last executing test programs: 6.480421175s ago: executing program 0 (id=315): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xa, 0x4, 0x8, 0x8, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20050, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x1}, 0x2800, 0xc8, 0x0, 0x0, 0x0, 0x40000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x0, 0x10, &(0x7f0000000580)=ANY=[@ANYBLOB="18050000000000000000000000000000b7080000000000007b8af81b00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r2) recvmsg$unix(r1, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000003c0)={&(0x7f0000000140)='kmem_cache_free\x00', r4}, 0x10) write$cgroup_subtree(r3, &(0x7f0000000580)=ANY=[@ANYBLOB="8fedcb791f6f9875f37538e486dd6317ce81ea038800fe08000e40000200875a65969ff57b00ff020000004000000000000000000001"], 0xfdef) 6.347231235s ago: executing program 0 (id=317): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100), 0xc1842, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000f3ff0000850000007000000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'pim6reg\x00', 0x400}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='kmem_cache_free\x00', r1}, 0x18) write$cgroup_devices(r0, &(0x7f00000002c0)=ANY=[@ANYBLOB="0700a3fcf070d1ff"], 0xffdd) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$tipc(r2, &(0x7f0000000580)={&(0x7f0000000100)=@name={0x1e, 0x2, 0x2, {{0x1, 0x2}, 0x4}}, 0x10, &(0x7f00000004c0)=[{&(0x7f0000000140)="d8377cc0833493909ac950aea55e0cb3da50bf6952088252ae13b192389a7fba", 0x20}, {&(0x7f0000000180)="95510c01448d10a329ac47ba41b2811bcbacd88bb14bdc9781376eeef755265cb6a663ee58106653676ce322ba210b475c705698c6d389ca1b966ce2d4b280774dd0712e9065a47c8ab299b7dac6759637d10c492a8f917ad50c8a67b6cddd0bb43c7e70e023ee16f21907bc37d148c5ab9c2f31", 0x74}, {&(0x7f0000000200)="f002d32b728dc22fb028f3d0dc427ea66b18fa70af98e1e3e067ad8d76f3b20293a597459bd9d48121c11816b80a9c474fe54c9264bf776a81", 0x39}, {&(0x7f00000002c0)="ee0061c730b42d34af5b6e21e489da408491448ad0ebc967f1657714444322d67b4eaf", 0x23}, {&(0x7f0000000440)="0461a3c4ab96f6510fb78374dbd297cd7e2067b7e806507fdf5fd281a45390be7674677a4f62c8e7af70a870916b9005d84d387b947bbababda62cf9ebbc892df2a52340a16be177a0f350bf2addfec73238ccbd196110c04cc5043a116790", 0x5f}], 0x5, &(0x7f0000000540)}, 0x400d0) 5.1432509s ago: executing program 0 (id=326): bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000002000000b704000000000000850000005700000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) (async) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="1700000000000000040000000300"], 0x48) (async) syz_clone(0x10000000, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f0000001e40)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x70) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000240)='kmem_cache_free\x00', r1}, 0x10) (async) perf_event_open(&(0x7f0000001080)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x7602, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}, 0x404}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r2}, 0x10) (async) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xc8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r4) (async) recvmsg$unix(r3, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r5, &(0x7f0000000300)=ANY=[@ANYBLOB="8fedcb7910009875f37538e486dd6317ce8102033200fe08000e40000200875a65969ff57b00000000000000000000000000ac1414aa"], 0xfdef) 4.997227029s ago: executing program 0 (id=327): socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000040)) bpf$MAP_CREATE(0x0, 0x0, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=0xffffffffffffffff, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000680)=@base={0xb, 0x5, 0x400, 0x9, 0x1, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f00000004c0)={r1, &(0x7f0000000340), &(0x7f00000005c0)=""/155}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$tipc(r2, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x17, 0x0, 0x4, 0xff, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000180)='sys_enter\x00', r3}, 0x10) openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000380)={0x11, 0x0, 0x0, &(0x7f00000001c0)='syzkaller\x00', 0x3bf, 0x0, 0x0, 0x0, 0x40, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz1\x00', 0x1ff) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r4, 0x8914, &(0x7f0000000000)={'veth0_vlan\x00', @random="08f272f808af"}) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000180), 0x2, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000004c0)) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8924, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)) bpf$MAP_CREATE_RINGBUF(0x0, 0x0, 0x48) bpf$PROG_LOAD(0x5, 0x0, 0x0) mkdir(0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) 4.377567377s ago: executing program 0 (id=334): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000005000000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000280)={&(0x7f0000000040)='mm_page_alloc\x00', r0}, 0x10) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r2) recvmsg$unix(r1, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r3, &(0x7f0000000580)=ANY=[], 0xfdef) (fail_nth: 20) 3.940111075s ago: executing program 0 (id=337): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x19, 0x4, 0x4, 0x5, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r1, @ANYBLOB], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000180)='tlb_flush\x00', r2}, 0x18) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, 0x0, &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000180)='tlb_flush\x00', r3}, 0x10) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000880)={{r0, 0xffffffffffffffff}, 0x0, &(0x7f0000000840)=r4}, 0x20) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f00000003c0)='mm_page_alloc\x00', r6}, 0x18) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bf"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r7}, 0x10) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000006c0)={&(0x7f00000005c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x4, [@var={0x1, 0x0, 0x0, 0xe, 0x4}]}, {0x0, [0x61, 0x28]}}, &(0x7f0000000600)=""/143, 0x2c, 0x8f, 0x1, 0x0, 0x0, @void, @value}, 0x28) bpf$PROG_LOAD(0x5, 0x0, 0x0) r8 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$TUNSETIFF(r8, 0x400454ca, &(0x7f0000000180)={'syzkaller0\x00', 0x7101}) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000000)={r5, &(0x7f00000002c0)="beae9a9d1b00333f6f5795ab73c3c1d619a4fd7aa15b99147a4e5dbf14a1e7f2d5794230bea079c6da607baeea0a17adaa9117c5005c9b9abb9ca8a3021fe7659b057da9ae943ce76cbefd1b2fcc90e4cc288966b1dfbd9ad2a64eb83d97305ace26a44d43bf4132cf401675a5f6ffd0795d81b2b7f910e42c92c3b9f87fd7acae59e9bdbfc867f46ec21e2b6b1373aea14003818638527da2f9bca1aadfc0b1351a4c2a231f506ecd1f6b91be14463e01eaa7fff14dd711a3269e995307f78ffd338966bea7bda6b3d7f109a046c54339678327395b2a56a3a3a84cc5baec", &(0x7f0000000700)=""/241}, 0x20) close(0xffffffffffffffff) r9 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) close(r9) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_clone(0x640c7000, 0x0, 0x0, 0x0, 0x0, 0x0) 3.900207995s ago: executing program 1 (id=338): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x19, 0x4, 0x4, 0x5, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r1, @ANYBLOB], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000180)='tlb_flush\x00', r2}, 0x18) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, 0x0, &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000180)='tlb_flush\x00', r3}, 0x10) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000880)={{r0, 0xffffffffffffffff}, 0x0, &(0x7f0000000840)=r4}, 0x20) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f00000003c0)='mm_page_alloc\x00', r6}, 0x18) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bf"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r7}, 0x10) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000006c0)={&(0x7f00000005c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x4, [@var={0x1, 0x0, 0x0, 0xe, 0x4}]}, {0x0, [0x61, 0x28]}}, &(0x7f0000000600)=""/143, 0x2c, 0x8f, 0x1, 0x0, 0x0, @void, @value}, 0x28) bpf$PROG_LOAD(0x5, 0x0, 0x0) r8 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$TUNSETIFF(r8, 0x400454ca, &(0x7f0000000180)={'syzkaller0\x00', 0x7101}) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000000)={r5, &(0x7f00000002c0)="beae9a9d1b00333f6f5795ab73c3c1d619a4fd7aa15b99147a4e5dbf14a1e7f2d5794230bea079c6da607baeea0a17adaa9117c5005c9b9abb9ca8a3021fe7659b057da9ae943ce76cbefd1b2fcc90e4cc288966b1dfbd9ad2a64eb83d97305ace26a44d43bf4132cf401675a5f6ffd0795d81b2b7f910e42c92c3b9f87fd7acae59e9bdbfc867f46ec21e2b6b1373aea14003818638527da2f9bca1aadfc0b1351a4c2a231f506ecd1f6b91be14463e01eaa7fff14dd711a3269e995307f78ffd338966bea7bda6b3d7f109a046c54339678327395b2a56a3a3a84cc5baec", &(0x7f0000000700)=""/241}, 0x20) close(0xffffffffffffffff) r9 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) close(r9) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_clone(0x640c7000, 0x0, 0x0, 0x0, 0x0, 0x0) 3.102125011s ago: executing program 2 (id=344): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0xa, 0x5, 0x2, 0x7, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x0, 0x10, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000b98cad95850000000300000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b702000000000000850000008600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x1, 0x10, &(0x7f0000000180)=ANY=[], &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) setsockopt$sock_attach_bpf(r2, 0x1, 0x32, &(0x7f00000000c0)=r4, 0x4) sendmsg$unix(r3, &(0x7f00000006c0)={0x0, 0x0, 0x0}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000f00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xa, 0x4, 0x8, 0x8, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000002000000b704000000000000850000005700000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="1600000000000000040000000100000000000000", @ANYRES32=0x1, @ANYBLOB="000000000084000000", @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000300)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000058"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) r6 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000740)=ANY=[@ANYBLOB="0300000004000000040000000a"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x1, 0x8, &(0x7f0000000000)=ANY=[@ANYBLOB="18080000000000000000000000000000181200", @ANYRES32=r6, @ANYBLOB="0000000000000000b70300000000000085"], &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000200)={&(0x7f0000000580)="786e2cc93b31beb67ae92620b04955d9d4d05aa485dbb2121d081ccf02865470d18f8550beefe73d69082e6b0c6e11d8a6415795978894ef2e16f9c37a9f21a63ad32854c67cbbc45d71d2b060acd52fcd3b8444a50413c46f5b2b7159f5ea97080001f1f41a7e5b0eb654ee8d03f290917f19b00fea6fc23a01b6193882b6b64248a3a0", &(0x7f00000006c0)=""/75, &(0x7f0000000740)="5a88241a18cd73d6fcd7e61e5f6e80fde50ac53695a017df491ac3672c0b3575948c88799508136885269c62785bbc367cda00b26dd6be1d50e32130322fa2e79bbf259e9143a8a1e731f44ac3dcbd0965abe8e0fcdb966db56071101ce53c2075", &(0x7f00000007c0)="6ad23840a787bb7cc4cd5fa1086d413c37170e3514795fc91a41d1c4aaa9292fe220864d253a9d8acea617d3b7c18dcbd6f0a3fa850593f5bbdaff8810d0e3f36cf5324dcc8702cfbba40b3cbac71cf279a7914484948176cad0cd53332f176b0a94aaa1a3e76f19daec1725c6fc03c4e697f2f1b0a321981723d7e6a5c6fdc6c211103fc80dd074d412b74ca7b0564d5791da3480849194316b9d2d1ba9ec2403371ef000d84029eb", 0x8, r6}, 0x38) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000003c0)={&(0x7f0000000140)='kmem_cache_free\x00', r7}, 0x10) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, 0x0, 0x0) r8 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x1c1842, 0x0) ioctl$TUNSETIFF(r8, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r9 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16, 0x0, 0x4, 0xff, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r9, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000003c0)={{r9}, 0x0, &(0x7f0000000040)}, 0x20) r10 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000040)='mm_page_alloc\x00', r10}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x17, 0x0, 0x4, 0xff, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000780)={@cgroup, 0x32, 0x1, 0x1ff, &(0x7f0000000400)=[0x0, 0x0], 0x2, 0x0, &(0x7f00000006c0), &(0x7f0000000700), &(0x7f0000000740)=[0x0, 0x0]}, 0x40) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) 2.62898169s ago: executing program 3 (id=348): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280), 0xc1042, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) recvmsg$unix(0xffffffffffffffff, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f00000003c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$MAP_CREATE_RINGBUF(0x0, 0x0, 0x0) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x24bdb) bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x0, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000020000088500000082"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r2}, 0x10) bpf$MAP_CREATE(0x300000000000000, &(0x7f0000000100)=@base={0x18, 0x4, 0x41, 0x0, 0x1, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x4002, 0x5, 0x0, 0x0, @void, @value, @void, @value}, 0x48) write$cgroup_freezer_state(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfeffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x1900000000000000, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000011c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r3, 0x8915, &(0x7f0000000900)={'bridge0\x00', @broadcast}) r4 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000280)=ANY=[], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={0x0, r4}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000008000)={0x15, 0x3, 0x0, &(0x7f0000003ff6)='syzkaller\x00', 0x1, 0xc3, &(0x7f00000002c0)=""/195, 0x0, 0x0, '\x00', 0x0, @sk_reuseport, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) syz_clone(0x10080200, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x6, 0x4, 0x4, 0x1, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xd, &(0x7f0000000040)=ANY=[@ANYBLOB="1800000000000900000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000001000000850000007d00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000000)='tlb_flush\x00'}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000000)='tlb_flush\x00'}, 0x10) 2.56199033s ago: executing program 2 (id=350): socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$tipc(r0, &(0x7f0000000580)={&(0x7f0000000100)=@name={0x1e, 0x2, 0x2, {{0x1, 0x2}, 0x4}}, 0x10, &(0x7f00000004c0)=[{&(0x7f0000000140)="d8377cc0833493909ac950aea55e0cb3da50bf6952088252ae13b192389a7fba", 0x20}, {&(0x7f0000000180)="95510c01448d10a329ac47ba41b2811bcbacd88bb14bdc9781376eeef755265cb6a663ee58106653676ce322ba210b475c705698c6d389ca1b966ce2d4b280774dd0712e9065a47c8ab299b7dac6759637d10c492a8f917ad50c8a67b6cddd0bb43c7e70e023ee16f21907bc37d148c5ab9c2f31", 0x74}, {&(0x7f0000000200)="f002d32b728dc22fb028f3d0dc427ea66b18fa70af98e1e3e067ad8d76f3b20293a597459bd9d48121c11816b80a9c474fe54c9264bf776a81", 0x39}, {&(0x7f00000002c0)="ee0061c730b42d34af5b6e21e489da408491448ad0ebc967f1657714444322d67b4eaf", 0x23}, {&(0x7f0000000440)="0461a3c4ab96f6510fb78374dbd297cd7e2067b7e806507fdf5fd281a45390be7674677a4f62c8e7af70a870916b9005d84d387b947bbababda62cf9ebbc892df2a52340a16be177a0f350bf2addfec73238ccbd196110c04cc5043a116790", 0x5f}], 0x5, &(0x7f0000000540)}, 0x400d0) 2.52520413s ago: executing program 2 (id=351): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='devices.list\x00', 0x26e1, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/syz0\x00', 0x1ff) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="0e000000040000000800000006"], 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f00000005c0)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="000000000000000097ff0000000e00007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095698ec6aa302f7ccf98de81cee6d0d8607a0dfa458bd4ffd8d77a1a05b6b812b87ca8e4a117c3002334bc52"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000140)='kfree\x00', r2}, 0x10) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000ac0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r3, 0x18000000000002a0, 0x2d, 0xfffffffffffffd85, &(0x7f00000000c0)="b9ff03030018698cb89e40f086dd6000000e00001100630677", 0x0, 0x100, 0x2000000, 0x0, 0x0, &(0x7f0000000440)}, 0x28) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000380)='./file0\x00', 0xd2) socketpair(0x1, 0x1, 0x0, &(0x7f0000000100)) write$cgroup_type(r0, &(0x7f0000000080), 0x11ffffce1) 2.468052889s ago: executing program 3 (id=352): bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000080)={{}, &(0x7f0000000000), &(0x7f0000000040)='%pi6 \x00'}, 0x20) r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r1 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f00000005c0)=ANY=[@ANYBLOB="1800000000000000000000000000000018010000786c6c2500000000002020207b1af8ff00000000bfa10016858eab596ad6ef000000000007010000f8ffffffb702000008000000b7030000feffffff850000002d0000009500000000000000"], &(0x7f00000003c0)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0xd, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r2}, 