last executing test programs: 3.038421207s ago: executing program 2 (id=5589): r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='memory.events.local\x00', 0x0, 0x0) r1 = bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000040)={0x0, r0}, 0x10) r2 = syz_clone(0x2000, &(0x7f0000000080)="4ca0af29421cce4d45ea1f6ed0040dbc150c9fc40941664d278bb0d13efe13d44d1d4d1800d730bf8e4065a63dc7a7cf040613b57286967f0dd0c0989b732a3de2a2e693b435a6ee4780ec12f4357796aa4382e0c82b4064593a42c470cb0e8f7111bfc51a969cb7757e57da7b079e56b3dfb62c84c956b02023c4f47c5e46d042088a1b7f0e3ce56c101b212955cbafca5a", 0x92, &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="b3a692904b2cdc3f5ebf687d2c116a746e390ff381dab40e02aa6f0c3406cbef667b5e83f42bb6ff01793720926803cb623d5c10fbaf4e6e12606e093e8cc4b601779e9ee236e6e3b96249155b871a51b2c47c568ff003fa95f15d789eeeda1bb7e8570e04415b0688763029e16c75390669448809fd66784d7c344e23b6c022f75ed0caacb854573d316b1513b11e63789b747a6fed1928c52d81e469c843032c4c23584390b5f3") bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000002c0)={r2, r1, 0x0, 0x14, &(0x7f0000000280)='memory.events.local\x00'}, 0x30) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, &(0x7f0000000300)={0x1, 0x0, [0x0]}) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000340)=0x1000) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000480)={@map=0xffffffffffffffff, 0xd, 0x0, 0x8, &(0x7f0000000380)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x8, 0x0, &(0x7f00000003c0)=[0x0], &(0x7f0000000400)=[0x0], &(0x7f0000000440)=[0x0, 0x0, 0x0], 0x0}, 0x40) bpf$BPF_PROG_DETACH(0x9, &(0x7f00000004c0)={@map=r0, r0, 0x29, 0x44, 0x0, @void, @value=r0, @void, @void, r4}, 0x20) unlink(&(0x7f0000000500)='./file0\x00') bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000700)={r3, 0x58, &(0x7f0000000680)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r6 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000880)={0x6, 0x1e, &(0x7f0000000540)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x8}, {{0x18, 0x1, 0x1, 0x0, r0}}, {}, [@snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x1}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r3}}, @map_idx_val={0x18, 0x6, 0x6, 0x0, 0x4, 0x0, 0x0, 0x0, 0x1}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000640)='GPL\x00', 0x4, 0x0, 0x0, 0x41100, 0x0, '\x00', r5, 0x25, r0, 0x8, &(0x7f0000000740)={0x2, 0x4}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0xa, &(0x7f0000000780)=[r3, r3, r3], &(0x7f00000007c0)=[{0x0, 0x1, 0xa, 0x9}, {0x3, 0x3, 0xe, 0x3}, {0x5, 0x2, 0xa}, {0x4, 0x5, 0x6, 0x2}, {0x3, 0x4, 0x10, 0xa}, {0x2, 0x1, 0xb, 0x2}, {0x3, 0x6, 0x8, 0x8}, {0x0, 0x4, 0x8, 0x6}, {0x2, 0x2, 0x0, 0xc}, {0x5, 0x1, 0xf, 0x4}], 0x10, 0x4}, 0x94) r7 = bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000940)={0x0, r0}, 0x10) bpf$TOKEN_CREATE(0x24, &(0x7f0000000980)={0x0, r3}, 0x8) recvmsg(r0, &(0x7f0000001bc0)={&(0x7f00000009c0)=@can={0x1d, 0x0}, 0x80, &(0x7f0000001a80)=[{&(0x7f0000000a40)=""/4096, 0x1000}, {&(0x7f0000001a40)=""/57, 0x39}], 0x2, &(0x7f0000001ac0)=""/194, 0xc2}, 0x2042) bpf$ENABLE_STATS(0x20, &(0x7f0000001c00), 0x4) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000001d40)={r0, 0x20, &(0x7f0000001d00)={&(0x7f0000001c40), 0x0, 0x0, &(0x7f0000001c80)=""/83, 0x53}}, 0x10) r10 = perf_event_open(&(0x7f0000001d80)={0x5, 0x80, 0x8, 0x9, 0x80, 0xb, 0x0, 0xd, 0x0, 0x2, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x9, 0x4, @perf_config_ext={0x1, 0x5}, 0x108320, 0x94, 0x41a, 0x2, 0x1, 0x1, 0x7, 0x0, 0x3, 0x0, 0x4}, r2, 0xffffffffffffffff, r7, 0x1) r11 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000001e40)=@generic={&(0x7f0000001e00)='./file0\x00'}, 0x18) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000001e80)={0xffffffffffffffff}) perf_event_open(&(0x7f0000001f00)={0x1, 0x80, 0x1, 0x0, 0xff, 0x0, 0x0, 0x200, 0x10800, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x9, 0x4, @perf_bp={&(0x7f0000001ec0), 0x3}, 0x100008, 0x0, 0x3abf, 0x7, 0x8, 0xe5b1, 0x400, 0x0, 0xe0, 0x0, 0x4}, r2, 0x8, r10, 0x3) ioctl$PERF_EVENT_IOC_RESET(r10, 0x2403, 0xa95) r13 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000001fc0)=@generic={&(0x7f0000001f80)='./file0\x00', 0x0, 0x10}, 0x18) bpf$PROG_BIND_MAP(0x23, &(0x7f0000002000)={r11, r13}, 0xc) bpf$PROG_LOAD(0x5, &(0x7f00000022c0)={0x1e, 0xb, &(0x7f0000002040)=@framed={{0x18, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x9}, [@map_idx_val={0x18, 0x5, 0x6, 0x0, 0xe, 0x0, 0x0, 0x0, 0x8}, @cb_func={0x18, 0x5, 0x4, 0x0, 0x7}, @func={0x85, 0x0, 0x1, 0x0, 0x4}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x3}, @map_idx_val={0x18, 0x4, 0x6, 0x0, 0xf, 0x0, 0x0, 0x0, 0x6}]}, &(0x7f00000020c0)='GPL\x00', 0x4, 0xc5, &(0x7f0000002100)=""/197, 0x41100, 0x30, '\x00', r5, @fallback=0xd, 0xffffffffffffffff, 0x8, &(0x7f0000002200)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000002240)={0x3, 0x0, 0x0, 0x8}, 0x10, r9, r6, 0x0, &(0x7f0000002280)=[r3, r13, r12, r3], 0x0, 0x10, 0x1c70000}, 0x94) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000002380)={0xffffffffffffffff}) sendmsg$inet(r14, &(0x7f0000003800)={&(0x7f00000023c0)={0x2, 0x4e24, @local}, 0x10, &(0x7f0000003780)=[{&(0x7f0000002400)="3ed5184f6d22dcc002bd09fae970ecbd766a2c09e5ab1c66f0d1cd014042cf05aff487571c41de0f7130b8a5580e5d96db0325bf765512f3df694f5ae5157c24f56a8c481bc251b87a6f", 0x4a}, {&(0x7f0000002480)="c6fe28d667c893895e38", 0xa}, {&(0x7f00000024c0)="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", 0x1000}, {&(0x7f00000034c0)="917c9bd0a71e4c6340d4031b74cc43c897e3df2c293f49990e33db6380203d5b1d9db2e3ded004c33c3098019be6218426f3474aeb2eab3a0c0c9aa6fe6ed37595151a76ab875477f5", 0x49}, {&(0x7f0000003540)="fc2f8c5d6a75eb2f4451cb37c01f2623323396d57c0a3e5207e5d119d022fd6bef5b663aca3db52c7490956e789395e5e85fca95d0df5a2c3873f8653282e910d838ae7195a974c388cedc5a527b847aeecf82203e8a622de5c160c36a88738f6403c902543381f7d6b1ba9f73d6bcb5f7f17436f93af3a3071694e7d5942bdf19291a0ddf0debefd16df5bffd8be715a7c559266f4e732bd2af6443fdbc352e9c2997aa818ae93773341bf0e5f5e3098faf2b7af2a5f54c6f00990099ca00330ef494e73621e94c4c74375e46cb7c6135aa257d6e3f66ed81fb8aaf5a97b48970acc426f7441b50c1963c81a18b867d", 0xf0}, {&(0x7f0000003640)="fa3f", 0x2}, {&(0x7f0000003680)="a2000a74ee944d07e46b3c7df7d1944f1df05673a92e03c1729aa2ed98b20515fa6ed70913bb39bf03555cc94c0d147a513cf8526052cff0fbff313fe7af255532a7d5a78afb386155ffbebc06593e874af408f24744b04c574210dabeea50eabde05a62de581edf499cbd6f060d54cd447c5f8998d122604ce699382062342972237e1d88966ad5", 0x88}, {&(0x7f0000003740)="b267a0e2c35051066c3867d99d6a52e22a18", 0x12}], 0x8}, 0x20064000) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000003840)={r0, 0xffffffffffffffff}, 0x4) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000003880)={r15, 0xffffffffffffffff}, 0x4) r17 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000003900)=@generic={&(0x7f00000038c0)='./file0\x00', 0x0, 0x18}, 0x18) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000003b00)=@bpf_lsm={0x1d, 0x7, &(0x7f0000003940)=@raw=[@btf_id={0x18, 0xa, 0x3, 0x0, 0x5}, @ringbuf_query={{0x18, 0x1, 0x1, 0x0, r17}}, @jmp={0x5, 0x1, 0x0, 0x9, 0x2, 0xfffffffffffffff8, 0xfffffffffffffff0}], &(0x7f0000003980)='GPL\x00', 0xfffffff0, 0x47, &(0x7f00000039c0)=""/71, 0x41000, 0x10, '\x00', r8, 0x1b, r0, 0x8, &(0x7f0000003a40)={0x7, 0x1}, 0x8, 0x10, &(0x7f0000003a80)={0x5, 0x6, 0x9, 0x1ff}, 0x10, r9, 0x0, 0x0, &(0x7f0000003ac0)=[r15, r13, r0, r16, r15, r15, r13, r15, r16, r3], 0x0, 0x10, 0x9}, 0x94) 3.00538223s ago: executing program 2 (id=5590): r0 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000280)=@bpf_lsm={0x6, 0x3, &(0x7f00000003c0)=ANY=[@ANYBLOB="18000000003f000000000000000000f195"], &(0x7f0000000140)='GPL\x00'}, 0x80) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETOFFLOAD(r1, 0xc004743e, 0x110e22ffec) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000009c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020148100000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000007000000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='kmem_cache_free\x00', r2}, 0x10) r3 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000200), 0x1, 0x0) ioctl$TUNSETOFFLOAD(r3, 0x4004743d, 0x110e22fff6) write$cgroup_type(r3, &(0x7f0000000280), 0xfffffeed) r4 = bpf$ITER_CREATE(0xb, &(0x7f00000004c0)={r0}, 0x8) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = bpf$MAP_CREATE(0x0, &(0x7f0000000580)=ANY=[@ANYBLOB="06000d00040000000400000012000000000000007ecc341e64", @ANYRES32, @ANYBLOB="0000000100"/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x50) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000340)={0xe, 0x4, &(0x7f0000000400)=ANY=[@ANYBLOB="18020000801000000000000004000000850000002e00"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x40f00}, 0x94) bpf$BPF_PROG_DETACH(0x8, 0x0, 0x10) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000740)={{r7}, &(0x7f00000006c0), &(0x7f0000000700)=r6}, 0x20) sendmsg$inet(r5, &(0x7f0000000980)={0x0, 0x6000, &(0x7f0000000900)=[{&(0x7f0000000640)='U', 0xa00120}], 0x1}, 0x3) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000140)={0x1e, 0x4, &(0x7f0000000000)=@framed={{}, [@ldst={0x1, 0x2, 0x3, 0x2, 0x1, 0x2b}]}, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000540)='rcu_utilization\x00'}, 0x10) close(r4) syz_clone(0x640c7000, 0x0, 0x0, 0x0, 0x0, 0x0) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r9 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000880)={r8, 0xe0, &(0x7f0000000780)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, &(0x7f0000000300)=[0x0], &(0x7f0000000500)=[0x0], 0x0, 0x29, &(0x7f0000000580)=[{}, {}, {}, {}, {}], 0x28, 0x10, &(0x7f00000006c0), &(0x7f0000000700), 0x8, 0x59, 0x8, 0x8, &(0x7f0000000740)}}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000a80)=ANY=[@ANYBLOB="0600000004000000080000000c00000040900100", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=r10, @ANYRES32=r9, @ANYBLOB="0061a9a39700000000000000000004000000000000000000", @ANYRES32=r9, @ANYBLOB, @ANYRES32=r9, @ANYBLOB], 0x50) bpf$MAP_CREATE(0x0, &(0x7f0000000d80)=@bloom_filter={0x1e, 0x6afc4361, 0x20, 0x1, 0x800, r7, 0x4, '\x00', r10, 0xffffffffffffffff, 0x3, 0x5, 0x2, 0x8}, 0x50) r11 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000002c0)={0xffffffffffffffff, 0x0, 0xd, 0x0, &(0x7f0000000100)="e0b9547ed387dbe9abc89b6f5b", 0x0, 0xe160, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1, 0x0, &(0x7f0000000e00)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', r10, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000}, 0x94) r12 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000e00)={&(0x7f0000000440)='percpu_alloc_percpu_fail\x00', r11, 0x0, 0xe}, 0x18) bpf$TOKEN_CREATE(0x24, &(0x7f0000000e40)={0x0, r12}, 0x8) 2.182214743s ago: executing program 4 (id=5604): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000c80)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x0, 0xc, &(0x7f0000000880)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r0, @ANYBLOB="00008b5f44a80712000007100000fb8a35f8ff00080000a2a20000000000000a020000f8ffff009500000059614da58b1f7b720000000072faef889016360dd6f4d20074af0438bbaca006a4848f9b83d0cf0eb64fe8cc310756c91562ebff6b92c53dd0afda0157975dddee87ee212304d6706e7a3d9e"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) perf_event_open(&(0x7f00000010c0)={0x2, 0x80, 0xb9, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xc, 0x7}, 0x410, 0x2000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="0e000000040000000400000009"], 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0xcc, 0x0, 0x0, 0x0, 0x1, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x2, @perf_bp={&(0x7f0000000180), 0x8}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x3, 0x0, 0x1}, 0x0, 0x3, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xffffffffffffffff}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000001480)={'syzkaller0\x00', 0x7101}) close(r1) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000280)='sys_enter\x00', r2}, 0x10) syz_clone(0x40100000, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xf, &(0x7f0000000780)=ANY=[@ANYBLOB="18000000000000000000", @ANYBLOB], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_CREATE(0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="070000000400000008000000"], 0x50) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0xc, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000000000000000000000000000850000007d000000180100002020702500000000002020207b1af8ff00000000bfa10000000000000701"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x38, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={0x0}, 0x18) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="8fedcb790700117df37538e486dd63"], 0xfdef) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x18000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_bp={0x0}, 0xa100, 0xc8, 0x3}, 0x0, 0x3, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) close(r4) recvmsg$unix(r3, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000000500)=ANY=[@ANYBLOB="0a000000050000000200000007"], 0x48) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000780)={0x0, 0x0, &(0x7f0000000540), &(0x7f0000000740), 0x75, r6}, 0x38) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000900000018110000", @ANYRES32=r6, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000005c0)={&(0x7f0000000580)='kmem_cache_free\x00', r7}, 0x10) write$cgroup_subtree(r5, &(0x7f0000000000), 0xfdef) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={0x0}, 0x10) 2.037391047s ago: executing program 3 (id=5605): perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="06000000040000000c00000008"], 0x50) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008008000b70400000000000085"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x40, '\x00', 0x0, @fallback=0x3, r1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f00000002c0)='sched_process_fork\x00', r2}, 0x10) r3 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="02000000040000000800000001"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x0, 0x10, &(0x7f0000000580)=ANY=[@ANYBLOB="18050000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r3, @ANYBLOB="0000000000000000b704000008000000850000007800000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000300)={0x18, 0x10, &(0x7f0000000580)=ANY=[], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000006c0)={&(0x7f0000000700)='kmem_cache_free\x00', r4}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x6, 0x4, 0x1000, 0x7}, 0x50) bpf$OBJ_PIN_MAP(0x6, 0x0, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f00000001c0)=@o_path={&(0x7f0000000180)='./file0\x00', 0x0, 0xc018, r0}, 0x18) syz_clone(0x400, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000380)=ANY=[@ANYBLOB="18000000000000000000000000070000180100002020702500000000002020207b1af8ff00000000bf"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x1f, 0x13, &(0x7f0000000080)=ANY=[@ANYBLOB="18080000d0ff00000000000000000000851000000600000018000000", @ANYRES32, @ANYBLOB="00000000000000006608000000000000180000000000000000000000000000009500000000000000360a02000000910018010000202078250000ff80002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b50a00000000000085000000060000009500000000000000"], &(0x7f0000000000)='GPL\x00', 0x2, 0xff5c, &(0x7f0000000340)=""/222, 0x0, 0x8}, 0x78) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) syz_clone(0x4021400, 0x0, 0x9000, 0x0, 0x0, 0x0) 1.9066201s ago: executing program 4 (id=5607): bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, 0x0, 0x0}, 0x94) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB="1600000000000000040000000100000000000000", @ANYRES32=0x1, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="00000000000000001800000000000000000000000000000000000080"], 0x50) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xe, 0x4, 0x4, 0x5}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000040)='task_newtask\x00', r2}, 0x10) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x20800, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000040)='task_newtask\x00', r3}, 0x10) syz_clone(0x400, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000300)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085"], 0x0}, 0x94) bpf$MAP_CREATE(0x0, 0x0, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000fc0)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r4}, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x21, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x4, 0xe, &(0x7f0000000540)=ANY=[], 0x0}, 0x94) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xf, &(0x7f0000001080)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r5, @ANYBLOB], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, 0x0, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000000)=""/60, 0x3c}], 0x1}, 0x40fd) close(0xffffffffffffffff) bpf$PROG_LOAD(0x5, &(0x7f0000002c40)={0x7, 0xf, &(0x7f00000010c0)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000005000000bf09000000000000b60901000000000065000000000000005f93000000000000b5030000000000008500620d00000000000000000000000095000000000000004edcce575e3b7b863d1d1ef5691b229f5c80e37fae28fd7804fed06c786f9aa1da398a6b38caef97a220c7ab6c9a549282002261be0a98c3d1f9c6e327e3cc7d573b6508d191bdbe6dd2d3093376b525f092a98c0957a316f307a6f160c2b1b9e06d9f3d60cf5860b451845e979832ebe77b0eaaed"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18020000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb703000008000000b703000000000020850000007300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, '\x00', 0x0, @fallback=0x3c, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='kfree\x00', r7}, 0x10) syz_clone(0x630c1100, 0x0, 0x0, 0x0, 0x0, 0x0) sendmsg$inet(r6, &(0x7f0000001580)={0x0, 0x0, &(0x7f0000001400)=[{&(0x7f0000000080)="3bfdd75fa5717852d59a9367444a2130e72cd4dabc8854532cca0c32a5b9f844a4610c7525650ce3d3b76b15026d93e6dee896115e9364066aa3d14e33ef732b4681335c576902153114bdb9c74b538a71115fb1d1a63d1b04129661b29aab89d0be999a6b7c9bea755adedbf305a79f70b71d3d4c98577b49db4963ce89b0def5e840f459659cb6f86d56b069a5de11d601d348ff88ca6e5e2cfe40176880b33e9e8dbc32ba2e6a99b1b50276dc4f06166000d7069a3cc76f", 0xb9}, {&(0x7f0000000180)="892950e2405ee8629d9384a90f16d1706a3e61f305119f95cac0f1927f4c205b971eb41147cb1f86883d6910e68ac3996551800b3ec64b77f8444b18345a2c8b178eeeba0cde7319a5a46bfe7f5770e019efd9d52069edcced33a758c4e657f3a792dc193a1911b4e82ea800ad7afe03c851a8", 0x73}, {&(0x7f0000000200)="a68cde0d56b170df7710b54f17d9a39c4f98f3547190", 0x20000216}, {&(0x7f0000000240)="45e04400f2b383517a08c397dd0a76e67ecfc8e74573c24dedd3a48fb62418c1412fdcd15e888cb0f5d02e77bfecefda6b064c0bb2b66a9a522e63873dde02330510255eec7dfa1af708cdab59fb71eca786a359a2c3b0cbad35144ec5b069c53f90e43339845dc7fd140c55b0149ab38eb27c140f374bcc2c95b0b121d1a9302f3a01b888243b3fc0d46f0de0", 0x8d}, {&(0x7f0000000300)="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", 0xcb3}], 0x5, &(0x7f0000001480)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @private, @multicast1}}}], 0x20}, 0x0) 1.876487893s ago: executing program 2 (id=5608): bpf$MAP_CREATE(0x0, 0x0, 0x48) close(0xffffffffffffffff) bpf$PROG_LOAD(0x5, 0x0, 0x0) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_freezer_state(r0, &(0x7f0000000140), 0x2, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x100000001}, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x2, 0x4, 0x6, 0x5, 0x1000}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000900)={0x2, 0x5, &(0x7f00000000c0)=ANY=[@ANYBLOB="18000000034f0e61000000000000000004000000bb7f1a007600feff000020009500000000000000"], &(0x7f0000000000)='syzkaller\x00', 0x5, 0x93, &(0x7f0000000100)=""/147, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x61e5cc96, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value=0xffd0}, 0x22) 1.757829785s ago: executing program 1 (id=5609): socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) gettid() (async) gettid() (async) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x10, &(0x7f0000000580)=ANY=[], &(0x7f0000000600)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000006c0)={&(0x7f0000000700)='kfree\x00', r0}, 0x10) (async) openat$tun(0xffffffffffffff9c, &(0x7f0000000540), 0x22000, 0x0) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={0x0}, 0x18) (async) bpf$MAP_CREATE(0x300000000000000, 0x0, 0x48) bpf$PROG_LOAD(0x5, 0x0, 0x0) (async) perf_event_open(&(0x7f0000000600)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x80260, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000, 0x3, @perf_bp={&(0x7f0000000300), 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xe, 0xb, 0x0, &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x8000000000000000, 0x8000}, 0x4105, 0x0, 0x3}, 0x0, 0xfeffffffffffffff, 0xffffffffffffffff, 0x0) (async) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) (async) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) (async) bpf$MAP_CREATE(0x0, 0x0, 0x0) (async) mkdir(&(0x7f0000000000)='./cgroup/file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) (async) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) write$cgroup_type(r2, &(0x7f0000000180), 0x40001) (async) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40305829, &(0x7f0000000040)=0x4) (async) bpf$PROG_BIND_MAP(0xa, &(0x7f00000004c0), 0xc) (async) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r3 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x1, 0x1}, 0x28) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, r3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000001c0)={0x12, 0x4, &(0x7f0000000080)=ANY=[@ANYBLOB="1800000000000000000000000000000071122f00000000009500000000000000aa45b763f2b4531577e9b9acc86920b2cf46c5055f01f35147c99b2241cfdfd4caaf1d2862d27c425578935beb434134b6f00b761ec2f1486583"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0xf}, 0x80) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000540)={0x0, 0x4, 0x0, 0x0}, 0x94) (async) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x2, 0x4, 0x4, 0x8, 0x0, 0x1}, 0x48) bpf$MAP_CREATE(0x0, &(0x7f0000000040)=ANY=[@ANYBLOB="0d00000024000000040000000900000000000000", @ANYRES32=r4, @ANYBLOB="0000000000000200000000000000006ecbae5323", @ANYRES32=0x0, @ANYRES32], 0x48) 1.673606223s ago: executing program 1 (id=5611): mkdir(0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="0e00000004000000040000000200000000000000", @ANYRES32=0x1, @ANYBLOB="0000711e174d00"/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x80, 0x0, 0x2, 0x0, 0x0, 0x108, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x2, @perf_bp={0x0, 0x4}, 0x0, 0xc8, 0x7fffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r2) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f00000002c0)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000040)='kmem_cache_free\x00', r3}, 0x10) recvmsg$unix(r1, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r4, &(0x7f0000000280)=ANY=[@ANYBLOB="8fedcb7907001175f37538e486dd630080fc00083300db5b6861589bcfe8875a060300000023000000000000000000000000ac1414aa"], 0xfdef) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000180)={r0, &(0x7f00000000c0), &(0x7f0000000000)=""/10, 0x2}, 0x20) r5 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TUNSETIFF(r5, 0x400454ca, &(0x7f0000000080)={'pim6reg1\x00', 0xe511}) close(r5) mkdir(0x0, 0x0) (async) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="0e00000004000000040000000200000000000000", @ANYRES32=0x1, @ANYBLOB="0000711e174d00"/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) (async) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x80, 0x0, 0x2, 0x0, 0x0, 0x108, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x2, @perf_bp={0x0, 0x4}, 0x0, 0xc8, 0x7fffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)) (async) close(r2) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f00000002c0)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000040)='kmem_cache_free\x00', r3}, 0x10) (async) recvmsg$unix(r1, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) (async) write$cgroup_subtree(r4, &(0x7f0000000280)=ANY=[@ANYBLOB="8fedcb7907001175f37538e486dd630080fc00083300db5b6861589bcfe8875a060300000023000000000000000000000000ac1414aa"], 0xfdef) (async) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000180)={r0, &(0x7f00000000c0), &(0x7f0000000000)=""/10, 0x2}, 0x20) (async) openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) (async) ioctl$TUNSETIFF(r5, 0x400454ca, &(0x7f0000000080)={'pim6reg1\x00', 0xe511}) (async) close(r5) (async) 1.668640184s ago: executing program 0 (id=5612): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x400000, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x5, &(0x7f0000001080)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='GPL\x00'}, 0x48) bpf$ENABLE_STATS(0x20, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000900)={r1, 0x18000000000002a0, 0x10, 0x0, &(0x7f0000000300)="76389e147583ddd0569ba56a5cfd5588", 0x0, 0x0, 0x60000000, 0x0, 0x0, 0x0, 0x0}, 0x50) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="0a00000004000000ff0f000006"], 0x48) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000180)={{r4}, &(0x7f0000000000), &(0x7f0000000080)=r5}, 0x20) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000008c0)={0x6, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @xdp, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000009c0)={r6, 0xf, 0x0, 0x0, 0x0, 0x0, 0xfff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000740)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0xce56fe61a68fc369, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00', r7}, 0x10) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000080)) close(r3) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000029c0)) ioctl$SIOCSIFHWADDR(r3, 0x8943, &(0x7f0000000100)={'syzkaller0\x00'}) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'syzkaller0\x00', 0xca58c30f81b6079f}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r8, 0x8914, &(0x7f0000000080)) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x8, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000070000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000a5df850000002d00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @cgroup_skb, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'pim6reg1\x00', 0x2}) r9 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000300)='qdisc_create\x00', r9}, 0x10) r10 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="19000000040000000800000008"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xb, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r10, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, '\x00', 0x0, @fallback=0xf6644c86763f0d65, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) 1.584372542s ago: executing program 3 (id=5613): bpf$MAP_CREATE(0x0, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000500)=ANY=[@ANYBLOB="0700000004080000080000000100018c0603000000000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x50) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x201, 0x20, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x7}, 0x440, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x6, 0x7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x67152944, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_bp={0x0, 0x2}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000b40)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x800000000001ff, 0x2000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xe}}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x8) sendmsg$inet(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001d80)=ANY=[@ANYBLOB="28010000000000000100000001"], 0x128}, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5c31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x100c, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r2, &(0x7f0000001b00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001d80)=ANY=[], 0x128}, 0x0) recvmsg$unix(r1, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000700)=[@rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @rights={{0x10}}, @rights={{0x10}}, @rights={{0x10}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x1c}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0xc0}, 0x100) r4 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x19, 0x3, 0x0, &(0x7f0000000000)='GPL\x00', 0x5, 0x0, 0x0, 0x41100, 0xc, '\x00', 0x0, @fallback=0x25}, 0x7a) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) ioctl$TUNSETCARRIER(0xffffffffffffffff, 0x400454e2, &(0x7f0000000000)=0x4b) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'veth1_virt_wifi\x00'}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r5, 0x8946, &(0x7f0000000080)) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x8, &(0x7f0000000740)=@framed={{}, [@tail_call={{0x18, 0x2, 0x1, 0x0, r0}, {}, {0x85, 0x0, 0x0, 0x1b}}]}, &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f0000000080)='sched_switch\x00', r6}, 0x18) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000280)=ANY=[@ANYBLOB="9feb010018000000000000003c0000003c0000000a000000000000000000000b02000000000000000300000d00000000000000000300000000000000030000000400000003000000000000000000000500000000000000"], &(0x7f0000000b80)=""/4090, 0x5e, 0xffa, 0x1}, 0x28) bpf$MAP_CREATE(0x0, 0x0, 0x48) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r7 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) close(r7) r8 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000400)={r4, 0xe0, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, &(0x7f0000000040)=[0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x4, &(0x7f0000000180)=[0x0], &(0x7f00000001c0)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x60, &(0x7f0000000240)=[{}, {}, {}, {}, {}, {}], 0x30, 0x10, &(0x7f0000000300), &(0x7f0000000340), 0x8, 0x98, 0x8, 0x8, &(0x7f0000000380)}}, 0x10) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000007c0)={0x2, 0x4, 0x8, 0x1, 0x80, r4, 0x52e, '\x00', r9, r3, 0x5, 0x4, 0x1}, 0x50) ioctl$TUNSETOFFLOAD(r8, 0xc004743e, 0x110e22fff6) ioctl$TUNGETVNETLE(r7, 0x4008744b, 0x0) 1.439980767s ago: executing program 2 (id=5614): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18020000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb703000008000000b703000000000020850000007200000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={&(0x7f00000002c0)='sched_switch\x00', r0}, 0x10) r2 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.throttle.io_serviced_recursive\x00', 0x26e1, 0x0) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000bc0)=ANY=[@ANYRES32=0x1, @ANYBLOB, @ANYRES32=0x0, @ANYRES16=r2, @ANYRES16=r1], 0x48) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000b40)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x800000000001ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xe}}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x9) sendmsg$inet(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001d80)=ANY=[@ANYBLOB="28010000000000"], 0x128}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000001480)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r6, &(0x7f0000001b00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001d80)=ANY=[], 0x128}, 0x0) recvmsg$unix(r5, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000080), 0x100}, 0x0) r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='blkio.bfq.sectors_recursive\x00', 0x275a, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x19, 0x3, 0x0, &(0x7f0000000000)='GPL\x00', 0x5, 0x0, 0x0, 0x41100, 0x8, '\x00', 0x0, @fallback=0x25}, 0x94) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) ioctl$TUNSETCARRIER(0xffffffffffffffff, 0x400454e2, &(0x7f0000000000)=0x4b) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'veth1_virt_wifi\x00'}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r8, 0x8946, &(0x7f0000000080)) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r10 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000680)={r10, 0xe0, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000340)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x3, 0x2, &(0x7f0000000280)=[0x0, 0x0, 0x0], &(0x7f00000003c0)=[0x0, 0x0], 0x0, 0x8e, &(0x7f0000000380), 0x0, 0x10, &(0x7f00000004c0), &(0x7f0000000500), 0x8, 0x65, 0x8, 0x8, &(0x7f0000000540)}}, 0x10) r12 = bpf$MAP_CREATE(0x0, &(0x7f00000006c0)=@bloom_filter={0x1e, 0x200, 0x0, 0x7, 0x4, r10, 0x81, '\x00', r11, r1, 0x1, 0x2, 0x1, 0x1}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, 0x0, &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) unlink(&(0x7f0000000140)='./cgroup\x00') r13 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000a40)={0x13, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="180000000600000000000000070000d85c9d2c670085a620"], &(0x7f0000000380)='GPL\x00', 0xea88, 0x0, 0x0, 0x40f00, 0x24, '\x00', r11, @fallback=0x38, r10, 0x8, &(0x7f0000000480)={0x6, 0x4}, 0x8, 0x10, &(0x7f0000000800)={0x1, 0xa, 0x80000000, 0x3}, 0x10, 0x0, r0, 0x5, &(0x7f00000008c0)=[r12, r9, 0xffffffffffffffff, r9, r3, r4, r10, r7], &(0x7f0000000900)=[{0x5, 0x1, 0xe, 0xa}, {0x3, 0x3, 0xe, 0x6}, {0x1, 0x1, 0x7, 0x4}, {0x4, 0x2, 0x4, 0xc}, {0x1, 0x5, 0x7, 0x9}], 0x10, 0xd}, 0x94) ioctl$TUNSETIFF(r13, 0x400454ca, &(0x7f0000001480)={'syzkaller0\x00', 0x7101}) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0200000004000000080000000700ffff00100000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) 1.439384777s ago: executing program 1 (id=5615): r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1800000000000000000000004b64ffec8500000050000000850000000f00000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='kmem_cache_free\x00', r0}, 0x18) socketpair$tipc(0x1e, 0x4, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000001000)=ANY=[@ANYBLOB="16000000000000000400000001"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0}, 0x90) (async) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000003c0)={{r2}, 0x0, &(0x7f0000000040)}, 0x20) (async) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x27, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f00000002c0)='sched_process_fork\x00', r3}, 0x10) (async) syz_clone(0x10111080, 0x0, 0x0, 0x0, 0x0, 0x0) (async) sendmsg$tipc(r1, &(0x7f0000000540)={&(0x7f0000000380)=@name={0x1e, 0x2, 0x3, {{0x0, 0x4}, 0x2}}, 0x10, 0x0, 0x0, 0x0, 0x0, 0x2aaa12fb1c658c08}, 0x4000041) (async) bpf$MAP_CREATE(0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="0700000004000000080200000e"], 0x50) (async) r4 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x7, [@ptr={0xa}, @fwd={0xe}, @restrict={0x4, 0x0, 0x0, 0xb, 0x1}]}, {0x0, [0x0, 0x61, 0x30, 0x2e, 0x2e]}}, &(0x7f0000000100)=""/74, 0x43, 0x4a, 0x1, 0x5}, 0x28) (async) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000002c0)=@base={0x2, 0xb, 0x42, 0x9c}, 0x50) (async) r6 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x55, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x1000000000000, 0xffffffffffffffff, 