ 1058.383014][T23165] FAULT_INJECTION: forcing a failure. [ 1058.383014][T23165] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1058.538927][T23165] CPU: 1 PID: 23165 Comm: syz.2.7617 Tainted: G W 5.10.226-syzkaller-00001-g6a01908517df #0 [ 1058.550110][T23165] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 1058.559996][T23165] Call Trace: [ 1058.563184][T23165] dump_stack_lvl+0x1e2/0x24b [ 1058.567644][T23165] ? bfq_pos_tree_add_move+0x43b/0x43b [ 1058.572944][T23165] ? 0xffffffffa002a000 [ 1058.577338][T23165] ? is_bpf_text_address+0x172/0x190 [ 1058.582405][T23165] dump_stack+0x15/0x17 [ 1058.586386][T23165] should_fail+0x3c6/0x510 [ 1058.590641][T23165] should_fail_usercopy+0x1a/0x20 [ 1058.595507][T23165] _copy_from_user+0x20/0xd0 [ 1058.599930][T23165] __se_sys_bpf+0x232/0x11cb0 [ 1058.604445][T23165] ? stack_trace_save+0x113/0x1c0 [ 1058.609399][T23165] ? terminate_walk+0x407/0x4f0 [ 1058.614080][T23165] ? stack_trace_snprint+0xf0/0xf0 [ 1058.619026][T23165] ? kmem_cache_free+0xa9/0x1e0 [ 1058.623718][T23165] ? kmem_cache_free+0xa9/0x1e0 [ 1058.628413][T23165] ? kasan_set_track+0x5d/0x70 [ 1058.632992][T23165] ? __x64_sys_bpf+0x90/0x90 [ 1058.637416][T23165] ? __kasan_slab_free+0x11/0x20 [ 1058.642190][T23165] ? slab_free_freelist_hook+0xc0/0x190 [ 1058.647756][T23165] ? kmem_cache_free+0xa9/0x1e0 [ 1058.652445][T23165] ? putname+0xe7/0x140 [ 1058.656609][T23165] ? do_sys_openat2+0x1fc/0x710 [ 1058.661470][T23165] ? __x64_sys_openat+0x243/0x290 [ 1058.666326][T23165] ? do_syscall_64+0x34/0x70 [ 1058.670749][T23165] ? _kstrtoull+0x3a0/0x4a0 [ 1058.675086][T23165] ? kstrtouint_from_user+0x20a/0x2a0 [ 1058.680290][T23165] ? kstrtol_from_user+0x310/0x310 [ 1058.685245][T23165] ? memset+0x35/0x40 [ 1058.689060][T23165] ? __fsnotify_parent+0x4b9/0x6c0 [ 1058.694011][T23165] ? fsnotify_set_children_dentry_flags+0x210/0x210 [ 1058.700439][T23165] ? proc_fail_nth_write+0x20b/0x290 [ 1058.705569][T23165] ? proc_fail_nth_read+0x210/0x210 [ 1058.710604][T23165] ? security_file_permission+0x86/0xb0 [ 1058.715982][T23165] ? rw_verify_area+0x1c3/0x360 [ 1058.720659][T23165] ? preempt_count_add+0x92/0x1a0 [ 1058.725514][T23165] ? vfs_write+0x852/0xe70 [ 1058.729764][T23165] ? kmem_cache_free+0xa9/0x1e0 [ 1058.734804][T23165] ? kernel_write+0x3d0/0x3d0 [ 1058.739398][T23165] ? __kasan_check_write+0x14/0x20 [ 1058.744348][T23165] ? mutex_lock+0xa5/0x110 [ 1058.748606][T23165] ? mutex_trylock+0xa0/0xa0 [ 1058.753138][T23165] ? __kasan_check_write+0x14/0x20 [ 1058.758199][T23165] ? fput_many+0x160/0x1b0 [ 1058.762406][T23165] ? debug_smp_processor_id+0x17/0x20 [ 1058.767696][T23165] __x64_sys_bpf+0x7b/0x90 [ 1058.771966][T23165] do_syscall_64+0x34/0x70 [ 1058.776227][T23165] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 1058.782018][T23165] RIP: 0033:0x7fa318854819 [ 1058.786369][T23165] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 1058.806486][T23165] RSP: 002b:00007fa316ecd038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 1058.814733][T23165] RAX: ffffffffffffffda RBX: 00007fa318a0bfa0 RCX: 00007fa318854819 [ 1058.822553][T23165] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000007 [ 1058.830355][T23165] RBP: 00007fa316ecd090 R08: 0000000000000000 R09: 0000000000000000 [ 1058.838165][T23165] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1058.846004][T23165] R13: 0000000000000001 R14: 00007fa318a0bfa0 R15: 00007fff9a280668 [ 1058.897702][T23177] syz.2.7622[23177] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1058.897759][T23177] syz.2.7622[23177] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1063.856698][T23287] FAULT_INJECTION: forcing a failure. [ 1063.856698][T23287] name failslab, interval 1, probability 0, space 0, times 0 [ 1064.326552][T23287] CPU: 1 PID: 23287 Comm: syz.3.7656 Tainted: G W 5.10.226-syzkaller-00001-g6a01908517df #0 [ 1064.337732][T23287] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 1064.347972][T23287] Call Trace: [ 1064.351252][T23287] dump_stack_lvl+0x1e2/0x24b [ 1064.355758][T23287] ? bfq_pos_tree_add_move+0x43b/0x43b [ 1064.361058][T23287] dump_stack+0x15/0x17 [ 1064.365047][T23287] should_fail+0x3c6/0x510 [ 1064.369310][T23287] ? security_file_alloc+0x29/0x120 [ 1064.374448][T23287] __should_failslab+0xa4/0xe0 [ 1064.379738][T23287] should_failslab+0x9/0x20 [ 1064.384074][T23287] kmem_cache_alloc+0x3d/0x2e0 [ 1064.388776][T23287] ? __alloc_file+0x29/0x330 [ 1064.393208][T23287] security_file_alloc+0x29/0x120 [ 1064.398066][T23287] __alloc_file+0xbf/0x330 [ 1064.402438][T23287] alloc_empty_file+0x95/0x180 [ 1064.407352][T23287] alloc_file+0x5a/0x4e0 [ 1064.411418][T23287] alloc_file_pseudo+0x259/0x2f0 [ 1064.416189][T23287] ? alloc_empty_file_noaccount+0x80/0x80 [ 1064.421921][T23287] ? _raw_spin_lock_bh+0xa4/0x1b0 [ 1064.426882][T23287] anon_inode_getfile+0xa7/0x180 [ 1064.431779][T23287] bpf_link_prime+0xed/0x250 [ 1064.436202][T23287] bpf_tracing_prog_attach+0x715/0xbb0 [ 1064.441500][T23287] ? bpf_map_do_batch+0x620/0x620 [ 1064.446356][T23287] ? __fget_files+0x31e/0x380 [ 1064.450870][T23287] ? __kasan_check_write+0x14/0x20 [ 1064.455815][T23287] ? fput_many+0x160/0x1b0 [ 1064.460067][T23287] __se_sys_bpf+0x5c0e/0x11cb0 [ 1064.464670][T23287] ? stack_trace_save+0x113/0x1c0 [ 1064.469534][T23287] ? terminate_walk+0x407/0x4f0 [ 1064.474403][T23287] ? stack_trace_snprint+0xf0/0xf0 [ 1064.479438][T23287] ? kmem_cache_free+0xa9/0x1e0 [ 1064.484110][T23287] ? kmem_cache_free+0xa9/0x1e0 [ 1064.488798][T23287] ? kasan_set_track+0x5d/0x70 [ 1064.493407][T23287] ? __x64_sys_bpf+0x90/0x90 [ 1064.498426][T23287] ? __kasan_slab_free+0x11/0x20 [ 1064.503203][T23287] ? slab_free_freelist_hook+0xc0/0x190 [ 1064.508585][T23287] ? kmem_cache_free+0xa9/0x1e0 [ 1064.513530][T23287] ? putname+0xe7/0x140 [ 1064.517523][T23287] ? do_sys_openat2+0x1fc/0x710 [ 1064.522296][T23287] ? __x64_sys_openat+0x243/0x290 [ 1064.527156][T23287] ? do_syscall_64+0x34/0x70 [ 1064.531583][T23287] ? _kstrtoull+0x3a0/0x4a0 [ 1064.535927][T23287] ? kstrtouint_from_user+0x20a/0x2a0 [ 1064.541134][T23287] ? kstrtol_from_user+0x310/0x310 [ 1064.546172][T23287] ? memset+0x35/0x40 [ 1064.549987][T23287] ? __fsnotify_parent+0x4b9/0x6c0 [ 1064.554932][T23287] ? fsnotify_set_children_dentry_flags+0x210/0x210 [ 1064.561354][T23287] ? proc_fail_nth_write+0x20b/0x290 [ 1064.566474][T23287] ? proc_fail_nth_read+0x210/0x210 [ 1064.571509][T23287] ? security_file_permission+0x86/0xb0 [ 1064.576890][T23287] ? rw_verify_area+0x1c3/0x360 [ 1064.581576][T23287] ? preempt_count_add+0x92/0x1a0 [ 1064.586440][T23287] ? vfs_write+0x852/0xe70 [ 1064.590700][T23287] ? kmem_cache_free+0xa9/0x1e0 [ 1064.595394][T23287] ? __kasan_check_write+0x14/0x20 [ 1064.600324][T23287] ? fput_many+0x160/0x1b0 [ 1064.604582][T23287] ? debug_smp_processor_id+0x17/0x20 [ 1064.609959][T23287] __x64_sys_bpf+0x7b/0x90 [ 1064.614209][T23287] do_syscall_64+0x34/0x70 [ 1064.618465][T23287] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 1064.624195][T23287] RIP: 0033:0x7f2a740a8819 [ 1064.628445][T23287] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 1064.648423][T23287] RSP: 002b:00007f2a72700038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 1064.656753][T23287] RAX: ffffffffffffffda RBX: 00007f2a74260080 RCX: 00007f2a740a8819 [ 1064.664553][T23287] RDX: 0000000000000010 RSI: 0000000020000040 RDI: 0000000000000011 [ 1064.672954][T23287] RBP: 00007f2a72700090 R08: 0000000000000000 R09: 0000000000000000 [ 1064.680883][T23287] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1064.688694][T23287] R13: 0000000000000000 R14: 00007f2a74260080 R15: 00007ffc435513a8 [ 1068.555391][T23373] device pim6reg1 entered promiscuous mode [ 1070.536670][T23406] device pim6reg1 entered promiscuous mode [ 1071.449336][T23427] device pim6reg1 entered promiscuous mode [ 1089.971699][ T24] audit: type=1400 audit(1732157405.430:155): avc: denied { create } for pid=23782 comm="syz.1.7817" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_dnrt_socket permissive=1 [ 1098.531324][T23955] IPv6: wlan1: Disabled Multicast RS [ 1098.741731][T23964] FAULT_INJECTION: forcing a failure. [ 1098.741731][T23964] name failslab, interval 1, probability 0, space 0, times 0 [ 1098.837339][T23964] CPU: 0 PID: 23964 Comm: syz.0.7877 Tainted: G W 5.10.226-syzkaller-00001-g6a01908517df #0 [ 1098.848530][T23964] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 1098.858423][T23964] Call Trace: [ 1098.861552][T23964] dump_stack_lvl+0x1e2/0x24b [ 1098.866063][T23964] ? panic+0x812/0x812 [ 1098.869965][T23964] ? bfq_pos_tree_add_move+0x43b/0x43b [ 1098.875263][T23964] ? __kasan_slab_alloc+0xc3/0xe0 [ 1098.880125][T23964] ? slab_post_alloc_hook+0x61/0x2f0 [ 1098.885241][T23964] ? kmem_cache_alloc+0x168/0x2e0 [ 1098.890107][T23964] ? security_inode_alloc+0x29/0x120 [ 1098.895226][T23964] ? inode_init_always+0x767/0x9f0 [ 1098.900225][T23964] dump_stack+0x15/0x17 [ 1098.904169][T23964] should_fail+0x3c6/0x510 [ 1098.908422][T23964] ? __alloc_skb+0x80/0x510 [ 1098.912755][T23964] __should_failslab+0xa4/0xe0 [ 1098.917355][T23964] should_failslab+0x9/0x20 [ 1098.921696][T23964] kmem_cache_alloc+0x3d/0x2e0 [ 1098.926293][T23964] __alloc_skb+0x80/0x510 [ 1098.930460][T23964] ? memcpy+0x56/0x70 [ 1098.934280][T23964] alloc_skb_with_frags+0xa1/0x570 [ 1098.939231][T23964] ? avc_has_perm_noaudit+0x240/0x240 [ 1098.944434][T23964] sock_alloc_send_pskb+0x915/0xa50 [ 1098.949472][T23964] ? sock_kzfree_s+0x60/0x60 [ 1098.953896][T23964] ? __kasan_check_write+0x14/0x20 [ 1098.958839][T23964] ? _raw_spin_lock+0xa4/0x1b0 [ 1098.963443][T23964] ? _raw_spin_trylock_bh+0x190/0x190 [ 1098.968650][T23964] unix_dgram_sendmsg+0x700/0x1f90 [ 1098.973700][T23964] ? selinux_socket_sendmsg+0x243/0x340 [ 1098.979072][T23964] ? unix_dgram_poll+0x610/0x610 [ 1098.983871][T23964] ? kmem_cache_free+0xa9/0x1e0 [ 1098.988539][T23964] ? kasan_set_track+0x5d/0x70 [ 1098.993142][T23964] unix_seqpacket_sendmsg+0x120/0x1f0 [ 1098.998549][T23964] ? unix_dgram_peer_wake_me+0x3e0/0x3e0 [ 1099.004019][T23964] ____sys_sendmsg+0x59e/0x8f0 [ 1099.008616][T23964] ? __sys_sendmsg_sock+0x40/0x40 [ 1099.013477][T23964] ? import_iovec+0xe5/0x120 [ 1099.017902][T23964] ___sys_sendmsg+0x252/0x2e0 [ 1099.022415][T23964] ? __sys_sendmsg+0x280/0x280 [ 1099.027012][T23964] ? rw_verify_area+0x1c3/0x360 [ 1099.031718][T23964] ? __fdget+0x1bc/0x240 [ 1099.035784][T23964] __se_sys_sendmsg+0x1b1/0x280 [ 1099.040481][T23964] ? __x64_sys_sendmsg+0x90/0x90 [ 1099.045241][T23964] ? ksys_write+0x260/0x2c0 [ 1099.049590][T23964] ? debug_smp_processor_id+0x17/0x20 [ 1099.054791][T23964] __x64_sys_sendmsg+0x7b/0x90 [ 1099.059396][T23964] do_syscall_64+0x34/0x70 [ 1099.063642][T23964] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 1099.069366][T23964] RIP: 0033:0x7fcf59792819 [ 1099.073621][T23964] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 1099.093057][T23964] RSP: 002b:00007fcf57e0b038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 1099.101297][T23964] RAX: ffffffffffffffda RBX: 00007fcf59949fa0 RCX: 00007fcf59792819 [ 1099.109111][T23964] RDX: 0000000000000000 RSI: 0000000020000100 RDI: 0000000000000009 [ 1099.116922][T23964] RBP: 00007fcf57e0b090 R08: 0000000000000000 R09: 0000000000000000 [ 1099.124731][T23964] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1099.132543][T23964] R13: 0000000000000000 R14: 00007fcf59949fa0 R15: 00007ffdbf6874f8 [ 1109.044231][T24120] device pim6reg1 entered promiscuous mode [ 1112.557231][T24193] device pim6reg1 entered promiscuous mode [ 1113.958043][T24230] device pim6reg1 entered promiscuous mode [ 1116.430983][T24277] device pim6reg1 entered promiscuous mode [ 1118.669901][T24315] device pim6reg1 entered promiscuous mode [ 1155.231057][T24789] FAULT_INJECTION: forcing a failure. [ 1155.231057][T24789] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1155.273396][T24789] CPU: 1 PID: 24789 Comm: syz.1.8140 Tainted: G W 5.10.226-syzkaller-00001-g6a01908517df #0 [ 1155.285030][T24789] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 1155.294920][T24789] Call Trace: [ 1155.298045][T24789] dump_stack_lvl+0x1e2/0x24b [ 1155.302546][T24789] ? bfq_pos_tree_add_move+0x43b/0x43b [ 1155.307858][T24789] dump_stack+0x15/0x17 [ 1155.312008][T24789] should_fail+0x3c6/0x510 [ 1155.316566][T24789] should_fail_alloc_page+0x52/0x60 [ 1155.321576][T24789] __alloc_pages_nodemask+0x1b3/0xaf0 [ 1155.326857][T24789] ? gfp_pfmemalloc_allowed+0x120/0x120 [ 1155.332230][T24789] ? pcpu_block_update_hint_alloc+0x935/0xcf0 [ 1155.338149][T24789] pcpu_populate_chunk+0x190/0xe10 [ 1155.343094][T24789] pcpu_alloc+0xa81/0x1420 [ 1155.347341][T24789] __alloc_percpu_gfp+0x27/0x30 [ 1155.352037][T24789] array_map_alloc+0x486/0x7c0 [ 1155.356633][T24789] ? bpf_percpu_array_update+0x6d0/0x6d0 [ 1155.362089][T24789] ? selinux_bpf+0xcb/0x100 [ 1155.366428][T24789] ? array_map_alloc_check+0x27b/0x350 [ 1155.371721][T24789] __se_sys_bpf+0x620f/0x11cb0 [ 1155.376319][T24789] ? stack_trace_save+0x113/0x1c0 [ 1155.381183][T24789] ? terminate_walk+0x407/0x4f0 [ 1155.385867][T24789] ? stack_trace_snprint+0xf0/0xf0 [ 1155.390815][T24789] ? kmem_cache_free+0xa9/0x1e0 [ 1155.395497][T24789] ? kmem_cache_free+0xa9/0x1e0 [ 1155.400273][T24789] ? kasan_set_track+0x5d/0x70 [ 1155.404871][T24789] ? __x64_sys_bpf+0x90/0x90 [ 1155.409303][T24789] ? __kasan_slab_free+0x11/0x20 [ 1155.414070][T24789] ? slab_free_freelist_hook+0xc0/0x190 [ 1155.419455][T24789] ? kmem_cache_free+0xa9/0x1e0 [ 1155.424139][T24789] ? putname+0xe7/0x140 [ 1155.428139][T24789] ? do_sys_openat2+0x1fc/0x710 [ 1155.432824][T24789] ? __x64_sys_openat+0x243/0x290 [ 1155.437678][T24789] ? do_syscall_64+0x34/0x70 [ 1155.442109][T24789] ? _kstrtoull+0x3a0/0x4a0 [ 1155.446571][T24789] ? kstrtouint_from_user+0x20a/0x2a0 [ 1155.451787][T24789] ? kstrtol_from_user+0x310/0x310 [ 1155.456804][T24789] ? memset+0x35/0x40 [ 1155.460619][T24789] ? __fsnotify_parent+0x4b9/0x6c0 [ 1155.465661][T24789] ? fsnotify_set_children_dentry_flags+0x210/0x210 [ 1155.472084][T24789] ? proc_fail_nth_write+0x20b/0x290 [ 1155.477199][T24789] ? proc_fail_nth_read+0x210/0x210 [ 1155.482234][T24789] ? security_file_permission+0x86/0xb0 [ 1155.487612][T24789] ? rw_verify_area+0x1c3/0x360 [ 1155.492301][T24789] ? preempt_count_add+0x92/0x1a0 [ 1155.497157][T24789] ? vfs_write+0x852/0xe70 [ 1155.501433][T24789] ? kmem_cache_free+0xa9/0x1e0 [ 1155.506273][T24789] ? kernel_write+0x3d0/0x3d0 [ 1155.510787][T24789] ? __kasan_check_write+0x14/0x20 [ 1155.515731][T24789] ? mutex_lock+0xa5/0x110 [ 1155.520095][T24789] ? mutex_trylock+0xa0/0xa0 [ 1155.524778][T24789] ? __kasan_check_write+0x14/0x20 [ 1155.529714][T24789] ? fput_many+0x160/0x1b0 [ 1155.534015][T24789] ? debug_smp_processor_id+0x17/0x20 [ 1155.539180][T24789] __x64_sys_bpf+0x7b/0x90 [ 1155.543425][T24789] do_syscall_64+0x34/0x70 [ 1155.547701][T24789] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 1155.553398][T24789] RIP: 0033:0x7faea9150819 [ 1155.557651][T24789] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 1155.577238][T24789] RSP: 002b:00007faea77c9038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 1155.585622][T24789] RAX: ffffffffffffffda RBX: 00007faea9307fa0 RCX: 00007faea9150819 [ 1155.593436][T24789] RDX: 0000000000000050 RSI: 0000000020000000 RDI: 2000000000000000 [ 1155.601268][T24789] RBP: 00007faea77c9090 R08: 0000000000000000 R09: 0000000000000000 [ 1155.609060][T24789] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1155.616871][T24789] R13: 0000000000000001 R14: 00007faea9307fa0 R15: 00007fff367d4908 [ 1156.659362][ T24] audit: type=1400 audit(1732157472.120:156): avc: denied { create } for pid=24812 comm="syz.3.8149" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=caif_socket permissive=1 [ 1156.703276][ T24] audit: type=1400 audit(1732157472.150:157): avc: denied { create } for pid=24812 comm="syz.3.8149" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 1166.866706][T24974] device wg2 left promiscuous mode [ 1166.949717][T24974] device wg2 entered promiscuous mode [ 1176.948137][T25139] device syzkaller0 entered promiscuous mode [ 1177.100971][T25143] device veth0_vlan left promiscuous mode [ 1177.154808][T25143] device veth0_vlan entered promiscuous mode [ 1177.289583][ T414] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1177.300229][ T414] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1177.307900][ T414] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1177.933181][T25156] FAULT_INJECTION: forcing a failure. [ 1177.933181][T25156] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1178.176758][T25156] CPU: 0 PID: 25156 Comm: syz.3.8258 Tainted: G W 5.10.226-syzkaller-00001-g6a01908517df #0 [ 1178.187939][T25156] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 1178.197834][T25156] Call Trace: [ 1178.200994][T25156] dump_stack_lvl+0x1e2/0x24b [ 1178.205618][T25156] ? bfq_pos_tree_add_move+0x43b/0x43b [ 1178.210893][T25156] dump_stack+0x15/0x17 [ 1178.215061][T25156] should_fail+0x3c6/0x510 [ 1178.219340][T25156] should_fail_usercopy+0x1a/0x20 [ 1178.224138][T25156] _copy_from_user+0x20/0xd0 [ 1178.228656][T25156] generic_map_update_batch+0x4e5/0x860 [ 1178.234035][T25156] ? generic_map_delete_batch+0x630/0x630 [ 1178.239589][T25156] ? generic_map_delete_batch+0x630/0x630 [ 1178.245361][T25156] bpf_map_do_batch+0x4c3/0x620 [ 1178.250022][T25156] __se_sys_bpf+0xc3c/0x11cb0 [ 1178.254536][T25156] ? stack_trace_save+0x113/0x1c0 [ 1178.259394][T25156] ? terminate_walk+0x407/0x4f0 [ 1178.264164][T25156] ? stack_trace_snprint+0xf0/0xf0 [ 1178.269116][T25156] ? kmem_cache_free+0xa9/0x1e0 [ 1178.273797][T25156] ? kmem_cache_free+0xa9/0x1e0 [ 1178.278493][T25156] ? kasan_set_track+0x5d/0x70 [ 1178.283085][T25156] ? __x64_sys_bpf+0x90/0x90 [ 1178.287525][T25156] ? __kasan_slab_free+0x11/0x20 [ 1178.292286][T25156] ? slab_free_freelist_hook+0xc0/0x190 [ 1178.297666][T25156] ? kmem_cache_free+0xa9/0x1e0 [ 1178.302351][T25156] ? putname+0xe7/0x140 [ 1178.306343][T25156] ? do_sys_openat2+0x1fc/0x710 [ 1178.311030][T25156] ? __x64_sys_openat+0x243/0x290 [ 1178.315892][T25156] ? do_syscall_64+0x34/0x70 [ 1178.320321][T25156] ? _kstrtoull+0x3a0/0x4a0 [ 1178.324661][T25156] ? kstrtouint_from_user+0x20a/0x2a0 [ 1178.329864][T25156] ? kstrtol_from_user+0x310/0x310 [ 1178.334819][T25156] ? memset+0x35/0x40 [ 1178.338634][T25156] ? __fsnotify_parent+0x4b9/0x6c0 [ 1178.343579][T25156] ? fsnotify_set_children_dentry_flags+0x210/0x210 [ 1178.350004][T25156] ? proc_fail_nth_write+0x20b/0x290 [ 1178.355120][T25156] ? proc_fail_nth_read+0x210/0x210 [ 1178.360158][T25156] ? security_file_permission+0x86/0xb0 [ 1178.365539][T25156] ? rw_verify_area+0x1c3/0x360 [ 1178.370223][T25156] ? preempt_count_add+0x92/0x1a0 [ 1178.375108][T25156] ? vfs_write+0x852/0xe70 [ 1178.379338][T25156] ? kmem_cache_free+0xa9/0x1e0 [ 1178.384030][T25156] ? kernel_write+0x3d0/0x3d0 [ 1178.388538][T25156] ? __kasan_check_write+0x14/0x20 [ 1178.393791][T25156] ? mutex_lock+0xa5/0x110 [ 1178.398182][T25156] ? mutex_trylock+0xa0/0xa0 [ 1178.402695][T25156] ? __kasan_check_write+0x14/0x20 [ 1178.407551][T25156] ? fput_many+0x160/0x1b0 [ 1178.411812][T25156] ? debug_smp_processor_id+0x17/0x20 [ 1178.417010][T25156] __x64_sys_bpf+0x7b/0x90 [ 1178.421277][T25156] do_syscall_64+0x34/0x70 [ 1178.425516][T25156] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 1178.431244][T25156] RIP: 0033:0x7f2a740a8819 [ 1178.435491][T25156] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 1178.454929][T25156] RSP: 002b:00007f2a72721038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 1178.463174][T25156] RAX: ffffffffffffffda RBX: 00007f2a7425ffa0 RCX: 00007f2a740a8819 [ 1178.470985][T25156] RDX: 0000000000000038 RSI: 0000000020000400 RDI: 000000000000001a [ 1178.478796][T25156] RBP: 00007f2a72721090 R08: 0000000000000000 R09: 0000000000000000 [ 1178.487127][T25156] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1178.494988][T25156] R13: 0000000000000000 R14: 00007f2a7425ffa0 R15: 00007ffc435513a8 [ 1182.376593][T25281] FAULT_INJECTION: forcing a failure. [ 1182.376593][T25281] name failslab, interval 1, probability 0, space 0, times 0 [ 1182.500979][T25281] CPU: 1 PID: 25281 Comm: syz.4.8299 Tainted: G W 5.10.226-syzkaller-00001-g6a01908517df #0 [ 1182.512252][T25281] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 1182.524625][T25281] Call Trace: [ 1182.527842][T25281] dump_stack_lvl+0x1e2/0x24b [ 1182.532365][T25281] ? bfq_pos_tree_add_move+0x43b/0x43b [ 1182.537734][T25281] ? __get_vm_area_node+0x116/0x470 [ 1182.542924][T25281] ? ____kasan_kmalloc+0xed/0x110 [ 1182.547955][T25281] ? __kasan_kmalloc+0x9/0x10 [ 1182.552463][T25281] dump_stack+0x15/0x17 [ 1182.556455][T25281] should_fail+0x3c6/0x510 [ 1182.560714][T25281] ? alloc_vmap_area+0x16f/0x1a90 [ 1182.565590][T25281] __should_failslab+0xa4/0xe0 [ 1182.570343][T25281] should_failslab+0x9/0x20 [ 1182.574681][T25281] kmem_cache_alloc+0x3d/0x2e0 [ 1182.579287][T25281] alloc_vmap_area+0x16f/0x1a90 [ 1182.583977][T25281] ? vm_map_ram+0x9d0/0x9d0 [ 1182.588305][T25281] ? __kasan_kmalloc+0x9/0x10 [ 1182.592828][T25281] ? kmem_cache_alloc_trace+0x18a/0x2e0 [ 1182.598205][T25281] ? __get_vm_area_node+0x116/0x470 [ 1182.603244][T25281] __get_vm_area_node+0x156/0x470 [ 1182.608100][T25281] __vmalloc_node_range+0xdc/0x7c0 [ 1182.613046][T25281] ? bpf_jit_alloc_exec+0x15/0x20 [ 1182.617907][T25281] module_alloc+0x81/0x90 [ 1182.622068][T25281] ? bpf_jit_alloc_exec+0x15/0x20 [ 1182.626933][T25281] bpf_jit_alloc_exec+0x15/0x20 [ 1182.631619][T25281] bpf_jit_alloc_exec_page+0x18/0x1a0 [ 1182.636831][T25281] bpf_trampoline_update+0x671/0xea0 [ 1182.642050][T25281] bpf_trampoline_link_prog+0x42e/0x690 [ 1182.647446][T25281] bpf_tracing_prog_attach+0x73d/0xbb0 [ 1182.652716][T25281] ? strncpy_from_user+0x209/0x2d0 [ 1182.657680][T25281] ? bpf_map_do_batch+0x620/0x620 [ 1182.662516][T25281] ? __fget_files+0x31e/0x380 [ 1182.667221][T25281] ? __kasan_check_write+0x14/0x20 [ 1182.672184][T25281] ? fput_many+0x160/0x1b0 [ 1182.676418][T25281] __se_sys_bpf+0x5c0e/0x11cb0 [ 1182.681016][T25281] ? __bad_area_nosemaphore+0xc4/0x430 [ 1182.686309][T25281] ? bad_area_nosemaphore+0x2d/0x40 [ 1182.691358][T25281] ? exc_page_fault+0x33d/0x5b0 [ 1182.696030][T25281] ? __x64_sys_bpf+0x90/0x90 [ 1182.700454][T25281] ? asm_exc_page_fault+0x1e/0x30 [ 1182.705314][T25281] ? _kstrtoull+0x3a0/0x4a0 [ 1182.709651][T25281] ? kstrtouint_from_user+0x20a/0x2a0 [ 1182.714856][T25281] ? strncpy_from_user+0x2b6/0x2d0 [ 1182.719803][T25281] ? kstrtol_from_user+0x310/0x310 [ 1182.724752][T25281] ? memset+0x35/0x40 [ 1182.728572][T25281] ? __fsnotify_parent+0x4b9/0x6c0 [ 1182.733533][T25281] ? fsnotify_set_children_dentry_flags+0x210/0x210 [ 1182.739943][T25281] ? proc_fail_nth_write+0x20b/0x290 [ 1182.745062][T25281] ? proc_fail_nth_read+0x210/0x210 [ 1182.750121][T25281] ? security_file_permission+0x86/0xb0 [ 1182.755504][T25281] ? rw_verify_area+0x1c3/0x360 [ 1182.760406][T25281] ? bpf_trace_printk+0xcca/0xd50 [ 1182.765260][T25281] ? from_kuid+0x218/0x6f0 [ 1182.769609][T25281] ? bpf_trace_run2+0xf4/0x280 [ 1182.774233][T25281] ? __bpf_trace_sys_enter+0x62/0x70 [ 1182.779375][T25281] __x64_sys_bpf+0x7b/0x90 [ 1182.783572][T25281] do_syscall_64+0x34/0x70 [ 1182.788001][T25281] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 1182.793851][T25281] RIP: 0033:0x7fe4d8b69819 [ 1182.799164][T25281] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 1182.819786][T25281] RSP: 