0x10) perf_event_open(&(0x7f0000000340)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x21, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x3}}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_procs(0xffffffffffffffff, 0x0, 0x2, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000000540)='ns/ipc\x00') socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r5, &(0x7f0000001b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x128}, 0x0) recvmsg$unix(r4, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, 0x0) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB="0d00deff06000000040000020000000000000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/14], 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000008c0)={{r6}, &(0x7f0000000840), &(0x7f0000000880)}, 0x20) r7 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000280)={0x1a, 0x3, &(0x7f0000000400)=@framed, &(0x7f0000000340)='syzkaller\x00', 0x1, 0xc5, &(0x7f0000000180)=""/197, 0x0, 0x0, '\x00', 0x0, 0x19, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x2600, 0x0, 0x31b4e, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={0x0, r7}, 0x10) bpf$MAP_CREATE(0x0, 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r8, 0x8914, &(0x7f0000000000)={'veth0_vlan\x00', @remote}) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r9, 0x8914, &(0x7f0000000000)={'veth0_vlan\x00', @random="0106002010ff"}) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000380)={0x6, 0x0, 0x0, &(0x7f0000000100)='GPL\x00', 0xe, 0xd9, &(0x7f0000000200)=""/217, 0x41100, 0xd, '\x00', 0x0, 0x25, r0, 0x8, &(0x7f0000000140)={0x8, 0x2}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, &(0x7f0000000300)=[{0x2, 0x3, 0x9, 0x6}, {0x3, 0x3, 0xb, 0xe}, {0x3, 0x1, 0x8, 0x1}, {0x1, 0x1, 0x10, 0x8}, {0x0, 0x1, 0x1}, {0x2, 0x2, 0x2, 0x8}], 0x10, 0x1, @void, @value}, 0x94) openat$cgroup_ro(r0, &(0x7f0000000440)='memory.numa_stat\x00', 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000580)=ANY=[@ANYRES32=r3, @ANYRESHEX=r1, @ANYRESOCT], 0x50) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 2.413642879s ago: executing program 1 (id=354): ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'sit0\x00'}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8991, &(0x7f0000000080)) socketpair$unix(0x1, 0x5, 0x0, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x17, 0x0, 0x4, 0xff, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000007000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000fdffffff7b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r3 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000058"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) bpf$TOKEN_CREATE(0x24, &(0x7f0000000380)={0x0, r2}, 0x8) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000680)=ANY=[@ANYBLOB="0e000000040000000800000006"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b70800000000396f7b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0xc, &(0x7f00000006c0)=ANY=[@ANYRES16=r3, @ANYRESHEX=r1, @ANYBLOB="881118eb9b535d99ff87663e461e9b207573b6a0d57cbbb1c5945cc85f2fedef142331deb6011a78e3568072e578488486693360b707205df80befbed5986767ee35135cac5d33589afa640cb6ff63c4ba7daa71c35394def5444855493c2e2a118c1f7c2396bc0c7f03d89fe4f90d08ddea2bd4198ee871779971a83415ef2fad543bd8529c2df4cff639db5300", @ANYRESOCT=r2, @ANYRES8=r3, @ANYRESOCT=r2, @ANYBLOB="03d9377d9ddf3735a59b429f235eb7a459c79dcb191fff3ac72b56b3afb7325dae46a751fb953a77efbe2a3edef71630fd2104f75b9dd245adb0c13187857edba6aaabe0c29ce81ce1f747c84c13d572c966da017fb917f5f71a59a0a6500d12aaf75bebe41a2a23fd441e714f3179bf21201394267c4d3ba5b8526b436da88377b41f967a4191ae9c7d4116cffb3d8e7ed6fe87f7133de33664f8993d5d39f4cf5e4de4251189e154aebb6a79b94df367b7982225e1d79d4099e1", @ANYRESOCT=r4, @ANYRESDEC=r0], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r5}, 0x10) bpf$PROG_LOAD(0x5, 0x0, 0x0) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000000340)=@base={0xe, 0x4, 0x4, 0x9, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r6, @ANYBLOB="0000000000000000b70800000d0000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) recvmsg$unix(0xffffffffffffffff, 0x0, 0x0) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x8, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000500)='percpu_free_percpu\x00', r7}, 0x10) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r8 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) ioctl$TUNSETIFF(r8, 0x400454ca, &(0x7f0000000200)={'rose0\x00', 0x112}) close(r8) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0xfdef) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000180)) r9 = bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x7, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000040)='qdisc_destroy\x00', r9}, 0x10) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) 1.647132206s ago: executing program 2 (id=357): openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x201, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x8, &(0x7f0000000280)=ANY=[@ANYBLOB="18010000000000000000000000000000850000006d00000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b702000000000000850000008600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r2 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000580)={&(0x7f00000004c0)='kfree\x00', r1}, 0x10) r3 = openat$tun(0xffffffffffffff9c, 0x0, 0x1c1201, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, 0x0) syz_clone(0x40004400, 0x0, 0x0, 0x0, 0x0, 0x0) write$cgroup_pid(r3, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000007c0)={0xffffffffffffffff, 0xe0, &(0x7f0000000800)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa, &(0x7f00000005c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000500), 0x0, 0x0, 0xcd, &(0x7f0000000500), 0x0, 0x10, &(0x7f00000004c0), &(0x7f0000000540), 0x8, 0x90, 0x8, 0x0, 0x0}}, 0x10) r5 = bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x6f2320ac, '\x00', r4, r5, 0x4, 0x2, 0x0, 0x0, @void, @value, @void, @value}, 0x50) r6 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000180)={0x2, 0x4, 0x8, 0x1, 0x80, r0, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x0, 0x4, 0x0, @void, @value, @void, @value}, 0x50) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000680)={0x6, 0x1d, &(0x7f00000002c0)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x11, 0x0, 0x0, 0x0, 0xfffffb70}, {}, {}, [@ringbuf_query={{0x18, 0x1, 0x1, 0x0, r2}}, @btf_id={0x18, 0x6, 0x3, 0x0, 0x5}, @alu={0x4, 0x0, 0x4, 0x1, 0x5, 0xfffffffffffffffc, 0xfffffffffffffff0}, @map_idx={0x18, 0x6, 0x5, 0x0, 0x9}, @map_fd={0x18, 0x9, 0x1, 0x0, r0}, @ldst={0x1, 0x2, 0x1, 0x3, 0x9, 0x8, 0x4}, @map_idx_val={0x18, 0x0, 0x6, 0x0, 0xb, 0x0, 0x0, 0x0, 0x5}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000000)='GPL\x00', 0xfffffeff, 0x99, &(0x7f00000003c0)=""/153, 0x40f00, 0x14, '\x00', r4, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000040)={0x1, 0x5}, 0x8, 0x10, &(0x7f0000000080)={0x1, 0xe, 0x1, 0x6}, 0x10, 0x0, 0x0, 0x9, &(0x7f0000000240)=[r0, r0, r0, r6], &(0x7f00000005c0)=[{0x0, 0x1, 0xe, 0x1}, {0x1, 0x5, 0x2, 0xa}, {0x5, 0x3, 0x2, 0x7}, {0x2, 0x4, 0x5, 0x6}, {0x3, 0x4, 0x4, 0x4}, {0x2, 0x2, 0xc, 0xf}, {0x4, 0x5, 0x0, 0x1}, {0x4, 0x1, 0x2, 0x5}, {0x0, 0x2, 0xf, 0x3}], 0x10, 0x949, @void, @value}, 0x94) 1.630418896s ago: executing program 3 (id=358): ioctl$TUNSETCARRIER(0xffffffffffffffff, 0x400454e2, &(0x7f0000000000)=0x43) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'veth1_virt_wifi\x00'}) socketpair(0x5, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8946, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000080)={{}, &(0x7f0000000000), &(0x7f0000000040)}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x0, 0xf, &(0x7f0000000a40)=ANY=[], 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz1\x00', 0x1ff) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r2 = openat$cgroup_int(r1, &(0x7f0000000100)='cpuset.cpus\x00', 0x2, 0x0) r3 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x400, 0x0, 0x0, 0x0, 0x0, 0x3ff}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x5452, &(0x7f00000006c0)='\x02;\xe5\b\x00\x1c\x9c\x00\x00\x00\x00\x00\x00\x91\xecB\xdcZ\xe5\xbd$\x05\x90\xa9\xf3\xc7\xcb\xb7\xf0\xa1;#\x989\xe9\x12\xdf^6T\xdf\xcd\x02\xc5\xb0\xba\x12\'QXp\t\xfc\xf3\x01\x02\xbc\xbf\xc0\xf0\x10\xee\xd3\\yy\xa4\xf9\xe8\x00\xdd\xe97 0_\xe4]W\xf7~\xacVK\xc9t\x9e+:\x85\xef\x94\x0e\x19\x9cV[N.\xeb\x9fJ>\xd9\x99\x88\xd8\xdd\xb8Y\xc3$\xc6\x93\v\x04REY\xf4\xea\xf2\xcd\xcd.\x16\x861\xa1\v\x8d\x8e\x84R\xa6\x83\x84\xc0\x01e\xc3\xc8\xcc?\xc8?\x19\xb2\xa2\xe1\xac<\xe9f\x11\xff3\xc7\x19\x9e\x19\xf5-\xfe\xbd\xae\xbbR\x82\x16\xf9\x15S\x03U\xe0\xd8t\xe3%96') ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000000200)) r4 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000380), 0x12) getpid() write$cgroup_int(r2, &(0x7f0000000040)=0x800000000000000, 0x1) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x11, 0x5, &(0x7f0000000280)=ANY=[], &(0x7f0000000a40)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00', r5}, 0x10) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1ee, 0x21, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7, 0x20000080}, 0x0, 0x1, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000280)=@bpf_tracing={0x1a, 0x12, &(0x7f0000000e00)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x6}, {}, {}, [@map_val={0x18, 0x4, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1}, @generic={0x2e, 0x4, 0x6, 0x10, 0x10001}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000b00)='GPL\x00', 0x10, 0xdb, &(0x7f0000000c00)=""/219, 0x40f00, 0x55, '\x00', 0x0, 0x17, 0xffffffffffffffff, 0x8, &(0x7f0000000d00)={0x7, 0x3}, 0x8, 0x10, &(0x7f0000000140)={0x2, 0x8, 0x100000, 0x3}, 0x10, 0x53e7, r5, 0x1, &(0x7f0000000d80)=[r4, 0xffffffffffffffff], &(0x7f0000000dc0)=[{0x1, 0x5, 0x2, 0xb}], 0x10, 0x7ffc, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00'}, 0x10) close(0x4) openat$tun(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) 1.558429275s ago: executing program 1 (id=359): perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xc8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) close(r1) r2 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="1b0000000000000000000000000004"], 0x48) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x11, 0xf, &(0x7f0000000340)=ANY=[@ANYBLOB="1803000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b702000014000800b7030000000000008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000000000008500000085000000b70000000000000095"], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='kmem_cache_free\x00', r3}, 0x10) r4 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000000)={0x3, 0x4, 0x4, 0xa, 0x0, r2, 0x5, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x4, 0x3, 0x0, @void, @value, @void, @value}, 0x50) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000280)={{r4}, &(0x7f00000000c0), &(0x7f0000000100)=r3}, 0x20) r5 = openat$tun(0xffffffffffffff9c, &(0x7f0000000200), 0x10200, 0x0) ioctl$TUNGETDEVNETNS(r5, 0x54e3, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r6, 0x8914, &(0x7f0000000000)={'veth0_vlan\x00', @remote}) perf_event_open(&(0x7f0000000500)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r7, 0x8914, &(0x7f0000000000)={'veth0_vlan\x00', @random="0106002010ff"}) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x9, 0x4, 0x8, 0x8, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x19, 0x2, 0x0, 0x0, 0x0, 0x0, 0x20200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x7, 0x10001, 0x9, 0x1, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x57a, 0xfff}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000003480)={0x11, 0x2, &(0x7f00000001c0)=ANY=[@ANYBLOB="17010000a4fc0a000500feff"], &(0x7f0000000000)='GPL\x00', 0x6, 0x89, &(0x7f0000003300)=""/137, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x300, @void, @value}, 0x80) recvmsg$unix(r0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x40000002) write$cgroup_subtree(r8, &(0x7f0000000240)={[{0x2d, 'cpuacct'}, {0x2b, 'rlimit'}]}, 0x11) 1.432373885s ago: executing program 3 (id=360): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000002000000b704000000000000850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16, 0x0, 0x4, 0xff, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000200)='fdb_delete\x00', r2}, 0x10) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000200)='fdb_delete\x00', r1}, 0x10) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r3, 0x8924, &(0x7f0000000000)={'bridge_slave_0\x00', @random="010000201000"}) (fail_nth: 6) 1.427687245s ago: executing program 4 (id=361): socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$tipc(r0, &(0x7f0000000580)={&(0x7f0000000100)=@name={0x1e, 0x2, 0x2, {{0x1, 0x2}, 0x4}}, 0x10, &(0x7f00000004c0)=[{&(0x7f0000000140)="d8377cc0833493909ac950aea55e0cb3da50bf6952088252ae13b192389a7fba", 0x20}, {&(0x7f0000000180)="95510c01448d10a329ac47ba41b2811bcbacd88bb14bdc9781376eeef755265cb6a663ee58106653676ce322ba210b475c705698c6d389ca1b966ce2d4b280774dd0712e9065a47c8ab299b7dac6759637d10c492a8f917ad50c8a67b6cddd0bb43c7e70e023ee16f21907bc37d148c5ab9c2f31", 0x74}, {&(0x7f0000000200)="f002d32b728dc22fb028f3d0dc427ea66b18fa70af98e1e3e067ad8d76f3b20293a597459bd9d48121c11816b80a9c474fe54c9264bf776a81", 0x39}, {&(0x7f00000002c0)="ee0061c730b42d34af5b6e21e489da408491448ad0ebc967f1657714444322d67b4eaf", 0x23}, {&(0x7f0000000440)="0461a3c4ab96f6510fb78374dbd297cd7e2067b7e806507fdf5fd281a45390be7674677a4f62c8e7af70a870916b9005d84d387b947bbababda62cf9ebbc892df2a52340a16be177a0f350bf2addfec73238ccbd196110c04cc5043a116790", 0x5f}], 0x5, &(0x7f0000000540)}, 0x400d0) 1.021787854s ago: executing program 2 (id=362): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000001a80)=ANY=[@ANYBLOB="0e00000004000000080000000800000000000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="000000000000000000000000f6ac59"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='sched_switch\x00', r1}, 0x10) bpf$MAP_CREATE(0x100000000000000, 0x0, 0x48) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) write$cgroup_subtree(r2, &(0x7f0000000140)=ANY=[], 0xfffffdef) perf_event_open(&(0x7f00000001c0)={0x4, 0x80, 0x0, 0x8, 0x4, 0xf9, 0x0, 0x3, 0x0, 0xc, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x8, 0x4, @perf_bp={&(0x7f0000000080), 0x8}, 0x10, 0x0, 0x9, 0x1, 0x3, 0x3889317e, 0x4, 0x0, 0xdbc, 0x0, 0x9}, 0x0, 0x0, r2, 0x1) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) write$cgroup_pid(r3, &(0x7f0000000980), 0x20000992) openat$tun(0xffffffffffffff9c, &(0x7f0000000280), 0x100, 0x0) 1.021305694s ago: executing program 3 (id=363): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000002000000b704000000000000850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000200)='fdb_delete\x00', r2}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000200)='fdb_delete\x00', r1}, 0x10) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r3, 0x8924, &(0x7f0000000000)={'bridge_slave_0\x00', @random="010000201000"}) 1.020841384s ago: executing program 4 (id=364): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000002000000b704000000000000850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x108, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x2, @perf_bp={0x0, 0x4}, 0x0, 0xc8, 0x7fffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000340)={0xffffffffffffffff, 0xe0, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000100), 0x0, 0x2a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd1, 0x8, 0x0, 0x0}}, 0x10) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r2) recvmsg$unix(r1, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r3, &(0x7f0000000280)=ANY=[@ANYBLOB="8fedcb7907001175f37538e486dd630080fc00082c00db5b6861589bcfe8875a060300000023000000000000000000000000ac1414aa32"], 0xfdef) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000200)='fdb_delete\x00', r5}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000200)='fdb_delete\x00', r4}, 0x10) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r6, 0x8924, &(0x7f0000000000)={'bridge_slave_0\x00', @random="010000201000"}) 924.256473ms ago: executing program 3 (id=365): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x19, 0x4, 0x4, 0x5, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r1, @ANYBLOB], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000180)='tlb_flush\x00', r2}, 0x18) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, 0x0, &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000180)='tlb_flush\x00', r3}, 0x10) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000880)={{r0, 0xffffffffffffffff}, 0x0, &(0x7f0000000840)=r4}, 0x20) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f00000003c0)='mm_page_alloc\x00', r6}, 0x18) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bf"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r7}, 0x10) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000006c0)={&(0x7f00000005c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x4, [@var={0x1, 