0x0) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000000b00)=ANY=[@ANYBLOB="850000002a00000025000000000000009500000000000000afcd48d6493790710000000000080000b2c6161dba392176dd2963038e1d69ba7ea94c500dc4ef2fad96ed406f21caf5adcf920569c00cc1199684fa7c93836d9ea2cfb0e60436e05425cc4686b066707de94a4f4d5fc79c987d669f381faca0f9d9924be41a9169bdfaf16da915b2e249f21c6eee84309e7a23c19a394830f2539fcb4e0b6eab1aa7d55545a34effa077faa55c59e88254f54077f799bf168301000000bfb1c0e6b1244d35b213bda84cc172afcc2e47a7d8b85a5e3d77ac463920e231b7ae0da8616d2b7958f91f5da6c025d060ab186d94af98af1da2b5952eb15855933a212304e035f7a35dfc72c81256a55a25f8fe3b28d7e53c78fbb888b0255f347160ec83070000000000004015cf10453f6c0b973b81a484ebad04859d928365a7ea3fab2e4b380a00d72bc0480f94479757306720399379d9271cf555c14d56b51c2298237bebfc08e0d5976a942b844139f1111f2dc5e46ac1c60a9b030074bfbcd4b09012175484135f0e519f0b1e4aaa026d570ecb5e8cddbed65ff702000000a3ff4f8a4cf796b07a6ff61c5552417fd703f7f14d8b78a602ca3cdf6a662d8bc9c89c9120072a5d00dcdd8595356c9b2492aaf1264d4ef4a410c882834867bcd2b6e558d17879570c8ad943e392955f4f979ea13201bafe4f0f6ea508000000a0c548552b571bed5647323478a996810000000571cbb17d9f37282462f0e9c147c0d497c61433c6ccc35601eef97ee611be8c97f4151fcda6cb799c6e924966a7f90bf8fd1e75ee76bd72346cfbb526894aa7fe5e68949a3b304723177d356c4604bca492ecec37e83efceefd78a2533659edc8bef9cb85451c6a145074343caea5c4bf690441974b155f5adc681a03c0bbb8358856175e2ce8b0cbbbe3c033e54ffcebde1d9d3d350000000000000000e0f209150a07682c4e14e3a83558df6f3fc97f1730a136bdee07e98cb984b2e2304a1b63afefdb636e56bbaae4e62136574bc6371a0bb2be1a962aae9c1258da6ef590e1d85ea9e12b3025f43e7e08ccffc5064dea4c39cf4b98e1fc6efb5978f51e16b678eca0b658a56008948e5a61561a9845e4ff29e2bd43b5b923b272341c5e093fd66a2946501559335781092cf8ce987c56cd31121624d7455f2a3666276c3c0e812b28e2f30d035cee5d0e77a3c72208ec651cc0ae637fa474816bc59d2e2a00092419304b338a987e9d3044d856ce24f370030be3b5f79f030b8d3ebcef5af469abe753314fae31a09c3a041a1e7b55c4e81dba1e12289ee34463aaf28345bde0c195bc9f022ca8ce37ed85464c31679053e7f9d04bb5cb51da0b7958989fd70f241262d0af3246eb4fc4bda345360200000001fbddeacd3adaa4d2715e21c772ccd44341f7fd53df58ae791ee8b489a7c9efe3625a9d971b5997485d6a063dc6f7359e2eccc2fb39d419de1a7b5c9dc22c96295a0600adf59d44e58eb1c60b3475be31a9b7cf42b6402312d2725b8d9fa7000008000000000000117ca65fc86c2dce97aa03279a66ec87122219b0f796ab92b1adecae50fdb408c8a80f7f02f750d6c977a1919f9f69a6cfefdf879d447df53f3b9b70d10355b07466d1ef0056b5af553d18a6cd50feeb7bfad9b7be3283b6450d34264e7712d2f1d7004548b19162cef04d18d4f5987baab97a9bfbd8f185b5a71e0d7696caba172745c7dd919ffb631820420b75b6522c0e21c882c66f4f25ffb6d95e07e068000000000000eb5b63e45d5d80fe52734093ae5aa3c0b4f3f45bfff201000000000000002e31560e5b741445ea2a1acee2e98c9f3427834ba0a765d20b30f87af976a46f9a9a1ac7dea1ea6845f9aa66237e0dacc107f532348cc2116473381e961f3d9c8c21578fe3245097c280abe51427b9f6cd72b5da6d0252803c66730cd5eac907f09b9695906313f8873522608c6f0100000000000000f721303e6b89e5c54d680ac66d09af90dbf50ee69a39265964279d174b0000000000000000000000fa08ad0731ba49fbf981f8265e7f1f4c2d97f4680b135f87c228ce69418a282b6caa2481a0df1774fa7d94944bb92d2b89f73f0e8b63f6316c5762f3288bc970720f48b5647dd177db6810fae0533496b6d58da50ee80a6b9a7438978c5465113f668eb4484350048289d07dbef325d3221a7cb35f812f257941a9781e3214c2a3dcf89d99844b762a9cf17548c54fccad2c7ae8072b82e0880815daf966bd5343c1635e123f868a7167cfcff33320253af570f4ef9c0254afdd89ac3943562b530dd88da8a94013bbaf204bebc38055adc39f07f7c22711f4d1f6dcc928d1578a093c072e0b92babc76f47ee367e745a024a2278319d9a4d1378482b74c516647652bfb6e93002494a5cd74e2a9a4734487062437da23e1efa6ef7674108aaa3ffac859c3577c2637bb3bdc69bc365b1f20dba96b8acca62f3f80045318de0facf2ed44b814e842c2a520159bb6c320cec0910c0b8bd3d547bdfba2e09d24d117ed0388afd37affbad2f9c77c9c1314a16ffe64f5e3744a2fffd7039670f5706e589a4c3868db06fd892d68a547477f8ef686ff0dba7b8c18c94d5a89b0567a851750a35d9cc2217db890d89385fcaa00f0f2e524672e6f4c8bedfd5da5b157709b8265cf511dc5846ab1d85916c4a6b2d1b408575982e11230cbac0a9c6eaa03c945645581f678403c2a936c53ae72940aa92bcf22b82c6bc028e0acdddf9fef595f0f7a9f80c0e4c659ced769ec463d26a81e468846761a8e1efd6a031ab7adc8665e267be0065cc315aa23012423ec8b8492d9b50fa4d8c5891959b761eec6dc988532782fda13239c948e27853606e26225c796b79cc04f3d1a5a13000000001e301d82a27010d3ac6119d2b12caf282413672d20c852c50084d7b2d50754775ed63bc18023c31351af76e24788d96103455693b34e09a163a9f613a7e5530222cebd7fa0fbff32dc98088f9fab33648cc38e87dd2dd6ee157f5f018702696915661715c979b7796d4f101a257688af7c148e8615c938c4ca8a69f6fc585ec1dd1857a501f90b161eff23181a11a2b0da4c58d459cbf9db"], &(0x7f0000000000)='GPL\x00', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r6, 0x40042408, r7) (async) ioctl$PERF_EVENT_IOC_QUERY_BPF(r6, 0xc008240a, &(0x7f0000002480)) (async) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000500)={r5, &(0x7f00000004c0)}, 0x20) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000000)='scmi_xfer_end\x00'}, 0x18) (async) syz_clone(0x4021400, 0x0, 0x9000, 0x0, 0x0, 0x0) (async) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000800)={r7, 0xe0, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, &(0x7f0000000340)=[0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x9, 0x3, &(0x7f0000000580)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000400)=[0x0, 0x0, 0x0], 0x0, 0xcd, &(0x7f0000000600)=[{}, {}, {}, {}], 0x20, 0x10, &(0x7f0000000640), &(0x7f0000000680), 0x8, 0x55, 0x8, 0x8, &(0x7f00000006c0)}}, 0x10) (async) r9 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="17000000000000000086000001"], 0x48) bpf$MAP_DELETE_ELEM(0x15, &(0x7f0000000400)={r9, 0x0, 0x20000000}, 0x20) (async) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000840)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x7d, '\x00', r8, r4, 0x4, 0x3, 0x4}, 0x50) 1.421724879s ago: executing program 1 (id=5616): bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000140)={0x17, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="1800000000000000000000100000000079102000000000239500000000000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24}, 0x94) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000240)=ANY=[@ANYBLOB="090000000800000004000000094000000a"], 0x48) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000b40)={0x11, 0x8, &(0x7f00000017c0)=ANY=[@ANYBLOB="620af8ff0c200021bfa100000000000007010000f8ffffffb702000003000000bd120000000000008500000006000000b70000000000000095000000000000003faf4f2aa3d9b18ed812a2e2c49e8020a6f4e0e4f698393aa0f3881f9c24aa56f15199fad0093c59d66b5ece9f36c70d0f13905ea23c22624c9f87f9793f50bb546000677b0c5077da80fb982c1e9400e693146cea484a415b76966118b64f751a0f241b072e90080008002d75593a286cecc93e64c227c95aa0b784625704f07a72c234664c0af9360a1f7a5e6b607130c89f18c0c1089d8b853289d01aa27ae8b09e00e79ab20b0b8e1148f49faf2ad0000000000000006fa03c6468972089b302d7bf6023cdcedb5e0125ebbc08dee510cb2364149215108333719acd97cfa107d40224edc5467a932b77674e802a0d42bc6099ad238af770b5ed8925161729298700000080006ef6c1ff0900000000000010c63a949e8b7955394ffa82b8e942c89112f4ab87b1bfeda7be586602d985430cea0162ab3fcf4591c926abfb076719237c8d0e60b0eea24492a660583eecdbf5bcd3de3a83209da17a0faf60fd6ad9b97aa5fa68480366c9c6fd6fa5043aa3926b81e3b59c95c25a573dc2edcaea2b1a52496dfcaf99431412fd134a996382a1a04d5bb924cfe5f3185418d605ffff9c4d2ec7c32f2095e63c80aff9fa740b5b7632f32030916f89c6dad7603f2ba2a790d62d6faec2fed44da4928b30142ba11de6c5d50b83bae613402216b5054d1e7c13b1355d6f4a8245ffa4997da9c77af4c0eb97fca585ec6bf58351d564beb6d952aab9c70764b0a8a7583c90b3433b809b5b9fbd48bc873495cbff8a326eea31ae4e0f7505ebf6c9d13330ca006bce1a84521f14518c9b476fccbd6c712016219848624b87cec2dbe98223a0eb4fa39f6b5c02e6d6d90756ff57902a8f57000000009700cf0b4b8bc2294133000000000000000000030000000000000000000000000010008bc0d9559711e6e8861c46495ba585a4b2d02edc3e28dd271c896249ed3957f813567f7a95435ac15fc0288d9b2a169cdcacc413b48dafb7a2c8cb482bac0ac559eaf39027ceb379a902d9ba96ffffff7f0000100000000000007d5ad897ef3b7cda42013d53046da21b40216e14ba2d6ad5656bfff17addaedab25b30002abbba7fa725f38400be7c1f001b2cd317902f19e385be9e48dccff7a1ef3282830689da6b53b263339863297771429d120000003341bf4abacac94500fca0493cf29b33dcc9ffffffffffffffd39f6ce0c6ff01589646efd1cf870cd7bb2366fdf870ce5dfd3467decb05cfd9fcb32c8ed1dbd9d10a64c1083d5e71b5565b1768ee58969c41595229df17bcad70fb4021428ce970275d13b78100788f11f761038b75d4fe32b561d46ea3abe0fa4d30dc94ef241875f3b4ce0232fcea69c271d7fa29822aea68a660e717a04becff0f719197724f4fce1293b62d7e8c7123d8ec571be54c72d978cf906df0042e36acd37d7f9e119f2c06f815312e0cfe222a06f56dd000c074eb8a322fb0bf47c0a8d154b405c37feaf3dd95f6ef2acd1fe582786105c7df8be5877050c91301fb997316dbf17866fb84d4173731efe895ff2e1c55ef08235a0126e01254c44060926e90109b598502d3e959efc71f665c4d75cf2458e3542c9062ece84c99a861887a20639b41c8c12ee86c50804042b3eac1f879b136345cf67ca3fb5aac518a75f9e7d7101d5e186c489b3a06fb99e0aa7f23a054de2f4d92d6bd72ee2c9fdc74aaaf1e3e483b4ad05573af40326993947d9a631bcbf3583784acbda216550d7ad333545794f37331766e472391e358c3b377327ac9ecc34f24c9ae153ec60ac0694dc55bff9f5f4df90400000000000000d6b2c5ea139376f24285bf16b99c9cc0ad1857216f1a985f369191ae954febb3df464bfe0f7f3ee9afe7befb89d2777399f5874c553aeb3729cffe86e66964ae09bb6d163118e4cbe024fd4500f8ff070000001e48418046c216c1f895778cb25122a2a998de0842a486721737390cbf3a74cb2003016f1514216bdf57d2a40dddb51ab63e96ec84ac3571f02f647b3385b3b8a8c9ae3d14f93100c2e0893862eef552fcde2981f48c482bde8a168c3f5db2fea6f26e4a4304e50c349f4f9ecee27defc93871c5f99b355b72d538ba2f58ea8e4aa37094191e10096e7e60fc3541a2c905a1a95e9571bf38ae1981c4238ecaee6f75cd0a6881bd1517a8250df986741517abf11389b751f4e109b60000000000000000d6d5210d7560eb92d6a97a27602b81f76386f1535bef1497f92186086e29c6bc5a1fad6ec9a31137abf9a404abde7750898b1bd627e87306703be8672d70d1ab57075228a9f46ed9bd1f08fb8191bbab2dc51de3a61f0868afc4294859323e7a45319f18101288d139bd3da230ed05a8fe64680b0a3f9f2dd704e4214de5946912d6c98cd1a9fbe1e7d58c08acaf30235b9100000000a55f74a23641f61f2d5b308cf0d031b0c7f0ced69993e9960ff5f76015e6009756237badf4e7965bbe2777e808fcba821aa8e8c5c39609ff854356cb4900000000000000000000000000c1fee30a3f7a85d1b29e58c776f4b4ce07e1c6fa66fcfc7a228805f76785efc0ceb1c8e5729c66418d169fc03aa18854693ad2a182068e1e3a0e2505bc7f41019645466ac96e0d4b3bc19faa5449209b083dbd334b47f067bbab40743b2a428f1da1f68df75cf43f8ecc8d3726602111b40e761fd21081920382f14d12ca3c3431ee97471c7868dcda7e478950aa69eb7f7f80572fdd11bb1d0d1280fbc22bf73468788df51710d7d31c632fc5ed1762eb0b428ee751c47d8e894f745a868404a0bf35f0121008b722b1eaa6aedfa1bf2e7ccb2d61d5d76331945e20fa26b8471d42645288d7226bbd9c9e9e1cc9eb3d541e407cc2dae5e690cd628ab848753203b458b97ec1afb079b4b4ba686fcdf240430a537a395dc73bda367bf12cb7d81691a5fe8c47be395656a297e9df0e71f96756ea5cce7db3c4be290159f6bcd75f0dda9de5532e71ae9e48b0ed1254a83100000000f6fbb869604d51a36a54c832e45b2569dc0d90b075225fde44c4e0973171ad47d6b70ebc660309e1e245b0fdf9743af932cd6db49a47613808bad959719c0000000000378ac2e24c7e800003c9e8095e02985f28e678f66422436f949e2ab8f162d7e3f855e378f4a1f40b0c6fb2d4b205a800b6d713acebc5b014e61a543a5a194f9ac18d76b5440e3b1a569e7397f6ca0400966d7ba19e720413267a6ccea9c439671d2c680f2753ca184eeeb843450368acb4383a01d25eb3d1e23e0f2645d1cdfa9fa410632f95a5f622f851c66ee7e3030108000000000000c4f93c0984b5c2d4523497e4d64f95f08493564a1df87111c9bffef97dcecc467ace456597685c5870d05f88a0f463db88d377442e1349acaf766218b54a9d624778e1c4cba6e6390a9f302c6eb2df7766411bef0ebb5000000000006065d6735eb7a00e127c0000000000000000000000bfb0bba79344643b1d8daa9f38e4b62c1e2af68c6f5054b078acd74b4a9c944e4505da485a3a4154387a0a88370d9ed9467b09c5888a06431df3f68abf0b366c4d5f8bea7b29c257ed756dff7a21c6b661cbdd43de65afd7f661d5c84f915c90e3d6ea012b68b787eb01d8320000000000000060176dacba0ec503a37fae6b472ec369c79ee6a420c0fd8d8d82fe136d5af6c30bfeb0a7275babfdb96a127aa9386e0671c6454245a18c1c8c49552cff5d27b547cdc34c0858c77a47a9ff86ee9fbd9ceda428716a4218821176d8067997527230fa67d26950d3e4f2750fa7c872874ad3a2d11f9f6eb08e6d7b6fa257b04d8ce36360f524e3dfd2211641f3d2637d86b80681eca50ce0eecafdd22d41fa515c15591e70ded4b70efac3cb42fb352d82e8f7573e8ed8248da356fa91a252976d3a4d8c1843a8d5bb7f5f1028453a0562a3ea93117076dd4940b7df50d78289fe66197525f6095f8662d232970bef61b03fa83027963a1a2e07cfee30c0d0b4c5877f93b3637ca21eab5afcf5d4638dfe8f9202aaad51c979049dd76d65368cbd4187d9f74257c7c4a23ac4a34eec5aa17e78c5167216f5e72138d20f8325dd5f8f96c32189c904eaef580987f1ce601a7cdc35461db9981ac42f9e24b0699bbe4e3d986e38952b0b7938eefd9e7a292bbb66367ad77045fdc18855c81c031dedd185c723238373fc698d676791d04f1ff5f0825a6619e844882f31ed190233d58ecee949e310bf2b1a51b8a33ae65a06d2b6ad386bf8dc49dd328bcd75d1843a13d68560175a18af7efc3c0f20e32f84f6aaaf000000000000000000000013a6c66bce74a8fb9092023df695da2714a7933d699d42de2bc4a85e0a0e22228290a7a7553ab93a16e42553ed86869a02df2f47d4088fac1772d3cd955c81cbf91c2ca7942942f61723b558079b82547844f92df2499c4b2c2ef2539e5daa8d8727baaa6b5755e6f83bbfca000000000000000000000509619f5f0cbc72eebc653946d3552236f0dfe485cfa71bd69f4ded6e131128c3875b785875addfcbd5931c12adbef75535e694f3a19f28f9f99fa32e8ff66e7b1ff674434fb63ba0e28aadccf77d387525c98e81476058c958eaccfa7d251d0671222dc9d06485f7f690d3d4227bd21bd7ff8338617705b7faec47c86789a488b43d0fedf1b0ee05d65c677ced1e8214b2f6cb74d73886eb"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0xffffffffffffff7e}, 0x48) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000080)='sched_switch\x00', r0}, 0x6d) bpf$MAP_CREATE(0xc00000000000020, &(0x7f0000000840)=ANY=[@ANYBLOB="0d00000002000000040000000240000000000000fedfd79d4d41ee13f48b8d750440fb5f14fdd51f366868aae15326c5c3a0c4ef94f7b7cf3dcf682a04ca9341ce4315739817276a0830470539935059246d5d1a6692a6db473ab0c99bd70174e5e36581e42c1d11a60cf3f711051de68256798423d7ed0c834402ad85e71460c0a84a6420d38ad79511c1165195ae78e5e1a8176a5d9c7f29d19142f104a656461ee97e1c2d7a8d4f0bffedc8907e374102cb0e0cf4ce28f0299065722964337fde63d164e4576d8df9c40df05f40b1ef9f4f93d2d50a5e881a74a11fb8f5ef0c147917a29f7cf7460695b91800"/249, @ANYRES32=0x1, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="000000001100"/28], 0x50) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="1b00000000000000000000000080000000000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="0000000000000000000000000000000000000000000000000000c200"], 0x48) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f00000006c0)='sched_switch\x00'}, 0x10) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000080)={{}, &(0x7f0000000000), &(0x7f0000000040), 0x2}, 0x20) r1 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x10020, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc, 0x0, @perf_bp={&(0x7f0000000180)}, 0x13240, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000540)={0x5, 0x80, 0x6, 0x44, 0x1, 0x0, 0x0, 0x3, 0x60014, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x3, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, @perf_config_ext={0x3, 0x81}, 0x20, 0x200, 0xfffffff9, 0x4, 0xc, 0x0, 0x200, 0x0, 0x40, 0x0, 0x3}, 0x0, 0xf, r1, 0x2) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000140)={0x9, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="1800000000000000000000000000000079122800000000009500000000004000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0xd}, 0x80) openat$cgroup_devices(0xffffffffffffffff, 0x0, 0x2, 0x0) mkdir(&(0x7f0000000000)='./cgroup/../file0\x00', 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r3 = openat$cgroup_ro(r2, &(0x7f0000000200)='pids.current\x00', 0x275a, 0x0) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r5 = openat$cgroup_subtree(r4, &(0x7f0000000200), 0x2, 0x0) write$cgroup_subtree(r5, &(0x7f0000000400)=ANY=[@ANYBLOB='-cpu'], 0x5) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8914, &(0x7f0000000000)={'veth0_vlan\x00', @remote}) socketpair(0x1, 0x2, 0x0, &(0x7f00000002c0)) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) socketpair(0x10, 0x800, 0x6, &(0x7f0000000080)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r6}, 0x10) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000009c0)={0x6, 0x0, 0x0, &(0x7f00000004c0)='GPL\x00', 0x800, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, 0x25, r3, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x5, &(0x7f0000000780), &(0x7f00000007c0)=[{0x2, 0x2, 0x3, 0x5}, {0x3, 0x3, 0x9, 0x3}, {0x4, 0x5, 0x10, 0x6}, {0x2, 0x4, 0x3, 0xb}, {0x4, 0x5, 0x2, 0x1}], 0x10, 0xb}, 0x94) socketpair(0x1, 0x5, 0x0, &(0x7f0000000000)) 1.301769661s ago: executing program 0 (id=5617): r0 = perf_event_open(&(0x7f0000000500)={0x5, 0x80, 0x0, 0x7, 0xfe, 0x0, 0x0, 0xffff, 0x10020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_bp={&(0x7f00000004c0), 0x9}, 0x0, 0xfffffffffffffffc, 0x2, 0x0, 0xe9c, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0x80000000003, 0xffffffffffffffff, 0x3) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000002c0)=ANY=[@ANYRES32=r0, @ANYRESHEX=r0], 0x48) bpf$MAP_CREATE(0x0, &(0x7f0000001780)=ANY=[@ANYBLOB="0b0000000500000008040000cd00000001000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="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"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0500000004000000ff0f000005"], 0x48) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r3}, 0x10) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000280)={{r2}, &(0x7f0000000180), &(0x7f0000000200)}, 0x20) perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x90430, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff, 0x0, 0x1}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x3) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.swap.current\x00', 0x26e1, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x12144, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x4, @perf_bp={&(0x7f0000000080)}, 0x0, 0x0, 0x0, 0x8, 0x0, 0x1}, 0xffffffffffffffff, 0x1, r0, 0x0) perf_event_open(&(0x7f0000000380)={0x4, 0x80, 0x1, 0x0, 0x0, 0x2, 0x0, 0x0, 0x34000, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x100, 0x4}, 0x0, 0xc8, 0xfffffffe, 0x0, 0x9, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="07000000040000000802000074"], 0x50) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x8, &(0x7f0000000740)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r6, @ANYBLOB="0000000000000000b703000000040000850000001b000000b70000000000000095"], &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r8 = bpf$MAP_CREATE(0x0, &(0x7f0000000840)=@base={0xb, 0x5, 0x2, 0x4, 0x5}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x0, 0x27, &(0x7f0000001980)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r8, @ANYBLOB="0000000000000000b7080000010000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000020000008500000082000000db0afcffcc2ec34a8500000041000000063a05000000008018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000e6ff00bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000082000000b7080000000000007b8af8ff000000c91311b1345ca84cff7b8af0ff00000000bfa100000000000007010000f8ffffffbfa40000000000000704b42b7521ffffb70200000800000018017c00000000005f46f4cb4c", @ANYRES32=r1, @ANYBLOB="0000000000000000b70500000800000085000000a50000008500000069000000850000006a0000009500000000000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1b, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x94) r9 = bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000080)='percpu_create_chunk\x00', r9}, 0x18) r10 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={0x0, r10}, 0x18) bpf$MAP_CREATE(0x0, &(0x7f0000000840)=@base={0xa, 0x101, 0x7fff, 0xcc}, 0x48) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000580)={r8}, 0x4) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000300)='fib_table_lookup\x00', r7}, 0x18) bpf$PROG_LOAD(0x5, 0x0, 0x0) r11 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000b80)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x222}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r11, 0x18000000000002a0, 0xe28, 0xfffffffffffffff5, &(0x7f0000000980)="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", 0x0, 0x2f, 0xe8034000, 0xf000, 0xfffffffffffffe2a, &(0x7f0000000000), &(0x7f00000000c0)="c6769e45b7c61302926682c7f9e9bb5ba2b3cdf023e8da0392a4cd62e2370f25ae5ba0dab896bcf5b774cd28bebbde39f796ae27d04582bb7c03e9fe830ea22c9fd03f6d2779515fdad3f5d0de07b7b70996102fdb67b1e77a34a5b7136a212fa2c0ea502588309dc3e42c55a6f93e6ba5e1b492f9db48f0fdd2f9fb937b3e8a63dcf9dd855837433998ba579da27559", 0x5dc}, 0x28) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000b40)='neigh_create\x00', r5}, 0x10) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="8fedcb7907001175f37538e486dd6317ce22000000fffe8000000000000010"], 0xfdef) 1.155899315s ago: executing program 1 (id=5618): setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x1d, 0x0, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x1a9) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000", @ANYRES32, @ANYBLOB="0000000000000000b70800000d0000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x7fff, 0x0, 0x0, 0x41000, 0x40, '\x00', 0x0, @fallback=0xa19c6d0251f404ea, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000740)=ANY=[], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000900)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB='\v\x00\x00\x00', @ANYRES32, @ANYBLOB="0000000000000000b708000008"], 0x0, 0x10002, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) syz_open_procfs$namespace(0x0, &(0x7f0000000300)='ns/mnt\x00') bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f00000004c0)={r0, &(0x7f0000000340), &(0x7f00000005c0)=""/155}, 0x20) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r0], 0x0, 0x2, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0, 0x0, 0x0, 0x0}, 0x94) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x6, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000f00000018010000646c6c2500000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000095"], 0x0, 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x17, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x10}, 0x94) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000002c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffff89, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000780)=ANY=[@ANYRES32=r0, @ANYRES32=r3, @ANYBLOB="060000002100000000000000", @ANYRES32=r2, @ANYBLOB, @ANYRES64=0x0], 0x20) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='kmem_cache_free\x00', r4}, 0x10) perf_event_open$cgroup(&(0x7f0000000340)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x10, 0x7a}, 0x10408, 0x0, 0x1}, 0xffffffffffffffff, 0x2, 0xffffffffffffffff, 0x0) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000180)='sys_enter\x00', r5}, 0x10) recvmsg$unix(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={0x0}, 0x18) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f00000001c0), 0x2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000500)='btrfs_flush_space\x00'}, 0x18) bpf$TOKEN_CREATE(0x24, &(0x7f0000000000), 0x8) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000540)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000500)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x36, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r7 = gettid() bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f0000000300)='sched_switch\x00', r6}, 0x10) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x8}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(r7, 0x0) syz_clone(0x640c7000, 0x0, 0x0, 0x0, 0x0, 0x0) 1.130117108s ago: executing program 3 (id=5619): bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x11, 0x13, &(0x7f0000000080)=ANY=[@ANYBLOB="18080000000000000000000000000000851000000600000018020000", @ANYRES32, @ANYBLOB="00000000000000006600020000000000180000000000000002000000000000009500040000000000360a020000000000180100002020782500000000002020207b1af8fe00000000bfa100000000000007010000f8ffffffb702000008000000b50a00000000000085000000060000009500000000000000"], &(0x7f0000000000)='GPL\x00', 0x2, 0xff5c, &(0x7f0000000340)=""/222}, 0x78) 1.091050372s ago: executing program 2 (id=5620): perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x40, 0x0, 0x1, 0x0, 0x0, 0x4, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3d, 0x0, @perf_config_ext={0x5e, 0x1}, 0x4b0, 0xc8, 0x0, 0x2, 0x1000000000003}, 0x0, 0x1, 0xffffffffffffffff, 0x0) syz_clone(0x40000000, &(0x7f0000000280)="2a30053e1c3176348270ca8b9180188fc835645c38b5c342fa86e88edfa65351a46a96741fb8b27eb7a0bbf51c48d5e453c0f1988ab9e8ce16", 0x39, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r1) recvmsg$unix(r0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r2, &(0x7f0000000280)=ANY=[@ANYRESOCT=r1], 0xfdef) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x40, 0x0, 0x1, 0x0, 0x0, 0x4, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3d, 0x0, @perf_config_ext={0x5e, 0x1}, 0x4b0, 0xc8, 0x0, 0x2, 0x1000000000003}, 0x0, 0x1, 0xffffffffffffffff, 0x0) (async) syz_clone(0x40000000, &(0x7f0000000280)="2a30053e1c3176348270ca8b9180188fc835645c38b5c342fa86e88edfa65351a46a96741fb8b27eb7a0bbf51c48d5e453c0f1988ab9e8ce16", 0x39, 0x0, 0x0, 0x0) (async) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)) (async) close(r1) (async) recvmsg$unix(r0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) (async) write$cgroup_subtree(r2, &(0x7f0000000280)=ANY=[@ANYRESOCT=r1], 0xfdef) (async) 1.018983849s ago: executing program 0 (id=5621): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000001d80)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f0000000540)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b702000003000000850000008600000095"], &(0x7f0000000380)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000840)=@base={0xb, 0x8, 0x2, 0x4, 0x5}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000380)={{r1, 0xffffffffffffffff}, &(0x7f0000000b00), &(0x7f0000000300)}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r2}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x2}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$tipc(r4, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000a40)="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", 0x5a9}], 0x1}, 0x0) setsockopt$sock_attach_bpf(r3, 0x1, 0x21, &(0x7f0000000540), 0x4) sendmsg$tipc(r4, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, 0x0) 1.017456369s ago: executing program 3 (id=5622): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="01000000060000000600000005"], 0x48) socketpair(0x2a, 0x800, 0x4, &(0x7f0000000040)) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x14, &(0x7f0000000180)=@framed={{0x18, 0x0, 0x0, 0x0, 0xfffffffc}, [@printk={@i, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0xfffffffd}}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, r0}, {}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x3}}]}, &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x3, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r2 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x11, 0xf, &(0x7f0000000340)=ANY=[@ANYBLOB="18000000000000000000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7020000140000e5b7030000000000008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000000000008500000084000000b70000000000000095"], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000000)='sched_switch\x00', r3}, 0x10) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0e000000040000000800000008"], 0x48) r4 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000000)='tlb_flush\x00', r1}, 0x10) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000a40)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xa, 0x6, &(0x7f0000000000)=@framed={{0x5, 0x0, 0x0, 0x0, 0x0, 0x73, 0x11, 0x41}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @call={0x85, 0x0, 0x0, 0x76}, @exit], {0x95, 0x0, 0x5a5}}, &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x6}, 0x70) socketpair(0x8, 0x6, 0x9, &(0x7f0000000400)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xa, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r7, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000005c0)={&(0x7f0000000580)='kmem_cache_free\x00', r8}, 0x10) sendmsg$unix(r6, &(0x7f0000000040)={&(0x7f0000000340)=@file={0x1, './file0\x00'}, 0x6e, 0x0}, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000380)={r5, 0x18000000000002a0, 0xe40, 0x0, &(0x7f00000002c0)="f6eb094549002060009b8538a4ba", 0x0, 0x0, 0x60000000, 0x0, 0x0, 0x0, 0x0}, 0x50) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r4, 0x4008240b, &(0x7f0000000500)={0x0, 0x80, 0x4, 0x9, 0xf, 0x4, 0x0, 0x3, 0x40000, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0xffff8001, 0x4, @perf_bp={&(0x7f0000000300), 0x2}, 0x100000, 0x3, 0x5, 0x9, 0x2, 0x7, 0xfb, 0x0, 0x8, 0x0, 0x101}) 980.975163ms ago: executing program 0 (id=5623): perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="06000000040000000c00000008"], 0x50) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008008000b70400000000000085"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x40, '\x00', 0x0, @fallback=0x3, r1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f00000002c0)='sched_process_fork\x00', r2}, 0x10) r3 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="02000000040000000800000001"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x0, 0x10, &(0x7f0000000580)=ANY=[@ANYBLOB="18050000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r3, @ANYBLOB="0000000000000000b704000008000000850000007800000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000300)={0x18, 0x10, &(0x7f0000000580)=ANY=[], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000006c0)={&(0x7f0000000700)='kmem_cache_free\x00', r4}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x6, 0x4, 0x1000, 0x7}, 0x50) bpf$OBJ_PIN_MAP(0x6, 0x0, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f00000001c0)=@o_path={&(0x7f0000000180)='./file0\x00', 0x0, 0xc018, r0}, 0x18) syz_clone(0x400, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000380)=ANY=[@ANYBLOB="18000000000000000000000000070000180100002020702500000000002020207b1af8ff00000000bf"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x1f, 0x13, &(0x7f0000000080)=ANY=[@ANYBLOB="18080000d0ff00000000000000000000851000000600000018000000", @ANYRES32, @ANYBLOB="00000000000000006608000000000000180000000000000000000000000000009500000000000000360a02000000910018010000202078250000ffb0002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b50a00000000000085000000060000009500000000000000"], &(0x7f0000000000)='GPL\x00', 0x2, 0xff5c, &(0x7f0000000340)=""/222, 0x0, 0x8}, 0x78) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) syz_clone(0x4021400, 0x0, 0x9000, 0x0, 0x0, 0x0) 847.259276ms ago: executing program 4 (id=5624): bpf$MAP_CREATE(0x0, 0x0, 0x48) close(0xffffffffffffffff) bpf$PROG_LOAD(0x5, 0x0, 0x0) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_freezer_state(r0, &(0x7f0000000140), 0x2, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x100000001}, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x2, 0x4, 0x6, 0x5, 0x1000}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000900)={0x2, 0x5, &(0x7f00000000c0)=ANY=[@ANYBLOB="18000000034f0e61000000000000000004000000bb7f1a007600feff000020009500000000000000"], &(0x7f0000000000)='syzkaller\x00', 0x5, 0x93, &(0x7f0000000100)=""/147, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x61e5cc96, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value=0xfffe}, 0x22) 754.109655ms ago: executing program 3 (id=5625): bpf$PROG_LOAD(0x5, &(0x7f0000000600)={0x11, 0xc, &(0x7f0000000440)=@framed={{}, [@printk={@ld, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x7}}, @call={0x85, 0x0, 0x0, 0x8}]}, 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000002ec0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000000000)={0x3}, 0x8) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000a00)='fib_table_lookup\x00', r1}, 0x18) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0xe2c, 0x60000000, &(0x7f0000000100)="b9ff03316844268cb89e14f0080047e0ffff00124000632f77fbac14fe16e000030a07080403fe80000020006558845013f2325f1a3901050b038da1880b25181aa59d943be3f4aed50ea5a6b8686731cb89ef77123c899b699eeaa8eaa0073461119663906400f30c0600000000000059b6d3296e8ca31bce1d8392078b72f24996ae17dffc2e43c8174b54b620636894aaacf28ff62616363c70a440aec4014caf28c0adc043084617d7ecf41e9d134589d46e5dfc4ca5780d38cae870b9a1df48b238190da450296b0ac01496ace23eefc9d4246dd14afbf79a2283a0bb7e1d235f3df126c3acc240d75a058f6efa6d1f5f7ff4000000000000000000", 0x0, 0x24, 0x60000000}, 0x2c) 654.628606ms ago: executing program 0 (id=5626): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x14, &(0x7f0000000300)=ANY=[@ANYBLOB="180000000000000000000000000000001860000000000000e9ff00000400000018120000", @ANYRES16, @ANYBLOB="0000000000000000b703000000000000850000000c000000b7000000000000001801000020646c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000000085000000060000001800000000000000000000000000000095"], 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000840)=@base={0xa, 0x8, 0x2, 0x4}, 0x50) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x14, &(0x7f0000000200)=ANY=[@ANYBLOB="1802000000000000000000000000000018010000786c6c3a00000000070000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000080000850000007200000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000200)={0xffffffffffffffff, 0x58, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r3 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000004c0)={&(0x7f00000007c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10c, 0x10c, 0x4, [@struct={0x6, 0x8, 0x0, 0x4, 0x1, 0x9, [{0x10, 0x2, 0x5}, {0xe, 0x3, 0x1}, {0xa, 0x3, 0x4421}, {0x3, 0x1, 0x5}, {0xe, 0x2}, {0xd, 0x5, 0x3}, {0xc, 0x4, 0x4}, {0xf, 0x4, 0x3}]}, @typedef={0xa, 0x0, 0x0, 0x8, 0x5}, @type_tag={0x1, 0x0, 0x0, 0x12, 0x2}, @var={0xf, 0x0, 0x0, 0xe, 0x4, 0x1}, @ptr={0xc, 0x0, 0x0, 0x2, 0x5}, @array={0x0, 0x0, 0x0, 0x3, 0x0, {0x5, 0x3, 0x8300}}, @type_tag={0xc, 0x0, 0x0, 0x12, 0x4}, @struct={0xa, 0x4, 0x0, 0x4, 0x0, 0xffff, [{0x2, 0x3, 0x10}, {0xe, 0x0, 0x7ff}, {0xa, 0x5, 0x7}, {0x0, 0x4, 0x8000}]}, @float={0xfffffffe, 0x0, 0x0, 0x10, 0x4}]}, {0x0, [0x0, 0x5f]}}, &(0x7f0000001dc0)=""/4096, 0x128, 0x1000, 0x1, 0x3a, 0x10000}, 0x28) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xa, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c}, 0x94) r5 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000000c0), 0x48) bpf$MAP_LOOKUP_ELEM(0x5, &(0x7f00000000c0)={r5, &(0x7f0000000000), &(0x7f0000000040)=""/73}, 0x70) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000580)={0x1, 0xffffffffffffffff}, 0x4) r7 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000940)=@generic={&(0x7f0000000900)='./file0\x00', 0x0, 0x18}, 0x18) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001b40)={0x11, 0x22, &(0x7f0000000680)=@raw=[@exit, @btf_id={0x18, 0x7, 0x3, 0x0, 0x1}, @printk={@ld, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x2}}, @ldst={0x0, 0x0, 0x0, 0x4, 0x6, 0xffffffffffffffc0, 0xfffffffffffffffc}, @printk={@lld, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x7fff}}, @map_val={0x18, 0x2, 0x2, 0x0, r0, 0x0, 0x0, 0x0, 0x5}, @map_idx={0x18, 0x2}, @initr0={0x18, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x8}, @printk={@ld, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x100}}], &(0x7f00000001c0)='syzkaller\x00', 0xfff, 0x1000, &(0x7f0000000b00)=""/4096, 0x41000, 0x8, '\x00', r2, 0x0, r3, 0x8, &(0x7f0000000500)={0x7, 0x4}, 0x8, 0x10, &(0x7f0000000540)={0x1, 0x9, 0xa02c418f, 0x7}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000980)=[r4, r5, r6, r7], 0x0, 0x10, 0x64}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r8 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="170000000000000004000000ff"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r8, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000059"], 0x0}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000080)={{r8}, 0x0, &(0x7f00000002c0)}, 0x20) r9 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback=0x37, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000040)='mm_page_alloc\x00', r9}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000280)=@base={0xb, 0x9d, 0x10001, 0x9, 0x1, 0xffffffffffffffff, 0xfffffffd}, 0x50) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r11, &(0x7f0000001b00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001d80)=ANY=[@ANYBLOB="28010000000000000100000001"], 0x128}, 0x0) recvmsg$unix(r10, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0), 0x100}, 0x0) r12 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x41, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001c40)={{r4}, &(0x7f0000000a00), &(0x7f0000001c00)=r1}, 0x20) close(r12) r13 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETOFFLOAD(r13, 0xc004743e, 0x110e22fff6) ioctl$TUNGETVNETLE(r12, 0x40047451, &(0x7f0000000180)) 650.167046ms ago: executing program 3 (id=5636): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000002000000b7040000000000008500000057"], 0x0}, 0x94) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="17000000000000000400000003"], 0x48) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[], 0x48) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000002c0)={r0, 0x58, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=@bloom_filter={0x1e, 0x6, 0xc0000, 0x3, 0x102, r1, 0x2, '\x00', r2, 0xffffffffffffffff, 0x1, 0x5, 0x1, 0xf}, 0x50) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff}) recvmsg$unix(r3, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r4, &(0x7f0000000200)=ANY=[@ANYBLOB="8fedcb7907009875f37538e486dd6317ce81ea032900fe08000000000200875a65969ff57b00000000000000000000000000ac1414aa"], 0xfdef) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000180)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1], 0x0, 0x0, 0x0, 0x0, 0x41000}, 0x94) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r5}, 0x10) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000300)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000058"], 0x0}, 0x90) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000001f80)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000003c0)={&(0x7f0000000140)='kmem_cache_free\x00', r6}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000600)={&(0x7f0000000980)='kfree_skb\x00'}, 0x18) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000580)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$tipc(r7, &(0x7f0000004440)={&(0x7f0000000ec0)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x2}}, 0x10, 0x0}, 0x0) 556.703595ms ago: executing program 0 (id=5627): r0 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000940)=ANY=[@ANYBLOB="1b00000000000100000000000000240000800000458c21b15ed03a23585e54b4d3db6cfa", @ANYRES32=0x0, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0xf, &(0x7f0000000340)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b702000014000000b7030000010100008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000000000008500000085000000b70000000000000095"], &(0x7f0000001dc0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r3 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000080)='sched_switch\x00', r1}, 