002b:00007fe4d71c1038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 1182.828026][T25281] RAX: ffffffffffffffda RBX: 00007fe4d8d21080 RCX: 00007fe4d8b69819 [ 1182.835827][T25281] RDX: 0000000000000010 RSI: 0000000020000040 RDI: 0000000000000011 [ 1182.843636][T25281] RBP: 00007fe4d71c1090 R08: 0000000000000000 R09: 0000000000000000 [ 1182.851450][T25281] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1182.859273][T25281] R13: 0000000000000000 R14: 00007fe4d8d21080 R15: 00007ffd7a03bb28 [ 1182.980103][T25281] warn_alloc: 1 callbacks suppressed [ 1182.980121][T25281] syz.4.8299: vmalloc: allocation failure: 4096 bytes, mode:0xcc0(GFP_KERNEL), nodemask=(null),cpuset=syz4,mems_allowed=0 [ 1183.003078][T25281] CPU: 0 PID: 25281 Comm: syz.4.8299 Tainted: G W 5.10.226-syzkaller-00001-g6a01908517df #0 [ 1183.014588][T25281] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 1183.024561][T25281] Call Trace: [ 1183.028489][T25281] dump_stack_lvl+0x1e2/0x24b [ 1183.033062][T25281] ? wake_up_klogd+0xb8/0xf0 [ 1183.037487][T25281] ? bfq_pos_tree_add_move+0x43b/0x43b [ 1183.042779][T25281] ? pr_cont_kernfs_name+0xf0/0x100 [ 1183.047815][T25281] dump_stack+0x15/0x17 [ 1183.051804][T25281] warn_alloc+0x21a/0x390 [ 1183.056067][T25281] ? slab_free_freelist_hook+0xc0/0x190 [ 1183.061529][T25281] ? zone_watermark_ok_safe+0x2b0/0x2b0 [ 1183.066907][T25281] ? kfree+0xc3/0x270 [ 1183.070732][T25281] ? __get_vm_area_node+0x16c/0x470 [ 1183.075764][T25281] __vmalloc_node_range+0x287/0x7c0 [ 1183.081165][T25281] module_alloc+0x81/0x90 [ 1183.085332][T25281] ? bpf_jit_alloc_exec+0x15/0x20 [ 1183.090172][T25281] bpf_jit_alloc_exec+0x15/0x20 [ 1183.094850][T25281] bpf_jit_alloc_exec_page+0x18/0x1a0 [ 1183.100058][T25281] bpf_trampoline_update+0x671/0xea0 [ 1183.105182][T25281] bpf_trampoline_link_prog+0x42e/0x690 [ 1183.110566][T25281] bpf_tracing_prog_attach+0x73d/0xbb0 [ 1183.115856][T25281] ? strncpy_from_user+0x209/0x2d0 [ 1183.120809][T25281] ? bpf_map_do_batch+0x620/0x620 [ 1183.125808][T25281] ? __fget_files+0x31e/0x380 [ 1183.130303][T25281] ? __kasan_check_write+0x14/0x20 [ 1183.135244][T25281] ? fput_many+0x160/0x1b0 [ 1183.139512][T25281] __se_sys_bpf+0x5c0e/0x11cb0 [ 1183.144123][T25281] ? __bad_area_nosemaphore+0xc4/0x430 [ 1183.149393][T25281] ? bad_area_nosemaphore+0x2d/0x40 [ 1183.154439][T25281] ? exc_page_fault+0x33d/0x5b0 [ 1183.159207][T25281] ? __x64_sys_bpf+0x90/0x90 [ 1183.163625][T25281] ? asm_exc_page_fault+0x1e/0x30 [ 1183.168487][T25281] ? _kstrtoull+0x3a0/0x4a0 [ 1183.172827][T25281] ? kstrtouint_from_user+0x20a/0x2a0 [ 1183.178318][T25281] ? strncpy_from_user+0x2b6/0x2d0 [ 1183.183265][T25281] ? kstrtol_from_user+0x310/0x310 [ 1183.188574][T25281] ? memset+0x35/0x40 [ 1183.192579][T25281] ? __fsnotify_parent+0x4b9/0x6c0 [ 1183.197534][T25281] ? fsnotify_set_children_dentry_flags+0x210/0x210 [ 1183.204132][T25281] ? proc_fail_nth_write+0x20b/0x290 [ 1183.209241][T25281] ? proc_fail_nth_read+0x210/0x210 [ 1183.214381][T25281] ? security_file_permission+0x86/0xb0 [ 1183.219776][T25281] ? rw_verify_area+0x1c3/0x360 [ 1183.224433][T25281] ? bpf_trace_printk+0xcca/0xd50 [ 1183.229289][T25281] ? from_kuid+0x218/0x6f0 [ 1183.233545][T25281] ? bpf_trace_run2+0xf4/0x280 [ 1183.238143][T25281] ? __bpf_trace_sys_enter+0x62/0x70 [ 1183.243262][T25281] __x64_sys_bpf+0x7b/0x90 [ 1183.247530][T25281] do_syscall_64+0x34/0x70 [ 1183.251767][T25281] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 1183.257501][T25281] RIP: 0033:0x7fe4d8b69819 [ 1183.261749][T25281] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 1183.281212][T25281] RSP: 002b:00007fe4d71c1038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 1183.289439][T25281] RAX: ffffffffffffffda RBX: 00007fe4d8d21080 RCX: 00007fe4d8b69819 [ 1183.297502][T25281] RDX: 0000000000000010 RSI: 0000000020000040 RDI: 0000000000000011 [ 1183.305312][T25281] RBP: 00007fe4d71c1090 R08: 0000000000000000 R09: 0000000000000000 [ 1183.313125][T25281] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1183.320939][T25281] R13: 0000000000000000 R14: 00007fe4d8d21080 R15: 00007ffd7a03bb28 [ 1183.347684][T25281] Mem-Info: [ 1183.350727][T25281] active_anon:94 inactive_anon:6837 isolated_anon:0 [ 1183.350727][T25281] active_file:17356 inactive_file:3204 isolated_file:0 [ 1183.350727][T25281] unevictable:0 dirty:271 writeback:0 [ 1183.350727][T25281] slab_reclaimable:7300 slab_unreclaimable:76515 [ 1183.350727][T25281] mapped:29222 shmem:219 pagetables:562 bounce:0 [ 1183.350727][T25281] free:1566094 free_pcp:1095 free_cma:0 [ 1183.474300][T25281] Node 0 active_anon:376kB inactive_anon:27248kB active_file:69424kB inactive_file:12816kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:116888kB dirty:1084kB writeback:0kB shmem:876kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 0kB writeback_tmp:0kB kernel_stack:6048kB all_unreclaimable? no [ 1183.512072][T25281] DMA32 free:2981840kB min:62624kB low:78280kB high:93936kB reserved_highatomic:0KB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:3145324kB managed:2984760kB mlocked:0kB pagetables:0kB bounce:0kB free_pcp:2920kB local_pcp:1496kB free_cma:0kB [ 1183.550495][T25281] lowmem_reserve[]: 0 3941 3941 [ 1183.606436][T25281] Normal free:3281640kB min:84828kB low:106032kB high:127236kB reserved_highatomic:0KB active_anon:376kB inactive_anon:27248kB active_file:69424kB inactive_file:12816kB unevictable:0kB writepending:1084kB present:5242880kB managed:4035856kB mlocked:0kB pagetables:2248kB bounce:0kB free_pcp:1888kB local_pcp:1104kB free_cma:0kB [ 1183.671158][T25281] lowmem_reserve[]: 0 0 0 [ 1183.675373][T25281] DMA32: 6*4kB (UM) 5*8kB (M) 5*16kB (M) 8*32kB (UM) 7*64kB (UM) 7*128kB (UM) 7*256kB (UM) 5*512kB (M) 4*1024kB (UM) 3*2048kB (UM) 724*4096kB (M) = 2981840kB [ 1183.838213][T25281] Normal: 565*4kB (UME) 553*8kB (UME) 478*16kB (UME) 492*32kB (UME) 464*64kB (UME) 36*128kB (UME) 41*256kB (UME) 16*512kB (UME) 14*1024kB (UM) 7*2048kB (UM) 774*4096kB (UM) = 3282044kB [ 1183.907097][T25308] FAULT_INJECTION: forcing a failure. [ 1183.907097][T25308] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1183.920362][T25281] 20779 total pagecache pages [ 1183.927204][T25308] CPU: 0 PID: 25308 Comm: syz.1.8307 Tainted: G W 5.10.226-syzkaller-00001-g6a01908517df #0 [ 1183.938363][T25308] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 1183.948564][T25308] Call Trace: [ 1183.951735][T25308] dump_stack_lvl+0x1e2/0x24b [ 1183.956225][T25308] ? bfq_pos_tree_add_move+0x43b/0x43b [ 1183.961632][T25308] ? 0xffffffffa0016e94 [ 1183.965619][T25308] ? is_bpf_text_address+0x172/0x190 [ 1183.970744][T25308] dump_stack+0x15/0x17 [ 1183.974731][T25308] should_fail+0x3c6/0x510 [ 1183.978985][T25308] should_fail_usercopy+0x1a/0x20 [ 1183.983928][T25308] _copy_from_user+0x20/0xd0 [ 1183.988358][T25308] __se_sys_bpf+0x232/0x11cb0 [ 1183.992874][T25308] ? stack_trace_save+0x113/0x1c0 [ 1183.997733][T25308] ? terminate_walk+0x407/0x4f0 [ 1184.002419][T25308] ? stack_trace_snprint+0xf0/0xf0 [ 1184.007376][T25308] ? kmem_cache_free+0xa9/0x1e0 [ 1184.012063][T25308] ? __x64_sys_bpf+0x90/0x90 [ 1184.016654][T25308] ? kvm_sched_clock_read+0x18/0x40 [ 1184.021711][T25308] ? sched_clock+0x3a/0x40 [ 1184.026567][T25308] ? sched_clock_cpu+0x1b/0x3b0 [ 1184.031437][T25308] ? sched_clock+0x3a/0x40 [ 1184.035661][T25308] ? _kstrtoull+0x3a0/0x4a0 [ 1184.040029][T25308] ? kstrtouint_from_user+0x20a/0x2a0 [ 1184.045325][T25308] ? kstrtol_from_user+0x310/0x310 [ 1184.050272][T25308] ? sysvec_call_function_single+0xcb/0xe0 [ 1184.055915][T25308] ? memset+0x35/0x40 [ 1184.059734][T25308] ? __fsnotify_parent+0x4b9/0x6c0 [ 1184.064682][T25308] ? fsnotify_set_children_dentry_flags+0x210/0x210 [ 1184.071099][T25308] ? proc_fail_nth_write+0x20b/0x290 [ 1184.076224][T25308] ? proc_fail_nth_read+0x210/0x210 [ 1184.081276][T25308] ? security_file_permission+0x86/0xb0 [ 1184.086826][T25308] ? rw_verify_area+0x1c3/0x360 [ 1184.091586][T25308] ? preempt_count_add+0x92/0x1a0 [ 1184.096965][T25308] ? vfs_write+0x852/0xe70 [ 1184.101184][T25308] ? kmem_cache_free+0xa9/0x1e0 [ 1184.106365][T25308] ? kernel_write+0x3d0/0x3d0 [ 1184.110871][T25308] ? __kasan_check_write+0x14/0x20 [ 1184.115895][T25308] ? mutex_lock+0xa5/0x110 [ 1184.120155][T25308] ? mutex_trylock+0xa0/0xa0 [ 1184.124828][T25308] ? debug_smp_processor_id+0x17/0x20 [ 1184.130037][T25308] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 1184.135933][T25308] __x64_sys_bpf+0x7b/0x90 [ 1184.140172][T25308] do_syscall_64+0x34/0x70 [ 1184.144607][T25308] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 1184.150326][T25308] RIP: 0033:0x7faea9150819 [ 1184.154577][T25308] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 1184.174360][T25308] RSP: 002b:00007faea77c9038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 1184.182601][T25308] RAX: ffffffffffffffda RBX: 00007faea9307fa0 RCX: 00007faea9150819 [ 1184.190412][T25308] RDX: 0000000000000050 RSI: 0000000020000000 RDI: 2000000000000000 [ 1184.198227][T25308] RBP: 00007faea77c9090 R08: 0000000000000000 R09: 0000000000000000 [ 1184.206038][T25308] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1184.213845][T25308] R13: 0000000000000000 R14: 00007faea9307fa0 R15: 00007fff367d4908 [ 1184.222489][T25281] 0 pages in swap cache [ 1184.227737][T25281] Swap cache stats: add 0, delete 0, find 0/0 [ 1184.246393][T25281] Free swap = 124996kB [ 1184.272095][T25281] Total swap = 124996kB [ 1184.323786][T25281] 2097051 pages RAM [ 1184.345473][T25281] 0 pages HighMem/MovableOnly [ 1184.351246][T25281] 341897 pages reserved [ 1184.355255][T25281] 0 pages cma reserved [ 1185.336704][T25341] FAULT_INJECTION: forcing a failure. [ 1185.336704][T25341] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1185.463466][T25341] CPU: 0 PID: 25341 Comm: syz.4.8318 Tainted: G W 5.10.226-syzkaller-00001-g6a01908517df #0 [ 1185.474654][T25341] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 1185.484542][T25341] Call Trace: [ 1185.487679][T25341] dump_stack_lvl+0x1e2/0x24b [ 1185.492184][T25341] ? bfq_pos_tree_add_move+0x43b/0x43b [ 1185.497477][T25341] ? ex_handler_uaccess+0x3e/0xc0 [ 1185.502338][T25341] ? fixup_exception+0x94/0xd0 [ 1185.506939][T25341] dump_stack+0x15/0x17 [ 1185.510931][T25341] should_fail+0x3c6/0x510 [ 1185.515184][T25341] should_fail_usercopy+0x1a/0x20 [ 1185.520042][T25341] _copy_from_user+0x20/0xd0 [ 1185.524472][T25341] __se_sys_bpf+0x232/0x11cb0 [ 1185.528987][T25341] ? stack_trace_save+0x113/0x1c0 [ 1185.533842][T25341] ? __bad_area_nosemaphore+0xc4/0x430 [ 1185.539145][T25341] ? bad_area_nosemaphore+0x2d/0x40 [ 1185.544176][T25341] ? exc_page_fault+0x33d/0x5b0 [ 1185.548861][T25341] ? __x64_sys_bpf+0x90/0x90 [ 1185.553285][T25341] ? _kstrtoull+0x3a0/0x4a0 [ 1185.557624][T25341] ? kstrtouint_from_user+0x20a/0x2a0 [ 1185.562835][T25341] ? kstrtol_from_user+0x310/0x310 [ 1185.567781][T25341] ? memset+0x35/0x40 [ 1185.571605][T25341] ? __fsnotify_parent+0x4b9/0x6c0 [ 1185.576548][T25341] ? fsnotify_set_children_dentry_flags+0x210/0x210 [ 1185.582964][T25341] ? proc_fail_nth_write+0x20b/0x290 [ 1185.588091][T25341] ? proc_fail_nth_read+0x210/0x210 [ 1185.593121][T25341] ? security_file_permission+0x86/0xb0 [ 1185.598502][T25341] ? rw_verify_area+0x1c3/0x360 [ 1185.603187][T25341] ? preempt_count_add+0x92/0x1a0 [ 1185.608046][T25341] ? vfs_write+0x852/0xe70 [ 1185.612302][T25341] ? kmem_cache_free+0x1c0/0x1e0 [ 1185.617075][T25341] ? kernel_write+0x3d0/0x3d0 [ 1185.621588][T25341] ? __kasan_check_write+0x14/0x20 [ 1185.626534][T25341] ? mutex_lock+0xa5/0x110 [ 1185.630784][T25341] ? mutex_trylock+0xa0/0xa0 [ 1185.635213][T25341] ? __kasan_check_write+0x14/0x20 [ 1185.640158][T25341] ? fput_many+0x160/0x1b0 [ 1185.644418][T25341] ? debug_smp_processor_id+0x17/0x20 [ 1185.649622][T25341] __x64_sys_bpf+0x7b/0x90 [ 1185.653875][T25341] do_syscall_64+0x34/0x70 [ 1185.658127][T25341] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 1185.663861][T25341] RIP: 0033:0x7fe4d8b69819 [ 1185.668108][T25341] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 1185.687545][T25341] RSP: 002b:00007fe4d71e2038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 1185.695793][T25341] RAX: ffffffffffffffda RBX: 00007fe4d8d20fa0 RCX: 00007fe4d8b69819 [ 1185.703603][T25341] RDX: 0000000000000020 RSI: 0000000020000080 RDI: 0000000000000012 [ 1185.711761][T25341] RBP: 00007fe4d71e2090 R08: 0000000000000000 R09: 0000000000000000 [ 1185.719583][T25341] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1185.727383][T25341] R13: 0000000000000000 R14: 00007fe4d8d20fa0 R15: 00007ffd7a03bb28 [ 1186.867786][T25391] FAULT_INJECTION: forcing a failure. [ 1186.867786][T25391] name failslab, interval 1, probability 0, space 0, times 0 [ 1186.881967][T25391] CPU: 1 PID: 25391 Comm: syz.2.8335 Tainted: G W 5.10.226-syzkaller-00001-g6a01908517df #0 [ 1186.893233][T25391] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 1186.903206][T25391] Call Trace: [ 1186.906614][T25391] dump_stack_lvl+0x1e2/0x24b [ 1186.911323][T25391] ? panic+0x812/0x812 [ 1186.915185][T25391] ? bfq_pos_tree_add_move+0x43b/0x43b [ 1186.920485][T25391] dump_stack+0x15/0x17 [ 1186.924470][T25391] should_fail+0x3c6/0x510 [ 1186.928724][T25391] ? alloc_skb_with_frags+0xa1/0x570 [ 1186.933842][T25391] __should_failslab+0xa4/0xe0 [ 1186.938444][T25391] should_failslab+0x9/0x20 [ 1186.942782][T25391] __kmalloc_track_caller+0x5f/0x320 [ 1186.947902][T25391] ? kmem_cache_alloc+0x168/0x2e0 [ 1186.952764][T25391] ? __alloc_skb+0x80/0x510 [ 1186.957102][T25391] ? alloc_skb_with_frags+0xa1/0x570 [ 1186.962220][T25391] __alloc_skb+0xbc/0x510 [ 1186.966390][T25391] ? memcpy+0x56/0x70 [ 1186.970210][T25391] alloc_skb_with_frags+0xa1/0x570 [ 1186.975178][T25391] ? avc_has_perm_noaudit+0x240/0x240 [ 1186.980362][T25391] sock_alloc_send_pskb+0x915/0xa50 [ 1186.986005][T25391] ? sock_kzfree_s+0x60/0x60 [ 1186.990429][T25391] ? __kasan_check_write+0x14/0x20 [ 1186.995378][T25391] ? _raw_spin_lock+0xa4/0x1b0 [ 1186.999978][T25391] ? _raw_spin_trylock_bh+0x190/0x190 [ 1187.005818][T25391] unix_dgram_sendmsg+0x700/0x1f90 [ 1187.010746][T25391] ? selinux_socket_sendmsg+0x243/0x340 [ 1187.016130][T25391] ? unix_dgram_poll+0x610/0x610 [ 1187.021018][T25391] ? __kasan_check_write+0x14/0x20 [ 1187.025946][T25391] ? _raw_spin_lock_irqsave+0xf9/0x210 [ 1187.031356][T25391] unix_seqpacket_sendmsg+0x120/0x1f0 [ 1187.036530][T25391] ? unix_dgram_peer_wake_me+0x3e0/0x3e0 [ 1187.042147][T25391] ____sys_sendmsg+0x59e/0x8f0 [ 1187.046724][T25391] ? __sys_sendmsg_sock+0x40/0x40 [ 1187.051586][T25391] ? import_iovec+0xe5/0x120 [ 1187.056012][T25391] ___sys_sendmsg+0x252/0x2e0 [ 1187.060524][T25391] ? __sys_sendmsg+0x280/0x280 [ 1187.065125][T25391] ? rw_verify_area+0x1c3/0x360 [ 1187.069814][T25391] ? __fdget+0x1bc/0x240 [ 1187.073891][T25391] __se_sys_sendmsg+0x1b1/0x280 [ 1187.078574][T25391] ? __x64_sys_sendmsg+0x90/0x90 [ 1187.083343][T25391] ? ksys_write+0x260/0x2c0 [ 1187.087695][T25391] ? debug_smp_processor_id+0x17/0x20 [ 1187.092900][T25391] __x64_sys_sendmsg+0x7b/0x90 [ 1187.097494][T25391] do_syscall_64+0x34/0x70 [ 1187.102645][T25391] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 1187.108875][T25391] RIP: 0033:0x7fa318854819 [ 1187.113138][T25391] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 1187.133104][T25391] RSP: 002b:00007fa316ecd038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 1187.141596][T25391] RAX: ffffffffffffffda RBX: 00007fa318a0bfa0 RCX: 00007fa318854819 [ 1187.150214][T25391] RDX: 0000000000000000 RSI: 0000000020000100 RDI: 0000000000000009 [ 1187.158007][T25391] RBP: 00007fa316ecd090 R08: 0000000000000000 R09: 0000000000000000 [ 1187.165814][T25391] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1187.173798][T25391] R13: 0000000000000000 R14: 00007fa318a0bfa0 R15: 00007fff9a280668 [ 1187.215381][T25404] device bridge_slave_0 entered promiscuous mode [ 1187.930862][T25440] device veth0_vlan left promiscuous mode [ 1188.061123][T25440] device veth0_vlan entered promiscuous mode [ 1188.123844][T16906] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1188.132375][T16906] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1188.140376][T16906] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1188.266092][T25453] FAULT_INJECTION: forcing a failure. [ 1188.266092][T25453] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1188.279682][T25453] CPU: 0 PID: 25453 Comm: syz.4.8355 Tainted: G W 5.10.226-syzkaller-00001-g6a01908517df #0 [ 1188.290864][T25453] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 1188.300935][T25453] Call Trace: [ 1188.304151][T25453] dump_stack_lvl+0x1e2/0x24b [ 1188.308702][T25453] ? bfq_pos_tree_add_move+0x43b/0x43b [ 1188.313966][T25453] ? memset+0x35/0x40 [ 1188.317773][T25453] dump_stack+0x15/0x17 [ 1188.321752][T25453] should_fail+0x3c6/0x510 [ 1188.326007][T25453] should_fail_usercopy+0x1a/0x20 [ 1188.330874][T25453] _copy_from_user+0x20/0xd0 [ 1188.335292][T25453] ___sys_recvmsg+0x150/0x690 [ 1188.339808][T25453] ? __sys_recvmsg+0x270/0x270 [ 1188.344415][T25453] ? __fdget+0x1bc/0x240 [ 1188.348488][T25453] __x64_sys_recvmsg+0x1ee/0x2c0 [ 1188.353259][T25453] ? ___sys_recvmsg+0x690/0x690 [ 1188.357947][T25453] ? debug_smp_processor_id+0x17/0x20 [ 1188.363153][T25453] do_syscall_64+0x34/0x70 [ 1188.367423][T25453] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 1188.373272][T25453] RIP: 0033:0x7fe4d8b69819 [ 1188.377518][T25453] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 1188.397297][T25453] RSP: 002b:00007fe4d71c1038 EFLAGS: 00000246 ORIG_RAX: 000000000000002f [ 1188.406125][T25453] RAX: ffffffffffffffda RBX: 00007fe4d8d21080 RCX: 00007fe4d8b69819 [ 1188.414019][T25453] RDX: 0000000000000000 RSI: 0000000020000ac0 RDI: 0000000000000004 [ 1188.421978][T25453] RBP: 00007fe4d71c1090 R08: 0000000000000000 R09: 0000000000000000 [ 1188.429804][T25453] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1188.437623][T25453] R13: 0000000000000000 R14: 00007fe4d8d21080 R15: 00007ffd7a03bb28 [ 1189.352240][T25490] device wg2 left promiscuous mode [ 1189.444812][T25490] device wg2 entered promiscuous mode [ 1189.991484][T25516] device wg2 entered promiscuous mode [ 1190.002046][T25523] device pim6reg1 entered promiscuous mode [ 1191.817618][T25586] device macsec0 left promiscuous mode [ 1191.867426][T25586] device veth1_macvtap entered promiscuous mode [ 1191.873517][T25586] device macsec0 entered promiscuous mode [ 1191.963114][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 1192.590884][T25611] FAULT_INJECTION: forcing a failure. [ 1192.590884][T25611] name failslab, interval 1, probability 0, space 0, times 0 [ 1192.603339][T25611] CPU: 1 PID: 25611 Comm: syz.3.8412 Tainted: G W 5.10.226-syzkaller-00001-g6a01908517df #0 [ 1192.614835][T25611] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 1192.624728][T25611] Call Trace: [ 1192.627854][T25611] dump_stack_lvl+0x1e2/0x24b [ 1192.632392][T25611] ? panic+0x812/0x812 [ 1192.636268][T25611] ? bfq_pos_tree_add_move+0x43b/0x43b [ 1192.641566][T25611] dump_stack+0x15/0x17 [ 1192.645550][T25611] should_fail+0x3c6/0x510 [ 1192.649891][T25611] ? __napi_alloc_skb+0x15d/0x2e0 [ 1192.654751][T25611] __should_failslab+0xa4/0xe0 [ 1192.659359][T25611] should_failslab+0x9/0x20 [ 1192.663867][T25611] __kmalloc_track_caller+0x5f/0x320 [ 1192.668989][T25611] ? kmem_cache_alloc+0x168/0x2e0 [ 1192.673849][T25611] ? __alloc_skb+0x80/0x510 [ 1192.678180][T25611] ? __napi_alloc_skb+0x15d/0x2e0 [ 1192.683043][T25611] __alloc_skb+0xbc/0x510 [ 1192.687214][T25611] ? __kasan_check_write+0x14/0x20 [ 1192.692158][T25611] __napi_alloc_skb+0x15d/0x2e0 [ 1192.696866][T25611] napi_get_frags+0x6a/0x170 [ 1192.701279][T25611] tun_get_user+0xc88/0x38f0 [ 1192.705701][T25611] ? kasan_set_track+0x4b/0x70 [ 1192.710301][T25611] ? kmem_cache_free+0xa9/0x1e0 [ 1192.714984][T25611] ? do_sys_openat2+0x1fc/0x710 [ 1192.719673][T25611] ? _kstrtoull+0x3a0/0x4a0 [ 1192.724012][T25611] ? tun_do_read+0x1f60/0x1f60 [ 1192.728612][T25611] ? kstrtouint_from_user+0x20a/0x2a0 [ 1192.733818][T25611] ? kstrtol_from_user+0x310/0x310 [ 1192.738770][T25611] ? avc_policy_seqno+0x1b/0x70 [ 1192.743451][T25611] ? selinux_file_permission+0x2bb/0x560 [ 1192.749007][T25611] ? fsnotify_perm+0x67/0x4e0 [ 1192.753538][T25611] tun_chr_write_iter+0x1a8/0x250 [ 1192.758388][T25611] vfs_write+0xb4c/0xe70 [ 1192.762458][T25611] ? kernel_write+0x3d0/0x3d0 [ 1192.766981][T25611] ? __fdget_pos+0x209/0x3a0 [ 1192.771393][T25611] ? ksys_write+0x77/0x2c0 [ 1192.775644][T25611] ksys_write+0x199/0x2c0 [ 1192.780377][T25611] ? __ia32_sys_read+0x90/0x90 [ 1192.784963][T25611] ? debug_smp_processor_id+0x17/0x20 [ 1192.790347][T25611] __x64_sys_write+0x7b/0x90 [ 1192.794771][T25611] do_syscall_64+0x34/0x70 [ 1192.799013][T25611] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 1192.804741][T25611] RIP: 0033:0x7f2a740a8819 [ 1192.808994][T25611] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 1192.828859][T25611] RSP: 002b:00007f2a72721038 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 1192.837093][T25611] RAX: ffffffffffffffda RBX: 00007f2a7425ffa0 RCX: 00007f2a740a8819 [ 1192.844924][T25611] RDX: 000000000000000e RSI: 0000000020000380 RDI: 0000000000000003 [ 1192.852718][T25611] RBP: 00007f2a72721090 R08: 0000000000000000 R09: 0000000000000000 [ 1192.860789][T25611] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1192.868598][T25611] R13: 0000000000000000 R14: 00007f2a7425ffa0 R15: 00007ffc435513a8 [ 1193.054409][ T24] audit: type=1400 audit(1732157508.510:158): avc: denied { create } for pid=25608 comm="syz.0.8411" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 1193.642910][T25634] device wg2 left promiscuous mode [ 1193.737177][ T24] audit: type=1400 audit(1732157509.200:159): avc: denied { append } for pid=77 comm="syslogd" name="messages" dev="tmpfs" ino=11 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 1193.827004][T25635] device wg2 entered promiscuous mode [ 1193.932105][ T24] audit: type=1400 audit(1732157509.200:160): avc: denied { open } for pid=77 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=11 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 1194.261772][ T24] audit: type=1400 audit(1732157509.200:161): avc: denied { getattr } for pid=77 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=11 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 1194.491710][T25653] device veth1_macvtap entered promiscuous mode [ 1194.546421][T25653] device macsec0 entered promiscuous mode [ 1194.552465][T16906] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 1194.903560][T25666] device pim6reg1 entered promiscuous mode [ 1197.599811][T25708] device pim6reg1 entered promiscuous mode [ 1197.844413][T25734] FAULT_INJECTION: forcing a failure. [ 1197.844413][T25734] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1197.909635][T25734] CPU: 1 PID: 25734 Comm: syz.3.8451 Tainted: G W 5.10.226-syzkaller-00001-g6a01908517df #0 [ 1197.921051][T25734] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 1197.930931][T25734] Call Trace: [ 1197.934067][T25734] dump_stack_lvl+0x1e2/0x24b [ 1197.938574][T25734] ? bfq_pos_tree_add_move+0x43b/0x43b [ 1197.943869][T25734] dump_stack+0x15/0x17 [ 1197.947862][T25734] should_fail+0x3c6/0x510 [ 1197.952120][T25734] should_fail_alloc_page+0x52/0x60 [ 1197.957152][T25734] __alloc_pages_nodemask+0x1b3/0xaf0 [ 1197.962531][T25734] ? gfp_pfmemalloc_allowed+0x120/0x120 [ 1197.967913][T25734] ? sysvec_apic_timer_interrupt+0xcb/0xe0 [ 1197.973560][T25734] ? avc_has_perm_noaudit+0x145/0x240 [ 1197.978975][T25734] shmem_alloc_page+0x257/0x420 [ 1197.983749][T25734] ? put_page+0xd0/0xd0 [ 1197.988402][T25734] ? percpu_counter_add_batch+0x13d/0x160 [ 1197.994330][T25734] shmem_alloc_and_acct_page+0x395/0x8e0 [ 1197.999961][T25734] ? debug_smp_processor_id+0x17/0x20 [ 1198.006061][T25734] ? shmem_swapin_page+0x1950/0x1950 [ 1198.011273][T25734] ? find_get_entry+0x44c/0x4c0 [ 1198.015849][T25734] ? page_cache_prev_miss+0x410/0x410 [ 1198.021062][T25734] ? __kasan_check_write+0x14/0x20 [ 1198.025994][T25734] ? _raw_spin_lock_irq+0xa5/0x1b0 [ 1198.030942][T25734] ? _raw_spin_lock_irqsave+0x210/0x210 [ 1198.037718][T25734] ? find_lock_entry+0x1df/0x200 [ 1198.042482][T25734] shmem_getpage_gfp+0x891/0x2480 [ 1198.047348][T25734] ? shmem_getpage+0xa0/0xa0 [ 1198.051769][T25734] ? __kasan_check_write+0x14/0x20 [ 1198.056716][T25734] ? __set_page_dirty_no_writeback+0xf1/0x120 [ 1198.062635][T25734] shmem_fallocate+0x9a5/0xe90 [ 1198.067224][T25734] ? shmem_mmap+0x270/0x270 [ 1198.071558][T25734] ? avc_policy_seqno+0x1b/0x70 [ 1198.076245][T25734] ? selinux_file_permission+0x2bb/0x560 [ 1198.081713][T25734] ? fsnotify_perm+0x67/0x4e0 [ 1198.086224][T25734] ? security_file_permission+0x7b/0xb0 [ 1198.091605][T25734] ? preempt_count_add+0x92/0x1a0 [ 1198.096471][T25734] vfs_fallocate+0x492/0x570 [ 1198.100896][T25734] do_vfs_ioctl+0x1686/0x1a30 [ 1198.105508][T25734] ? ioctl_has_perm+0x3f0/0x560 [ 1198.110278][T25734] ? __x32_compat_sys_ioctl+0x90/0x90 [ 1198.115785][T25734] ? has_cap_mac_admin+0x3c0/0x3c0 [ 1198.120860][T25734] ? sched_clock+0x3a/0x40 [ 1198.125111][T25734] ? sched_clock_cpu+0x1b/0x3b0 [ 1198.129816][T25734] ? selinux_file_ioctl+0x3cc/0x540 [ 1198.134920][T25734] ? selinux_file_alloc_security+0x120/0x120 [ 1198.140736][T25734] ? sysvec_apic_timer_interrupt+0xcb/0xe0 [ 1198.146652][T25734] ? asm_sysvec_apic_timer_interrupt+0x12/0x20 [ 1198.152656][T25734] ? __se_sys_ioctl+0x38/0x190 [ 1198.157234][T25734] ? selinux_file_ioctl+0x1/0x540 [ 1198.162166][T25734] ? security_file_ioctl+0x84/0xb0 [ 1198.167057][T25734] __se_sys_ioctl+0x99/0x190 [ 1198.171471][T25734] __x64_sys_ioctl+0x7b/0x90 [ 1198.175905][T25734] do_syscall_64+0x34/0x70 [ 1198.180141][T25734] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 1198.185881][T25734] RIP: 0033:0x7f2a740a8819 [ 1198.190118][T25734] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 1198.209551][T25734] RSP: 002b:00007f2a72721038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1198.217804][T25734] RAX: ffffffffffffffda RBX: 00007f2a7425ffa0 RCX: 00007f2a740a8819 [ 1198.225620][T25734] RDX: 0000000020000040 RSI: 000000004030582a RDI: 0000000000000005 [ 1198.233423][T25734] RBP: 00007f2a72721090 R08: 0000000000000000 R09: 0000000000000000 [ 1198.241233][T25734] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1198.249046][T25734] R13: 0000000000000000 R14: 00007f2a7425ffa0 R15: 00007ffc435513a8 [ 1198.590705][T25745] bridge0: port 1(veth0_to_batadv) entered blocking state [ 1198.662027][T25745] bridge0: port 1(veth0_to_batadv) entered disabled state [ 1198.675330][T25745] device veth0_to_batadv entered promiscuous mode [ 1198.846228][T25761] device veth0_to_batadv left promiscuous mode [ 1198.933747][T25761] bridge0: port 1(veth0_to_batadv) entered disabled state [ 1201.536328][T25843] device veth1_macvtap left promiscuous mode [ 1201.542222][T25843] device macsec0 left promiscuous mode [ 1203.239141][T25885] bridge0: port 1(bridge_slave_0) entered blocking state [ 1203.286380][T25885] bridge0: port 1(bridge_slave_0) entered disabled state [ 1203.355408][T25885] device bridge_slave_0 entered promiscuous mode [ 1203.437345][T25885] bridge0: port 2(bridge_slave_1) entered blocking state [ 1203.444192][T25885] bridge0: port 2(bridge_slave_1) entered disabled state [ 1203.611525][T25885] device bridge_slave_1 entered promiscuous mode [ 1204.035048][T10153] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1204.087056][T10153] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1204.137015][T10153] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1204.147469][T10153] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1204.155471][T10153] bridge0: port 1(bridge_slave_0) entered blocking state [ 1204.162337][T10153] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1204.169952][T10153] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1204.186763][T10153] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1204.194799][T10153] bridge0: port 2(bridge_slave_1) entered blocking state [ 1204.201668][T10153] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1204.240663][T10153] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1204.256106][T10153] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1204.304294][T10153] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1204.385240][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 1204.585662][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1204.593672][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1204.601299][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1204.614228][T25885] device veth0_vlan entered promiscuous mode [ 1204.624048][ T414] device veth1_macvtap left promiscuous mode [ 1204.746035][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 1204.821838][T25885] device veth1_macvtap entered promiscuous mode [ 1204.968683][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 1205.017832][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 1205.117149][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 1205.125363][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 1213.129370][T26078] device pim6reg1 entered promiscuous mode [ 1215.660755][T26120] FAULT_INJECTION: forcing a failure. [ 1215.660755][T26120] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1215.789493][T26120] CPU: 1 PID: 26120 Comm: syz.3.8577 Tainted: G W 5.10.226-syzkaller-00001-g6a01908517df #0 [ 1215.800679][T26120] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 1215.811535][T26120] Call Trace: [ 1215.814656][T26120] dump_stack_lvl+0x1e2/0x24b [ 1215.819861][T26120] ? bfq_pos_tree_add_move+0x43b/0x43b [ 1215.825188][T26120] ? perf_trace_run_bpf_submit+0x210/0x210 [ 1215.830877][T26120] ? do_sys_openat2+0x1fc/0x710 [ 1215.835734][T26120] ? do_syscall_64+0x34/0x70 [ 1215.840158][T26120] dump_stack+0x15/0x17 [ 1215.844238][T26120] should_fail+0x3c6/0x510 [ 1215.848493][T26120] should_fail_usercopy+0x1a/0x20 [ 1215.853349][T26120] _copy_from_user+0x20/0xd0 [ 1215.857875][T26120] iovec_from_user+0xc7/0x330 [ 1215.862379][T26120] __import_iovec+0x6d/0x3b0 [ 1215.866813][T26120] ? __fsnotify_parent+0x4b9/0x6c0 [ 1215.871754][T26120] import_iovec+0xe5/0x120 [ 1215.876004][T26120] ___sys_recvmsg+0x56b/0x690 [ 1215.880547][T26120] ? __sys_recvmsg+0x270/0x270 [ 1215.885219][T26120] ? __fdget+0x1bc/0x240 [ 1215.889293][T26120] __x64_sys_recvmsg+0x1ee/0x2c0 [ 1215.894066][T26120] ? ___sys_recvmsg+0x690/0x690 [ 1215.898747][T26120] ? debug_smp_processor_id+0x17/0x20 [ 1215.904232][T26120] do_syscall_64+0x34/0x70 [ 1215.908478][T26120] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 1215.914201][T26120] RIP: 0033:0x7f2a740a8819 [ 1215.918456][T26120] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 1215.937912][T26120] RSP: 002b:00007f2a72721038 EFLAGS: 00000246 ORIG_RAX: 000000000000002f [ 1215.946477][T26120] RAX: ffffffffffffffda RBX: 00007f2a7425ffa0 RCX: 00007f2a740a8819 [ 1215.954543][T26120] RDX: 0000000000000000 RSI: 0000000020000ac0 RDI: 0000000000000004 [ 1215.962346][T26120] RBP: 00007f2a72721090 R08: 0000000000000000 R09: 0000000000000000 [ 1215.970227][T26120] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1215.978123][T26120] R13: 0000000000000000 R14: 00007f2a7425ffa0 R15: 00007ffc435513a8 [ 1218.419071][T26177] FAULT_INJECTION: forcing a failure. [ 1218.419071][T26177] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1218.460127][T26177] CPU: 1 PID: 26177 Comm: syz.2.8595 Tainted: G W 5.10.226-syzkaller-00001-g6a01908517df #0 [ 1218.471312][T26177] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 1218.481200][T26177] Call Trace: [ 1218.484338][T26177] dump_stack_lvl+0x1e2/0x24b [ 1218.489477][T26177] ? panic+0x812/0x812 [ 1218.493721][T26177] ? bfq_pos_tree_add_move+0x43b/0x43b [ 1218.499281][T26177] dump_stack+0x15/0x17 [ 1218.503277][T26177] should_fail+0x3c6/0x510 [ 1218.508222][T26177] should_fail_usercopy+0x1a/0x20 [ 1218.513493][T26177] strncpy_from_user+0x24/0x2d0 [ 1218.519263][T26177] ? getname_flags+0xba/0x520 [ 1218.523783][T26177] getname_flags+0xf2/0x520 [ 1218.528338][T26177] getname+0x19/0x20 [ 1218.532441][T26177] do_sys_openat2+0xd7/0x710 [ 1218.537480][T26177] ? mutex_trylock+0xa0/0xa0 [ 1218.541890][T26177] ? do_sys_open+0x220/0x220 [ 1218.546332][T26177] ? __kasan_check_write+0x14/0x20 [ 1218.551490][T26177] ? ksys_write+0x260/0x2c0 [ 1218.556178][T26177] __x64_sys_openat+0x243/0x290 [ 1218.561471][T26177] ? __ia32_sys_open+0x270/0x270 [ 1218.566248][T26177] ? debug_smp_processor_id+0x17/0x20 [ 1218.571451][T26177] do_syscall_64+0x34/0x70 [ 1218.577021][T26177] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 1218.582838][T26177] RIP: 0033:0x7fa318854819 [ 1218.587132][T26177] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 1218.608261][T26177] RSP: 002b:00007fa316ecd038 EFLAGS: 00000246 ORIG_RAX: 0000000000000101 [ 1218.616500][T26177] RAX: ffffffffffffffda RBX: 00007fa318a0bfa0 RCX: 00007fa318854819 [ 1218.624309][T26177] RDX: 00000000000026e1 RSI: 0000000020000180 RDI: ffffffffffffff9c [ 1218.632122][T26177] RBP: 00007fa316ecd090 R08: 0000000000000000 R09: 0000000000000000 [ 1218.640909][T26177] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1218.650143][T26177] R13: 0000000000000000 R14: 00007fa318a0bfa0 R15: 00007fff9a280668 [ 1218.773779][T26184] bridge0: port 2(bridge_slave_1) entered disabled state [ 1218.786092][T26184] bridge0: port 1(bridge_slave_0) entered disabled state [ 1219.861707][T26206] device pim6reg1 entered promiscuous mode [ 1221.027821][T26226] device veth0_vlan left promiscuous mode [ 1221.100252][T26226] device veth0_vlan entered promiscuous mode [ 1221.206394][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1221.299743][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1221.437034][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1221.827116][T26241] FAULT_INJECTION: forcing a failure. [ 1221.827116][T26241] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1221.906465][T26241] CPU: 1 PID: 26241 Comm: syz.0.8610 Tainted: G W 5.10.226-syzkaller-00001-g6a01908517df #0 [ 1221.917655][T26241] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 1221.927545][T26241] Call Trace: [ 1221.930679][T26241] dump_stack_lvl+0x1e2/0x24b [ 1221.935188][T26241] ? bfq_pos_tree_add_move+0x43b/0x43b [ 1221.940491][T26241] dump_stack+0x15/0x17 [ 1221.944473][T26241] should_fail+0x3c6/0x510 [ 1221.948729][T26241] should_fail_alloc_page+0x52/0x60 [ 1221.953760][T26241] __alloc_pages_nodemask+0x1b3/0xaf0 [ 1221.958970][T26241] ? is_bpf_text_address+0x172/0x190 [ 1221.964091][T26241] ? stack_trace_save+0x1c0/0x1c0 [ 1221.968951][T26241] ? __kernel_text_address+0x9b/0x110 [ 1221.974158][T26241] ? gfp_pfmemalloc_allowed+0x120/0x120 [ 1221.979628][T26241] ? arch_stack_walk+0xf3/0x140 [ 1221.984445][T26241] kmalloc_order+0x4c/0x170 [ 1221.988778][T26241] kmalloc_order_trace+0x18/0x90 [ 1221.993554][T26241] bpf_check+0x146/0xf2b0 [ 1221.997728][T26241] ? __irq_exit_rcu+0x40/0x150 [ 1222.002333][T26241] ? irq_exit_rcu+0x9/0x10 [ 1222.006716][T26241] ? asm_sysvec_apic_timer_interrupt+0x12/0x20 [ 1222.012798][T26241] ? update_stack_state+0x3b3/0x460 [ 1222.018119][T26241] ? kvm_sched_clock_read+0x18/0x40 [ 1222.023115][T26241] ? sched_clock+0x3a/0x40 [ 1222.027392][T26241] ? sched_clock_cpu+0x1b/0x3b0 [ 1222.032076][T26241] ? sched_clock+0x3a/0x40 [ 1222.036303][T26241] ? bpf_get_btf_vmlinux+0x60/0x60 [ 1222.041342][T26241] ? __irq_exit_rcu+0x40/0x150 [ 1222.045941][T26241] ? irq_exit_rcu+0x9/0x10 [ 1222.050207][T26241] ? sysvec_apic_timer_interrupt+0xcb/0xe0 [ 1222.055949][T26241] ? asm_sysvec_apic_timer_interrupt+0x12/0x20 [ 1222.061920][T26241] ? __stack_depot_save+0x1cd/0x4d0 [ 1222.066947][T26241] ? selinux_bpf_prog_alloc+0x51/0x140 [ 1222.072244][T26241] ? selinux_bpf_prog_alloc+0x51/0x140 [ 1222.077536][T26241] ? kvm_sched_clock_read+0x18/0x40 [ 1222.082653][T26241] ? sched_clock+0x3a/0x40 [ 1222.086991][T26241] ? sched_clock_cpu+0x1b/0x3b0 [ 1222.091671][T26241] ? sched_clock+0x3a/0x40 [ 1222.096063][T26241] ? __irq_exit_rcu+0x40/0x150 [ 1222.100745][T26241] ? irq_exit_rcu+0x9/0x10 [ 1222.104996][T26241] ? sysvec_apic_timer_interrupt+0xcb/0xe0 [ 1222.110636][T26241] ? asm_sysvec_apic_timer_interrupt+0x12/0x20 [ 1222.116618][T26241] ? __check_object_size+0x73/0x3c0 [ 1222.121651][T26241] ? __virt_addr_valid+0x15/0x2e0 [ 1222.126511][T26241] ? __sanitizer_cov_trace_pc+0x36/0x60 [ 1222.131894][T26241] __se_sys_bpf+0x107a2/0x11cb0 [ 1222.136599][T26241] ? perf_prepare_sample+0x1af0/0x1af0 [ 1222.142155][T26241] ? irq_exit_rcu+0x9/0x10 [ 1222.146393][T26241] ? __x64_sys_bpf+0x90/0x90 [ 1222.150906][T26241] ? __this_cpu_preempt_check+0x13/0x20 [ 1222.156574][T26241] ? __perf_event_account_interrupt+0x18f/0x2c0 [ 1222.162648][T26241] ? cpu_clock_event_read+0x50/0x50 [ 1222.167689][T26241] ? timerqueue_add+0x24c/0x270 [ 1222.172364][T26241] ? enqueue_hrtimer+0xad/0x200 [ 1222.177049][T26241] ? __hrtimer_run_queues+0x438/0xa50 [ 1222.182259][T26241] ? __hrtimer_run_queues+0x9ea/0xa50 [ 1222.187557][T26241] ? ktime_get+0x10e/0x140 [ 1222.191821][T26241] ? kvm_sched_clock_read+0x18/0x40 [ 1222.196930][T26241] ? sched_clock+0x3a/0x40 [ 1222.201106][T26241] ? sched_clock_cpu+0x1b/0x3b0 [ 1222.205789][T26241] ? sched_clock+0x3a/0x40 [ 1222.210047][T26241] ? asm_sysvec_apic_timer_interrupt+0x12/0x20 [ 1222.216041][T26241] __x64_sys_bpf+0x7b/0x90 [ 1222.220277][T26241] do_syscall_64+0x34/0x70 [ 1222.224524][T26241] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 1222.230253][T26241] RIP: 0033:0x7f2524e6f819 [ 1222.234504][T26241] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 1222.253941][T26241] RSP: 002b:00007f25234c7038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 1222.262187][T26241] RAX: ffffffffffffffda RBX: 00007f2525027080 RCX: 00007f2524e6f819 [ 1222.270060][T26241] RDX: 0000000000000048 RSI: 00000000200017c0 RDI: 0000000000000005 [ 1222.278179][T26241] RBP: 00007f25234c7090 R08: 0000000000000000 R09: 0000000000000000 [ 1222.286017][T26241] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1222.293801][T26241] R13: 0000000000000000 R14: 00007f2525027080 R15: 00007fffba1b7028 [ 1226.575096][ T24] audit: type=1400 audit(1732157541.940:162): avc: denied { create } for pid=26310 comm="syz.2.8634" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bluetooth_socket permissive=1 [ 1226.814596][T26319] FAULT_INJECTION: forcing a failure. [ 1226.814596][T26319] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1226.849997][T26319] CPU: 1 PID: 26319 Comm: syz.4.8636 Tainted: G W 5.10.226-syzkaller-00001-g6a01908517df #0 [ 1226.861433][T26319] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 1226.871403][T26319] Call Trace: [ 1226.874617][T26319] dump_stack_lvl+0x1e2/0x24b [ 1226.879136][T26319] ? bfq_pos_tree_add_move+0x43b/0x43b [ 1226.884422][T26319] dump_stack+0x15/0x17 [ 1226.888428][T26319] should_fail+0x3c6/0x510 [ 1226.892671][T26319] should_fail_alloc_page+0x52/0x60 [ 1226.898018][T26319] __alloc_pages_nodemask+0x1b3/0xaf0 [ 1226.903208][T26319] ? gfp_pfmemalloc_allowed+0x120/0x120 [ 1226.908596][T26319] shmem_alloc_page+0x257/0x420 [ 1226.913269][T26319] ? put_page+0xd0/0xd0 [ 1226.917264][T26319] ? __vm_enough_memory+0x9a/0x2f0 [ 1226.922206][T26319] shmem_alloc_and_acct_page+0x395/0x8e0 [ 1226.927675][T26319] ? shmem_swapin_page+0x1950/0x1950 [ 1226.932792][T26319] ? sched_clock+0x3a/0x40 [ 1226.937043][T26319] ? sched_clock_cpu+0x1b/0x3b0 [ 1226.941730][T26319] ? sched_clock+0x3a/0x40 [ 1226.945987][T26319] ? __irq_exit_rcu+0x40/0x150 [ 1226.950583][T26319] ? irq_exit_rcu+0x9/0x10 [ 1226.954837][T26319] ? sysvec_apic_timer_interrupt+0xcb/0xe0 [ 1226.960484][T26319] ? asm_sysvec_apic_timer_interrupt+0x12/0x20 [ 1226.966470][T26319] ? find_get_entry+0x163/0x4c0 [ 1226.971157][T26319] shmem_getpage_gfp+0x891/0x2480 [ 1226.976013][T26319] ? sched_clock_cpu+0x1b/0x3b0 [ 1226.980710][T26319] ? shmem_getpage+0xa0/0xa0 [ 1226.985137][T26319] ? __kasan_check_write+0x14/0x20 [ 1226.990077][T26319] ? __set_page_dirty_no_writeback+0xf1/0x120 [ 1226.995979][T26319] shmem_fallocate+0x9a5/0xe90 [ 1227.000696][T26319] ? sched_clock+0x3a/0x40 [ 1227.004928][T26319] ? shmem_mmap+0x270/0x270 [ 1227.009266][T26319] ? asm_sysvec_apic_timer_interrupt+0x12/0x20 [ 1227.015385][T26319] ? vfs_fallocate+0x308/0x570 [ 1227.020047][T26319] ? file_start_write+0x10d/0x180 [ 1227.024933][T26319] ? file_start_write+0x10d/0x180 [ 1227.029763][T26319] vfs_fallocate+0x492/0x570 [ 1227.034191][T26319] do_vfs_ioctl+0x1686/0x1a30 [ 1227.038887][T26319] ? ioctl_has_perm+0x3f0/0x560 [ 1227.044387][T26319] ? __x32_compat_sys_ioctl+0x90/0x90 [ 1227.049649][T26319] ? has_cap_mac_admin+0x3c0/0x3c0 [ 1227.054626][T26319] ? kvm_sched_clock_read+0x18/0x40 [ 1227.059628][T26319] ? sched_clock+0x3a/0x40 [ 1227.063879][T26319] ? sched_clock+0x3a/0x40 [ 1227.068236][T26319] ? selinux_file_ioctl+0x3cc/0x540 [ 1227.073345][T26319] ? __irq_exit_rcu+0x40/0x150 [ 1227.077950][T26319] ? selinux_file_alloc_security+0x120/0x120 [ 1227.083756][T26319] ? irq_exit_rcu+0x9/0x10 [ 1227.088006][T26319] ? sysvec_apic_timer_interrupt+0xcb/0xe0 [ 1227.093649][T26319] ? asm_sysvec_apic_timer_interrupt+0x12/0x20 [ 1227.099776][T26319] ? security_file_ioctl+0x84/0xb0 [ 1227.104702][T26319] __se_sys_ioctl+0x99/0x190 [ 1227.109131][T26319] __x64_sys_ioctl+0x7b/0x90 [ 1227.113554][T26319] do_syscall_64+0x34/0x70 [ 1227.117808][T26319] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 1227.123534][T26319] RIP: 0033:0x7fe4d8b69819 [ 1227.128064][T26319] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 1227.147799][T26319] RSP: 002b:00007fe4d71e2038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1227.156034][T26319] RAX: ffffffffffffffda RBX: 00007fe4d8d20fa0 RCX: 00007fe4d8b69819 [ 1227.163846][T26319] RDX: 0000000020000040 RSI: 000000004030582a RDI: 0000000000000005 [ 1227.171678][T26319] RBP: 00007fe4d71e2090 R08: 0000000000000000 R09: 0000000000000000 [ 1227.179482][T26319] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1227.187452][T26319] R13: 0000000000000000 R14: 00007fe4d8d20fa0 R15: 00007ffd7a03bb28 [ 1228.126863][T26328] device pim6reg1 entered promiscuous mode [ 1231.190820][T26389] device syzkaller0 entered promiscuous mode [ 1235.934695][T26467] tap0: tun_chr_ioctl cmd 1074025675 [ 1236.079660][T26467] tap0: persist disabled [ 1236.236996][T26473] device pim6reg1 entered promiscuous mode [ 1236.373010][T26473] device syzkaller0 entered promiscuous mode [ 1237.362294][T26493] device bridge_slave_0 left promiscuous mode [ 1237.490797][T26494] device bridge_slave_0 entered promiscuous mode [ 1237.800696][T26500] FAULT_INJECTION: forcing a failure. [ 1237.800696][T26500] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1237.814069][T26500] CPU: 0 PID: 26500 Comm: syz.4.8690 Tainted: G W 5.10.226-syzkaller-00001-g6a01908517df #0 [ 1237.825284][T26500] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 1237.835266][T26500] Call Trace: [ 1237.838394][T26500] dump_stack_lvl+0x1e2/0x24b [ 1237.842903][T26500] ? bfq_pos_tree_add_move+0x43b/0x43b [ 1237.848193][T26500] ? shmem_getpage_gfp+0x2230/0x2480 [ 1237.853314][T26500] dump_stack+0x15/0x17 [ 1237.857304][T26500] should_fail+0x3c6/0x510 [ 1237.861558][T26500] should_fail_usercopy+0x1a/0x20 [ 1237.866422][T26500] iov_iter_copy_from_user_atomic+0x391/0xd80 [ 1237.872322][T26500] ? shmem_getpage+0xa0/0xa0 [ 1237.876745][T26500] ? iov_iter_fault_in_readable+0x31f/0x4f0 [ 1237.882472][T26500] ? memzero_page+0x100/0x100 [ 1237.886989][T26500] generic_perform_write+0x34c/0x570 [ 1237.892113][T26500] ? grab_cache_page_write_begin+0xa0/0xa0 [ 1237.897840][T26500] ? file_remove_privs+0x570/0x570 [ 1237.902791][T26500] ? __kasan_check_write+0x14/0x20 [ 1237.907870][T26500] __generic_file_write_iter+0x23c/0x560 [ 1237.913340][T26500] ? generic_write_checks+0x3b9/0x470 [ 1237.918555][T26500] generic_file_write_iter+0xaf/0x1c0 [ 1237.923928][T26500] vfs_write+0xb4c/0xe70 [ 1237.928004][T26500] ? kernel_write+0x3d0/0x3d0 [ 1237.932525][T26500] ? mutex_trylock+0xa0/0xa0 [ 1237.936946][T26500] ? __fdget_pos+0x2e7/0x3a0 [ 1237.941368][T26500] ? ksys_write+0x77/0x2c0 [ 1237.945624][T26500] ksys_write+0x199/0x2c0 [ 1237.949798][T26500] ? __ia32_sys_read+0x90/0x90 [ 1237.954488][T26500] ? debug_smp_processor_id+0x17/0x20 [ 1237.959821][T26500] __x64_sys_write+0x7b/0x90 [ 1237.964287][T26500] do_syscall_64+0x34/0x70 [ 1237.968502][T26500] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 1237.974224][T26500] RIP: 0033:0x7fe4d8b69819 [ 1237.978480][T26500] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 1237.998277][T26500] RSP: 002b:00007fe4d71e2038 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 1238.006530][T26500] RAX: ffffffffffffffda RBX: 00007fe4d8d20fa0 RCX: 00007fe4d8b69819 [ 1238.014318][T26500] RDX: 0000000000040010 RSI: 0000000020000180 RDI: 0000000000000009 [ 1238.022473][T26500] RBP: 00007fe4d71e2090 R08: 0000000000000000 R09: 0000000000000000 [ 1238.030279][T26500] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1238.038106][T26500] R13: 0000000000000000 R14: 00007fe4d8d20fa0 R15: 00007ffd7a03bb28 [ 1238.418979][ T24] audit: type=1400 audit(1732157553.880:163): avc: denied { create } for pid=26514 comm="syz.0.8695" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 1238.588834][T26513] FAULT_INJECTION: forcing a failure. [ 1238.588834][T26513] name failslab, interval 1, probability 0, space 0, times 0 [ 1238.601399][T26513] CPU: 0 PID: 26513 Comm: syz.4.8696 Tainted: G W 5.10.226-syzkaller-00001-g6a01908517df #0 [ 1238.612554][T26513] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 1238.622447][T26513] Call Trace: [ 1238.625579][T26513] dump_stack_lvl+0x1e2/0x24b [ 1238.630085][T26513] ? panic+0x812/0x812 [ 1238.634070][T26513] ? bfq_pos_tree_add_move+0x43b/0x43b [ 1238.639290][T26513] ? stack_trace_save+0x113/0x1c0 [ 1238.644156][T26513] ? stack_trace_snprint+0xf0/0xf0 [ 1238.649096][T26513] ? cpu_clock_event_start+0x170/0x180 [ 1238.654389][T26513] dump_stack+0x15/0x17 [ 1238.658380][T26513] should_fail+0x3c6/0x510 [ 1238.663503][T26513] ? radix_tree_node_alloc+0x198/0x3c0 [ 1238.668801][T26513] __should_failslab+0xa4/0xe0 [ 1238.673448][T26513] should_failslab+0x9/0x20 [ 1238.677741][T26513] kmem_cache_alloc+0x3d/0x2e0 [ 1238.682479][T26513] ? kobject_add_internal+0x763/0xd90 [ 1238.687667][T26513] ? kobject_add+0x14e/0x210 [ 1238.692204][T26513] ? device_add+0x3be/0xbc0 [ 1238.696953][T26513] radix_tree_node_alloc+0x198/0x3c0 [ 1238.702162][T26513] idr_get_free+0x281/0x8e0 [ 1238.706580][T26513] idr_alloc_cyclic+0x1dc/0x5d0 [ 1238.711452][T26513] ? idr_alloc+0x2f0/0x2f0 [ 1238.715811][T26513] ? __kasan_check_write+0x14/0x20 [ 1238.720827][T26513] ? _raw_spin_lock+0xa4/0x1b0 [ 1238.725430][T26513] ? debug_smp_processor_id+0x17/0x20 [ 1238.730810][T26513] __kernfs_new_node+0x124/0x700 [ 1238.735588][T26513] ? sched_clock+0x3a/0x40 [ 1238.739832][T26513] ? kernfs_new_node+0x230/0x230 [ 1238.745127][T26513] ? __irq_exit_rcu+0x40/0x150 [ 1238.749726][T26513] ? irq_exit_rcu+0x9/0x10 [ 1238.753978][T26513] ? sysvec_apic_timer_interrupt+0xcb/0xe0 [ 1238.759622][T26513] kernfs_new_node+0x130/0x230 [ 1238.764222][T26513] kernfs_create_dir_ns+0x44/0x130 [ 1238.769171][T26513] sysfs_create_dir_ns+0x185/0x390 [ 1238.774116][T26513] ? sysfs_warn_dup+0xa0/0xa0 [ 1238.778634][T26513] ? __list_add_valid+0x6e/0xf0 [ 1238.783315][T26513] ? net_namespace+0xd/0x40 [ 1238.787679][T26513] kobject_add_internal+0x763/0xd90 [ 1238.792969][T26513] kobject_add+0x14e/0x210 [ 1238.798125][T26513] ? kobject_get+0xc7/0x120 [ 1238.802500][T26513] ? kobject_init+0x1e0/0x1e0 [ 1238.807286][T26513] ? __kasan_check_write+0x14/0x20 [ 1238.812280][T26513] ? mutex_unlock+0x1c/0x40 [ 1238.816560][T26513] ? get_device_parent+0x2a1/0x410 [ 1238.821518][T26513] device_add+0x3be/0xbc0 [ 1238.825771][T26513] netdev_register_kobject+0x177/0x320 [ 1238.831055][T26513] ? raw_notifier_call_chain+0xdf/0xf0 [ 1238.836349][T26513] register_netdevice+0xe9b/0x13f0 [ 1238.841295][T26513] ? netif_stacked_transfer_operstate+0x240/0x240 [ 1238.847545][T26513] ppp_dev_configure+0x825/0xaf0 [ 1238.852496][T26513] ppp_ioctl+0x6e5/0x1810 [ 1238.856761][T26513] ? ppp_poll+0x250/0x250 [ 1238.860918][T26513] ? sysvec_apic_timer_interrupt+0xcb/0xe0 [ 1238.866571][T26513] ? security_file_ioctl+0x84/0xb0 [ 1238.871507][T26513] ? ppp_poll+0x250/0x250 [ 1238.875664][T26513] __se_sys_ioctl+0x114/0x190 [ 1238.880201][T26513] __x64_sys_ioctl+0x7b/0x90 [ 1238.884602][T26513] do_syscall_64+0x34/0x70 [ 1238.888857][T26513] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 1238.894580][T26513] RIP: 0033:0x7fe4d8b69819 [ 1238.898847][T26513] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 1238.918283][T26513] RSP: 002b:00007fe4d71e2038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1238.926523][T26513] RAX: ffffffffffffffda RBX: 00007fe4d8d20fa0 RCX: 00007fe4d8b69819 [ 1238.934327][T26513] RDX: 0000000020001400 RSI: 00000000c004743e RDI: 0000000000000006 [ 1238.942142][T26513] RBP: 00007fe4d71e2090 R08: 0000000000000000 R09: 0000000000000000 [ 1238.949952][T26513] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1238.957763][T26513] R13: 0000000000000000 R14: 00007fe4d8d20fa0 R15: 00007ffd7a03bb28 [ 1242.511491][T26613] FAULT_INJECTION: forcing a failure. [ 1242.511491][T26613] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1242.597887][T26613] CPU: 0 PID: 26613 Comm: syz.1.8724 Tainted: G W 5.10.226-syzkaller-00001-g6a01908517df #0 [ 1242.609073][T26613] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 1242.618978][T26613] Call Trace: [ 1242.622219][T26613] dump_stack_lvl+0x1e2/0x24b [ 1242.626723][T26613] ? bfq_pos_tree_add_move+0x43b/0x43b [ 1242.632017][T26613] dump_stack+0x15/0x17 [ 1242.636182][T26613] should_fail+0x3c6/0x510 [ 1242.640438][T26613] should_fail_usercopy+0x1a/0x20 [ 1242.645291][T26613] _copy_to_user+0x20/0x90 [ 1242.649548][T26613] simple_read_from_buffer+0xc7/0x150 [ 1242.654757][T26613] proc_fail_nth_read+0x1a3/0x210 [ 1242.659633][T26613] ? proc_fault_inject_write+0x390/0x390 [ 1242.665081][T26613] ? security_file_permission+0x86/0xb0 [ 1242.670720][T26613] ? rw_verify_area+0x1c3/0x360 [ 1242.675326][T26613] ? proc_fault_inject_write+0x390/0x390 [ 1242.680937][T26613] vfs_read+0x200/0xba0 [ 1242.684871][T26613] ? kernel_read+0x70/0x70 [ 1242.689132][T26613] ? __kasan_check_write+0x14/0x20 [ 1242.694068][T26613] ? mutex_lock+0xa5/0x110 [ 1242.698320][T26613] ? mutex_trylock+0xa0/0xa0 [ 1242.702750][T26613] ? __fdget_pos+0x2e7/0x3a0 [ 1242.707171][T26613] ? ksys_read+0x77/0x2c0 [ 1242.711338][T26613] ksys_read+0x199/0x2c0 [ 1242.715418][T26613] ? vfs_write+0xe70/0xe70 [ 1242.719864][T26613] ? debug_smp_processor_id+0x17/0x20 [ 1242.725067][T26613] __x64_sys_read+0x7b/0x90 [ 1242.729393][T26613] do_syscall_64+0x34/0x70 [ 1242.733887][T26613] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 1242.739554][T26613] RIP: 0033:0x7faea914f25c [ 1242.743833][T26613] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 69 8e 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 bf 8e 02 00 48 [ 1242.763329][T26613] RSP: 002b:00007faea77c9030 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 1242.771580][T26613] RAX: ffffffffffffffda RBX: 00007faea9307fa0 RCX: 00007faea914f25c [ 1242.779916][T26613] RDX: 000000000000000f RSI: 00007faea77c90a0 RDI: 0000000000000008 [ 1242.787736][T26613] RBP: 00007faea77c9090 R08: 0000000000000000 R09: 0000000000000000 [ 1242.796137][T26613] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1242.804210][T26613] R13: 0000000000000000 R14: 00007faea9307fa0 R15: 00007fff367d4908 [ 1243.337011][T26637] FAULT_INJECTION: forcing a failure. [ 1243.337011][T26637] name failslab, interval 1, probability 0, space 0, times 0 [ 1243.356674][T26637] CPU: 0 PID: 26637 Comm: syz.0.8734 Tainted: G W 5.10.226-syzkaller-00001-g6a01908517df #0 [ 1243.367862][T26637] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 1243.377755][T26637] Call Trace: [ 1243.380885][T26637] dump_stack_lvl+0x1e2/0x24b [ 1243.385391][T26637] ? panic+0x812/0x812 [ 1243.389299][T26637] ? bfq_pos_tree_add_move+0x43b/0x43b [ 1243.394594][T26637] ? arch_stack_walk+0xf3/0x140 [ 1243.399425][T26637] dump_stack+0x15/0x17 [ 1243.403369][T26637] should_fail+0x3c6/0x510 [ 1243.407616][T26637] ? __alloc_skb+0x80/0x510 [ 1243.411996][T26637] __should_failslab+0xa4/0xe0 [ 1243.416554][T26637] should_failslab+0x9/0x20 [ 1243.420893][T26637] kmem_cache_alloc+0x3d/0x2e0 [ 1243.425499][T26637] __alloc_skb+0x80/0x510 [ 1243.429656][T26637] tipc_msg_build+0x13e/0x1040 [ 1243.434255][T26637] ? proc_pident_instantiate+0x7a/0x2e0 [ 1243.439633][T26637] ? proc_pident_lookup+0x1c4/0x260 [ 1243.444762][T26637] ? __kasan_check_write+0x14/0x20 [ 1243.449705][T26637] ? _raw_spin_lock_bh+0xa4/0x1b0 [ 1243.454583][T26637] ? _raw_spin_lock_irq+0x1b0/0x1b0 [ 1243.459782][T26637] ? tipc_msg_fragment+0x760/0x760 [ 1243.464733][T26637] ? __local_bh_enable_ip+0x53/0x80 [ 1243.469763][T26637] ? tipc_nametbl_lookup_dst_nodes+0x375/0x7e0 [ 1243.475746][T26637] __tipc_sendmsg+0x2403/0x3ab0 [ 1243.480435][T26637] ? avc_has_perm_noaudit+0x240/0x240 [ 1243.485638][T26637] ? tipc_sk_publish+0x3e0/0x3e0 [ 1243.490407][T26637] ? avc_has_perm+0x14d/0x400 [ 1243.494920][T26637] ? memcpy+0x56/0x70 [ 1243.498741][T26637] ? avc_has_perm+0x275/0x400 [ 1243.503254][T26637] ? wait_woken+0x250/0x250 [ 1243.507595][T26637] ? avc_has_perm_noaudit+0x240/0x240 [ 1243.512896][T26637] ? unwind_get_return_address+0x4d/0x90 [ 1243.518360][T26637] ? __kasan_check_write+0x14/0x20 [ 1243.523307][T26637] ? _raw_spin_lock_bh+0xa4/0x1b0 [ 1243.528162][T26637] ? _raw_spin_lock_irq+0x1b0/0x1b0 [ 1243.533199][T26637] ? __local_bh_enable_ip+0x53/0x80 [ 1243.538233][T26637] ? local_bh_enable+0x1f/0x30 [ 1243.542842][T26637] ? lock_sock_nested+0x26a/0x300 [ 1243.547694][T26637] ? sock_init_data+0xc0/0xc0 [ 1243.552227][T26637] ? kmem_cache_free+0xa9/0x1e0 [ 1243.556896][T26637] ? kasan_set_track+0x5d/0x70 [ 1243.561591][T26637] ? kasan_set_track+0x4b/0x70 [ 1243.566188][T26637] tipc_sendmsg+0x55/0x70 [ 1243.570345][T26637] ? tipc_recvmsg+0x13b0/0x13b0 [ 1243.575033][T26637] ____sys_sendmsg+0x59e/0x8f0 [ 1243.579634][T26637] ? __sys_sendmsg_sock+0x40/0x40 [ 1243.584500][T26637] ? import_iovec+0xe5/0x120 [ 1243.588917][T26637] ___sys_sendmsg+0x252/0x2e0 [ 1243.593430][T26637] ? __sys_sendmsg+0x280/0x280 [ 1243.598031][T26637] ? rw_verify_area+0x1c3/0x360 [ 1243.602724][T26637] ? __fdget+0x1bc/0x240 [ 1243.606797][T26637] __se_sys_sendmsg+0x1b1/0x280 [ 1243.611485][T26637] ? __x64_sys_sendmsg+0x90/0x90 [ 1243.616259][T26637] ? ksys_write+0x260/0x2c0 [ 1243.620601][T26637] ? debug_smp_processor_id+0x17/0x20 [ 1243.625802][T26637] __x64_sys_sendmsg+0x7b/0x90 [ 1243.630523][T26637] do_syscall_64+0x34/0x70 [ 1243.635840][T26637] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 1243.641570][T26637] RIP: 0033:0x7f2524e6f819 [ 1243.645810][T26637] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 1243.665730][T26637] RSP: 002b:00007f25234e8038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 1243.673961][T26637] RAX: ffffffffffffffda RBX: 00007f2525026fa0 RCX: 00007f2524e6f819 [ 1243.681865][T26637] RDX: 000000004400c005 RSI: 0000000020004440 RDI: 0000000000000007 [ 1243.689677][T26637] RBP: 00007f25234e8090 R08: 0000000000000000 R09: 0000000000000000 [ 1243.697920][T26637] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1243.705734][T26637] R13: 0000000000000000 R14: 00007f2525026fa0 R15: 00007fffba1b7028 [ 1243.976386][T26654] device pim6reg1 entered promiscuous mode [ 1244.838509][ T24] audit: type=1400 audit(1732157560.300:164): avc: denied { create } for pid=26677 comm="syz.1.8746" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=isdn_socket permissive=1 [ 1245.276291][T26678] device syzkaller0 entered promiscuous mode [ 1245.310447][T26697] device sit0 entered promiscuous mode [ 1247.820517][T26739] bridge0: port 1(bridge_slave_0) entered blocking state [ 1247.830531][T26739] bridge0: port 1(bridge_slave_0) entered disabled state [ 1247.839199][T26739] device bridge_slave_0 entered promiscuous mode [ 1247.846058][T26739] bridge0: port 2(bridge_slave_1) entered blocking state [ 1247.852947][T26739] bridge0: port 2(bridge_slave_1) entered disabled state [ 1247.860279][T26739] device bridge_slave_1 entered promiscuous mode [ 1247.998048][T26749] FAULT_INJECTION: forcing a failure. [ 1247.998048][T26749] name failslab, interval 1, probability 0, space 0, times 0 [ 1248.056034][T26749] CPU: 1 PID: 26749 Comm: syz.4.8770 Tainted: G W 5.10.226-syzkaller-00001-g6a01908517df #0 [ 1248.067239][T26749] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 1248.077143][T26749] Call Trace: [ 1248.080248][T26749] dump_stack_lvl+0x1e2/0x24b [ 1248.084757][T26749] ? panic+0x812/0x812 [ 1248.088662][T26749] ? bfq_pos_tree_add_move+0x43b/0x43b [ 1248.094569][T26749] ? 0xffffffffa0016738 [ 1248.098909][T26749] dump_stack+0x15/0x17 [ 1248.102896][T26749] should_fail+0x3c6/0x510 [ 1248.107340][T26749] ? __alloc_file+0x29/0x330 [ 1248.112180][T26749] __should_failslab+0xa4/0xe0 [ 1248.116800][T26749] should_failslab+0x9/0x20 [ 1248.121131][T26749] kmem_cache_alloc+0x3d/0x2e0 [ 1248.126800][T26749] __alloc_file+0x29/0x330 [ 1248.131289][T26749] ? alloc_empty_file+0x42/0x180 [ 1248.136250][T26749] alloc_empty_file+0x95/0x180 [ 1248.140918][T26749] path_openat+0x105/0x3000 [ 1248.147270][T26749] ? __kasan_slab_alloc+0xc3/0xe0 [ 1248.152120][T26749] ? __kasan_slab_alloc+0xb1/0xe0 [ 1248.156981][T26749] ? slab_post_alloc_hook+0x61/0x2f0 [ 1248.162111][T26749] ? kmem_cache_alloc+0x168/0x2e0 [ 1248.166959][T26749] ? getname_flags+0xba/0x520 [ 1248.171475][T26749] ? getname+0x19/0x20 [ 1248.175384][T26749] ? __x64_sys_openat+0x243/0x290 [ 1248.180240][T26749] ? do_syscall_64+0x34/0x70 [ 1248.184668][T26749] ? entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 1248.190569][T26749] ? do_filp_open+0x460/0x460 [ 1248.195128][T26749] do_filp_open+0x21c/0x460 [ 1248.199611][T26749] ? vfs_tmpfile+0x2b0/0x2b0 [ 1248.204120][T26749] ? get_unused_fd_flags+0x94/0xa0 [ 1248.209262][T26749] do_sys_openat2+0x13f/0x710 [ 1248.213823][T26749] ? mutex_trylock+0xa0/0xa0 [ 1248.218303][T26749] ? do_sys_open+0x220/0x220 [ 1248.222733][T26749] ? __kasan_check_write+0x14/0x20 [ 1248.227681][T26749] ? ksys_write+0x260/0x2c0 [ 1248.232451][T26749] __x64_sys_openat+0x243/0x290 [ 1248.237152][T26749] ? __ia32_sys_open+0x270/0x270 [ 1248.241914][T26749] ? debug_smp_processor_id+0x17/0x20 [ 1248.247567][T26749] do_syscall_64+0x34/0x70 [ 1248.252033][T26749] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 1248.257754][T26749] RIP: 0033:0x7fe4d8b69819 [ 1248.262017][T26749] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 1248.281878][T26749] RSP: 002b:00007fe4d71e2038 EFLAGS: 00000246 ORIG_RAX: 0000000000000101 [ 1248.290120][T26749] RAX: ffffffffffffffda RBX: 00007fe4d8d20fa0 RCX: 00007fe4d8b69819 [ 1248.297932][T26749] RDX: 00000000000026e1 RSI: 0000000020000180 RDI: ffffffffffffff9c [ 1248.305745][T26749] RBP: 00007fe4d71e2090 R08: 0000000000000000 R09: 0000000000000000 [ 1248.313553][T26749] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1248.321369][T26749] R13: 0000000000000000 R14: 00007fe4d8d20fa0 R15: 00007ffd7a03bb28 [ 1248.337003][T16906] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1248.344641][T16906] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1248.357961][T16906] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1248.367781][T16906] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1248.387058][T16906] bridge0: port 1(bridge_slave_0) entered blocking state [ 1248.394267][T16906] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1248.418197][T16906] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1248.436652][T16906] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1248.445275][T16906] bridge0: port 2(bridge_slave_1) entered blocking state [ 1248.452141][T16906] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1248.839414][T16906] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1248.902453][T16906] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1248.997734][T16906] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1249.221611][T16906] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 1249.343331][T26739] device veth0_vlan entered promiscuous mode [ 1249.350129][T16906] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 1249.358661][T16906] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1249.366798][T16906] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1249.374040][T16906] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1249.385492][T26773] device wg2 left promiscuous mode [ 1249.591964][T26739] device veth1_macvtap entered promiscuous mode [ 1249.756638][ T314] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 1249.785073][ T314] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 1249.806926][ T314] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 1249.831886][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 1249.882785][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 1249.942218][T10153] device veth1_macvtap left promiscuous mode [ 1250.359156][ T314] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 1250.390474][ T314] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 1252.365552][T26824] FAULT_INJECTION: forcing a failure. [ 1252.365552][T26824] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1252.546766][T26824] CPU: 0 PID: 26824 Comm: syz.0.8791 Tainted: G W 5.10.226-syzkaller-00001-g6a01908517df #0 [ 1252.557955][T26824] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 1252.567841][T26824] Call Trace: [ 1252.570978][T26824] dump_stack_lvl+0x1e2/0x24b [ 1252.575499][T26824] ? bfq_pos_tree_add_move+0x43b/0x43b [ 1252.580799][T26824] dump_stack+0x15/0x17 [ 1252.584772][T26824] should_fail+0x3c6/0x510 [ 1252.589060][T26824] should_fail_usercopy+0x1a/0x20 [ 1252.593903][T26824] _copy_to_user+0x20/0x90 [ 1252.598147][T26824] simple_read_from_buffer+0xc7/0x150 [ 1252.603352][T26824] proc_fail_nth_read+0x1a3/0x210 [ 1252.608209][T26824] ? proc_fault_inject_write+0x390/0x390 [ 1252.613682][T26824] ? security_file_permission+0x86/0xb0 [ 1252.619060][T26824] ? rw_verify_area+0x1c3/0x360 [ 1252.623749][T26824] ? proc_fault_inject_write+0x390/0x390 [ 1252.629211][T26824] vfs_read+0x200/0xba0 [ 1252.633203][T26824] ? kernel_read+0x70/0x70 [ 1252.637479][T26824] ? __kasan_check_write+0x14/0x20 [ 1252.642405][T26824] ? mutex_lock+0xa5/0x110 [ 1252.646683][T26824] ? mutex_trylock+0xa0/0xa0 [ 1252.651450][T26824] ? __fdget_pos+0x2e7/0x3a0 [ 1252.655881][T26824] ? ksys_read+0x77/0x2c0 [ 1252.660230][T26824] ksys_read+0x199/0x2c0 [ 1252.664282][T26824] ? vfs_write+0xe70/0xe70 [ 1252.668964][T26824] ? debug_smp_processor_id+0x17/0x20 [ 1252.674175][T26824] __x64_sys_read+0x7b/0x90 [ 1252.678513][T26824] do_syscall_64+0x34/0x70 [ 1252.682803][T26824] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 1252.688484][T26824] RIP: 0033:0x7f2524e6e25c [ 1252.692736][T26824] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 69 8e 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 bf 8e 02 00 48 [ 1252.712280][T26824] RSP: 002b:00007f25234e8030 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 1252.720502][T26824] RAX: ffffffffffffffda RBX: 00007f2525026fa0 RCX: 00007f2524e6e25c [ 1252.728311][T26824] RDX: 000000000000000f RSI: 00007f25234e80a0 RDI: 0000000000000008 [ 1252.736124][T26824] RBP: 00007f25234e8090 R08: 0000000000000000 R09: 0000000000000000 [ 1252.743947][T26824] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1252.751752][T26824] R13: 0000000000000000 R14: 00007f2525026fa0 R15: 00007fffba1b7028 [ 1254.413403][T26856] FAULT_INJECTION: forcing a failure. [ 1254.413403][T26856] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1254.427934][T26856] CPU: 0 PID: 26856 Comm: syz.0.8800 Tainted: G W 5.10.226-syzkaller-00001-g6a01908517df #0 [ 1254.439095][T26856] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 1254.448985][T26856] Call Trace: [ 1254.452120][T26856] dump_stack_lvl+0x1e2/0x24b [ 1254.456631][T26856] ? bfq_pos_tree_add_move+0x43b/0x43b [ 1254.461923][T26856] dump_stack+0x15/0x17 [ 1254.465915][T26856] should_fail+0x3c6/0x510 [ 1254.470171][T26856] should_fail_alloc_page+0x52/0x60 [ 1254.475203][T26856] __alloc_pages_nodemask+0x1b3/0xaf0 [ 1254.480407][T26856] ? do_syscall_64+0x34/0x70 [ 1254.484835][T26856] ? entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 1254.490742][T26856] ? gfp_pfmemalloc_allowed+0x120/0x120 [ 1254.496120][T26856] ? avc_has_perm_noaudit+0x117/0x240 [ 1254.501328][T26856] shmem_alloc_page+0x257/0x420 [ 1254.506014][T26856] ? put_page+0xd0/0xd0 [ 1254.510007][T26856] ? slab_post_alloc_hook+0x61/0x2f0 [ 1254.515131][T26856] ? percpu_counter_add_batch+0x13d/0x160 [ 1254.520686][T26856] shmem_alloc_and_acct_page+0x395/0x8e0 [ 1254.526152][T26856] ? shmem_swapin_page+0x1950/0x1950 [ 1254.531273][T26856] ? find_get_entry+0x44c/0x4c0 [ 1254.535957][T26856] ? page_cache_prev_miss+0x410/0x410 [ 1254.541167][T26856] ? down_read_trylock+0x179/0x1d0 [ 1254.546110][T26856] ? find_lock_entry+0x1df/0x200 [ 1254.550885][T26856] shmem_getpage_gfp+0x891/0x2480 [ 1254.555744][T26856] ? __kasan_check_write+0x14/0x20 [ 1254.560696][T26856] ? shmem_getpage+0xa0/0xa0 [ 1254.565116][T26856] ? iov_iter_fault_in_readable+0x31f/0x4f0 [ 1254.570849][T26856] shmem_write_begin+0xca/0x1b0 [ 1254.575534][T26856] generic_perform_write+0x2cd/0x570 [ 1254.580659][T26856] ? grab_cache_page_write_begin+0xa0/0xa0 [ 1254.586296][T26856] ? file_remove_privs+0x570/0x570 [ 1254.591244][T26856] ? __kasan_check_write+0x14/0x20 [ 1254.596191][T26856] __generic_file_write_iter+0x23c/0x560 [ 1254.601658][T26856] ? generic_write_checks+0x3b9/0x470 [ 1254.606868][T26856] generic_file_write_iter+0xaf/0x1c0 [ 1254.612071][T26856] vfs_write+0xb4c/0xe70 [ 1254.616160][T26856] ? kernel_write+0x3d0/0x3d0 [ 1254.620665][T26856] ? mutex_trylock+0xa0/0xa0 [ 1254.625093][T26856] ? __fdget_pos+0x2e7/0x3a0 [ 1254.629516][T26856] ? ksys_write+0x77/0x2c0 [ 1254.633771][T26856] ksys_write+0x199/0x2c0 [ 1254.637937][T26856] ? __ia32_sys_read+0x90/0x90 [ 1254.642544][T26856] ? debug_smp_processor_id+0x17/0x20 [ 1254.648001][T26856] __x64_sys_write+0x7b/0x90 [ 1254.652432][T26856] do_syscall_64+0x34/0x70 [ 1254.656683][T26856] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 1254.662529][T26856] RIP: 0033:0x7f2524e6f819 [ 1254.666868][T26856] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 1254.686583][T26856] RSP: 002b:00007f25234e8038 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 1254.694808][T26856] RAX: ffffffffffffffda RBX: 00007f2525026fa0 RCX: 00007f2524e6f819 [ 1254.702801][T26856] RDX: 0000000000040010 RSI: 0000000020000180 RDI: 0000000000000007 [ 1254.710535][T26856] RBP: 00007f25234e8090 R08: 0000000000000000 R09: 0000000000000000 [ 1254.718348][T26856] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1254.726143][T26856] R13: 0000000000000000 R14: 00007f2525026fa0 R15: 00007fffba1b7028 [ 1256.356694][T26873] device veth0_vlan left promiscuous mode [ 1256.362795][T26873] device veth0_vlan entered promiscuous mode [ 1256.372543][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1256.619336][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1256.743518][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1258.649772][T26885] device pim6reg1 entered promiscuous mode [ 1258.838972][T26893] syz.3.8810[26893] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1258.839028][T26893] syz.3.8810[26893] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1259.043387][T26897] device sit0 entered promiscuous mode [ 1259.999983][T26916] syz.1.8817[26916] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1260.000042][T26916] syz.1.8817[26916] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1261.539292][T26946] device sit0 entered promiscuous mode [ 1263.553623][T27003] device pim6reg1 entered promiscuous mode [ 1265.815938][T27042] device syzkaller0 entered promiscuous mode [ 1270.138605][T27123] FAULT_INJECTION: forcing a failure. [ 1270.138605][T27123] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1270.288022][T27123] CPU: 1 PID: 27123 Comm: syz.2.8882 Tainted: G W 5.10.226-syzkaller-00001-g6a01908517df #0 [ 1270.299224][T27123] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 1270.309745][T27123] Call Trace: [ 1270.312880][T27123] dump_stack_lvl+0x1e2/0x24b [ 1270.317388][T27123] ? bfq_pos_tree_add_move+0x43b/0x43b [ 1270.322702][T27123] dump_stack+0x15/0x17 [ 1270.326669][T27123] should_fail+0x3c6/0x510 [ 1270.330931][T27123] should_fail_alloc_page+0x52/0x60 [ 1270.335962][T27123] __alloc_pages_nodemask+0x1b3/0xaf0 [ 1270.341169][T27123] ? gfp_pfmemalloc_allowed+0x120/0x120 [ 1270.346546][T27123] ? ctx_flexible_sched_in+0x100/0x100 [ 1270.351839][T27123] handle_pte_fault+0x175a/0x3e10 [ 1270.356697][T27123] ? ctx_pinned_sched_in+0x100/0x100 [ 1270.361815][T27123] ? _raw_spin_lock+0xa4/0x1b0 [ 1270.366415][T27123] ? _raw_spin_trylock_bh+0x190/0x190 [ 1270.371621][T27123] ? vmf_allows_speculation+0x6f0/0x6f0 [ 1270.377004][T27123] ? __this_cpu_preempt_check+0x13/0x20 [ 1270.382386][T27123] handle_mm_fault+0x11d6/0x1a10 [ 1270.387163][T27123] ? can_reuse_spf_vma+0xe0/0xe0 [ 1270.391930][T27123] ? finish_task_switch+0x130/0x5a0 [ 1270.396965][T27123] ? switch_mm_irqs_off+0x71b/0x9a0 [ 1270.402004][T27123] ? down_read_trylock+0x179/0x1d0 [ 1270.406944][T27123] ? release_firmware_map_entry+0x18d/0x18d [ 1270.412692][T27123] ? __init_rwsem+0x1c0/0x1c0 [ 1270.417188][T27123] ? vmacache_update+0xb7/0x120 [ 1270.421872][T27123] ? find_vma+0x136/0x150 [ 1270.426040][T27123] exc_page_fault+0x2a6/0x5b0 [ 1270.430575][T27123] asm_exc_page_fault+0x1e/0x30 [ 1270.435242][T27123] RIP: 0010:copy_user_generic_unrolled+0x89/0xc0 [ 1270.441422][T27123] Code: 38 4c 89 47 20 4c 89 4f 28 4c 89 57 30 4c 89 5f 38 48 8d 76 40 48 8d 7f 40 ff c9 75 b6 89 d1 83 e2 07 c1 e9 03 74 12 4c 8b 06 <4c> 89 07 48 8d 76 08 48 8d 7f 08 ff c9 75 ee 21 d2 74 10 89 d1 8a [ 1270.461308][T27123] RSP: 0018:ffffc90000e07700 EFLAGS: 00050202 [ 1270.467466][T27123] RAX: ffffffff82537201 RBX: 0000000000000010 RCX: 0000000000000002 [ 1270.475402][T27123] RDX: 0000000000000000 RSI: ffffc90000e077c0 RDI: 0000000020002f40 [ 1270.483223][T27123] RBP: ffffc90000e07730 R08: 0000000000000018 R09: fffff520001c0efa [ 1270.491314][T27123] R10: 0000000000000000 R11: dffffc0000000001 R12: 00007ffffffff000 [ 1270.499125][T27123] R13: 0000000020002f50 R14: ffffc90000e077c0 R15: 0000000020002f40 [ 1270.507042][T27123] ? _copy_from_user+0x91/0xd0 [ 1270.511648][T27123] ? _copy_to_user+0x78/0x90 [ 1270.516053][T27123] put_cmsg+0x3ea/0x580 [ 1270.520137][T27123] ? __scm_send+0x12d0/0x12d0 [ 1270.524646][T27123] ? tipc_wait_for_rcvmsg+0x4d0/0x630 [ 1270.529853][T27123] tipc_sk_anc_data_recv+0x4f2/0x980 [ 1270.534978][T27123] ? tipc_wait_for_rcvmsg+0x630/0x630 [ 1270.540185][T27123] ? perf_trace_buf_update+0xd4/0x110 [ 1270.545386][T27123] tipc_recvmsg+0x72a/0x13b0 [ 1270.549818][T27123] ? tipc_send_packet+0xa0/0xa0 [ 1270.554498][T27123] ? do_sys_openat2+0x1fc/0x710 [ 1270.559191][T27123] ? security_socket_recvmsg+0x87/0xb0 [ 1270.564479][T27123] ? tipc_send_packet+0xa0/0xa0 [ 1270.569169][T27123] ____sys_recvmsg+0x286/0x530 [ 1270.573811][T27123] ? __sys_recvmsg_sock+0x50/0x50 [ 1270.578831][T27123] ? import_iovec+0xe5/0x120 [ 1270.583500][T27123] ___sys_recvmsg+0x1ec/0x690 [ 1270.588016][T27123] ? __sys_recvmsg+0x270/0x270 [ 1270.592784][T27123] ? __fdget+0x1bc/0x240 [ 1270.596854][T27123] __x64_sys_recvmsg+0x1ee/0x2c0 [ 1270.601629][T27123] ? ___sys_recvmsg+0x690/0x690 [ 1270.606552][T27123] ? debug_smp_processor_id+0x17/0x20 [ 1270.611738][T27123] do_syscall_64+0x34/0x70 [ 1270.615995][T27123] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 1270.621713][T27123] RIP: 0033:0x7f28da914819 [ 1270.626052][T27123] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 1270.646031][T27123] RSP: 002b:00007f28d8f8d038 EFLAGS: 00000246 ORIG_RAX: 000000000000002f [ 1270.654313][T27123] RAX: ffffffffffffffda RBX: 00007f28daacbfa0 RCX: 00007f28da914819 [ 1270.662558][T27123] RDX: 0000000000000000 RSI: 0000000020000ac0 RDI: 0000000000000004 [ 1270.670326][T27123] RBP: 00007f28d8f8d090 R08: 0000000000000000 R09: 0000000000000000 [ 1270.678212][T27123] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1270.686024][T27123] R13: 0000000000000000 R14: 00007f28daacbfa0 R15: 00007ffda89d85a8 [ 1271.931048][T27148] device syzkaller0 entered promiscuous mode [ 1272.313017][T27170] device veth0_vlan left promiscuous mode [ 1272.318287][T27172] FAULT_INJECTION: forcing a failure. [ 1272.318287][T27172] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1272.364751][T27170] device veth0_vlan entered promiscuous mode [ 1272.427182][T27172] CPU: 1 PID: 27172 Comm: syz.3.8896 Tainted: G W 5.10.226-syzkaller-00001-g6a01908517df #0 [ 1272.438376][T27172] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 1272.448265][T27172] Call Trace: [ 1272.451398][T27172] dump_stack_lvl+0x1e2/0x24b [ 1272.455910][T27172] ? bfq_pos_tree_add_move+0x43b/0x43b [ 1272.461200][T27172] ? 