0x0, 0x0, 0xe, 0x4}]}, {0x0, [0x61, 0x28]}}, &(0x7f0000000600)=""/143, 0x2c, 0x8f, 0x1, 0x0, 0x0, @void, @value}, 0x28) bpf$PROG_LOAD(0x5, 0x0, 0x0) r8 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$TUNSETIFF(r8, 0x400454ca, &(0x7f0000000180)={'syzkaller0\x00', 0x7101}) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000000)={r5, &(0x7f00000002c0)="beae9a9d1b00333f6f5795ab73c3c1d619a4fd7aa15b99147a4e5dbf14a1e7f2d5794230bea079c6da607baeea0a17adaa9117c5005c9b9abb9ca8a3021fe7659b057da9ae943ce76cbefd1b2fcc90e4cc288966b1dfbd9ad2a64eb83d97305ace26a44d43bf4132cf401675a5f6ffd0795d81b2b7f910e42c92c3b9f87fd7acae59e9bdbfc867f46ec21e2b6b1373aea14003818638527da2f9bca1aadfc0b1351a4c2a231f506ecd1f6b91be14463e01eaa7fff14dd711a3269e995307f78ffd338966bea7bda6b3d7f109a046c54339678327395b2a56a3a3a84cc5baec", &(0x7f0000000700)=""/241}, 0x20) close(0xffffffffffffffff) r9 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) close(r9) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_clone(0x640c7000, 0x0, 0x0, 0x0, 0x0, 0x0) 922.740883ms ago: executing program 1 (id=375): socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$tipc(r0, &(0x7f0000000580)={&(0x7f0000000100)=@name={0x1e, 0x2, 0x2, {{0x1, 0x2}, 0x4}}, 0x10, &(0x7f00000004c0)=[{&(0x7f0000000140)="d8377cc0833493909ac950aea55e0cb3da50bf6952088252ae13b192389a7fba", 0x20}, {&(0x7f0000000180)="95510c01448d10a329ac47ba41b2811bcbacd88bb14bdc9781376eeef755265cb6a663ee58106653676ce322ba210b475c705698c6d389ca1b966ce2d4b280774dd0712e9065a47c8ab299b7dac6759637d10c492a8f917ad50c8a67b6cddd0bb43c7e70e023ee16f21907bc37d148c5ab9c2f31", 0x74}, {&(0x7f0000000200)="f002d32b728dc22fb028f3d0dc427ea66b18fa70af98e1e3e067ad8d76f3b20293a597459bd9d48121c11816b80a9c474fe54c9264bf776a81", 0x39}, {&(0x7f00000002c0)="ee0061c730b42d34af5b6e21e489da408491448ad0ebc967f1657714444322d67b4eaf", 0x23}, {&(0x7f0000000440)="0461a3c4ab96f6510fb78374dbd297cd7e2067b7e806507fdf5fd281a45390be7674677a4f62c8e7af70a870916b9005d84d387b947bbababda62cf9ebbc892df2a52340a16be177a0f350bf2addfec73238ccbd196110c04cc5043a116790", 0x5f}], 0x5, &(0x7f0000000540)}, 0x400d0) 914.466883ms ago: executing program 4 (id=366): r0 = perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x21, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1, 0x7}, 0x0, 0x0, 0x0, 0x1, 0x1, 0x2, 0x20}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) bpf$MAP_CREATE(0x600000000000000, &(0x7f0000000300)=ANY=[@ANYBLOB="0e000000040000000400000002000200000000008f703021e9c0e9de381b1c711b1913dca29eace469380d73738ad62390a07caa294a571dd25a2748e9fe883c54f40f6ce5ef849fbc69538b4e3365524163a2add1dc43d47015381072a10d6634bf3191cdfd01d88707bb6506285eff61a6652074765ed3863dea134eb2fe23d49c043d1b9018616e798a3b8fd2561ed3bd7f965fa0cf54b6f98c1d0d8d162ec9099220b3a255c165d70321f6f78d21f9eb55566989cfea2dc8ddbee4688f6cba0c5c4279b2fde1e13aae58095714a578ac337378bc721a5355f34694db5cab726ea7", @ANYRES32=0x1, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="000000000200"/28], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d0000001801000020696c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007000000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r1}, 0x10) close(r0) 905.636803ms ago: executing program 1 (id=367): r0 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000900)={0x11, 0xf, &(0x7f0000000340)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x40000004, 0x0, 0x0, 0x0, 0xfffffffd}, {{0x18, 0x1, 0x1, 0x0, r0}}, {}, [], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x2b, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_BIND_MAP(0xa, &(0x7f00000001c0)={r1}, 0xc) 750.162812ms ago: executing program 4 (id=368): bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000780)=ANY=[@ANYBLOB="9feb010018000000000000003000000030000000020000000000000001000084000004000000000003000000000000000000000000000002000000000004000000000009"], 0x0, 0x4a, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x28) 705.247873ms ago: executing program 1 (id=369): ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x5452, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18020000000000000000000000000000850000007b0000009500fdd9684fbe3d"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, 0x0, &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, 0x0, &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x10, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sk_msg, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x10, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4000000000000007910480000000000610400000000000095000000"], &(0x7f0000003ff6)='GPL\x00', 0x2, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @sk_msg, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x48) close(r0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f0000000540)=ANY=[@ANYBLOB="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"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @sk_skb, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x1dd, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x48) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0xf, 0x4, 0x4, 0x12, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r3, r2, 0x26, 0x0, 0x0, @void, @value}, 0x10) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000000c0)={{r3}, &(0x7f0000000000), &(0x7f0000000080)=r0}, 0x20) sendmsg$inet(r1, &(0x7f0000000500)={0x0, 0x0, 0x0}, 0x0) (fail_nth: 5) 698.613333ms ago: executing program 4 (id=370): ioctl$TUNSETCARRIER(0xffffffffffffffff, 0x400454e2, &(0x7f0000000000)=0x43) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'veth1_virt_wifi\x00'}) socketpair(0x5, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8946, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000080)={{}, &(0x7f0000000000), &(0x7f0000000040)}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x0, 0xf, &(0x7f0000000a40)=ANY=[], 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz1\x00', 0x1ff) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r2 = openat$cgroup_int(r1, &(0x7f0000000100)='cpuset.cpus\x00', 0x2, 0x0) r3 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x400, 0x0, 0x0, 0x0, 0x0, 0x3ff}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x5452, &(0x7f00000006c0)='\x02;\xe5\b\x00\x1c\x9c\x00\x00\x00\x00\x00\x00\x91\xecB\xdcZ\xe5\xbd$\x05\x90\xa9\xf3\xc7\xcb\xb7\xf0\xa1;#\x989\xe9\x12\xdf^6T\xdf\xcd\x02\xc5\xb0\xba\x12\'QXp\t\xfc\xf3\x01\x02\xbc\xbf\xc0\xf0\x10\xee\xd3\\yy\xa4\xf9\xe8\x00\xdd\xe97 0_\xe4]W\xf7~\xacVK\xc9t\x9e+:\x85\xef\x94\x0e\x19\x9cV[N.\xeb\x9fJ>\xd9\x99\x88\xd8\xdd\xb8Y\xc3$\xc6\x93\v\x04REY\xf4\xea\xf2\xcd\xcd.\x16\x861\xa1\v\x8d\x8e\x84R\xa6\x83\x84\xc0\x01e\xc3\xc8\xcc?\xc8?\x19\xb2\xa2\xe1\xac<\xe9f\x11\xff3\xc7\x19\x9e\x19\xf5-\xfe\xbd\xae\xbbR\x82\x16\xf9\x15S\x03U\xe0\xd8t\xe3%96') ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000000200)) r4 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000380), 0x12) getpid() write$cgroup_int(r2, &(0x7f0000000040)=0x800000000000000, 0x1) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x11, 0x5, &(0x7f0000000280)=ANY=[], &(0x7f0000000a40)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00', r5}, 0x10) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1ee, 0x21, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7, 0x20000080}, 0x0, 0x1, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000280)=@bpf_tracing={0x1a, 0x12, &(0x7f0000000e00)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x6}, {}, {}, [@map_val={0x18, 0x4, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1}, @generic={0x2e, 0x4, 0x6, 0x10, 0x10001}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000b00)='GPL\x00', 0x10, 0xdb, &(0x7f0000000c00)=""/219, 0x40f00, 0x55, '\x00', 0x0, 0x17, 0xffffffffffffffff, 0x8, &(0x7f0000000d00)={0x7, 0x3}, 0x8, 0x10, &(0x7f0000000140)={0x2, 0x8, 0x100000, 0x3}, 0x10, 0x53e7, r5, 0x1, &(0x7f0000000d80)=[r4, 0xffffffffffffffff], &(0x7f0000000dc0)=[{0x1, 0x5, 0x2, 0xb}], 0x10, 0x7ffc, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00'}, 0x10) close(0x4) openat$tun(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) 123.64273ms ago: executing program 2 (id=371): r0 = perf_event_open(&(0x7f00000010c0)={0x2, 0x80, 0xb6, 0x0, 0x0, 0x0, 0x0, 0x800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000002c0), 0x2}, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0xff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) close(r1) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x26e1, 0x0) perf_event_open$cgroup(&(0x7f0000000180)={0x3, 0x80, 0x2d, 0x1, 0x1, 0x2b, 0x0, 0xd, 0x200c4, 0x4, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x2, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x5, 0x0, @perf_config_ext={0x70, 0x8000000000000000}, 0x1, 0x8000000000000000, 0x2, 0x5, 0x4, 0x9, 0x6, 0x0, 0x775f, 0x0, 0x400}, 0xffffffffffffffff, 0x13, r0, 0x9) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)) r2 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) setsockopt$sock_attach_bpf(r4, 0x1, 0x1d, &(0x7f00000001c0), 0x4) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="0100ffffffffff1dffe400000000", @ANYRES32=0x1, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) openat$cgroup_ro(r2, &(0x7f0000000040)='blkio.bfq.sectors_recursive\x00', 0x275a, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000280)=@bpf_lsm={0x6, 0x3, &(0x7f00000003c0)=ANY=[@ANYBLOB="180000000300000000000000000000f195"], &(0x7f0000000140)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) openat$tun(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r5 = syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000000)='ns/net\x00') ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x40049409, 0x5) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000980)={0x0, 0x0, 0x0}, 0x40000062) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000200)={'rose0\x00', 0x112}) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0x0, 0x0, &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000880)={0x0, 0x8}, 0x10, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f00000006c0)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0xd, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) close(r3) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) ioctl$TUNGETDEVNETNS(r6, 0x8982, 0x20000000) 0s ago: executing program 4 (id=372): socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff}) recvmsg$unix(r0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r1, &(0x7f0000000000), 0xfdef) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000002000000b704000000000000850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16, 0x0, 0x4, 0xff, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000dc0)={0x11, 0xb, &(0x7f0000000640)=ANY=[@ANYBLOB="18060000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000003000000b703000000000000850000007300000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000080)='sched_switch\x00', r3}, 0x10) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x9, 0x143ffd, 0x7fe2, 0x1, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$MAP_DELETE_ELEM(0x2, &(0x7f0000000400)={r4, &(0x7f0000000180), 0x20000000}, 0x20) bpf$MAP_GET_NEXT_KEY(0x3, &(0x7f00000000c0)={r4, &(0x7f0000000180), 0x0}, 0x20) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000200)='fdb_delete\x00', r5}, 0x10) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000200)='fdb_delete\x00'}, 0x10) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r6, 0x8924, &(0x7f0000000000)={'bridge_slave_0\x00', @random="010000201000"}) kernel console output (not intermixed with test programs): [ 4.002190][ T85] acpid (85) used greatest stack depth: 23344 bytes left [ 4.211641][ T100] udevd[100]: starting version 3.2.11 [ 4.239545][ T101] udevd[101]: starting eudev-3.2.11 [ 4.240884][ T100] udevd (100) used greatest stack depth: 22096 bytes left [ 14.514008][ T30] kauditd_printk_skb: 50 callbacks suppressed [ 14.514023][ T30] audit: type=1400 audit(1738045150.639:61): avc: denied { transition } for pid=226 comm="sshd" path="/bin/sh" dev="sda1" ino=89 scontext=system_u:system_r:sshd_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 14.523849][ T30] audit: type=1400 audit(1738045150.639:62): avc: denied { noatsecure } for pid=226 comm="sshd" scontext=system_u:system_r:sshd_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 14.529179][ T30] audit: type=1400 audit(1738045150.639:63): avc: denied { write } for pid=226 comm="sh" path="pipe:[461]" dev="pipefs" ino=461 scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:sshd_t tclass=fifo_file permissive=1 [ 14.541370][ T30] audit: type=1400 audit(1738045150.639:64): avc: denied { rlimitinh } for pid=226 comm="sh" scontext=system_u:system_r:sshd_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 14.559926][ T30] audit: type=1400 audit(1738045150.639:65): avc: denied { siginh } for pid=226 comm="sh" scontext=system_u:system_r:sshd_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 Warning: Permanently added '10.128.1.144' (ED25519) to the list of known hosts. [ 22.303655][ T30] audit: type=1400 audit(1738045158.429:66): avc: denied { integrity } for pid=281 comm="syz-executor" lockdown_reason="debugfs access" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=lockdown permissive=1 [ 22.327505][ T30] audit: type=1400 audit(1738045158.449:67): avc: denied { mounton } for pid=281 comm="syz-executor" path="/syzcgroup/unified" dev="sda1" ino=1925 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 22.328952][ T281] cgroup: Unknown subsys name 'net' [ 22.350234][ T30] audit: type=1400 audit(1738045158.449:68): avc: denied { mount } for pid=281 comm="syz-executor" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 22.377335][ T30] audit: type=1400 audit(1738045158.479:69): avc: denied { unmount } for pid=281 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 22.377536][ T281] cgroup: Unknown subsys name 'devices' [ 22.640234][ T281] cgroup: Unknown subsys name 'hugetlb' [ 22.645651][ T281] cgroup: Unknown subsys name 'rlimit' [ 22.785262][ T30] audit: type=1400 audit(1738045158.909:70): avc: denied { setattr } for pid=281 comm="syz-executor" name="raw-gadget" dev="devtmpfs" ino=250 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 22.808301][ T30] audit: type=1400 audit(1738045158.909:71): avc: denied { mounton } for pid=281 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1 [ 22.815423][ T284] SELinux: Context root:object_r:swapfile_t is not valid (left unmapped). [ 22.833315][ T30] audit: type=1400 audit(1738045158.909:72): avc: denied { mount } for pid=281 comm="syz-executor" name="/" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=filesystem permissive=1 Setting up swapspace version 1, size = 127995904 bytes [ 22.864408][ T30] audit: type=1400 audit(1738045158.969:73): avc: denied { relabelto } for pid=284 comm="mkswap" name="swap-file" dev="sda1" ino=1928 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 22.889951][ T30] audit: type=1400 audit(1738045158.969:74): avc: denied { write } for pid=284 comm="mkswap" path="/root/swap-file" dev="sda1" ino=1928 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 22.919703][ T30] audit: type=1400 audit(1738045159.049:75): avc: denied { read } for pid=281 comm="syz-executor" name="swap-file" dev="sda1" ino=1928 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 22.945617][ T281] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 23.775070][ T292] bridge0: port 1(bridge_slave_0) entered blocking state [ 23.781978][ T292] bridge0: port 1(bridge_slave_0) entered disabled state [ 23.789439][ T292] device bridge_slave_0 entered promiscuous mode [ 23.803063][ T292] bridge0: port 2(bridge_slave_1) entered blocking state [ 23.810063][ T292] bridge0: port 2(bridge_slave_1) entered disabled state [ 23.817246][ T292] device bridge_slave_1 entered promiscuous mode [ 23.843333][ T291] bridge0: port 1(bridge_slave_0) entered blocking state [ 23.850230][ T291] bridge0: port 1(bridge_slave_0) entered disabled state [ 23.857350][ T291] device bridge_slave_0 entered promiscuous mode [ 23.873280][ T291] bridge0: port 2(bridge_slave_1) entered blocking state [ 23.880169][ T291] bridge0: port 2(bridge_slave_1) entered disabled state [ 23.887288][ T291] device bridge_slave_1 entered promiscuous mode [ 23.926505][ T293] bridge0: port 1(bridge_slave_0) entered blocking state [ 23.933513][ T293] bridge0: port 1(bridge_slave_0) entered disabled state [ 23.940773][ T293] device bridge_slave_0 entered promiscuous mode [ 23.947433][ T293] bridge0: port 2(bridge_slave_1) entered blocking state [ 23.954394][ T293] bridge0: port 2(bridge_slave_1) entered disabled state [ 23.961559][ T293] device bridge_slave_1 entered promiscuous mode [ 24.052612][ T294] bridge0: port 1(bridge_slave_0) entered blocking state [ 24.059522][ T294] bridge0: port 1(bridge_slave_0) entered disabled state [ 24.066646][ T294] device bridge_slave_0 entered promiscuous mode [ 24.073177][ T295] bridge0: port 1(bridge_slave_0) entered blocking state [ 24.080032][ T295] bridge0: port 