0x2d) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x201, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x3}, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000b00)=ANY=[@ANYRESHEX=r3, @ANYRESHEX, @ANYBLOB="8e59710cc36270df38cb831a370a05a1cc08dd198f256546e260061d39d0bb2b88b64629f648f2dd6b64a33676c5e80f315f608529653284a7dc19b8ceda4fa134ddbecb9f3d460712b7bec86a4cdb2477241ba80cb55f7f4c4f942509a6fe52687e404127acad796d96d918ff22c57c0fc36ddaa02c0069145b2f60fbfb", @ANYRES64=r2, @ANYRESOCT=0x0], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x2, '\x00', 0x0, @fallback=0x7, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000d40)=ANY=[@ANYBLOB="0b000000050000000804000400e500000000000095c29397bda99bc7975d8d1d3becd3d94c3818a8158237153d5af46593a99aa3d4631512acd30df55e2d1eaf1d41fa43a2267d4268e8a023a609d107f3ec6275bfff61529d85d80adfe3bc27242e0af7d8", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r4], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x12, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000700)='signal_deliver\x00', r5}, 0x10) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x3, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000700)='signal_deliver\x00', r6}, 0x10) syz_open_procfs$namespace(0x0, 0xfffffffffffffffe) perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0x96, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f00000002c0)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x30440, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0, 0x2}, 0x0, 0x7, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x1d, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, '\x00', 0x0, @lsm=0x1b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000d0039000000000000b4a518"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000a40)={r7, 0x27, 0x51, 0x0, &(0x7f0000000440)="f8ad48cc02cb29dcc8007f5b86dd", 0x0, 0x3ffe, 0xf2ffffff, 0x0, 0x0, 0x0, 0x0}, 0x50) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x4, &(0x7f0000000480)=@framed={{0x18, 0x2}, [@call={0x85, 0x0, 0x0, 0x7b}]}, 0x0}, 0x94) r8 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x17, 0x0, 0x8400, 0x1, 0x0, 0x1}, 0x48) r9 = bpf$MAP_CREATE(0x0, &(0x7f0000000740)=@base={0x16, 0x0, 0x4, 0xff, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x4000000}, 0x50) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r9, @ANYBLOB], 0x0}, 0x94) r10 = bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r10}, 0x10) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000080)={{r8, 0xffffffffffffffff}, 0x0, &(0x7f0000000040)}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000200)={r11, 0x0, &(0x7f0000001780)=""/4096}, 0x20) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) 483.896442ms ago: executing program 4 (id=5628): bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x10, 0x4, 0x8, 0x8, 0x0, 0x1}, 0x50) (async) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x10, 0x4, 0x8, 0x8, 0x0, 0x1}, 0x50) bpf$MAP_CREATE(0x0, 0x0, 0x48) (async) r1 = bpf$MAP_CREATE(0x0, 0x0, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x16, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000f6000000850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000900)={&(0x7f0000000380)='kmem_cache_free\x00', r2}, 0x18) bpf$PROG_LOAD(0x5, 0x0, 0x0) (async) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="02000000040000000800000001"], 0x48) (async) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="02000000040000000800000001"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x10, &(0x7f0000000580)=ANY=[], &(0x7f0000000600)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x3, @perf_bp={0x0, 0x4}, 0x6000, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_clone(0x28000000, &(0x7f00000003c0)="a50f5dadfff3b2dcc6ea516fa9a16186be25f4f3a733ec834bea728622b8672209c01fdeae8900cf6813672f72fe7a298db25ad3e6e56a54918e194a797b91c922478c5078cb475f1b5460f7c39341cf90a3029ca017bcbdfdbe64c88163", 0x5e, &(0x7f0000000000), &(0x7f0000000300), &(0x7f00000005c0)="d600d175d9582c644caaab391cda268b3151877bd2dd7a7444aee7657677a7b444285b1e0bf500d58bfcd492cdfe22de226d56dfc8dfe98f2795bb41fef2f50c6ce23ea576d6d78f8e58656bbf4ae76c657f7762e18f9aa2f5f6edfb7cf6ba8d1acc9c1d8d0518aecdf0a177cb25420733eed00d6aa6fc18746c9bce37119c212a5880a9beabeb0e139b89dd87f634dd7b748036794afc3de353c0a2a9d9dced7701ab85e96c54765c0b64be191f8e95adbaf59697444d3bf30bf5871e6be09e550c670f43508f4bc81f1d") syz_open_procfs$namespace(0x0, 0x0) (async) syz_open_procfs$namespace(0x0, 0x0) bpf$OBJ_PIN_PROG(0x6, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000000900)={0x0, 0x0, 0x0}, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)=ANY=[], 0x48) syz_open_procfs$namespace(0x0, 0x0) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x11, 0x13, &(0x7f0000000080)=ANY=[@ANYBLOB="18080000000000000000000000000000851000000600000018020000", @ANYRES32, @ANYBLOB="00000000000000006600020000000000180000000000000000000000000000009500040000000000360a020000000000180100002020782500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b50a00000000000085000000060000009500000000000000"], &(0x7f0000000000)='GPL\x00', 0x2, 0xff5c, &(0x7f0000000340)=""/222}, 0x78) perf_event_open(&(0x7f0000000380)={0x2, 0x80, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async) r4 = perf_event_open(&(0x7f0000000380)={0x2, 0x80, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, 0x0, &(0x7f0000001080)='syzkaller\x00', 0xfffffffe, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r3, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x40082406, &(0x7f0000000540)='(pu&00\t(|') bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000780)=ANY=[@ANYBLOB], &(0x7f0000000340)='syzkaller\x00'}, 0x94) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x6, 0x14, &(0x7f00000001c0)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020752500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007100000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bca2000000000000a6020000f8ffffffb703000000000000b704000000000000850000003300000095"], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @xdp, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_BIND_MAP(0xa, &(0x7f0000000500)={r5}, 0xc) (async) bpf$PROG_BIND_MAP(0xa, &(0x7f0000000500)={r5}, 0xc) 434.450827ms ago: executing program 1 (id=5629): perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='devices.list\x00', 0x26e1, 0x0) close(r0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000001000)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$unix(r1, &(0x7f0000001140)={0x0, 0x2, &(0x7f0000001040)=[{&(0x7f00000015c0)=""/4096, 0x7ffff000}], 0x1, 0x0, 0x0, 0x808e}, 0x40000100) write$cgroup_devices(r0, &(0x7f00000005c0)=ANY=[], 0xfffffeff) perf_event_open(&(0x7f0000000040)={0x2, 0x87, 0xed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}, 0x0, 0x0, 0x3f, 0x4, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000380)={0x4, 0x80, 0x0, 0xfc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}, 0x0, 0xc8}, 0x0, 0x0, 0xffffffffffffffff, 0x1) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r3) recvmsg$unix(r2, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r4, &(0x7f00000006c0)=ANY=[@ANYBLOB="8f03000000000060007538e486dd630ace2200052f00fe80000000000000875a65059ff57b00000000000000000000000000ac1414aa000088be"], 0xcfa4) bpf$MAP_DELETE_ELEM(0x3, &(0x7f00000000c0)={r4, &(0x7f0000000000)="b7dbf49a4361725d0148babe00ee0cf221e7ce0c6f606e75"}, 0x20) 363.739554ms ago: executing program 2 (id=5630): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18020000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb703000008000000b703000000000020850000007200000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={&(0x7f00000002c0)='sched_switch\x00', r0}, 0x10) r2 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.throttle.io_serviced_recursive\x00', 0x26e1, 0x0) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000bc0)=ANY=[@ANYRES32=0x1, @ANYBLOB, @ANYRES32=0x0, @ANYRES16=r2, @ANYRES16=r1], 0x48) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000b40)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x800000000001ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xe}}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x9) sendmsg$inet(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001d80)=ANY=[@ANYBLOB="28010000000000000100"], 0x128}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000001480)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r6, &(0x7f0000001b00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001d80)=ANY=[], 0x128}, 0x0) recvmsg$unix(r5, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000080), 0x100}, 0x0) r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='blkio.bfq.sectors_recursive\x00', 0x275a, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x19, 0x3, 0x0, &(0x7f0000000000)='GPL\x00', 0x5, 0x0, 0x0, 0x41100, 0x8, '\x00', 0x0, @fallback=0x25}, 0x94) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) ioctl$TUNSETCARRIER(0xffffffffffffffff, 0x400454e2, &(0x7f0000000000)=0x4b) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'veth1_virt_wifi\x00'}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r8, 0x8946, &(0x7f0000000080)) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r10 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000680)={r10, 0xe0, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000340)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x3, 0x2, &(0x7f0000000280)=[0x0, 0x0, 0x0], &(0x7f00000003c0)=[0x0, 0x0], 0x0, 0x8e, &(0x7f0000000380), 0x0, 0x10, &(0x7f00000004c0), &(0x7f0000000500), 0x8, 0x65, 0x8, 0x8, &(0x7f0000000540)}}, 0x10) r12 = bpf$MAP_CREATE(0x0, &(0x7f00000006c0)=@bloom_filter={0x1e, 0x200, 0x0, 0x7, 0x4, r10, 0x81, '\x00', r11, r1, 0x1, 0x2, 0x1, 0x1}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, 0x0, &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) unlink(&(0x7f0000000140)='./cgroup\x00') r13 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000a40)={0x13, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="180000000600000000000000070000d85c9d2c670085a620"], &(0x7f0000000380)='GPL\x00', 0xea88, 0x0, 0x0, 0x40f00, 0x24, '\x00', r11, @fallback=0x38, r10, 0x8, &(0x7f0000000480)={0x6, 0x4}, 0x8, 0x10, &(0x7f0000000800)={0x1, 0xa, 0x80000000, 0x3}, 0x10, 0x0, r0, 0x5, &(0x7f00000008c0)=[r12, r9, 0xffffffffffffffff, r9, r3, r4, r10, r7], &(0x7f0000000900)=[{0x5, 0x1, 0xe, 0xa}, {0x3, 0x3, 0xe, 0x6}, {0x1, 0x1, 0x7, 0x4}, {0x4, 0x2, 0x4, 0xc}, {0x1, 0x5, 0x7, 0x9}], 0x10, 0xd}, 0x94) ioctl$TUNSETIFF(r13, 0x400454ca, &(0x7f0000001480)={'syzkaller0\x00', 0x7101}) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0200000004000000080000000700ffff00100000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) 69.453634ms ago: executing program 4 (id=5631): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0500000004000000"], 0x48) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={0x0}, 0x18) (async) r1 = bpf$MAP_CREATE_RINGBUF(0x0, 0x0, 0x48) (async) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000300)=ANY=[@ANYRESDEC=r0], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x1, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000040)='sched_switch\x00', r2}, 0x10) (async) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) (async) r3 = perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz1\x00', 0x1ff) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup/syz1\x00', 0x200002, 0x0) openat$cgroup_type(r4, 0x0, 0x2, 0x0) (async) r5 = openat$cgroup_procs(r4, &(0x7f00000002c0)='cgroup.threads\x00', 0x2, 0x0) write$cgroup_pid(r5, &(0x7f00000001c0), 0x12) (async) r6 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r7 = openat$cgroup_ro(r6, &(0x7f0000000040)='cgroup.freeze\x00', 0x275a, 0x0) write$cgroup_int(r7, 0x0, 0x0) (async) write$cgroup_int(r7, &(0x7f00000000c0), 0x12) r8 = bpf$MAP_CREATE(0x0, &(0x7f0000000740)=@base={0x9, 0x6, 0x8, 0x8, 0x40, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x2}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r8}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x31, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_CREATE(0x0, &(0x7f0000000280)=ANY=[@ANYBLOB], 0x48) r9 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000002ec0)=ANY=[@ANYBLOB="b702000007000000bfa30000000000000703000000feffff7a0af0ff0100000079a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b70000000000000095000000000000005ecefab8f2e85c6c1ca711fcd0cdfa146ec561750379585e5a076d839240d29c034055b67dafe6c8dc3d5d78c07fa1f7e655ce34e4d5b3185fec0e07004e60c08dc8b8dbf11e6e94d75938321a3aa502cd2424a66e6d2ef831ab7ea0c34f17e3946ef3bb622003b538dfd8e01f3440cee51bc53099e90f4580d760551b5b341a29f31e3106d1ddd6152f7cbdb9cd38bdb2209c67deca8eeb9c15ab3a14817ac61e4dd11183a13477bf7e860e3670ef0e789f65f1328d6704902cbe7bc04b82d2789cad32b8667c2147661df28d9961b63e1a9cf6c2a660a1fe3c184b751c51160fb20b1c581e7be6ba0dc001c4110555850915148ba532e6ea09c346dfebd38608b3280080005d9a9500000000000000334d83239dd27080851dcac3c12233f9a1fb9c2aec61ce63a38d2fd50117b89a9ab359b4eea0c6e95767d42b4e54861d0227dbfd2e6d7f715a7f3deadd7130856f756436303767d2e24f29e5dad9796edb697aeea0182babd18cac1bd4f4390af9a9ceafd0002cab154ad029a1090000002780870014f51c3c975d5aec84222fd3a0ec4be3e563112f0b39501aafe234870072858dc06e7c337602d3e5a815232f5e16c1b30c3a6abc85018e5ff2c91018afc9ffc2cc788bee1b47683db012469398685211dfbbae3e2ed0a50e7393bff5d4c391ddece00fc772dd6b4d4de2a41990f05ca3bdfc92c88c5b8dcd36e7487afa447e2edfae4f390a8337841cef386e22cc22ee17476d738952229682e24b92533ac2a9f5a699593f084419cae0b4532bcc97d300006aca54183fb01c73f979ca9857399537f5dc2a2d0e0000000000000578673f8b6e74ce23877a6b24db0e067345560942fa629fbef2461c96a088a22e8b15c3e233db7af22e30d46a9d26d37cef099ece729aa218f9f44a3210223fdae7ed04935c3c90d3add8eebc8619d73415cda2130f5011e48455b5a8b90dfae158b94f50adab988dd8e12baf5cc9398fff00404d5d99f82e20ee6a8c88e18c2977fb536a9caab37d9ac4cfc1c7b400000000000007ffc826b956ba859ac8e3c177b91bd7d5e41ff83ced846891180604b6dd2499d16d7d9158ffffffff00000000ef069dc42749a89f854797f29d000069a16203a967c1bbe09315c29877a308bcc87dc3addb08142bdee5d27874b2f663ddeef0005b3d96c7aabf4df517d90bdc01e73835d5a3e1a90800c66ee2b1ad76dff9f9000071414c99d4894ee7f8240000e3428d2129369ee1b85af9ffffff0d0df414b315f651c8412392191fa83ee830548f11be359454a3f2239cfe35f81b7a490f167e6d5c1109000000000000000042b8ff8c21ad702ccacad5b39eef213d1ca296d2a27798c8ce2a305c0c7d35cf4b22549a4bd92000000000f285f653b621491dc6aaee0200e2ff08644fb94c06006eff1be2f633c1d987591ec3db58a7bb74d4ec3f771f7a1338a5c3dd35e926049fe86e09c58e273cd905de328c13c1ed1c0d9cae846bcbfa8cce7b893e578af7dc7d5e87d44ff828de453f34c2b18660b080efc707e676e1fb4d5825c0ca177a4c7fbb4eda0545c00f576b2b5cc7f819abd0f885cc4806f40300966fcf1e54f5a2d38708294cd6f496e5dee734fe7da3770845cf442d488afdc0e17000000000000000000000000000000000000000000000000000005205000000dc1c56d59f35d367632952a978ee56c83a3466ae595c6a8cda690d192a070886df42b27098773b45198b4a34ac977ebd4450e121d01342e0eaf6f330e935878a6d169c80aa4252d4ea6b8f6216ff202b5b5a182cb5e838b307632d03a7ca6f6d0339f9953c3093c3690d10ecb65dc5b47481edbf1f000000000000004d16d29c28eb5167e9936ed327fb237a56224e49d9ea95ec1b3ccd35364600000000000000000000000000000000000000000000000000000000000026ded4dd6fe1518cc7802043ecfe69f743f1213bf81700cd9e5a225d67521dc728eac7d80a5656ac2cbde21d3ebfbf69ff861f4394836ddf128d6d19079e64336e7c676505c78ad67548f4b192be3827fcd95cf107753cb0a6a979d3db0c407081c6281e2d8429a863903ca75f4c7df3ea8fc2018d07af1491ef060cd4403a099f32468f65bd06b4082d43e121861b5cc03f1a1561f0589e0d12969bc982ff5d8e9b986c0c6c747d9a1cc500bb892c3a16ff10feea20bdac0000000000000000ca06f256c8028e0f9b65f037b21f3289f86a6826c69fa35ba5cbc3f2db1516ffc5c6e3fa618b24a6ce16d6c7010bb37b61fa0a2d8974e69115d33394e86e4b838297ba20f969369de47422604e2fc5d1d33d84d96b50fb000000ae07c65b71088dd7d5d1e1bab9000000000000000000000000b5ace293b6c833c13e3229432ad71d646218b5229dd88137fc7c59aa242af3bb4efb82055a3b612272d40f522d8c98c879aca11033ec14bb9cc16bd83a00840e31d828ec78e116ae46c4897e2795b6ff92e9a1e24b0b855c02f2b7add58ffb25f339297729a7a51810134d3dfbe71f6516737be55c06d9cdcfb1e2bb10b50000eb4acff90756dba1ecf9f58afd3c19b5c4558ba9af6b7333c894a1fb29ade9ad75c9c022e8d03fe28bc358684492aa771dbfe80745fe89ad349ffaad76ff9dd643796caffdf67af5dd476c37e7e9a84e2e5da2696e285a59b53f2fb0e16d8262c080c159ce40c14089c82759106f422582b42e3e8484ea5a6ad9aa52106eafe0e0caea1ad4cb23f3c2b8a0f455ba69ea284c268d54b43158a8b1d128d02af263b3dc1cab794c9ac57a2a7332f4d8764c302ccd5aac114482b619fc575aa0dd2777e881e29a854380e2f1e49db5a1517ec40bb3fa44f9959bad67ccaba76408da35c9f1534c8bd46dbd61627a2e0a74b5e6aefb7eee403502734137ff47a57f164391c673b6079e65d7295eed164ca63e4ea26dce0fb3ce0f6591d80dfb8f386bb74b5589829b6b0679b5d65a125e3af1130d66a7b66837ae7e7123dde7404a067ad0a6a2d6bec9411b61cad4121be3c72ff3a04713042253d438e7becf8120de3895b8ce974958bde39cb8da3427a2e9e2de936431e67fed5ab5684db07de39083d8948cc4c8a2608100000000000000000000aecb8b0b7941088f971ce17427eec32a012295cc0cdd32955176b6ad5a4bb953e58ccfa9428f452cfb5a48a9fda26db3985c8be3c2f99827da074825b01c4a3a71fb59d5798100000000000000c76b05a45d2dd8c20d971e2f3e4369168f5cb83d6ff3a18733fec726034fbfa95624135bee374414b2c8c61f52357a520efd6a10aff244bc8a62ed367981fb4d5d77f7bc093958ff46527499957da4934cd4b370cf76f72dd05fa80cdfb68c836fd81be7a58532e041a87f9222f157610a4bcdc05b2a55308c8e7568b90f7a338557e816a16972aea79dff5becefa6f9c5ce6c58fb38da9e7532dc53cfdc2e789b76f7d32aca1bfea2aa62621b78dded30fc07171866bf3d552900000000a32dda61eeda1750e157c2d569b9d08f583c0ee28daec2e8bb85f3c8e91c4448096ee953def18dc73e55cb30f9cd069d8780b00eaba382f0c3ae391c30a5f1b0f36dd0c2193b791995d2890327a10d7abac76d1202f72e97f0105184d7aaaab8d3e29c9a8d263f076b55cf53c5bb9c0662a3d19a6722d7f83ae4331d3256f90af0857788b380ccc3b266c418e66d1d756d5df6423dd0cea67bc235d3776d22270fc19301ead09f156893e9"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r9, 0x18000000000002a0, 0xe2c, 0x60000000, &(0x7f0000000100)="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", 0x0, 0x24, 0x60000000}, 0x2c) (async) bpf$PROG_LOAD(0x5, 0x0, 0x0) (async) syz_clone(0x2c9a4080, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc) (async) r10 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, 0x0, &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000040)='mm_page_alloc\x00', r10}, 0x10) (async) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000500)={0x1b, 0x0, 0x0, 0x94f, 0x0, r1, 0x9, '\x00', 0x0, r3, 0x7341a99e, 0x3, 0x4}, 0x50) openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) (async) r11 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) (async) bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$TUNSETOFFLOAD(r11, 0xc004743e, 0x110e22fff6) 0s ago: executing program 4 (id=5632): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1801000011000000000000000000000018120000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000f6000000850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0xf, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000300)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18000000000000000000000000000000850000006d"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000300)='sys_enter\x00', r1}, 0x10) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0}, 0x20) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="02000000040000", @ANYRES32=0x1], 0x50) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)=@base={0x1, 0x3, 0x5, 0x7, 0xc1}, 0x50) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="18080000000000000000000000000002850000000f000000850000002a00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000b40)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0xff9d}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r4, 0x20e, 0x38, 0x0, &(0x7f0000000580)="b9180bb76003070c009e40f086dd1fff310000002c0020010010ac14142ee0080001c699da153f0ae0e6e380f60115f683317585d7472ce0", 0x0, 0x7, 0x6000000000000000, 0x0, 0x0, 0x0, 0x0}, 0x50) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000040)='kmem_cache_free\x00', r3}, 0x10) r5 = bpf$MAP_CREATE(0x1900000000000000, &(0x7f0000000040)=@base={0x1b, 0x0, 0x0, 0x2000}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r5}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000180)='sys_enter\x00', r6}, 0x10) bpf$MAP_CREATE_RINGBUF(0x0, 0x0, 0x48) syz_clone(0x40000000, 0x0, 0x0, 0x0, 0x0, 0x0) recvmsg$unix(0xffffffffffffffff, 0x0, 0x0) r7 = openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000), 0x2, 0x0) write$cgroup_subtree(r7, &(0x7f0000000280), 0x0) unlink(&(0x7f0000000140)='./cgroup\x00') bpf$OBJ_GET_MAP(0x7, &(0x7f0000000180)=@generic={&(0x7f0000000140)='./file0\x00', 0x0, 0x10}, 0x18) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140), &(0x7f0000000100), 0x9, r2}, 0x38) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f00000002c0)={r2, &(0x7f0000000200), 0x0}, 0x20) kernel console output (not intermixed with test programs): Warning: Permanently added '10.128.1.244' (ED25519) to the list of known hosts. [ 20.018051][ T24] audit: type=1400 audit(1763398103.450:64): avc: denied { mounton } for pid=267 comm="syz-executor" path="/syzcgroup/unified" dev="sda1" ino=2022 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 20.018933][ T267] cgroup: Unknown subsys name 'net' [ 20.040737][ T24] audit: type=1400 audit(1763398103.450:65): avc: denied { mount } for pid=267 comm="syz-executor" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 20.068009][ T24] audit: type=1400 audit(1763398103.490:66): avc: denied { unmount } for pid=267 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 20.068276][ T267] cgroup: Unknown subsys name 'devices' [ 20.271007][ T267] cgroup: Unknown subsys name 'hugetlb' [ 20.276678][ T267] cgroup: Unknown subsys name 'rlimit' [ 20.414127][ T24] audit: type=1400 audit(1763398103.850:67): avc: denied { setattr } for pid=267 comm="syz-executor" name="raw-gadget" dev="devtmpfs" ino=253 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 20.437336][ T24] audit: type=1400 audit(1763398103.850:68): avc: denied { mounton } for pid=267 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1 [ 20.462120][ T24] audit: type=1400 audit(1763398103.850:69): avc: denied { mount } for pid=267 comm="syz-executor" name="/" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=filesystem permissive=1 [ 20.467843][ T269] SELinux: Context root:object_r:swapfile_t is not valid (left unmapped). Setting up swapspace version 1, size = 127995904 bytes [ 20.494410][ T24] audit: type=1400 audit(1763398103.930:70): avc: denied { relabelto } for pid=269 comm="mkswap" name="swap-file" dev="sda1" ino=2025 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 20.519959][ T24] audit: type=1400 audit(1763398103.930:71): avc: denied { write } for pid=269 comm="mkswap" path="/root/swap-file" dev="sda1" ino=2025 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 20.550502][ T24] audit: type=1400 audit(1763398103.990:72): avc: denied { read } for pid=267 comm="syz-executor" name="swap-file" dev="sda1" ino=2025 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 20.576084][ T24] audit: type=1400 audit(1763398103.990:73): avc: denied { open } for pid=267 comm="syz-executor" path="/root/swap-file" dev="sda1" ino=2025 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 20.576116][ T267] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 21.403549][ T275] bridge0: port 1(bridge_slave_0) entered blocking state [ 21.410724][ T275] bridge0: port 1(bridge_slave_0) entered disabled state [ 21.417996][ T275] device bridge_slave_0 entered promiscuous mode [ 21.425907][ T275] bridge0: port 2(bridge_slave_1) entered blocking state [ 21.433179][ T275] bridge0: port 2(bridge_slave_1) entered disabled state [ 21.440536][ T275] device bridge_slave_1 entered promiscuous mode [ 21.504550][ T278] bridge0: port 1(bridge_slave_0) entered blocking state [ 21.511748][ T278] bridge0: port 1(bridge_slave_0) entered disabled state [ 21.519110][ T278] device bridge_slave_0 entered promiscuous mode [ 21.549421][ T278] bridge0: port 2(bridge_slave_1) entered blocking state [ 21.556473][ T278] bridge0: port 2(bridge_slave_1) entered disabled state [ 21.563934][ T278] device bridge_slave_1 entered promiscuous mode [ 21.570535][ T276] bridge0: port 1(bridge_slave_0) entered blocking state [ 21.577558][ T276] bridge0: port 1(bridge_slave_0) entered disabled state [ 21.584966][ T276] device bridge_slave_0 entered promiscuous mode [ 21.605684][ T276] bridge0: port 2(bridge_slave_1) entered blocking state [ 21.612812][ T276] bridge0: port 2(bridge_slave_1) entered disabled state [ 21.620161][ T276] device bridge_slave_1 entered promiscuous mode [ 21.655780][ T277] bridge0: port 1(bridge_slave_0) entered blocking state [ 21.662869][ T277] bridge0: port 1(bridge_slave_0) entered disabled state [ 21.670526][ T277] device bridge_slave_0 entered promiscuous mode [ 21.681641][ T279] bridge0: port 1(bridge_slave_0) entered blocking state [ 21.688685][ T279] bridge0: port 1(bridge_slave_0) entered disabled state [ 21.696098][ T279] device bridge_slave_0 entered promiscuous mode [ 21.703079][ T279] bridge0: port 2(bridge_slave_1) entered blocking state [ 21.710166][ T279] bridge0: port 2(bridge_slave_1) entered disabled state [ 21.717571][ T279] device bridge_slave_1 entered promiscuous mode [ 21.724072][ T277] bridge0: port 2(bridge_slave_1) entered blocking state [ 21.731356][ T277] bridge0: port 2(bridge_slave_1) entered disabled state [ 21.738971][ T277] device bridge_slave_1 entered promiscuous mode [ 21.788413][ T275] bridge0: port 2(bridge_slave_1) entered blocking state [ 21.795484][ T275] bridge0: port 2(bridge_slave_1) entered forwarding state [ 21.802750][ T275] bridge0: port 1(bridge_slave_0) entered blocking state [ 21.809780][ T275] bridge0: port 1(bridge_slave_0) entered forwarding state [ 21.874176][ T278] bridge0: port 2(bridge_slave_1) entered blocking state [ 21.881234][ T278] bridge0: port 2(bridge_slave_1) entered forwarding state [ 21.888474][ T278] bridge0: port 1(bridge_slave_0) entered blocking state [ 21.895519][ T278] bridge0: port 1(bridge_slave_0) entered forwarding state [ 21.918204][ T7] bridge0: port 1(bridge_slave_0) entered disabled state [ 21.925445][ T7] bridge0: port 2(bridge_slave_1) entered disabled state [ 21.933409][ T7] bridge0: port 1(bridge_slave_0) entered disabled state [ 21.940603][ T7] bridge0: port 2(bridge_slave_1) entered disabled state [ 21.948474][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 21.956265][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 21.981787][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 21.989934][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 21.998006][ T7] bridge0: port 1(bridge_slave_0) entered blocking state [ 22.005052][ T7] bridge0: port 1(bridge_slave_0) entered forwarding state [ 22.012464][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 22.020937][ T7] bridge0: port 2(bridge_slave_1) entered blocking state [ 22.027941][ T7] bridge0: port 2(bridge_slave_1) entered forwarding state [ 22.039562][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 22.047676][ T7] bridge0: port 1(bridge_slave_0) entered blocking state [ 22.054720][ T7] bridge0: port 1(bridge_slave_0) entered forwarding state [ 22.062492][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 22.070743][ T7] bridge0: port 2(bridge_slave_1) entered blocking state [ 22.077748][ T7] bridge0: port 2(bridge_slave_1) entered forwarding state [ 22.101668][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 22.109593][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 22.117428][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 22.125883][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 22.150281][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 22.157802][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 22.166214][ T7] bridge0: port 1(bridge_slave_0) entered blocking state [ 22.173253][ T7] bridge0: port 1(bridge_slave_0) entered forwarding state [ 22.181314][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 22.207239][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 22.215890][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 22.224535][ T7] bridge0: port 2(bridge_slave_1) entered blocking state [ 22.231563][ T7] bridge0: port 2(bridge_slave_1) entered forwarding state [ 22.239237][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 22.247111][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 22.256841][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 22.265002][ T7] bridge0: port 1(bridge_slave_0) entered blocking state [ 22.272029][ T7] bridge0: port 1(bridge_slave_0) entered forwarding state [ 22.287757][ T277] device veth0_vlan entered promiscuous mode [ 22.295251][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 22.302891][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 22.310472][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 22.318710][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 22.327080][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 22.334689][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 22.342217][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 22.350441][ T7] bridge0: port 1(bridge_slave_0) entered blocking state [ 22.357452][ T7] bridge0: port 1(bridge_slave_0) entered forwarding state [ 22.364881][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 22.378297][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 22.386949][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 22.395139][ T7] bridge0: port 2(bridge_slave_1) entered blocking state [ 22.402185][ T7] bridge0: port 2(bridge_slave_1) entered forwarding state [ 22.409772][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 22.417879][ T7] bridge0: port 2(bridge_slave_1) entered blocking state [ 22.424924][ T7] bridge0: port 2(bridge_slave_1) entered forwarding state [ 22.437731][ T278] device veth0_vlan entered promiscuous mode [ 22.449438][ T275] device veth0_vlan entered promiscuous mode [ 22.457590][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 22.466303][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 22.475068][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 22.483642][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 22.491665][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 22.499606][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 22.507470][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 22.515579][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 22.523539][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 22.531622][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 22.539638][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 22.547057][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 22.554492][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 22.562090][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 22.574385][ T278] device veth1_macvtap entered promiscuous mode [ 22.583289][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 22.591508][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 22.599924][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 22.607458][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 22.616108][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 22.624458][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 22.632721][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 22.649800][ T277] device veth1_macvtap entered promiscuous mode [ 22.657448][ T275] device veth1_macvtap entered promiscuous mode [ 22.664978][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 22.672760][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 22.680538][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 22.688751][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 22.696956][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 22.705028][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 22.713028][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 22.721363][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 22.735651][ T279] device veth0_vlan entered promiscuous mode [ 22.749337][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 22.757387][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 22.765730][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 22.774924][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 22.783531][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 22.792009][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 22.800441][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 22.808786][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 22.817218][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 22.825585][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 22.834012][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 22.841602][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 22.857615][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 22.865952][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 22.874349][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 22.882973][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 22.891584][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 22.899622][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 22.907550][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 22.915961][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 22.924301][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 22.931838][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 22.940291][ T276] device veth0_vlan entered promiscuous mode [ 22.957158][ T279] device veth1_macvtap entered promiscuous mode [ 22.964064][ T277] request_module fs-gadgetfs succeeded, but still no fs? [ 22.975140][ T277] cgroup: cgroup: disabling cgroup2 socket matching due to net_prio or net_cls activation [ 22.996693][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 23.004993][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 23.013667][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 23.027624][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 23.037090][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 23.045844][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 23.054191][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 23.078086][ T276] device veth1_macvtap entered promiscuous mode [ 23.089485][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 23.101345][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 23.109931][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 23.171121][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 23.191931][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 23.205454][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 23.224037][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 23.262474][ T308] cgroup: syz.2.3 (308) created nested cgroup for controller "memory" which has incomplete hierarchy support. Nested cgroups may change behavior in the future. [ 23.288847][ T308] cgroup: "memory" requires setting use_hierarchy to 1 on the root [ 23.308024][ T324] Scheduler tracepoints stat_sleep, stat_iowait, stat_blocked and stat_runtime require the kernel parameter schedstats=enable or kernel.sched_schedstats=1 [ 23.399704][ T332] ÿÿÿÿÿÿ: renamed from vlan1 [ 23.441981][ C0] hrtimer: interrupt took 28440 ns [ 25.272876][ T426] syz.4.36[426] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 25.272932][ T426] syz.4.36[426] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 25.623378][ T24] kauditd_printk_skb: 37 callbacks suppressed [ 25.623389][ T24] audit: type=1400 audit(1763398109.060:111): avc: denied { read } for pid=453 comm="syz.1.45" name="ppp" dev="devtmpfs" ino=153 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ppp_device_t tclass=chr_file permissive=1 [ 25.829200][ T24] audit: type=1400 audit(1763398109.100:112): avc: denied { open } for pid=453 comm="syz.1.45" path="/dev/ppp" dev="devtmpfs" ino=153 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ppp_device_t tclass=chr_file permissive=1 [ 25.908140][ T24] audit: type=1400 audit(1763398109.120:113): avc: denied { ioctl } for pid=453 comm="syz.1.45" path="/dev/ppp" dev="devtmpfs" ino=153 ioctlcmd=0x743e scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ppp_device_t tclass=chr_file permissive=1 [ 25.953540][ T24] audit: type=1400 audit(1763398109.130:114): avc: denied { ioctl } for pid=453 comm="syz.1.45" path="socket:[16526]" dev="sockfs" ino=16526 ioctlcmd=0x8912 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 26.896833][ T24] audit: type=1400 audit(1763398110.330:115): avc: denied { write } for pid=538 comm="syz.3.72" name="cgroup.subtree_control" dev="cgroup2" ino=141 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 [ 26.931012][ T544] ------------[ cut here ]------------ [ 26.936518][ T544] trace type BPF program uses run-time allocation [ 26.989313][ T24] audit: type=1400 audit(1763398110.330:116): avc: denied { open } for pid=538 comm="syz.3.72" path="" dev="cgroup2" ino=141 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 [ 27.021555][ T544] WARNING: CPU: 0 PID: 544 at kernel/bpf/verifier.c:10513 check_map_prog_compatibility+0x5d6/0x740 [ 27.037598][ T544] Modules linked in: [ 27.047721][ T544] CPU: 0 PID: 544 