0xffffffffa002a000 [ 1272.465198][T27172] ? is_bpf_text_address+0x172/0x190 [ 1272.470434][T27172] dump_stack+0x15/0x17 [ 1272.474396][T27172] should_fail+0x3c6/0x510 [ 1272.478672][T27172] should_fail_usercopy+0x1a/0x20 [ 1272.483513][T27172] _copy_from_user+0x20/0xd0 [ 1272.487940][T27172] __se_sys_bpf+0x232/0x11cb0 [ 1272.492797][T27172] ? stack_trace_save+0x113/0x1c0 [ 1272.497637][T27172] ? terminate_walk+0x407/0x4f0 [ 1272.502325][T27172] ? stack_trace_snprint+0xf0/0xf0 [ 1272.507277][T27172] ? kmem_cache_free+0xa9/0x1e0 [ 1272.511961][T27172] ? kmem_cache_free+0xa9/0x1e0 [ 1272.516660][T27172] ? kasan_set_track+0x5d/0x70 [ 1272.521240][T27172] ? __x64_sys_bpf+0x90/0x90 [ 1272.525929][T27172] ? __kasan_slab_free+0x11/0x20 [ 1272.530700][T27172] ? slab_free_freelist_hook+0xc0/0x190 [ 1272.536099][T27172] ? kmem_cache_free+0xa9/0x1e0 [ 1272.540771][T27172] ? putname+0xe7/0x140 [ 1272.544775][T27172] ? do_sys_openat2+0x1fc/0x710 [ 1272.549467][T27172] ? __x64_sys_openat+0x243/0x290 [ 1272.554309][T27172] ? do_syscall_64+0x34/0x70 [ 1272.558739][T27172] ? _kstrtoull+0x3a0/0x4a0 [ 1272.563077][T27172] ? kstrtouint_from_user+0x20a/0x2a0 [ 1272.568419][T27172] ? kstrtol_from_user+0x310/0x310 [ 1272.573360][T27172] ? memset+0x35/0x40 [ 1272.577177][T27172] ? __fsnotify_parent+0x4b9/0x6c0 [ 1272.582492][T27172] ? fsnotify_set_children_dentry_flags+0x210/0x210 [ 1272.588939][T27172] ? proc_fail_nth_write+0x20b/0x290 [ 1272.594024][T27172] ? proc_fail_nth_read+0x210/0x210 [ 1272.599072][T27172] ? security_file_permission+0x86/0xb0 [ 1272.604613][T27172] ? rw_verify_area+0x1c3/0x360 [ 1272.609293][T27172] ? preempt_count_add+0x92/0x1a0 [ 1272.614239][T27172] ? vfs_write+0x852/0xe70 [ 1272.618493][T27172] ? kmem_cache_free+0xa9/0x1e0 [ 1272.623167][T27172] ? kernel_write+0x3d0/0x3d0 [ 1272.627798][T27172] ? __kasan_check_write+0x14/0x20 [ 1272.632777][T27172] ? mutex_lock+0xa5/0x110 [ 1272.637255][T27172] ? mutex_trylock+0xa0/0xa0 [ 1272.641915][T27172] ? __kasan_check_write+0x14/0x20 [ 1272.646866][T27172] ? fput_many+0x160/0x1b0 [ 1272.651518][T27172] ? debug_smp_processor_id+0x17/0x20 [ 1272.656757][T27172] __x64_sys_bpf+0x7b/0x90 [ 1272.661160][T27172] do_syscall_64+0x34/0x70 [ 1272.665384][T27172] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 1272.671121][T27172] RIP: 0033:0x7f2a740a8819 [ 1272.675365][T27172] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 1272.694894][T27172] RSP: 002b:00007f2a72721038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 1272.703145][T27172] RAX: ffffffffffffffda RBX: 00007f2a7425ffa0 RCX: 00007f2a740a8819 [ 1272.710946][T27172] RDX: 0000000000000048 RSI: 0000000020000580 RDI: 0600000000000000 [ 1272.718761][T27172] RBP: 00007f2a72721090 R08: 0000000000000000 R09: 0000000000000000 [ 1272.726569][T27172] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1272.735047][T27172] R13: 0000000000000001 R14: 00007f2a7425ffa0 R15: 00007ffc435513a8 [ 1272.743635][T16906] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1272.758846][T16906] IPv6: ADDRCONF(NETDEV_CHANGE): ªªªªªª: link becomes ready [ 1272.778290][T16906] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1272.815289][T27181] device sit0 left promiscuous mode [ 1272.839898][T27178] cgroup: fork rejected by pids controller in /syz4 [ 1272.911162][T27181] device sit0 entered promiscuous mode [ 1274.321838][T16906] device veth1_macvtap left promiscuous mode [ 1274.336587][T16906] device veth0_vlan left promiscuous mode [ 1274.694076][T27310] bridge0: port 1(bridge_slave_0) entered blocking state [ 1274.736344][T27310] bridge0: port 1(bridge_slave_0) entered disabled state [ 1274.747202][T27310] device bridge_slave_0 entered promiscuous mode [ 1274.792380][T27318] device veth0_vlan left promiscuous mode [ 1274.829026][T27318] device veth0_vlan entered promiscuous mode [ 1274.962938][T27310] bridge0: port 2(bridge_slave_1) entered blocking state [ 1274.986473][T27310] bridge0: port 2(bridge_slave_1) entered disabled state [ 1275.014112][T27310] device bridge_slave_1 entered promiscuous mode [ 1275.031929][T10153] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1275.067831][T10153] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1275.084486][T10153] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1275.390206][T27310] bridge0: port 2(bridge_slave_1) entered blocking state [ 1275.397295][T27310] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1275.446212][ T49] bridge0: port 2(bridge_slave_1) entered disabled state [ 1275.469429][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1275.476855][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1275.496375][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1275.504712][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1275.512924][ T49] bridge0: port 1(bridge_slave_0) entered blocking state [ 1275.520025][ T49] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1275.539024][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1275.600423][ T49] bridge0: port 2(bridge_slave_1) entered blocking state [ 1275.607446][ T49] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1275.678832][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1275.726632][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1275.865656][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 1275.874961][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 1275.902749][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 1275.915768][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1275.931651][T27310] device veth0_vlan entered promiscuous mode [ 1275.938294][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1275.945732][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1276.006757][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 1276.022208][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 1276.035695][T27310] device veth1_macvtap entered promiscuous mode [ 1276.240383][T27353] device macsec0 entered promiscuous mode [ 1276.247472][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 1276.265217][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 1276.314872][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 1276.432735][T27361] FAULT_INJECTION: forcing a failure. [ 1276.432735][T27361] name failslab, interval 1, probability 0, space 0, times 0 [ 1276.445867][T27361] CPU: 1 PID: 27361 Comm: syz.3.8925 Tainted: G W 5.10.226-syzkaller-00001-g6a01908517df #0 [ 1276.457042][T27361] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 1276.467014][T27361] Call Trace: [ 1276.470156][T27361] dump_stack_lvl+0x1e2/0x24b [ 1276.474666][T27361] ? panic+0x812/0x812 [ 1276.478565][T27361] ? bfq_pos_tree_add_move+0x43b/0x43b [ 1276.483860][T27361] ? memset+0x35/0x40 [ 1276.487774][T27361] dump_stack+0x15/0x17 [ 1276.491758][T27361] should_fail+0x3c6/0x510 [ 1276.496027][T27361] ? kernfs_fop_open+0x324/0xab0 [ 1276.500790][T27361] __should_failslab+0xa4/0xe0 [ 1276.505379][T27361] should_failslab+0x9/0x20 [ 1276.509721][T27361] kmem_cache_alloc_trace+0x3a/0x2e0 [ 1276.514853][T27361] ? __kasan_check_write+0x14/0x20 [ 1276.519790][T27361] kernfs_fop_open+0x324/0xab0 [ 1276.524388][T27361] ? kernfs_fop_mmap+0x3c0/0x3c0 [ 1276.529163][T27361] do_dentry_open+0x7c1/0x10d0 [ 1276.533765][T27361] vfs_open+0x73/0x80 [ 1276.537581][T27361] path_openat+0x2660/0x3000 [ 1276.542013][T27361] ? kmem_cache_alloc+0x168/0x2e0 [ 1276.546959][T27361] ? do_syscall_64+0x34/0x70 [ 1276.551479][T27361] ? entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 1276.557427][T27361] ? do_filp_open+0x460/0x460 [ 1276.561907][T27361] do_filp_open+0x21c/0x460 [ 1276.566320][T27361] ? vfs_tmpfile+0x2b0/0x2b0 [ 1276.570761][T27361] ? get_unused_fd_flags+0x94/0xa0 [ 1276.575697][T27361] do_sys_openat2+0x13f/0x710 [ 1276.580313][T27361] ? mutex_trylock+0xa0/0xa0 [ 1276.584770][T27361] ? do_sys_open+0x220/0x220 [ 1276.589167][T27361] ? __kasan_check_write+0x14/0x20 [ 1276.594138][T27361] ? ksys_write+0x260/0x2c0 [ 1276.599128][T27361] __x64_sys_openat+0x243/0x290 [ 1276.603854][T27361] ? __ia32_sys_open+0x270/0x270 [ 1276.608589][T27361] ? debug_smp_processor_id+0x17/0x20 [ 1276.613777][T27361] do_syscall_64+0x34/0x70 [ 1276.618562][T27361] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 1276.624295][T27361] RIP: 0033:0x7f2a740a8819 [ 1276.628878][T27361] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 1276.648888][T27361] RSP: 002b:00007f2a72721038 EFLAGS: 00000246 ORIG_RAX: 0000000000000101 [ 1276.657128][T27361] RAX: ffffffffffffffda RBX: 00007f2a7425ffa0 RCX: 00007f2a740a8819 [ 1276.664937][T27361] RDX: 0000000000000201 RSI: 0000000020003000 RDI: 0000000000000003 [ 1276.672751][T27361] RBP: 00007f2a72721090 R08: 0000000000000000 R09: 0000000000000000 [ 1276.680882][T27361] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1276.688850][T27361] R13: 0000000000000000 R14: 00007f2a7425ffa0 R15: 00007ffc435513a8 [ 1276.770269][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 1276.803028][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 1281.041887][T27446] device syzkaller0 entered promiscuous mode [ 1281.219643][T27455] bridge0: port 1(bridge_slave_0) entered blocking state [ 1281.227168][T27455] bridge0: port 1(bridge_slave_0) entered disabled state [ 1281.234426][T27455] device bridge_slave_0 entered promiscuous mode [ 1281.247275][T27455] bridge0: port 2(bridge_slave_1) entered blocking state [ 1281.254246][T27455] bridge0: port 2(bridge_slave_1) entered disabled state [ 1281.261830][T27455] device bridge_slave_1 entered promiscuous mode [ 1281.332100][T27484] FAULT_INJECTION: forcing a failure. [ 1281.332100][T27484] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1281.335446][T27455] bridge0: port 2(bridge_slave_1) entered blocking state [ 1281.352029][T27455] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1281.359214][T27455] bridge0: port 1(bridge_slave_0) entered blocking state [ 1281.365971][T27455] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1281.376405][T27484] CPU: 0 PID: 27484 Comm: syz.4.8963 Tainted: G W 5.10.226-syzkaller-00001-g6a01908517df #0 [ 1281.388766][T27484] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 1281.398741][T27484] Call Trace: [ 1281.401873][T27484] dump_stack_lvl+0x1e2/0x24b [ 1281.406383][T27484] ? bfq_pos_tree_add_move+0x43b/0x43b [ 1281.410757][T27455] device veth0_vlan entered promiscuous mode [ 1281.411678][T27484] dump_stack+0x15/0x17 [ 1281.421484][T27484] should_fail+0x3c6/0x510 [ 1281.423534][T27455] device veth1_macvtap entered promiscuous mode [ 1281.425743][T27484] should_fail_alloc_page+0x52/0x60 [ 1281.437133][T27484] __alloc_pages_nodemask+0x1b3/0xaf0 [ 1281.442328][T27484] ? gfp_pfmemalloc_allowed+0x120/0x120 [ 1281.447800][T27484] shmem_alloc_page+0x257/0x420 [ 1281.452464][T27484] ? put_page+0xd0/0xd0 [ 1281.456471][T27484] ? percpu_counter_add_batch+0x13d/0x160 [ 1281.462020][T27484] shmem_alloc_and_acct_page+0x395/0x8e0 [ 1281.467491][T27484] ? shmem_swapin_page+0x1950/0x1950 [ 1281.472690][T27484] ? find_get_entry+0x44c/0x4c0 [ 1281.477377][T27484] ? page_cache_prev_miss+0x410/0x410 [ 1281.482581][T27484] ? pagevec_add_and_need_flush+0x1fe/0x430 [ 1281.488400][T27484] ? __kasan_check_write+0x14/0x20 [ 1281.493432][T27484] ? _raw_spin_lock_irq+0xa5/0x1b0 [ 1281.499374][T27484] ? _raw_spin_lock_irqsave+0x210/0x210 [ 1281.504723][T27484] ? find_lock_entry+0x1df/0x200 [ 1281.509534][T27484] shmem_getpage_gfp+0x891/0x2480 [ 1281.514359][T27484] ? shmem_getpage+0xa0/0xa0 [ 1281.518783][T27484] ? __kasan_check_write+0x14/0x20 [ 1281.523731][T27484] ? __set_page_dirty_no_writeback+0xf1/0x120 [ 1281.529633][T27484] shmem_fallocate+0x9a5/0xe90 [ 1281.534235][T27484] ? shmem_mmap+0x270/0x270 [ 1281.538571][T27484] ? avc_policy_seqno+0x51/0x70 [ 1281.543256][T27484] ? avc_policy_seqno+0x1b/0x70 [ 1281.547951][T27484] ? selinux_file_permission+0x2bb/0x560 [ 1281.553411][T27484] ? fsnotify_perm+0x67/0x4e0 [ 1281.557925][T27484] ? security_file_permission+0x7b/0xb0 [ 1281.563303][T27484] ? preempt_count_add+0x92/0x1a0 [ 1281.568167][T27484] vfs_fallocate+0x492/0x570 [ 1281.572591][T27484] do_vfs_ioctl+0x1686/0x1a30 [ 1281.577103][T27484] ? ioctl_has_perm+0x3f0/0x560 [ 1281.581790][T27484] ? __x32_compat_sys_ioctl+0x90/0x90 [ 1281.586997][T27484] ? has_cap_mac_admin+0x3c0/0x3c0 [ 1281.591952][T27484] ? kvm_sched_clock_read+0x18/0x40 [ 1281.596981][T27484] ? sched_clock+0x3a/0x40 [ 1281.601247][T27484] ? sched_clock+0x3a/0x40 [ 1281.605488][T27484] ? selinux_file_ioctl+0x3cc/0x540 [ 1281.610522][T27484] ? __irq_exit_rcu+0x40/0x150 [ 1281.615123][T27484] ? selinux_file_alloc_security+0x120/0x120 [ 1281.620937][T27484] ? irq_exit_rcu+0x9/0x10 [ 1281.625189][T27484] ? sysvec_apic_timer_interrupt+0xcb/0xe0 [ 1281.630833][T27484] ? __fget_files+0x31e/0x380 [ 1281.635346][T27484] ? security_file_ioctl+0x84/0xb0 [ 1281.640291][T27484] __se_sys_ioctl+0x99/0x190 [ 1281.644718][T27484] __x64_sys_ioctl+0x7b/0x90 [ 1281.649147][T27484] do_syscall_64+0x34/0x70 [ 1281.653396][T27484] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 1281.659120][T27484] RIP: 0033:0x7f018b9cd819 [ 1281.663375][T27484] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 1281.682817][T27484] RSP: 002b:00007f018a046038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1281.692004][T27484] RAX: ffffffffffffffda RBX: 00007f018bb84fa0 RCX: 00007f018b9cd819 [ 1281.701050][T27484] RDX: 0000000020000040 RSI: 000000004030582a RDI: 0000000000000005 [ 1281.709713][T27484] RBP: 00007f018a046090 R08: 0000000000000000 R09: 0000000000000000 [ 1281.719893][T27484] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1281.727762][T27484] R13: 0000000000000000 R14: 00007f018bb84fa0 R15: 00007ffde4fb0e08 [ 1281.742089][ T314] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1281.751081][ T314] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1281.753247][ T24] audit: type=1400 audit(1732157597.210:165): avc: denied { rename } for pid=77 comm="syslogd" name="messages" dev="tmpfs" ino=11 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 1281.759632][ T314] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1281.791899][ T24] audit: type=1400 audit(1732157597.210:166): avc: denied { unlink } for pid=77 comm="syslogd" name="messages.0" dev="tmpfs" ino=10 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 1281.814205][ T24] audit: type=1400 audit(1732157597.210:167): avc: denied { create } for pid=77 comm="syslogd" name="messages" scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 1281.861921][ T314] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 1281.918149][ T314] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 1281.950515][ T314] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1281.966973][ T314] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1281.979632][ T314] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 1281.992444][ T314] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1282.002660][ T314] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1282.010339][ T314] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1282.018016][ T314] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 1282.044465][T27501] device pim6reg1 entered promiscuous mode [ 1282.134385][T27516] FAULT_INJECTION: forcing a failure. [ 1282.134385][T27516] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1282.163395][T27519] ÿÿÿÿÿÿ: renamed from vlan1 [ 1282.174558][T27516] CPU: 0 PID: 27516 Comm: syz.1.8974 Tainted: G W 5.10.226-syzkaller-00001-g6a01908517df #0 [ 1282.185725][T27516] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 1282.195814][T27516] Call Trace: [ 1282.199102][T27516] dump_stack_lvl+0x1e2/0x24b [ 1282.204417][T27516] ? bfq_pos_tree_add_move+0x43b/0x43b [ 1282.209772][T27516] ? avc_has_perm+0x275/0x400 [ 1282.214280][T27516] dump_stack+0x15/0x17 [ 1282.218704][T27516] should_fail+0x3c6/0x510 [ 1282.222968][T27516] should_fail_usercopy+0x1a/0x20 [ 1282.227847][T27516] _copy_to_iter+0x230/0xda0 [ 1282.232611][T27516] ? iov_iter_init+0x120/0x120 [ 1282.237438][T27516] ? __kasan_check_write+0x14/0x20 [ 1282.242383][T27516] ? __check_object_size+0x2e6/0x3c0 [ 1282.247504][T27516] simple_copy_to_iter+0x50/0x70 [ 1282.252675][T27516] __skb_datagram_iter+0xcd/0x780 [ 1282.257557][T27516] ? tipc_sk_anc_data_recv+0xbd/0x980 [ 1282.263454][T27516] ? tsk_importance+0x150/0x150 [ 1282.268400][T27516] ? skb_copy_datagram_iter+0x180/0x180 [ 1282.273870][T27516] skb_copy_datagram_iter+0x46/0x180 [ 1282.279267][T27516] tipc_recvmsg+0x7e8/0x13b0 [ 1282.284213][T27516] ? tipc_send_packet+0xa0/0xa0 [ 1282.288883][T27516] ? do_sys_openat2+0x1fc/0x710 [ 1282.293676][T27516] ? security_socket_recvmsg+0x87/0xb0 [ 1282.298949][T27516] ? tipc_send_packet+0xa0/0xa0 [ 1282.303635][T27516] ____sys_recvmsg+0x286/0x530 [ 1282.308237][T27516] ? __sys_recvmsg_sock+0x50/0x50 [ 1282.313107][T27516] ? import_iovec+0xe5/0x120 [ 1282.317525][T27516] ___sys_recvmsg+0x1ec/0x690 [ 1282.322041][T27516] ? __sys_recvmsg+0x270/0x270 [ 1282.326741][T27516] ? __fdget+0x1bc/0x240 [ 1282.330826][T27516] __x64_sys_recvmsg+0x1ee/0x2c0 [ 1282.335586][T27516] ? ___sys_recvmsg+0x690/0x690 [ 1282.341235][T27516] ? debug_smp_processor_id+0x17/0x20 [ 1282.346591][T27516] do_syscall_64+0x34/0x70 [ 1282.350806][T27516] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 1282.356530][T27516] RIP: 0033:0x7fe8ebb6e819 [ 1282.361246][T27516] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 1282.382598][T27516] RSP: 002b:00007fe8ea1e7038 EFLAGS: 00000246 ORIG_RAX: 000000000000002f [ 1282.390929][T27516] RAX: ffffffffffffffda RBX: 00007fe8ebd25fa0 RCX: 00007fe8ebb6e819 [ 1282.399487][T27516] RDX: 00000000000040fd RSI: 0000000020000b00 RDI: 0000000000000006 [ 1282.407644][T27516] RBP: 00007fe8ea1e7090 R08: 0000000000000000 R09: 0000000000000000 [ 1282.415430][T27516] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1282.423254][T27516] R13: 0000000000000000 R14: 00007fe8ebd25fa0 R15: 00007fffe9264168 [ 1282.648875][ T24] audit: type=1400 audit(1732157598.110:168): avc: denied { create } for pid=27530 comm="syz.4.8981" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 1283.004731][T27540] device sit0 left promiscuous mode [ 1283.016572][T27548] device sit0 entered promiscuous mode [ 1283.406686][T27555] device pim6reg1 entered promiscuous mode [ 1283.554831][T27566] bridge0: port 2(bridge_slave_1) entered disabled state [ 1283.565937][T27566] bridge0: port 1(bridge_slave_0) entered disabled state [ 1284.246582][T27605] tap0: tun_chr_ioctl cmd 1074025673 [ 1284.371990][T27616] syz.0.9007[27616] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1284.372043][T27616] syz.0.9007[27616] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1284.598705][T10153] device veth1_macvtap left promiscuous mode [ 1284.777150][T27625] FAULT_INJECTION: forcing a failure. [ 1284.777150][T27625] name failslab, interval 1, probability 0, space 0, times 0 [ 1284.836673][T27625] CPU: 0 PID: 27625 Comm: syz.0.9010 Tainted: G W 5.10.226-syzkaller-00001-g6a01908517df #0 [ 1284.847891][T27625] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 1284.857757][T27625] Call Trace: [ 1284.860901][T27625] dump_stack_lvl+0x1e2/0x24b [ 1284.865403][T27625] ? panic+0x812/0x812 [ 1284.869300][T27625] ? sched_clock+0x3a/0x40 [ 1284.873558][T27625] ? bfq_pos_tree_add_move+0x43b/0x43b [ 1284.878849][T27625] ? sched_clock+0x3a/0x40 [ 1284.883102][T27625] dump_stack+0x15/0x17 [ 1284.887091][T27625] should_fail+0x3c6/0x510 [ 1284.891351][T27625] ? security_inode_alloc+0x29/0x120 [ 1284.896469][T27625] __should_failslab+0xa4/0xe0 [ 1284.901066][T27625] should_failslab+0x9/0x20 [ 1284.905411][T27625] kmem_cache_alloc+0x3d/0x2e0 [ 1284.910008][T27625] security_inode_alloc+0x29/0x120 [ 1284.914954][T27625] inode_init_always+0x767/0x9f0 [ 1284.919726][T27625] ? sockfs_init_fs_context+0xb0/0xb0 [ 1284.924934][T27625] new_inode_pseudo+0x93/0x220 [ 1284.929544][T27625] __sock_create+0x135/0x760 [ 1284.933970][T27625] ? get_unused_fd_flags+0x94/0xa0 [ 1284.939032][T27625] __sys_socketpair+0x29f/0x6e0 [ 1284.943734][T27625] ? __ia32_sys_socket+0x90/0x90 [ 1284.948493][T27625] ? switch_fpu_return+0x1e4/0x3c0 [ 1284.953422][T27625] ? fpu__clear_all+0x20/0x20 [ 1284.958058][T27625] __x64_sys_socketpair+0x9b/0xb0 [ 1284.963518][T27625] do_syscall_64+0x34/0x70 [ 1284.967770][T27625] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 1284.973578][T27625] RIP: 0033:0x7f2524e6f819 [ 1284.977953][T27625] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 1284.997630][T27625] RSP: 