Comm: syz.0.75 Not tainted syzkaller #0 [ 27.102534][ T544] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 27.238216][ T544] RIP: 0010:check_map_prog_compatibility+0x5d6/0x740 [ 27.285514][ T544] Code: 85 e9 14 fe ff ff e8 99 fa ef ff 31 c0 e9 15 fe ff ff e8 8d fa ef ff c6 05 34 c9 2c 05 01 48 c7 c7 80 7a 05 85 e8 7a a4 fb 02 <0f> 0b e9 85 fc ff ff 89 d9 80 e1 07 80 c1 03 38 c1 0f 8c a3 fa ff [ 27.308485][ T544] RSP: 0018:ffffc90000ebf468 EFLAGS: 00010246 [ 27.339355][ T544] RAX: 91bb239a208e9600 RBX: 0000000000000001 RCX: 0000000000080000 [ 27.374513][ T544] RDX: ffffc900014fb000 RSI: 00000000000020a0 RDI: 00000000000020a1 [ 27.382760][ T544] RBP: ffffc90000ebf4b0 R08: dffffc0000000000 R09: ffffed103ee0a5f8 [ 27.390877][ T544] R10: ffffed103ee0a5f8 R11: 1ffff1103ee0a5f7 R12: ffff8881148e0000 [ 27.399073][ T544] R13: 0000000000000011 R14: dffffc0000000000 R15: ffff8881146a2800 [ 27.400866][ T552] device syzkaller0 entered promiscuous mode [ 27.407163][ T544] FS: 00007f21807b06c0(0000) GS:ffff8881f7000000(0000) knlGS:0000000000000000 [ 27.422258][ T544] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 27.449622][ T544] CR2: 0000000100000000 CR3: 0000000129e3c000 CR4: 00000000003506b0 [ 27.469196][ T544] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 27.477219][ T544] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000600 [ 27.548241][ T544] Call Trace: [ 27.558289][ T544] ? __fdget+0x1a1/0x230 [ 27.562921][ T544] resolve_pseudo_ldimm64+0x526/0x1020 [ 27.568618][ T544] ? bpf_check+0xd680/0xd680 [ 27.573736][ T544] ? kvmalloc_node+0x88/0x130 [ 27.578460][ T544] bpf_check+0x8d4b/0xd680 [ 27.584361][ T544] ? bpf_get_btf_vmlinux+0x60/0x60 [ 27.589650][ T544] ? is_bpf_text_address+0x177/0x190 [ 27.595005][ T544] ? selinux_bpf_prog_alloc+0x51/0x140 [ 27.603289][ T544] ? __kernel_text_address+0xa0/0x100 [ 27.608734][ T544] ? unwind_get_return_address+0x4d/0x90 [ 27.614641][ T544] ? stack_trace_save+0xe0/0xe0 [ 27.619725][ T544] ? arch_stack_walk+0xee/0x140 [ 27.624641][ T544] ? stack_trace_save+0x98/0xe0 [ 27.646915][ T544] ? stack_trace_snprint+0xf0/0xf0 [ 27.683737][ T544] ? __kasan_slab_alloc+0x69/0xf0 [ 27.703554][ T544] ? selinux_bpf_prog_alloc+0x51/0x140 [ 27.715996][ T544] ? __kasan_kmalloc+0xec/0x110 [ 27.735108][ T585] device sit0 entered promiscuous mode [ 27.742799][ T544] ? __kasan_kmalloc+0xda/0x110 [ 27.776612][ T544] ? kmem_cache_alloc_trace+0x184/0x2e0 [ 27.809217][ T544] ? selinux_bpf_prog_alloc+0x51/0x140 [ 27.820634][ T544] ? security_bpf_prog_alloc+0x62/0x90 [ 27.826109][ T544] ? bpf_prog_load+0x949/0x1420 [ 27.850107][ T24] audit: type=1400 audit(1763398111.290:117): avc: denied { create } for pid=589 comm="syz.2.86" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 27.860430][ T544] ? __se_sys_bpf+0x442/0x680 [ 27.876044][ T544] ? __x64_sys_bpf+0x7b/0x90 [ 27.881073][ T544] ? do_syscall_64+0x31/0x40 [ 27.886090][ T544] ? entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 27.892743][ T544] ? memset+0x35/0x40 [ 27.896793][ T544] ? bpf_obj_name_cpy+0x193/0x1e0 [ 27.913556][ T544] bpf_prog_load+0xf5a/0x1420 [ 27.921611][ T544] ? map_freeze+0x320/0x320 [ 27.927305][ T544] ? selinux_bpf+0xc7/0xf0 [ 27.931808][ T544] ? security_bpf+0x82/0xa0 [ 27.936367][ T544] __se_sys_bpf+0x442/0x680 [ 27.941177][ T544] ? __x64_sys_bpf+0x90/0x90 [ 27.946018][ T544] ? __kasan_check_read+0x11/0x20 [ 27.951127][ T544] __x64_sys_bpf+0x7b/0x90 [ 27.955598][ T544] do_syscall_64+0x31/0x40 [ 27.960147][ T544] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 27.966107][ T544] RIP: 0033:0x7f2181d486c9 [ 27.970702][ T544] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 27.996643][ T544] RSP: 002b:00007f21807b0038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 28.016076][ T544] RAX: ffffffffffffffda RBX: 00007f2181f9efa0 RCX: 00007f2181d486c9 [ 28.024835][ T544] RDX: 0000000000000090 RSI: 0000200000000780 RDI: 0000000000000005 [ 28.033255][ T544] RBP: 00007f2181dcaf91 R08: 0000000000000000 R09: 0000000000000000 [ 28.041691][ T544] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 28.059320][ T544] R13: 00007f2181f9f038 R14: 00007f2181f9efa0 R15: 00007ffcb4635738 [ 28.068742][ T544] ---[ end trace 9e4ab8888fad9c25 ]--- [ 28.264789][ T24] audit: type=1400 audit(1763398111.700:118): avc: denied { create } for pid=641 comm="syz.3.94" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 28.293533][ T637] device syzkaller0 entered promiscuous mode [ 28.343285][ T24] audit: type=1400 audit(1763398111.780:119): avc: denied { relabelfrom } for pid=636 comm="syz.0.93" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tun_socket permissive=1 [ 28.375049][ T24] audit: type=1400 audit(1763398111.780:120): avc: denied { relabelto } for pid=636 comm="syz.0.93" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tun_socket permissive=1 [ 28.443477][ T648] device sit0 entered promiscuous mode [ 29.055261][ T676] -1: renamed from syzkaller0 [ 29.450355][ T696] GPL: port 1(erspan0) entered blocking state [ 29.458173][ T696] GPL: port 1(erspan0) entered disabled state [ 29.471721][ T696] device erspan0 entered promiscuous mode [ 29.511501][ T690] GPL: port 1(erspan0) entered blocking state [ 29.517707][ T690] GPL: port 1(erspan0) entered forwarding state [ 29.782359][ T721] device syzkaller0 entered promiscuous mode [ 29.975971][ T742] device syzkaller0 entered promiscuous mode [ 30.817669][ T812] device veth1_macvtap left promiscuous mode [ 30.829312][ T812] device macsec0 entered promiscuous mode [ 31.375353][ T856] device veth0_vlan left promiscuous mode [ 31.387514][ T856] device veth0_vlan entered promiscuous mode [ 31.671898][ T24] kauditd_printk_skb: 2 callbacks suppressed [ 31.671921][ T24] audit: type=1400 audit(1763398115.110:123): avc: denied { create } for pid=886 comm="syz.2.164" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=x25_socket permissive=1 [ 31.825910][ T24] audit: type=1400 audit(1763398115.140:124): avc: denied { create } for pid=886 comm="syz.2.164" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 31.989460][ T893] device veth1_macvtap left promiscuous mode [ 32.006909][ T893] device macsec0 entered promiscuous mode [ 32.518229][ T941] syz.0.176 uses obsolete (PF_INET,SOCK_PACKET) [ 32.589790][ T24] audit: type=1400 audit(1763398116.030:125): avc: denied { create } for pid=940 comm="syz.0.176" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 32.664076][ T953] device sit0 entered promiscuous mode [ 32.741103][ T959] device pim6reg1 entered promiscuous mode [ 32.894334][ T962] device veth1_macvtap left promiscuous mode [ 32.900366][ T962] device macsec0 entered promiscuous mode [ 33.757389][ T1041] bridge0: port 2(bridge_slave_1) entered disabled state [ 33.764627][ T1041] bridge0: port 1(bridge_slave_0) entered disabled state [ 33.788585][ T1041] device bridge_slave_1 left promiscuous mode [ 33.794959][ T1041] bridge0: port 2(bridge_slave_1) entered disabled state [ 33.811172][ T1041] device bridge_slave_0 left promiscuous mode [ 33.817460][ T1041] bridge0: port 1(bridge_slave_0) entered disabled state [ 33.862376][ T24] audit: type=1400 audit(1763398117.300:126): avc: denied { attach_queue } for pid=1037 comm="syz.4.203" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tun_socket permissive=1 [ 33.900656][ T1048] device pim6reg1 entered promiscuous mode [ 33.997891][ T1057] device syzkaller0 entered promiscuous mode [ 35.019967][ T24] audit: type=1400 audit(1763398118.460:127): avc: denied { create } for pid=1100 comm="syz.0.219" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 35.271480][ T1132] device sit0 left promiscuous mode [ 36.016379][ T1165] device syzkaller0 entered promiscuous mode [ 36.040247][ T1169] device wg2 entered promiscuous mode [ 36.167934][ T1191] device veth1_macvtap left promiscuous mode [ 36.176867][ T1191] device macsec0 entered promiscuous mode [ 37.151843][ T24] audit: type=1400 audit(1763398120.590:128): avc: denied { create } for pid=1252 comm="syz.4.263" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 37.222963][ T1258] device pim6reg1 entered promiscuous mode [ 37.278138][ T24] audit: type=1400 audit(1763398120.630:129): avc: denied { create } for pid=1257 comm="syz.2.265" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netrom_socket permissive=1 [ 37.604147][ T24] audit: type=1400 audit(1763398121.040:130): avc: denied { create } for pid=1283 comm="syz.1.273" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 37.925841][ T1307] ±ÿ: renamed from team_slave_1 [ 37.988307][ T24] audit: type=1400 audit(1763398121.420:131): avc: denied { create } for pid=1306 comm="syz.2.281" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rose_socket permissive=1 [ 38.080992][ T1310] device sit0 entered promiscuous mode [ 38.449554][ T1330] device veth1_macvtap left promiscuous mode [ 38.455635][ T1330] device macsec0 entered promiscuous mode [ 41.231435][ T24] audit: type=1400 audit(1763398124.670:132): avc: denied { tracepoint } for pid=1463 comm="syz.0.328" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=1 [ 41.950050][ T1502] device syzkaller0 entered promiscuous mode [ 44.763186][ T1662] device sit0 left promiscuous mode [ 44.919842][ T1668] device sit0 entered promiscuous mode [ 45.034570][ T1669] device veth0_vlan left promiscuous mode [ 45.045553][ T1669] device veth0_vlan entered promiscuous mode [ 46.676617][ T1753] device sit0 entered promiscuous mode [ 47.103190][ T24] audit: type=1400 audit(1763398130.540:133): avc: denied { create } for pid=1761 comm="syz.0.418" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 47.707497][ T24] audit: type=1400 audit(1763398131.140:134): avc: denied { create } for pid=1792 comm="syz.2.429" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1 [ 49.120952][ T1872] bridge0: port 2(bridge_slave_1) entered disabled state [ 49.129177][ T1872] bridge0: port 1(bridge_slave_0) entered disabled state [ 49.246680][ T1872] device bridge_slave_1 left promiscuous mode [ 49.253649][ T1872] bridge0: port 2(bridge_slave_1) entered disabled state [ 49.314675][ T1872] device bridge_slave_0 left promiscuous mode [ 49.347036][ T1872] bridge0: port 1(bridge_slave_0) entered disabled state [ 49.369432][ T1891] FAULT_INJECTION: forcing a failure. [ 49.369432][ T1891] name failslab, interval 1, probability 0, space 0, times 1 [ 49.393164][ T1891] CPU: 1 PID: 1891 Comm: syz.4.464 Tainted: G W syzkaller #0 [ 49.401871][ T1891] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 49.411937][ T1891] Call Trace: [ 49.415449][ T1891] __dump_stack+0x21/0x24 [ 49.419789][ T1891] dump_stack_lvl+0x169/0x1d8 [ 49.424481][ T1891] ? thaw_kernel_threads+0x220/0x220 [ 49.429767][ T1891] ? show_regs_print_info+0x18/0x18 [ 49.434968][ T1891] ? stack_trace_save+0x98/0xe0 [ 49.439841][ T1891] ? stack_trace_snprint+0xf0/0xf0 [ 49.444954][ T1891] dump_stack+0x15/0x1c [ 49.449108][ T1891] should_fail+0x3c1/0x510 [ 49.453704][ T1891] ? dup_task_struct+0x57/0xbd0 [ 49.458574][ T1891] __should_failslab+0xa4/0xe0 [ 49.463345][ T1891] should_failslab+0x9/0x20 [ 49.468038][ T1891] kmem_cache_alloc+0x3d/0x2e0 [ 49.472803][ T1891] ? __kasan_check_write+0x14/0x20 [ 49.478267][ T1891] dup_task_struct+0x57/0xbd0 [ 49.482948][ T1891] ? __kasan_check_write+0x14/0x20 [ 49.488068][ T1891] ? recalc_sigpending+0x1ac/0x230 [ 49.493184][ T1891] copy_process+0x5b2/0x32c0 [ 49.497803][ T1891] ? memset+0x35/0x40 [ 49.501801][ T1891] ? proc_fail_nth_read+0x210/0x210 [ 49.506998][ T1891] ? __pidfd_prepare+0x150/0x150 [ 49.511979][ T1891] ? rw_verify_area+0x1c0/0x360 [ 49.516841][ T1891] ? vfs_write+0xac8/0xd60 [ 49.521264][ T1891] ? __kasan_slab_free+0x11/0x20 [ 49.526207][ T1891] kernel_clone+0x23f/0x940 [ 49.530708][ T1891] ? kernel_write+0x3c0/0x3c0 [ 49.535390][ T1891] ? create_io_thread+0x130/0x130 [ 49.540421][ T1891] ? mutex_lock+0x8c/0xe0 [ 49.544754][ T1891] __x64_sys_clone+0x176/0x1d0 [ 49.549530][ T1891] ? __ia32_sys_vfork+0xf0/0xf0 [ 49.554379][ T1891] ? ksys_write+0x1eb/0x240 [ 49.558884][ T1891] ? debug_smp_processor_id+0x17/0x20 [ 49.564260][ T1891] ? fpregs_assert_state_consistent+0xb1/0xe0 [ 49.570326][ T1891] ? exit_to_user_mode_prepare+0x2f/0xa0 [ 49.575961][ T1891] do_syscall_64+0x31/0x40 [ 49.580500][ T1891] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 49.586396][ T1891] RIP: 0033:0x7fe57a3346c9 [ 49.590905][ T1891] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 49.610804][ T1891] RSP: 002b:00007fe578d9bfe8 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 49.619335][ T1891] RAX: ffffffffffffffda RBX: 00007fe57a58afa0 RCX: 00007fe57a3346c9 [ 49.627744][ T1891] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00000000640c7000 [ 49.635738][ T1891] RBP: 00007fe578d9c090 R08: 0000000000000000 R09: 0000000000000000 [ 49.643733][ T1891] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000001 [ 49.651805][ T1891] R13: 00007fe57a58b038 R14: 00007fe57a58afa0 R15: 00007fff8d8e9768 [ 50.163984][ T1926] FAULT_INJECTION: forcing a failure. [ 50.163984][ T1926] name failslab, interval 1, probability 0, space 0, times 0 [ 50.178758][ T1926] CPU: 0 PID: 1926 Comm: syz.3.476 Tainted: G W syzkaller #0 [ 50.187463][ T1926] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 50.197630][ T1926] Call Trace: [ 50.200940][ T1926] __dump_stack+0x21/0x24 [ 50.205283][ T1926] dump_stack_lvl+0x169/0x1d8 [ 50.209974][ T1926] ? show_regs_print_info+0x18/0x18 [ 50.215173][ T1926] dump_stack+0x15/0x1c [ 50.219414][ T1926] should_fail+0x3c1/0x510 [ 50.223849][ T1926] ? prepare_creds+0x2c/0x5d0 [ 50.228526][ T1926] __should_failslab+0xa4/0xe0 [ 50.233284][ T1926] should_failslab+0x9/0x20 [ 50.237783][ T1926] kmem_cache_alloc+0x3d/0x2e0 [ 50.242537][ T1926] ? _raw_spin_lock_irqsave+0xb0/0x110 [ 50.247986][ T1926] prepare_creds+0x2c/0x5d0 [ 50.252478][ T1926] ? copy_creds+0x7b/0x480 [ 50.256910][ T1926] copy_creds+0xe5/0x480 [ 50.261149][ T1926] copy_process+0x957/0x32c0 [ 50.265739][ T1926] ? memset+0x35/0x40 [ 50.269721][ T1926] ? proc_fail_nth_read+0x210/0x210 [ 50.274918][ T1926] ? __pidfd_prepare+0x150/0x150 [ 50.279875][ T1926] ? rw_verify_area+0x1c0/0x360 [ 50.284715][ T1926] ? vfs_write+0xac8/0xd60 [ 50.289128][ T1926] ? __kasan_slab_free+0x11/0x20 [ 50.294065][ T1926] kernel_clone+0x23f/0x940 [ 50.298558][ T1926] ? kernel_write+0x3c0/0x3c0 [ 50.303225][ T1926] ? create_io_thread+0x130/0x130 [ 50.308240][ T1926] ? mutex_lock+0x8c/0xe0 [ 50.312571][ T1926] __x64_sys_clone+0x176/0x1d0 [ 50.317326][ T1926] ? __ia32_sys_vfork+0xf0/0xf0 [ 50.322166][ T1926] ? ksys_write+0x1eb/0x240 [ 50.326666][ T1926] ? debug_smp_processor_id+0x17/0x20 [ 50.332030][ T1926] ? fpregs_assert_state_consistent+0xb1/0xe0 [ 50.338187][ T1926] ? exit_to_user_mode_prepare+0x2f/0xa0 [ 50.343811][ T1926] do_syscall_64+0x31/0x40 [ 50.348219][ T1926] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 50.354102][ T1926] RIP: 0033:0x7f4697cd36c9 [ 50.358596][ T1926] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 50.378297][ T1926] RSP: 002b:00007f469673afe8 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 50.386702][ T1926] RAX: ffffffffffffffda RBX: 00007f4697f29fa0 RCX: 00007f4697cd36c9 [ 50.394664][ T1926] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00000000640c7000 [ 50.402628][ T1926] RBP: 00007f469673b090 R08: 0000000000000000 R09: 0000000000000000 [ 50.410775][ T1926] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000001 [ 50.418840][ T1926] R13: 00007f4697f2a038 R14: 00007f4697f29fa0 R15: 00007fff85f5c918 [ 50.427736][ T1920] bridge0: port 2(bridge_slave_1) entered disabled state [ 50.435980][ T1920] bridge0: port 1(bridge_slave_0) entered disabled state [ 50.489234][ T1932] device bridge_slave_1 left promiscuous mode [ 50.495497][ T1932] bridge0: port 2(bridge_slave_1) entered disabled state [ 50.551998][ T1932] device bridge_slave_0 left promiscuous mode [ 50.586780][ T1932] bridge0: port 1(bridge_slave_0) entered disabled state [ 51.467713][ T1977] device syzkaller0 entered promiscuous mode [ 51.475786][ T1987] FAULT_INJECTION: forcing a failure. [ 51.475786][ T1987] name failslab, interval 1, probability 0, space 0, times 0 [ 51.515847][ T1987] CPU: 1 PID: 1987 Comm: syz.4.494 Tainted: G W syzkaller #0 [ 51.524651][ T1987] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 51.534727][ T1987] Call Trace: [ 51.538040][ T1987] __dump_stack+0x21/0x24 [ 51.542410][ T1987] dump_stack_lvl+0x169/0x1d8 [ 51.547094][ T1987] ? show_regs_print_info+0x18/0x18 [ 51.552305][ T1987] dump_stack+0x15/0x1c [ 51.556474][ T1987] should_fail+0x3c1/0x510 [ 51.560900][ T1987] ? alloc_vmap_area+0x16b/0x1870 [ 51.565936][ T1987] __should_failslab+0xa4/0xe0 [ 51.570705][ T1987] should_failslab+0x9/0x20 [ 51.575203][ T1987] kmem_cache_alloc+0x3d/0x2e0 [ 51.579958][ T1987] alloc_vmap_area+0x16b/0x1870 [ 51.584802][ T1987] ? vm_map_ram+0x9c0/0x9c0 [ 51.589299][ T1987] ? kmem_cache_alloc_trace+0x184/0x2e0 [ 51.594854][ T1987] ? __get_vm_area_node+0x113/0x450 [ 51.600048][ T1987] __get_vm_area_node+0x147/0x450 [ 51.605069][ T1987] __vmalloc_node_range+0xe0/0x780 [ 51.610174][ T1987] ? copy_process+0x5b2/0x32c0 [ 51.615103][ T1987] ? kmem_cache_alloc+0x165/0x2e0 [ 51.620125][ T1987] dup_task_struct+0x40f/0xbd0 [ 51.624983][ T1987] ? copy_process+0x5b2/0x32c0 [ 51.629747][ T1987] ? __kasan_check_write+0x14/0x20 [ 51.634849][ T1987] ? recalc_sigpending+0x1ac/0x230 [ 51.639949][ T1987] copy_process+0x5b2/0x32c0 [ 51.644538][ T1987] ? memset+0x35/0x40 [ 51.648528][ T1987] ? proc_fail_nth_read+0x210/0x210 [ 51.653726][ T1987] ? __pidfd_prepare+0x150/0x150 [ 51.658663][ T1987] ? rw_verify_area+0x1c0/0x360 [ 51.663513][ T1987] ? vfs_write+0xac8/0xd60 [ 51.667929][ T1987] ? __kasan_slab_free+0x11/0x20 [ 51.672864][ T1987] kernel_clone+0x23f/0x940 [ 51.677359][ T1987] ? kernel_write+0x3c0/0x3c0 [ 51.682025][ T1987] ? create_io_thread+0x130/0x130 [ 51.687037][ T1987] ? mutex_lock+0x8c/0xe0 [ 51.691359][ T1987] __x64_sys_clone+0x176/0x1d0 [ 51.696110][ T1987] ? __ia32_sys_vfork+0xf0/0xf0 [ 51.700952][ T1987] ? ksys_write+0x1eb/0x240 [ 51.705448][ T1987] ? debug_smp_processor_id+0x17/0x20 [ 51.710814][ T1987] ? fpregs_assert_state_consistent+0xb1/0xe0 [ 51.716872][ T1987] ? exit_to_user_mode_prepare+0x2f/0xa0 [ 51.722495][ T1987] do_syscall_64+0x31/0x40 [ 51.726906][ T1987] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 51.732792][ T1987] RIP: 0033:0x7fe57a3346c9 [ 51.737288][ T1987] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 51.756881][ T1987] RSP: 002b:00007fe578d9bfe8 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 51.765284][ T1987] RAX: ffffffffffffffda RBX: 00007fe57a58afa0 RCX: 00007fe57a3346c9 [ 51.773352][ T1987] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00000000640c7000 [ 51.781316][ T1987] RBP: 00007fe578d9c090 R08: 0000000000000000 R09: 0000000000000000 [ 51.789428][ T1987] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000001 [ 51.797394][ T1987] R13: 00007fe57a58b038 R14: 00007fe57a58afa0 R15: 00007fff8d8e9768 [ 51.813139][ T1987] syz.4.494: vmalloc: allocation failure: 32768 bytes, mode:0xdc0(GFP_KERNEL|__GFP_ZERO), nodemask=(null),cpuset=syz4,mems_allowed=0 [ 51.849562][ T1987] CPU: 1 PID: 1987 Comm: syz.4.494 Tainted: G W syzkaller #0 [ 51.858272][ T1987] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 51.868335][ T1987] Call Trace: [ 51.871641][ T1987] __dump_stack+0x21/0x24 [ 51.876322][ T1987] dump_stack_lvl+0x169/0x1d8 [ 51.880999][ T1987] ? show_regs_print_info+0x18/0x18 [ 51.886191][ T1987] ? pr_cont_kernfs_name+0xe3/0xf0 [ 51.891307][ T1987] dump_stack+0x15/0x1c [ 51.895455][ T1987] warn_alloc+0x1b0/0x1d0 [ 51.899809][ T1987] ? slab_free_freelist_hook+0xc5/0x190 [ 51.905443][ T1987] ? zone_watermark_ok_safe+0x250/0x250 [ 51.910984][ T1987] ? kfree+0xc0/0x270 [ 51.914958][ T1987] ? __get_vm_area_node+0x15c/0x450 [ 51.920146][ T1987] __vmalloc_node_range+0x27d/0x780 [ 51.925332][ T1987] ? kmem_cache_alloc+0x165/0x2e0 [ 51.930346][ T1987] dup_task_struct+0x40f/0xbd0 [ 51.935109][ T1987] ? copy_process+0x5b2/0x32c0 [ 51.939869][ T1987] ? __kasan_check_write+0x14/0x20 [ 51.944968][ T1987] ? recalc_sigpending+0x1ac/0x230 [ 51.950071][ T1987] copy_process+0x5b2/0x32c0 [ 51.954656][ T1987] ? memset+0x35/0x40 [ 51.958804][ T1987] ? proc_fail_nth_read+0x210/0x210 [ 51.963994][ T1987] ? __pidfd_prepare+0x150/0x150 [ 51.968918][ T1987] ? rw_verify_area+0x1c0/0x360 [ 51.973759][ T1987] ? vfs_write+0xac8/0xd60 [ 51.978173][ T1987] ? __kasan_slab_free+0x11/0x20 [ 51.983106][ T1987] kernel_clone+0x23f/0x940 [ 51.987595][ T1987] ? kernel_write+0x3c0/0x3c0 [ 51.992276][ T1987] ? create_io_thread+0x130/0x130 [ 51.997288][ T1987] ? mutex_lock+0x8c/0xe0 [ 52.001616][ T1987] __x64_sys_clone+0x176/0x1d0 [ 52.006371][ T1987] ? __ia32_sys_vfork+0xf0/0xf0 [ 52.011210][ T1987] ? ksys_write+0x1eb/0x240 [ 52.015879][ T1987] ? debug_smp_processor_id+0x17/0x20 [ 52.021244][ T1987] ? fpregs_assert_state_consistent+0xb1/0xe0 [ 52.027886][ T1987] ? exit_to_user_mode_prepare+0x2f/0xa0 [ 52.033521][ T1987] do_syscall_64+0x31/0x40 [ 52.037942][ T1987] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 52.043842][ T1987] RIP: 0033:0x7fe57a3346c9 [ 52.048255][ T1987] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 52.067945][ T1987] RSP: 002b:00007fe578d9bfe8 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 52.076358][ T1987] RAX: ffffffffffffffda RBX: 00007fe57a58afa0 RCX: 00007fe57a3346c9 [ 52.084327][ T1987] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00000000640c7000 [ 52.092301][ T1987] RBP: 00007fe578d9c090 R08: 0000000000000000 R09: 0000000000000000 [ 52.100280][ T1987] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000001 [ 52.108257][ T1987] R13: 00007fe57a58b038 R14: 00007fe57a58afa0 R15: 00007fff8d8e9768 [ 52.138847][ T1987] Mem-Info: [ 52.142262][ T1987] active_anon:37 inactive_anon:6950 isolated_anon:0 [ 52.142262][ T1987] active_file:13128 inactive_file:9069 isolated_file:0 [ 52.142262][ T1987] unevictable:0 dirty:461 writeback:0 [ 52.142262][ T1987] slab_reclaimable:7282 slab_unreclaimable:76187 [ 52.142262][ T1987] mapped:29307 shmem:162 pagetables:578 bounce:0 [ 52.142262][ T1987] free:1570614 free_pcp:994 free_cma:0 [ 52.188289][ T1987] Node 0 active_anon:148kB inactive_anon:28100kB active_file:52512kB inactive_file:36276kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:117328kB dirty:1844kB writeback:0kB shmem:648kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 0kB writeback_tmp:0kB kernel_stack:6112kB all_unreclaimable? no [ 52.238431][ T1987] DMA32 free:2987448kB min:62668kB low:78332kB high:93996kB reserved_highatomic:0KB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:3145324kB managed:2988780kB mlocked:0kB pagetables:0kB bounce:0kB free_pcp:1332kB local_pcp:1332kB free_cma:0kB [ 52.284525][ T1987] lowmem_reserve[]: 0 3941 3941 [ 52.289709][ T1987] Normal free:3294752kB min:84784kB low:105980kB high:127176kB reserved_highatomic:0KB active_anon:148kB inactive_anon:28100kB active_file:52512kB inactive_file:36276kB unevictable:0kB writepending:1844kB present:5242880kB managed:4036368kB mlocked:0kB pagetables:2608kB bounce:0kB free_pcp:2660kB local_pcp:1500kB free_cma:0kB [ 52.370268][ T1987] lowmem_reserve[]: 0 0 0 [ 52.374728][ T1987] DMA32: 6*4kB (UM) 4*8kB (M) 4*16kB (M) 6*32kB (UM) 8*64kB (UM) 5*128kB (UM) 6*256kB (UM) 5*512kB (M) 6*1024kB (UM) 3*2048kB (UM) 725*4096kB (M) = 2987448kB [ 52.393439][ T1987] Normal: 689*4kB (UME) 605*8kB (UME) 906*16kB (UME) 432*32kB (UME) 283*64kB (ME) 68*128kB (UME) 48*256kB (UME) 18*512kB (UM) 11*1024kB (M) 4*2048kB (UME) 779*4096kB (M) = 3294476kB [ 52.557870][ T1987] 22484 total pagecache pages [ 52.588376][ T1987] 0 pages in swap cache [ 52.592849][ T1987] Swap cache stats: add 0, delete 0, find 0/0 [ 52.599276][ T1987] Free swap = 124996kB [ 52.603526][ T1987] Total swap = 124996kB [ 52.607700][ T1987] 2097051 pages RAM [ 52.611555][ T1987] 0 pages HighMem/MovableOnly [ 52.630002][ T1987] 340764 pages reserved [ 52.638575][ T1987] 0 pages cma reserved [ 52.836134][ T2036] bridge0: port 2(bridge_slave_1) entered disabled state [ 52.844252][ T2036] bridge0: port 1(bridge_slave_0) entered disabled state [ 52.958819][ T2041] device bridge_slave_1 left promiscuous mode [ 52.993872][ T2041] bridge0: port 2(bridge_slave_1) entered disabled state [ 53.061927][ T2041] device bridge_slave_0 left promiscuous mode [ 53.132379][ T2041] bridge0: port 1(bridge_slave_0) entered disabled state [ 53.425499][ T2068] FAULT_INJECTION: forcing a failure. [ 53.425499][ T2068] name fail_usercopy, interval 1, probability 0, space 0, times 1 [ 53.440760][ T2068] CPU: 0 PID: 2068 Comm: syz.0.520 Tainted: G W syzkaller #0 [ 53.449449][ T2068] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 53.459556][ T2068] Call Trace: [ 53.462853][ T2068] __dump_stack+0x21/0x24 [ 53.467187][ T2068] dump_stack_lvl+0x169/0x1d8 [ 53.471874][ T2068] ? thaw_kernel_threads+0x220/0x220 [ 53.477138][ T2068] ? vsnprintf+0x1871/0x1960 [ 53.481718][ T2068] ? show_regs_print_info+0x18/0x18 [ 53.486898][ T2068] dump_stack+0x15/0x1c [ 53.491060][ T2068] should_fail+0x3c1/0x510 [ 53.495468][ T2068] should_fail_usercopy+0x1a/0x20 [ 53.500481][ T2068] _copy_to_user+0x20/0x90 [ 53.504903][ T2068] simple_read_from_buffer+0xe9/0x160 [ 53.510285][ T2068] proc_fail_nth_read+0x19a/0x210 [ 53.515322][ T2068] ? proc_fault_inject_write+0x2f0/0x2f0 [ 53.520944][ T2068] ? rw_verify_area+0x1c0/0x360 [ 53.525859][ T2068] ? proc_fault_inject_write+0x2f0/0x2f0 [ 53.531488][ T2068] vfs_read+0x1fe/0xa10 [ 53.535631][ T2068] ? kernel_read+0x70/0x70 [ 53.540033][ T2068] ? __bpf_trace_kmem_free+0x6f/0x90 [ 53.545403][ T2068] ? __kasan_check_write+0x14/0x20 [ 53.550680][ T2068] ? mutex_lock+0x8c/0xe0 [ 53.555002][ T2068] ? mutex_trylock+0xa0/0xa0 [ 53.559594][ T2068] ? __fget_files+0x2c4/0x320 [ 53.564344][ T2068] ? __fdget_pos+0x2d2/0x380 [ 53.569009][ T2068] ? ksys_read+0x71/0x240 [ 53.573339][ T2068] ksys_read+0x140/0x240 [ 53.577574][ T2068] ? vfs_write+0xd60/0xd60 [ 53.581974][ T2068] ? ____fput+0x15/0x20 [ 53.586130][ T2068] ? task_work_run+0x170/0x190 [ 53.590886][ T2068] ? __kasan_check_read+0x11/0x20 [ 53.595896][ T2068] __x64_sys_read+0x7b/0x90 [ 53.600386][ T2068] do_syscall_64+0x31/0x40 [ 53.604786][ T2068] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 53.610660][ T2068] RIP: 0033:0x7f2181d470dc [ 53.615060][ T2068] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 93 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 ef 93 02 00 48 [ 53.634654][ T2068] RSP: 002b:00007f21807b0030 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 53.643075][ T2068] RAX: ffffffffffffffda RBX: 00007f2181f9efa0 RCX: 00007f2181d470dc [ 53.651034][ T2068] RDX: 000000000000000f RSI: 00007f21807b00a0 RDI: 0000000000000006 [ 53.659001][ T2068] RBP: 00007f21807b0090 R08: 0000000000000000 R09: 0000000000000000 [ 53.667169][ T2068] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 53.675304][ T2068] R13: 00007f2181f9f038 R14: 00007f2181f9efa0 R15: 00007ffcb4635738 [ 55.329875][ T24] audit: type=1400 audit(1763398138.770:135): avc: denied { create } for pid=2147 comm="syz.0.548" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 55.732126][ T2193] bridge0: port 2(bridge_slave_1) entered disabled state [ 55.739384][ T2193] bridge0: port 1(bridge_slave_0) entered disabled state [ 55.892108][ T2190] device bridge_slave_1 left promiscuous mode [ 55.922052][ T2190] bridge0: port 2(bridge_slave_1) entered disabled state [ 55.984864][ T2190] device bridge_slave_0 left promiscuous mode [ 56.011146][ T2190] bridge0: port 1(bridge_slave_0) entered disabled state [ 59.739446][ T24] audit: type=1400 audit(1763398143.180:136): avc: denied { ioctl } for pid=2371 comm="syz.0.618" path="" dev="cgroup2" ino=245 ioctlcmd=0x54c8 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 [ 60.377118][ T2402] device syzkaller0 entered promiscuous mode [ 62.068976][ T2493] device sit0 left promiscuous mode [ 62.199853][ T2496] device sit0 entered promiscuous mode [ 71.316647][ T2863] device syzkaller0 entered promiscuous mode [ 72.947836][ T2926] device syzkaller0 entered promiscuous mode [ 73.533652][ T2985] device sit0 left promiscuous mode [ 73.635703][ T2989] device syzkaller0 entered promiscuous mode [ 73.655404][ T2985] device sit0 entered promiscuous mode [ 77.505056][ T3169] device veth0_vlan left promiscuous mode [ 77.607444][ T3169] device veth0_vlan entered promiscuous mode [ 88.968988][ T3644] device syzkaller0 entered promiscuous mode [ 91.716049][ T3775] device veth0_vlan left promiscuous mode [ 91.725782][ T3775] device veth0_vlan entered promiscuous mode [ 91.753181][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 91.812207][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 91.822334][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 92.786816][ T3819] device veth0_vlan left promiscuous mode [ 92.835392][ T3819] device veth0_vlan entered promiscuous mode [ 92.971157][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 92.988524][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 93.036952][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ: link becomes ready [ 93.351638][ T3850] FAULT_INJECTION: forcing a failure. [ 93.351638][ T3850] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 93.414161][ T3850] CPU: 0 PID: 3850 Comm: syz.1.1087 Tainted: G W syzkaller #0 [ 93.423132][ T3850] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 93.433275][ T3850] Call Trace: [ 93.436575][ T3850] __dump_stack+0x21/0x24 [ 93.440925][ T3850] dump_stack_lvl+0x169/0x1d8 [ 93.445829][ T3850] ? show_regs_print_info+0x18/0x18 [ 93.451046][ T3850] ? do_vfs_ioctl+0x766/0x1510 [ 93.455820][ T3850] ? __ia32_compat_sys_ioctl+0x7b0/0x7b0 [ 93.461465][ T3850] dump_stack+0x15/0x1c [ 93.465630][ T3850] should_fail+0x3c1/0x510 [ 93.470064][ T3850] should_fail_usercopy+0x1a/0x20 [ 93.475099][ T3850] _copy_from_user+0x20/0xd0 [ 93.479819][ T3850] __tun_chr_ioctl+0x1ef/0x1cd0 [ 93.484687][ T3850] ? tun_flow_create+0x320/0x320 [ 93.489636][ T3850] ? __fget_files+0x2c4/0x320 [ 93.494327][ T3850] tun_chr_ioctl+0x2a/0x40 [ 93.498755][ T3850] ? tun_chr_poll+0x6b0/0x6b0 [ 93.503439][ T3850] __se_sys_ioctl+0x121/0x1a0 [ 93.508125][ T3850] __x64_sys_ioctl+0x7b/0x90 [ 93.512727][ T3850] do_syscall_64+0x31/0x40 [ 93.517154][ T3850] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 93.523062][ T3850] RIP: 0033:0x7f1d595406c9 [ 93.527489][ T3850] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 93.547218][ T3850] RSP: 002b:00007f1d57fa8038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 93.555654][ T3850] RAX: ffffffffffffffda RBX: 00007f1d59796fa0 RCX: 00007f1d595406c9 [ 93.563640][ T3850] RDX: 0000200000000200 RSI: 00000000400454ca RDI: 0000000000000004 [ 93.571629][ T3850] RBP: 00007f1d57fa8090 R08: 0000000000000000 R09: 0000000000000000 [ 93.579626][ T3850] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 93.587618][ T3850] R13: 00007f1d59797038 R14: 00007f1d59796fa0 R15: 00007fffa79f8878 [ 94.165703][ T3869] device veth0_vlan left promiscuous mode [ 94.217250][ T3869] device veth0_vlan entered promiscuous mode [ 94.264153][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 94.280125][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 94.317386][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 96.850817][ T3976] device sit0 left promiscuous mode [ 97.369394][ T3980] device sit0 entered promiscuous mode [ 99.293812][ T4047] device sit0 entered promiscuous mode [ 100.407673][ T4072] FAULT_INJECTION: forcing a failure. [ 100.407673][ T4072] name fail_page_alloc, interval 1, probability 0, space 0, times 1 [ 100.591192][ T4072] CPU: 0 PID: 4072 Comm: syz.3.1160 Tainted: G W syzkaller #0 [ 100.600145][ T4072] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 100.610390][ T4072] Call Trace: [ 100.613696][ T4072] __dump_stack+0x21/0x24 [ 100.618045][ T4072] dump_stack_lvl+0x169/0x1d8 [ 100.622734][ T4072] ? asm_sysvec_apic_timer_interrupt+0x12/0x20 [ 100.628897][ T4072] ? show_regs_print_info+0x18/0x18 [ 100.634104][ T4072] ? dump_stack+0x9/0x1c [ 100.638371][ T4072] dump_stack+0x15/0x1c [ 100.642541][ T4072] should_fail+0x3c1/0x510 [ 100.646966][ T4072] should_fail_alloc_page+0x4f/0x60 [ 100.652168][ T4072] __alloc_pages_nodemask+0x109/0x5f0 [ 100.657545][ T4072] ? gfp_pfmemalloc_allowed+0x130/0x130 [ 100.663182][ T4072] ? kvm_sched_clock_read+0x18/0x40 [ 100.668396][ T4072] ? sched_clock+0x3a/0x40 [ 100.672951][ T4072] ? sched_clock_cpu+0x1b/0x3d0 [ 100.677824][ T4072] kmalloc_order+0x4c/0x160 [ 100.682344][ T4072] ? sysvec_apic_timer_interrupt+0xcb/0xe0 [ 100.688160][ T4072] kmalloc_order_trace+0x16/0x80 [ 100.693112][ T4072] __kmalloc+0x1ee/0x330 [ 100.697393][ T4072] kvmalloc_node+0x88/0x130 [ 100.701911][ T4072] alloc_netdev_mqs+0x88/0xc80 [ 100.706679][ T4072] ? selinux_tun_dev_create+0x95/0xb0 [ 100.712057][ T4072] ? tun_not_capable+0x1f0/0x1f0 [ 100.717004][ T4072] tun_set_iff+0x535/0xe00 [ 100.721514][ T4072] __tun_chr_ioctl+0x795/0x1cd0 [ 100.726370][ T4072] ? tun_flow_create+0x320/0x320 [ 100.731308][ T4072] ? sched_clock_cpu+0x1b/0x3d0 [ 100.736165][ T4072] ? __fget_files+0x2c4/0x320 [ 100.740846][ T4072] tun_chr_ioctl+0x2a/0x40 [ 100.745292][ T4072] ? tun_chr_poll+0x6b0/0x6b0 [ 100.749971][ T4072] __se_sys_ioctl+0x121/0x1a0 [ 100.754651][ T4072] __x64_sys_ioctl+0x7b/0x90 [ 100.759241][ T4072] do_syscall_64+0x31/0x40 [ 100.763665][ T4072] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 100.769559][ T4072] RIP: 0033:0x7f4697cd36c9 [ 100.773983][ T4072] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 100.793595][ T4072] RSP: 002b:00007f469673b038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 100.802015][ T4072] RAX: ffffffffffffffda RBX: 00007f4697f29fa0 RCX: 00007f4697cd36c9 [ 100.809994][ T4072] RDX: 0000200000000200 RSI: 00000000400454ca RDI: 0000000000000004 [ 100.817965][ T4072] RBP: 00007f469673b090 R08: 0000000000000000 R09: 0000000000000000 [ 100.825960][ T4072] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 100.833944][ T4072] R13: 00007f4697f2a038 R14: 00007f4697f29fa0 R15: 00007fff85f5c918 [ 101.409843][ T24] audit: type=1400 audit(1763398184.840:137): avc: denied { create } for pid=4099 comm="syz.3.1172" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rxrpc_socket permissive=1 [ 101.748051][ T4115] device macsec0 left promiscuous mode [ 103.187021][ T4166] FAULT_INJECTION: forcing a failure. [ 103.187021][ T4166] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 103.243477][ T4166] CPU: 1 PID: 4166 Comm: syz.2.1194 Tainted: G W syzkaller #0 [ 103.252357][ T4166] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 103.262512][ T4166] Call Trace: [ 103.265869][ T4166] __dump_stack+0x21/0x24 [ 103.270206][ T4166] dump_stack_lvl+0x169/0x1d8 [ 103.274882][ T4166] ? show_regs_print_info+0x18/0x18 [ 103.280083][ T4166] ? vfs_write+0xac8/0xd60 [ 103.284500][ T4166] dump_stack+0x15/0x1c [ 103.288671][ T4166] should_fail+0x3c1/0x510 [ 103.293101][ T4166] should_fail_usercopy+0x1a/0x20 [ 103.298129][ T4166] _copy_from_user+0x20/0xd0 [ 103.302814][ T4166] __se_sys_bpf+0x181/0x680 [ 103.307328][ T4166] ? __x64_sys_bpf+0x90/0x90 [ 103.311961][ T4166] ? debug_smp_processor_id+0x17/0x20 [ 103.317331][ T4166] __x64_sys_bpf+0x7b/0x90 [ 103.321746][ T4166] do_syscall_64+0x31/0x40 [ 103.326160][ T4166] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 103.332051][ T4166] RIP: 0033:0x7fb25af8c6c9 [ 103.336471][ T4166] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 103.356083][ T4166] RSP: 002b:00007fb2599f4038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 103.364520][ T4166] RAX: ffffffffffffffda RBX: 00007fb25b1e2fa0 RCX: 00007fb25af8c6c9 [ 103.372493][ T4166] RDX: 0000000000000050 RSI: 0000200000000840 RDI: 0000000000000000 [ 103.380462][ T4166] RBP: 00007fb2599f4090 R08: 0000000000000000 R09: 0000000000000000 [ 103.388521][ T4166] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 103.396663][ T4166] R13: 00007fb25b1e3038 R14: 00007fb25b1e2fa0 R15: 00007fff34f28e48 [ 104.871545][ T4234] syz.1.1216[4234] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 104.871601][ T4234] syz.1.1216[4234] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 105.079906][ T4250] FAULT_INJECTION: forcing a failure. [ 105.079906][ T4250] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 105.111284][ T4250] CPU: 1 PID: 4250 Comm: syz.4.1223 Tainted: G W syzkaller #0 [ 105.120085][ T4250] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 105.130237][ T4250] Call Trace: [ 105.133532][ T4250] __dump_stack+0x21/0x24 [ 105.137860][ T4250] dump_stack_lvl+0x169/0x1d8 [ 105.142536][ T4250] ? show_regs_print_info+0x18/0x18 [ 105.147733][ T4250] ? stack_trace_save+0x98/0xe0 [ 105.152583][ T4250] dump_stack+0x15/0x1c [ 105.156751][ T4250] should_fail+0x3c1/0x510 [ 105.161167][ T4250] should_fail_usercopy+0x1a/0x20 [ 105.166277][ T4250] _copy_from_user+0x20/0xd0 [ 105.170864][ T4250] __copy_msghdr_from_user+0xaf/0x5e0 [ 105.176239][ T4250] ? __ia32_sys_shutdown+0x1e0/0x1e0 [ 105.181529][ T4250] ? __fsnotify_parent+0x5f5/0x6c0 [ 105.186735][ T4250] ___sys_sendmsg+0x156/0x260 [ 105.191420][ T4250] ? __sys_sendmsg+0x250/0x250 [ 105.196184][ T4250] ? rw_verify_area+0x1c0/0x360 [ 105.201042][ T4250] ? __fdget+0x1a1/0x230 [ 105.205304][ T4250] __x64_sys_sendmsg+0x1e2/0x2a0 [ 105.210238][ T4250] ? fput+0x1a/0x20 [ 105.214065][ T4250] ? ___sys_sendmsg+0x260/0x260 [ 105.219073][ T4250] ? debug_smp_processor_id+0x17/0x20 [ 105.224450][ T4250] ? fpregs_assert_state_consistent+0xb1/0xe0 [ 105.230523][ T4250] ? exit_to_user_mode_prepare+0x2f/0xa0 [ 105.236155][ T4250] do_syscall_64+0x31/0x40 [ 105.240675][ T4250] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 105.246560][ T4250] RIP: 0033:0x7fe57a3346c9 [ 105.250977][ T4250] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 105.270665][ T4250] RSP: 002b:00007fe578d9c038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 105.279076][ T4250] RAX: ffffffffffffffda RBX: 00007fe57a58afa0 RCX: 00007fe57a3346c9 [ 105.287047][ T4250] RDX: 0000000000000000 RSI: 0000200000000b40 RDI: 0000000000000004 [ 105.295015][ T4250] RBP: 00007fe578d9c090 R08: 0000000000000000 R09: 0000000000000000 [ 105.302983][ T4250] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 105.310953][ T4250] R13: 00007fe57a58b038 R14: 00007fe57a58afa0 R15: 00007fff8d8e9768 [ 105.464643][ T4264] FAULT_INJECTION: forcing a failure. [ 105.464643][ T4264] name failslab, interval 1, probability 0, space 0, times 0 [ 105.564364][ T4264] CPU: 0 PID: 4264 Comm: syz.3.1227 Tainted: G W syzkaller #0 [ 105.573158][ T4264] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 105.583230][ T4264] Call Trace: [ 105.586535][ T4264] __dump_stack+0x21/0x24 [ 105.590893][ T4264] dump_stack_lvl+0x169/0x1d8 [ 105.595585][ T4264] ? thaw_kernel_threads+0x220/0x220 [ 105.600880][ T4264] ? show_regs_print_info+0x18/0x18 [ 105.606117][ T4264] ? selinux_capable+0x29c/0x380 [ 105.611069][ T4264] ? selinux_capset+0xf0/0xf0 [ 105.615747][ T4264] dump_stack+0x15/0x1c [ 105.619904][ T4264] should_fail+0x3c1/0x510 [ 105.624317][ T4264] ? htab_map_alloc+0x99/0x970 [ 105.629086][ T4264] __should_failslab+0xa4/0xe0 [ 105.633863][ T4264] should_failslab+0x9/0x20 [ 105.638368][ T4264] kmem_cache_alloc_trace+0x3a/0x2e0 [ 105.643645][ T4264] ? security_capable+0x87/0xb0 [ 105.648486][ T4264] htab_map_alloc+0x99/0x970 [ 105.653064][ T4264] ? htab_map_alloc_check+0x3f0/0x4e0 [ 105.658423][ T4264] map_create+0x44e/0x2090 [ 105.662842][ T4264] __se_sys_bpf+0x203/0x680 [ 105.667332][ T4264] ? __x64_sys_bpf+0x90/0x90 [ 105.671934][ T4264] ? debug_smp_processor_id+0x17/0x20 [ 105.677396][ T4264] __x64_sys_bpf+0x7b/0x90 [ 105.681906][ T4264] do_syscall_64+0x31/0x40 [ 105.686420][ T4264] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 105.692303][ T4264] RIP: 0033:0x7f4697cd36c9 [ 105.696737][ T4264] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 105.716333][ T4264] RSP: 002b:00007f469673b038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 105.724740][ T4264] RAX: ffffffffffffffda RBX: 00007f4697f29fa0 RCX: 00007f4697cd36c9 [ 105.732703][ T4264] RDX: 0000000000000050 RSI: 0000200000000840 RDI: 0000000000000000 [ 105.740667][ T4264] RBP: 00007f469673b090 R08: 0000000000000000 R09: 0000000000000000 [ 105.748628][ T4264] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 105.756674][ T4264] R13: 00007f4697f2a038 R14: 00007f4697f29fa0 R15: 00007fff85f5c918 [ 107.272628][ T4322] FAULT_INJECTION: forcing a failure. [ 107.272628][ T4322] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 107.286361][ T4322] CPU: 0 PID: 4322 Comm: syz.3.1247 Tainted: G W syzkaller #0 [ 107.295223][ T4322] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 107.305277][ T4322] Call Trace: [ 107.308581][ T4322] __dump_stack+0x21/0x24 [ 107.312911][ T4322] dump_stack_lvl+0x169/0x1d8 [ 107.317580][ T4322] ? show_regs_print_info+0x18/0x18 [ 107.322769][ T4322] ? printk+0xfc/0x110 [ 107.326894][ T4322] dump_stack+0x15/0x1c [ 107.331039][ T4322] should_fail+0x3c1/0x510 [ 107.335460][ T4322] should_fail_alloc_page+0x4f/0x60 [ 107.340645][ T4322] __alloc_pages_nodemask+0x109/0x5f0 [ 107.346009][ T4322] ? gfp_pfmemalloc_allowed+0x130/0x130 [ 107.351543][ T4322] ? memcpy+0x56/0x70 [ 107.355512][ T4322] kmalloc_order+0x4c/0x160 [ 107.360008][ T4322] kmalloc_order_trace+0x16/0x80 [ 107.365020][ T4322] __kmalloc+0x1ee/0x330 [ 107.369259][ T4322] kvmalloc_node+0x88/0x130 [ 107.373751][ T4322] alloc_netdev_mqs+0x61e/0xc80 [ 107.378590][ T4322] tun_set_iff+0x535/0xe00 [ 107.383009][ T4322] __tun_chr_ioctl+0x795/0x1cd0 [ 107.387847][ T4322] ? tun_flow_create+0x320/0x320 [ 107.392770][ T4322] ? __f_unlock_pos+0xd/0x20 [ 107.397348][ T4322] ? __fget_files+0x2c4/0x320 [ 107.402020][ T4322] tun_chr_ioctl+0x2a/0x40 [ 107.406517][ T4322] ? tun_chr_poll+0x6b0/0x6b0 [ 107.411180][ T4322] __se_sys_ioctl+0x121/0x1a0 [ 107.415845][ T4322] __x64_sys_ioctl+0x7b/0x90 [ 107.420423][ T4322] do_syscall_64+0x31/0x40 [ 107.424858][ T4322] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 107.430738][ T4322] RIP: 0033:0x7f4697cd36c9 [ 107.435145][ T4322] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 107.454754][ T4322] RSP: 002b:00007f469673b038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 107.463175][ T4322] RAX: ffffffffffffffda RBX: 00007f4697f29fa0 RCX: 00007f4697cd36c9 [ 107.471147][ T4322] RDX: 0000200000000200 RSI: 00000000400454ca RDI: 0000000000000004 [ 107.479130][ T4322] RBP: 00007f469673b090 R08: 0000000000000000 R09: 0000000000000000 [ 107.487103][ T4322] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 107.495066][ T4322] R13: 00007f4697f2a038 R14: 00007f4697f29fa0 R15: 00007fff85f5c918 [ 108.139472][ T4357] FAULT_INJECTION: forcing a failure. [ 108.139472][ T4357] name failslab, interval 1, probability 0, space 0, times 0 [ 108.155924][ T4357] CPU: 0 PID: 4357 Comm: syz.1.1258 Tainted: G W syzkaller #0 [ 108.164704][ T4357] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 108.174757][ T4357] Call Trace: [ 108.178044][ T4357] __dump_stack+0x21/0x24 [ 108.182362][ T4357] dump_stack_lvl+0x169/0x1d8 [ 108.187027][ T4357] ? thaw_kernel_threads+0x220/0x220 [ 108.192299][ T4357] ? show_regs_print_info+0x18/0x18 [ 108.197485][ T4357] ? slab_post_alloc_hook+0x5d/0x2f0 [ 108.202754][ T4357] ? security_inode_alloc+0x33/0x110 [ 108.208030][ T4357] ? inode_init_always+0x70a/0x9b0 [ 108.213134][ T4357] ? new_inode_pseudo+0x91/0x210 [ 108.218095][ T4357] ? proc_pid_make_inode+0x27/0x1d0 [ 108.223285][ T4357] ? proc_pident_instantiate+0x69/0x2b0 [ 108.228815][ T4357] ? proc_pident_lookup+0x1c0/0x270 [ 108.234000][ T4357] dump_stack+0x15/0x1c [ 108.238146][ T4357] should_fail+0x3c1/0x510 [ 108.242553][ T4357] ? __alloc_skb+0x9e/0x520 [ 108.247056][ T4357] __should_failslab+0xa4/0xe0 [ 108.251810][ T4357] should_failslab+0x9/0x20 [ 108.256300][ T4357] kmem_cache_alloc+0x3d/0x2e0 [ 108.261052][ T4357] __alloc_skb+0x9e/0x520 [ 108.265374][ T4357] alloc_skb_with_frags+0xa2/0x560 [ 108.270475][ T4357] sock_alloc_send_pskb+0x853/0x980 [ 108.275673][ T4357] ? sock_kzfree_s+0x60/0x60 [ 108.280255][ T4357] ? __kasan_check_write+0x14/0x20 [ 108.285356][ T4357] ? _raw_spin_lock+0x8e/0xe0 [ 108.290044][ T4357] ? _raw_spin_trylock_bh+0x130/0x130 [ 108.295426][ T4357] ? security_socket_getpeersec_dgram+0x93/0xb0 [ 108.301763][ T4357] unix_dgram_sendmsg+0x5f4/0x17d0 [ 108.306871][ T4357] ? selinux_socket_accept+0x500/0x500 [ 108.312324][ T4357] ? stack_trace_snprint+0xf0/0xf0 [ 108.317423][ T4357] ? unix_dgram_poll+0x620/0x620 [ 108.322357][ T4357] ? security_socket_sendmsg+0x82/0xa0 [ 108.327821][ T4357] ? unix_dgram_poll+0x620/0x620 [ 108.332765][ T4357] ____sys_sendmsg+0x5a2/0x8c0 [ 108.337518][ T4357] ? __sys_sendmsg_sock+0x40/0x40 [ 108.342538][ T4357] ? import_iovec+0x7c/0xb0 [ 108.347040][ T4357] ___sys_sendmsg+0x1f0/0x260 [ 108.351706][ T4357] ? __sys_sendmsg+0x250/0x250 [ 108.356546][ T4357] ? bpf_trace_printk+0xac3/0xd30 [ 108.361566][ T4357] ? __fdget+0x1a1/0x230 [ 108.365807][ T4357] __x64_sys_sendmsg+0x1e2/0x2a0 [ 108.370741][ T4357] ? ___sys_sendmsg+0x260/0x260 [ 108.375590][ T4357] ? syscall_trace_enter+0x108/0x170 [ 108.380881][ T4357] do_syscall_64+0x31/0x40 [ 108.385304][ T4357] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 108.391186][ T4357] RIP: 0033:0x7f1d595406c9 [ 108.395591][ T4357] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 108.415285][ T4357] RSP: 002b:00007f1d57fa8038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 108.423730][ T4357] RAX: ffffffffffffffda RBX: 00007f1d59796fa0 RCX: 00007f1d595406c9 [ 108.431705][ T4357] RDX: 0000000000000000 RSI: 0000200000000b40 RDI: 0000000000000004 [ 108.439672][ T4357] RBP: 00007f1d57fa8090 R08: 0000000000000000 R09: 0000000000000000 [ 108.447635][ T4357] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 108.455601][ T4357] R13: 00007f1d59797038 R14: 00007f1d59796fa0 R15: 00007fffa79f8878 [ 109.558926][ T4384] device syzkaller0 entered promiscuous mode [ 111.763363][ T4485] FAULT_INJECTION: forcing a failure. [ 111.763363][ T4485] name failslab, interval 1, probability 0, space 0, times 0 [ 111.805379][ T4485] CPU: 1 PID: 4485 Comm: syz.4.1298 Tainted: G W syzkaller #0 [ 111.814175][ T4485] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 111.824242][ T4485] Call Trace: [ 111.827547][ T4485] __dump_stack+0x21/0x24 [ 111.831880][ T4485] dump_stack_lvl+0x169/0x1d8 [ 111.836574][ T4485] ? show_regs_print_info+0x18/0x18 [ 111.841783][ T4485] dump_stack+0x15/0x1c [ 111.845982][ T4485] should_fail+0x3c1/0x510 [ 111.850406][ T4485] ? alloc_skb_with_frags+0xa2/0x560 [ 111.855764][ T4485] __should_failslab+0xa4/0xe0 [ 111.860520][ T4485] should_failslab+0x9/0x20 [ 111.865279][ T4485] __kmalloc_track_caller+0x5f/0x320 [ 111.870560][ T4485] ? kmem_cache_alloc+0x165/0x2e0 [ 111.875573][ T4485] ? __alloc_skb+0x9e/0x520 [ 111.880073][ T4485] ? alloc_skb_with_frags+0xa2/0x560 [ 111.885360][ T4485] __alloc_skb+0xdc/0x520 [ 111.889693][ T4485] alloc_skb_with_frags+0xa2/0x560 [ 111.894795][ T4485] sock_alloc_send_pskb+0x853/0x980 [ 111.900020][ T4485] ? sock_kzfree_s+0x60/0x60 [ 111.904602][ T4485] ? __kasan_check_write+0x14/0x20 [ 111.909703][ T4485] ? _raw_spin_lock+0x8e/0xe0 [ 111.914367][ T4485] ? _raw_spin_trylock_bh+0x130/0x130 [ 111.919729][ T4485] ? security_socket_getpeersec_dgram+0x93/0xb0 [ 111.925961][ T4485] unix_dgram_sendmsg+0x5f4/0x17d0 [ 111.931062][ T4485] ? selinux_socket_accept+0x500/0x500 [ 111.936518][ T4485] ? stack_trace_snprint+0xf0/0xf0 [ 111.941623][ T4485] ? unix_dgram_poll+0x620/0x620 [ 111.946552][ T4485] ? kasan_set_track+0x5b/0x70 [ 111.951435][ T4485] ? kasan_set_track+0x4a/0x70 [ 111.956186][ T4485] ? security_socket_sendmsg+0x82/0xa0 [ 111.961627][ T4485] ? unix_dgram_poll+0x620/0x620 [ 111.966549][ T4485] ____sys_sendmsg+0x5a2/0x8c0 [ 111.971306][ T4485] ? __sys_sendmsg_sock+0x40/0x40 [ 111.976580][ T4485] ? import_iovec+0x7c/0xb0 [ 111.981094][ T4485] ___sys_sendmsg+0x1f0/0x260 [ 111.985756][ T4485] ? __sys_sendmsg+0x250/0x250 [ 111.990509][ T4485] ? rw_verify_area+0x1c0/0x360 [ 111.995350][ T4485] ? __fdget+0x1a1/0x230 [ 111.999580][ T4485] __x64_sys_sendmsg+0x1e2/0x2a0 [ 112.004507][ T4485] ? fput+0x1a/0x20 [ 112.008303][ T4485] ? ___sys_sendmsg+0x260/0x260 [ 112.013143][ T4485] ? debug_smp_processor_id+0x17/0x20 [ 112.018505][ T4485] ? fpregs_assert_state_consistent+0xb1/0xe0 [ 112.024559][ T4485] ? exit_to_user_mode_prepare+0x2f/0xa0 [ 112.030189][ T4485] do_syscall_64+0x31/0x40 [ 112.034597][ T4485] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 112.040563][ T4485] RIP: 0033:0x7fe57a3346c9 [ 112.044967][ T4485] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 112.064645][ T4485] RSP: 002b:00007fe578d9c038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 112.073063][ T4485] RAX: ffffffffffffffda RBX: 00007fe57a58afa0 RCX: 00007fe57a3346c9 [ 112.081213][ T4485] RDX: 0000000000000000 RSI: 0000200000000b40 RDI: 0000000000000004 [ 112.089193][ T4485] RBP: 00007fe578d9c090 R08: 0000000000000000 R09: 0000000000000000 [ 112.097165][ T4485] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 112.105138][ T4485] R13: 00007fe57a58b038 R14: 00007fe57a58afa0 R15: 00007fff8d8e9768 [ 112.500399][ T4493] FAULT_INJECTION: forcing a failure. [ 112.500399][ T4493] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 112.551679][ T4493] CPU: 0 PID: 4493 Comm: syz.4.1302 Tainted: G W syzkaller #0 [ 112.560477][ T4493] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 112.570863][ T4493] Call Trace: [ 112.574266][ T4493] __dump_stack+0x21/0x24 [ 112.578603][ T4493] dump_stack_lvl+0x169/0x1d8 [ 112.583287][ T4493] ? thaw_kernel_threads+0x220/0x220 [ 112.588893][ T4493] ? vsnprintf+0x1871/0x1960 [ 112.593487][ T4493] ? show_regs_print_info+0x18/0x18 [ 112.598685][ T4493] dump_stack+0x15/0x1c [ 112.602845][ T4493] should_fail+0x3c1/0x510 [ 112.607256][ T4493] should_fail_usercopy+0x1a/0x20 [ 112.612275][ T4493] _copy_to_user+0x20/0x90 [ 112.616683][ T4493] simple_read_from_buffer+0xe9/0x160 [ 112.622055][ T4493] proc_fail_nth_read+0x19a/0x210 [ 112.627070][ T4493] ? proc_fault_inject_write+0x2f0/0x2f0 [ 112.632689][ T4493] ? rw_verify_area+0x1c0/0x360 [ 112.637562][ T4493] ? proc_fault_inject_write+0x2f0/0x2f0 [ 112.643231][ T4493] vfs_read+0x1fe/0xa10 [ 112.647394][ T4493] ? kernel_read+0x70/0x70 [ 112.651814][ T4493] ? __kasan_check_write+0x14/0x20 [ 112.656920][ T4493] ? mutex_lock+0x8c/0xe0 [ 112.661237][ T4493] ? mutex_trylock+0xa0/0xa0 [ 112.665834][ T4493] ? __fget_files+0x2c4/0x320 [ 112.670519][ T4493] ? __fdget_pos+0x2d2/0x380 [ 112.675110][ T4493] ? ksys_read+0x71/0x240 [ 112.679464][ T4493] ksys_read+0x140/0x240 [ 112.683709][ T4493] ? vfs_write+0xd60/0xd60 [ 112.688113][ T4493] ? ____fput+0x15/0x20 [ 112.692260][ T4493] ? task_work_run+0x170/0x190 [ 112.697020][ T4493] ? __kasan_check_read+0x11/0x20 [ 112.702042][ T4493] __x64_sys_read+0x7b/0x90 [ 112.706537][ T4493] do_syscall_64+0x31/0x40 [ 112.710985][ T4493] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 112.716934][ T4493] RIP: 0033:0x7fe57a3330dc [ 112.721434][ T4493] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 93 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 ef 93 02 00 48 [ 112.741119][ T4493] RSP: 002b:00007fe578d9c030 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 112.749622][ T4493] RAX: ffffffffffffffda RBX: 00007fe57a58afa0 RCX: 00007fe57a3330dc [ 112.757606][ T4493] RDX: 000000000000000f RSI: 00007fe578d9c0a0 RDI: 0000000000000008 [ 112.765655][ T4493] RBP: 00007fe578d9c090 R08: 0000000000000000 R09: 0000000000000000 [ 112.773621][ T4493] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 112.781583][ T4493] R13: 00007fe57a58b038 R14: 00007fe57a58afa0 R15: 00007fff8d8e9768 [ 113.254431][ T4519] FAULT_INJECTION: forcing a failure. [ 113.254431][ T4519] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 113.353508][ T4519] CPU: 0 PID: 4519 Comm: syz.1.1310 Tainted: G W syzkaller #0 [ 113.362301][ T4519] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 113.372361][ T4519] Call Trace: [ 113.375655][ T4519] __dump_stack+0x21/0x24 [ 113.380010][ T4519] dump_stack_lvl+0x169/0x1d8 [ 113.384786][ T4519] ? show_regs_print_info+0x18/0x18 [ 113.389990][ T4519] dump_stack+0x15/0x1c [ 113.394248][ T4519] should_fail+0x3c1/0x510 [ 113.398670][ T4519] should_fail_alloc_page+0x4f/0x60 [ 113.403871][ T4519] __alloc_pages_nodemask+0x109/0x5f0 [ 113.409266][ T4519] ? bpf_map_area_alloc+0x49/0xe0 [ 113.414300][ T4519] ? gfp_pfmemalloc_allowed+0x130/0x130 [ 113.419966][ T4519] ? htab_map_alloc+0x4b6/0x970 [ 113.424840][ T4519] ? map_create+0x44e/0x2090 [ 113.429436][ T4519] ? __se_sys_bpf+0x203/0x680 [ 113.434112][ T4519] ? __x64_sys_bpf+0x7b/0x90 [ 113.438703][ T4519] ? do_syscall_64+0x31/0x40 [ 113.443305][ T4519] kmalloc_order+0x4c/0x160 [ 113.447815][ T4519] kmalloc_order_trace+0x16/0x80 [ 113.452757][ T4519] __kmalloc+0x1ee/0x330 [ 113.457006][ T4519] bpf_map_area_alloc+0x49/0xe0 [ 113.461862][ T4519] prealloc_init+0x147/0x810 [ 113.466501][ T4519] ? __kmalloc+0x1a7/0x330 [ 113.470927][ T4519] htab_map_alloc+0x688/0x970 [ 113.475603][ T4519] map_create+0x44e/0x2090 [ 113.480037][ T4519] __se_sys_bpf+0x203/0x680 [ 113.484540][ T4519] ? __x64_sys_bpf+0x90/0x90 [ 113.489138][ T4519] ? debug_smp_processor_id+0x17/0x20 [ 113.494598][ T4519] __x64_sys_bpf+0x7b/0x90 [ 113.499013][ T4519] do_syscall_64+0x31/0x40 [ 113.503449][ T4519] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 113.509337][ T4519] RIP: 0033:0x7f1d595406c9 [ 113.513753][ T4519] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 113.533467][ T4519] RSP: 002b:00007f1d57fa8038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 113.541984][ T4519] RAX: ffffffffffffffda RBX: 00007f1d59796fa0 RCX: 00007f1d595406c9 [ 113.549963][ T4519] RDX: 0000000000000050 RSI: 0000200000000840 RDI: 0000000000000000 [ 113.557937][ T4519] RBP: 00007f1d57fa8090 R08: 0000000000000000 R09: 0000000000000000 [ 113.566002][ T4519] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 113.573978][ T4519] R13: 00007f1d59797038 R14: 00007f1d59796fa0 R15: 00007fffa79f8878 [ 113.816245][ T4538] FAULT_INJECTION: forcing a failure. [ 113.816245][ T4538] name failslab, interval 1, probability 0, space 0, times 0 [ 113.893839][ T4538] CPU: 0 PID: 4538 Comm: syz.4.1316 Tainted: G W syzkaller #0 [ 113.902632][ T4538] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 113.912778][ T4538] Call Trace: [ 113.916166][ T4538] __dump_stack+0x21/0x24 [ 113.920503][ T4538] dump_stack_lvl+0x169/0x1d8 [ 113.925188][ T4538] ? show_regs_print_info+0x18/0x18 [ 113.930392][ T4538] dump_stack+0x15/0x1c [ 113.934546][ T4538] should_fail+0x3c1/0x510 [ 113.938965][ T4538] ? btf_new_fd+0x113/0xa00 [ 113.943586][ T4538] __should_failslab+0xa4/0xe0 [ 113.948341][ T4538] should_failslab+0x9/0x20 [ 113.952834][ T4538] kmem_cache_alloc_trace+0x3a/0x2e0 [ 113.958108][ T4538] btf_new_fd+0x113/0xa00 [ 113.962424][ T4538] bpf_btf_load+0x5e/0x70 [ 113.966741][ T4538] __se_sys_bpf+0x48a/0x680 [ 113.971236][ T4538] ? __x64_sys_bpf+0x90/0x90 [ 113.975835][ T4538] ? asm_sysvec_apic_timer_interrupt+0x12/0x20 [ 113.982065][ T4538] __x64_sys_bpf+0x7b/0x90 [ 113.986471][ T4538] do_syscall_64+0x31/0x40 [ 113.990879][ T4538] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 113.996758][ T4538] RIP: 0033:0x7fe57a3346c9 [ 114.001164][ T4538] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 114.020861][ T4538] RSP: 002b:00007fe578d9c038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 114.029353][ T4538] RAX: ffffffffffffffda RBX: 00007fe57a58afa0 RCX: 00007fe57a3346c9 [ 114.037312][ T4538] RDX: 0000000000000028 RSI: 0000200000000080 RDI: 0000000000000012 [ 114.045272][ T4538] RBP: 00007fe578d9c090 R08: 0000000000000000 R09: 0000000000000000 [ 114.053234][ T4538] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 114.061204][ T4538] R13: 00007fe57a58b038 R14: 00007fe57a58afa0 R15: 00007fff8d8e9768 [ 114.920977][ T4580] FAULT_INJECTION: forcing a failure. [ 114.920977][ T4580] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 114.957554][ T4580] CPU: 0 PID: 4580 Comm: syz.0.1328 Tainted: G W syzkaller #0 [ 114.966342][ T4580] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 114.976407][ T4580] Call Trace: [ 114.979706][ T4580] __dump_stack+0x21/0x24 [ 114.984028][ T4580] dump_stack_lvl+0x169/0x1d8 [ 114.988690][ T4580] ? thaw_kernel_threads+0x220/0x220 [ 114.993965][ T4580] ? vsnprintf+0x1871/0x1960 [ 114.998550][ T4580] ? show_regs_print_info+0x18/0x18 [ 115.003738][ T4580] dump_stack+0x15/0x1c [ 115.007882][ T4580] should_fail+0x3c1/0x510 [ 115.012375][ T4580] should_fail_usercopy+0x1a/0x20 [ 115.017389][ T4580] _copy_to_user+0x20/0x90 [ 115.021794][ T4580] simple_read_from_buffer+0xe9/0x160 [ 115.027244][ T4580] proc_fail_nth_read+0x19a/0x210 [ 115.032300][ T4580] ? proc_fault_inject_write+0x2f0/0x2f0 [ 115.038056][ T4580] ? rw_verify_area+0x1c0/0x360 [ 115.042902][ T4580] ? proc_fault_inject_write+0x2f0/0x2f0 [ 115.048520][ T4580] vfs_read+0x1fe/0xa10 [ 115.052664][ T4580] ? kernel_read+0x70/0x70 [ 115.057082][ T4580] ? __kasan_check_write+0x14/0x20 [ 115.062185][ T4580] ? mutex_lock+0x8c/0xe0 [ 115.066508][ T4580] ? mutex_trylock+0xa0/0xa0 [ 115.071089][ T4580] ? __fget_files+0x2c4/0x320 [ 115.075853][ T4580] ? __fdget_pos+0x2d2/0x380 [ 115.080431][ T4580] ? ksys_read+0x71/0x240 [ 115.084750][ T4580] ksys_read+0x140/0x240 [ 115.089082][ T4580] ? vfs_write+0xd60/0xd60 [ 115.093493][ T4580] ? debug_smp_processor_id+0x17/0x20 [ 115.098886][ T4580] __x64_sys_read+0x7b/0x90 [ 115.103383][ T4580] do_syscall_64+0x31/0x40 [ 115.107801][ T4580] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 115.113783][ T4580] RIP: 0033:0x7f2181d470dc [ 115.118275][ T4580] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 93 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 ef 93 02 00 48 [ 115.137870][ T4580] RSP: 002b:00007f21807b0030 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 115.146365][ T4580] RAX: ffffffffffffffda RBX: 00007f2181f9efa0 RCX: 00007f2181d470dc [ 115.154326][ T4580] RDX: 000000000000000f RSI: 00007f21807b00a0 RDI: 0000000000000003 [ 115.162290][ T4580] RBP: 00007f21807b0090 R08: 0000000000000000 R09: 0000000000000000 [ 115.170256][ T4580] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 115.178217][ T4580] R13: 00007f2181f9f038 R14: 00007f2181f9efa0 R15: 00007ffcb4635738 [ 117.228813][ T24] audit: type=1400 audit(1763398200.660:138): avc: denied { create } for pid=4714 comm="syz.0.1375" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_iscsi_socket permissive=1 [ 118.027410][ T4758] device sit0 left promiscuous mode [ 118.406123][ T4774] device sit0 entered promiscuous mode [ 118.943829][ T24] audit: type=1400 audit(1763398202.380:139): avc: denied { create } for pid=4824 comm="syz.0.1409" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 119.199065][ T4842] device macsec0 left promiscuous mode [ 119.302759][ T4842] device veth1_macvtap entered promiscuous mode [ 119.365268][ T4842] device macsec0 entered promiscuous mode [ 119.441263][ T348] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 120.609184][ T4898] FAULT_INJECTION: forcing a failure. [ 120.609184][ T4898] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 120.622236][ T4898] CPU: 0 PID: 4898 Comm: syz.0.1431 Tainted: G W syzkaller #0 [ 120.630994][ T4898] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 120.641053][ T4898] Call Trace: [ 120.644355][ T4898] __dump_stack+0x21/0x24 [ 120.648693][ T4898] dump_stack_lvl+0x169/0x1d8 [ 120.653374][ T4898] ? thaw_kernel_threads+0x220/0x220 [ 120.658671][ T4898] ? show_regs_print_info+0x18/0x18 [ 120.663874][ T4898] dump_stack+0x15/0x1c [ 120.668033][ T4898] should_fail+0x3c1/0x510 [ 120.672463][ T4898] should_fail_usercopy+0x1a/0x20 [ 120.677487][ T4898] strncpy_from_user+0x24/0x2e0 [ 120.682351][ T4898] ? synchronize_rcu+0x110/0x110 [ 120.687290][ T4898] ? bpf_do_trace_printk+0x240/0x240 [ 120.692572][ T4898] strncpy_from_user_nofault+0x73/0x150 [ 120.698119][ T4898] bpf_probe_read_user_str+0x2a/0x70 [ 120.703400][ T4898] bpf_prog_9deb4dd9eeaa7b3b+0x3d/0xcfc [ 120.708954][ T4898] bpf_trace_run3+0xcb/0x230 [ 120.713549][ T4898] ? bpf_trace_run2+0x200/0x200 [ 120.718405][ T4898] ? pcpu_free_area+0x9be/0xbe0 [ 120.723260][ T4898] __bpf_trace_percpu_free_percpu+0x2d/0x40 [ 120.729156][ T4898] free_percpu+0x817/0xa10 [ 120.733676][ T4898] ? __alloc_reserved_percpu+0x30/0x30 [ 120.739131][ T4898] ? synchronize_srcu+0x1dc/0x1f0 [ 120.744194][ T4898] perf_trace_event_unreg+0xee/0x1e0 [ 120.749478][ T4898] perf_trace_destroy+0x96/0xb0 [ 120.754332][ T4898] tp_perf_event_destroy+0x15/0x20 [ 120.759445][ T4898] ? perf_swevent_read+0x10/0x10 [ 120.764389][ T4898] _free_event+0x962/0xc70 [ 120.768806][ T4898] perf_event_release_kernel+0xc80/0xdb0 [ 120.774445][ T4898] ? perf_event_read_local+0x710/0x710 [ 120.779907][ T4898] ? perf_mmap+0x12b0/0x12b0 [ 120.784520][ T4898] perf_release+0x3b/0x40 [ 120.788852][ T4898] __fput+0x2fb/0x770 [ 120.792836][ T4898] ____fput+0x15/0x20 [ 120.796815][ T4898] task_work_run+0x127/0x190 [ 120.801403][ T4898] exit_to_user_mode_loop+0xcb/0xe0 [ 120.806598][ T4898] exit_to_user_mode_prepare+0x76/0xa0 [ 120.812056][ T4898] syscall_exit_to_user_mode+0x1d/0x40 [ 120.817519][ T4898] do_syscall_64+0x3d/0x40 [ 120.821945][ T4898] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 120.827941][ T4898] RIP: 0033:0x7f2181d486c9 [ 120.832356][ T4898] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 120.852046][ T4898] RSP: 002b:00007f21807b0038 EFLAGS: 00000246 ORIG_RAX: 0000000000000003 [ 120.860466][ T4898] RAX: 0000000000000000 RBX: 00007f2181f9efa0 RCX: 00007f2181d486c9 [ 120.868545][ T4898] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000003 [ 120.876640][ T4898] RBP: 00007f21807b0090 R08: 0000000000000000 R09: 0000000000000000 [ 120.884717][ T4898] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 120.892691][ T4898] R13: 00007f2181f9f038 R14: 00007f2181f9efa0 R15: 00007ffcb4635738 [ 121.341040][ T24] audit: type=1400 audit(1763398204.780:140): avc: denied { append } for pid=4901 comm="syz.2.1432" name="ppp" dev="devtmpfs" ino=153 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ppp_device_t tclass=chr_file permissive=1 [ 122.261031][ T4936] device wg2 left promiscuous mode [ 124.242544][ T5006] device syzkaller0 entered promiscuous mode [ 124.699181][ T5016] FAULT_INJECTION: forcing a failure. [ 124.699181][ T5016] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 124.749094][ T5016] CPU: 1 PID: 5016 Comm: syz.0.1463 Tainted: G W syzkaller #0 [ 124.757893][ T5016] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 124.768137][ T5016] Call Trace: [ 124.771451][ T5016] __dump_stack+0x21/0x24 [ 124.775805][ T5016] dump_stack_lvl+0x169/0x1d8 [ 124.780724][ T5016] ? show_regs_print_info+0x18/0x18 [ 124.785928][ T5016] dump_stack+0x15/0x1c [ 124.790111][ T5016] should_fail+0x3c1/0x510 [ 124.794526][ T5016] should_fail_usercopy+0x1a/0x20 [ 124.799551][ T5016] _copy_from_user+0x20/0xd0 [ 124.804140][ T5016] sock_do_ioctl+0x1b2/0x330 [ 124.808729][ T5016] ? putname+0xfe/0x150 [ 124.812916][ T5016] ? sock_show_fdinfo+0xa0/0xa0 [ 124.817787][ T5016] ? selinux_file_ioctl+0x377/0x480 [ 124.823030][ T5016] ? mutex_trylock+0xa0/0xa0 [ 124.827618][ T5016] ? __fget_files+0x2c4/0x320 [ 124.832291][ T5016] sock_ioctl+0x504/0x710 [ 124.836613][ T5016] ? sock_poll+0x360/0x360 [ 124.841018][ T5016] ? __fget_files+0x2c4/0x320 [ 124.845688][ T5016] ? security_file_ioctl+0x84/0xa0 [ 124.850786][ T5016] ? sock_poll+0x360/0x360 [ 124.855190][ T5016] __se_sys_ioctl+0x121/0x1a0 [ 124.859857][ T5016] __x64_sys_ioctl+0x7b/0x90 [ 124.864532][ T5016] do_syscall_64+0x31/0x40 [ 124.868943][ T5016] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 124.874856][ T5016] RIP: 0033:0x7f2181d486c9 [ 124.879266][ T5016] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 124.898865][ T5016] RSP: 002b:00007f21807b0038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 124.907281][ T5016] RAX: ffffffffffffffda RBX: 00007f2181f9efa0 RCX: 00007f2181d486c9 [ 124.915253][ T5016] RDX: 0000200000000040 RSI: 0000000000008914 RDI: 000000000000000d [ 124.923303][ T5016] RBP: 00007f21807b0090 R08: 0000000000000000 R09: 0000000000000000 [ 124.931397][ T5016] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 124.939359][ T5016] R13: 00007f2181f9f038 R14: 00007f2181f9efa0 R15: 00007ffcb4635738 [ 125.069448][ T5039] device macsec0 left promiscuous mode [ 125.086593][ T5027] device veth1_macvtap entered promiscuous mode [ 125.096967][ T5027] device macsec0 entered promiscuous mode [ 125.134291][ T348] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 126.919058][ T5111] device syzkaller0 entered promiscuous mode [ 129.619571][ T5273] ªªªªªª: renamed from vlan0 [ 129.631407][ T24] audit: type=1400 audit(1763398213.070:141): avc: denied { create } for pid=5281 comm="syz.4.1545" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=caif_socket permissive=1 [ 130.483979][ T5320] device syzkaller0 entered promiscuous mode [ 130.497264][ T5323] device macsec0 entered promiscuous mode [ 133.808179][ T5497] device wg2 entered promiscuous mode [ 134.099995][ T5507] device macsec0 left promiscuous mode [ 134.189418][ T5514] device veth1_macvtap left promiscuous mode [ 135.280152][ T5574] device pim6reg1 entered promiscuous mode [ 136.337058][ T5612] device pim6reg1 entered promiscuous mode [ 136.501910][ T24] audit: type=1400 audit(1763398219.940:142): avc: denied { create } for pid=5620 comm="syz.3.1650" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=ax25_socket permissive=1 [ 136.616062][ T5625] device pim6reg1 entered promiscuous mode [ 137.434578][ T5661] device veth1_macvtap entered promiscuous mode [ 137.461927][ T2931] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 140.297516][ T5771] device sit0 left promiscuous mode [ 140.632603][ T5775] device sit0 entered promiscuous mode [ 140.821389][ T5789] device pim6reg1 entered promiscuous mode [ 141.305690][ T5827] device macsec0 entered promiscuous mode [ 141.348368][ T5833] device veth0_vlan left promiscuous mode [ 141.371565][ T5833] device veth0_vlan entered promiscuous mode [ 141.426685][ T2931] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 141.447801][ T2931] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 141.492088][ T2931] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 142.585721][ T5892] ±ÿ: renamed from team_slave_1 [ 144.876767][ T5991] : renamed from bond_slave_0 [ 146.154681][ T6024] syz.3.1785[6024] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 146.156690][ T6024] syz.3.1785[6024] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 146.428976][ T6050] device veth1_macvtap left promiscuous mode [ 146.497424][ T6050] device macsec0 left promiscuous mode [ 146.548230][ T6055] device syzkaller0 entered promiscuous mode [ 146.753103][ T6058] device macsec0 entered promiscuous mode [ 146.884017][ T6066] device syzkaller0 entered promiscuous mode [ 148.553732][ T24] audit: type=1400 audit(1763398231.990:143): avc: denied { create } for pid=6122 comm="syz.2.1809" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_fib_lookup_socket permissive=1 [ 148.802712][ T6129] : renamed from bond_slave_0 [ 148.982878][ T24] audit: type=1400 audit(1763398232.420:144): avc: denied { ioctl } for pid=6148 comm="syz.3.1818" path="cgroup:[4026532536]" dev="nsfs" ino=4026532536 ioctlcmd=0xb701 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 150.561125][ T6237] device veth0_vlan left promiscuous mode [ 150.581851][ T6237] device veth0_vlan entered promiscuous mode [ 152.070874][ T6295] device sit0 left promiscuous mode [ 152.125388][ T6295] device sit0 entered promiscuous mode [ 152.380614][ T6311] device pim6reg1 entered promiscuous mode [ 152.591979][ T6322] device sit0 left promiscuous mode [ 157.430857][ T6455] syz.4.1909[6455] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 157.430941][ T6455] syz.4.1909[6455] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 157.466501][ T6452] device sit0 left promiscuous mode [ 158.239081][ T6463] device pim6reg1 entered promiscuous mode [ 160.548523][ T24] audit: type=1400 audit(1763398243.980:145): avc: denied { create } for pid=6561 comm="syz.4.1947" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=appletalk_socket permissive=1 [ 161.117512][ T6586] device syzkaller0 entered promiscuous mode [ 161.462141][ T6616] device veth1_macvtap left promiscuous mode [ 161.477734][ T6616] device macsec0 left promiscuous mode [ 162.366247][ T6663] syz.1.1982[6663] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 162.366349][ T6663] syz.1.1982[6663] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 162.404164][ T6664] syzkaller0: refused to change device tx_queue_len [ 162.456944][ T6663] syz.1.1982[6663] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 162.457005][ T6663] syz.1.1982[6663] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 162.481593][ T6669] device macsec0 left promiscuous mode [ 163.102011][ T6699] device wg2 entered promiscuous mode [ 164.020905][ T24] audit: type=1400 audit(1763398247.460:146): avc: denied { create } for pid=6757 comm="syz.1.2012" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 164.375645][ T6767] device wg2 entered promiscuous mode [ 164.720580][ T6812] syz.4.2030[6812] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 164.720638][ T6812] syz.4.2030[6812] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 165.728235][ T6848] device syzkaller0 entered promiscuous mode [ 166.075309][ T6856] device wg2 left promiscuous mode [ 166.143306][ T6856] device wg2 entered promiscuous mode [ 166.390728][ T6860] device sit0 entered promiscuous mode [ 168.835810][ T6915] device syzkaller0 entered promiscuous mode [ 170.847721][ T24] audit: type=1400 audit(1763398254.280:147): avc: denied { create } for pid=7005 comm="syz.1.2090" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_dnrt_socket permissive=1 [ 170.947147][ T24] audit: type=1400 audit(1763398254.380:148): avc: denied { create } for pid=7007 comm="syz.2.2091" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=phonet_socket permissive=1 [ 171.571410][ T24] audit: type=1400 audit(1763398255.010:149): avc: denied { create } for pid=7045 comm="syz.4.2103" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=qipcrtr_socket permissive=1 [ 172.360349][ T7068] tap0: tun_chr_ioctl cmd 1074025677 [ 172.379154][ T7068] tap0: linktype set to 24 [ 172.917280][ T24] audit: type=1400 audit(1763398256.350:150): avc: denied { create } for pid=7092 comm="syz.0.2118" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 174.181256][ T7131] device pim6reg1 entered promiscuous mode [ 174.198880][ T7131] ªªªªªª: renamed from vlan0 [ 175.489192][ T7185] device wg2 left promiscuous mode [ 175.496358][ T7183] device macsec0 left promiscuous mode [ 175.558544][ T7181] device wg2 entered promiscuous mode [ 176.906749][ T7235] device pimreg0 entered promiscuous mode [ 177.146607][ T7251] device pim6reg1 entered promiscuous mode [ 177.806520][ T7294] device veth0_vlan left promiscuous mode [ 177.834032][ T7294] device veth0_vlan entered promiscuous mode [ 177.864014][ T2931] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 177.874545][ T2931] IPv6: ADDRCONF(NETDEV_CHANGE): ªªªªªª: link becomes ready [ 177.906643][ T2931] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 178.056935][ T7301] device syzkaller0 entered promiscuous mode [ 178.401843][ T7330] device wg2 left promiscuous mode [ 178.424941][ T7326] device wg2 entered promiscuous mode [ 178.593225][ T7347] device pim6reg1 entered promiscuous mode [ 178.873536][ T7352] device syzkaller0 entered promiscuous mode [ 179.295461][ T7370] device syzkaller0 entered promiscuous mode [ 179.895471][ T7418] device pim6reg1 entered promiscuous mode [ 180.338554][ T7428] device pim6reg1 entered promiscuous mode [ 181.257166][ T7476] device syzkaller0 entered promiscuous mode [ 182.294904][ T7531] device veth0_vlan left promiscuous mode [ 182.323664][ T7531] device veth0_vlan entered promiscuous mode [ 182.950516][ T7569] device veth0_vlan left promiscuous mode [ 182.992266][ T7569] device veth0_vlan entered promiscuous mode [ 183.086669][ T2931] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 183.108111][ T2931] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 183.163355][ T2931] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 183.368247][ T7586] device syzkaller0 entered promiscuous mode [ 183.390211][ T7586] syzkaller0: tun_net_xmit 1280 [ 184.561823][ T279] cgroup: fork rejected by pids controller in /syz3 [ 184.844584][ T7674] device sit0 left promiscuous mode [ 185.182156][ T7685] bridge0: port 1(bridge_slave_0) entered blocking state [ 185.193673][ T7685] bridge0: port 1(bridge_slave_0) entered disabled state [ 185.201709][ T7685] device bridge_slave_0 entered promiscuous mode [ 185.261111][ T7685] bridge0: port 2(bridge_slave_1) entered blocking state [ 185.269320][ T7685] bridge0: port 2(bridge_slave_1) entered disabled state [ 185.284352][ T7685] device bridge_slave_1 entered promiscuous mode [ 185.540274][ T24] audit: type=1400 audit(1763398268.980:151): avc: denied { create } for pid=7685 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 185.545092][ T7685] bridge0: port 2(bridge_slave_1) entered blocking state [ 185.567858][ T7685] bridge0: port 2(bridge_slave_1) entered forwarding state [ 185.575172][ T7685] bridge0: port 1(bridge_slave_0) entered blocking state [ 185.582235][ T7685] bridge0: port 1(bridge_slave_0) entered forwarding state [ 185.589147][ T24] audit: type=1400 audit(1763398268.980:152): avc: denied { write } for pid=7685 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 185.635456][ T24] audit: type=1400 audit(1763398268.980:153): avc: denied { read } for pid=7685 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 185.674341][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 185.684401][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 185.693767][ T296] bridge0: port 2(bridge_slave_1) entered disabled state [ 185.725766][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 185.744643][ T296] bridge0: port 2(bridge_slave_1) entered blocking state [ 185.751913][ T296] bridge0: port 2(bridge_slave_1) entered forwarding state [ 185.766508][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 185.796670][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 185.887211][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 185.908595][ T7685] device veth0_vlan entered promiscuous mode [ 185.939931][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 185.971535][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 185.983182][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 186.056172][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 186.106105][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 186.264679][ T7685] device veth1_macvtap entered promiscuous mode [ 186.299792][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 186.313913][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 186.323210][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 186.365355][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 186.375793][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 186.772331][ T348] device veth0_vlan left promiscuous mode [ 188.547029][ T7862] device pim6reg1 entered promiscuous mode [ 189.343577][ T7901] tap0: tun_chr_ioctl cmd 1074025673 [ 189.349008][ T7902] tap0: tun_chr_ioctl cmd 1074025677 [ 189.356564][ T7902] tap0: linktype set to 780 [ 190.034814][ T7934] device pim6reg1 entered promiscuous mode [ 190.049266][ T7949] device veth0_vlan left promiscuous mode [ 190.077178][ T7949] device veth0_vlan entered promiscuous mode [ 190.097366][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 190.105988][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): ªªªªªª: link becomes ready [ 190.115635][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 190.509039][ T7999] device sit0 left promiscuous mode [ 190.557819][ T7999] device sit0 entered promiscuous mode [ 191.510854][ T8054] device pim6reg1 entered promiscuous mode [ 192.694450][ T8119] FAULT_INJECTION: forcing a failure. [ 192.694450][ T8119] name failslab, interval 1, probability 0, space 0, times 0 [ 192.740652][ T8119] CPU: 0 PID: 8119 Comm: syz.0.2439 Tainted: G W syzkaller #0 [ 192.749532][ T8119] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 192.759591][ T8119] Call Trace: [ 192.762997][ T8119] __dump_stack+0x21/0x24 [ 192.767321][ T8119] dump_stack_lvl+0x169/0x1d8 [ 192.771990][ T8119] ? show_regs_print_info+0x18/0x18 [ 192.777233][ T8119] ? do_syscall_64+0x31/0x40 [ 192.781822][ T8119] dump_stack+0x15/0x1c [ 192.785965][ T8119] should_fail+0x3c1/0x510 [ 192.790375][ T8119] ? __get_vm_area_node+0x113/0x450 [ 192.795566][ T8119] __should_failslab+0xa4/0xe0 [ 192.800321][ T8119] should_failslab+0x9/0x20 [ 192.804823][ T8119] kmem_cache_alloc_trace+0x3a/0x2e0 [ 192.810122][ T8119] __get_vm_area_node+0x113/0x450 [ 192.815136][ T8119] __vmalloc_node_range+0xe0/0x780 [ 192.820240][ T8119] ? copy_process+0x5b2/0x32c0 [ 192.825016][ T8119] ? kmem_cache_alloc+0x165/0x2e0 [ 192.830033][ T8119] dup_task_struct+0x40f/0xbd0 [ 192.834793][ T8119] ? copy_process+0x5b2/0x32c0 [ 192.839544][ T8119] ? __kasan_check_write+0x14/0x20 [ 192.844649][ T8119] ? recalc_sigpending+0x1ac/0x230 [ 192.849746][ T8119] copy_process+0x5b2/0x32c0 [ 192.854326][ T8119] ? sysvec_irq_work+0xc8/0xd0 [ 192.859086][ T8119] ? asm_sysvec_irq_work+0x12/0x20 [ 192.864186][ T8119] ? __pidfd_prepare+0x150/0x150 [ 192.869112][ T8119] ? arch_irq_work_raise+0xc7/0xd0 [ 192.874218][ T8119] kernel_clone+0x23f/0x940 [ 192.878710][ T8119] ? bpf_send_signal_common+0x2b2/0x420 [ 192.884268][ T8119] ? create_io_thread+0x130/0x130 [ 192.889288][ T8119] ? mutex_lock+0x8c/0xe0 [ 192.893605][ T8119] __x64_sys_clone+0x176/0x1d0 [ 192.898358][ T8119] ? __ia32_sys_vfork+0xf0/0xf0 [ 192.903208][ T8119] ? ksys_write+0x1eb/0x240 [ 192.907705][ T8119] ? debug_smp_processor_id+0x17/0x20 [ 192.913094][ T8119] ? fpregs_assert_state_consistent+0xb1/0xe0 [ 192.919149][ T8119] ? syscall_trace_enter+0x108/0x170 [ 192.924420][ T8119] do_syscall_64+0x31/0x40 [ 192.928830][ T8119] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 192.934708][ T8119] RIP: 0033:0x7f2181d486c9 [ 192.939118][ T8119] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 192.958810][ T8119] RSP: 002b:00007f21807affe8 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 192.967217][ T8119] RAX: ffffffffffffffda RBX: 00007f2181f9efa0 RCX: 00007f2181d486c9 [ 192.975195][ T8119] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00000000640c7000 [ 192.983158][ T8119] RBP: 00007f21807b0090 R08: 0000000000000000 R09: 0000000000000000 [ 192.991120][ T8119] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000001 [ 192.999088][ T8119] R13: 00007f2181f9f038 R14: 00007f2181f9efa0 R15: 00007ffcb4635738 [ 193.024366][ T8119] syz.0.2439: vmalloc: allocation failure: 32768 bytes, mode:0xdc0(GFP_KERNEL|__GFP_ZERO), nodemask=(null),cpuset=syz0,mems_allowed=0 [ 193.061910][ T8119] CPU: 1 PID: 8119 Comm: syz.0.2439 Tainted: G W syzkaller #0 [ 193.070705][ T8119] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 193.080764][ T8119] Call Trace: [ 193.084040][ T8119] __dump_stack+0x21/0x24 [ 193.088354][ T8119] dump_stack_lvl+0x169/0x1d8 [ 193.093100][ T8119] ? show_regs_print_info+0x18/0x18 [ 193.098278][ T8119] ? pr_cont_kernfs_name+0xe3/0xf0 [ 193.103469][ T8119] dump_stack+0x15/0x1c [ 193.107606][ T8119] warn_alloc+0x1b0/0x1d0 [ 193.111926][ T8119] ? __get_vm_area_node+0x113/0x450 [ 193.117107][ T8119] ? zone_watermark_ok_safe+0x250/0x250 [ 193.122719][ T8119] ? kmem_cache_alloc_trace+0x184/0x2e0 [ 193.128251][ T8119] ? __get_vm_area_node+0x345/0x450 [ 193.133442][ T8119] __vmalloc_node_range+0x27d/0x780 [ 193.138642][ T8119] ? kmem_cache_alloc+0x165/0x2e0 [ 193.143645][ T8119] dup_task_struct+0x40f/0xbd0 [ 193.148387][ T8119] ? copy_process+0x5b2/0x32c0 [ 193.153131][ T8119] ? __kasan_check_write+0x14/0x20 [ 193.158224][ T8119] ? recalc_sigpending+0x1ac/0x230 [ 193.163317][ T8119] copy_process+0x5b2/0x32c0 [ 193.167888][ T8119] ? sysvec_irq_work+0xc8/0xd0 [ 193.172633][ T8119] ? asm_sysvec_irq_work+0x12/0x20 [ 193.177727][ T8119] ? __pidfd_prepare+0x150/0x150 [ 193.182644][ T8119] ? arch_irq_work_raise+0xc7/0xd0 [ 193.187738][ T8119] kernel_clone+0x23f/0x940 [ 193.192239][ T8119] ? bpf_send_signal_common+0x2b2/0x420 [ 193.197766][ T8119] ? create_io_thread+0x130/0x130 [ 193.202769][ T8119] ? mutex_lock+0x8c/0xe0 [ 193.207081][ T8119] __x64_sys_clone+0x176/0x1d0 [ 193.211825][ T8119] ? __ia32_sys_vfork+0xf0/0xf0 [ 193.216672][ T8119] ? ksys_write+0x1eb/0x240 [ 193.221158][ T8119] ? debug_smp_processor_id+0x17/0x20 [ 193.226520][ T8119] ? fpregs_assert_state_consistent+0xb1/0xe0 [ 193.232653][ T8119] ? syscall_trace_enter+0x108/0x170 [ 193.237930][ T8119] do_syscall_64+0x31/0x40 [ 193.242340][ T8119] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 193.248317][ T8119] RIP: 0033:0x7f2181d486c9 [ 193.252726][ T8119] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 193.272315][ T8119] RSP: 002b:00007f21807affe8 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 193.280834][ T8119] RAX: ffffffffffffffda RBX: 00007f2181f9efa0 RCX: 00007f2181d486c9 [ 193.288803][ T8119] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00000000640c7000 [ 193.296776][ T8119] RBP: 00007f21807b0090 R08: 0000000000000000 R09: 0000000000000000 [ 193.304743][ T8119] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000001 [ 193.312705][ T8119] R13: 00007f2181f9f038 R14: 00007f2181f9efa0 R15: 00007ffcb4635738 [ 193.324194][ T8119] Mem-Info: [ 193.327360][ T8119] active_anon:36 inactive_anon:11591 isolated_anon:0 [ 193.327360][ T8119] active_file:21760 inactive_file:4139 isolated_file:0 [ 193.327360][ T8119] unevictable:0 dirty:647 writeback:0 [ 193.327360][ T8119] slab_reclaimable:7559 slab_unreclaimable:78212 [ 193.327360][ T8119] mapped:30176 shmem:162 pagetables:611 bounce:0 [ 193.327360][ T8119] free:1558828 free_pcp:859 free_cma:0 [ 193.364580][ T8119] Node 0 active_anon:144kB inactive_anon:46364kB active_file:87040kB inactive_file:16556kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:120704kB dirty:2588kB writeback:0kB shmem:648kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 0kB writeback_tmp:0kB kernel_stack:6336kB all_unreclaimable? no [ 193.406213][ T8119] DMA32 free:2987448kB min:62668kB low:78332kB high:93996kB reserved_highatomic:0KB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:3145324kB managed:2988780kB mlocked:0kB pagetables:0kB bounce:0kB free_pcp:1332kB local_pcp:1332kB free_cma:0kB [ 193.435331][ T8119] lowmem_reserve[]: 0 3941 3941 [ 193.442297][ T8119] Normal free:3247832kB min:84784kB low:105980kB high:127176kB reserved_highatomic:0KB active_anon:144kB inactive_anon:46364kB active_file:87040kB inactive_file:16556kB unevictable:0kB writepending:2588kB present:5242880kB managed:4036368kB mlocked:0kB pagetables:2444kB bounce:0kB free_pcp:2020kB local_pcp:1492kB free_cma:0kB [ 193.474236][ T8119] lowmem_reserve[]: 0 0 0 [ 193.478628][ T8119] DMA32: 6*4kB (UM) 4*8kB (M) 4*16kB (M) 6*32kB (UM) 8*64kB (UM) 5*128kB (UM) 6*256kB (UM) 5*512kB (M) 6*1024kB (UM) 3*2048kB (UM) 725*4096kB (M) = 2987448kB [ 193.518016][ T8119] Normal: 186*4kB (UME) 142*8kB (UM) 144*16kB (UME) 432*32kB (UME) 480*64kB (UME) 169*128kB (UME) 85*256kB (UME) 46*512kB (UME) 15*1024kB (UME) 8*2048kB (UM) 757*4096kB (M) = 3248088kB [ 193.543925][ T8119] 26061 total pagecache pages [ 193.548640][ T8119] 0 pages in swap cache [ 193.574163][ T8119] Swap cache stats: add 0, delete 0, find 0/0 [ 193.616825][ T8119] Free swap = 124996kB [ 193.653239][ T8119] Total swap = 124996kB [ 193.658776][ T8119] 2097051 pages RAM [ 193.663228][ T8119] 0 pages HighMem/MovableOnly [ 193.672963][ T8119] 340764 pages reserved [ 193.677231][ T8119] 0 pages cma reserved [ 193.981176][ T8171] ÿÿÿÿÿÿ: renamed from vlan1 [ 194.139173][ T8181] device veth1_to_team entered promiscuous mode [ 194.166273][ T8178] device wg2 entered promiscuous mode [ 194.209762][ T8192] device sit0 left promiscuous mode [ 194.234933][ T8192] device sit0 entered promiscuous mode [ 194.459025][ T8212] device pim6reg1 entered promiscuous mode [ 194.494373][ T8216] device pim6reg1 entered promiscuous mode [ 195.322236][ T8274] device syzkaller0 entered promiscuous mode [ 195.795111][ T8321] device syzkaller0 entered promiscuous mode [ 195.966842][ T8325] device sit0 entered promiscuous mode [ 196.254499][ T24] audit: type=1400 audit(1763398279.690:154): avc: denied { create } for pid=8353 comm="syz.4.2516" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bluetooth_socket permissive=1 [ 196.538886][ T8395] ÿÿÿÿÿÿ: renamed from vlan1 [ 197.523283][ T8438] device pim6reg1 entered promiscuous mode [ 197.755241][ T8446] bridge0: port 2(bridge_slave_1) entered disabled state [ 197.762604][ T8446] bridge0: port 1(bridge_slave_0) entered disabled state [ 197.774031][ T8446] bridge0: port 2(bridge_slave_1) entered blocking state [ 197.781140][ T8446] bridge0: port 2(bridge_slave_1) entered forwarding state [ 197.788480][ T8446] bridge0: port 1(bridge_slave_0) entered blocking state [ 197.795564][ T8446] bridge0: port 1(bridge_slave_0) entered forwarding state [ 197.803092][ T8446] device bridge0 entered promiscuous mode [ 198.163244][ T24] audit: type=1400 audit(1763398281.600:155): avc: denied { create } for pid=8460 comm="syz.0.2551" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=decnet_socket permissive=1 [ 200.421956][ T8565] FAULT_INJECTION: forcing a failure. [ 200.421956][ T8565] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 200.462285][ T8565] CPU: 1 PID: 8565 Comm: syz.4.2581 Tainted: G W syzkaller #0 [ 200.471087][ T8565] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 200.481158][ T8565] Call Trace: [ 200.484478][ T8565] __dump_stack+0x21/0x24 [ 200.488812][ T8565] dump_stack_lvl+0x169/0x1d8 [ 200.493496][ T8565] ? thaw_kernel_threads+0x220/0x220 [ 200.498779][ T8565] ? 0xffffffffa0028000 [ 200.503024][ T8565] ? show_regs_print_info+0x18/0x18 [ 200.508229][ T8565] ? __kernel_text_address+0xa0/0x100 [ 200.513608][ T8565] dump_stack+0x15/0x1c [ 200.517948][ T8565] should_fail+0x3c1/0x510 [ 200.522366][ T8565] should_fail_usercopy+0x1a/0x20 [ 200.527388][ T8565] _copy_from_iter_full+0x1ac/0x750 [ 200.532589][ T8565] tun_get_user+0x3c5/0x3090 [ 200.537183][ T8565] ? ____kasan_slab_free+0x125/0x160 [ 200.542470][ T8565] ? __kasan_slab_free+0x11/0x20 [ 200.547406][ T8565] ? putname+0xfe/0x150 [ 200.551572][ T8565] ? do_sys_openat2+0x207/0x6d0 [ 200.556424][ T8565] ? __x64_sys_openat+0x136/0x160 [ 200.561533][ T8565] ? do_syscall_64+0x31/0x40 [ 200.566162][ T8565] ? tun_do_read+0x1c00/0x1c00 [ 200.570935][ T8565] ? kstrtouint_from_user+0x1a0/0x200 [ 200.576436][ T8565] ? __fsnotify_parent+0x5f5/0x6c0 [ 200.581560][ T8565] ? avc_policy_seqno+0x1b/0x70 [ 200.586425][ T8565] ? selinux_file_permission+0x2a5/0x510 [ 200.592062][ T8565] ? fsnotify_perm+0x66/0x4b0 [ 200.596743][ T8565] tun_chr_write_iter+0x1bf/0x270 [ 200.601770][ T8565] vfs_write+0x725/0xd60 [ 200.606013][ T8565] ? __kasan_slab_free+0x11/0x20 [ 200.610952][ T8565] ? kernel_write+0x3c0/0x3c0 [ 200.615632][ T8565] ? __fget_files+0x2c4/0x320 [ 200.620307][ T8565] ? __fdget_pos+0x1f7/0x380 [ 200.624897][ T8565] ? ksys_write+0x71/0x240 [ 200.629309][ T8565] ksys_write+0x140/0x240 [ 200.633639][ T8565] ? __ia32_sys_read+0x90/0x90 [ 200.638647][ T8565] ? debug_smp_processor_id+0x17/0x20 [ 200.644030][ T8565] __x64_sys_write+0x7b/0x90 [ 200.648625][ T8565] do_syscall_64+0x31/0x40 [ 200.653048][ T8565] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 200.658943][ T8565] RIP: 0033:0x7fe57a3346c9 [ 200.663361][ T8565] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 200.682981][ T8565] RSP: 002b:00007fe578d9c038 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 200.691504][ T8565] RAX: ffffffffffffffda RBX: 00007fe57a58afa0 RCX: 00007fe57a3346c9 [ 200.699569][ T8565] RDX: 000000000000ffdd RSI: 0000200000000140 RDI: 0000000000000003 [ 200.707538][ T8565] RBP: 00007fe578d9c090 R08: 0000000000000000 R09: 0000000000000000 [ 200.715510][ T8565] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 200.723478][ T8565] R13: 00007fe57a58b038 R14: 00007fe57a58afa0 R15: 00007fff8d8e9768 [ 201.321776][ T8616] FAULT_INJECTION: forcing a failure. [ 201.321776][ T8616] name failslab, interval 1, probability 0, space 0, times 0 [ 201.352414][ T8616] CPU: 0 PID: 8616 Comm: syz.3.2598 Tainted: G W syzkaller #0 [ 201.361214][ T8616] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 201.371276][ T8616] Call Trace: [ 201.374576][ T8616] __dump_stack+0x21/0x24 [ 201.378909][ T8616] dump_stack_lvl+0x169/0x1d8 [ 201.383589][ T8616] ? thaw_kernel_threads+0x220/0x220 [ 201.388878][ T8616] ? show_regs_print_info+0x18/0x18 [ 201.394078][ T8616] dump_stack+0x15/0x1c [ 201.398236][ T8616] should_fail+0x3c1/0x510 [ 201.402657][ T8616] ? __alloc_skb+0x9e/0x520 [ 201.407173][ T8616] __should_failslab+0xa4/0xe0 [ 201.411955][ T8616] should_failslab+0x9/0x20 [ 201.416472][ T8616] kmem_cache_alloc+0x3d/0x2e0 [ 201.421254][ T8616] __alloc_skb+0x9e/0x520 [ 201.425598][ T8616] alloc_skb_with_frags+0xa2/0x560 [ 201.430722][ T8616] sock_alloc_send_pskb+0x853/0x980 [ 201.435928][ T8616] ? is_bpf_text_address+0x177/0x190 [ 201.441233][ T8616] ? sock_kzfree_s+0x60/0x60 [ 201.445971][ T8616] ? iov_iter_advance+0x1f7/0x750 [ 201.451009][ T8616] tun_get_user+0x4bd/0x3090 [ 201.455789][ T8616] ? ____kasan_slab_free+0x125/0x160 [ 201.461082][ T8616] ? __kasan_slab_free+0x11/0x20 [ 201.466030][ T8616] ? tun_do_read+0x1c00/0x1c00 [ 201.470817][ T8616] ? kstrtouint_from_user+0x1a0/0x200 [ 201.476200][ T8616] ? __fsnotify_parent+0x5f5/0x6c0 [ 201.481319][ T8616] ? avc_policy_seqno+0x1b/0x70 [ 201.486177][ T8616] ? selinux_file_permission+0x2a5/0x510 [ 201.491809][ T8616] ? fsnotify_perm+0x66/0x4b0 [ 201.496483][ T8616] tun_chr_write_iter+0x1bf/0x270 [ 201.501505][ T8616] vfs_write+0x725/0xd60 [ 201.505744][ T8616] ? kernel_write+0x3c0/0x3c0 [ 201.510420][ T8616] ? __fget_files+0x2c4/0x320 [ 201.515143][ T8616] ? __fdget_pos+0x1f7/0x380 [ 201.519722][ T8616] ? ksys_write+0x71/0x240 [ 201.524132][ T8616] ksys_write+0x140/0x240 [ 201.528453][ T8616] ? __ia32_sys_read+0x90/0x90 [ 201.533216][ T8616] ? debug_smp_processor_id+0x17/0x20 [ 201.538578][ T8616] __x64_sys_write+0x7b/0x90 [ 201.543157][ T8616] do_syscall_64+0x31/0x40 [ 201.547566][ T8616] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 201.553448][ T8616] RIP: 0033:0x7f0ed4dad6c9 [ 201.557853][ T8616] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 201.577535][ T8616] RSP: 002b:00007f0ed3815038 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 201.585937][ T8616] RAX: ffffffffffffffda RBX: 00007f0ed5003fa0 RCX: 00007f0ed4dad6c9 [ 201.593904][ T8616] RDX: 000000000000ffdd RSI: 0000200000000140 RDI: 0000000000000003 [ 201.602005][ T8616] RBP: 00007f0ed3815090 R08: 0000000000000000 R09: 0000000000000000 [ 201.609989][ T8616] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 201.618118][ T8616] R13: 00007f0ed5004038 R14: 00007f0ed5003fa0 R15: 00007ffd1949a0d8 [ 202.188302][ T8671] FAULT_INJECTION: forcing a failure. [ 202.188302][ T8671] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 202.229273][ T8671] CPU: 1 PID: 8671 Comm: syz.0.2619 Tainted: G W syzkaller #0 [ 202.238074][ T8671] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 202.248136][ T8671] Call Trace: [ 202.251443][ T8671] __dump_stack+0x21/0x24 [ 202.255784][ T8671] dump_stack_lvl+0x169/0x1d8 [ 202.260465][ T8671] ? show_regs_print_info+0x18/0x18 [ 202.265671][ T8671] ? slab_post_alloc_hook+0x5d/0x2f0 [ 202.270967][ T8671] ? __alloc_skb+0x9e/0x520 [ 202.275559][ T8671] ? alloc_skb_with_frags+0xa2/0x560 [ 202.280852][ T8671] ? sock_alloc_send_pskb+0x853/0x980 [ 202.286249][ T8671] ? tun_chr_write_iter+0x1bf/0x270 [ 202.291448][ T8671] dump_stack+0x15/0x1c [ 202.295597][ T8671] should_fail+0x3c1/0x510 [ 202.300024][ T8671] should_fail_alloc_page+0x4f/0x60 [ 202.305216][ T8671] __alloc_pages_nodemask+0x109/0x5f0 [ 202.310585][ T8671] ? gfp_pfmemalloc_allowed+0x130/0x130 [ 202.316124][ T8671] kmalloc_order+0x4c/0x160 [ 202.320615][ T8671] ? slab_post_alloc_hook+0x7d/0x2f0 [ 202.325889][ T8671] kmalloc_order_trace+0x16/0x80 [ 202.330820][ T8671] __kmalloc_track_caller+0x1d7/0x320 [ 202.336205][ T8671] ? __alloc_skb+0x9e/0x520 [ 202.340700][ T8671] ? alloc_skb_with_frags+0xa2/0x560 [ 202.345976][ T8671] __alloc_skb+0xdc/0x520 [ 202.350295][ T8671] alloc_skb_with_frags+0xa2/0x560 [ 202.355403][ T8671] sock_alloc_send_pskb+0x853/0x980 [ 202.360589][ T8671] ? is_bpf_text_address+0x177/0x190 [ 202.365864][ T8671] ? sock_kzfree_s+0x60/0x60 [ 202.370444][ T8671] ? iov_iter_advance+0x1f7/0x750 [ 202.375461][ T8671] tun_get_user+0x4bd/0x3090 [ 202.380041][ T8671] ? ____kasan_slab_free+0x125/0x160 [ 202.385316][ T8671] ? __kasan_slab_free+0x11/0x20 [ 202.390243][ T8671] ? putname+0xfe/0x150 [ 202.394385][ T8671] ? __x64_sys_openat+0x136/0x160 [ 202.399397][ T8671] ? do_syscall_64+0x31/0x40 [ 202.403980][ T8671] ? tun_do_read+0x1c00/0x1c00 [ 202.408735][ T8671] ? kstrtouint_from_user+0x1a0/0x200 [ 202.414103][ T8671] ? __fsnotify_parent+0x5f5/0x6c0 [ 202.419206][ T8671] ? avc_policy_seqno+0x1b/0x70 [ 202.424056][ T8671] ? selinux_file_permission+0x2a5/0x510 [ 202.429681][ T8671] ? fsnotify_perm+0x66/0x4b0 [ 202.434346][ T8671] tun_chr_write_iter+0x1bf/0x270 [ 202.439369][ T8671] vfs_write+0x725/0xd60 [ 202.443604][ T8671] ? kernel_write+0x3c0/0x3c0 [ 202.448272][ T8671] ? __fget_files+0x2c4/0x320 [ 202.452947][ T8671] ? __fdget_pos+0x1f7/0x380 [ 202.457524][ T8671] ? ksys_write+0x71/0x240 [ 202.461930][ T8671] ksys_write+0x140/0x240 [ 202.466333][ T8671] ? __ia32_sys_read+0x90/0x90 [ 202.471177][ T8671] ? debug_smp_processor_id+0x17/0x20 [ 202.476534][ T8671] __x64_sys_write+0x7b/0x90 [ 202.481113][ T8671] do_syscall_64+0x31/0x40 [ 202.485522][ T8671] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 202.491404][ T8671] RIP: 0033:0x7f2181d486c9 [ 202.495810][ T8671] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 202.515400][ T8671] RSP: 002b:00007f218078f038 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 202.523806][ T8671] RAX: ffffffffffffffda RBX: 00007f2181f9f090 RCX: 00007f2181d486c9 [ 202.531772][ T8671] RDX: 000000000000ffdd RSI: 0000200000000140 RDI: 0000000000000003 [ 202.539729][ T8671] RBP: 00007f218078f090 R08: 0000000000000000 R09: 0000000000000000 [ 202.547689][ T8671] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 202.555648][ T8671] R13: 00007f2181f9f128 R14: 00007f2181f9f090 R15: 00007ffcb4635738 [ 203.270664][ T8730] FAULT_INJECTION: forcing a failure. [ 203.270664][ T8730] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 203.325301][ T8730] CPU: 1 PID: 8730 Comm: syz.1.2638 Tainted: G W syzkaller #0 [ 203.334174][ T8730] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 203.344237][ T8730] Call Trace: [ 203.347530][ T8730] __dump_stack+0x21/0x24 [ 203.351866][ T8730] dump_stack_lvl+0x169/0x1d8 [ 203.356547][ T8730] ? show_regs_print_info+0x18/0x18 [ 203.361750][ T8730] dump_stack+0x15/0x1c [ 203.365904][ T8730] should_fail+0x3c1/0x510 [ 203.370323][ T8730] should_fail_usercopy+0x1a/0x20 [ 203.375354][ T8730] _copy_from_iter+0x1d1/0x9f0 [ 203.380128][ T8730] ? __kasan_check_read+0x11/0x20 [ 203.385161][ T8730] ? __check_object_size+0x2f4/0x3c0 [ 203.390451][ T8730] skb_copy_datagram_from_iter+0xfa/0x6b0 [ 203.396174][ T8730] ? skb_put+0x10e/0x1f0 [ 203.400432][ T8730] tun_get_user+0x140a/0x3090 [ 203.405115][ T8730] ? ____kasan_slab_free+0x125/0x160 [ 203.410404][ T8730] ? __kasan_slab_free+0x11/0x20 [ 203.415342][ T8730] ? putname+0xfe/0x150 [ 203.419500][ T8730] ? __x64_sys_openat+0x136/0x160 [ 203.424524][ T8730] ? do_syscall_64+0x31/0x40 [ 203.429115][ T8730] ? tun_do_read+0x1c00/0x1c00 [ 203.433880][ T8730] ? kstrtouint_from_user+0x1a0/0x200 [ 203.439252][ T8730] ? __fsnotify_parent+0x5f5/0x6c0 [ 203.444367][ T8730] ? avc_policy_seqno+0x1b/0x70 [ 203.449227][ T8730] ? selinux_file_permission+0x2a5/0x510 [ 203.454861][ T8730] ? fsnotify_perm+0x66/0x4b0 [ 203.459541][ T8730] tun_chr_write_iter+0x1bf/0x270 [ 203.464567][ T8730] vfs_write+0x725/0xd60 [ 203.468811][ T8730] ? __kasan_slab_free+0x11/0x20 [ 203.473835][ T8730] ? kernel_write+0x3c0/0x3c0 [ 203.478518][ T8730] ? __fget_files+0x2c4/0x320 [ 203.483198][ T8730] ? __fdget_pos+0x1f7/0x380 [ 203.487783][ T8730] ? ksys_write+0x71/0x240 [ 203.492191][ T8730] ksys_write+0x140/0x240 [ 203.496506][ T8730] ? __ia32_sys_read+0x90/0x90 [ 203.501266][ T8730] ? debug_smp_processor_id+0x17/0x20 [ 203.506625][ T8730] __x64_sys_write+0x7b/0x90 [ 203.511205][ T8730] do_syscall_64+0x31/0x40 [ 203.515610][ T8730] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 203.521488][ T8730] RIP: 0033:0x7f1d595406c9 [ 203.525895][ T8730] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 203.545496][ T8730] RSP: 002b:00007f1d57fa8038 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 203.553896][ T8730] RAX: ffffffffffffffda RBX: 00007f1d59796fa0 RCX: 00007f1d595406c9 [ 203.561856][ T8730] RDX: 000000000000ffdd RSI: 0000200000000140 RDI: 0000000000000003 [ 203.569823][ T8730] RBP: 00007f1d57fa8090 R08: 0000000000000000 R09: 0000000000000000 [ 203.577780][ T8730] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 203.585869][ T8730] R13: 00007f1d59797038 R14: 00007f1d59796fa0 R15: 00007fffa79f8878 [ 203.956209][ T8755] device pim6reg1 entered promiscuous mode [ 204.167365][ T8778] FAULT_INJECTION: forcing a failure. [ 204.167365][ T8778] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 204.197985][ T8778] CPU: 0 PID: 8778 Comm: syz.4.2653 Tainted: G W syzkaller #0 [ 204.206765][ T8778] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 204.216928][ T8778] Call Trace: [ 204.220230][ T8778] __dump_stack+0x21/0x24 [ 204.224562][ T8778] dump_stack_lvl+0x169/0x1d8 [ 204.229243][ T8778] ? thaw_kernel_threads+0x220/0x220 [ 204.234537][ T8778] ? vsnprintf+0x1871/0x1960 [ 204.239134][ T8778] ? show_regs_print_info+0x18/0x18 [ 204.244341][ T8778] dump_stack+0x15/0x1c [ 204.248496][ T8778] should_fail+0x3c1/0x510 [ 204.252999][ T8778] should_fail_usercopy+0x1a/0x20 [ 204.258025][ T8778] _copy_to_user+0x20/0x90 [ 204.262446][ T8778] simple_read_from_buffer+0xe9/0x160 [ 204.267815][ T8778] proc_fail_nth_read+0x19a/0x210 [ 204.272923][ T8778] ? proc_fault_inject_write+0x2f0/0x2f0 [ 204.278556][ T8778] ? rw_verify_area+0x1c0/0x360 [ 204.283404][ T8778] ? proc_fault_inject_write+0x2f0/0x2f0 [ 204.289031][ T8778] vfs_read+0x1fe/0xa10 [ 204.293190][ T8778] ? kernel_read+0x70/0x70 [ 204.297613][ T8778] ? __kasan_check_write+0x14/0x20 [ 204.302719][ T8778] ? mutex_lock+0x8c/0xe0 [ 204.307051][ T8778] ? mutex_trylock+0xa0/0xa0 [ 204.311637][ T8778] ? __fget_files+0x2c4/0x320 [ 204.316311][ T8778] ? __fdget_pos+0x2d2/0x380 [ 204.320898][ T8778] ? ksys_read+0x71/0x240 [ 204.325222][ T8778] ksys_read+0x140/0x240 [ 204.329466][ T8778] ? vfs_write+0xd60/0xd60 [ 204.333883][ T8778] ? debug_smp_processor_id+0x17/0x20 [ 204.339257][ T8778] __x64_sys_read+0x7b/0x90 [ 204.343931][ T8778] do_syscall_64+0x31/0x40 [ 204.348365][ T8778] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 204.354266][ T8778] RIP: 0033:0x7fe57a3330dc [ 204.358690][ T8778] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 93 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 ef 93 02 00 48 [ 204.378299][ T8778] RSP: 002b:00007fe578d9c030 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 204.386716][ T8778] RAX: ffffffffffffffda RBX: 00007fe57a58afa0 RCX: 00007fe57a3330dc [ 204.394689][ T8778] RDX: 000000000000000f RSI: 00007fe578d9c0a0 RDI: 0000000000000004 [ 204.402662][ T8778] RBP: 00007fe578d9c090 R08: 0000000000000000 R09: 0000000000000000 [ 204.410633][ T8778] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 204.418612][ T8778] R13: 00007fe57a58b038 R14: 00007fe57a58afa0 R15: 00007fff8d8e9768 [ 205.298918][ T8848] device pim6reg1 entered promiscuous mode [ 206.013977][ T8873] tap0: tun_chr_ioctl cmd 1074025680 [ 206.909752][ T8919] FAULT_INJECTION: forcing a failure. [ 206.909752][ T8919] name failslab, interval 1, probability 0, space 0, times 0 [ 206.922365][ T8919] CPU: 1 PID: 8919 Comm: syz.2.2700 Tainted: G W syzkaller #0 [ 206.931129][ T8919] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 206.941186][ T8919] Call Trace: [ 206.944485][ T8919] __dump_stack+0x21/0x24 [ 206.948829][ T8919] dump_stack_lvl+0x169/0x1d8 [ 206.953514][ T8919] ? show_regs_print_info+0x18/0x18 [ 206.958725][ T8919] dump_stack+0x15/0x1c [ 206.962893][ T8919] should_fail+0x3c1/0x510 [ 206.967328][ T8919] ? __sigqueue_alloc+0x185/0x2d0 [ 206.972372][ T8919] __should_failslab+0xa4/0xe0 [ 206.977140][ T8919] should_failslab+0x9/0x20 [ 206.981729][ T8919] kmem_cache_alloc+0x3d/0x2e0 [ 206.986494][ T8919] ? prepare_signal+0x796/0x970 [ 206.991341][ T8919] __sigqueue_alloc+0x185/0x2d0 [ 206.996184][ T8919] __send_signal+0x1f2/0xb80 [ 207.000767][ T8919] ? _raw_spin_lock_irqsave+0xb0/0x110 [ 207.006218][ T8919] send_signal+0x479/0x5b0 [ 207.010629][ T8919] force_sig_info_to_task+0x24b/0x2e0 [ 207.015993][ T8919] force_sig+0xb5/0x100 [ 207.020146][ T8919] ? send_sig+0x70/0x70 [ 207.024299][ T8919] ? fput+0x1a/0x20 [ 207.028095][ T8919] ? ksys_write+0x1eb/0x240 [ 207.032591][ T8919] exc_general_protection+0xd4/0x250 [ 207.037865][ T8919] ? asm_exc_general_protection+0x8/0x30 [ 207.043490][ T8919] asm_exc_general_protection+0x1e/0x30 [ 207.049025][ T8919] RIP: 0033:0x7fb25af650f9 [ 207.053431][ T8919] Code: f8 77 c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 89 f8 48 89 fa c5 f9 ef c0 25 ff 0f 00 00 3d e0 0f 00 00 0f 87 27 01 00 00 fd 74 0f c5 fd d7 c1 85 c0 74 5b f3 0f bc c0 e9 30 01 00 00 66 [ 207.073048][ T8919] RSP: 002b:00007fb2599f37c8 EFLAGS: 00010283 [ 207.079111][ T8919] RAX: 0000000000000999 RBX: 00007fb2599f3d30 RCX: 00007fb25b1a5120 [ 207.087079][ T8919] RDX: 9999999999999999 RSI: 00007fb25b00eca9 RDI: 9999999999999999 [ 207.095044][ T8919] RBP: 000000000000000b R08: 0000000000000000 R09: 0000000000000000 [ 207.103005][ T8919] R10: 00000000ffffffff R11: 0000000000000000 R12: 0000000000000073 [ 207.110966][ T8919] R13: 00007fb2599f3eb0 R14: 9999999999999999 R15: 0000000000000000 [ 207.906163][ T8949] device syzkaller0 entered promiscuous mode [ 208.929868][ T8988] device wg2 left promiscuous mode [ 209.395253][ T24] audit: type=1400 audit(1763398292.830:156): avc: denied { associate } for pid=8991 comm="syz.3.2722" name="cgroup.stat" scontext=root:object_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 [ 210.298134][ T24] audit: type=1400 audit(1763398293.730:157): avc: denied { create } for pid=9043 comm="syz.2.2736" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=isdn_socket permissive=1 [ 210.329958][ T9044] device sit0 left promiscuous mode [ 210.363763][ T9049] device pim6reg1 entered promiscuous mode [ 210.388231][ T9044] device sit0 entered promiscuous mode [ 210.920907][ T9085] device pim6reg1 entered promiscuous mode [ 211.013790][ T95] udevd[95]: worker [935] terminated by signal 33 (Unknown signal 33) [ 211.022573][ T95] udevd[95]: worker [935] failed while handling '/devices/virtual/block/loop4' [ 211.702841][ T9118] device syzkaller0 entered promiscuous mode [ 212.950839][ T9176] device syzkaller0 entered promiscuous mode [ 213.231638][ T24] audit: type=1400 audit(1763398296.670:158): avc: denied { read } for pid=9194 comm="syz.1.2797" dev="nsfs" ino=4026532282 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 213.275758][ T24] audit: type=1400 audit(1763398296.680:159): avc: denied { open } for pid=9194 comm="syz.1.2797" path="mnt:[4026532282]" dev="nsfs" ino=4026532282 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 214.393540][ T9258] device veth1_macvtap entered promiscuous mode [ 214.406838][ T9258] device macsec0 entered promiscuous mode [ 214.425338][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 215.374066][ T9411] bridge0: port 1(bridge_slave_0) entered blocking state [ 215.399128][ T9411] bridge0: port 1(bridge_slave_0) entered disabled state [ 215.430575][ T9411] device bridge_slave_0 entered promiscuous mode [ 215.449656][ T9411] bridge0: port 2(bridge_slave_1) entered blocking state [ 215.470550][ T9411] bridge0: port 2(bridge_slave_1) entered disabled state [ 215.485639][ T9411] device bridge_slave_1 entered promiscuous mode [ 215.720871][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 215.739565][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 215.792605][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 215.809413][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 215.827763][ T296] bridge0: port 1(bridge_slave_0) entered blocking state [ 215.834946][ T296] bridge0: port 1(bridge_slave_0) entered forwarding state [ 215.876157][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 215.894713][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 215.914808][ T296] bridge0: port 2(bridge_slave_1) entered blocking state [ 215.922010][ T296] bridge0: port 2(bridge_slave_1) entered forwarding state [ 215.955918][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 215.977321][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 216.020501][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 216.054984][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 216.072359][ T9411] device veth0_vlan entered promiscuous mode [ 216.097896][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 216.125590][ T9411] device veth1_macvtap entered promiscuous mode [ 216.134219][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 216.143482][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 216.151215][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 216.195153][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 216.203964][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 216.353248][ T2931] device bridge_slave_1 left promiscuous mode [ 216.379373][ T2931] bridge0: port 2(bridge_slave_1) entered disabled state [ 216.417641][ T2931] device bridge_slave_0 left promiscuous mode [ 216.447618][ T2931] bridge0: port 1(bridge_slave_0) entered disabled state [ 216.482767][ T2931] device veth1_macvtap left promiscuous mode [ 216.650240][ T24] audit: type=1400 audit(1763398300.090:160): avc: denied { create } for pid=9468 comm="syz.3.2840" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=atmpvc_socket permissive=1 [ 217.655717][ T9520] device macsec0 left promiscuous mode [ 217.919784][ T9555] device syzkaller0 entered promiscuous mode [ 217.950464][ T9555] device sit0 left promiscuous mode [ 221.648829][ T9700] bridge0: port 1(bridge_slave_0) entered blocking state [ 221.665468][ T9700] bridge0: port 1(bridge_slave_0) entered disabled state [ 221.673972][ T9700] device bridge_slave_0 entered promiscuous mode [ 221.690742][ T9700] bridge0: port 2(bridge_slave_1) entered blocking state [ 221.697893][ T9700] bridge0: port 2(bridge_slave_1) entered disabled state [ 221.712729][ T9719] syz.3.2916[9719] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 221.712794][ T9719] syz.3.2916[9719] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 221.726837][ T9700] device bridge_slave_1 entered promiscuous mode [ 222.021349][ T9700] bridge0: port 2(bridge_slave_1) entered blocking state [ 222.028427][ T9700] bridge0: port 2(bridge_slave_1) entered forwarding state [ 222.035707][ T9700] bridge0: port 1(bridge_slave_0) entered blocking state [ 222.042744][ T9700] bridge0: port 1(bridge_slave_0) entered forwarding state [ 222.062938][ T49] bridge0: port 1(bridge_slave_0) entered disabled state [ 222.070372][ T49] bridge0: port 2(bridge_slave_1) entered disabled state [ 222.273108][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 222.289373][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 222.320564][ T2931] device veth0_vlan left promiscuous mode [ 222.433379][ T9750] device sit0 entered promiscuous mode [ 222.485368][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 222.494067][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 222.502499][ T296] bridge0: port 1(bridge_slave_0) entered blocking state [ 222.509568][ T296] bridge0: port 1(bridge_slave_0) entered forwarding state [ 222.516950][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 222.525994][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 222.534466][ T296] bridge0: port 2(bridge_slave_1) entered blocking state [ 222.541545][ T296] bridge0: port 2(bridge_slave_1) entered forwarding state [ 222.666795][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 222.675200][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 222.739545][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 222.747692][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 222.798151][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 222.814444][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 222.831448][ T9700] device veth0_vlan entered promiscuous mode [ 222.896645][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 222.916585][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 222.946934][ T9700] device veth1_macvtap entered promiscuous mode [ 222.955901][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 222.964687][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 222.981820][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 222.990128][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 222.998457][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 223.200963][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 223.210180][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 223.261401][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 223.269947][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 223.705491][ T9801] IPv6: pim6reg1: Disabled Multicast RS [ 223.787932][ T9802] bridge0: port 1(bridge_slave_0) entered blocking state [ 223.795888][ T9802] bridge0: port 1(bridge_slave_0) entered disabled state [ 223.803816][ T9802] device bridge_slave_0 entered promiscuous mode [ 223.824322][ T9802] bridge0: port 2(bridge_slave_1) entered blocking state [ 223.831686][ T9802] bridge0: port 2(bridge_slave_1) entered disabled state [ 223.839255][ T9802] device bridge_slave_1 entered promiscuous mode [ 223.908038][ T9802] bridge0: port 2(bridge_slave_1) entered blocking state [ 223.915120][ T9802] bridge0: port 2(bridge_slave_1) entered forwarding state [ 223.922408][ T9802] bridge0: port 1(bridge_slave_0) entered blocking state [ 223.929443][ T9802] bridge0: port 1(bridge_slave_0) entered forwarding state [ 224.108743][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 224.131103][ T296] bridge0: port 1(bridge_slave_0) entered disabled state [ 224.138731][ T296] bridge0: port 2(bridge_slave_1) entered disabled state [ 224.172405][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 224.205704][ T296] bridge0: port 1(bridge_slave_0) entered blocking state [ 224.212849][ T296] bridge0: port 1(bridge_slave_0) entered forwarding state [ 224.226622][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 224.240880][ T296] bridge0: port 2(bridge_slave_1) entered