002b:00007f25234e8038 EFLAGS: 00000246 ORIG_RAX: 0000000000000035 [ 1285.005954][T27625] RAX: ffffffffffffffda RBX: 00007f2525026fa0 RCX: 00007f2524e6f819 [ 1285.013758][T27625] RDX: 0000000000000000 RSI: 0000000000000001 RDI: 000000000000001e [ 1285.021570][T27625] RBP: 00007f25234e8090 R08: 0000000000000000 R09: 0000000000000000 [ 1285.029563][T27625] R10: 0000000020000040 R11: 0000000000000246 R12: 0000000000000001 [ 1285.037370][T27625] R13: 0000000000000000 R14: 00007f2525026fa0 R15: 00007fffba1b7028 [ 1285.257199][T27625] socket: no more sockets [ 1285.647410][T27645] device pim6reg1 entered promiscuous mode [ 1287.218093][T27684] FAULT_INJECTION: forcing a failure. [ 1287.218093][T27684] name failslab, interval 1, probability 0, space 0, times 0 [ 1287.308231][T27684] CPU: 1 PID: 27684 Comm: syz.1.9030 Tainted: G W 5.10.226-syzkaller-00001-g6a01908517df #0 [ 1287.319427][T27684] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 1287.329315][T27684] Call Trace: [ 1287.332441][T27684] dump_stack_lvl+0x1e2/0x24b [ 1287.336945][T27684] ? panic+0x812/0x812 [ 1287.340851][T27684] ? bfq_pos_tree_add_move+0x43b/0x43b [ 1287.346147][T27684] ? selinux_kernfs_init_security+0x14a/0x720 [ 1287.352049][T27684] dump_stack+0x15/0x17 [ 1287.356050][T27684] should_fail+0x3c6/0x510 [ 1287.360302][T27684] ? __kernfs_new_node+0x99/0x700 [ 1287.365157][T27684] __should_failslab+0xa4/0xe0 [ 1287.369760][T27684] should_failslab+0x9/0x20 [ 1287.374093][T27684] __kmalloc_track_caller+0x5f/0x320 [ 1287.379215][T27684] kstrdup_const+0x55/0x90 [ 1287.383545][T27684] __kernfs_new_node+0x99/0x700 [ 1287.388289][T27684] ? __kasan_check_write+0x14/0x20 [ 1287.393257][T27684] ? down_write+0xd7/0x150 [ 1287.397486][T27684] ? kernfs_new_node+0x230/0x230 [ 1287.402505][T27684] ? __kasan_check_write+0x14/0x20 [ 1287.407445][T27684] ? up_write+0x59/0x120 [ 1287.411635][T27684] ? kernfs_activate+0x356/0x370 [ 1287.416411][T27684] kernfs_new_node+0x130/0x230 [ 1287.421007][T27684] kernfs_create_link+0xba/0x210 [ 1287.425799][T27684] sysfs_do_create_link_sd+0x89/0x110 [ 1287.430997][T27684] sysfs_create_link+0x68/0x80 [ 1287.435601][T27684] device_add_class_symlinks+0x222/0x2a0 [ 1287.441060][T27684] device_add+0x4b7/0xbc0 [ 1287.445226][T27684] netdev_register_kobject+0x177/0x320 [ 1287.450519][T27684] ? raw_notifier_call_chain+0xdf/0xf0 [ 1287.455811][T27684] register_netdevice+0xe9b/0x13f0 [ 1287.460758][T27684] ? sysvec_apic_timer_interrupt+0xcb/0xe0 [ 1287.466411][T27684] ? netif_stacked_transfer_operstate+0x240/0x240 [ 1287.472647][T27684] ? kasan_check_range+0x82/0x2a0 [ 1287.477507][T27684] ppp_dev_configure+0x825/0xaf0 [ 1287.482281][T27684] ppp_ioctl+0x6e5/0x1810 [ 1287.486467][T27684] ? clockevents_program_event+0x214/0x2c0 [ 1287.492101][T27684] ? ppp_poll+0x250/0x250 [ 1287.496318][T27684] ? __fget_files+0x31e/0x380 [ 1287.500781][T27684] ? security_file_ioctl+0x84/0xb0 [ 1287.505729][T27684] ? ppp_poll+0x250/0x250 [ 1287.509887][T27684] __se_sys_ioctl+0x114/0x190 [ 1287.514403][T27684] __x64_sys_ioctl+0x7b/0x90 [ 1287.518861][T27684] do_syscall_64+0x34/0x70 [ 1287.523077][T27684] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 1287.528815][T27684] RIP: 0033:0x7fe8ebb6e819 [ 1287.533067][T27684] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 1287.552499][T27684] RSP: 002b:00007fe8ea1e7038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1287.560749][T27684] RAX: ffffffffffffffda RBX: 00007fe8ebd25fa0 RCX: 00007fe8ebb6e819 [ 1287.568553][T27684] RDX: 0000000020001400 RSI: 00000000c004743e RDI: 0000000000000006 [ 1287.576363][T27684] RBP: 00007fe8ea1e7090 R08: 0000000000000000 R09: 0000000000000000 [ 1287.584172][T27684] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1287.591984][T27684] R13: 0000000000000000 R14: 00007fe8ebd25fa0 R15: 00007fffe9264168 [ 1288.772080][T27712] device syzkaller0 entered promiscuous mode [ 1288.901782][T27720] device pim6reg1 entered promiscuous mode [ 1290.115054][T27745] device syzkaller0 entered promiscuous mode [ 1290.139194][T27751] FAULT_INJECTION: forcing a failure. [ 1290.139194][T27751] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1290.177179][T27751] CPU: 0 PID: 27751 Comm: syz.4.9051 Tainted: G W 5.10.226-syzkaller-00001-g6a01908517df #0 [ 1290.188365][T27751] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 1290.198399][T27751] Call Trace: [ 1290.201530][T27751] dump_stack_lvl+0x1e2/0x24b [ 1290.206039][T27751] ? bfq_pos_tree_add_move+0x43b/0x43b [ 1290.211333][T27751] dump_stack+0x15/0x17 [ 1290.215324][T27751] should_fail+0x3c6/0x510 [ 1290.219575][T27751] should_fail_usercopy+0x1a/0x20 [ 1290.224435][T27751] _copy_from_user+0x20/0xd0 [ 1290.228864][T27751] btf_new_fd+0x334/0x9c0 [ 1290.233029][T27751] __se_sys_bpf+0x1aed/0x11cb0 [ 1290.237631][T27751] ? stack_trace_save+0x113/0x1c0 [ 1290.242491][T27751] ? terminate_walk+0x407/0x4f0 [ 1290.247174][T27751] ? stack_trace_snprint+0xf0/0xf0 [ 1290.252127][T27751] ? kmem_cache_free+0xa9/0x1e0 [ 1290.256850][T27751] ? kmem_cache_free+0xa9/0x1e0 [ 1290.261504][T27751] ? kasan_set_track+0x5d/0x70 [ 1290.266096][T27751] ? __x64_sys_bpf+0x90/0x90 [ 1290.270526][T27751] ? __kasan_slab_free+0x11/0x20 [ 1290.275713][T27751] ? slab_free_freelist_hook+0xc0/0x190 [ 1290.281103][T27751] ? kmem_cache_free+0xa9/0x1e0 [ 1290.285771][T27751] ? putname+0xe7/0x140 [ 1290.289761][T27751] ? do_sys_openat2+0x1fc/0x710 [ 1290.294456][T27751] ? __x64_sys_openat+0x243/0x290 [ 1290.299307][T27751] ? do_syscall_64+0x34/0x70 [ 1290.303739][T27751] ? _kstrtoull+0x3a0/0x4a0 [ 1290.308115][T27751] ? kstrtouint_from_user+0x20a/0x2a0 [ 1290.313292][T27751] ? kstrtol_from_user+0x310/0x310 [ 1290.318229][T27751] ? memset+0x35/0x40 [ 1290.322044][T27751] ? __fsnotify_parent+0x4b9/0x6c0 [ 1290.327775][T27751] ? fsnotify_set_children_dentry_flags+0x210/0x210 [ 1290.334193][T27751] ? proc_fail_nth_write+0x20b/0x290 [ 1290.339317][T27751] ? proc_fail_nth_read+0x210/0x210 [ 1290.344353][T27751] ? security_file_permission+0x86/0xb0 [ 1290.349735][T27751] ? rw_verify_area+0x1c3/0x360 [ 1290.354531][T27751] ? preempt_count_add+0x92/0x1a0 [ 1290.359368][T27751] ? vfs_write+0x852/0xe70 [ 1290.363613][T27751] ? putname+0xe7/0x140 [ 1290.367607][T27751] ? __traceiter_kmem_cache_free+0x2e/0x50 [ 1290.373249][T27751] ? kmem_cache_free+0x1c0/0x1e0 [ 1290.378023][T27751] ? kernel_write+0x3d0/0x3d0 [ 1290.382534][T27751] ? __kasan_check_write+0x14/0x20 [ 1290.387483][T27751] ? mutex_lock+0xa5/0x110 [ 1290.391734][T27751] ? mutex_trylock+0xa0/0xa0 [ 1290.396162][T27751] ? __kasan_check_write+0x14/0x20 [ 1290.401108][T27751] ? fput_many+0x160/0x1b0 [ 1290.405368][T27751] ? debug_smp_processor_id+0x17/0x20 [ 1290.410568][T27751] __x64_sys_bpf+0x7b/0x90 [ 1290.414821][T27751] do_syscall_64+0x34/0x70 [ 1290.419076][T27751] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 1290.424800][T27751] RIP: 0033:0x7f018b9cd819 [ 1290.429060][T27751] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 1290.448587][T27751] RSP: 002b:00007f018a046038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 1290.457241][T27751] RAX: ffffffffffffffda RBX: 00007f018bb84fa0 RCX: 00007f018b9cd819 [ 1290.465048][T27751] RDX: 0000000000000020 RSI: 0000000020000080 RDI: 0000000000000012 [ 1290.472863][T27751] RBP: 00007f018a046090 R08: 0000000000000000 R09: 0000000000000000 [ 1290.480691][T27751] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1290.489529][T27751] R13: 0000000000000000 R14: 00007f018bb84fa0 R15: 00007ffde4fb0e08 [ 1295.510246][T27859] device wg2 entered promiscuous mode [ 1297.227856][T27900] bridge0: port 1(bridge_slave_0) entered blocking state [ 1297.234711][T27900] bridge0: port 1(bridge_slave_0) entered disabled state [ 1297.241951][T27900] device bridge_slave_0 entered promiscuous mode [ 1297.248734][T27900] bridge0: port 2(bridge_slave_1) entered blocking state [ 1297.255558][T27900] bridge0: port 2(bridge_slave_1) entered disabled state [ 1297.262872][T27900] device bridge_slave_1 entered promiscuous mode [ 1297.349247][T27900] bridge0: port 2(bridge_slave_1) entered blocking state [ 1297.356100][T27900] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1297.363227][T27900] bridge0: port 1(bridge_slave_0) entered blocking state [ 1297.369997][T27900] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1297.407063][T10153] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1297.523991][T10153] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1297.703966][T10153] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1297.789324][T10153] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1297.809033][T10153] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1297.821517][T27921] FAULT_INJECTION: forcing a failure. [ 1297.821517][T27921] name failslab, interval 1, probability 0, space 0, times 0 [ 1297.840745][T27921] CPU: 0 PID: 27921 Comm: syz.1.9107 Tainted: G W 5.10.226-syzkaller-00001-g6a01908517df #0 [ 1297.851956][T27921] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 1297.861882][T27921] Call Trace: [ 1297.864976][T27921] dump_stack_lvl+0x1e2/0x24b [ 1297.869485][T27921] ? bfq_pos_tree_add_move+0x43b/0x43b [ 1297.874786][T27921] dump_stack+0x15/0x17 [ 1297.878771][T27921] should_fail+0x3c6/0x510 [ 1297.883028][T27921] ? dev_map_alloc+0x66/0x540 [ 1297.887581][T27921] __should_failslab+0xa4/0xe0 [ 1297.892147][T27921] should_failslab+0x9/0x20 [ 1297.896491][T27921] kmem_cache_alloc_trace+0x3a/0x2e0 [ 1297.901602][T27921] dev_map_alloc+0x66/0x540 [ 1297.905948][T27921] __se_sys_bpf+0x620f/0x11cb0 [ 1297.910539][T27921] ? stack_trace_save+0x113/0x1c0 [ 1297.915400][T27921] ? terminate_walk+0x407/0x4f0 [ 1297.920089][T27921] ? stack_trace_snprint+0xf0/0xf0 [ 1297.925032][T27921] ? kmem_cache_free+0xa9/0x1e0 [ 1297.929822][T27921] ? kmem_cache_free+0xa9/0x1e0 [ 1297.934505][T27921] ? kasan_set_track+0x5d/0x70 [ 1297.939106][T27921] ? __x64_sys_bpf+0x90/0x90 [ 1297.943530][T27921] ? __kasan_slab_free+0x11/0x20 [ 1297.948301][T27921] ? slab_free_freelist_hook+0xc0/0x190 [ 1297.953684][T27921] ? kmem_cache_free+0xa9/0x1e0 [ 1297.958370][T27921] ? putname+0xe7/0x140 [ 1297.962360][T27921] ? do_sys_openat2+0x1fc/0x710 [ 1297.967046][T27921] ? __x64_sys_openat+0x243/0x290 [ 1297.971908][T27921] ? do_syscall_64+0x34/0x70 [ 1297.976342][T27921] ? _kstrtoull+0x3a0/0x4a0 [ 1297.980867][T27921] ? kstrtouint_from_user+0x20a/0x2a0 [ 1297.986254][T27921] ? kstrtol_from_user+0x310/0x310 [ 1297.991287][T27921] ? memset+0x35/0x40 [ 1297.995113][T27921] ? __fsnotify_parent+0x4b9/0x6c0 [ 1298.000052][T27921] ? fsnotify_set_children_dentry_flags+0x210/0x210 [ 1298.006469][T27921] ? proc_fail_nth_write+0x20b/0x290 [ 1298.011590][T27921] ? proc_fail_nth_read+0x210/0x210 [ 1298.016621][T27921] ? security_file_permission+0x86/0xb0 [ 1298.022004][T27921] ? rw_verify_area+0x1c3/0x360 [ 1298.026775][T27921] ? preempt_count_add+0x92/0x1a0 [ 1298.031638][T27921] ? vfs_write+0x852/0xe70 [ 1298.035896][T27921] ? putname+0xe7/0x140 [ 1298.039898][T27921] ? __traceiter_kmem_cache_free+0x2e/0x50 [ 1298.045538][T27921] ? kmem_cache_free+0x1c0/0x1e0 [ 1298.050301][T27921] ? kernel_write+0x3d0/0x3d0 [ 1298.054813][T27921] ? __kasan_check_write+0x14/0x20 [ 1298.059760][T27921] ? mutex_lock+0xa5/0x110 [ 1298.064011][T27921] ? mutex_trylock+0xa0/0xa0 [ 1298.068450][T27921] ? __kasan_check_write+0x14/0x20 [ 1298.073378][T27921] ? fput_many+0x160/0x1b0 [ 1298.077642][T27921] ? debug_smp_processor_id+0x17/0x20 [ 1298.082841][T27921] __x64_sys_bpf+0x7b/0x90 [ 1298.087094][T27921] do_syscall_64+0x34/0x70 [ 1298.091347][T27921] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 1298.097076][T27921] RIP: 0033:0x7fe8ebb6e819 [ 1298.101332][T27921] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 1298.120768][T27921] RSP: 002b:00007fe8ea1e7038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 1298.129010][T27921] RAX: ffffffffffffffda RBX: 00007fe8ebd25fa0 RCX: 00007fe8ebb6e819 [ 1298.136825][T27921] RDX: 0000000000000048 RSI: 0000000020000580 RDI: 0600000000000000 [ 1298.146717][T27921] RBP: 00007fe8ea1e7090 R08: 0000000000000000 R09: 0000000000000000 [ 1298.154492][T27921] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1298.162395][T27921] R13: 0000000000000001 R14: 00007fe8ebd25fa0 R15: 00007fffe9264168 [ 1298.180517][T10153] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 1298.199679][T10153] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 1298.239828][T27900] device veth0_vlan entered promiscuous mode [ 1298.246562][T10153] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 1298.259682][T10153] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1298.291225][T10153] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1298.299315][T10153] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1298.332348][T10153] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 1298.358265][T10153] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 1298.382926][T27900] device veth1_macvtap entered promiscuous mode [ 1298.512468][T27939] device syzkaller0 entered promiscuous mode [ 1298.549288][T10153] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 1298.571602][T10153] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 1298.611156][T10153] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 1298.647348][T10153] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 1298.672051][T10153] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 1299.434287][T27970] bridge0: port 2(bridge_slave_1) entered disabled state [ 1299.446543][T27970] bridge0: port 1(bridge_slave_0) entered disabled state [ 1299.643147][T27977] device syzkaller0 entered promiscuous mode [ 1301.364000][T28033] device syzkaller0 entered promiscuous mode [ 1301.581234][T28053] device macsec0 entered promiscuous mode [ 1301.810486][T28048] device pim6reg1 entered promiscuous mode [ 1302.347546][T28074] FAULT_INJECTION: forcing a failure. [ 1302.347546][T28074] name failslab, interval 1, probability 0, space 0, times 0 [ 1302.388569][T28074] CPU: 0 PID: 28074 Comm: syz.3.9161 Tainted: G W 5.10.226-syzkaller-00001-g6a01908517df #0 [ 1302.399763][T28074] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 1302.409793][T28074] Call Trace: [ 1302.412925][T28074] dump_stack_lvl+0x1e2/0x24b [ 1302.417821][T28074] ? panic+0x812/0x812 [ 1302.421684][T28074] ? bfq_pos_tree_add_move+0x43b/0x43b [ 1302.427266][T28074] dump_stack+0x15/0x17 [ 1302.431314][T28074] should_fail+0x3c6/0x510 [ 1302.435510][T28074] ? seq_open+0x61/0x130 [ 1302.439981][T28074] __should_failslab+0xa4/0xe0 [ 1302.444833][T28074] should_failslab+0x9/0x20 [ 1302.449156][T28074] kmem_cache_alloc+0x3d/0x2e0 [ 1302.454016][T28074] seq_open+0x61/0x130 [ 1302.457911][T28074] kernfs_fop_open+0x50b/0xab0 [ 1302.462510][T28074] ? kernfs_fop_mmap+0x3c0/0x3c0 [ 1302.467286][T28074] do_dentry_open+0x7c1/0x10d0 [ 1302.471880][T28074] vfs_open+0x73/0x80 [ 1302.475697][T28074] path_openat+0x2660/0x3000 [ 1302.480128][T28074] ? kmem_cache_alloc+0x168/0x2e0 [ 1302.484986][T28074] ? do_syscall_64+0x34/0x70 [ 1302.489413][T28074] ? entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 1302.495344][T28074] ? do_filp_open+0x460/0x460 [ 1302.500213][T28074] do_filp_open+0x21c/0x460 [ 1302.504525][T28074] ? vfs_tmpfile+0x2b0/0x2b0 [ 1302.508975][T28074] ? get_unused_fd_flags+0x94/0xa0 [ 1302.513913][T28074] do_sys_openat2+0x13f/0x710 [ 1302.518843][T28074] ? mutex_trylock+0xa0/0xa0 [ 1302.523273][T28074] ? do_sys_open+0x220/0x220 [ 1302.527709][T28074] ? __kasan_check_write+0x14/0x20 [ 1302.533075][T28074] ? ksys_write+0x260/0x2c0 [ 1302.537412][T28074] __x64_sys_openat+0x243/0x290 [ 1302.542097][T28074] ? __ia32_sys_open+0x270/0x270 [ 1302.546875][T28074] ? debug_smp_processor_id+0x17/0x20 [ 1302.552082][T28074] do_syscall_64+0x34/0x70 [ 1302.556334][T28074] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 1302.562151][T28074] RIP: 0033:0x7fd747287819 [ 1302.566401][T28074] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 1302.585842][T28074] RSP: 002b:00007fd745900038 EFLAGS: 00000246 ORIG_RAX: 0000000000000101 [ 1302.594077][T28074] RAX: ffffffffffffffda RBX: 00007fd74743efa0 RCX: 00007fd747287819 [ 1302.601885][T28074] RDX: 0000000000000201 RSI: 0000000020003000 RDI: 0000000000000003 [ 1302.609702][T28074] RBP: 00007fd745900090 R08: 0000000000000000 R09: 0000000000000000 [ 1302.617595][T28074] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1302.625494][T28074] R13: 0000000000000000 R14: 00007fd74743efa0 R15: 00007ffc9e3076c8 [ 1304.468588][T28167] device syzkaller0 entered promiscuous mode [ 1305.539300][T28202] device syzkaller0 entered promiscuous mode [ 1305.772579][T28209] syz.4.9206[28209] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1305.780089][T28209] syz.4.9206[28209] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1306.007770][T28224] device veth0_vlan left promiscuous mode [ 1306.066774][T28232] FAULT_INJECTION: forcing a failure. [ 1306.066774][T28232] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1306.079962][T28224] device veth0_vlan entered promiscuous mode [ 1306.081182][T28232] CPU: 0 PID: 28232 Comm: syz.0.9214 Tainted: G W 5.10.226-syzkaller-00001-g6a01908517df #0 [ 1306.098132][T28232] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 1306.109489][T28232] Call Trace: [ 1306.112706][T28232] dump_stack_lvl+0x1e2/0x24b [ 1306.117387][T28232] ? bfq_pos_tree_add_move+0x43b/0x43b [ 1306.123113][T28232] dump_stack+0x15/0x17 [ 1306.127864][T28232] should_fail+0x3c6/0x510 [ 1306.132285][T28232] should_fail_alloc_page+0x52/0x60 [ 1306.137574][T28232] __alloc_pages_nodemask+0x1b3/0xaf0 [ 1306.142868][T28232] ? do_syscall_64+0x34/0x70 [ 1306.147291][T28232] ? entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 1306.153391][T28232] ? gfp_pfmemalloc_allowed+0x120/0x120 [ 1306.158765][T28232] ? avc_has_perm_noaudit+0x117/0x240 [ 1306.163971][T28232] shmem_alloc_page+0x257/0x420 [ 1306.168652][T28232] ? put_page+0xd0/0xd0 [ 1306.172645][T28232] ? slab_post_alloc_hook+0x61/0x2f0 [ 1306.177788][T28232] ? percpu_counter_add_batch+0x13d/0x160 [ 1306.183436][T28232] shmem_alloc_and_acct_page+0x395/0x8e0 [ 1306.189073][T28232] ? shmem_swapin_page+0x1950/0x1950 [ 1306.194192][T28232] ? find_get_entry+0x44c/0x4c0 [ 1306.198861][T28232] ? page_cache_prev_miss+0x410/0x410 [ 1306.204157][T28232] ? down_read_trylock+0x179/0x1d0 [ 1306.209181][T28232] ? find_lock_entry+0x1df/0x200 [ 1306.213956][T28232] shmem_getpage_gfp+0x891/0x2480 [ 1306.218814][T28232] ? __kasan_check_write+0x14/0x20 [ 1306.223778][T28232] ? shmem_getpage+0xa0/0xa0 [ 1306.228315][T28232] ? iov_iter_fault_in_readable+0x31f/0x4f0 [ 1306.234639][T28232] shmem_write_begin+0xca/0x1b0 [ 1306.239319][T28232] generic_perform_write+0x2cd/0x570 [ 1306.244443][T28232] ? grab_cache_page_write_begin+0xa0/0xa0 [ 1306.250196][T28232] ? file_remove_privs+0x570/0x570 [ 1306.255132][T28232] ? __kasan_check_write+0x14/0x20 [ 1306.260166][T28232] __generic_file_write_iter+0x23c/0x560 [ 1306.265636][T28232] ? generic_write_checks+0x3b9/0x470 [ 1306.270840][T28232] generic_file_write_iter+0xaf/0x1c0 [ 1306.276044][T28232] vfs_write+0xb4c/0xe70 [ 1306.280130][T28232] ? kernel_write+0x3d0/0x3d0 [ 1306.284646][T28232] ? mutex_trylock+0xa0/0xa0 [ 1306.289066][T28232] ? __fdget_pos+0x2e7/0x3a0 [ 1306.293497][T28232] ? ksys_write+0x77/0x2c0 [ 1306.297754][T28232] ksys_write+0x199/0x2c0 [ 1306.301921][T28232] ? __ia32_sys_read+0x90/0x90 [ 1306.307774][T28232] ? debug_smp_processor_id+0x17/0x20 [ 1306.312951][T28232] __x64_sys_write+0x7b/0x90 [ 1306.317587][T28232] do_syscall_64+0x34/0x70 [ 1306.321836][T28232] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 1306.327560][T28232] RIP: 0033:0x7f2524e6f819 [ 1306.332084][T28232] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 1306.351869][T28232] RSP: 002b:00007f25234e8038 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 1306.360115][T28232] RAX: ffffffffffffffda RBX: 00007f2525026fa0 RCX: 00007f2524e6f819 [ 1306.367920][T28232] RDX: 0000000000040010 RSI: 0000000020000180 RDI: 0000000000000007 [ 1306.375797][T28232] RBP: 00007f25234e8090 R08: 0000000000000000 R09: 0000000000000000 [ 1306.383545][T28232] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1306.391353][T28232] R13: 0000000000000000 R14: 00007f2525026fa0 R15: 00007fffba1b7028 [ 1306.492545][T28236] syz.0.9216[28236] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1306.492601][T28236] syz.0.9216[28236] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1307.839166][T28262] FAULT_INJECTION: forcing a failure. [ 1307.839166][T28262] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1308.052308][T28262] CPU: 0 PID: 28262 Comm: syz.3.9223 Tainted: G W 5.10.226-syzkaller-00001-g6a01908517df #0 [ 1308.063505][T28262] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 1308.073398][T28262] Call Trace: [ 1308.076532][T28262] dump_stack_lvl+0x1e2/0x24b [ 1308.081039][T28262] ? bfq_pos_tree_add_move+0x43b/0x43b [ 1308.086351][T28262] dump_stack+0x15/0x17 [ 1308.090524][T28262] should_fail+0x3c6/0x510 [ 1308.094948][T28262] should_fail_usercopy+0x1a/0x20 [ 1308.099889][T28262] _copy_to_user+0x20/0x90 [ 1308.104370][T28262] simple_read_from_buffer+0xc7/0x150 [ 1308.109573][T28262] proc_fail_nth_read+0x1a3/0x210 [ 1308.114974][T28262] ? proc_fault_inject_write+0x390/0x390 [ 1308.120432][T28262] ? security_file_permission+0x86/0xb0 [ 1308.125989][T28262] ? rw_verify_area+0x1c3/0x360 [ 1308.131216][T28262] ? proc_fault_inject_write+0x390/0x390 [ 1308.138753][T28262] vfs_read+0x200/0xba0 [ 1308.143077][T28262] ? kernel_read+0x70/0x70 [ 1308.147603][T28262] ? __kasan_check_write+0x14/0x20 [ 1308.152540][T28262] ? mutex_lock+0xa5/0x110 [ 1308.156799][T28262] ? mutex_trylock+0xa0/0xa0 [ 1308.161221][T28262] ? __fdget_pos+0x2e7/0x3a0 [ 1308.165640][T28262] ? ksys_read+0x77/0x2c0 [ 1308.169811][T28262] ksys_read+0x199/0x2c0 [ 1308.174144][T28262] ? vfs_write+0xe70/0xe70 [ 1308.178409][T28262] ? debug_smp_processor_id+0x17/0x20 [ 1308.183602][T28262] __x64_sys_read+0x7b/0x90 [ 1308.187946][T28262] do_syscall_64+0x34/0x70 [ 1308.192198][T28262] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 1308.197925][T28262] RIP: 0033:0x7fd74728625c [ 1308.202177][T28262] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 69 8e 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 bf 8e 02 00 48 [ 1308.221618][T28262] RSP: 002b:00007fd745900030 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 1308.229862][T28262] RAX: ffffffffffffffda RBX: 00007fd74743efa0 RCX: 00007fd74728625c [ 1308.237770][T28262] RDX: 000000000000000f RSI: 00007fd7459000a0 RDI: 0000000000000008 [ 1308.245580][T28262] RBP: 00007fd745900090 R08: 0000000000000000 R09: 0000000000000000 [ 1308.253386][T28262] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1308.261195][T28262] R13: 0000000000000000 R14: 00007fd74743efa0 R15: 00007ffc9e3076c8 [ 1309.232808][T28283] device veth0_vlan left promiscuous mode [ 1309.357179][T28283] device veth0_vlan entered promiscuous mode [ 1309.364783][ T314] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1309.396932][ T314] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1309.468063][ T314] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1309.755822][T28307] device pim6reg1 entered promiscuous mode [ 1310.502215][T28317] device syzkaller0 entered promiscuous mode [ 1312.222010][T28361] device syzkaller0 entered promiscuous mode [ 1313.017661][T28394] device wg0 entered promiscuous mode [ 