blocking state [ 224.247926][ T296] bridge0: port 2(bridge_slave_1) entered forwarding state [ 224.269108][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 224.287923][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 224.296345][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 224.304674][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 224.356192][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 224.369273][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 224.381201][ T9802] device veth0_vlan entered promiscuous mode [ 224.394351][ T9802] device veth1_macvtap entered promiscuous mode [ 224.446420][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 224.458136][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 224.474892][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 224.500457][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 224.510067][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 224.517771][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 224.526330][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 224.534953][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 224.544246][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 224.582051][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 224.589932][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 225.794547][ T2931] GPL: port 1(erspan0) entered disabled state [ 225.818473][ T2931] device erspan0 left promiscuous mode [ 225.833707][ T2931] GPL: port 1(erspan0) entered disabled state [ 226.235907][ T2931] device veth1_macvtap left promiscuous mode [ 226.664695][ T9936] bridge0: port 1(bridge_slave_0) entered blocking state [ 226.675158][ T9936] bridge0: port 1(bridge_slave_0) entered disabled state [ 226.687203][ T9936] device bridge_slave_0 entered promiscuous mode [ 226.699866][ T9936] bridge0: port 2(bridge_slave_1) entered blocking state [ 226.706915][ T9936] bridge0: port 2(bridge_slave_1) entered disabled state [ 226.722315][ T9936] device bridge_slave_1 entered promiscuous mode [ 226.928629][ T9936] bridge0: port 2(bridge_slave_1) entered blocking state [ 226.935962][ T9936] bridge0: port 2(bridge_slave_1) entered forwarding state [ 226.943276][ T9936] bridge0: port 1(bridge_slave_0) entered blocking state [ 226.950500][ T9936] bridge0: port 1(bridge_slave_0) entered forwarding state [ 227.127325][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 227.150147][ T49] bridge0: port 1(bridge_slave_0) entered disabled state [ 227.174069][ T49] bridge0: port 2(bridge_slave_1) entered disabled state [ 227.210093][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 227.219874][ T49] bridge0: port 1(bridge_slave_0) entered blocking state [ 227.226911][ T49] bridge0: port 1(bridge_slave_0) entered forwarding state [ 227.280484][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 227.329647][ T49] bridge0: port 2(bridge_slave_1) entered blocking state [ 227.336711][ T49] bridge0: port 2(bridge_slave_1) entered forwarding state [ 227.451793][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 227.478042][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 227.548149][ T9936] device veth0_vlan entered promiscuous mode [ 227.600003][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 227.628861][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 227.659669][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 227.701086][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 227.740961][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 227.765070][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 227.796302][ T9936] device veth1_macvtap entered promiscuous mode [ 227.867492][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 227.897430][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 227.959456][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 228.040852][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 228.066328][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 233.402177][T10246] syz.4.3082[10246] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 233.402236][T10246] syz.4.3082[10246] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 235.852923][T10338] device sit0 entered promiscuous mode [ 236.935096][T10384] device syzkaller0 entered promiscuous mode [ 239.501358][T10479] device sit0 entered promiscuous mode [ 239.835000][T10491] device pim6reg1 entered promiscuous mode [ 240.451926][ T24] audit: type=1400 audit(1763398323.890:161): avc: denied { ioctl } for pid=10541 comm="syz.2.3179" path="uts:[4026532493]" dev="nsfs" ino=4026532493 ioctlcmd=0xb701 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 240.650386][T10548] device syzkaller0 entered promiscuous mode [ 242.809471][T10618] device pim6reg1 entered promiscuous mode [ 243.352145][T10653] device pim6reg1 entered promiscuous mode [ 243.531714][T10665] syz.0.3213[10665] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 243.531801][T10665] syz.0.3213[10665] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 245.791977][T10779] device pim6reg1 entered promiscuous mode [ 246.702298][T10818] device syzkaller0 entered promiscuous mode [ 247.004682][T10834] bridge0: port 1(bridge_slave_0) entered blocking state [ 247.018080][T10834] bridge0: port 1(bridge_slave_0) entered disabled state [ 247.025901][T10834] device bridge_slave_0 entered promiscuous mode [ 247.040419][T10834] bridge0: port 2(bridge_slave_1) entered blocking state [ 247.052746][T10834] bridge0: port 2(bridge_slave_1) entered disabled state [ 247.068289][T10834] device bridge_slave_1 entered promiscuous mode [ 247.266578][T10882] syz.0.3286[10882] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 247.266668][T10882] syz.0.3286[10882] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 247.316082][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 247.397990][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 247.412856][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 247.421413][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 247.429896][ T49] bridge0: port 1(bridge_slave_0) entered blocking state [ 247.436942][ T49] bridge0: port 1(bridge_slave_0) entered forwarding state [ 247.455617][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 247.493652][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 247.533085][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 247.541440][ T49] bridge0: port 2(bridge_slave_1) entered blocking state [ 247.548576][ T49] bridge0: port 2(bridge_slave_1) entered forwarding state [ 247.632596][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 247.642560][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 247.766042][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 247.774158][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 247.816128][T10900] device syzkaller0 entered promiscuous mode [ 247.913598][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 247.926407][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 247.942043][T10834] device veth0_vlan entered promiscuous mode [ 247.967072][T10834] device veth1_macvtap entered promiscuous mode [ 247.993768][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 248.002135][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 248.019538][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 248.037180][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 248.064807][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 248.142418][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 248.155486][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 248.184451][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 248.216113][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 248.234853][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 248.262347][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 249.019841][T10948] syz.4.3303[10948] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 249.019918][T10948] syz.4.3303[10948] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 250.255835][T10982] device syzkaller0 entered promiscuous mode [ 251.211942][T11017] ±ÿ: renamed from team_slave_1 [ 251.506070][T11039] device wg2 entered promiscuous mode [ 251.809895][T11063] syz.1.3339[11063] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 251.810004][T11063] syz.1.3339[11063] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 251.915090][T11070] device pim6reg1 entered promiscuous mode [ 252.069540][T11077] device wg2 entered promiscuous mode [ 252.768783][T11109] device pim6reg1 entered promiscuous mode [ 253.149482][T11135] device pim6reg1 entered promiscuous mode [ 253.587536][T11170] device syzkaller0 entered promiscuous mode [ 254.654130][T11255] device wg2 left promiscuous mode [ 254.804572][T11261] device pim6reg1 entered promiscuous mode [ 256.157473][T11331] device syzkaller0 entered promiscuous mode [ 257.214841][T11372] device syzkaller0 entered promiscuous mode [ 257.584700][T11382] device pim6reg1 entered promiscuous mode [ 258.921166][T11448] device wg2 entered promiscuous mode [ 259.296134][T11463] device syzkaller0 entered promiscuous mode [ 259.871594][T11516] device wg2 entered promiscuous mode [ 260.891209][T11573] syz.0.3487 (11573) used obsolete PPPIOCDETACH ioctl [ 261.376125][T11598] device wg2 entered promiscuous mode [ 265.199259][T11783] device wg2 entered promiscuous mode [ 265.524852][T11804] device wg2 left promiscuous mode [ 265.641934][T11804] device wg2 entered promiscuous mode [ 266.818242][T11902] device wg2 left promiscuous mode [ 267.009523][T11901] device wg2 entered promiscuous mode [ 267.122560][T11910] ÿÿÿÿÿÿ: renamed from vlan1 [ 268.039904][T11991] device wg2 left promiscuous mode [ 268.644495][T12037] device syzkaller0 entered promiscuous mode [ 269.159921][T12073] : renamed from bond_slave_0 [ 269.679223][T12091] batadv0: tun_chr_ioctl cmd 2147767521 [ 269.704755][T12091] batadv0: tun_chr_ioctl cmd 1074025692 [ 270.651812][T12126] device wg2 entered promiscuous mode [ 272.008468][T12197] device syzkaller0 entered promiscuous mode [ 273.456452][T12258] syz.3.3688[12258] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 273.456511][T12258] syz.3.3688[12258] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 273.762122][T12271] bridge0: port 2(bridge_slave_1) entered disabled state [ 273.781789][T12271] bridge0: port 1(bridge_slave_0) entered disabled state [ 274.006017][T12282] device sit0 left promiscuous mode [ 274.069788][T12284] device sit0 entered promiscuous mode [ 274.639211][T12303] device pim6reg1 entered promiscuous mode [ 274.684787][T12307] syz.2.3702[12307] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 274.684844][T12307] syz.2.3702[12307] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 275.717028][T12353] device pim6reg1 entered promiscuous mode [ 276.098950][T12367] device syzkaller0 entered promiscuous mode [ 277.757059][T12433] Q±6ã`Ò˜: renamed from lo [ 279.384911][T12529] device sit0 left promiscuous mode [ 279.513055][T12532] device sit0 entered promiscuous mode [ 280.217898][T12574] device syzkaller0 entered promiscuous mode [ 280.705392][ T24] audit: type=1400 audit(1763398364.140:162): avc: denied { create } for pid=12597 comm="syz.4.3785" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=ipx_socket permissive=1 [ 281.600432][T12632] FAULT_INJECTION: forcing a failure. [ 281.600432][T12632] name failslab, interval 1, probability 0, space 0, times 0 [ 281.647819][T12632] CPU: 0 PID: 12632 Comm: syz.2.3795 Tainted: G W syzkaller #0 [ 281.656704][T12632] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 281.666877][T12632] Call Trace: [ 281.670196][T12632] __dump_stack+0x21/0x24 [ 281.674540][T12632] dump_stack_lvl+0x169/0x1d8 [ 281.679233][T12632] ? thaw_kernel_threads+0x220/0x220 [ 281.684532][T12632] ? show_regs_print_info+0x18/0x18 [ 281.689751][T12632] ? proc_fail_nth_read+0x210/0x210 [ 281.695072][T12632] dump_stack+0x15/0x1c [ 281.699252][T12632] should_fail+0x3c1/0x510 [ 281.703676][T12632] ? getname_flags+0xb9/0x500 [ 281.708386][T12632] __should_failslab+0xa4/0xe0 [ 281.713176][T12632] should_failslab+0x9/0x20 [ 281.717686][T12632] kmem_cache_alloc+0x3d/0x2e0 [ 281.722470][T12632] getname_flags+0xb9/0x500 [ 281.726984][T12632] getname+0x19/0x20 [ 281.730890][T12632] do_sys_openat2+0xd9/0x6d0 [ 281.735488][T12632] ? __kasan_check_write+0x14/0x20 [ 281.740610][T12632] ? fput_many+0x15a/0x1a0 [ 281.745058][T12632] ? do_sys_open+0xe0/0xe0 [ 281.749497][T12632] ? fput+0x1a/0x20 [ 281.753312][T12632] ? ksys_write+0x1eb/0x240 [ 281.757931][T12632] ? __ia32_sys_read+0x90/0x90 [ 281.762713][T12632] __x64_sys_openat+0x136/0x160 [ 281.767585][T12632] do_syscall_64+0x31/0x40 [ 281.772257][T12632] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 281.778280][T12632] RIP: 0033:0x7f5e149c16c9 [ 281.782712][T12632] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 281.802432][T12632] RSP: 002b:00007f5e13429038 EFLAGS: 00000246 ORIG_RAX: 0000000000000101 [ 281.810865][T12632] RAX: ffffffffffffffda RBX: 00007f5e14c17fa0 RCX: 00007f5e149c16c9 [ 281.818960][T12632] RDX: 00000000000026e1 RSI: 0000200000000140 RDI: ffffffffffffff9c [ 281.827026][T12632] RBP: 00007f5e13429090 R08: 0000000000000000 R09: 0000000000000000 [ 281.835006][T12632] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 281.842990][T12632] R13: 00007f5e14c18038 R14: 00007f5e14c17fa0 R15: 00007ffc65f2b498 [ 282.106095][T12659] FAULT_INJECTION: forcing a failure. [ 282.106095][T12659] name failslab, interval 1, probability 0, space 0, times 0 [ 282.174995][T12659] CPU: 1 PID: 12659 Comm: syz.3.3805 Tainted: G W syzkaller #0 [ 282.183865][T12659] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 282.193926][T12659] Call Trace: [ 282.197235][T12659] __dump_stack+0x21/0x24 [ 282.201568][T12659] dump_stack_lvl+0x169/0x1d8 [ 282.206242][T12659] ? show_regs_print_info+0x18/0x18 [ 282.211438][T12659] ? fsnotify_set_children_dentry_flags+0x210/0x210 [ 282.218107][T12659] dump_stack+0x15/0x1c [ 282.222530][T12659] should_fail+0x3c1/0x510 [ 282.227119][T12659] ? slhc_init+0x77/0x770 [ 282.231558][T12659] __should_failslab+0xa4/0xe0 [ 282.236323][T12659] should_failslab+0x9/0x20 [ 282.240830][T12659] kmem_cache_alloc_trace+0x3a/0x2e0 [ 282.246116][T12659] ? __kasan_check_write+0x14/0x20 [ 282.251232][T12659] ? mutex_lock+0x8c/0xe0 [ 282.255822][T12659] slhc_init+0x77/0x770 [ 282.259975][T12659] ppp_ioctl+0x1167/0x1550 [ 282.264388][T12659] ? ppp_poll+0x250/0x250 [ 282.268716][T12659] ? __fget_files+0x2c4/0x320 [ 282.273391][T12659] ? security_file_ioctl+0x84/0xa0 [ 282.278500][T12659] ? ppp_poll+0x250/0x250 [ 282.282827][T12659] __se_sys_ioctl+0x121/0x1a0 [ 282.287593][T12659] __x64_sys_ioctl+0x7b/0x90 [ 282.292232][T12659] do_syscall_64+0x31/0x40 [ 282.296649][T12659] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 282.302541][T12659] RIP: 0033:0x7fa4f24cd6c9 [ 282.307029][T12659] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 282.326635][T12659] RSP: 002b:00007fa4f0f35038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 282.335064][T12659] RAX: ffffffffffffffda RBX: 00007fa4f2723fa0 RCX: 00007fa4f24cd6c9 [ 282.343038][T12659] RDX: 0000200000000180 RSI: 0000000040047451 RDI: 0000000000000005 [ 282.351130][T12659] RBP: 00007fa4f0f35090 R08: 0000000000000000 R09: 0000000000000000 [ 282.359110][T12659] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 282.367108][T12659] R13: 00007fa4f2724038 R14: 00007fa4f2723fa0 R15: 00007ffd57957708 [ 282.809421][T12674] FAULT_INJECTION: forcing a failure. [ 282.809421][T12674] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 282.921729][T12674] CPU: 0 PID: 12674 Comm: syz.2.3811 Tainted: G W syzkaller #0 [ 282.930610][T12674] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 282.940672][T12674] Call Trace: [ 282.943966][T12674] __dump_stack+0x21/0x24 [ 282.948296][T12674] dump_stack_lvl+0x169/0x1d8 [ 282.952980][T12674] ? thaw_kernel_threads+0x220/0x220 [ 282.958279][T12674] ? show_regs_print_info+0x18/0x18 [ 282.963480][T12674] dump_stack+0x15/0x1c [ 282.967645][T12674] should_fail+0x3c1/0x510 [ 282.972076][T12674] should_fail_usercopy+0x1a/0x20 [ 282.977216][T12674] strncpy_from_user+0x24/0x2e0 [ 282.982082][T12674] ? kmem_cache_alloc+0x165/0x2e0 [ 282.987115][T12674] ? getname_flags+0xb9/0x500 [ 282.991796][T12674] getname_flags+0xf4/0x500 [ 282.996305][T12674] getname+0x19/0x20 [ 283.000254][T12674] do_sys_openat2+0xd9/0x6d0 [ 283.004845][T12674] ? __kasan_check_write+0x14/0x20 [ 283.009959][T12674] ? fput_many+0x15a/0x1a0 [ 283.014388][T12674] ? do_sys_open+0xe0/0xe0 [ 283.018983][T12674] ? fput+0x1a/0x20 [ 283.022795][T12674] ? ksys_write+0x1eb/0x240 [ 283.027312][T12674] ? __ia32_sys_read+0x90/0x90 [ 283.032082][T12674] __x64_sys_openat+0x136/0x160 [ 283.037049][T12674] do_syscall_64+0x31/0x40 [ 283.041476][T12674] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 283.047367][T12674] RIP: 0033:0x7f5e149c16c9 [ 283.051786][T12674] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 283.071394][T12674] RSP: 002b:00007f5e13429038 EFLAGS: 00000246 ORIG_RAX: 0000000000000101 [ 283.079801][T12674] RAX: ffffffffffffffda RBX: 00007f5e14c17fa0 RCX: 00007f5e149c16c9 [ 283.087762][T12674] RDX: 00000000000026e1 RSI: 0000200000000140 RDI: ffffffffffffff9c [ 283.095723][T12674] RBP: 00007f5e13429090 R08: 0000000000000000 R09: 0000000000000000 [ 283.103769][T12674] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 283.111732][T12674] R13: 00007f5e14c18038 R14: 00007f5e14c17fa0 R15: 00007ffc65f2b498 [ 283.295110][T12706] FAULT_INJECTION: forcing a failure. [ 283.295110][T12706] name failslab, interval 1, probability 0, space 0, times 0 [ 283.318526][T12706] CPU: 0 PID: 12706 Comm: syz.0.3819 Tainted: G W syzkaller #0 [ 283.327404][T12706] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 283.337562][T12706] Call Trace: [ 283.340852][T12706] __dump_stack+0x21/0x24 [ 283.345174][T12706] dump_stack_lvl+0x169/0x1d8 [ 283.349838][T12706] ? thaw_kernel_threads+0x220/0x220 [ 283.355110][T12706] ? show_regs_print_info+0x18/0x18 [ 283.360352][T12706] dump_stack+0x15/0x1c [ 283.364503][T12706] should_fail+0x3c1/0x510 [ 283.368910][T12706] ? slhc_init+0xb0/0x770 [ 283.373232][T12706] __should_failslab+0xa4/0xe0 [ 283.377986][T12706] should_failslab+0x9/0x20 [ 283.382478][T12706] __kmalloc+0x60/0x330 [ 283.386626][T12706] ? kmem_cache_alloc_trace+0x184/0x2e0 [ 283.392196][T12706] ? __kasan_check_write+0x14/0x20 [ 283.397355][T12706] ? slhc_init+0x77/0x770 [ 283.401676][T12706] slhc_init+0xb0/0x770 [ 283.405824][T12706] ppp_ioctl+0x1167/0x1550 [ 283.410234][T12706] ? ppp_poll+0x250/0x250 [ 283.414551][T12706] ? __fget_files+0x2c4/0x320 [ 283.419220][T12706] ? security_file_ioctl+0x84/0xa0 [ 283.424327][T12706] ? ppp_poll+0x250/0x250 [ 283.428644][T12706] __se_sys_ioctl+0x121/0x1a0 [ 283.433327][T12706] __x64_sys_ioctl+0x7b/0x90 [ 283.437909][T12706] do_syscall_64+0x31/0x40 [ 283.442317][T12706] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 283.448197][T12706] RIP: 0033:0x7f998388d6c9 [ 283.452735][T12706] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 283.472430][T12706] RSP: 002b:00007f99822f5038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 283.480845][T12706] RAX: ffffffffffffffda RBX: 00007f9983ae3fa0 RCX: 00007f998388d6c9 [ 283.488811][T12706] RDX: 0000200000000180 RSI: 0000000040047451 RDI: 0000000000000005 [ 283.496773][T12706] RBP: 00007f99822f5090 R08: 0000000000000000 R09: 0000000000000000 [ 283.504734][T12706] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 283.512701][T12706] R13: 00007f9983ae4038 R14: 00007f9983ae3fa0 R15: 00007ffe4a30bae8 [ 283.693170][T12729] FAULT_INJECTION: forcing a failure. [ 283.693170][T12729] name failslab, interval 1, probability 0, space 0, times 0 [ 283.708721][T12729] CPU: 0 PID: 12729 Comm: syz.4.3826 Tainted: G W syzkaller #0 [ 283.717593][T12729] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 283.727649][T12729] Call Trace: [ 283.730954][T12729] __dump_stack+0x21/0x24 [ 283.735299][T12729] dump_stack_lvl+0x169/0x1d8 [ 283.739985][T12729] ? thaw_kernel_threads+0x220/0x220 [ 283.745273][T12729] ? show_regs_print_info+0x18/0x18 [ 283.750476][T12729] dump_stack+0x15/0x1c [ 283.754740][T12729] should_fail+0x3c1/0x510 [ 283.759165][T12729] ? __alloc_file+0x28/0x320 [ 283.764020][T12729] __should_failslab+0xa4/0xe0 [ 283.768787][T12729] should_failslab+0x9/0x20 [ 283.773389][T12729] kmem_cache_alloc+0x3d/0x2e0 [ 283.778150][T12729] __alloc_file+0x28/0x320 [ 283.782558][T12729] alloc_empty_file+0x97/0x180 [ 283.787399][T12729] path_openat+0xf2/0x3160 [ 283.791905][T12729] ? __kasan_slab_alloc+0xcf/0xf0 [ 283.796939][T12729] ? __kasan_slab_alloc+0xbd/0xf0 [ 283.801950][T12729] ? kmem_cache_alloc+0x165/0x2e0 [ 283.806962][T12729] ? getname_flags+0xb9/0x500 [ 283.811625][T12729] ? getname+0x19/0x20 [ 283.815683][T12729] ? __x64_sys_openat+0x136/0x160 [ 283.820701][T12729] ? do_syscall_64+0x31/0x40 [ 283.825280][T12729] ? entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 283.831385][T12729] ? do_filp_open+0x3e0/0x3e0 [ 283.836065][T12729] ? expand_files+0xde/0x8e0 [ 283.840640][T12729] do_filp_open+0x1b3/0x3e0 [ 283.845127][T12729] ? vfs_tmpfile+0x2c0/0x2c0 [ 283.849723][T12729] ? get_unused_fd_flags+0x92/0xa0 [ 283.854846][T12729] do_sys_openat2+0x14c/0x6d0 [ 283.859524][T12729] ? __kasan_check_write+0x14/0x20 [ 283.864640][T12729] ? fput_many+0x15a/0x1a0 [ 283.869043][T12729] ? do_sys_open+0xe0/0xe0 [ 283.873461][T12729] ? fput+0x1a/0x20 [ 283.877257][T12729] ? ksys_write+0x1eb/0x240 [ 283.881740][T12729] ? __ia32_sys_read+0x90/0x90 [ 283.886515][T12729] __x64_sys_openat+0x136/0x160 [ 283.891406][T12729] do_syscall_64+0x31/0x40 [ 283.895841][T12729] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 283.901732][T12729] RIP: 0033:0x7f2758d2f6c9 [ 283.906144][T12729] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 283.925835][T12729] RSP: 002b:00007f2757797038 EFLAGS: 00000246 ORIG_RAX: 0000000000000101 [ 283.934237][T12729] RAX: ffffffffffffffda RBX: 00007f2758f85fa0 RCX: 00007f2758d2f6c9 [ 283.942197][T12729] RDX: 00000000000026e1 RSI: 0000200000000140 RDI: ffffffffffffff9c [ 283.950152][T12729] RBP: 00007f2757797090 R08: 0000000000000000 R09: 0000000000000000 [ 283.958107][T12729] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 283.966064][T12729] R13: 00007f2758f86038 R14: 00007f2758f85fa0 R15: 00007ffc8fdfe228 [ 284.466465][T12764] FAULT_INJECTION: forcing a failure. [ 284.466465][T12764] name failslab, interval 1, probability 0, space 0, times 0 [ 284.493053][T12764] CPU: 0 PID: 12764 Comm: syz.0.3840 Tainted: G W syzkaller #0 [ 284.502017][T12764] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 284.512066][T12764] Call Trace: [ 284.515351][T12764] __dump_stack+0x21/0x24 [ 284.519670][T12764] dump_stack_lvl+0x169/0x1d8 [ 284.524367][T12764] ? show_regs_print_info+0x18/0x18 [ 284.529572][T12764] dump_stack+0x15/0x1c [ 284.533731][T12764] should_fail+0x3c1/0x510 [ 284.538156][T12764] ? security_file_alloc+0x33/0x120 [ 284.543362][T12764] __should_failslab+0xa4/0xe0 [ 284.548122][T12764] should_failslab+0x9/0x20 [ 284.552626][T12764] kmem_cache_alloc+0x3d/0x2e0 [ 284.557383][T12764] ? __alloc_file+0x28/0x320 [ 284.561967][T12764] security_file_alloc+0x33/0x120 [ 284.566986][T12764] __alloc_file+0xb5/0x320 [ 284.571392][T12764] alloc_empty_file+0x97/0x180 [ 284.576148][T12764] path_openat+0xf2/0x3160 [ 284.580552][T12764] ? __kasan_slab_alloc+0xcf/0xf0 [ 284.585561][T12764] ? __kasan_slab_alloc+0xbd/0xf0 [ 284.590571][T12764] ? kmem_cache_alloc+0x165/0x2e0 [ 284.595581][T12764] ? getname_flags+0xb9/0x500 [ 284.600263][T12764] ? getname+0x19/0x20 [ 284.604344][T12764] ? __x64_sys_openat+0x136/0x160 [ 284.609420][T12764] ? do_syscall_64+0x31/0x40 [ 284.614008][T12764] ? entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 284.620073][T12764] ? do_filp_open+0x3e0/0x3e0 [ 284.624746][T12764] ? expand_files+0xde/0x8e0 [ 284.629367][T12764] do_filp_open+0x1b3/0x3e0 [ 284.633868][T12764] ? vfs_tmpfile+0x2c0/0x2c0 [ 284.638456][T12764] ? get_unused_fd_flags+0x92/0xa0 [ 284.643555][T12764] do_sys_openat2+0x14c/0x6d0 [ 284.648223][T12764] ? __kasan_check_write+0x14/0x20 [ 284.653323][T12764] ? fput_many+0x15a/0x1a0 [ 284.657727][T12764] ? do_sys_open+0xe0/0xe0 [ 284.662136][T12764] ? fput+0x1a/0x20 [ 284.665930][T12764] ? ksys_write+0x1eb/0x240 [ 284.670538][T12764] ? __ia32_sys_read+0x90/0x90 [ 284.675300][T12764] __x64_sys_openat+0x136/0x160 [ 284.680151][T12764] do_syscall_64+0x31/0x40 [ 284.684705][T12764] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 284.690596][T12764] RIP: 0033:0x7f998388d6c9 [ 284.695008][T12764] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 284.714606][T12764] RSP: 002b:00007f99822f5038 EFLAGS: 00000246 ORIG_RAX: 0000000000000101 [ 284.723013][T12764] RAX: ffffffffffffffda RBX: 00007f9983ae3fa0 RCX: 00007f998388d6c9 [ 284.730974][T12764] RDX: 00000000000026e1 RSI: 0000200000000140 RDI: ffffffffffffff9c [ 284.738939][T12764] RBP: 00007f99822f5090 R08: 0000000000000000 R09: 0000000000000000 [ 284.746902][T12764] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 284.754861][T12764] R13: 00007f9983ae4038 R14: 00007f9983ae3fa0 R15: 00007ffe4a30bae8 [ 284.803917][T12769] FAULT_INJECTION: forcing a failure. [ 284.803917][T12769] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 284.949148][T12769] CPU: 1 PID: 12769 Comm: syz.3.3843 Tainted: G W syzkaller #0 [ 284.958211][T12769] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 284.968383][T12769] Call Trace: [ 284.971678][T12769] __dump_stack+0x21/0x24 [ 284.976106][T12769] dump_stack_lvl+0x169/0x1d8 [ 284.980874][T12769] ? show_regs_print_info+0x18/0x18 [ 284.986071][T12769] ? __stack_depot_save+0x1c0/0x4c0 [ 284.991269][T12769] ? __kasan_slab_free+0x11/0x20 [ 284.996205][T12769] dump_stack+0x15/0x1c [ 285.000356][T12769] should_fail+0x3c1/0x510 [ 285.004864][T12769] should_fail_alloc_page+0x4f/0x60 [ 285.010064][T12769] __alloc_pages_nodemask+0x109/0x5f0 [ 285.015530][T12769] ? gfp_pfmemalloc_allowed+0x130/0x130 [ 285.021082][T12769] kmalloc_order+0x4c/0x160 [ 285.025597][T12769] kmalloc_order_trace+0x16/0x80 [ 285.030533][T12769] __kmalloc+0x1ee/0x330 [ 285.034775][T12769] ? __kasan_check_write+0x14/0x20 [ 285.039897][T12769] ? slhc_init+0xb0/0x770 [ 285.044234][T12769] slhc_init+0x160/0x770 [ 285.048571][T12769] ppp_ioctl+0x1167/0x1550 [ 285.052988][T12769] ? ppp_poll+0x250/0x250 [ 285.057322][T12769] ? __fget_files+0x2c4/0x320 [ 285.061999][T12769] ? security_file_ioctl+0x84/0xa0 [ 285.067105][T12769] ? ppp_poll+0x250/0x250 [ 285.071431][T12769] __se_sys_ioctl+0x121/0x1a0 [ 285.076106][T12769] __x64_sys_ioctl+0x7b/0x90 [ 285.080701][T12769] do_syscall_64+0x31/0x40 [ 285.085120][T12769] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 285.091008][T12769] RIP: 0033:0x7fa4f24cd6c9 [ 285.095425][T12769] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 285.115118][T12769] RSP: 002b:00007fa4f0f35038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 285.123542][T12769] RAX: ffffffffffffffda RBX: 00007fa4f2723fa0 RCX: 00007fa4f24cd6c9 [ 285.131521][T12769] RDX: 0000200000000180 RSI: 0000000040047451 RDI: 0000000000000005 [ 285.139493][T12769] RBP: 00007fa4f0f35090 R08: 0000000000000000 R09: 0000000000000000 [ 285.147473][T12769] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 285.155442][T12769] R13: 00007fa4f2724038 R14: 00007fa4f2723fa0 R15: 00007ffd57957708 [ 285.580166][T12796] device sit0 entered promiscuous mode [ 285.980010][T12811] FAULT_INJECTION: forcing a failure. [ 285.980010][T12811] name failslab, interval 1, probability 0, space 0, times 0 [ 285.992817][T12811] CPU: 0 PID: 12811 Comm: syz.3.3855 Tainted: G W syzkaller #0 [ 286.001658][T12811] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 286.011707][T12811] Call Trace: [ 286.015003][T12811] __dump_stack+0x21/0x24 [ 286.019334][T12811] dump_stack_lvl+0x169/0x1d8 [ 286.024014][T12811] ? show_regs_print_info+0x18/0x18 [ 286.029312][T12811] ? avc_has_perm_noaudit+0x158/0x240 [ 286.034683][T12811] ? avc_denied+0x1b0/0x1b0 [ 286.039194][T12811] dump_stack+0x15/0x1c [ 286.043520][T12811] should_fail+0x3c1/0x510 [ 286.047932][T12811] ? __d_alloc+0x2d/0x6a0 [ 286.052263][T12811] __should_failslab+0xa4/0xe0 [ 286.057026][T12811] should_failslab+0x9/0x20 [ 286.061529][T12811] kmem_cache_alloc+0x3d/0x2e0 [ 286.066291][T12811] __d_alloc+0x2d/0x6a0 [ 286.070441][T12811] d_alloc_parallel+0xd6/0x1320 [ 286.075298][T12811] ? security_inode_permission+0xb0/0x100 [ 286.081032][T12811] ? inode_permission+0xf1/0x520 [ 286.085978][T12811] ? link_path_walk+0x915/0xb80 [ 286.090838][T12811] ? d_hash_and_lookup+0x1f0/0x1f0 [ 286.096034][T12811] ? __kasan_check_write+0x14/0x20 [ 286.101153][T12811] ? down_read_killable+0xe0/0xe0 [ 286.106193][T12811] path_openat+0x9fe/0x3160 [ 286.110738][T12811] ? getname+0x19/0x20 [ 286.114831][T12811] ? do_filp_open+0x3e0/0x3e0 [ 286.119509][T12811] ? expand_files+0xde/0x8e0 [ 286.124101][T12811] do_filp_open+0x1b3/0x3e0 [ 286.128613][T12811] ? vfs_tmpfile+0x2c0/0x2c0 [ 286.133211][T12811] ? get_unused_fd_flags+0x92/0xa0 [ 286.138322][T12811] do_sys_openat2+0x14c/0x6d0 [ 286.143004][T12811] ? __kasan_check_write+0x14/0x20 [ 286.148115][T12811] ? fput_many+0x15a/0x1a0 [ 286.152527][T12811] ? do_sys_open+0xe0/0xe0 [ 286.156932][T12811] ? fput+0x1a/0x20 [ 286.160731][T12811] ? ksys_write+0x1eb/0x240 [ 286.165230][T12811] ? __ia32_sys_read+0x90/0x90 [ 286.169990][T12811] __x64_sys_openat+0x136/0x160 [ 286.174832][T12811] do_syscall_64+0x31/0x40 [ 286.179239][T12811] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 286.185147][T12811] RIP: 0033:0x7fa4f24cd6c9 [ 286.189558][T12811] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 286.209157][T12811] RSP: 002b:00007fa4f0f35038 EFLAGS: 00000246 ORIG_RAX: 0000000000000101 [ 286.217561][T12811] RAX: ffffffffffffffda RBX: 00007fa4f2723fa0 RCX: 00007fa4f24cd6c9 [ 286.225531][T12811] RDX: 00000000000026e1 RSI: 0000200000000140 RDI: ffffffffffffff9c [ 286.233609][T12811] RBP: 00007fa4f0f35090 R08: 0000000000000000 R09: 0000000000000000 [ 286.241567][T12811] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 286.249548][T12811] R13: 00007fa4f2724038 R14: 00007fa4f2723fa0 R15: 00007ffd57957708 [ 286.334062][T12824] device veth0_vlan left promiscuous mode [ 286.363904][T12824] device veth0_vlan entered promiscuous mode [ 286.419856][T12826] FAULT_INJECTION: forcing a failure. [ 286.419856][T12826] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 286.472151][T12826] CPU: 0 PID: 12826 Comm: syz.4.3861 Tainted: G W syzkaller #0 [ 286.481024][T12826] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 286.491095][T12826] Call Trace: [ 286.494399][T12826] __dump_stack+0x21/0x24 [ 286.498730][T12826] dump_stack_lvl+0x169/0x1d8 [ 286.503419][T12826] ? thaw_kernel_threads+0x220/0x220 [ 286.508710][T12826] ? vsnprintf+0x1871/0x1960 [ 286.513310][T12826] ? show_regs_print_info+0x18/0x18 [ 286.518516][T12826] dump_stack+0x15/0x1c [ 286.522682][T12826] should_fail+0x3c1/0x510 [ 286.527104][T12826] should_fail_usercopy+0x1a/0x20 [ 286.532146][T12826] _copy_to_user+0x20/0x90 [ 286.536568][T12826] simple_read_from_buffer+0xe9/0x160 [ 286.541943][T12826] proc_fail_nth_read+0x19a/0x210 [ 286.546971][T12826] ? proc_fault_inject_write+0x2f0/0x2f0 [ 286.552608][T12826] ? rw_verify_area+0x1c0/0x360 [ 286.557456][T12826] ? proc_fault_inject_write+0x2f0/0x2f0 [ 286.563095][T12826] vfs_read+0x1fe/0xa10 [ 286.567267][T12826] ? __kasan_check_write+0x14/0x20 [ 286.572381][T12826] ? kernel_read+0x70/0x70 [ 286.576801][T12826] ? __kasan_check_write+0x14/0x20 [ 286.581920][T12826] ? mutex_lock+0x8c/0xe0 [ 286.586259][T12826] ? mutex_trylock+0xa0/0xa0 [ 286.590849][T12826] ? __fget_files+0x2c4/0x320 [ 286.595536][T12826] ? __fdget_pos+0x2d2/0x380 [ 286.600248][T12826] ? ksys_read+0x71/0x240 [ 286.604581][T12826] ksys_read+0x140/0x240 [ 286.608832][T12826] ? vfs_write+0xd60/0xd60 [ 286.613254][T12826] ? debug_smp_processor_id+0x17/0x20 [ 286.618631][T12826] __x64_sys_read+0x7b/0x90 [ 286.623141][T12826] do_syscall_64+0x31/0x40 [ 286.627563][T12826] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 286.633632][T12826] RIP: 0033:0x7f2758d2e0dc [ 286.638055][T12826] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 93 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 ef 93 02 00 48 [ 286.657886][T12826] RSP: 002b:00007f2757797030 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 286.666443][T12826] RAX: ffffffffffffffda RBX: 00007f2758f85fa0 RCX: 00007f2758d2e0dc [ 286.674425][T12826] RDX: 000000000000000f RSI: 00007f27577970a0 RDI: 0000000000000006 [ 286.682408][T12826] RBP: 00007f2757797090 R08: 0000000000000000 R09: 0000000000000000 [ 286.690391][T12826] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 286.698370][T12826] R13: 00007f2758f86038 R14: 00007f2758f85fa0 R15: 00007ffc8fdfe228 [ 287.509938][T12879] device pim6reg1 entered promiscuous mode [ 287.588310][T12881] device pim6reg1 entered promiscuous mode [ 289.365979][T12933] device wg2 left promiscuous mode [ 289.557819][T12939] device syzkaller0 entered promiscuous mode [ 289.920331][T12958] device pim6reg1 entered promiscuous mode [ 290.048800][T12963] device sit0 entered promiscuous mode [ 290.447587][T12987] device sit0 left promiscuous mode [ 290.676468][T12990] device sit0 entered promiscuous mode [ 292.072381][T13047] device sit0 entered promiscuous mode [ 293.426531][T13149] FAULT_INJECTION: forcing a failure. [ 293.426531][T13149] name failslab, interval 1, probability 0, space 0, times 0 [ 293.462778][T13149] CPU: 0 PID: 13149 Comm: syz.4.3958 Tainted: G W syzkaller #0 [ 293.471745][T13149] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 293.481825][T13149] Call Trace: [ 293.485130][T13149] __dump_stack+0x21/0x24 [ 293.489474][T13149] dump_stack_lvl+0x169/0x1d8 [ 293.494145][T13149] ? show_regs_print_info+0x18/0x18 [ 293.499335][T13149] ? sidtab_sid2str_get+0x1b2/0x2c0 [ 293.504528][T13149] dump_stack+0x15/0x1c [ 293.508676][T13149] should_fail+0x3c1/0x510 [ 293.513105][T13149] ? kvmalloc_node+0x88/0x130 [ 293.517771][T13149] __should_failslab+0xa4/0xe0 [ 293.522614][T13149] should_failslab+0x9/0x20 [ 293.527113][T13149] __kmalloc+0x60/0x330 [ 293.531270][T13149] kvmalloc_node+0x88/0x130 [ 293.535765][T13149] simple_xattr_alloc+0x43/0xa0 [ 293.540608][T13149] shmem_initxattrs+0x8d/0x1e0 [ 293.545362][T13149] security_inode_init_security+0x254/0x370 [ 293.551263][T13149] ? shmem_tmpfile+0x100/0x100 [ 293.556029][T13149] ? security_dentry_create_files_as+0xc0/0xc0 [ 293.562272][T13149] ? __kasan_check_write+0x14/0x20 [ 293.567375][T13149] ? set_cached_acl+0xdd/0x180 [ 293.572129][T13149] ? simple_acl_create+0x191/0x1c0 [ 293.577250][T13149] shmem_mknod+0xbb/0x1c0 [ 293.581573][T13149] shmem_create+0x2b/0x40 [ 293.585980][T13149] ? shmem_fallocate+0xc20/0xc20 [ 293.590916][T13149] path_openat+0x16e3/0x3160 [ 293.595501][T13149] ? do_filp_open+0x3e0/0x3e0 [ 293.600167][T13149] ? expand_files+0xde/0x8e0 [ 293.604749][T13149] do_filp_open+0x1b3/0x3e0 [ 293.609244][T13149] ? vfs_tmpfile+0x2c0/0x2c0 [ 293.613829][T13149] ? get_unused_fd_flags+0x92/0xa0 [ 293.618929][T13149] do_sys_openat2+0x14c/0x6d0 [ 293.623599][T13149] ? __kasan_check_write+0x14/0x20 [ 293.628713][T13149] ? fput_many+0x15a/0x1a0 [ 293.633128][T13149] ? do_sys_open+0xe0/0xe0 [ 293.637542][T13149] ? fput+0x1a/0x20 [ 293.641349][T13149] ? ksys_write+0x1eb/0x240 [ 293.645858][T13149] ? __ia32_sys_read+0x90/0x90 [ 293.650704][T13149] __x64_sys_openat+0x136/0x160 [ 293.655632][T13149] do_syscall_64+0x31/0x40 [ 293.660071][T13149] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 293.666011][T13149] RIP: 0033:0x7f2758d2f6c9 [ 293.670436][T13149] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 293.690130][T13149] RSP: 002b:00007f2757797038 EFLAGS: 00000246 ORIG_RAX: 0000000000000101 [ 293.698539][T13149] RAX: ffffffffffffffda RBX: 00007f2758f85fa0 RCX: 00007f2758d2f6c9 [ 293.706504][T13149] RDX: 00000000000026e1 RSI: 0000200000000140 RDI: ffffffffffffff9c [ 293.714484][T13149] RBP: 00007f2757797090 R08: 0000000000000000 R09: 0000000000000000 [ 293.722574][T13149] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 293.730557][T13149] R13: 00007f2758f86038 R14: 00007f2758f85fa0 R15: 00007ffc8fdfe228 [ 294.123062][ T24] audit: type=1400 audit(1763398377.560:163): avc: denied { create } for pid=13164 comm="syz.4.3965" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_connector_socket permissive=1 [ 294.631765][T13210] device sit0 left promiscuous mode [ 294.798449][ T24] audit: type=1400 audit(1763398378.230:164): avc: denied { create } for pid=13215 comm="syz.0.3981" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_scsitransport_socket permissive=1 [ 294.911996][T13224] device sit0 entered promiscuous mode [ 295.643761][T13267] device wg2 left promiscuous mode [ 296.290464][T13294] device syzkaller0 entered promiscuous mode [ 297.339440][T13333] FAULT_INJECTION: forcing a failure. [ 297.339440][T13333] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 297.409163][T13333] CPU: 1 PID: 13333 Comm: syz.0.4014 Tainted: G W syzkaller #0 [ 297.418032][T13333] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 297.428191][T13333] Call Trace: [ 297.431501][T13333] __dump_stack+0x21/0x24 [ 297.435824][T13333] dump_stack_lvl+0x169/0x1d8 [ 297.440489][T13333] ? thaw_kernel_threads+0x220/0x220 [ 297.445765][T13333] ? vsnprintf+0x1871/0x1960 [ 297.450351][T13333] ? show_regs_print_info+0x18/0x18 [ 297.455538][T13333] dump_stack+0x15/0x1c [ 297.459691][T13333] should_fail+0x3c1/0x510 [ 297.464097][T13333] should_fail_usercopy+0x1a/0x20 [ 297.469118][T13333] _copy_to_user+0x20/0x90 [ 297.473526][T13333] simple_read_from_buffer+0xe9/0x160 [ 297.478883][T13333] proc_fail_nth_read+0x19a/0x210 [ 297.483897][T13333] ? proc_fault_inject_write+0x2f0/0x2f0 [ 297.489520][T13333] ? rw_verify_area+0x1c0/0x360 [ 297.494360][T13333] ? proc_fault_inject_write+0x2f0/0x2f0 [ 297.499980][T13333] vfs_read+0x1fe/0xa10 [ 297.504127][T13333] ? kernel_read+0x70/0x70 [ 297.508538][T13333] ? __kasan_check_write+0x14/0x20 [ 297.513636][T13333] ? mutex_lock+0x8c/0xe0 [ 297.517960][T13333] ? mutex_trylock+0xa0/0xa0 [ 297.522545][T13333] ? __fget_files+0x2c4/0x320 [ 297.527218][T13333] ? __fdget_pos+0x2d2/0x380 [ 297.531893][T13333] ? ksys_read+0x71/0x240 [ 297.536215][T13333] ksys_read+0x140/0x240 [ 297.540444][T13333] ? vfs_write+0xd60/0xd60 [ 297.544848][T13333] ? debug_smp_processor_id+0x17/0x20 [ 297.550212][T13333] __x64_sys_read+0x7b/0x90 [ 297.554702][T13333] do_syscall_64+0x31/0x40 [ 297.559108][T13333] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 297.564988][T13333] RIP: 0033:0x7f998388c0dc [ 297.569397][T13333] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 93 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 ef 93 02 00 48 [ 297.589117][T13333] RSP: 002b:00007f99822f5030 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 297.597533][T13333] RAX: ffffffffffffffda RBX: 00007f9983ae3fa0 RCX: 00007f998388c0dc [ 297.605503][T13333] RDX: 000000000000000f RSI: 00007f99822f50a0 RDI: 0000000000000006 [ 297.613553][T13333] RBP: 00007f99822f5090 R08: 0000000000000000 R09: 0000000000000000 [ 297.621515][T13333] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 297.629484][T13333] R13: 00007f9983ae4038 R14: 00007f9983ae3fa0 R15: 00007ffe4a30bae8 [ 298.368952][ T24] audit: type=1400 audit(1763398381.800:165): avc: denied { create } for pid=13347 comm="syz.0.4020" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=irda_socket permissive=1 [ 301.897793][ T24] audit: type=1400 audit(1763398385.330:166): avc: denied { create } for pid=13493 comm="syz.3.4065" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 303.048226][T13530] device syzkaller0 entered promiscuous mode [ 305.828758][T13680] ÿÿÿÿÿÿ: renamed from vlan1 [ 307.279959][T13718] device syzkaller0 entered promiscuous mode [ 308.485350][T13816] device syzkaller0 entered promiscuous mode [ 310.165157][T13900] device wg2 left promiscuous mode [ 310.432189][T13908] device veth1_to_team entered promiscuous mode [ 311.587479][T13977] device pim6reg1 entered promiscuous mode [ 312.244304][T14002] device sit0 left promiscuous mode [ 312.342877][T14002] device sit0 entered promiscuous mode [ 313.019277][T14043] device sit0 left promiscuous mode [ 313.896618][T14079] device veth1_macvtap left promiscuous mode [ 313.906497][T14079] device veth1_macvtap entered promiscuous mode [ 313.914686][T14079] device macsec0 entered promiscuous mode [ 314.091573][T14091] device sit0 left promiscuous mode [ 317.599863][T14265] gretap0: refused to change device tx_queue_len [ 318.874393][T14347] device veth1_macvtap left promiscuous mode [ 318.925746][T14348] device veth1_macvtap entered promiscuous mode [ 319.013952][T14348] device macsec0 entered promiscuous mode [ 319.246544][T14358] device sit0 left promiscuous mode [ 319.293821][T14361] device sit0 entered promiscuous mode [ 320.197829][T14393] device sit0 entered promiscuous mode [ 320.820311][T14444] device syzkaller0 entered promiscuous mode [ 321.082453][T14463] device wg2 left promiscuous mode [ 321.095786][T14463] device veth1_to_team entered promiscuous mode [ 322.767378][T14587] device syzkaller0 entered promiscuous mode [ 323.619660][T14633] syz.0.4393[14633] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 323.619719][T14633] syz.0.4393[14633] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 323.704258][T14634] device pim6reg1 entered promiscuous mode [ 323.944171][T14653] syzkaller0: tun_chr_ioctl cmd 1074025677 [ 323.950225][T14653] syzkaller0: linktype set to 0 [ 328.979614][T14854] device sit0 left promiscuous mode [ 328.991278][T14857] device sit0 entered promiscuous mode [ 330.544841][T14946] device sit0 entered promiscuous mode [ 331.639437][T14993] device syzkaller0 entered promiscuous mode [ 333.408487][T15097] device syzkaller0 entered promiscuous mode [ 333.851407][T15128] device sit0 left promiscuous mode [ 333.966226][T15129] device sit0 entered promiscuous mode [ 336.411947][T15245] FAULT_INJECTION: forcing a failure. [ 336.411947][T15245] name failslab, interval 1, probability 0, space 0, times 0 [ 336.519314][T15245] CPU: 1 PID: 15245 Comm: syz.2.4565 Tainted: G W syzkaller #0 [ 336.528204][T15245] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 336.538272][T15245] Call Trace: [ 336.541924][T15245] __dump_stack+0x21/0x24 [ 336.546276][T15245] dump_stack_lvl+0x169/0x1d8 [ 336.550970][T15245] ? thaw_kernel_threads+0x220/0x220 [ 336.556377][T15245] ? show_regs_print_info+0x18/0x18 [ 336.561585][T15245] ? slab_post_alloc_hook+0x5d/0x2f0 [ 336.566880][T15245] ? security_inode_alloc+0x33/0x110 [ 336.572165][T15245] ? inode_init_always+0x70a/0x9b0 [ 336.577270][T15245] ? new_inode_pseudo+0x91/0x210 [ 336.582210][T15245] ? proc_pid_make_inode+0x27/0x1d0 [ 336.587504][T15245] ? proc_pident_instantiate+0x69/0x2b0 [ 336.593051][T15245] ? proc_pident_lookup+0x1c0/0x270 [ 336.598354][T15245] dump_stack+0x15/0x1c [ 336.602605][T15245] should_fail+0x3c1/0x510 [ 336.607112][T15245] ? __alloc_skb+0x9e/0x520 [ 336.611625][T15245] __should_failslab+0xa4/0xe0 [ 336.616527][T15245] should_failslab+0x9/0x20 [ 336.621123][T15245] kmem_cache_alloc+0x3d/0x2e0 [ 336.625897][T15245] __alloc_skb+0x9e/0x520 [ 336.630231][T15245] alloc_skb_with_frags+0xa2/0x560 [ 336.635358][T15245] sock_alloc_send_pskb+0x853/0x980 [ 336.640575][T15245] ? sock_kzfree_s+0x60/0x60 [ 336.645191][T15245] ? __kasan_check_write+0x14/0x20 [ 336.650397][T15245] ? _raw_spin_lock+0x8e/0xe0 [ 336.655169][T15245] ? _raw_spin_trylock_bh+0x130/0x130 [ 336.660547][T15245] ? security_socket_getpeersec_dgram+0x93/0xb0 [ 336.666790][T15245] unix_dgram_sendmsg+0x5f4/0x17d0 [ 336.671958][T15245] ? selinux_socket_accept+0x500/0x500 [ 336.677456][T15245] ? stack_trace_snprint+0xf0/0xf0 [ 336.682581][T15245] ? unix_dgram_poll+0x620/0x620 [ 336.687525][T15245] ? kasan_set_track+0x5b/0x70 [ 336.692316][T15245] ? kasan_set_track+0x4a/0x70 [ 336.697199][T15245] ? security_socket_sendmsg+0x82/0xa0 [ 336.702680][T15245] ? unix_dgram_poll+0x620/0x620 [ 336.707706][T15245] ____sys_sendmsg+0x5a2/0x8c0 [ 336.712475][T15245] ? __sys_sendmsg_sock+0x40/0x40 [ 336.717501][T15245] ? import_iovec+0x7c/0xb0 [ 336.722002][T15245] ___sys_sendmsg+0x1f0/0x260 [ 336.726681][T15245] ? __sys_sendmsg+0x250/0x250 [ 336.731446][T15245] ? rw_verify_area+0x1c0/0x360 [ 336.736311][T15245] ? __fdget+0x1a1/0x230 [ 336.740557][T15245] __x64_sys_sendmsg+0x1e2/0x2a0 [ 336.745494][T15245] ? fput+0x1a/0x20 [ 336.749306][T15245] ? ___sys_sendmsg+0x260/0x260 [ 336.754166][T15245] ? debug_smp_processor_id+0x17/0x20 [ 336.759540][T15245] ? fpregs_assert_state_consistent+0xb1/0xe0 [ 336.765610][T15245] ? exit_to_user_mode_prepare+0x2f/0xa0 [ 336.771314][T15245] do_syscall_64+0x31/0x40 [ 336.775734][T15245] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 336.781625][T15245] RIP: 0033:0x7f5e149c16c9 [ 336.786037][T15245] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 336.805640][T15245] RSP: 002b:00007f5e13429038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 336.814045][T15245] RAX: ffffffffffffffda RBX: 00007f5e14c17fa0 RCX: 00007f5e149c16c9 [ 336.822006][T15245] RDX: 0000000000000000 RSI: 0000200000000b40 RDI: 0000000000000007 [ 336.829970][T15245] RBP: 00007f5e13429090 R08: 0000000000000000 R09: 0000000000000000 [ 336.837932][T15245] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 336.845982][T15245] R13: 00007f5e14c18038 R14: 00007f5e14c17fa0 R15: 00007ffc65f2b498 [ 337.112295][T15266] device pim6reg1 entered promiscuous mode [ 337.341662][T15291] FAULT_INJECTION: forcing a failure. [ 337.341662][T15291] name failslab, interval 1, probability 0, space 0, times 0 [ 337.364513][T15291] CPU: 1 PID: 15291 Comm: syz.4.4578 Tainted: G W syzkaller #0 [ 337.373480][T15291] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 337.383543][T15291] Call Trace: [ 337.386831][T15291] __dump_stack+0x21/0x24 [ 337.391149][T15291] dump_stack_lvl+0x169/0x1d8 [ 337.395816][T15291] ? show_regs_print_info+0x18/0x18 [ 337.401011][T15291] dump_stack+0x15/0x1c [ 337.405151][T15291] should_fail+0x3c1/0x510 [ 337.409553][T15291] ? alloc_skb_with_frags+0xa2/0x560 [ 337.414845][T15291] __should_failslab+0xa4/0xe0 [ 337.419595][T15291] should_failslab+0x9/0x20 [ 337.424087][T15291] __kmalloc_track_caller+0x5f/0x320 [ 337.429362][T15291] ? kmem_cache_alloc+0x165/0x2e0 [ 337.434379][T15291] ? __alloc_skb+0x9e/0x520 [ 337.438870][T15291] ? alloc_skb_with_frags+0xa2/0x560 [ 337.444147][T15291] __alloc_skb+0xdc/0x520 [ 337.448493][T15291] alloc_skb_with_frags+0xa2/0x560 [ 337.453596][T15291] sock_alloc_send_pskb+0x853/0x980 [ 337.458784][T15291] ? sock_kzfree_s+0x60/0x60 [ 337.463366][T15291] ? __kasan_check_write+0x14/0x20 [ 337.468567][T15291] ? _raw_spin_lock+0x8e/0xe0 [ 337.473233][T15291] ? _raw_spin_trylock_bh+0x130/0x130 [ 337.478788][T15291] ? security_socket_getpeersec_dgram+0x93/0xb0 [ 337.485109][T15291] unix_dgram_sendmsg+0x5f4/0x17d0 [ 337.490214][T15291] ? selinux_socket_accept+0x500/0x500 [ 337.495719][T15291] ? stack_trace_snprint+0xf0/0xf0 [ 337.501024][T15291] ? unix_dgram_poll+0x620/0x620 [ 337.505952][T15291] ? kasan_set_track+0x5b/0x70 [ 337.510707][T15291] ? kasan_set_track+0x4a/0x70 [ 337.515458][T15291] ? security_socket_sendmsg+0x82/0xa0 [ 337.521169][T15291] ? unix_dgram_poll+0x620/0x620 [ 337.526095][T15291] ____sys_sendmsg+0x5a2/0x8c0 [ 337.530849][T15291] ? __sys_sendmsg_sock+0x40/0x40 [ 337.535866][T15291] ? import_iovec+0x7c/0xb0 [ 337.540361][T15291] ___sys_sendmsg+0x1f0/0x260 [ 337.545026][T15291] ? __sys_sendmsg+0x250/0x250 [ 337.549780][T15291] ? rw_verify_area+0x1c0/0x360 [ 337.554625][T15291] ? __fdget+0x1a1/0x230 [ 337.559032][T15291] __x64_sys_sendmsg+0x1e2/0x2a0 [ 337.563956][T15291] ? fput+0x1a/0x20 [ 337.567753][T15291] ? ___sys_sendmsg+0x260/0x260 [ 337.572597][T15291] ? debug_smp_processor_id+0x17/0x20 [ 337.577969][T15291] ? fpregs_assert_state_consistent+0xb1/0xe0 [ 337.584024][T15291] ? exit_to_user_mode_prepare+0x2f/0xa0 [ 337.589644][T15291] do_syscall_64+0x31/0x40 [ 337.594075][T15291] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 337.599976][T15291] RIP: 0033:0x7f2758d2f6c9 [ 337.604511][T15291] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 337.624384][T15291] RSP: 002b:00007f2757797038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 337.632803][T15291] RAX: ffffffffffffffda RBX: 00007f2758f85fa0 RCX: 00007f2758d2f6c9 [ 337.640779][T15291] RDX: 0000000000000000 RSI: 0000200000000b40 RDI: 0000000000000007 [ 337.648828][T15291] RBP: 00007f2757797090 R08: 0000000000000000 R09: 0000000000000000 [ 337.656878][T15291] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 337.664897][T15291] R13: 00007f2758f86038 R14: 00007f2758f85fa0 R15: 00007ffc8fdfe228 [ 337.725368][T15294] device pim6reg1 entered promiscuous mode [ 338.166902][T15318] device pim6reg1 entered promiscuous mode [ 338.223631][T15333] FAULT_INJECTION: forcing a failure. [ 338.223631][T15333] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 338.342352][T15333] CPU: 1 PID: 15333 Comm: syz.1.4593 Tainted: G W syzkaller #0 [ 338.351315][T15333] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 338.361368][T15333] Call Trace: [ 338.364691][T15333] __dump_stack+0x21/0x24 [ 338.369033][T15333] dump_stack_lvl+0x169/0x1d8 [ 338.373823][T15333] ? thaw_kernel_threads+0x220/0x220 [ 338.379102][T15333] ? vsnprintf+0x1871/0x1960 [ 338.383688][T15333] ? show_regs_print_info+0x18/0x18 [ 338.388891][T15333] dump_stack+0x15/0x1c [ 338.393132][T15333] should_fail+0x3c1/0x510 [ 338.397541][T15333] should_fail_usercopy+0x1a/0x20 [ 338.402565][T15333] _copy_to_user+0x20/0x90 [ 338.406976][T15333] simple_read_from_buffer+0xe9/0x160 [ 338.412485][T15333] proc_fail_nth_read+0x19a/0x210 [ 338.417519][T15333] ? proc_fault_inject_write+0x2f0/0x2f0 [ 338.423190][T15333] ? rw_verify_area+0x1c0/0x360 [ 338.428060][T15333] ? proc_fault_inject_write+0x2f0/0x2f0 [ 338.433696][T15333] vfs_read+0x1fe/0xa10 [ 338.438025][T15333] ? kernel_read+0x70/0x70 [ 338.442444][T15333] ? __kasan_check_write+0x14/0x20 [ 338.447552][T15333] ? mutex_lock+0x8c/0xe0 [ 338.451880][T15333] ? mutex_trylock+0xa0/0xa0 [ 338.456467][T15333] ? __fget_files+0x2c4/0x320 [ 338.461229][T15333] ? __fdget_pos+0x2d2/0x380 [ 338.465819][T15333] ? ksys_read+0x71/0x240 [ 338.470171][T15333] ksys_read+0x140/0x240 [ 338.474413][T15333] ? vfs_write+0xd60/0xd60 [ 338.478835][T15333] ? debug_smp_processor_id+0x17/0x20 [ 338.484206][T15333] __x64_sys_read+0x7b/0x90 [ 338.488716][T15333] do_syscall_64+0x31/0x40 [ 338.493153][T15333] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 338.499048][T15333] RIP: 0033:0x7fcbe2e460dc [ 338.503470][T15333] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 93 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 ef 93 02 00 48 [ 338.523185][T15333] RSP: 002b:00007fcbe18af030 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 338.531610][T15333] RAX: ffffffffffffffda RBX: 00007fcbe309dfa0 RCX: 00007fcbe2e460dc [ 338.539592][T15333] RDX: 000000000000000f RSI: 00007fcbe18af0a0 RDI: 0000000000000006 [ 338.547564][T15333] RBP: 00007fcbe18af090 R08: 0000000000000000 R09: 0000000000000000 [ 338.555539][T15333] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 338.563595][T15333] R13: 00007fcbe309e038 R14: 00007fcbe309dfa0 R15: 00007ffe920d2488 [ 339.203059][T15394] syz.0.4608[15394] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 339.203135][T15394] syz.0.4608[15394] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 339.348193][T15408] device syzkaller0 entered promiscuous mode [ 339.565329][T15454] device veth1_macvtap left promiscuous mode [ 339.602278][T15454] device macsec0 left promiscuous mode [ 340.821484][T15557] device pim6reg1 entered promiscuous mode [ 341.868895][ T24] audit: type=1400 audit(1763398425.300:167): avc: denied { create } for pid=15595 comm="syz.1.4660" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=atmsvc_socket permissive=1 [ 341.936655][ T24] audit: type=1400 audit(1763398425.330:168): avc: denied { create } for pid=15595 comm="syz.1.4660" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=atmsvc_socket permissive=1 [ 343.127637][T15662] device pim6reg1 entered promiscuous mode [ 345.661377][T15787] device veth1_macvtap left promiscuous mode [ 348.335833][T15914] device syzkaller0 entered promiscuous mode [ 350.366068][T16003] device veth1_macvtap left promiscuous mode [ 350.392418][T16003] device macsec0 entered promiscuous mode [ 350.921048][T16037] device veth1_macvtap entered promiscuous mode [ 350.933898][T16037] device macsec0 entered promiscuous mode [ 350.944461][ T2931] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 351.012083][T16062] syz.3.4803[16062] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 351.012139][T16062] syz.3.4803[16062] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 351.076928][T16070] device sit0 left promiscuous mode [ 351.148964][T16070] device sit0 entered promiscuous mode [ 355.926662][T16270] device syzkaller0 entered promiscuous mode [ 356.101381][T16287] bridge0: port 2(bridge_slave_1) entered disabled state [ 356.109920][T16287] bridge0: port 1(bridge_slave_0) entered disabled state [ 356.210229][T16294] device bridge_slave_1 left promiscuous mode [ 356.237578][T16294] bridge0: port 2(bridge_slave_1) entered disabled state [ 356.320874][T16294] device bridge_slave_0 left promiscuous mode [ 356.359212][T16294] bridge0: port 1(bridge_slave_0) entered disabled state [ 357.917174][T16405] device pim6reg1 entered promiscuous mode [ 358.067125][T16416] device veth0_vlan left promiscuous mode [ 358.077432][T16416] device veth0_vlan entered promiscuous mode [ 358.091988][ T348] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 358.139550][ T348] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 358.181576][ T348] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 358.222802][T16426] syzkaller0: default qdisc (pfifo_fast) fail, fallback to noqueue [ 358.267947][T16426] device syzkaller0 entered promiscuous mode [ 358.490754][T16430] device wg2 left promiscuous mode [ 361.667962][T16624] device pim6reg1 entered promiscuous mode [ 364.936144][T16806] device syzkaller0 entered promiscuous mode [ 364.966670][T16811] device wg2 entered promiscuous mode [ 365.487904][T16830] device syzkaller0 entered promiscuous mode [ 366.580008][T16879] syz.0.5053[16879] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 366.580092][T16879] syz.0.5053[16879] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 368.006056][T16970] device pim6reg1 entered promiscuous mode [ 368.119720][T16982] bridge0: port 2(bridge_slave_1) entered disabled state [ 368.126915][T16982] bridge0: port 1(bridge_slave_0) entered disabled state [ 368.194270][T16982] device bridge_slave_1 left promiscuous mode [ 368.219779][T16982] bridge0: port 2(bridge_slave_1) entered disabled state [ 368.227645][T16982] device bridge_slave_0 left promiscuous mode [ 368.234901][T16982] bridge0: port 1(bridge_slave_0) entered disabled state [ 368.302077][T16992] device sit0 left promiscuous mode [ 368.327967][T16998] device sit0 entered promiscuous mode [ 368.592447][T17027] device pim6reg1 entered promiscuous mode [ 368.678193][T17030] device syzkaller0 entered promiscuous mode [ 369.461992][T17071] syzkaller0: default qdisc (pfifo_fast) fail, fallback to noqueue [ 369.508748][T17071] device syzkaller0 entered promiscuous mode [ 370.257330][T17116] device pim6reg1 entered promiscuous mode [ 370.542300][T17131] FAULT_INJECTION: forcing a failure. [ 370.542300][T17131] name failslab, interval 1, probability 0, space 0, times 0 [ 370.567979][T17131] CPU: 0 PID: 17131 Comm: syz.2.5128 Tainted: G W syzkaller #0 [ 370.576857][T17131] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 370.587115][T17131] Call Trace: [ 370.590425][T17131] __dump_stack+0x21/0x24 [ 370.594767][T17131] dump_stack_lvl+0x169/0x1d8 [ 370.599639][T17131] ? thaw_kernel_threads+0x220/0x220 [ 370.604932][T17131] ? show_regs_print_info+0x18/0x18 [ 370.610135][T17131] ? stack_trace_save+0x98/0xe0 [ 370.615004][T17131] ? stack_trace_snprint+0xf0/0xf0 [ 370.620121][T17131] dump_stack+0x15/0x1c [ 370.624290][T17131] should_fail+0x3c1/0x510 [ 370.628718][T17131] ? dup_task_struct+0x57/0xbd0 [ 370.633578][T17131] __should_failslab+0xa4/0xe0 [ 370.638344][T17131] should_failslab+0x9/0x20 [ 370.642856][T17131] kmem_cache_alloc+0x3d/0x2e0 [ 370.647728][T17131] ? __kasan_check_write+0x14/0x20 [ 370.652844][T17131] dup_task_struct+0x57/0xbd0 [ 370.657563][T17131] ? __kasan_check_write+0x14/0x20 [ 370.662674][T17131] ? recalc_sigpending+0x1ac/0x230 [ 370.667789][T17131] copy_process+0x5b2/0x32c0 [ 370.672564][T17131] ? memset+0x35/0x40 [ 370.676681][T17131] ? proc_fail_nth_read+0x210/0x210 [ 370.681894][T17131] ? __pidfd_prepare+0x150/0x150 [ 370.686845][T17131] ? rw_verify_area+0x1c0/0x360 [ 370.691705][T17131] ? vfs_write+0xac8/0xd60 [ 370.696128][T17131] ? __bpf_trace_kmem_free+0x6f/0x90 [ 370.701422][T17131] kernel_clone+0x23f/0x940 [ 370.705935][T17131] ? kernel_write+0x3c0/0x3c0 [ 370.710628][T17131] ? create_io_thread+0x130/0x130 [ 370.715667][T17131] ? mutex_lock+0x8c/0xe0 [ 370.720003][T17131] __x64_sys_clone+0x176/0x1d0 [ 370.724769][T17131] ? __ia32_sys_vfork+0xf0/0xf0 [ 370.729628][T17131] ? ksys_write+0x1eb/0x240 [ 370.734139][T17131] ? debug_smp_processor_id+0x17/0x20 [ 370.739526][T17131] ? fpregs_assert_state_consistent+0xb1/0xe0 [ 370.745609][T17131] ? exit_to_user_mode_prepare+0x2f/0xa0 [ 370.751250][T17131] do_syscall_64+0x31/0x40 [ 370.755676][T17131] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 370.761584][T17131] RIP: 0033:0x7f5e149c16c9 [ 370.765997][T17131] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 370.785627][T17131] RSP: 002b:00007f5e13428fe8 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 370.794037][T17131] RAX: ffffffffffffffda RBX: 00007f5e14c17fa0 RCX: 00007f5e149c16c9 [ 370.802005][T17131] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00000000640c7000 [ 370.809971][T17131] RBP: 00007f5e13429090 R08: 0000000000000000 R09: 0000000000000000 [ 370.817945][T17131] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000001 [ 370.825911][T17131] R13: 00007f5e14c18038 R14: 00007f5e14c17fa0 R15: 00007ffc65f2b498 [ 370.895182][T17159] device bridge_slave_1 left promiscuous mode [ 370.902102][T17159] bridge0: port 2(bridge_slave_1) entered disabled state [ 370.915415][T17159] device bridge_slave_0 left promiscuous mode [ 370.924551][T17159] bridge0: port 1(bridge_slave_0) entered disabled state [ 371.047436][T17167] device pim6reg1 entered promiscuous mode [ 371.213089][T17172] device veth0_vlan left promiscuous mode [ 371.225396][T17172] device veth0_vlan entered promiscuous mode [ 371.251463][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 371.261738][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 371.270667][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 371.411302][T17198] FAULT_INJECTION: forcing a failure. [ 371.411302][T17198] name failslab, interval 1, probability 0, space 0, times 0 [ 371.429860][T17198] CPU: 0 PID: 17198 Comm: syz.3.5149 Tainted: G W syzkaller #0 [ 371.438735][T17198] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 371.448807][T17198] Call Trace: [ 371.452219][T17198] __dump_stack+0x21/0x24 [ 371.456557][T17198] dump_stack_lvl+0x169/0x1d8 [ 371.461236][T17198] ? show_regs_print_info+0x18/0x18 [ 371.466440][T17198] ? do_syscall_64+0x31/0x40 [ 371.471045][T17198] dump_stack+0x15/0x1c [ 371.475216][T17198] should_fail+0x3c1/0x510 [ 371.479657][T17198] ? __get_vm_area_node+0x113/0x450 [ 371.484872][T17198] __should_failslab+0xa4/0xe0 [ 371.489649][T17198] should_failslab+0x9/0x20 [ 371.494169][T17198] kmem_cache_alloc_trace+0x3a/0x2e0 [ 371.499466][T17198] __get_vm_area_node+0x113/0x450 [ 371.504500][T17198] __vmalloc_node_range+0xe0/0x780 [ 371.509618][T17198] ? copy_process+0x5b2/0x32c0 [ 371.514388][T17198] ? kmem_cache_alloc+0x165/0x2e0 [ 371.519421][T17198] dup_task_struct+0x40f/0xbd0 [ 371.524199][T17198] ? copy_process+0x5b2/0x32c0 [ 371.528970][T17198] ? __kasan_check_write+0x14/0x20 [ 371.534086][T17198] ? recalc_sigpending+0x1ac/0x230 [ 371.539197][T17198] copy_process+0x5b2/0x32c0 [ 371.543908][T17198] ? memset+0x35/0x40 [ 371.547991][T17198] ? proc_fail_nth_read+0x210/0x210 [ 371.553196][T17198] ? __pidfd_prepare+0x150/0x150 [ 371.558133][T17198] ? rw_verify_area+0x1c0/0x360 [ 371.562983][T17198] ? vfs_write+0xac8/0xd60 [ 371.567403][T17198] kernel_clone+0x23f/0x940 [ 371.571909][T17198] ? kernel_write+0x3c0/0x3c0 [ 371.576584][T17198] ? create_io_thread+0x130/0x130 [ 371.581621][T17198] ? mutex_lock+0x8c/0xe0 [ 371.586099][T17198] __x64_sys_clone+0x176/0x1d0 [ 371.590977][T17198] ? __ia32_sys_vfork+0xf0/0xf0 [ 371.595929][T17198] ? ksys_write+0x1eb/0x240 [ 371.600449][T17198] ? debug_smp_processor_id+0x17/0x20 [ 371.605830][T17198] ? fpregs_assert_state_consistent+0xb1/0xe0 [ 371.611909][T17198] ? exit_to_user_mode_prepare+0x2f/0xa0 [ 371.617643][T17198] do_syscall_64+0x31/0x40 [ 371.622072][T17198] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 371.627971][T17198] RIP: 0033:0x7fa4f24cd6c9 [ 371.632398][T17198] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 371.652140][T17198] RSP: 002b:00007fa4f0f34fe8 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 371.660594][T17198] RAX: ffffffffffffffda RBX: 00007fa4f2723fa0 RCX: 00007fa4f24cd6c9 [ 371.668574][T17198] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00000000640c7000 [ 371.676554][T17198] RBP: 00007fa4f0f35090 R08: 0000000000000000 R09: 0000000000000000 [ 371.684533][T17198] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000001 [ 371.692519][T17198] R13: 00007fa4f2724038 R14: 00007fa4f2723fa0 R15: 00007ffd57957708 [ 371.721696][T17198] syz.3.5149: vmalloc: allocation failure: 32768 bytes, mode:0xdc0(GFP_KERNEL|__GFP_ZERO), nodemask=(null),cpuset=syz3,mems_allowed=0 [ 371.735967][T17198] CPU: 0 PID: 17198 Comm: syz.3.5149 Tainted: G W syzkaller #0 [ 371.744825][T17198] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 371.754889][T17198] Call Trace: [ 371.758201][T17198] __dump_stack+0x21/0x24 [ 371.762642][T17198] dump_stack_lvl+0x169/0x1d8 [ 371.767416][T17198] ? show_regs_print_info+0x18/0x18 [ 371.772617][T17198] ? pr_cont_kernfs_name+0xe3/0xf0 [ 371.777742][T17198] dump_stack+0x15/0x1c [ 371.781916][T17198] warn_alloc+0x1b0/0x1d0 [ 371.786256][T17198] ? __get_vm_area_node+0x113/0x450 [ 371.791588][T17198] ? zone_watermark_ok_safe+0x250/0x250 [ 371.797153][T17198] ? kmem_cache_alloc_trace+0x184/0x2e0 [ 371.802708][T17198] ? __get_vm_area_node+0x345/0x450 [ 371.807918][T17198] __vmalloc_node_range+0x27d/0x780 [ 371.813127][T17198] ? kmem_cache_alloc+0x165/0x2e0 [ 371.818162][T17198] dup_task_struct+0x40f/0xbd0 [ 371.822931][T17198] ? copy_process+0x5b2/0x32c0 [ 371.827702][T17198] ? __kasan_check_write+0x14/0x20 [ 371.832817][T17198] ? recalc_sigpending+0x1ac/0x230 [ 371.837930][T17198] copy_process+0x5b2/0x32c0 [ 371.842521][T17198] ? memset+0x35/0x40 [ 371.846509][T17198] ? proc_fail_nth_read+0x210/0x210 [ 371.851710][T17198] ? __pidfd_prepare+0x150/0x150 [ 371.856654][T17198] ? rw_verify_area+0x1c0/0x360 [ 371.861498][T17198] ? vfs_write+0xac8/0xd60 [ 371.865905][T17198] kernel_clone+0x23f/0x940 [ 371.870395][T17198] ? kernel_write+0x3c0/0x3c0 [ 371.875059][T17198] ? create_io_thread+0x130/0x130 [ 371.880069][T17198] ? mutex_lock+0x8c/0xe0 [ 371.884391][T17198] __x64_sys_clone+0x176/0x1d0 [ 371.889144][T17198] ? __ia32_sys_vfork+0xf0/0xf0 [ 371.893982][T17198] ? ksys_write+0x1eb/0x240 [ 371.898477][T17198] ? debug_smp_processor_id+0x17/0x20 [ 371.903836][T17198] ? fpregs_assert_state_consistent+0xb1/0xe0 [ 371.909893][T17198] ? exit_to_user_mode_prepare+0x2f/0xa0 [ 371.915511][T17198] do_syscall_64+0x31/0x40 [ 371.919918][T17198] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 371.925798][T17198] RIP: 0033:0x7fa4f24cd6c9 [ 371.930206][T17198] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 371.949801][T17198] RSP: 002b:00007fa4f0f34fe8 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 371.958204][T17198] RAX: ffffffffffffffda RBX: 00007fa4f2723fa0 RCX: 00007fa4f24cd6c9 [ 371.966167][T17198] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00000000640c7000 [ 371.974128][T17198] RBP: 00007fa4f0f35090 R08: 0000000000000000 R09: 0000000000000000 [ 371.982088][T17198] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000001 [ 371.990053][T17198] R13: 00007fa4f2724038 R14: 00007fa4f2723fa0 R15: 00007ffd57957708 [ 371.999912][T17198] Mem-Info: [ 372.003066][T17198] active_anon:37 inactive_anon:14918 isolated_anon:0 [ 372.003066][T17198] active_file:25787 inactive_file:3466 isolated_file:0 [ 372.003066][T17198] unevictable:0 dirty:212 writeback:0 [ 372.003066][T17198] slab_reclaimable:7553 slab_unreclaimable:82145 [ 372.003066][T17198] mapped:30198 shmem:161 pagetables:698 bounce:0 [ 372.003066][T17198] free:1550146 free_pcp:854 free_cma:0 [ 372.040261][T17198] Node 0 active_anon:148kB inactive_anon:59672kB active_file:103148kB inactive_file:13864kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:120792kB dirty:848kB writeback:0kB shmem:644kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 0kB writeback_tmp:0kB kernel_stack:7552kB all_unreclaimable? no [ 372.069813][T17198] DMA32 free:2987448kB min:62668kB low:78332kB high:93996kB reserved_highatomic:0KB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:3145324kB managed:2988780kB mlocked:0kB pagetables:0kB bounce:0kB free_pcp:1332kB local_pcp:0kB free_cma:0kB [ 372.098254][T17198] lowmem_reserve[]: 0 3941 3941 [ 372.109173][T17198] Normal free:3213556kB min:84784kB low:105980kB high:127176kB reserved_highatomic:0KB active_anon:148kB inactive_anon:59748kB active_file:103148kB inactive_file:13864kB unevictable:0kB writepending:860kB present:5242880kB managed:4036368kB mlocked:0kB pagetables:2700kB bounce:0kB free_pcp:2460kB local_pcp:1168kB free_cma:0kB [ 372.140367][T17198] lowmem_reserve[]: 0 0 0 [ 372.174429][T17198] DMA32: 6*4kB (UM) 4*8kB (M) 4*16kB (M) 6*32kB (UM) 8*64kB (UM) 5*128kB (UM) 6*256kB (UM) 5*512kB (M) 6*1024kB (UM) 3*2048kB (UM) 725*4096kB (M) = 2987448kB [ 372.224757][T17198] Normal: 1168*4kB (UME) 1045*8kB (UME) 466*16kB (UME) 454*32kB (UME) 606*64kB (UME) 54*128kB (UME) 49*256kB (UM) 35*512kB (UM) 19*1024kB (UM) 6*2048kB (UM) 750*4096kB (M) = 3214920kB [ 372.244364][T17198] 29414 total pagecache pages [ 372.253691][T17198] 0 pages in swap cache [ 372.257902][T17198] Swap cache stats: add 0, delete 0, find 0/0 [ 372.264900][T17198] Free swap = 124996kB [ 372.273138][T17198] Total swap = 124996kB [ 372.277389][T17198] 2097051 pages RAM [ 372.281820][T17198] 0 pages HighMem/MovableOnly [ 372.286719][T17198] 340764 pages reserved [ 372.299378][T17198] 0 pages cma reserved [ 373.540420][T17280] device veth0_vlan left promiscuous mode [ 373.594021][T17280] device veth0_vlan entered promiscuous mode [ 373.635767][ T2931] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 373.660759][ T2931] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 373.684225][T17284] syz.2.5175[17284] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 373.684310][T17284] syz.2.5175[17284] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 373.698258][ T2931] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ: link becomes ready [ 374.816637][T17324] device pim6reg1 entered promiscuous mode [ 375.019543][T17346] device veth1_macvtap left promiscuous mode [ 376.161007][T17419] syz.0.5219[17419] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 376.161065][T17419] syz.0.5219[17419] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 376.245547][T17415] syz.0.5219[17415] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 376.268829][T17415] syz.0.5219[17415] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 381.338752][T17583] device sit0 left promiscuous mode [ 381.812405][T17618] device pim6reg1 entered promiscuous mode [ 381.954327][T17625] bridge0: port 2(bridge_slave_1) entered disabled state [ 381.961646][T17625] bridge0: port 1(bridge_slave_0) entered disabled state [ 382.282648][T17660] device sit0 left promiscuous mode [ 383.337533][T17724] device macsec0 left promiscuous mode [ 383.405093][T17721] device veth1_macvtap entered promiscuous mode [ 383.429431][T17721] device macsec0 entered promiscuous mode [ 383.471315][ T2931] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 384.244307][T17763] device veth1_macvtap left promiscuous mode [ 384.353501][T17763] device veth1_macvtap entered promiscuous mode [ 384.369864][T17763] device macsec0 entered promiscuous mode [ 384.690377][T17792] device pim6reg1 entered promiscuous mode [ 384.888482][T17806] device veth1_macvtap left promiscuous mode [ 385.007841][T17816] device macsec0 left promiscuous mode [ 385.059927][T17821] device veth1_macvtap entered promiscuous mode [ 385.071727][T17821] device macsec0 entered promiscuous mode [ 385.088605][T17821] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 385.103040][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 385.119735][T17823] device pim6reg1 entered promiscuous mode [ 385.133746][T17823] device pim6reg1 left promiscuous mode [ 385.312766][T17829] device pim6reg1 entered promiscuous mode [ 386.010716][T17873] device pim6reg1 entered promiscuous mode [ 386.125346][T17885] device pim6reg1 entered promiscuous mode [ 386.710967][T17920] device pim6reg1 entered promiscuous mode [ 386.776980][T17924] device pim6reg1 entered promiscuous mode [ 386.827752][T17930] device pim6reg1 entered promiscuous mode [ 386.866009][T17935] syz.3.5396[17935] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 386.866059][T17935] syz.3.5396[17935] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 386.952895][T17948] syz.3.5399[17948] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 386.975726][T17948] syz.3.5399[17948] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 387.067438][T17952] device veth1_macvtap left promiscuous mode [ 387.098959][T17952] device macsec0 left promiscuous mode [ 387.337637][T17980] device pim6reg1 entered promiscuous mode [ 387.813800][T18020] device pim6reg1 entered promiscuous mode [ 389.556141][T18169] device pim6reg1 entered promiscuous mode [ 389.922882][T18181] device syzkaller0 entered promiscuous mode [ 390.182872][ T24] audit: type=1400 audit(1763398473.620:169): avc: denied { mounton } for pid=18202 comm="syz-executor" path="/" dev="sda1" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:root_t tclass=dir permissive=1 [ 390.218526][T18202] bridge0: port 1(bridge_slave_0) entered blocking state [ 390.225648][T18202] bridge0: port 1(bridge_slave_0) entered disabled state [ 390.233292][T18202] device bridge_slave_0 entered promiscuous mode [ 390.242680][T18202] bridge0: port 2(bridge_slave_1) entered blocking state [ 390.249777][T18202] bridge0: port 2(bridge_slave_1) entered disabled state [ 390.257434][T18202] device bridge_slave_1 entered promiscuous mode [ 390.313854][T18202] bridge0: port 2(bridge_slave_1) entered blocking state [ 390.320935][T18202] bridge0: port 2(bridge_slave_1) entered forwarding state [ 390.328200][T18202] bridge0: port 1(bridge_slave_0) entered blocking state [ 390.335331][T18202] bridge0: port 1(bridge_slave_0) entered forwarding state [ 390.357338][ T2931] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 390.365390][ T2931] bridge0: port 1(bridge_slave_0) entered disabled state [ 390.376501][ T2931] bridge0: port 2(bridge_slave_1) entered disabled state [ 390.387188][ T2931] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 390.395990][ T2931] bridge0: port 1(bridge_slave_0) entered blocking state [ 390.403062][ T2931] bridge0: port 1(bridge_slave_0) entered forwarding state [ 390.412474][ T2931] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 390.420740][ T2931] bridge0: port 2(bridge_slave_1) entered blocking state [ 390.427817][ T2931] bridge0: port 2(bridge_slave_1) entered forwarding state [ 390.451117][ T2931] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 390.459711][ T2931] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 390.475038][T18202] device veth0_vlan entered promiscuous mode [ 390.483411][ T2931] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 390.492190][ T2931] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 390.500409][ T2931] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 390.508557][ T2931] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 390.527865][T18202] device veth1_macvtap entered promiscuous mode [ 390.539555][ T2931] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 390.548019][ T2931] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 390.557070][ T2931] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 390.580361][ T24] audit: type=1400 audit(1763398474.020:170): avc: denied { unmount } for pid=18202 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fs_t tclass=filesystem permissive=1 [ 390.664417][T18221] device sit0 left promiscuous mode [ 391.357996][T18255] device syzkaller0 entered promiscuous mode [ 391.660140][ T49] device bridge_slave_1 left promiscuous mode [ 391.668621][ T49] bridge0: port 2(bridge_slave_1) entered disabled state [ 391.700348][ T49] device bridge_slave_0 left promiscuous mode [ 391.706626][ T49] bridge0: port 1(bridge_slave_0) entered disabled state [ 391.725097][ T49] device veth1_macvtap left promiscuous mode [ 391.868826][T18285] device pim6reg1 entered promiscuous mode [ 395.250252][T18456] syz.3.5553[18456] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 395.251838][T18456] syz.3.5553[18456] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 395.390095][T18466] device sit0 entered promiscuous mode [ 395.570599][T18467] device syzkaller0 entered promiscuous mode [ 395.636839][T18478] device pim6reg1 entered promiscuous mode [ 397.480909][T18548] device syzkaller0 entered promiscuous mode [ 399.028275][T18659] syzkaller0: default qdisc (pfifo_fast) fail, fallback to noqueue [ 399.064859][T18659] device syzkaller0 entered promiscuous mode