1313.613493][T28412] device veth1_macvtap left promiscuous mode [ 1313.926148][T28428] device pim6reg1 entered promiscuous mode [ 1315.811763][T28460] bridge0: port 2(bridge_slave_1) entered disabled state [ 1315.818862][T28460] bridge0: port 1(bridge_slave_0) entered disabled state [ 1315.845233][T28460] device bridge_slave_1 left promiscuous mode [ 1315.853615][T28460] bridge0: port 2(bridge_slave_1) entered disabled state [ 1315.861575][T28460] device bridge_slave_0 left promiscuous mode [ 1315.869837][T28460] bridge0: port 1(bridge_slave_0) entered disabled state [ 1317.018745][T28506] syz.2.9299[28506] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1317.018795][T28506] syz.2.9299[28506] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1317.077182][T28508] syz.2.9299[28508] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1317.089044][T28508] syz.2.9299[28508] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1318.160432][T28536] device pim6reg1 entered promiscuous mode [ 1321.121273][T28592] device wg2 entered promiscuous mode [ 1324.135418][T28636] syz.0.9341[28636] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1324.135474][T28636] syz.0.9341[28636] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1324.387832][ T24] audit: type=1400 audit(1732157639.850:169): avc: denied { create } for pid=28635 comm="syz.0.9341" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=iucv_socket permissive=1 [ 1324.867085][T28645] device pim6reg1 entered promiscuous mode [ 1326.713423][T28687] device pim6reg1 entered promiscuous mode [ 1329.930433][T28754] device pim6reg1 entered promiscuous mode [ 1330.750039][T28769] device syzkaller0 entered promiscuous mode [ 1333.617484][T28821] syz.3.9398[28821] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1333.617542][T28821] syz.3.9398[28821] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1336.446746][T28867] syz.3.9411[28867] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1336.458348][T28867] syz.3.9411[28867] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1339.131155][T28904] syz.4.9424[28904] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1339.298515][T28904] syz.4.9424[28904] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1340.436895][T28926] device syzkaller0 entered promiscuous mode [ 1340.574910][T28936] device syzkaller0 entered promiscuous mode [ 1342.003604][T28961] device syzkaller0 entered promiscuous mode [ 1342.229305][T28969] syzkaller0: default qdisc (pfifo_fast) fail, fallback to noqueue [ 1342.241455][T28969] device syzkaller0 entered promiscuous mode [ 1342.321164][T28970] device pim6reg1 entered promiscuous mode [ 1342.698447][T28980] bridge0: port 2(bridge_slave_1) entered disabled state [ 1342.728638][T28981] device pim6reg1 entered promiscuous mode [ 1344.147269][T29016] device pim6reg1 entered promiscuous mode [ 1345.586916][T29084] device syzkaller0 entered promiscuous mode [ 1350.360517][T29203] syz.2.9528[29203] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1350.360569][T29203] syz.2.9528[29203] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1352.924905][T29251] FAULT_INJECTION: forcing a failure. [ 1352.924905][T29251] name failslab, interval 1, probability 0, space 0, times 0 [ 1353.048182][T29251] CPU: 0 PID: 29251 Comm: syz.0.9543 Tainted: G W 5.10.226-syzkaller-00001-g6a01908517df #0 [ 1353.059364][T29251] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 1353.069262][T29251] Call Trace: [ 1353.072386][T29251] dump_stack_lvl+0x1e2/0x24b [ 1353.077003][T29251] ? bfq_pos_tree_add_move+0x43b/0x43b [ 1353.082488][T29251] ? __get_vm_area_node+0x116/0x470 [ 1353.087453][T29251] ? ____kasan_kmalloc+0xed/0x110 [ 1353.092434][T29251] dump_stack+0x15/0x17 [ 1353.096502][T29251] should_fail+0x3c6/0x510 [ 1353.100768][T29251] ? alloc_vmap_area+0x16f/0x1a90 [ 1353.105699][T29251] __should_failslab+0xa4/0xe0 [ 1353.110467][T29251] should_failslab+0x9/0x20 [ 1353.114795][T29251] kmem_cache_alloc+0x3d/0x2e0 [ 1353.119388][T29251] alloc_vmap_area+0x16f/0x1a90 [ 1353.124162][T29251] ? vm_map_ram+0x9d0/0x9d0 [ 1353.128508][T29251] ? __kasan_kmalloc+0x9/0x10 [ 1353.133008][T29251] ? kmem_cache_alloc_trace+0x18a/0x2e0 [ 1353.138390][T29251] ? __get_vm_area_node+0x116/0x470 [ 1353.143509][T29251] __get_vm_area_node+0x156/0x470 [ 1353.148370][T29251] __vmalloc_node_range+0xdc/0x7c0 [ 1353.153314][T29251] ? dev_map_alloc+0x253/0x540 [ 1353.157918][T29251] bpf_map_area_alloc+0xd9/0xf0 [ 1353.162600][T29251] ? dev_map_alloc+0x253/0x540 [ 1353.167209][T29251] dev_map_alloc+0x253/0x540 [ 1353.171975][T29251] __se_sys_bpf+0x620f/0x11cb0 [ 1353.176584][T29251] ? stack_trace_save+0x113/0x1c0 [ 1353.181433][T29251] ? terminate_walk+0x407/0x4f0 [ 1353.186135][T29251] ? stack_trace_snprint+0xf0/0xf0 [ 1353.191075][T29251] ? kmem_cache_free+0xa9/0x1e0 [ 1353.195857][T29251] ? kmem_cache_free+0xa9/0x1e0 [ 1353.200538][T29251] ? kasan_set_track+0x5d/0x70 [ 1353.205248][T29251] ? __x64_sys_bpf+0x90/0x90 [ 1353.209667][T29251] ? __kasan_slab_free+0x11/0x20 [ 1353.214526][T29251] ? slab_free_freelist_hook+0xc0/0x190 [ 1353.219908][T29251] ? kmem_cache_free+0xa9/0x1e0 [ 1353.224593][T29251] ? putname+0xe7/0x140 [ 1353.228585][T29251] ? do_sys_openat2+0x1fc/0x710 [ 1353.233272][T29251] ? __x64_sys_openat+0x243/0x290 [ 1353.238136][T29251] ? do_syscall_64+0x34/0x70 [ 1353.242650][T29251] ? _kstrtoull+0x3a0/0x4a0 [ 1353.246993][T29251] ? kstrtouint_from_user+0x20a/0x2a0 [ 1353.252199][T29251] ? kstrtol_from_user+0x310/0x310 [ 1353.257147][T29251] ? memset+0x35/0x40 [ 1353.260979][T29251] ? __fsnotify_parent+0x4b9/0x6c0 [ 1353.265912][T29251] ? fsnotify_set_children_dentry_flags+0x210/0x210 [ 1353.272937][T29251] ? proc_fail_nth_write+0x20b/0x290 [ 1353.278060][T29251] ? proc_fail_nth_read+0x210/0x210 [ 1353.283098][T29251] ? security_file_permission+0x86/0xb0 [ 1353.288482][T29251] ? rw_verify_area+0x1c3/0x360 [ 1353.293160][T29251] ? preempt_count_add+0x92/0x1a0 [ 1353.298021][T29251] ? vfs_write+0x852/0xe70 [ 1353.302285][T29251] ? kmem_cache_free+0xa9/0x1e0 [ 1353.306969][T29251] ? kernel_write+0x3d0/0x3d0 [ 1353.311478][T29251] ? __kasan_check_write+0x14/0x20 [ 1353.316423][T29251] ? mutex_lock+0xa5/0x110 [ 1353.320678][T29251] ? mutex_trylock+0xa0/0xa0 [ 1353.325103][T29251] ? __kasan_check_write+0x14/0x20 [ 1353.330046][T29251] ? fput_many+0x160/0x1b0 [ 1353.334307][T29251] ? debug_smp_processor_id+0x17/0x20 [ 1353.339509][T29251] __x64_sys_bpf+0x7b/0x90 [ 1353.343760][T29251] do_syscall_64+0x34/0x70 [ 1353.348025][T29251] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 1353.353744][T29251] RIP: 0033:0x7f2524e6f819 [ 1353.357997][T29251] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 1353.377626][T29251] RSP: 002b:00007f25234e8038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 1353.385859][T29251] RAX: ffffffffffffffda RBX: 00007f2525026fa0 RCX: 00007f2524e6f819 [ 1353.393760][T29251] RDX: 0000000000000048 RSI: 0000000020000580 RDI: 0600000000000000 [ 1353.401561][T29251] RBP: 00007f25234e8090 R08: 0000000000000000 R09: 0000000000000000 [ 1353.409373][T29251] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1353.417185][T29251] R13: 0000000000000001 R14: 00007f2525026fa0 R15: 00007fffba1b7028 [ 1354.239546][T29261] ªªªªªª: renamed from vlan0 [ 1355.041860][T29297] FAULT_INJECTION: forcing a failure. [ 1355.041860][T29297] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1355.217322][T29297] CPU: 1 PID: 29297 Comm: syz.4.9558 Tainted: G W 5.10.226-syzkaller-00001-g6a01908517df #0 [ 1355.228713][T29297] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 1355.238687][T29297] Call Trace: [ 1355.241814][T29297] dump_stack_lvl+0x1e2/0x24b [ 1355.246321][T29297] ? bfq_pos_tree_add_move+0x43b/0x43b [ 1355.251616][T29297] dump_stack+0x15/0x17 [ 1355.255616][T29297] should_fail+0x3c6/0x510 [ 1355.259862][T29297] should_fail_usercopy+0x1a/0x20 [ 1355.264721][T29297] _copy_to_user+0x20/0x90 [ 1355.269329][T29297] simple_read_from_buffer+0xc7/0x150 [ 1355.274782][T29297] proc_fail_nth_read+0x1a3/0x210 [ 1355.280419][T29297] ? proc_fault_inject_write+0x390/0x390 [ 1355.285886][T29297] ? security_file_permission+0x86/0xb0 [ 1355.291350][T29297] ? rw_verify_area+0x1c3/0x360 [ 1355.296132][T29297] ? proc_fault_inject_write+0x390/0x390 [ 1355.301592][T29297] vfs_read+0x200/0xba0 [ 1355.305584][T29297] ? kernel_read+0x70/0x70 [ 1355.309839][T29297] ? __kasan_check_write+0x14/0x20 [ 1355.314781][T29297] ? mutex_lock+0xa5/0x110 [ 1355.319040][T29297] ? mutex_trylock+0xa0/0xa0 [ 1355.323485][T29297] ? __fdget_pos+0x2e7/0x3a0 [ 1355.328076][T29297] ? ksys_read+0x77/0x2c0 [ 1355.332240][T29297] ksys_read+0x199/0x2c0 [ 1355.336324][T29297] ? vfs_write+0xe70/0xe70 [ 1355.340609][T29297] ? debug_smp_processor_id+0x17/0x20 [ 1355.346040][T29297] __x64_sys_read+0x7b/0x90 [ 1355.350376][T29297] do_syscall_64+0x34/0x70 [ 1355.354629][T29297] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 1355.360356][T29297] RIP: 0033:0x7f018b9cc25c [ 1355.364611][T29297] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 69 8e 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 bf 8e 02 00 48 [ 1355.384049][T29297] RSP: 002b:00007f018a025030 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 1355.392293][T29297] RAX: ffffffffffffffda RBX: 00007f018bb85080 RCX: 00007f018b9cc25c [ 1355.400104][T29297] RDX: 000000000000000f RSI: 00007f018a0250a0 RDI: 0000000000000007 [ 1355.407915][T29297] RBP: 00007f018a025090 R08: 0000000000000000 R09: 0000000000000000 [ 1355.415726][T29297] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1355.423538][T29297] R13: 0000000000000001 R14: 00007f018bb85080 R15: 00007ffde4fb0e08 [ 1358.721834][T29387] device pim6reg1 entered promiscuous mode [ 1362.553264][T29553] FAULT_INJECTION: forcing a failure. [ 1362.553264][T29553] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1362.567574][T29553] CPU: 0 PID: 29553 Comm: syz.1.9648 Tainted: G W 5.10.226-syzkaller-00001-g6a01908517df #0 [ 1362.578739][T29553] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 1362.588635][T29553] Call Trace: [ 1362.591765][T29553] dump_stack_lvl+0x1e2/0x24b [ 1362.596269][T29553] ? bfq_pos_tree_add_move+0x43b/0x43b [ 1362.601654][T29553] dump_stack+0x15/0x17 [ 1362.605556][T29553] should_fail+0x3c6/0x510 [ 1362.609821][T29553] should_fail_alloc_page+0x52/0x60 [ 1362.614933][T29553] __alloc_pages_nodemask+0x1b3/0xaf0 [ 1362.620144][T29553] ? do_syscall_64+0x34/0x70 [ 1362.624566][T29553] ? entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 1362.630469][T29553] ? gfp_pfmemalloc_allowed+0x120/0x120 [ 1362.635849][T29553] ? avc_has_perm_noaudit+0x117/0x240 [ 1362.641161][T29553] shmem_alloc_page+0x257/0x420 [ 1362.645846][T29553] ? put_page+0xd0/0xd0 [ 1362.649837][T29553] ? slab_post_alloc_hook+0x61/0x2f0 [ 1362.654964][T29553] ? percpu_counter_add_batch+0x13d/0x160 [ 1362.660516][T29553] shmem_alloc_and_acct_page+0x395/0x8e0 [ 1362.665984][T29553] ? shmem_swapin_page+0x1950/0x1950 [ 1362.671104][T29553] ? find_get_entry+0x44c/0x4c0 [ 1362.675788][T29553] ? page_cache_prev_miss+0x410/0x410 [ 1362.681001][T29553] ? down_read_trylock+0x179/0x1d0 [ 1362.685963][T29553] ? find_lock_entry+0x1df/0x200 [ 1362.690722][T29553] shmem_getpage_gfp+0x891/0x2480 [ 1362.695585][T29553] ? __kasan_check_write+0x14/0x20 [ 1362.700535][T29553] ? shmem_getpage+0xa0/0xa0 [ 1362.704954][T29553] ? iov_iter_fault_in_readable+0x31f/0x4f0 [ 1362.710745][T29553] shmem_write_begin+0xca/0x1b0 [ 1362.715994][T29553] generic_perform_write+0x2cd/0x570 [ 1362.721099][T29553] ? grab_cache_page_write_begin+0xa0/0xa0 [ 1362.726841][T29553] ? file_remove_privs+0x570/0x570 [ 1362.731803][T29553] ? __kasan_check_write+0x14/0x20 [ 1362.737042][T29553] __generic_file_write_iter+0x23c/0x560 [ 1362.742505][T29553] ? generic_write_checks+0x3b9/0x470 [ 1362.747738][T29553] generic_file_write_iter+0xaf/0x1c0 [ 1362.752932][T29553] vfs_write+0xb4c/0xe70 [ 1362.757025][T29553] ? putname+0xe7/0x140 [ 1362.761014][T29553] ? __traceiter_kmem_cache_free+0x2e/0x50 [ 1362.766648][T29553] ? kernel_write+0x3d0/0x3d0 [ 1362.771406][T29553] ? mutex_trylock+0xa0/0xa0 [ 1362.775829][T29553] ? __fdget_pos+0x2e7/0x3a0 [ 1362.780243][T29553] ? ksys_write+0x77/0x2c0 [ 1362.784493][T29553] ksys_write+0x199/0x2c0 [ 1362.788665][T29553] ? __ia32_sys_read+0x90/0x90 [ 1362.793365][T29553] ? debug_smp_processor_id+0x17/0x20 [ 1362.798738][T29553] __x64_sys_write+0x7b/0x90 [ 1362.803152][T29553] do_syscall_64+0x34/0x70 [ 1362.807402][T29553] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 1362.813124][T29553] RIP: 0033:0x7fe8ebb6e819 [ 1362.817382][T29553] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 1362.836822][T29553] RSP: 002b:00007fe8ea1e7038 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 1362.845530][T29553] RAX: ffffffffffffffda RBX: 00007fe8ebd25fa0 RCX: 00007fe8ebb6e819 [ 1362.853339][T29553] RDX: 0000000000040010 RSI: 0000000020000180 RDI: 0000000000000007 [ 1362.861240][T29553] RBP: 00007fe8ea1e7090 R08: 0000000000000000 R09: 0000000000000000 [ 1362.869044][T29553] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1362.876869][T29553] R13: 0000000000000000 R14: 00007fe8ebd25fa0 R15: 00007fffe9264168 [ 1363.325925][T29575] device syzkaller0 entered promiscuous mode [ 1364.662128][T29611] device syzkaller0 entered promiscuous mode [ 1364.687041][T29613] device syzkaller0 entered promiscuous mode [ 1365.347482][T29646] device veth0_vlan left promiscuous mode [ 1365.392301][T29646] device veth0_vlan entered promiscuous mode [ 1365.713497][T29655] bridge0: port 1(bridge_slave_0) entered disabled state [ 1365.778828][T29667] bridge0: port 1(bridge_slave_0) entered blocking state [ 1365.787964][T29667] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1365.844306][T29667] device bridge0 entered promiscuous mode [ 1366.169671][T29684] FAULT_INJECTION: forcing a failure. [ 1366.169671][T29684] name failslab, interval 1, probability 0, space 0, times 0 [ 1366.186557][T29684] CPU: 0 PID: 29684 Comm: syz.4.9691 Tainted: G W 5.10.226-syzkaller-00001-g6a01908517df #0 [ 1366.198074][T29684] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 1366.207963][T29684] Call Trace: [ 1366.211092][T29684] dump_stack_lvl+0x1e2/0x24b [ 1366.215728][T29684] ? panic+0x812/0x812 [ 1366.219633][T29684] ? kvm_sched_clock_read+0x18/0x40 [ 1366.224935][T29684] ? bfq_pos_tree_add_move+0x43b/0x43b [ 1366.230399][T29684] ? __kasan_check_read+0x11/0x20 [ 1366.235724][T29684] ? preempt_schedule_irq+0xe7/0x140 [ 1366.240806][T29684] dump_stack+0x15/0x17 [ 1366.244877][T29684] should_fail+0x3c6/0x510 [ 1366.249133][T29684] ? sock_alloc_inode+0x1b/0xb0 [ 1366.253823][T29684] __should_failslab+0xa4/0xe0 [ 1366.258420][T29684] should_failslab+0x9/0x20 [ 1366.262758][T29684] kmem_cache_alloc+0x3d/0x2e0 [ 1366.267820][T29684] ? sockfs_init_fs_context+0xb0/0xb0 [ 1366.273006][T29684] sock_alloc_inode+0x1b/0xb0 [ 1366.277511][T29684] ? sockfs_init_fs_context+0xb0/0xb0 [ 1366.282719][T29684] new_inode_pseudo+0x64/0x220 [ 1366.287438][T29684] __sock_create+0x135/0x760 [ 1366.292734][T29684] __sys_socketpair+0x313/0x6e0 [ 1366.297404][T29684] ? __ia32_sys_socket+0x90/0x90 [ 1366.302175][T29684] ? __ia32_sys_read+0x90/0x90 [ 1366.306784][T29684] __x64_sys_socketpair+0x9b/0xb0 [ 1366.311642][T29684] do_syscall_64+0x34/0x70 [ 1366.315885][T29684] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 1366.321609][T29684] RIP: 0033:0x7f018b9cd819 [ 1366.325867][T29684] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 1366.345329][T29684] RSP: 002b:00007f018a046038 EFLAGS: 00000246 ORIG_RAX: 0000000000000035 [ 1366.353919][T29684] RAX: ffffffffffffffda RBX: 00007f018bb84fa0 RCX: 00007f018b9cd819 [ 1366.361716][T29684] RDX: 0000000000000000 RSI: 0000000000000001 RDI: 000000000000001e [ 1366.369528][T29684] RBP: 00007f018a046090 R08: 0000000000000000 R09: 0000000000000000 [ 1366.377505][T29684] R10: 0000000020000040 R11: 0000000000000246 R12: 0000000000000001 [ 1366.385311][T29684] R13: 0000000000000000 R14: 00007f018bb84fa0 R15: 00007ffde4fb0e08 [ 1366.405644][T29684] socket: no more sockets [ 1366.714838][T29693] device syzkaller0 entered promiscuous mode [ 1366.738793][T29699] FAULT_INJECTION: forcing a failure. [ 1366.738793][T29699] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1366.760415][ T314] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1366.858729][T29699] CPU: 1 PID: 29699 Comm: syz.0.9696 Tainted: G W 5.10.226-syzkaller-00001-g6a01908517df #0 [ 1366.870134][T29699] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 1366.880024][T29699] Call Trace: [ 1366.883169][T29699] dump_stack_lvl+0x1e2/0x24b [ 1366.887664][T29699] ? bfq_pos_tree_add_move+0x43b/0x43b [ 1366.892976][T29699] dump_stack+0x15/0x17 [ 1366.896952][T29699] should_fail+0x3c6/0x510 [ 1366.901214][T29699] should_fail_usercopy+0x1a/0x20 [ 1366.906083][T29699] _copy_from_user+0x20/0xd0 [ 1366.910495][T29699] generic_map_update_batch+0x474/0x860 [ 1366.916053][T29699] ? generic_map_delete_batch+0x630/0x630 [ 1366.921605][T29699] ? generic_map_delete_batch+0x630/0x630 [ 1366.927158][T29699] bpf_map_do_batch+0x4c3/0x620 [ 1366.931971][T29699] __se_sys_bpf+0xc3c/0x11cb0 [ 1366.936475][T29699] ? stack_trace_save+0x113/0x1c0 [ 1366.941342][T29699] ? __bad_area_nosemaphore+0xc4/0x430 [ 1366.946798][T29699] ? bad_area_nosemaphore+0x2d/0x40 [ 1366.951759][T29699] ? exc_page_fault+0x33d/0x5b0 [ 1366.956433][T29699] ? __x64_sys_bpf+0x90/0x90 [ 1366.960857][T29699] ? _kstrtoull+0x3a0/0x4a0 [ 1366.965199][T29699] ? kstrtouint_from_user+0x20a/0x2a0 [ 1366.970404][T29699] ? kstrtol_from_user+0x310/0x310 [ 1366.975352][T29699] ? memset+0x35/0x40 [ 1366.979175][T29699] ? __fsnotify_parent+0x4b9/0x6c0 [ 1366.984214][T29699] ? fsnotify_set_children_dentry_flags+0x210/0x210 [ 1366.990629][T29699] ? proc_fail_nth_write+0x20b/0x290 [ 1366.996307][T29699] ? proc_fail_nth_read+0x210/0x210 [ 1367.001300][T29699] ? security_file_permission+0x86/0xb0 [ 1367.006681][T29699] ? rw_verify_area+0x1c3/0x360 [ 1367.011370][T29699] ? preempt_count_add+0x92/0x1a0 [ 1367.016404][T29699] ? vfs_write+0x852/0xe70 [ 1367.020654][T29699] ? kmem_cache_free+0x1c0/0x1e0 [ 1367.025427][T29699] ? kernel_write+0x3d0/0x3d0 [ 1367.029941][T29699] ? __kasan_check_write+0x14/0x20 [ 1367.035248][T29699] ? mutex_lock+0xa5/0x110 [ 1367.039493][T29699] ? mutex_trylock+0xa0/0xa0 [ 1367.043924][T29699] ? __kasan_check_write+0x14/0x20 [ 1367.048862][T29699] ? fput_many+0x160/0x1b0 [ 1367.053120][T29699] ? debug_smp_processor_id+0x17/0x20 [ 1367.058326][T29699] __x64_sys_bpf+0x7b/0x90 [ 1367.062579][T29699] do_syscall_64+0x34/0x70 [ 1367.066826][T29699] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 1367.072551][T29699] RIP: 0033:0x7f2524e6f819 [ 1367.076804][T29699] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 1367.096250][T29699] RSP: 002b:00007f25234e8038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 1367.104491][T29699] RAX: ffffffffffffffda RBX: 00007f2525026fa0 RCX: 00007f2524e6f819 [ 1367.112311][T29699] RDX: 0000000000000038 RSI: 0000000020000400 RDI: 000000000000001a [ 1367.120279][T29699] RBP: 00007f25234e8090 R08: 0000000000000000 R09: 0000000000000000 [ 1367.128060][T29699] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1367.135965][T29699] R13: 0000000000000000 R14: 00007f2525026fa0 R15: 00007fffba1b7028 [ 1367.465914][T29717] FAULT_INJECTION: forcing a failure. [ 1367.465914][T29717] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1367.596642][T29717] CPU: 1 PID: 29717 Comm: syz.4.9701 Tainted: G W 5.10.226-syzkaller-00001-g6a01908517df #0 [ 1367.608364][T29717] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 1367.618676][T29717] Call Trace: [ 1367.621815][T29717] dump_stack_lvl+0x1e2/0x24b [ 1367.626310][T29717] ? bfq_pos_tree_add_move+0x43b/0x43b [ 1367.631616][T29717] dump_stack+0x15/0x17 [ 1367.635604][T29717] should_fail+0x3c6/0x510 [ 1367.639850][T29717] should_fail_alloc_page+0x52/0x60 [ 1367.644896][T29717] __alloc_pages_nodemask+0x1b3/0xaf0 [ 1367.650100][T29717] ? do_syscall_64+0x34/0x70 [ 1367.654518][T29717] ? entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 1367.660526][T29717] ? gfp_pfmemalloc_allowed+0x120/0x120 [ 1367.665899][T29717] ? avc_has_perm_noaudit+0x117/0x240 [ 1367.671104][T29717] shmem_alloc_page+0x257/0x420 [ 1367.675797][T29717] ? put_page+0xd0/0xd0 [ 1367.679783][T29717] ? slab_post_alloc_hook+0x61/0x2f0 [ 1367.684990][T29717] ? percpu_counter_add_batch+0x13d/0x160 [ 1367.690632][T29717] shmem_alloc_and_acct_page+0x395/0x8e0 [ 1367.696099][T29717] ? shmem_swapin_page+0x1950/0x1950 [ 1367.701218][T29717] ? find_get_entry+0x44c/0x4c0 [ 1367.705897][T29717] ? page_cache_prev_miss+0x410/0x410 [ 1367.711116][T29717] ? down_read_trylock+0x179/0x1d0 [ 1367.716050][T29717] ? find_lock_entry+0x1df/0x200 [ 1367.720825][T29717] shmem_getpage_gfp+0x891/0x2480 [ 1367.725691][T29717] ? __kasan_check_write+0x14/0x20 [ 1367.730640][T29717] ? shmem_getpage+0xa0/0xa0 [ 1367.735059][T29717] ? iov_iter_fault_in_readable+0x31f/0x4f0 [ 1367.740790][T29717] shmem_write_begin+0xca/0x1b0 [ 1367.745489][T29717] generic_perform_write+0x2cd/0x570 [ 1367.750605][T29717] ? grab_cache_page_write_begin+0xa0/0xa0 [ 1367.756429][T29717] ? file_remove_privs+0x570/0x570 [ 1367.761480][T29717] ? __kasan_check_write+0x14/0x20 [ 1367.766433][T29717] __generic_file_write_iter+0x23c/0x560 [ 1367.771899][T29717] ? generic_write_checks+0x3b9/0x470 [ 1367.777109][T29717] generic_file_write_iter+0xaf/0x1c0 [ 1367.782398][T29717] vfs_write+0xb4c/0xe70 [ 1367.786480][T29717] ? kernel_write+0x3d0/0x3d0 [ 1367.790995][T29717] ? mutex_trylock+0xa0/0xa0 [ 1367.795588][T29717] ? __fdget_pos+0x2e7/0x3a0 [ 1367.800033][T29717] ? ksys_write+0x77/0x2c0 [ 1367.804360][T29717] ksys_write+0x199/0x2c0 [ 1367.808635][T29717] ? __ia32_sys_read+0x90/0x90 [ 1367.814017][T29717] ? debug_smp_processor_id+0x17/0x20 [ 1367.819430][T29717] __x64_sys_write+0x7b/0x90 [ 1367.824047][T29717] do_syscall_64+0x34/0x70 [ 1367.828280][T29717] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 1367.834181][T29717] RIP: 0033:0x7f018b9cd819 [ 1367.838433][T29717] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 1367.857884][T29717] RSP: 002b:00007f018a046038 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 1367.866178][T29717] RAX: ffffffffffffffda RBX: 00007f018bb84fa0 RCX: 00007f018b9cd819 [ 1367.874485][T29717] RDX: 0000000000040010 RSI: 0000000020000180 RDI: 0000000000000009 [ 1367.882293][T29717] RBP: 00007f018a046090 R08: 0000000000000000 R09: 0000000000000000 [ 1367.890107][T29717] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1367.897918][T29717] R13: 0000000000000000 R14: 00007f018bb84fa0 R15: 00007ffde4fb0e08 [ 1368.728686][T29747] device syzkaller0 entered promiscuous mode [ 1369.018551][T29756] device syzkaller0 entered promiscuous mode [ 1369.608711][T29779] FAULT_INJECTION: forcing a failure. [ 1369.608711][T29779] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1369.727987][T29779] CPU: 1 PID: 29779 Comm: syz.1.9721 Tainted: G W 5.10.226-syzkaller-00001-g6a01908517df #0 [ 1369.739294][T29779] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 1369.749179][T29779] Call Trace: [ 1369.752761][T29779] dump_stack_lvl+0x1e2/0x24b [ 1369.757259][T29779] ? bfq_pos_tree_add_move+0x43b/0x43b [ 1369.763082][T29779] ? bpf_trace_printk+0xa7d/0xd50 [ 1369.768210][T29779] dump_stack+0x15/0x17 [ 1369.772828][T29779] should_fail+0x3c6/0x510 [ 1369.777093][T29779] should_fail_usercopy+0x1a/0x20 [ 1369.781953][T29779] _copy_from_user+0x20/0xd0 [ 1369.786393][T29779] sock_ioctl+0x648/0x760 [ 1369.790536][T29779] ? sock_poll+0x340/0x340 [ 1369.794790][T29779] ? security_file_ioctl+0x84/0xb0 [ 1369.799733][T29779] ? sock_poll+0x340/0x340 [ 1369.803989][T29779] __se_sys_ioctl+0x114/0x190 [ 1369.808501][T29779] __x64_sys_ioctl+0x7b/0x90 [ 1369.812929][T29779] do_syscall_64+0x34/0x70 [ 1369.817181][T29779] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 1369.822908][T29779] RIP: 0033:0x7fe8ebb6e819 [ 1369.827168][T29779] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 1369.846600][T29779] RSP: 002b:00007fe8ea1e7038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1369.854844][T29779] RAX: ffffffffffffffda RBX: 00007fe8ebd25fa0 RCX: 00007fe8ebb6e819 [ 1369.862660][T29779] RDX: 0000000020000080 RSI: 00000000000089f1 RDI: 0000000000000008 [ 1369.870465][T29779] RBP: 00007fe8ea1e7090 R08: 0000000000000000 R09: 0000000000000000 [ 1369.878277][T29779] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1369.886093][T29779] R13: 0000000000000000 R14: 00007fe8ebd25fa0 R15: 00007fffe9264168 [ 1370.432899][T29791] device syzkaller0 entered promiscuous mode [ 1371.385185][T29809] device syzkaller0 entered promiscuous mode [ 1371.777122][T29821] syz.4.9734[29821] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1371.777178][T29821] syz.4.9734[29821] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1371.929227][T29825] device syzkaller0 entered promiscuous mode [ 1372.175375][T29829] device syzkaller0 entered promiscuous mode [ 1372.488696][T29843] device pim6reg1 entered promiscuous mode [ 1374.222373][T29873] device syzkaller0 entered promiscuous mode [ 1377.577352][T29941] device wg2 left promiscuous mode [ 1377.669256][T29939] device wg2 entered promiscuous mode [ 1379.667148][T10153] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1379.686724][T10153] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 1379.940499][T30006] bridge0: port 2(bridge_slave_1) entered blocking state [ 1379.947572][T30006] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1379.959898][T30006] bridge0: port 1(bridge_slave_0) entered blocking state [ 1379.967050][T30006] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1379.982545][T30006] device bridge0 entered promiscuous mode [ 1380.017147][T30012] device pim6reg1 entered promiscuous mode [ 1380.705430][T30042] device veth0_vlan left promiscuous mode [ 1380.780968][T30042] device veth0_vlan entered promiscuous mode [ 1380.819723][T10153] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1380.855775][T30047] device syzkaller0 entered promiscuous mode [ 1381.138952][T30053] syz.4.9811[30053] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1381.139004][T30053] syz.4.9811[30053] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1382.613974][T30086] device syzkaller0 entered promiscuous mode [ 1383.537924][T30122] device syzkaller0 entered promiscuous mode [ 1384.810533][T30179] syz.4.9856[30179] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1384.813770][T30179] syz.4.9856[30179] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1385.692708][T30204] FAULT_INJECTION: forcing a failure. [ 1385.692708][T30204] name failslab, interval 1, probability 0, space 0, times 0 [ 1385.853810][T30204] CPU: 0 PID: 30204 Comm: syz.3.9864 Tainted: G W 5.10.226-syzkaller-00001-g6a01908517df #0 [ 1385.864990][T30204] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 1385.875198][T30204] Call Trace: [ 1385.878281][T30204] dump_stack_lvl+0x1e2/0x24b [ 1385.882800][T30204] ? panic+0x812/0x812 [ 1385.886687][T30204] ? bfq_pos_tree_add_move+0x43b/0x43b [ 1385.892954][T30204] dump_stack+0x15/0x17 [ 1385.896931][T30204] should_fail+0x3c6/0x510 [ 1385.901400][T30204] ? security_inode_alloc+0x29/0x120 [ 1385.906516][T30204] __should_failslab+0xa4/0xe0 [ 1385.911302][T30204] should_failslab+0x9/0x20 [ 1385.915818][T30204] kmem_cache_alloc+0x3d/0x2e0 [ 1385.920421][T30204] security_inode_alloc+0x29/0x120 [ 1385.925365][T30204] inode_init_always+0x767/0x9f0 [ 1385.930152][T30204] ? sockfs_init_fs_context+0xb0/0xb0 [ 1385.935687][T30204] new_inode_pseudo+0x93/0x220 [ 1385.940563][T30204] __sock_create+0x135/0x760 [ 1385.944961][T30204] __sys_socketpair+0x313/0x6e0 [ 1385.949651][T30204] ? __ia32_sys_socket+0x90/0x90 [ 1385.954426][T30204] __x64_sys_socketpair+0x9b/0xb0 [ 1385.959277][T30204] do_syscall_64+0x34/0x70 [ 1385.963552][T30204] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 1385.969270][T30204] RIP: 0033:0x7fd747287819 [ 1385.973515][T30204] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 1385.993158][T30204] RSP: 002b:00007fd745900038 EFLAGS: 00000246 ORIG_RAX: 0000000000000035 [ 1386.001388][T30204] RAX: ffffffffffffffda RBX: 00007fd74743efa0 RCX: 00007fd747287819 [ 1386.009197][T30204] RDX: 0000000000000000 RSI: 0000000000000001 RDI: 000000000000001e [ 1386.017157][T30204] RBP: 00007fd745900090 R08: 0000000000000000 R09: 0000000000000000 [ 1386.024914][T30204] R10: 0000000020000040 R11: 0000000000000246 R12: 0000000000000001 [ 1386.032720][T30204] R13: 0000000000000000 R14: 00007fd74743efa0 R15: 00007ffc9e3076c8 [ 1386.106913][T30204] socket: no more sockets [ 1386.686042][T30237] device veth0_vlan left promiscuous mode [ 1386.700546][T30237] device veth0_vlan entered promiscuous mode [ 1386.711304][ T314] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1386.720772][ T314] IPv6: ADDRCONF(NETDEV_CHANGE): ªªªªªª: link becomes ready [ 1386.728350][ T314] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1388.166497][T30281] device syzkaller0 entered promiscuous mode [ 1389.130699][T30320] device syzkaller0 entered promiscuous mode [ 1389.214871][T30328] syz.1.9901[30328] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1389.214925][T30328] syz.1.9901[30328] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1389.287615][T30329] device syzkaller0 entered promiscuous mode [ 1389.868365][T30337] bridge0: port 2(bridge_slave_1) entered disabled state [ 1389.875519][T30337] bridge0: port 1(bridge_slave_0) entered disabled state [ 1389.883088][T30337] device bridge0 left promiscuous mode [ 1390.495152][T30371] device syzkaller0 entered promiscuous mode [ 1391.504183][T30384] device pim6reg1 entered promiscuous mode [ 1391.926175][T30399] device syzkaller0 entered promiscuous mode [ 1392.596121][T30440] device pim6reg1 entered promiscuous mode [ 1393.328997][T30476] syz.4.9953[30476] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1393.329076][T30476] syz.4.9953[30476] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1393.708778][T30491] device veth0_vlan left promiscuous mode [ 1393.763355][T30491] device veth0_vlan entered promiscuous mode [ 1394.798236][T30512] device syzkaller0 entered promiscuous mode [ 1395.863561][T30524] device syzkaller0 entered promiscuous mode [ 1396.494740][T30561] device syzkaller0 entered promiscuous mode [ 1398.146287][T30605] device syzkaller0 entered promiscuous mode [ 1399.245681][T30652] device syzkaller0 entered promiscuous mode [ 1399.325295][T30654] FAULT_INJECTION: forcing a failure. [ 1399.325295][T30654] name failslab, interval 1, probability 0, space 0, times 0 [ 1399.349188][T30654] CPU: 0 PID: 30654 Comm: syz.4.10010 Tainted: G W 5.10.226-syzkaller-00001-g6a01908517df #0 [ 1399.360552][T30654] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 1399.370439][T30654] Call Trace: [ 1399.373576][T30654] dump_stack_lvl+0x1e2/0x24b [ 1399.378088][T30654] ? bfq_pos_tree_add_move+0x43b/0x43b [ 1399.383382][T30654] ? kmem_cache_free+0xa9/0x1e0 [ 1399.388536][T30654] ? kasan_set_track+0x5d/0x70 [ 1399.393139][T30654] ? kasan_set_free_info+0x23/0x40 [ 1399.398088][T30654] dump_stack+0x15/0x17 [ 1399.402073][T30654] should_fail+0x3c6/0x510 [ 1399.406329][T30654] ? dup_task_struct+0x57/0xc30 [ 1399.411013][T30654] __should_failslab+0xa4/0xe0 [ 1399.415614][T30654] should_failslab+0x9/0x20 [ 1399.419957][T30654] kmem_cache_alloc+0x3d/0x2e0 [ 1399.424559][T30654] ? __kasan_check_write+0x14/0x20 [ 1399.429504][T30654] ? _raw_spin_lock_irq+0xa5/0x1b0 [ 1399.434441][T30654] dup_task_struct+0x57/0xc30 [ 1399.438958][T30654] ? __kasan_check_write+0x14/0x20 [ 1399.444001][T30654] copy_process+0x5c8/0x3340 [ 1399.448420][T30654] ? proc_fail_nth_write+0x20b/0x290 [ 1399.453562][T30654] ? proc_fail_nth_read+0x210/0x210 [ 1399.458573][T30654] ? security_file_permission+0x86/0xb0 [ 1399.463953][T30654] ? rw_verify_area+0x1c3/0x360 [ 1399.468638][T30654] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 1399.473584][T30654] ? vfs_write+0x852/0xe70 [ 1399.477840][T30654] ? kmem_cache_free+0xa9/0x1e0 [ 1399.482525][T30654] kernel_clone+0x21e/0x9e0 [ 1399.486865][T30654] ? __kasan_check_write+0x14/0x20 [ 1399.491812][T30654] ? create_io_thread+0x1e0/0x1e0 [ 1399.496672][T30654] __x64_sys_clone+0x23f/0x290 [ 1399.501271][T30654] ? __do_sys_vfork+0x130/0x130 [ 1399.505964][T30654] ? debug_smp_processor_id+0x17/0x20 [ 1399.511166][T30654] do_syscall_64+0x34/0x70 [ 1399.515420][T30654] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 1399.521146][T30654] RIP: 0033:0x7f018b9cd819 [ 1399.525401][T30654] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 1399.544841][T30654] RSP: 002b:00007f018a045fe8 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 1399.553089][T30654] RAX: ffffffffffffffda RBX: 00007f018bb84fa0 RCX: 00007f018b9cd819 [ 1399.560894][T30654] RDX: 0000000000000000 RSI: 0000000000009000 RDI: 0000000004021400 [ 1399.568706][T30654] RBP: 00007f018a046090 R08: 0000000000000000 R09: 0000000000000000 [ 1399.576518][T30654] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000001 [ 1399.584329][T30654] R13: 0000000000000000 R14: 00007f018bb84fa0 R15: 00007ffde4fb0e08 [ 1399.634882][T30660] device syzkaller0 entered promiscuous mode [ 1400.986986][T30701] device syzkaller0 entered promiscuous mode [ 1401.408486][T30704] device pim6reg1 entered promiscuous mode [ 1403.497085][T30754] syz.3.10041[30754] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1403.497143][T30754] syz.3.10041[30754] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1405.577563][T30776] device sit0 entered promiscuous mode [ 1405.891922][T30780] device syzkaller0 entered promiscuous mode [ 1405.994364][T30785] device veth0_vlan left promiscuous mode [ 1406.261509][T30785] device veth0_vlan entered promiscuous mode [ 1406.905731][T30804] syz.2.10056[30804] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1406.905787][T30804] syz.2.10056[30804] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1407.808906][T30853] cgroup: fork rejected by pids controller in /syz2 [ 1408.070465][T30880] syz.0.10084[30880] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1408.070523][T30880] syz.0.10084[30880] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1408.212802][T30874] bridge0: port 1(bridge_slave_0) entered blocking state [ 1408.261617][T30874] bridge0: port 1(bridge_slave_0) entered disabled state [ 1408.269581][T30874] device bridge_slave_0 entered promiscuous mode [ 1408.282310][T30874] bridge0: port 2(bridge_slave_1) entered blocking state [ 1408.472267][T30874] bridge0: port 2(bridge_slave_1) entered disabled state [ 1408.506704][T30874] device bridge_slave_1 entered promiscuous mode [ 1408.656627][T30874] bridge0: port 2(bridge_slave_1) entered blocking state [ 1408.663662][T30874] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1408.670733][T30874] bridge0: port 1(bridge_slave_0) entered blocking state [ 1408.677505][T30874] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1408.938151][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1408.947170][ T49] bridge0: port 1(bridge_slave_0) entered disabled state [ 1408.954527][ T49] bridge0: port 2(bridge_slave_1) entered disabled state [ 1409.177389][T30913] device syzkaller0 entered promiscuous mode [ 1409.188626][T10153] device veth1_macvtap left promiscuous mode [ 1409.222511][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1409.230491][ T49] bridge0: port 1(bridge_slave_0) entered blocking state [ 1409.237455][ T49] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1409.248025][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1409.256050][ T49] bridge0: port 2(bridge_slave_1) entered blocking state [ 1409.262907][ T49] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1409.277661][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 1409.285907][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1409.297174][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 1409.305109][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1409.329783][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 1409.337918][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 1409.390906][T30874] device veth0_vlan entered promiscuous mode [ 1409.410888][ T314] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 1409.419166][ T314] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1409.429379][ T314] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1409.437018][ T314] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1409.444697][T30929] device pim6reg1 entered promiscuous mode [ 1409.462010][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 1409.470212][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 1409.479548][T30874] device veth1_macvtap entered promiscuous mode [ 1409.495455][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 1409.505371][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 1409.514296][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 1409.558330][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 1409.572980][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 1409.616169][T30935] FAULT_INJECTION: forcing a failure. [ 1409.616169][T30935] name failslab, interval 1, probability 0, space 0, times 0 [ 1409.630261][T30935] CPU: 1 PID: 30935 Comm: syz.4.10103 Tainted: G W 5.10.226-syzkaller-00001-g6a01908517df #0 [ 1409.641510][T30935] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 1409.651404][T30935] Call Trace: [ 1409.654540][T30935] dump_stack_lvl+0x1e2/0x24b [ 1409.659048][T30935] ? bfq_pos_tree_add_move+0x43b/0x43b [ 1409.664343][T30935] dump_stack+0x15/0x17 [ 1409.668332][T30935] should_fail+0x3c6/0x510 [ 1409.672588][T30935] ? __kernfs_new_node+0xdb/0x700 [ 1409.677451][T30935] __should_failslab+0xa4/0xe0 [ 1409.682048][T30935] should_failslab+0x9/0x20 [ 1409.686385][T30935] kmem_cache_alloc+0x3d/0x2e0 [ 1409.690991][T30935] __kernfs_new_node+0xdb/0x700 [ 1409.695673][T30935] ? irq_exit_rcu+0x9/0x10 [ 1409.699925][T30935] ? __kasan_check_write+0x14/0x20 [ 1409.704874][T30935] ? down_write+0xd7/0x150 [ 1409.709127][T30935] ? kernfs_new_node+0x230/0x230 [ 1409.713899][T30935] ? __kasan_check_write+0x14/0x20 [ 1409.718859][T30935] ? up_write+0x59/0x120 [ 1409.722925][T30935] ? kernfs_activate+0x356/0x370 [ 1409.727706][T30935] kernfs_new_node+0x130/0x230 [ 1409.732300][T30935] __kernfs_create_file+0x4a/0x270 [ 1409.737250][T30935] sysfs_add_file_mode_ns+0x273/0x320 [ 1409.742461][T30935] internal_create_group+0x573/0xf00 [ 1409.747582][T30935] ? __irq_exit_rcu+0x40/0x150 [ 1409.752181][T30935] ? asm_sysvec_apic_timer_interrupt+0x12/0x20 [ 1409.758168][T30935] ? sysfs_create_group+0x30/0x30 [ 1409.763028][T30935] sysfs_create_groups+0x5b/0x130 [ 1409.767886][T30935] device_add_attrs+0x8b/0x3e0 [ 1409.772483][T30935] ? device_add_class_symlinks+0x27c/0x2a0 [ 1409.778123][T30935] device_add+0x4da/0xbc0 [ 1409.782296][T30935] netdev_register_kobject+0x177/0x320 [ 1409.787588][T30935] ? raw_notifier_call_chain+0xdf/0xf0 [ 1409.792883][T30935] register_netdevice+0xe9b/0x13f0 [ 1409.797841][T30935] ? netif_stacked_transfer_operstate+0x240/0x240 [ 1409.804081][T30935] ? radix_tree_lookup+0x1cb/0x1d0 [ 1409.809025][T30935] ppp_dev_configure+0x825/0xaf0 [ 1409.813799][T30935] ppp_ioctl+0x6e5/0x1810 [ 1409.817971][T30935] ? __irq_exit_rcu+0x40/0x150 [ 1409.822561][T30935] ? ppp_poll+0x250/0x250 [ 1409.826732][T30935] ? asm_sysvec_apic_timer_interrupt+0x12/0x20 [ 1409.832723][T30935] ? security_file_ioctl+0x78/0xb0 [ 1409.837664][T30935] ? security_file_ioctl+0x84/0xb0 [ 1409.842610][T30935] ? ppp_poll+0x250/0x250 [ 1409.846778][T30935] __se_sys_ioctl+0x114/0x190 [ 1409.851292][T30935] __x64_sys_ioctl+0x7b/0x90 [ 1409.855721][T30935] do_syscall_64+0x34/0x70 [ 1409.859974][T30935] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 1409.865700][T30935] RIP: 0033:0x7f018b9cd819 [ 1409.869953][T30935] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 1409.889391][T30935] RSP: 002b:00007f018a046038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1409.897635][T30935] RAX: ffffffffffffffda RBX: 00007f018bb84fa0 RCX: 00007f018b9cd819 [ 1409.905450][T30935] RDX: 0000000020001400 RSI: 00000000c004743e RDI: 0000000000000006 [ 1409.913259][T30935] RBP: 00007f018a046090 R08: 0000000000000000 R09: 0000000000000000 [ 1409.921067][T30935] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1409.928894][T30935] R13: 0000000000000000 R14: 00007f018bb84fa0 R15: 00007ffde4fb0e08 [ 1410.160545][T30946] device syzkaller0 entered promiscuous mode [ 1411.013217][T30972] syz.4.10114[30972] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1411.029653][T30972] syz.4.10114[30972] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1411.084419][T30979] device pim6reg1 entered promiscuous mode [ 1411.770341][T30993] FAULT_INJECTION: forcing a failure. [ 1411.770341][T30993] name failslab, interval 1, probability 0, space 0, times 0 [ 1411.783235][T30993] CPU: 0 PID: 30993 Comm: syz.3.10120 Tainted: G W 5.10.226-syzkaller-00001-g6a01908517df #0 [ 1411.794485][T30993] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 1411.804375][T30993] Call Trace: [ 1411.807509][T30993] dump_stack_lvl+0x1e2/0x24b [ 1411.812018][T30993] ? bfq_pos_tree_add_move+0x43b/0x43b [ 1411.817320][T30993] ? vsnprintf+0x1b96/0x1c70 [ 1411.821745][T30993] dump_stack+0x15/0x17 [ 1411.825736][T30993] should_fail+0x3c6/0x510 [ 1411.829996][T30993] ? kvmalloc_node+0x82/0x130 [ 1411.834503][T30993] __should_failslab+0xa4/0xe0 [ 1411.839101][T30993] should_failslab+0x9/0x20 [ 1411.843439][T30993] __kmalloc+0x60/0x330 [ 1411.847435][T30993] ? sprintf+0xd6/0x120 [ 1411.851441][T30993] kvmalloc_node+0x82/0x130 [ 1411.855777][T30993] alloc_netdev_mqs+0x8e/0xcd0 [ 1411.860368][T30993] ? selinux_capset+0xf0/0xf0 [ 1411.864880][T30993] ? IP6_ECN_decapsulate+0x1890/0x1890 [ 1411.870176][T30993] ip6_tnl_locate+0x570/0x6c0 [ 1411.874689][T30993] ? switch_mm_irqs_off+0x71b/0x9a0 [ 1411.879734][T30993] ? ip6_tnl_link_config+0x9a0/0x9a0 [ 1411.884839][T30993] ? ip6_tnl_ioctl+0xaac/0x1760 [ 1411.889534][T30993] ? memcpy+0x56/0x70 [ 1411.893346][T30993] ip6_tnl_ioctl+0xad2/0x1760 [ 1411.897861][T30993] ? ip6_tnl_start_xmit+0x1690/0x1690 [ 1411.903064][T30993] ? full_name_hash+0xa0/0xf0 [ 1411.907580][T30993] dev_ifsioc+0x6a1/0xae0 [ 1411.911740][T30993] ? dev_ioctl+0xb40/0xb40 [ 1411.915993][T30993] ? dev_get_by_name_rcu+0xc5/0xf0 [ 1411.920940][T30993] dev_ioctl+0x5cc/0xb40 [ 1411.925024][T30993] sock_ioctl+0x685/0x760 [ 1411.929189][T30993] ? sock_poll+0x340/0x340 [ 1411.933450][T30993] ? security_file_ioctl+0x84/0xb0 [ 1411.938386][T30993] ? sock_poll+0x340/0x340 [ 1411.942639][T30993] __se_sys_ioctl+0x114/0x190 [ 1411.947157][T30993] __x64_sys_ioctl+0x7b/0x90 [ 1411.951588][T30993] do_syscall_64+0x34/0x70 [ 1411.955839][T30993] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 1411.961561][T30993] RIP: 0033:0x7fd747287819 [ 1411.965814][T30993] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 1411.985251][T30993] RSP: 002b:00007fd745900038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1411.993587][T30993] RAX: ffffffffffffffda RBX: 00007fd74743efa0 RCX: 00007fd747287819 [ 1412.001393][T30993] RDX: 0000000020000080 RSI: 00000000000089f1 RDI: 0000000000000008 [ 1412.009213][T30993] RBP: 00007fd745900090 R08: 0000000000000000 R09: 0000000000000000 [ 1412.017107][T30993] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1412.024916][T30993] R13: 0000000000000000 R14: 00007fd74743efa0 R15: 00007ffc9e3076c8 [ 1412.122013][T30996] device bridge_slave_1 left promiscuous mode [ 1412.128028][T30996] bridge0: port 2(bridge_slave_1) entered disabled state [ 1412.135169][T30996] bridge0: port 1(bridge_slave_0) entered disabled state [ 1412.227584][T31008] device syzkaller0 entered promiscuous mode [ 1414.584748][T31102] device syzkaller0 entered promiscuous mode [ 1417.943977][T31191] FAULT_INJECTION: forcing a failure. [ 1417.943977][T31191] name failslab, interval 1, probability 0, space 0, times 0 [ 1417.996420][T31191] CPU: 0 PID: 31191 Comm: syz.0.10189 Tainted: G W 5.10.226-syzkaller-00001-g6a01908517df #0 [ 1418.008139][T31191] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 1418.018017][T31191] Call Trace: [ 1418.021180][T31191] dump_stack_lvl+0x1e2/0x24b [ 1418.025662][T31191] ? bfq_pos_tree_add_move+0x43b/0x43b [ 1418.030968][T31191] ? wake_up_klogd+0xb8/0xf0 [ 1418.035387][T31191] dump_stack+0x15/0x17 [ 1418.039373][T31191] should_fail+0x3c6/0x510 [ 1418.043804][T31191] ? prepare_creds+0x2f/0x5f0 [ 1418.048314][T31191] __should_failslab+0xa4/0xe0 [ 1418.052998][T31191] should_failslab+0x9/0x20 [ 1418.057343][T31191] kmem_cache_alloc+0x3d/0x2e0 [ 1418.061940][T31191] ? irq_exit_rcu+0x9/0x10 [ 1418.066194][T31191] prepare_creds+0x2f/0x5f0 [ 1418.070532][T31191] copy_creds+0xe7/0x480 [ 1418.074610][T31191] copy_process+0x93f/0x3340 [ 1418.079043][T31191] ? timerqueue_add+0x24c/0x270 [ 1418.083740][T31191] ? kvm_sched_clock_read+0x18/0x40 [ 1418.088763][T31191] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 1418.093722][T31191] ? sched_clock+0x3a/0x40 [ 1418.099214][T31191] kernel_clone+0x21e/0x9e0 [ 1418.103641][T31191] ? sysvec_apic_timer_interrupt+0xcb/0xe0 [ 1418.109278][T31191] ? create_io_thread+0x1e0/0x1e0 [ 1418.114306][T31191] __x64_sys_clone+0x23f/0x290 [ 1418.118905][T31191] ? __do_sys_vfork+0x130/0x130 [ 1418.123583][T31191] ? sched_clock+0x3a/0x40 [ 1418.127839][T31191] ? debug_smp_processor_id+0x17/0x20 [ 1418.133132][T31191] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 1418.139033][T31191] ? asm_sysvec_apic_timer_interrupt+0xa/0x20 [ 1418.145110][T31191] ? irqentry_exit_to_user_mode+0x41/0x80 [ 1418.150674][T31191] do_syscall_64+0x34/0x70 [ 1418.155098][T31191] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 1418.160912][T31191] RIP: 0033:0x7f2524e6f819 [ 1418.165253][T31191] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 1418.184956][T31191] RSP: 002b:00007f25234e7fe8 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 1418.193197][T31191] RAX: ffffffffffffffda RBX: 00007f2525026fa0 RCX: 00007f2524e6f819 [ 1418.201006][T31191] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000022023400 [ 1418.208820][T31191] RBP: 00007f25234e8090 R08: 0000000000000000 R09: 0000000000000000 [ 1418.216632][T31191] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000001 [ 1418.224448][T31191] R13: 0000000000000000 R14: 00007f2525026fa0 R15: 00007fffba1b7028 [ 1420.481485][T31247] device syzkaller0 entered promiscuous mode [ 1424.969142][T31353] device pim6reg1 entered promiscuous mode [ 1425.168336][T31356] device syzkaller0 entered promiscuous mode [ 1425.847119][T31379] device syzkaller0 entered promiscuous mode [ 1426.773997][T31420] device syzkaller0 entered promiscuous mode [ 1426.845374][T31425] device syzkaller0 entered promiscuous mode