1(bridge_slave_0) entered disabled state [ 24.087213][ T295] device bridge_slave_0 entered promiscuous mode [ 24.095230][ T295] bridge0: port 2(bridge_slave_1) entered blocking state [ 24.102174][ T295] bridge0: port 2(bridge_slave_1) entered disabled state [ 24.109466][ T295] device bridge_slave_1 entered promiscuous mode [ 24.124662][ T294] bridge0: port 2(bridge_slave_1) entered blocking state [ 24.131545][ T294] bridge0: port 2(bridge_slave_1) entered disabled state [ 24.138806][ T294] device bridge_slave_1 entered promiscuous mode [ 24.245981][ T291] bridge0: port 2(bridge_slave_1) entered blocking state [ 24.252845][ T291] bridge0: port 2(bridge_slave_1) entered forwarding state [ 24.259945][ T291] bridge0: port 1(bridge_slave_0) entered blocking state [ 24.266715][ T291] bridge0: port 1(bridge_slave_0) entered forwarding state [ 24.291377][ T292] bridge0: port 2(bridge_slave_1) entered blocking state [ 24.298234][ T292] bridge0: port 2(bridge_slave_1) entered forwarding state [ 24.305448][ T292] bridge0: port 1(bridge_slave_0) entered blocking state [ 24.312284][ T292] bridge0: port 1(bridge_slave_0) entered forwarding state [ 24.338117][ T295] bridge0: port 2(bridge_slave_1) entered blocking state [ 24.344962][ T295] bridge0: port 2(bridge_slave_1) entered forwarding state [ 24.352091][ T295] bridge0: port 1(bridge_slave_0) entered blocking state [ 24.358869][ T295] bridge0: port 1(bridge_slave_0) entered forwarding state [ 24.370513][ T293] bridge0: port 2(bridge_slave_1) entered blocking state [ 24.377494][ T293] bridge0: port 2(bridge_slave_1) entered forwarding state [ 24.384634][ T293] bridge0: port 1(bridge_slave_0) entered blocking state [ 24.391768][ T293] bridge0: port 1(bridge_slave_0) entered forwarding state [ 24.416374][ T294] bridge0: port 2(bridge_slave_1) entered blocking state [ 24.423248][ T294] bridge0: port 2(bridge_slave_1) entered forwarding state [ 24.430369][ T294] bridge0: port 1(bridge_slave_0) entered blocking state [ 24.437114][ T294] bridge0: port 1(bridge_slave_0) entered forwarding state [ 24.471052][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 24.479208][ T8] bridge0: port 1(bridge_slave_0) entered disabled state [ 24.486202][ T8] bridge0: port 2(bridge_slave_1) entered disabled state [ 24.493702][ T8] bridge0: port 1(bridge_slave_0) entered disabled state [ 24.500938][ T8] bridge0: port 2(bridge_slave_1) entered disabled state [ 24.507942][ T8] bridge0: port 1(bridge_slave_0) entered disabled state [ 24.515084][ T8] bridge0: port 2(bridge_slave_1) entered disabled state [ 24.522400][ T8] bridge0: port 1(bridge_slave_0) entered disabled state [ 24.529435][ T8] bridge0: port 1(bridge_slave_0) entered disabled state [ 24.536402][ T8] bridge0: port 2(bridge_slave_1) entered disabled state [ 24.543474][ T8] bridge0: port 2(bridge_slave_1) entered disabled state [ 24.570576][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 24.577914][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 24.585794][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 24.593650][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 24.601940][ T8] bridge0: port 1(bridge_slave_0) entered blocking state [ 24.608804][ T8] bridge0: port 1(bridge_slave_0) entered forwarding state [ 24.616118][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 24.624145][ T8] bridge0: port 1(bridge_slave_0) entered blocking state [ 24.631000][ T8] bridge0: port 1(bridge_slave_0) entered forwarding state [ 24.638201][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 24.646254][ T8] bridge0: port 2(bridge_slave_1) entered blocking state [ 24.653106][ T8] bridge0: port 2(bridge_slave_1) entered forwarding state [ 24.673476][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 24.681659][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 24.689853][ T8] bridge0: port 2(bridge_slave_1) entered blocking state [ 24.696866][ T8] bridge0: port 2(bridge_slave_1) entered forwarding state [ 24.704260][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 24.713050][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 24.721123][ T8] bridge0: port 1(bridge_slave_0) entered blocking state [ 24.727946][ T8] bridge0: port 1(bridge_slave_0) entered forwarding state [ 24.735232][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 24.754346][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 24.762565][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 24.770781][ T8] bridge0: port 2(bridge_slave_1) entered blocking state [ 24.777630][ T8] bridge0: port 2(bridge_slave_1) entered forwarding state [ 24.785120][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 24.793858][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 24.801880][ T8] bridge0: port 1(bridge_slave_0) entered blocking state [ 24.808740][ T8] bridge0: port 1(bridge_slave_0) entered forwarding state [ 24.815932][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 24.824162][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 24.832281][ T8] bridge0: port 2(bridge_slave_1) entered blocking state [ 24.839124][ T8] bridge0: port 2(bridge_slave_1) entered forwarding state [ 24.846288][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 24.854236][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 24.861962][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 24.869853][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 24.899812][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 24.907837][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 24.915703][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 24.923015][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 24.931198][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 24.939383][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 24.947273][ T45] bridge0: port 1(bridge_slave_0) entered blocking state [ 24.954049][ T45] bridge0: port 1(bridge_slave_0) entered forwarding state [ 24.961403][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 24.969768][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 24.977727][ T45] bridge0: port 2(bridge_slave_1) entered blocking state [ 24.984664][ T45] bridge0: port 2(bridge_slave_1) entered forwarding state [ 24.991801][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 24.999842][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 25.007532][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 25.015426][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 25.023273][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 25.031240][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 25.039172][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 25.047073][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 25.055012][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 25.062986][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 25.073525][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 25.081722][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 25.095322][ T292] device veth0_vlan entered promiscuous mode [ 25.107822][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 25.116055][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 25.124425][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 25.132338][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 25.140090][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 25.148236][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 25.156349][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 25.163955][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 25.174174][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 25.182373][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 25.192150][ T291] device veth0_vlan entered promiscuous mode [ 25.210255][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 25.218441][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 25.226205][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 25.233798][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 25.241261][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 25.249019][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 25.256734][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 25.264515][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 25.272305][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 25.280223][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 25.288143][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 25.295441][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 25.302921][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 25.310173][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 25.317357][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 25.324800][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 25.333406][ T294] device veth0_vlan entered promiscuous mode [ 25.343503][ T295] device veth0_vlan entered promiscuous mode [ 25.350110][ T293] device veth0_vlan entered promiscuous mode [ 25.360450][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 25.368656][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 25.380090][ T291] device veth1_macvtap entered promiscuous mode [ 25.387493][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 25.395885][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 25.407046][ T292] device veth1_macvtap entered promiscuous mode [ 25.415015][ T294] device veth1_macvtap entered promiscuous mode [ 25.422032][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 25.430197][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 25.438259][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 25.450840][ T293] device veth1_macvtap entered promiscuous mode [ 25.457795][ T295] device veth1_macvtap entered promiscuous mode [ 25.466610][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 25.475003][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 25.499370][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 25.507463][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 25.515684][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 25.524378][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 25.532857][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 25.541069][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 25.549353][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 25.557332][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 25.565672][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 25.573766][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 25.581924][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 25.590111][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 25.607945][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 25.616548][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 25.616619][ T295] request_module fs-gadgetfs succeeded, but still no fs? [ 25.658476][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 25.666596][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 25.675743][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 25.684061][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 25.692842][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 25.701314][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 25.970992][ T331] bridge0: port 2(bridge_slave_1) entered disabled state [ 25.978094][ T331] bridge0: port 1(bridge_slave_0) entered disabled state [ 26.066699][ C0] hrtimer: interrupt took 30039 ns [ 26.066861][ T339] bridge0: port 2(bridge_slave_1) entered blocking state [ 26.078560][ T339] bridge0: port 2(bridge_slave_1) entered forwarding state [ 26.085618][ T339] bridge0: port 1(bridge_slave_0) entered blocking state [ 26.092418][ T339] bridge0: port 1(bridge_slave_0) entered forwarding state [ 26.179724][ T339] device bridge0 entered promiscuous mode [ 26.374163][ T354] device syzkaller0 entered promiscuous mode [ 27.011679][ T366] device syzkaller0 entered promiscuous mode [ 27.238189][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 27.420972][ T374] device syzkaller0 entered promiscuous mode [ 27.805181][ T379] device syzkaller0 entered promiscuous mode [ 30.366833][ T400] device syzkaller0 entered promiscuous mode [ 30.988732][ T408] device syzkaller0 entered promiscuous mode [ 31.849081][ T426] bridge0: port 2(bridge_slave_1) entered disabled state [ 31.858429][ T426] bridge0: port 1(bridge_slave_0) entered disabled state [ 31.940449][ T434] bridge0: port 2(bridge_slave_1) entered disabled state [ 31.948913][ T434] bridge0: port 1(bridge_slave_0) entered disabled state [ 32.086751][ T440] bridge0: port 2(bridge_slave_1) entered blocking state [ 32.093649][ T440] bridge0: port 2(bridge_slave_1) entered forwarding state [ 32.100770][ T440] bridge0: port 1(bridge_slave_0) entered blocking state [ 32.107608][ T440] bridge0: port 1(bridge_slave_0) entered forwarding state [ 32.115255][ T440] device bridge0 entered promiscuous mode [ 32.121625][ T435] bridge0: port 2(bridge_slave_1) entered blocking state [ 32.128506][ T435] bridge0: port 2(bridge_slave_1) entered forwarding state [ 32.135577][ T435] bridge0: port 1(bridge_slave_0) entered blocking state [ 32.142391][ T435] bridge0: port 1(bridge_slave_0) entered forwarding state [ 32.149949][ T435] device bridge0 entered promiscuous mode [ 33.494533][ T30] kauditd_printk_skb: 38 callbacks suppressed [ 33.494549][ T30] audit: type=1400 audit(1738045169.619:114): avc: denied { ioctl } for pid=470 comm="syz.1.43" path="/dev/ppp" dev="devtmpfs" ino=150 ioctlcmd=0x743e scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ppp_device_t tclass=chr_file permissive=1 [ 34.236528][ T30] audit: type=1400 audit(1738045170.359:115): avc: denied { write } for pid=470 comm="syz.1.43" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 36.658193][ T507] bridge0: port 2(bridge_slave_1) entered disabled state [ 36.665703][ T507] bridge0: port 1(bridge_slave_0) entered disabled state [ 36.850724][ T507] device bridge0 left promiscuous mode [ 36.889934][ T509] bridge0: port 2(bridge_slave_1) entered blocking state [ 36.896850][ T509] bridge0: port 2(bridge_slave_1) entered forwarding state [ 36.904247][ T509] bridge0: port 1(bridge_slave_0) entered blocking state [ 36.911104][ T509] bridge0: port 1(bridge_slave_0) entered forwarding state [ 37.061376][ T509] device bridge0 entered promiscuous mode [ 37.347600][ T30] audit: type=1400 audit(1738045173.469:116): avc: denied { relabelfrom } for pid=517 comm="syz.2.60" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tun_socket permissive=1 [ 37.508078][ T30] audit: type=1400 audit(1738045173.469:117): avc: denied { relabelto } for pid=517 comm="syz.2.60" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tun_socket permissive=1 [ 37.580964][ T521] bridge0: port 2(bridge_slave_1) entered disabled state [ 37.589013][ T521] bridge0: port 1(bridge_slave_0) entered disabled state [ 37.702147][ T525] bridge0: port 2(bridge_slave_1) entered blocking state [ 37.709056][ T525] bridge0: port 2(bridge_slave_1) entered forwarding state [ 37.716144][ T525] bridge0: port 1(bridge_slave_0) entered blocking state [ 37.722924][ T525] bridge0: port 1(bridge_slave_0) entered forwarding state [ 37.736896][ T525] device bridge0 entered promiscuous mode [ 37.898903][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 38.743816][ T559] device syzkaller0 entered promiscuous mode [ 39.972840][ T587] bridge0: port 2(bridge_slave_1) entered disabled state [ 39.981444][ T587] bridge0: port 1(bridge_slave_0) entered disabled state [ 40.099168][ T587] device bridge0 left promiscuous mode [ 40.240774][ T589] bridge0: port 2(bridge_slave_1) entered blocking state [ 40.247679][ T589] bridge0: port 2(bridge_slave_1) entered forwarding state [ 40.254783][ T589] bridge0: port 1(bridge_slave_0) entered blocking state [ 40.261643][ T589] bridge0: port 1(bridge_slave_0) entered forwarding state [ 40.269246][ T589] device bridge0 entered promiscuous mode [ 41.297192][ T516] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 43.993733][ T626] bridge0: port 2(bridge_slave_1) entered disabled state [ 44.001507][ T626] bridge0: port 1(bridge_slave_0) entered disabled state [ 44.118673][ T626] device bridge0 left promiscuous mode [ 44.286670][ T634] bridge0: port 2(bridge_slave_1) entered blocking state [ 44.293561][ T634] bridge0: port 2(bridge_slave_1) entered forwarding state [ 44.300684][ T634] bridge0: port 1(bridge_slave_0) entered blocking state [ 44.307539][ T634] bridge0: port 1(bridge_slave_0) entered forwarding state [ 44.317305][ T634] device bridge0 entered promiscuous mode [ 46.159768][ T674] device syzkaller0 entered promiscuous mode [ 46.354280][ T676] bridge0: port 2(bridge_slave_1) entered disabled state [ 46.362951][ T676] bridge0: port 1(bridge_slave_0) entered disabled state [ 46.375038][ T676] device bridge0 left promiscuous mode [ 46.448049][ T676] bridge0: port 2(bridge_slave_1) entered blocking state [ 46.455242][ T676] bridge0: port 2(bridge_slave_1) entered forwarding state [ 46.464481][ T676] bridge0: port 1(bridge_slave_0) entered blocking state [ 46.471634][ T676] bridge0: port 1(bridge_slave_0) entered forwarding state [ 46.480469][ T676] device bridge0 entered promiscuous mode [ 46.806669][ T692] device syzkaller0 entered promiscuous mode [ 47.023170][ T698] device syzkaller0 entered promiscuous mode [ 47.474192][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 47.927318][ T709] device syzkaller0 entered promiscuous mode [ 48.691964][ T714] bridge0: port 2(bridge_slave_1) entered disabled state [ 48.701393][ T714] bridge0: port 1(bridge_slave_0) entered disabled state [ 48.878604][ T715] bridge0: port 2(bridge_slave_1) entered blocking state [ 48.885493][ T715] bridge0: port 2(bridge_slave_1) entered forwarding state [ 48.892634][ T715] bridge0: port 1(bridge_slave_0) entered blocking state [ 48.899527][ T715] bridge0: port 1(bridge_slave_0) entered forwarding state [ 49.048303][ T715] device bridge0 entered promiscuous mode [ 50.108029][ T733] device syzkaller0 entered promiscuous mode [ 50.461816][ T737] device syzkaller0 entered promiscuous mode [ 50.479538][ T740] device syzkaller0 entered promiscuous mode [ 51.502305][ T755] bridge0: port 2(bridge_slave_1) entered disabled state [ 51.510086][ T755] bridge0: port 1(bridge_slave_0) entered disabled state [ 51.571829][ T755] device bridge0 left promiscuous mode [ 51.907391][ T759] bridge0: port 2(bridge_slave_1) entered blocking state [ 51.914451][ T759] bridge0: port 2(bridge_slave_1) entered forwarding state [ 51.922467][ T759] bridge0: port 1(bridge_slave_0) entered blocking state [ 51.930380][ T759] bridge0: port 1(bridge_slave_0) entered forwarding state [ 52.153917][ T759] device bridge0 entered promiscuous mode [ 52.746378][ T314] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 53.734431][ T778] device syzkaller0 entered promiscuous mode [ 53.804392][ T779] device syzkaller0 entered promiscuous mode [ 54.010657][ T785] device syzkaller0 entered promiscuous mode [ 54.813155][ T806] bridge0: port 2(bridge_slave_1) entered disabled state [ 54.820399][ T806] bridge0: port 1(bridge_slave_0) entered disabled state [ 54.868121][ T806] device bridge0 left promiscuous mode [ 54.890785][ T804] bridge0: port 2(bridge_slave_1) entered blocking state [ 54.898204][ T804] bridge0: port 2(bridge_slave_1) entered forwarding state [ 54.906036][ T804] bridge0: port 1(bridge_slave_0) entered blocking state [ 54.913135][ T804] bridge0: port 1(bridge_slave_0) entered forwarding state [ 55.109657][ T804] device bridge0 entered promiscuous mode [ 55.346717][ T817] device syzkaller0 entered promiscuous mode [ 55.521191][ T819] bridge0: port 2(bridge_slave_1) entered disabled state [ 55.529693][ T819] bridge0: port 1(bridge_slave_0) entered disabled state [ 55.541629][ T819] device bridge0 left promiscuous mode [ 55.637203][ T820] bridge0: port 2(bridge_slave_1) entered blocking state [ 55.644127][ T820] bridge0: port 2(bridge_slave_1) entered forwarding state [ 55.651203][ T820] bridge0: port 1(bridge_slave_0) entered blocking state [ 55.658061][ T820] bridge0: port 1(bridge_slave_0) entered forwarding state [ 55.665195][ T820] device bridge0 entered promiscuous mode [ 55.846652][ T822] bridge0: port 2(bridge_slave_1) entered disabled state [ 55.854264][ T822] bridge0: port 1(bridge_slave_0) entered disabled state [ 55.864415][ T822] device bridge0 left promiscuous mode [ 55.994900][ T822] bridge0: port 2(bridge_slave_1) entered blocking state [ 56.001972][ T822] bridge0: port 2(bridge_slave_1) entered forwarding state [ 56.009830][ T822] bridge0: port 1(bridge_slave_0) entered blocking state [ 56.016811][ T822] bridge0: port 1(bridge_slave_0) entered forwarding state [ 56.027590][ T822] device bridge0 entered promiscuous mode [ 56.568143][ T836] bridge0: port 2(bridge_slave_1) entered disabled state [ 56.575817][ T836] bridge0: port 1(bridge_slave_0) entered disabled state [ 56.714443][ T836] device bridge0 left promiscuous mode [ 56.876732][ T838] bridge0: port 2(bridge_slave_1) entered blocking state [ 56.883626][ T838] bridge0: port 2(bridge_slave_1) entered forwarding state [ 56.890730][ T838] bridge0: port 1(bridge_slave_0) entered blocking state [ 56.897480][ T838] bridge0: port 1(bridge_slave_0) entered forwarding state [ 56.905328][ T838] device bridge0 entered promiscuous mode [ 57.011004][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 60.800256][ T873] bridge0: port 2(bridge_slave_1) entered disabled state [ 60.807238][ T873] bridge0: port 1(bridge_slave_0) entered disabled state [ 60.938490][ T873] device bridge0 left promiscuous mode [ 60.962945][ T867] bridge0: port 2(bridge_slave_1) entered blocking state [ 60.970716][ T867] bridge0: port 2(bridge_slave_1) entered forwarding state [ 60.979191][ T867] bridge0: port 1(bridge_slave_0) entered blocking state [ 60.986204][ T867] bridge0: port 1(bridge_slave_0) entered forwarding state [ 61.189919][ T867] device bridge0 entered promiscuous mode [ 61.290865][ T876] bridge0: port 2(bridge_slave_1) entered disabled state [ 61.299412][ T876] bridge0: port 1(bridge_slave_0) entered disabled state [ 61.310969][ T876] device bridge0 left promiscuous mode [ 61.369090][ T881] bridge0: port 2(bridge_slave_1) entered blocking state [ 61.376088][ T881] bridge0: port 2(bridge_slave_1) entered forwarding state [ 61.383240][ T881] bridge0: port 1(bridge_slave_0) entered blocking state [ 61.390120][ T881] bridge0: port 1(bridge_slave_0) entered forwarding state [ 61.399554][ T881] device bridge0 entered promiscuous mode [ 61.700397][ T880] bridge0: port 2(bridge_slave_1) entered disabled state [ 61.708278][ T880] bridge0: port 1(bridge_slave_0) entered disabled state [ 61.849210][ T880] device bridge0 left promiscuous mode [ 62.000188][ T883] bridge0: port 2(bridge_slave_1) entered blocking state [ 62.007153][ T883] bridge0: port 2(bridge_slave_1) entered forwarding state [ 62.014314][ T883] bridge0: port 1(bridge_slave_0) entered blocking state [ 62.021184][ T883] bridge0: port 1(bridge_slave_0) entered forwarding state [ 62.028751][ T883] device bridge0 entered promiscuous mode [ 62.211342][ T893] device syzkaller0 entered promiscuous mode [ 62.539925][ T903] bridge0: port 2(bridge_slave_1) entered disabled state [ 62.547906][ T903] bridge0: port 1(bridge_slave_0) entered disabled state [ 62.572218][ T903] device bridge0 left promiscuous mode [ 62.668261][ T915] bridge0: port 2(bridge_slave_1) entered blocking state [ 62.675193][ T915] bridge0: port 2(bridge_slave_1) entered forwarding state [ 62.682339][ T915] bridge0: port 1(bridge_slave_0) entered blocking state [ 62.689197][ T915] bridge0: port 1(bridge_slave_0) entered forwarding state [ 62.764616][ T915] device bridge0 entered promiscuous mode [ 64.302772][ T936] device syzkaller0 entered promiscuous mode [ 64.358303][ T934] bridge0: port 2(bridge_slave_1) entered disabled state [ 64.367240][ T934] bridge0: port 1(bridge_slave_0) entered disabled state [ 64.378416][ T934] device bridge0 left promiscuous mode [ 64.461226][ T937] bridge0: port 2(bridge_slave_1) entered blocking state [ 64.468113][ T937] bridge0: port 2(bridge_slave_1) entered forwarding state [ 64.475218][ T937] bridge0: port 1(bridge_slave_0) entered blocking state [ 64.481994][ T937] bridge0: port 1(bridge_slave_0) entered forwarding state [ 64.489606][ T937] device bridge0 entered promiscuous mode [ 64.589390][ T30] audit: type=1400 audit(1738045200.719:118): avc: denied { read } for pid=950 comm="syz.1.202" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 64.657649][ T953] FAULT_INJECTION: forcing a failure. [ 64.657649][ T953] name fail_usercopy, interval 1, probability 0, space 0, times 1 [ 64.678209][ T953] CPU: 0 PID: 953 Comm: syz.4.203 Not tainted 5.15.176-syzkaller-00066-gd1a25a6a4b3b #0 [ 64.687758][ T953] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 12/27/2024 [ 64.697664][ T953] Call Trace: [ 64.700864][ T953] [ 64.703646][ T953] dump_stack_lvl+0x151/0x1c0 [ 64.708160][ T953] ? io_uring_drop_tctx_refs+0x190/0x190 [ 64.713626][ T953] dump_stack+0x15/0x20 [ 64.717615][ T953] should_fail+0x3c6/0x510 [ 64.721867][ T953] should_fail_usercopy+0x1a/0x20 [ 64.726727][ T953] copy_page_from_iter+0x2eb/0x640 [ 64.731678][ T953] pipe_write+0x92b/0x1930 [ 64.735930][ T953] ? pipe_read+0x1040/0x1040 [ 64.740351][ T953] ? selinux_file_permission+0x450/0x570 [ 64.745820][ T953] ? fsnotify_perm+0x6a/0x5b0 [ 64.750336][ T953] ? iov_iter_init+0x53/0x190 [ 64.754849][ T953] vfs_write+0xd5d/0x1110 [ 64.759016][ T953] ? file_end_write+0x1c0/0x1c0 [ 64.763704][ T953] ? __fdget_pos+0x209/0x3a0 [ 64.768129][ T953] ? ksys_write+0x77/0x2c0 [ 64.772383][ T953] ksys_write+0x199/0x2c0 [ 64.776549][ T953] ? __ia32_sys_read+0x90/0x90 [ 64.781146][ T953] ? debug_smp_processor_id+0x17/0x20 [ 64.786353][ T953] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 64.792257][ T953] __x64_sys_write+0x7b/0x90 [ 64.796683][ T953] x64_sys_call+0x2f/0x9a0 [ 64.801029][ T953] do_syscall_64+0x3b/0xb0 [ 64.805290][ T953] ? clear_bhb_loop+0x35/0x90 [ 64.809796][ T953] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 64.815530][ T953] RIP: 0033:0x7f8902972d29 [ 64.819777][ T953] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 64.839219][ T953] RSP: 002b:00007f8900fdd038 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 64.847634][ T953] RAX: ffffffffffffffda RBX: 00007f8902b8bfa0 RCX: 00007f8902972d29 [ 64.855446][ T953] RDX: 000000000000fdef RSI: 0000000020000580 RDI: 0000000000000000 [ 64.863259][ T953] RBP: 00007f8900fdd090 R08: 0000000000000000 R09: 0000000000000000 [ 64.871068][ T953] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 64.878882][ T953] R13: 0000000000000000 R14: 00007f8902b8bfa0 R15: 00007ffd73f86c18 [ 64.886699][ T953] [ 65.016035][ T961] FAULT_INJECTION: forcing a failure. [ 65.016035][ T961] name failslab, interval 1, probability 0, space 0, times 1 [ 65.036501][ T961] CPU: 0 PID: 961 Comm: syz.4.204 Not tainted 5.15.176-syzkaller-00066-gd1a25a6a4b3b #0 [ 65.046053][ T961] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 12/27/2024 [ 65.056384][ T961] Call Trace: [ 65.059508][ T961] [ 65.062287][ T961] dump_stack_lvl+0x151/0x1c0 [ 65.066795][ T961] ? io_uring_drop_tctx_refs+0x190/0x190 [ 65.072291][ T961] ? mq_init+0x157/0x6b0 [ 65.076344][ T961] ? dev_activate+0x127/0x1140 [ 65.080949][ T961] ? __dev_open+0x3bf/0x4e0 [ 65.085285][ T961] ? __dev_change_flags+0x1db/0x6e0 [ 65.090315][ T961] ? dev_ifsioc+0x147/0x10c0 [ 65.094750][ T961] ? dev_ioctl+0x54d/0xe70 [ 65.098994][ T961] ? sock_do_ioctl+0x34f/0x5a0 [ 65.103595][ T961] ? sock_ioctl+0x455/0x740 [ 65.107936][ T961] dump_stack+0x15/0x20 [ 65.111930][ T961] should_fail+0x3c6/0x510 [ 65.116268][ T961] __should_failslab+0xa4/0xe0 [ 65.120870][ T961] should_failslab+0x9/0x20 [ 65.125215][ T961] slab_pre_alloc_hook+0x37/0xd0 [ 65.129983][ T961] __kmalloc+0x6d/0x2c0 [ 65.133979][ T961] ? qdisc_alloc+0x75/0x770 [ 65.138315][ T961] qdisc_alloc+0x75/0x770 [ 65.142488][ T961] qdisc_create_dflt+0x6b/0x3e0 [ 65.147169][ T961] mq_init+0x2c8/0x6b0 [ 65.151075][ T961] ? local_bh_enable+0x30/0x30 [ 65.155670][ T961] ? __kasan_check_write+0x14/0x20 [ 65.160616][ T961] ? qdisc_alloc+0x5a1/0x770 [ 65.165058][ T961] qdisc_create_dflt+0x144/0x3e0 [ 65.169820][ T961] dev_activate+0x127/0x1140 [ 65.174251][ T961] ? dev_set_rx_mode+0x245/0x2e0 [ 65.179017][ T961] __dev_open+0x3bf/0x4e0 [ 65.183187][ T961] ? dev_open+0x260/0x260 [ 65.187353][ T961] ? _raw_spin_unlock_bh+0x51/0x60 [ 65.192297][ T961] ? dev_set_rx_mode+0x245/0x2e0 [ 65.197080][ T961] ? __kasan_check_read+0x11/0x20 [ 65.201936][ T961] __dev_change_flags+0x1db/0x6e0 [ 65.206796][ T961] ? dev_get_flags+0x1e0/0x1e0 [ 65.211480][ T961] ? irqentry_exit+0x30/0x40 [ 65.215904][ T961] ? sysvec_apic_timer_interrupt+0x64/0xc0 [ 65.221719][ T961] ? asm_sysvec_apic_timer_interrupt+0x1b/0x20 [ 65.227713][ T961] dev_change_flags+0x8c/0x1a0 [ 65.232309][ T961] dev_ifsioc+0x147/0x10c0 [ 65.236562][ T961] ? dev_ioctl+0xe70/0xe70 [ 65.240815][ T961] ? mutex_lock+0xb6/0x1e0 [ 65.245064][ T961] ? wait_for_completion_killable_timeout+0x10/0x10 [ 65.251493][ T961] dev_ioctl+0x54d/0xe70 [ 65.255568][ T961] sock_do_ioctl+0x34f/0x5a0 [ 65.259997][ T961] ? sock_show_fdinfo+0xa0/0xa0 [ 65.264687][ T961] ? irqentry_exit+0x30/0x40 [ 65.269106][ T961] ? sysvec_apic_timer_interrupt+0x64/0xc0 [ 65.274752][ T961] ? selinux_file_ioctl+0x3cc/0x540 [ 65.279785][ T961] sock_ioctl+0x455/0x740 [ 65.283949][ T961] ? sock_poll+0x400/0x400 [ 65.288205][ T961] ? __fget_files+0x31e/0x380 [ 65.292717][ T961] ? security_file_ioctl+0x84/0xb0 [ 65.297661][ T961] ? sock_poll+0x400/0x400 [ 65.301919][ T961] __se_sys_ioctl+0x114/0x190 [ 65.306430][ T961] __x64_sys_ioctl+0x7b/0x90 [ 65.310854][ T961] x64_sys_call+0x98/0x9a0 [ 65.315112][ T961] do_syscall_64+0x3b/0xb0 [ 65.319362][ T961] ? clear_bhb_loop+0x35/0x90 [ 65.323962][ T961] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 65.329696][ T961] RIP: 0033:0x7f8902972d29 [ 65.333945][ T961] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 65.353398][ T961] RSP: 002b:00007f8900fdd038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 65.361631][ T961] RAX: ffffffffffffffda RBX: 00007f8902b8bfa0 RCX: 00007f8902972d29 [ 65.369441][ T961] RDX: 0000000020002280 RSI: 0000000000008914 RDI: 0000000000000008 [ 65.377250][ T961] RBP: 00007f8900fdd090 R08: 0000000000000000 R09: 0000000000000000 [ 65.385098][ T961] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 65.392917][ T961] R13: 0000000000000000 R14: 00007f8902b8bfa0 R15: 00007ffd73f86c18 [ 65.400780][ T961] [ 65.463887][ T961] syzkaller0: default qdisc (pfifo_fast) fail, fallback to noqueue [ 65.481371][ T961] device syzkaller0 entered promiscuous mode [ 66.024733][ T30] audit: type=1400 audit(1738045202.149:119): avc: denied { create } for pid=980 comm="syz.0.211" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 66.132097][ T979] device syzkaller0 entered promiscuous mode [ 68.672650][ T30] audit: type=1400 audit(1738045204.799:120): avc: denied { create } for pid=1011 comm="syz.4.220" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=pppox_socket permissive=1 [ 68.793671][ T1015] FAULT_INJECTION: forcing a failure. [ 68.793671][ T1015] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 68.818187][ T30] audit: type=1400 audit(1738045204.879:121): avc: denied { read } for pid=83 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 68.878170][ T1015] CPU: 0 PID: 1015 Comm: syz.4.221 Not tainted 5.15.176-syzkaller-00066-gd1a25a6a4b3b #0 [ 68.887812][ T1015] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 12/27/2024 [ 68.897706][ T1015] Call Trace: [ 68.900833][ T1015] [ 68.903610][ T1015] dump_stack_lvl+0x151/0x1c0 [ 68.908124][ T1015] ? io_uring_drop_tctx_refs+0x190/0x190 [ 68.913591][ T1015] ? __stack_depot_save+0x34/0x470 [ 68.918539][ T1015] ? kmem_cache_free+0x115/0x330 [ 68.923309][ T1015] dump_stack+0x15/0x20 [ 68.927411][ T1015] should_fail+0x3c6/0x510 [ 68.931667][ T1015] should_fail_usercopy+0x1a/0x20 [ 68.936522][ T1015] _copy_from_user+0x20/0xd0 [ 68.940946][ T1015] __copy_msghdr_from_user+0xaf/0x7c0 [ 68.946239][ T1015] ? __ia32_sys_shutdown+0x70/0x70 [ 68.951278][ T1015] ___sys_sendmsg+0x166/0x2e0 [ 68.955799][ T1015] ? __sys_sendmsg+0x260/0x260 [ 68.960389][ T1015] ? putname+0xfa/0x150 [ 68.964383][ T1015] ? __fdget+0x1bc/0x240 [ 68.968457][ T1015] __se_sys_sendmsg+0x19a/0x260 [ 68.973147][ T1015] ? __x64_sys_sendmsg+0x90/0x90 [ 68.977914][ T1015] ? ksys_write+0x260/0x2c0 [ 68.982263][ T1015] ? debug_smp_processor_id+0x17/0x20 [ 68.987463][ T1015] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 68.993365][ T1015] __x64_sys_sendmsg+0x7b/0x90 [ 68.997968][ T1015] x64_sys_call+0x16a/0x9a0 [ 69.002308][ T1015] do_syscall_64+0x3b/0xb0 [ 69.006558][ T1015] ? clear_bhb_loop+0x35/0x90 [ 69.011075][ T1015] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 69.016799][ T1015] RIP: 0033:0x7f8902972d29 [ 69.021055][ T1015] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 69.040936][ T1015] RSP: 002b:00007f8900fdd038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 69.049175][ T1015] RAX: ffffffffffffffda RBX: 00007f8902b8bfa0 RCX: 00007f8902972d29 [ 69.056986][ T1015] RDX: 00000000000400d0 RSI: 0000000020000580 RDI: 0000000000000004 [ 69.064810][ T1015] RBP: 00007f8900fdd090 R08: 0000000000000000 R09: 0000000000000000 [ 69.072608][ T1015] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 69.080417][ T1015] R13: 0000000000000000 R14: 00007f8902b8bfa0 R15: 00007ffd73f86c18 [ 69.088241][ T1015] [ 69.190061][ T1020] device syzkaller0 entered promiscuous mode [ 69.375088][ T1034] FAULT_INJECTION: forcing a failure. [ 69.375088][ T1034] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 69.464411][ T1034] CPU: 0 PID: 1034 Comm: syz.3.237 Not tainted 5.15.176-syzkaller-00066-gd1a25a6a4b3b #0 [ 69.474060][ T1034] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 12/27/2024 [ 69.483956][ T1034] Call Trace: [ 69.487080][ T1034] [ 69.489858][ T1034] dump_stack_lvl+0x151/0x1c0 [ 69.494419][ T1034] ? io_uring_drop_tctx_refs+0x190/0x190 [ 69.499837][ T1034] ? __alloc_pages+0x27e/0x8f0 [ 69.504437][ T1034] dump_stack+0x15/0x20 [ 69.508427][ T1034] should_fail+0x3c6/0x510 [ 69.512788][ T1034] should_fail_usercopy+0x1a/0x20 [ 69.517645][ T1034] copy_page_from_iter+0x2eb/0x640 [ 69.522596][ T1034] tun_get_user+0x76e/0x3aa0 [ 69.527020][ T1034] ? __x64_sys_openat+0x170/0x290 [ 69.531878][ T1034] ? tun_do_read+0x2010/0x2010 [ 69.536473][ T1034] ? kstrtouint_from_user+0x20a/0x2a0 [ 69.541687][ T1034] ? kstrtol_from_user+0x310/0x310 [ 69.546639][ T1034] ? bpf_ringbuf_reserve+0x5c/0x70 [ 69.551582][ T1034] ? avc_policy_seqno+0x1b/0x70 [ 69.556265][ T1034] ? selinux_file_permission+0x2c4/0x570 [ 69.561908][ T1034] tun_chr_write_iter+0x1e1/0x2e0 [ 69.567214][ T1034] vfs_write+0xd5d/0x1110 [ 69.571468][ T1034] ? file_end_write+0x1c0/0x1c0 [ 69.576157][ T1034] ? __fdget_pos+0x209/0x3a0 [ 69.580578][ T1034] ? ksys_write+0x77/0x2c0 [ 69.584853][ T1034] ksys_write+0x199/0x2c0 [ 69.589006][ T1034] ? __ia32_sys_read+0x90/0x90 [ 69.593683][ T1034] ? debug_smp_processor_id+0x17/0x20 [ 69.598892][ T1034] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 69.604795][ T1034] __x64_sys_write+0x7b/0x90 [ 69.609220][ T1034] x64_sys_call+0x2f/0x9a0 [ 69.613474][ T1034] do_syscall_64+0x3b/0xb0 [ 69.617722][ T1034] ? clear_bhb_loop+0x35/0x90 [ 69.622235][ T1034] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 69.627968][ T1034] RIP: 0033:0x7f94d375dd29 [ 69.632219][ T1034] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 69.651658][ T1034] RSP: 002b:00007f94d1dc8038 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 69.659915][ T1034] RAX: ffffffffffffffda RBX: 00007f94d3976fa0 RCX: 00007f94d375dd29 [ 69.667728][ T1034] RDX: 0000000000000011 RSI: 0000000020000240 RDI: 00000000000000c8 [ 69.675527][ T1034] RBP: 00007f94d1dc8090 R08: 0000000000000000 R09: 0000000000000000 [ 69.683350][ T1034] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 69.691158][ T1034] R13: 0000000000000000 R14: 00007f94d3976fa0 R15: 00007ffd25dc5628 [ 69.698965][ T1034] [ 70.572482][ T1036] bridge0: port 3(veth0_to_batadv) entered blocking state [ 70.585609][ T1036] bridge0: port 3(veth0_to_batadv) entered disabled state [ 70.618596][ T30] audit: type=1400 audit(1738045206.739:122): avc: denied { create } for pid=1035 comm="syz.1.228" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=atmpvc_socket permissive=1 [ 70.642843][ T1036] device veth0_to_batadv entered promiscuous mode [ 70.651210][ T1036] bridge0: port 3(veth0_to_batadv) entered blocking state [ 70.658987][ T1036] bridge0: port 3(veth0_to_batadv) entered forwarding state [ 70.690197][ T1044] bridge0: port 2(bridge_slave_1) entered disabled state [ 70.697217][ T1044] bridge0: port 1(bridge_slave_0) entered disabled state [ 70.721675][ T1044] device bridge0 left promiscuous mode [ 70.889145][ T1044] bridge0: port 2(bridge_slave_1) entered blocking state [ 70.896060][ T1044] bridge0: port 2(bridge_slave_1) entered forwarding state [ 70.903167][ T1044] bridge0: port 1(bridge_slave_0) entered blocking state [ 70.909919][ T1044] bridge0: port 1(bridge_slave_0) entered forwarding state [ 70.922782][ T1044] device bridge0 entered promiscuous mode [ 70.949316][ T1049] device syzkaller0 entered promiscuous mode [ 71.006258][ T1049] FAULT_INJECTION: forcing a failure. [ 71.006258][ T1049] name failslab, interval 1, probability 0, space 0, times 0 [ 71.018827][ T1049] CPU: 0 PID: 1049 Comm: syz.3.232 Not tainted 5.15.176-syzkaller-00066-gd1a25a6a4b3b #0 [ 71.028410][ T1049] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 12/27/2024 [ 71.038305][ T1049] Call Trace: [ 71.041432][ T1049] [ 71.044207][ T1049] dump_stack_lvl+0x151/0x1c0 [ 71.048720][ T1049] ? io_uring_drop_tctx_refs+0x190/0x190 [ 71.054192][ T1049] dump_stack+0x15/0x20 [ 71.058203][ T1049] should_fail+0x3c6/0x510 [ 71.062434][ T1049] __should_failslab+0xa4/0xe0 [ 71.067036][ T1049] ? __alloc_skb+0xbe/0x550 [ 71.071373][ T1049] should_failslab+0x9/0x20 [ 71.075713][ T1049] slab_pre_alloc_hook+0x37/0xd0 [ 71.080486][ T1049] ? __alloc_skb+0xbe/0x550 [ 71.084827][ T1049] kmem_cache_alloc+0x44/0x250 [ 71.089438][ T1049] __alloc_skb+0xbe/0x550 [ 71.093609][ T1049] inet6_rt_notify+0x2db/0x550 [ 71.098200][ T1049] ? __stack_depot_save+0x34/0x470 [ 71.103144][ T1049] ? rt6_nh_dump_exceptions+0x650/0x650 [ 71.108522][ T1049] fib6_del+0xce0/0x1060 [ 71.112726][ T1049] ? fib6_locate+0x560/0x560 [ 71.117239][ T1049] ? enqueue_task_fair+0xd31/0x2650 [ 71.122358][ T1049] fib6_clean_node+0x2ed/0x550 [ 71.126955][ T1049] ? node_free_rcu+0x30/0x30 [ 71.131382][ T1049] ? __kasan_check_write+0x14/0x20 [ 71.136327][ T1049] ? resched_curr+0x9d/0x1c0 [ 71.140756][ T1049] fib6_walk_continue+0x52d/0x720 [ 71.145629][ T1049] fib6_walk+0x172/0x2d0 [ 71.149698][ T1049] fib6_clean_all+0x202/0x2c0 [ 71.154209][ T1049] ? rt6_sync_down_dev+0x170/0x170 [ 71.159164][ T1049] ? fib6_del+0x1060/0x1060 [ 71.163496][ T1049] ? _raw_spin_unlock_irqrestore+0x5c/0x80 [ 71.169140][ T1049] ? node_free_rcu+0x30/0x30 [ 71.173568][ T1049] ? rt6_sync_down_dev+0x170/0x170 [ 71.178599][ T1049] ? try_invoke_on_locked_down_task+0x2a0/0x2a0 [ 71.184675][ T1049] ? schedule_preempt_disabled+0x20/0x20 [ 71.190150][ T1049] rt6_disable_ip+0x153/0x730 [ 71.194653][ T1049] ? preempt_schedule_thunk+0x16/0x18 [ 71.199863][ T1049] ? tracing_record_taskinfo+0x50/0x230 [ 71.205245][ T1049] ? fib6_ifdown+0x510/0x510 [ 71.209667][ T1049] ? __kasan_check_read+0x11/0x20 [ 71.214530][ T1049] addrconf_ifdown+0x160/0x1ae0 [ 71.219218][ T1049] ? wq_worker_last_func+0x50/0x50 [ 71.224164][ T1049] ? addrconf_cleanup+0x1b0/0x1b0 [ 71.229026][ T1049] ? mutex_unlock+0xb2/0x260 [ 71.233463][ T1049] ? __mutex_lock_slowpath+0x10/0x10 [ 71.238576][ T1049] ? nf_nat_masq_schedule+0x620/0x620 [ 71.243783][ T1049] ? masq_device_event+0xd0/0xd0 [ 71.248550][ T1049] addrconf_notify+0x37d/0xdd0 [ 71.253150][ T1049] raw_notifier_call_chain+0x8c/0xf0 [ 71.258270][ T1049] dev_close_many+0x37c/0x530 [ 71.262796][ T1049] ? __dev_open+0x4e0/0x4e0 [ 71.267125][ T1049] ? __kasan_check_read+0x11/0x20 [ 71.271986][ T1049] unregister_netdevice_many+0x492/0x17c0 [ 71.277541][ T1049] ? kmem_cache_free+0x115/0x330 [ 71.282405][ T1049] ? __kasan_check_write+0x14/0x20 [ 71.287350][ T1049] ? alloc_netdev_mqs+0xc90/0xc90 [ 71.292211][ T1049] ? __kasan_check_read+0x11/0x20 [ 71.297072][ T1049] unregister_netdevice_queue+0x2e6/0x350 [ 71.302624][ T1049] ? linkwatch_urgent_event+0x335/0x4d0 [ 71.308007][ T1049] ? list_netdevice+0x4c0/0x4c0 [ 71.312694][ T1049] __tun_detach+0xd14/0x1510 [ 71.317118][ T1049] ? wait_for_completion_killable_timeout+0x10/0x10 [ 71.323541][ T1049] ? tun_chr_open+0x530/0x530 [ 71.328055][ T1049] tun_chr_close+0x92/0x140 [ 71.332393][ T1049] __fput+0x228/0x8c0 [ 71.336218][ T1049] ____fput+0x15/0x20 [ 71.340029][ T1049] task_work_run+0x129/0x190 [ 71.344462][ T1049] exit_to_user_mode_loop+0xc4/0xe0 [ 71.349515][ T1049] exit_to_user_mode_prepare+0x5a/0xa0 [ 71.354801][ T1049] syscall_exit_to_user_mode+0x26/0x160 [ 71.360170][ T1049] do_syscall_64+0x47/0xb0 [ 71.364424][ T1049] ? clear_bhb_loop+0x35/0x90 [ 71.369032][ T1049] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 71.374844][ T1049] RIP: 0033:0x7f94d375dd29 [ 71.379106][ T1049] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 71.398715][ T1049] RSP: 002b:00007f94d1dc8038 EFLAGS: 00000246 ORIG_RAX: 0000000000000003 [ 71.406964][ T1049] RAX: 0000000000000000 RBX: 00007f94d3976fa0 RCX: 00007f94d375dd29 [ 71.414772][ T1049] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000008 [ 71.422579][ T1049] RBP: 00007f94d1dc8090 R08: 0000000000000000 R09: 0000000000000000 [ 71.430393][ T1049] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 71.438208][ T1049] R13: 0000000000000000 R14: 00007f94d3976fa0 R15: 00007ffd25dc5628 [ 71.446024][ T1049] [ 71.466872][ T30] audit: type=1400 audit(1738045207.589:123): avc: denied { remove_name } for pid=83 comm="syslogd" name="messages" dev="tmpfs" ino=2 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 71.563656][ T30] audit: type=1400 audit(1738045207.589:124): avc: denied { rename } for pid=83 comm="syslogd" name="messages" dev="tmpfs" ino=2 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 71.909447][ T1077] device syzkaller0 entered promiscuous mode [ 71.974972][ T1081] FAULT_INJECTION: forcing a failure. [ 71.974972][ T1081] name failslab, interval 1, probability 0, space 0, times 0 [ 71.988418][ T1081] CPU: 0 PID: 1081 Comm: syz.3.252 Not tainted 5.15.176-syzkaller-00066-gd1a25a6a4b3b #0 [ 71.998053][ T1081] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 12/27/2024 [ 72.007944][ T1081] Call Trace: [ 72.011074][ T1081] [ 72.013845][ T1081] dump_stack_lvl+0x151/0x1c0 [ 72.018371][ T1081] ? io_uring_drop_tctx_refs+0x190/0x190 [ 72.023828][ T1081] dump_stack+0x15/0x20 [ 72.027914][ T1081] should_fail+0x3c6/0x510 [ 72.032264][ T1081] __should_failslab+0xa4/0xe0 [ 72.036930][ T1081] should_failslab+0x9/0x20 [ 72.041268][ T1081] slab_pre_alloc_hook+0x37/0xd0 [ 72.046045][ T1081] ? rtmsg_ifinfo_build_skb+0x7f/0x180 [ 72.051425][ T1081] __kmalloc_track_caller+0x6c/0x2c0 [ 72.056545][ T1081] ? rtmsg_ifinfo_build_skb+0x7f/0x180 [ 72.061841][ T1081] ? rtmsg_ifinfo_build_skb+0x7f/0x180 [ 72.067135][ T1081] __alloc_skb+0x10c/0x550 [ 72.071390][ T1081] rtmsg_ifinfo_build_skb+0x7f/0x180 [ 72.076512][ T1081] rtnetlink_event+0xf3/0x1b0 [ 72.081023][ T1081] raw_notifier_call_chain+0x8c/0xf0 [ 72.086149][ T1081] dev_set_mac_address+0x325/0x470 [ 72.091098][ T1081] ? dev_pre_changeaddr_notify+0x220/0x220 [ 72.096735][ T1081] dev_set_mac_address_user+0x31/0x50 [ 72.101941][ T1081] dev_ifsioc+0x7ef/0x10c0 [ 72.106192][ T1081] ? dev_ioctl+0xe70/0xe70 [ 72.110442][ T1081] ? mutex_lock+0x135/0x1e0 [ 72.114782][ T1081] ? wait_for_completion_killable_timeout+0x10/0x10 [ 72.121210][ T1081] dev_ioctl+0x54d/0xe70 [ 72.125289][ T1081] sock_do_ioctl+0x34f/0x5a0 [ 72.129715][ T1081] ? sock_show_fdinfo+0xa0/0xa0 [ 72.134400][ T1081] ? selinux_file_ioctl+0x3cc/0x540 [ 72.139434][ T1081] sock_ioctl+0x455/0x740 [ 72.143601][ T1081] ? sock_poll+0x400/0x400 [ 72.147938][ T1081] ? __fget_files+0x31e/0x380 [ 72.152455][ T1081] ? security_file_ioctl+0x84/0xb0 [ 72.157405][ T1081] ? sock_poll+0x400/0x400 [ 72.161739][ T1081] __se_sys_ioctl+0x114/0x190 [ 72.166266][ T1081] __x64_sys_ioctl+0x7b/0x90 [ 72.170766][ T1081] x64_sys_call+0x98/0x9a0 [ 72.175126][ T1081] do_syscall_64+0x3b/0xb0 [ 72.179375][ T1081] ? clear_bhb_loop+0x35/0x90 [ 72.183895][ T1081] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 72.189619][ T1081] RIP: 0033:0x7f94d375dd29 [ 72.193880][ T1081] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 72.213316][ T1081] RSP: 002b:00007f94d1dc8038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 72.221557][ T1081] RAX: ffffffffffffffda RBX: 00007f94d3976fa0 RCX: 00007f94d375dd29 [ 72.229365][ T1081] RDX: 0000000020000000 RSI: 0000000000008924 RDI: 000000000000000a [ 72.237195][ T1081] RBP: 00007f94d1dc8090 R08: 0000000000000000 R09: 0000000000000000 [ 72.244988][ T1081] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 72.252799][ T1081] R13: 0000000000000000 R14: 00007f94d3976fa0 R15: 00007ffd25dc5628 [ 72.260615][ T1081] [ 72.357961][ T1087] bridge0: port 2(bridge_slave_1) entered disabled state [ 72.365896][ T1087] bridge0: port 1(bridge_slave_0) entered disabled state [ 72.381571][ T1087] device bridge0 left promiscuous mode [ 72.477544][ T1088] bridge0: port 2(bridge_slave_1) entered blocking state [ 72.484566][ T1088] bridge0: port 2(bridge_slave_1) entered forwarding state [ 72.491653][ T1088] bridge0: port 1(bridge_slave_0) entered blocking state [ 72.498652][ T1088] bridge0: port 1(bridge_slave_0) entered forwarding state [ 72.509526][ T1088] device bridge0 entered promiscuous mode [ 72.684036][ T1101] FAULT_INJECTION: forcing a failure. [ 72.684036][ T1101] name failslab, interval 1, probability 0, space 0, times 0 [ 72.793110][ T1101] CPU: 1 PID: 1101 Comm: syz.1.249 Not tainted 5.15.176-syzkaller-00066-gd1a25a6a4b3b #0 [ 72.803287][ T1101] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 12/27/2024 [ 72.813181][ T1101] Call Trace: [ 72.816299][ T1101] [ 72.819076][ T1101] dump_stack_lvl+0x151/0x1c0 [ 72.823594][ T1101] ? io_uring_drop_tctx_refs+0x190/0x190 [ 72.829062][ T1101] dump_stack+0x15/0x20 [ 72.833053][ T1101] should_fail+0x3c6/0x510 [ 72.837308][ T1101] __should_failslab+0xa4/0xe0 [ 72.841908][ T1101] ? __alloc_skb+0xbe/0x550 [ 72.846254][ T1101] should_failslab+0x9/0x20 [ 72.850594][ T1101] slab_pre_alloc_hook+0x37/0xd0 [ 72.855358][ T1101] ? __alloc_skb+0xbe/0x550 [ 72.859697][ T1101] kmem_cache_alloc+0x44/0x250 [ 72.864303][ T1101] __alloc_skb+0xbe/0x550 [ 72.868464][ T1101] rtmsg_ifinfo_build_skb+0x7f/0x180 [ 72.873586][ T1101] rtnetlink_event+0xf3/0x1b0 [ 72.878100][ T1101] raw_notifier_call_chain+0x8c/0xf0 [ 72.883304][ T1101] dev_set_mac_address+0x325/0x470 [ 72.888249][ T1101] ? dev_pre_changeaddr_notify+0x220/0x220 [ 72.893910][ T1101] dev_set_mac_address_user+0x31/0x50 [ 72.899105][ T1101] dev_ifsioc+0x7ef/0x10c0 [ 72.903352][ T1101] ? dev_ioctl+0xe70/0xe70 [ 72.907601][ T1101] ? mutex_lock+0xb6/0x1e0 [ 72.911854][ T1101] ? wait_for_completion_killable_timeout+0x10/0x10 [ 72.918277][ T1101] dev_ioctl+0x54d/0xe70 [ 72.922356][ T1101] sock_do_ioctl+0x34f/0x5a0 [ 72.926791][ T1101] ? sock_show_fdinfo+0xa0/0xa0 [ 72.931476][ T1101] ? selinux_file_ioctl+0x3cc/0x540 [ 72.936504][ T1101] sock_ioctl+0x455/0x740 [ 72.940672][ T1101] ? sock_poll+0x400/0x400 [ 72.944929][ T1101] ? __fget_files+0x31e/0x380 [ 72.949444][ T1101] ? security_file_ioctl+0x84/0xb0 [ 72.954386][ T1101] ? sock_poll+0x400/0x400 [ 72.958643][ T1101] __se_sys_ioctl+0x114/0x190 [ 72.963155][ T1101] __x64_sys_ioctl+0x7b/0x90 [ 72.967583][ T1101] x64_sys_call+0x98/0x9a0 [ 72.971839][ T1101] do_syscall_64+0x3b/0xb0 [ 72.976087][ T1101] ? clear_bhb_loop+0x35/0x90 [ 72.980613][ T1101] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 72.986326][ T1101] RIP: 0033:0x7fad91d19d29 [ 72.990581][ T1101] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 73.010026][ T1101] RSP: 002b:00007fad90384038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 73.018356][ T1101] RAX: ffffffffffffffda RBX: 00007fad91f32fa0 RCX: 00007fad91d19d29 [ 73.026165][ T1101] RDX: 0000000020000000 RSI: 0000000000008924 RDI: 0000000000000009 [ 73.033979][ T1101] RBP: 00007fad90384090 R08: 0000000000000000 R09: 0000000000000000 [ 73.041809][ T1101] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 73.049598][ T1101] R13: 0000000000000000 R14: 00007fad91f32fa0 R15: 00007ffcf9a0ef58 [ 73.057414][ T1101] [ 73.131977][ T1112] FAULT_INJECTION: forcing a failure. [ 73.131977][ T1112] name failslab, interval 1, probability 0, space 0, times 0 [ 73.144608][ T1112] CPU: 1 PID: 1112 Comm: syz.3.253 Not tainted 5.15.176-syzkaller-00066-gd1a25a6a4b3b #0 [ 73.154239][ T1112] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 12/27/2024 [ 73.164136][ T1112] Call Trace: [ 73.167257][ T1112] [ 73.170040][ T1112] dump_stack_lvl+0x151/0x1c0 [ 73.174545][ T1112] ? io_uring_drop_tctx_refs+0x190/0x190 [ 73.180014][ T1112] ? slab_post_alloc_hook+0x53/0x2c0 [ 73.185135][ T1112] ? security_inode_alloc+0x29/0x120 [ 73.190252][ T1112] ? inode_init_always+0x76d/0x9d0 [ 73.195202][ T1112] ? new_inode_pseudo+0x93/0x220 [ 73.199978][ T1112] ? proc_pid_make_inode+0x27/0x1d0 [ 73.205011][ T1112] ? proc_pident_instantiate+0x7a/0x2e0 [ 73.210393][ T1112] ? proc_pident_lookup+0x1c4/0x260 [ 73.215424][ T1112] ? proc_tid_base_lookup+0x2b/0x30 [ 73.220457][ T1112] dump_stack+0x15/0x20 [ 73.224457][ T1112] should_fail+0x3c6/0x510 [ 73.228705][ T1112] __should_failslab+0xa4/0xe0 [ 73.233306][ T1112] ? __alloc_skb+0xbe/0x550 [ 73.237647][ T1112] should_failslab+0x9/0x20 [ 73.241980][ T1112] slab_pre_alloc_hook+0x37/0xd0 [ 73.246776][ T1112] ? __alloc_skb+0xbe/0x550 [ 73.251095][ T1112] kmem_cache_alloc+0x44/0x250 [ 73.255702][ T1112] __alloc_skb+0xbe/0x550 [ 73.259861][ T1112] alloc_skb_with_frags+0xa6/0x680 [ 73.264805][ T1112] ? memcpy+0x56/0x70 [ 73.268634][ T1112] sock_alloc_send_pskb+0x915/0xa50 [ 73.273670][ T1112] ? sock_kzfree_s+0x60/0x60 [ 73.278083][ T1112] ? __kasan_check_write+0x14/0x20 [ 73.283032][ T1112] ? _raw_spin_lock+0xa4/0x1b0 [ 73.287634][ T1112] ? _raw_spin_trylock_bh+0x190/0x190 [ 73.292842][ T1112] unix_dgram_sendmsg+0x6fd/0x2090 [ 73.297792][ T1112] ? unix_dgram_poll+0x690/0x690 [ 73.302561][ T1112] ? kasan_set_track+0x5d/0x70 [ 73.307167][ T1112] ? kasan_set_track+0x4b/0x70 [ 73.311770][ T1112] ? security_socket_sendmsg+0x82/0xb0 [ 73.317065][ T1112] ? unix_dgram_poll+0x690/0x690 [ 73.321836][ T1112] ____sys_sendmsg+0x59e/0x8f0 [ 73.326430][ T1112] ? __sys_sendmsg_sock+0x40/0x40 [ 73.331290][ T1112] ? import_iovec+0xe5/0x120 [ 73.335716][ T1112] ___sys_sendmsg+0x252/0x2e0 [ 73.340228][ T1112] ? __sys_sendmsg+0x260/0x260 [ 73.344832][ T1112] ? putname+0xfa/0x150 [ 73.348824][ T1112] ? __fdget+0x1bc/0x240 [ 73.352907][ T1112] __se_sys_sendmsg+0x19a/0x260 [ 73.357589][ T1112] ? __x64_sys_sendmsg+0x90/0x90 [ 73.362361][ T1112] ? ksys_write+0x260/0x2c0 [ 73.366701][ T1112] ? debug_smp_processor_id+0x17/0x20 [ 73.371916][ T1112] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 73.377819][ T1112] __x64_sys_sendmsg+0x7b/0x90 [ 73.382415][ T1112] x64_sys_call+0x16a/0x9a0 [ 73.386864][ T1112] do_syscall_64+0x3b/0xb0 [ 73.391094][ T1112] ? clear_bhb_loop+0x35/0x90 [ 73.395611][ T1112] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 73.401334][ T1112] RIP: 0033:0x7f94d375dd29 [ 73.405585][ T1112] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 73.425027][ T1112] RSP: 002b:00007f94d1dc8038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 73.433270][ T1112] RAX: ffffffffffffffda RBX: 00007f94d3976fa0 RCX: 00007f94d375dd29 [ 73.441079][ T1112] RDX: 0000000000000000 RSI: 0000000020000500 RDI: 0000000000000004 [ 73.448890][ T1112] RBP: 00007f94d1dc8090 R08: 0000000000000000 R09: 0000000000000000 [ 73.456817][ T1112] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 73.464618][ T1112] R13: 0000000000000000 R14: 00007f94d3976fa0 R15: 00007ffd25dc5628 [ 73.472442][ T1112] [ 73.475908][ T1109] device wg2 entered promiscuous mode [ 73.509175][ T1115] bond_slave_1: mtu less than device minimum [ 73.707052][ T1128] device syzkaller0 entered promiscuous mode [ 74.144912][ T1134] bridge0: port 2(bridge_slave_1) entered disabled state [ 74.152692][ T1134] bridge0: port 1(bridge_slave_0) entered disabled state [ 74.297371][ T1134] device bridge0 left promiscuous mode [ 74.366362][ T1141] device sit0 entered promiscuous mode [ 74.548388][ T1135] bridge0: port 2(bridge_slave_1) entered disabled state [ 74.556001][ T1135] bridge0: port 1(bridge_slave_0) entered disabled state [ 74.569605][ T1135] device bridge0 left promiscuous mode [ 74.631088][ T1143] bridge0: port 2(bridge_slave_1) entered blocking state [ 74.637997][ T1143] bridge0: port 2(bridge_slave_1) entered forwarding state [ 74.645084][ T1143] bridge0: port 1(bridge_slave_0) entered blocking state [ 74.651892][ T1143] bridge0: port 1(bridge_slave_0) entered forwarding state [ 74.660273][ T1143] device bridge0 entered promiscuous mode [ 74.667360][ T1153] FAULT_INJECTION: forcing a failure. [ 74.667360][ T1153] name failslab, interval 1, probability 0, space 0, times 0 [ 74.688050][ T1145] bridge0: port 2(bridge_slave_1) entered blocking state [ 74.694924][ T1145] bridge0: port 2(bridge_slave_1) entered forwarding state [ 74.702067][ T1145] bridge0: port 1(bridge_slave_0) entered blocking state [ 74.708934][ T1145] bridge0: port 1(bridge_slave_0) entered forwarding state [ 74.717344][ T1153] CPU: 0 PID: 1153 Comm: syz.3.267 Not tainted 5.15.176-syzkaller-00066-gd1a25a6a4b3b #0 [ 74.727061][ T1153] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 12/27/2024 [ 74.737052][ T1153] Call Trace: [ 74.740171][ T1153] [ 74.742948][ T1153] dump_stack_lvl+0x151/0x1c0 [ 74.747457][ T1153] ? io_uring_drop_tctx_refs+0x190/0x190 [ 74.752931][ T1153] dump_stack+0x15/0x20 [ 74.756920][ T1153] should_fail+0x3c6/0x510 [ 74.761174][ T1153] __should_failslab+0xa4/0xe0 [ 74.765776][ T1153] ? __build_skb+0x2a/0x300 [ 74.770196][ T1153] should_failslab+0x9/0x20 [ 74.774709][ T1153] slab_pre_alloc_hook+0x37/0xd0 [ 74.779495][ T1153] ? __build_skb+0x2a/0x300 [ 74.783822][ T1153] kmem_cache_alloc+0x44/0x250 [ 74.788428][ T1153] __build_skb+0x2a/0x300 [ 74.792590][ T1153] build_skb+0x25/0x1f0 [ 74.796586][ T1153] tun_get_user+0x1c7e/0x3aa0 [ 74.801226][ T1153] ? __x64_sys_openat+0x170/0x290 [ 74.806087][ T1153] ? tun_do_read+0x2010/0x2010 [ 74.810682][ T1153] ? kstrtouint_from_user+0x20a/0x2a0 [ 74.815891][ T1153] ? kstrtol_from_user+0x310/0x310 [ 74.820936][ T1153] ? bpf_ringbuf_reserve+0x5c/0x70 [ 74.825983][ T1153] ? avc_policy_seqno+0x1b/0x70 [ 74.830831][ T1153] ? selinux_file_permission+0x2c4/0x570 [ 74.836298][ T1153] tun_chr_write_iter+0x1e1/0x2e0 [ 74.841162][ T1153] vfs_write+0xd5d/0x1110 [ 74.845327][ T1153] ? file_end_write+0x1c0/0x1c0 [ 74.850017][ T1153] ? __fdget_pos+0x209/0x3a0 [ 74.854457][ T1153] ? ksys_write+0x77/0x2c0 [ 74.858693][ T1153] ksys_write+0x199/0x2c0 [ 74.862864][ T1153] ? __ia32_sys_read+0x90/0x90 [ 74.867458][ T1153] ? debug_smp_processor_id+0x17/0x20 [ 74.872665][ T1153] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 74.878569][ T1153] __x64_sys_write+0x7b/0x90 [ 74.882990][ T1153] x64_sys_call+0x2f/0x9a0 [ 74.887246][ T1153] do_syscall_64+0x3b/0xb0 [ 74.891522][ T1153] ? clear_bhb_loop+0x35/0x90 [ 74.896024][ T1153] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 74.901742][ T1153] RIP: 0033:0x7f94d375dd29 [ 74.905993][ T1153] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 74.925438][ T1153] RSP: 002b:00007f94d1dc8038 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 74.933680][ T1153] RAX: ffffffffffffffda RBX: 00007f94d3976fa0 RCX: 00007f94d375dd29 [ 74.941488][ T1153] RDX: 0000000000000011 RSI: 0000000020000240 RDI: 00000000000000c8 [ 74.949326][ T1153] RBP: 00007f94d1dc8090 R08: 0000000000000000 R09: 0000000000000000 [ 74.957112][ T1153] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 74.964927][ T1153] R13: 0000000000000000 R14: 00007f94d3976fa0 R15: 00007ffd25dc5628 [ 74.972741][ T1153] [ 74.980457][ T1145] device bridge0 entered promiscuous mode [ 75.082074][ T1159] FAULT_INJECTION: forcing a failure. [ 75.082074][ T1159] name failslab, interval 1, probability 0, space 0, times 0 [ 75.095764][ T1159] CPU: 0 PID: 1159 Comm: syz.3.269 Not tainted 5.15.176-syzkaller-00066-gd1a25a6a4b3b #0 [ 75.105487][ T1159] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 12/27/2024 [ 75.115379][ T1159] Call Trace: [ 75.118508][ T1159] [ 75.121283][ T1159] dump_stack_lvl+0x151/0x1c0 [ 75.125823][ T1159] ? io_uring_drop_tctx_refs+0x190/0x190 [ 75.131353][ T1159] dump_stack+0x15/0x20 [ 75.135342][ T1159] should_fail+0x3c6/0x510 [ 75.139595][ T1159] __should_failslab+0xa4/0xe0 [ 75.144297][ T1159] should_failslab+0x9/0x20 [ 75.148622][ T1159] slab_pre_alloc_hook+0x37/0xd0 [ 75.153396][ T1159] __kmalloc+0x6d/0x2c0 [ 75.157387][ T1159] ? kvmalloc_node+0x1f0/0x4d0 [ 75.161995][ T1159] kvmalloc_node+0x1f0/0x4d0 [ 75.166411][ T1159] ? vm_mmap+0xb0/0xb0 [ 75.170322][ T1159] ? __kasan_check_write+0x14/0x20 [ 75.175264][ T1159] pfifo_fast_init+0x25e/0x7a0 [ 75.179867][ T1159] qdisc_create_dflt+0x144/0x3e0 [ 75.184648][ T1159] mq_init+0x2c8/0x6b0 [ 75.188564][ T1159] ? local_bh_enable+0x30/0x30 [ 75.193144][ T1159] ? __kasan_check_write+0x14/0x20 [ 75.198089][ T1159] ? qdisc_alloc+0x5a1/0x770 [ 75.202606][ T1159] qdisc_create_dflt+0x144/0x3e0 [ 75.207394][ T1159] ? _raw_spin_lock+0xa4/0x1b0 [ 75.211979][ T1159] dev_activate+0x127/0x1140 [ 75.216404][ T1159] ? dev_set_rx_mode+0x245/0x2e0 [ 75.221178][ T1159] __dev_open+0x3bf/0x4e0 [ 75.225536][ T1159] ? dev_open+0x260/0x260 [ 75.229727][ T1159] ? _raw_spin_unlock_bh+0x51/0x60 [ 75.234672][ T1159] ? dev_set_rx_mode+0x245/0x2e0 [ 75.239433][ T1159] ? __kasan_check_read+0x11/0x20 [ 75.244442][ T1159] __dev_change_flags+0x1db/0x6e0 [ 75.249304][ T1159] ? dev_get_flags+0x1e0/0x1e0 [ 75.253880][ T1159] dev_change_flags+0x8c/0x1a0 [ 75.258480][ T1159] dev_ifsioc+0x147/0x10c0 [ 75.262733][ T1159] ? sysvec_apic_timer_interrupt+0x64/0xc0 [ 75.268380][ T1159] ? dev_ioctl+0xe70/0xe70 [ 75.272635][ T1159] ? mutex_lock+0xb6/0x1e0 [ 75.276885][ T1159] ? ns_capable+0x79/0xe0 [ 75.281048][ T1159] ? wait_for_completion_killable_timeout+0x10/0x10 [ 75.287555][ T1159] dev_ioctl+0x54d/0xe70 [ 75.291632][ T1159] sock_do_ioctl+0x34f/0x5a0 [ 75.296059][ T1159] ? sock_show_fdinfo+0xa0/0xa0 [ 75.300747][ T1159] ? selinux_file_ioctl+0x3cc/0x540 [ 75.305779][ T1159] ? lapic_next_event+0x5f/0x70 [ 75.310571][ T1159] sock_ioctl+0x455/0x740 [ 75.314751][ T1159] ? sock_poll+0x400/0x400 [ 75.318972][ T1159] ? __fget_files+0x31e/0x380 [ 75.323575][ T1159] ? security_file_ioctl+0x84/0xb0 [ 75.328522][ T1159] ? sock_poll+0x400/0x400 [ 75.332773][ T1159] __se_sys_ioctl+0x114/0x190 [ 75.337288][ T1159] __x64_sys_ioctl+0x7b/0x90 [ 75.341717][ T1159] x64_sys_call+0x98/0x9a0 [ 75.345967][ T1159] do_syscall_64+0x3b/0xb0 [ 75.350217][ T1159] ? clear_bhb_loop+0x35/0x90 [ 75.354731][ T1159] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 75.360460][ T1159] RIP: 0033:0x7f94d375dd29 [ 75.364713][ T1159] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 75.384327][ T1159] RSP: 002b:00007f94d1dc8038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 75.392572][ T1159] RAX: ffffffffffffffda RBX: 00007f94d3976fa0 RCX: 00007f94d375dd29 [ 75.400471][ T1159] RDX: 0000000020002280 RSI: 0000000000008914 RDI: 0000000000000008 [ 75.408284][ T1159] RBP: 00007f94d1dc8090 R08: 0000000000000000 R09: 0000000000000000 [ 75.416093][ T1159] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 75.423989][ T1159] R13: 0000000000000000 R14: 00007f94d3976fa0 R15: 00007ffd25dc5628 [ 75.431809][ T1159] [ 75.444015][ T1159] syzkaller0: default qdisc (pfifo_fast) fail, fallback to noqueue [ 75.470272][ T1159] device syzkaller0 entered promiscuous mode [ 75.491305][ T1161] device veth1_macvtap left promiscuous mode [ 75.497392][ T1161] device macsec0 entered promiscuous mode [ 75.635437][ T1174] device syzkaller0 entered promiscuous mode [ 75.872394][ T1188] bridge0: port 2(bridge_slave_1) entered disabled state [ 75.880086][ T1188] bridge0: port 1(bridge_slave_0) entered disabled state [ 76.036855][ T1188] device bridge0 left promiscuous mode [ 76.181565][ T1196] FAULT_INJECTION: forcing a failure. [ 76.181565][ T1196] name failslab, interval 1, probability 0, space 0, times 0 [ 76.268009][ T1196] CPU: 1 PID: 1196 Comm: syz.2.283 Not tainted 5.15.176-syzkaller-00066-gd1a25a6a4b3b #0 [ 76.277669][ T1196] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 12/27/2024 [ 76.287633][ T1196] Call Trace: [ 76.290760][ T1196] [ 76.293532][ T1196] dump_stack_lvl+0x151/0x1c0 [ 76.298052][ T1196] ? io_uring_drop_tctx_refs+0x190/0x190 [ 76.303519][ T1196] dump_stack+0x15/0x20 [ 76.307508][ T1196] should_fail+0x3c6/0x510 [ 76.311762][ T1196] __should_failslab+0xa4/0xe0 [ 76.316359][ T1196] should_failslab+0x9/0x20 [ 76.320698][ T1196] slab_pre_alloc_hook+0x37/0xd0 [ 76.325473][ T1196] ? rtmsg_ifinfo_build_skb+0x7f/0x180 [ 76.330771][ T1196] __kmalloc_track_caller+0x6c/0x2c0 [ 76.335896][ T1196] ? rtmsg_ifinfo_build_skb+0x7f/0x180 [ 76.341183][ T1196] ? rtmsg_ifinfo_build_skb+0x7f/0x180 [ 76.346478][ T1196] __alloc_skb+0x10c/0x550 [ 76.350731][ T1196] rtmsg_ifinfo_build_skb+0x7f/0x180 [ 76.355855][ T1196] rtnetlink_event+0xf3/0x1b0 [ 76.360369][ T1196] raw_notifier_call_chain+0x8c/0xf0 [ 76.365486][ T1196] dev_set_mac_address+0x325/0x470 [ 76.370435][ T1196] ? dev_pre_changeaddr_notify+0x220/0x220 [ 76.376075][ T1196] dev_set_mac_address_user+0x31/0x50 [ 76.381284][ T1196] dev_ifsioc+0x7ef/0x10c0 [ 76.385534][ T1196] ? dev_ioctl+0xe70/0xe70 [ 76.389789][ T1196] ? mutex_lock+0x135/0x1e0 [ 76.394135][ T1196] ? wait_for_completion_killable_timeout+0x10/0x10 [ 76.400561][ T1196] dev_ioctl+0x54d/0xe70 [ 76.404631][ T1196] sock_do_ioctl+0x34f/0x5a0 [ 76.409059][ T1196] ? sock_show_fdinfo+0xa0/0xa0 [ 76.413754][ T1196] ? selinux_file_ioctl+0x3cc/0x540 [ 76.418789][ T1196] sock_ioctl+0x455/0x740 [ 76.422944][ T1196] ? sock_poll+0x400/0x400 [ 76.427193][ T1196] ? __fget_files+0x31e/0x380 [ 76.431721][ T1196] ? security_file_ioctl+0x84/0xb0 [ 76.436656][ T1196] ? sock_poll+0x400/0x400 [ 76.440912][ T1196] __se_sys_ioctl+0x114/0x190 [ 76.445422][ T1196] __x64_sys_ioctl+0x7b/0x90 [ 76.449847][ T1196] x64_sys_call+0x98/0x9a0 [ 76.454100][ T1196] do_syscall_64+0x3b/0xb0 [ 76.458354][ T1196] ? clear_bhb_loop+0x35/0x90 [ 76.462865][ T1196] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 76.468598][ T1196] RIP: 0033:0x7f414c356d29 [ 76.472848][ T1196] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 76.492291][ T1196] RSP: 002b:00007f414a9c1038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 76.500534][ T1196] RAX: ffffffffffffffda RBX: 00007f414c56ffa0 RCX: 00007f414c356d29 [ 76.508344][ T1196] RDX: 0000000020000000 RSI: 0000000000008924 RDI: 0000000000000009 [ 76.516156][ T1196] RBP: 00007f414a9c1090 R08: 0000000000000000 R09: 0000000000000000 [ 76.523967][ T1196] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 76.531781][ T1196] R13: 0000000000000000 R14: 00007f414c56ffa0 R15: 00007ffdf661c698 [ 76.539598][ T1196] [ 76.571408][ T1198] bridge0: port 2(bridge_slave_1) entered blocking state [ 76.578664][ T1198] bridge0: port 2(bridge_slave_1) entered forwarding state [ 76.585755][ T1198] bridge0: port 1(bridge_slave_0) entered blocking state [ 76.592639][ T1198] bridge0: port 1(bridge_slave_0) entered forwarding state [ 76.658427][ T30] audit: type=1400 audit(1738045212.779:125): avc: denied { cpu } for pid=1204 comm="syz.2.285" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=1 [ 76.677332][ T1198] device bridge0 entered promiscuous mode [ 76.702995][ T1193] bridge0: port 3(veth0_to_batadv) entered disabled state [ 76.711494][ T1193] bridge0: port 2(bridge_slave_1) entered disabled state [ 76.720376][ T1193] bridge0: port 1(bridge_slave_0) entered disabled state [ 76.750223][ T1193] device bridge0 left promiscuous mode [ 76.766499][ T1217] FAULT_INJECTION: forcing a failure. [ 76.766499][ T1217] name failslab, interval 1, probability 0, space 0, times 0 [ 76.796528][ T1200] bridge0: port 3(veth0_to_batadv) entered blocking state [ 76.796703][ T1217] CPU: 0 PID: 1217 Comm: syz.0.288 Not tainted 5.15.176-syzkaller-00066-gd1a25a6a4b3b #0 [ 76.803526][ T1200] bridge0: port 3(veth0_to_batadv) entered forwarding state [ 76.813103][ T1217] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 12/27/2024 [ 76.813119][ T1217] Call Trace: [ 76.813126][ T1217] [ 76.813134][ T1217] dump_stack_lvl+0x151/0x1c0 [ 76.813160][ T1217] ? io_uring_drop_tctx_refs+0x190/0x190 [ 76.820343][ T1200] bridge0: port 2(bridge_slave_1) entered blocking state [ 76.830118][ T1217] dump_stack+0x15/0x20 [ 76.830144][ T1217] should_fail+0x3c6/0x510 [ 76.830165][ T1217] __should_failslab+0xa4/0xe0 [ 76.833245][ T1200] bridge0: port 2(bridge_slave_1) entered forwarding state [ 76.836015][ T1217] should_failslab+0x9/0x20 [ 76.840656][ T1200] bridge0: port 1(bridge_slave_0) entered blocking state [ 76.845997][ T1217] slab_pre_alloc_hook+0x37/0xd0 [ 76.852891][ T1200] bridge0: port 1(bridge_slave_0) entered forwarding state [ 76.856846][ T1217] ? alloc_skb_with_frags+0xa6/0x680 [ 76.900858][ T1217] __kmalloc_track_caller+0x6c/0x2c0 [ 76.906000][ T1217] ? alloc_skb_with_frags+0xa6/0x680 [ 76.911091][ T1217] ? alloc_skb_with_frags+0xa6/0x680 [ 76.916217][ T1217] __alloc_skb+0x10c/0x550 [ 76.920471][ T1217] alloc_skb_with_frags+0xa6/0x680 [ 76.925464][ T1217] ? memcpy+0x56/0x70 [ 76.929234][ T1217] sock_alloc_send_pskb+0x915/0xa50 [ 76.934272][ T1217] ? sock_kzfree_s+0x60/0x60 [ 76.938700][ T1217] ? __kasan_check_write+0x14/0x20 [ 76.943642][ T1217] ? _raw_spin_lock+0xa4/0x1b0 [ 76.948242][ T1217] ? _raw_spin_trylock_bh+0x190/0x190 [ 76.953452][ T1217] unix_dgram_sendmsg+0x6fd/0x2090 [ 76.958402][ T1217] ? unix_dgram_poll+0x690/0x690 [ 76.963183][ T1217] ? security_socket_sendmsg+0x82/0xb0 [ 76.968465][ T1217] ? unix_dgram_poll+0x690/0x690 [ 76.973238][ T1217] ____sys_sendmsg+0x59e/0x8f0 [ 76.977843][ T1217] ? __sys_sendmsg_sock+0x40/0x40 [ 76.982701][ T1217] ? import_iovec+0xe5/0x120 [ 76.987127][ T1217] ___sys_sendmsg+0x252/0x2e0 [ 76.991642][ T1217] ? __sys_sendmsg+0x260/0x260 [ 76.996332][ T1217] ? putname+0xfa/0x150 [ 77.000323][ T1217] ? __fdget+0x1bc/0x240 [ 77.004397][ T1217] __se_sys_sendmsg+0x19a/0x260 [ 77.009083][ T1217] ? __x64_sys_sendmsg+0x90/0x90 [ 77.013856][ T1217] ? ksys_write+0x260/0x2c0 [ 77.018200][ T1217] ? debug_smp_processor_id+0x17/0x20 [ 77.023401][ T1217] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 77.029307][ T1217] __x64_sys_sendmsg+0x7b/0x90 [ 77.033909][ T1217] x64_sys_call+0x16a/0x9a0 [ 77.038334][ T1217] do_syscall_64+0x3b/0xb0 [ 77.042629][ T1217] ? clear_bhb_loop+0x35/0x90 [ 77.047110][ T1217] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 77.052823][ T1217] RIP: 0033:0x7f7f1d4d7d29 [ 77.057079][ T1217] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 77.076519][ T1217] RSP: 002b:00007f7f1bb42038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 77.084764][ T1217] RAX: ffffffffffffffda RBX: 00007f7f1d6f0fa0 RCX: 00007f7f1d4d7d29 [ 77.092578][ T1217] RDX: 0000000000000000 RSI: 0000000020000500 RDI: 0000000000000004 [ 77.100387][ T1217] RBP: 00007f7f1bb42090 R08: 0000000000000000 R09: 0000000000000000 [ 77.108200][ T1217] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 77.116011][ T1217] R13: 0000000000000000 R14: 00007f7f1d6f0fa0 R15: 00007ffc69a39a98 [ 77.123907][ T1217] [ 77.139584][ T1200] device bridge0 entered promiscuous mode [ 77.204459][ T1224] FAULT_INJECTION: forcing a failure. [ 77.204459][ T1224] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 77.275702][ T1224] CPU: 1 PID: 1224 Comm: syz.0.290 Not tainted 5.15.176-syzkaller-00066-gd1a25a6a4b3b #0 [ 77.285358][ T1224] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 12/27/2024 [ 77.295247][ T1224] Call Trace: [ 77.298458][ T1224] [ 77.301233][ T1224] dump_stack_lvl+0x151/0x1c0 [ 77.305748][ T1224] ? io_uring_drop_tctx_refs+0x190/0x190 [ 77.311212][ T1224] ? __stack_depot_save+0x34/0x470 [ 77.316156][ T1224] dump_stack+0x15/0x20 [ 77.320148][ T1224] should_fail+0x3c6/0x510 [ 77.324405][ T1224] should_fail_usercopy+0x1a/0x20 [ 77.329265][ T1224] _copy_from_user+0x20/0xd0 [ 77.333693][ T1224] iovec_from_user+0xc7/0x330 [ 77.338295][ T1224] __import_iovec+0x6d/0x420 [ 77.342716][ T1224] ? __ia32_sys_shutdown+0x70/0x70 [ 77.347667][ T1224] import_iovec+0xe5/0x120 [ 77.351919][ T1224] ___sys_sendmsg+0x215/0x2e0 [ 77.356440][ T1224] ? __sys_sendmsg+0x260/0x260 [ 77.361046][ T1224] ? putname+0xfa/0x150 [ 77.365201][ T1224] ? __fdget+0x1bc/0x240 [ 77.369278][ T1224] __se_sys_sendmsg+0x19a/0x260 [ 77.373966][ T1224] ? __x64_sys_sendmsg+0x90/0x90 [ 77.378734][ T1224] ? ksys_write+0x260/0x2c0 [ 77.383075][ T1224] ? debug_smp_processor_id+0x17/0x20 [ 77.388280][ T1224] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 77.394187][ T1224] __x64_sys_sendmsg+0x7b/0x90 [ 77.398784][ T1224] x64_sys_call+0x16a/0x9a0 [ 77.403123][ T1224] do_syscall_64+0x3b/0xb0 [ 77.407382][ T1224] ? clear_bhb_loop+0x35/0x90 [ 77.411892][ T1224] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 77.417622][ T1224] RIP: 0033:0x7f7f1d4d7d29 [ 77.421874][ T1224] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 77.441317][ T1224] RSP: 002b:00007f7f1bb42038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 77.449571][ T1224] RAX: ffffffffffffffda RBX: 00007f7f1d6f0fa0 RCX: 00007f7f1d4d7d29 [ 77.457373][ T1224] RDX: 00000000000400d0 RSI: 0000000020000580 RDI: 0000000000000004 [ 77.465192][ T1224] RBP: 00007f7f1bb42090 R08: 0000000000000000 R09: 0000000000000000 [ 77.472993][ T1224] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 77.480805][ T1224] R13: 0000000000000000 R14: 00007f7f1d6f0fa0 R15: 00007ffc69a39a98 [ 77.488621][ T1224] [ 78.194646][ T1258] FAULT_INJECTION: forcing a failure. [ 78.194646][ T1258] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 78.308290][ T1258] CPU: 0 PID: 1258 Comm: syz.3.300 Not tainted 5.15.176-syzkaller-00066-gd1a25a6a4b3b #0 [ 78.317939][ T1258] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 12/27/2024 [ 78.327829][ T1258] Call Trace: [ 78.331038][ T1258] [ 78.333819][ T1258] dump_stack_lvl+0x151/0x1c0 [ 78.338336][ T1258] ? io_uring_drop_tctx_refs+0x190/0x190 [ 78.343799][ T1258] ? kstrtouint_from_user+0x20a/0x2a0 [ 78.349008][ T1258] dump_stack+0x15/0x20 [ 78.353014][ T1258] should_fail+0x3c6/0x510 [ 78.357251][ T1258] should_fail_usercopy+0x1a/0x20 [ 78.362111][ T1258] _copy_to_user+0x20/0x90 [ 78.366364][ T1258] simple_read_from_buffer+0xc7/0x150 [ 78.371574][ T1258] proc_fail_nth_read+0x1a3/0x210 [ 78.376429][ T1258] ? proc_fault_inject_write+0x390/0x390 [ 78.381905][ T1258] ? fsnotify_perm+0x269/0x5b0 [ 78.386504][ T1258] ? security_file_permission+0x86/0xb0 [ 78.391885][ T1258] ? proc_fault_inject_write+0x390/0x390 [ 78.397350][ T1258] vfs_read+0x27d/0xd40 [ 78.401344][ T1258] ? kernel_read+0x1f0/0x1f0 [ 78.405769][ T1258] ? __kasan_check_write+0x14/0x20 [ 78.410722][ T1258] ? mutex_lock+0xb6/0x1e0 [ 78.414968][ T1258] ? wait_for_completion_killable_timeout+0x10/0x10 [ 78.421401][ T1258] ? __fdget_pos+0x2e7/0x3a0 [ 78.425815][ T1258] ? ksys_read+0x77/0x2c0 [ 78.429985][ T1258] ksys_read+0x199/0x2c0 [ 78.434063][ T1258] ? vfs_write+0x1110/0x1110 [ 78.438490][ T1258] ? debug_smp_processor_id+0x17/0x20 [ 78.443695][ T1258] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 78.449597][ T1258] __x64_sys_read+0x7b/0x90 [ 78.453938][ T1258] x64_sys_call+0x28/0x9a0 [ 78.458190][ T1258] do_syscall_64+0x3b/0xb0 [ 78.462442][ T1258] ? clear_bhb_loop+0x35/0x90 [ 78.466963][ T1258] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 78.472694][ T1258] RIP: 0033:0x7f94d375c73c [ 78.476944][ T1258] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 93 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 ef 93 02 00 48 [ 78.496390][ T1258] RSP: 002b:00007f94d1dc8030 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 78.504623][ T1258] RAX: ffffffffffffffda RBX: 00007f94d3976fa0 RCX: 00007f94d375c73c [ 78.512433][ T1258] RDX: 000000000000000f RSI: 00007f94d1dc80a0 RDI: 0000000000000007 [ 78.520249][ T1258] RBP: 00007f94d1dc8090 R08: 0000000000000000 R09: 0000000000000000 [ 78.528059][ T1258] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 78.535956][ T1258] R13: 0000000000000000 R14: 00007f94d3976fa0 R15: 00007ffd25dc5628 [ 78.543771][ T1258] [ 78.753004][ T1262] skbuff: bad partial csum: csum=65489/0 headroom=64 headlen=65491 [ 78.865972][ T1261] bridge0: port 2(bridge_slave_1) entered disabled state [ 78.874678][ T1261] bridge0: port 1(bridge_slave_0) entered disabled state [ 78.899839][ T1261] device bridge0 left promiscuous mode [ 79.047357][ T1270] bridge0: port 2(bridge_slave_1) entered blocking state [ 79.054336][ T1270] bridge0: port 2(bridge_slave_1) entered forwarding state [ 79.061498][ T1270] bridge0: port 1(bridge_slave_0) entered blocking state [ 79.068356][ T1270] bridge0: port 1(bridge_slave_0) entered forwarding state [ 79.075802][ T1270] device bridge0 entered promiscuous mode [ 79.954573][ T1306] skbuff: bad partial csum: csum=65489/0 headroom=64 headlen=65491 [ 79.988548][ T1308] FAULT_INJECTION: forcing a failure. [ 79.988548][ T1308] name failslab, interval 1, probability 0, space 0, times 0 [ 80.001015][ T1308] CPU: 0 PID: 1308 Comm: syz.2.318 Not tainted 5.15.176-syzkaller-00066-gd1a25a6a4b3b #0 [ 80.010606][ T1308] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 12/27/2024 [ 80.020511][ T1308] Call Trace: [ 80.023619][ T1308] [ 80.026396][ T1308] dump_stack_lvl+0x151/0x1c0 [ 80.030909][ T1308] ? io_uring_drop_tctx_refs+0x190/0x190 [ 80.036468][ T1308] dump_stack+0x15/0x20 [ 80.040454][ T1308] should_fail+0x3c6/0x510 [ 80.044711][ T1308] __should_failslab+0xa4/0xe0 [ 80.049308][ T1308] should_failslab+0x9/0x20 [ 80.053648][ T1308] slab_pre_alloc_hook+0x37/0xd0 [ 80.058424][ T1308] ? fdb_notify+0x77/0x120 [ 80.062676][ T1308] __kmalloc_track_caller+0x6c/0x2c0 [ 80.067794][ T1308] ? fdb_notify+0x77/0x120 [ 80.072047][ T1308] ? fdb_notify+0x77/0x120 [ 80.076303][ T1308] __alloc_skb+0x10c/0x550 [ 80.080552][ T1308] fdb_notify+0x77/0x120 [ 80.084634][ T1308] fdb_delete+0x83c/0xac0 [ 80.088806][ T1308] fdb_delete_local+0x3d1/0x470 [ 80.093491][ T1308] br_fdb_changeaddr+0x1bb/0x1c0 [ 80.098266][ T1308] br_device_event+0x3c6/0x7c0 [ 80.102862][ T1308] ? br_boolopt_multi_get+0xf0/0xf0 [ 80.107902][ T1308] ? packet_notifier+0x8ad/0x8c0 [ 80.112673][ T1308] ? ipv6_mc_netdev_event+0xa4/0x480 [ 80.117789][ T1308] raw_notifier_call_chain+0x8c/0xf0 [ 80.122912][ T1308] dev_set_mac_address+0x325/0x470 [ 80.127864][ T1308] ? dev_pre_changeaddr_notify+0x220/0x220 [ 80.133590][ T1308] dev_set_mac_address_user+0x31/0x50 [ 80.138790][ T1308] dev_ifsioc+0x7ef/0x10c0 [ 80.143044][ T1308] ? dev_ioctl+0xe70/0xe70 [ 80.147299][ T1308] ? mutex_lock+0xb6/0x1e0 [ 80.151551][ T1308] ? wait_for_completion_killable_timeout+0x10/0x10 [ 80.157980][ T1308] dev_ioctl+0x54d/0xe70 [ 80.162139][ T1308] sock_do_ioctl+0x34f/0x5a0 [ 80.166570][ T1308] ? sock_show_fdinfo+0xa0/0xa0 [ 80.171258][ T1308] ? selinux_file_ioctl+0x3cc/0x540 [ 80.176291][ T1308] sock_ioctl+0x455/0x740 [ 80.180454][ T1308] ? sock_poll+0x400/0x400 [ 80.184703][ T1308] ? __fget_files+0x31e/0x380 [ 80.189223][ T1308] ? security_file_ioctl+0x84/0xb0 [ 80.194179][ T1308] ? sock_poll+0x400/0x400 [ 80.198421][ T1308] __se_sys_ioctl+0x114/0x190 [ 80.202939][ T1308] __x64_sys_ioctl+0x7b/0x90 [ 80.207359][ T1308] x64_sys_call+0x98/0x9a0 [ 80.211612][ T1308] do_syscall_64+0x3b/0xb0 [ 80.215976][ T1308] ? clear_bhb_loop+0x35/0x90 [ 80.220489][ T1308] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 80.226216][ T1308] RIP: 0033:0x7f414c356d29 [ 80.230468][ T1308] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 80.249955][ T1308] RSP: 002b:00007f414a9c1038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 80.258157][ T1308] RAX: ffffffffffffffda RBX: 00007f414c56ffa0 RCX: 00007f414c356d29 [ 80.265968][ T1308] RDX: 0000000020000000 RSI: 0000000000008924 RDI: 000000000000000a [ 80.273781][ T1308] RBP: 00007f414a9c1090 R08: 0000000000000000 R09: 0000000000000000 [ 80.281605][ T1308] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 80.289410][ T1308] R13: 0000000000000000 R14: 00007f414c56ffa0 R15: 00007ffdf661c698 [ 80.297222][ T1308] [ 80.523426][ T1321] FAULT_INJECTION: forcing a failure. [ 80.523426][ T1321] name failslab, interval 1, probability 0, space 0, times 0 [ 80.643451][ T1321] CPU: 1 PID: 1321 Comm: syz.3.323 Not tainted 5.15.176-syzkaller-00066-gd1a25a6a4b3b #0 [ 80.653092][ T1321] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 12/27/2024 [ 80.662990][ T1321] Call Trace: [ 80.666110][ T1321] [ 80.668892][ T1321] dump_stack_lvl+0x151/0x1c0 [ 80.673405][ T1321] ? io_uring_drop_tctx_refs+0x190/0x190 [ 80.678956][ T1321] ? _raw_spin_unlock_irqrestore+0x5c/0x80 [ 80.684602][ T1321] ? __skb_try_recv_datagram+0x495/0x6a0 [ 80.690076][ T1321] dump_stack+0x15/0x20 [ 80.694069][ T1321] should_fail+0x3c6/0x510 [ 80.698311][ T1321] __should_failslab+0xa4/0xe0 [ 80.702911][ T1321] ? skb_clone+0x1d1/0x360 [ 80.707164][ T1321] should_failslab+0x9/0x20 [ 80.711502][ T1321] slab_pre_alloc_hook+0x37/0xd0 [ 80.716277][ T1321] ? skb_clone+0x1d1/0x360 [ 80.720528][ T1321] kmem_cache_alloc+0x44/0x250 [ 80.725131][ T1321] skb_clone+0x1d1/0x360 [ 80.729217][ T1321] sk_psock_verdict_recv+0x53/0x840 [ 80.734331][ T1321] ? avc_has_perm_noaudit+0x430/0x430 [ 80.739629][ T1321] unix_read_sock+0x132/0x370 [ 80.744144][ T1321] ? sk_psock_skb_redirect+0x440/0x440 [ 80.749433][ T1321] ? unix_stream_splice_actor+0x120/0x120 [ 80.754991][ T1321] ? _raw_spin_lock_irqsave+0xf9/0x210 [ 80.760293][ T1321] ? unix_stream_splice_actor+0x120/0x120 [ 80.765846][ T1321] sk_psock_verdict_data_ready+0x147/0x1a0 [ 80.771480][ T1321] ? sk_psock_start_verdict+0xc0/0xc0 [ 80.776688][ T1321] ? _raw_spin_lock+0xa4/0x1b0 [ 80.781289][ T1321] ? _raw_spin_unlock_irqrestore+0x5c/0x80 [ 80.787042][ T1321] ? skb_queue_tail+0xfb/0x120 [ 80.791631][ T1321] unix_dgram_sendmsg+0x15fa/0x2090 [ 80.796672][ T1321] ? unix_dgram_poll+0x690/0x690 [ 80.801441][ T1321] ? kasan_set_track+0x5d/0x70 [ 80.806042][ T1321] ? kasan_set_track+0x4b/0x70 [ 80.810642][ T1321] ? security_socket_sendmsg+0x82/0xb0 [ 80.815948][ T1321] ? unix_dgram_poll+0x690/0x690 [ 80.820709][ T1321] ____sys_sendmsg+0x59e/0x8f0 [ 80.825309][ T1321] ? __sys_sendmsg_sock+0x40/0x40 [ 80.830254][ T1321] ? import_iovec+0xe5/0x120 [ 80.834680][ T1321] ___sys_sendmsg+0x252/0x2e0 [ 80.839210][ T1321] ? __sys_sendmsg+0x260/0x260 [ 80.843799][ T1321] ? putname+0xfa/0x150 [ 80.847794][ T1321] ? __fdget+0x1bc/0x240 [ 80.851865][ T1321] __se_sys_sendmsg+0x19a/0x260 [ 80.856551][ T1321] ? __x64_sys_sendmsg+0x90/0x90 [ 80.861323][ T1321] ? ksys_write+0x260/0x2c0 [ 80.865666][ T1321] ? debug_smp_processor_id+0x17/0x20 [ 80.870873][ T1321] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 80.879551][ T1321] __x64_sys_sendmsg+0x7b/0x90 [ 80.884154][ T1321] x64_sys_call+0x16a/0x9a0 [ 80.888493][ T1321] do_syscall_64+0x3b/0xb0 [ 80.892749][ T1321] ? clear_bhb_loop+0x35/0x90 [ 80.897278][ T1321] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 80.902983][ T1321] RIP: 0033:0x7f94d375dd29 [ 80.907238][ T1321] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 80.926680][ T1321] RSP: 002b:00007f94d1dc8038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 80.934926][ T1321] RAX: ffffffffffffffda RBX: 00007f94d3976fa0 RCX: 00007f94d375dd29 [ 80.942735][ T1321] RDX: 0000000000000000 RSI: 0000000020000500 RDI: 0000000000000004 [ 80.950545][ T1321] RBP: 00007f94d1dc8090 R08: 0000000000000000 R09: 0000000000000000 [ 80.958357][ T1321] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 80.966167][ T1321] R13: 0000000000000000 R14: 00007f94d3976fa0 R15: 00007ffd25dc5628 [ 80.973992][ T1321] [ 81.269092][ T1340] FAULT_INJECTION: forcing a failure. [ 81.269092][ T1340] name failslab, interval 1, probability 0, space 0, times 0 [ 81.317117][ T1340] CPU: 0 PID: 1340 Comm: syz.1.330 Not tainted 5.15.176-syzkaller-00066-gd1a25a6a4b3b #0 [ 81.326763][ T1340] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 12/27/2024 [ 81.336657][ T1340] Call Trace: [ 81.339774][ T1340] [ 81.342552][ T1340] dump_stack_lvl+0x151/0x1c0 [ 81.347066][ T1340] ? io_uring_drop_tctx_refs+0x190/0x190 [ 81.352536][ T1340] ? arch_stack_walk+0xf3/0x140 [ 81.357222][ T1340] dump_stack+0x15/0x20 [ 81.361212][ T1340] should_fail+0x3c6/0x510 [ 81.365466][ T1340] __should_failslab+0xa4/0xe0 [ 81.370064][ T1340] ? __alloc_skb+0xbe/0x550 [ 81.374404][ T1340] should_failslab+0x9/0x20 [ 81.378743][ T1340] slab_pre_alloc_hook+0x37/0xd0 [ 81.383606][ T1340] ? __alloc_skb+0xbe/0x550 [ 81.387953][ T1340] kmem_cache_alloc+0x44/0x250 [ 81.392547][ T1340] __alloc_skb+0xbe/0x550 [ 81.396714][ T1340] tipc_msg_build+0x149/0x1230 [ 81.401313][ T1340] ? new_inode+0x28/0x1c0 [ 81.405480][ T1340] ? proc_tid_base_lookup+0x2b/0x30 [ 81.410531][ T1340] ? __x64_sys_openat+0x243/0x290 [ 81.415374][ T1340] ? tipc_node_find+0x206/0x4c0 [ 81.420059][ T1340] ? memcpy+0x56/0x70 [ 81.423878][ T1340] ? tipc_msg_fragment+0x760/0x760 [ 81.428822][ T1340] ? avc_has_perm_noaudit+0x2dd/0x430 [ 81.434031][ T1340] ? tipc_in_scope+0x6c/0xd0 [ 81.438460][ T1340] ? tipc_nametbl_lookup_anycast+0x301/0x1090 [ 81.444361][ T1340] ? tipc_node_get_mtu+0x20f/0x2b0 [ 81.449307][ T1340] __tipc_sendmsg+0x1c7b/0x3240 [ 81.453996][ T1340] ? avc_has_perm_noaudit+0x2dd/0x430 [ 81.459202][ T1340] ? local_bh_enable+0x30/0x30 [ 81.463806][ T1340] ? avc_denied+0x1b0/0x1b0 [ 81.468148][ T1340] ? avc_has_perm+0x16f/0x260 [ 81.472654][ T1340] ? stack_trace_save+0x1c0/0x1c0 [ 81.477517][ T1340] ? avc_has_perm_noaudit+0x430/0x430 [ 81.482730][ T1340] ? __kasan_check_write+0x14/0x20 [ 81.487670][ T1340] ? _raw_spin_lock_bh+0xa4/0x1b0 [ 81.492530][ T1340] ? _raw_spin_lock_irq+0x1b0/0x1b0 [ 81.497565][ T1340] ? __local_bh_enable_ip+0x58/0x80 [ 81.502605][ T1340] ? lock_sock_nested+0x266/0x300 [ 81.507459][ T1340] ? sock_init_data+0xc0/0xc0 [ 81.511973][ T1340] ? wait_woken+0x170/0x170 [ 81.516315][ T1340] ? kmem_cache_free+0x115/0x330 [ 81.521086][ T1340] ? check_stack_object+0x114/0x130 [ 81.526120][ T1340] tipc_sendmsg+0x55/0x70 [ 81.530377][ T1340] ? tipc_recvmsg+0x13b0/0x13b0 [ 81.535062][ T1340] ____sys_sendmsg+0x59e/0x8f0 [ 81.539688][ T1340] ? __sys_sendmsg_sock+0x40/0x40 [ 81.544522][ T1340] ? import_iovec+0xe5/0x120 [ 81.548948][ T1340] ___sys_sendmsg+0x252/0x2e0 [ 81.553461][ T1340] ? __sys_sendmsg+0x260/0x260 [ 81.558062][ T1340] ? putname+0xfa/0x150 [ 81.562055][ T1340] ? __fdget+0x1bc/0x240 [ 81.566131][ T1340] __se_sys_sendmsg+0x19a/0x260 [ 81.570821][ T1340] ? __x64_sys_sendmsg+0x90/0x90 [ 81.575592][ T1340] ? ksys_write+0x260/0x2c0 [ 81.579933][ T1340] ? debug_smp_processor_id+0x17/0x20 [ 81.585144][ T1340] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 81.591041][ T1340] __x64_sys_sendmsg+0x7b/0x90 [ 81.595668][ T1340] x64_sys_call+0x16a/0x9a0 [ 81.599979][ T1340] do_syscall_64+0x3b/0xb0 [ 81.604233][ T1340] ? clear_bhb_loop+0x35/0x90 [ 81.608745][ T1340] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 81.614474][ T1340] RIP: 0033:0x7fad91d19d29 [ 81.618728][ T1340] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 81.638168][ T1340] RSP: 002b:00007fad90384038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 81.646414][ T1340] RAX: ffffffffffffffda RBX: 00007fad91f32fa0 RCX: 00007fad91d19d29 [ 81.654225][ T1340] RDX: 00000000000400d0 RSI: 0000000020000580 RDI: 0000000000000004 [ 81.662037][ T1340] RBP: 00007fad90384090 R08: 0000000000000000 R09: 0000000000000000 [ 81.669846][ T1340] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 81.677656][ T1340] R13: 0000000000000000 R14: 00007fad91f32fa0 R15: 00007ffcf9a0ef58 [ 81.685475][ T1340] [ 81.837341][ T1354] FAULT_INJECTION: forcing a failure. [ 81.837341][ T1354] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 81.975828][ T1354] CPU: 0 PID: 1354 Comm: syz.0.334 Not tainted 5.15.176-syzkaller-00066-gd1a25a6a4b3b #0 [ 81.985577][ T1354] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 12/27/2024 [ 81.995459][ T1354] Call Trace: [ 81.998579][ T1354] [ 82.001360][ T1354] dump_stack_lvl+0x151/0x1c0 [ 82.005878][ T1354] ? io_uring_drop_tctx_refs+0x190/0x190 [ 82.011340][ T1354] dump_stack+0x15/0x20 [ 82.015329][ T1354] should_fail+0x3c6/0x510 [ 82.019592][ T1354] should_fail_usercopy+0x1a/0x20 [ 82.024704][ T1354] copy_page_from_iter+0x2eb/0x640 [ 82.029660][ T1354] pipe_write+0x92b/0x1930 [ 82.033909][ T1354] ? pipe_read+0x1040/0x1040 [ 82.038333][ T1354] ? selinux_file_permission+0x450/0x570 [ 82.043800][ T1354] ? fsnotify_perm+0x6a/0x5b0 [ 82.048313][ T1354] ? iov_iter_init+0x53/0x190 [ 82.052826][ T1354] vfs_write+0xd5d/0x1110 [ 82.056995][ T1354] ? file_end_write+0x1c0/0x1c0 [ 82.061683][ T1354] ? __fdget_pos+0x209/0x3a0 [ 82.066104][ T1354] ? ksys_write+0x77/0x2c0 [ 82.070365][ T1354] ksys_write+0x199/0x2c0 [ 82.074521][ T1354] ? __ia32_sys_read+0x90/0x90 [ 82.079122][ T1354] ? debug_smp_processor_id+0x17/0x20 [ 82.084326][ T1354] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 82.090231][ T1354] __x64_sys_write+0x7b/0x90 [ 82.094747][ T1354] x64_sys_call+0x2f/0x9a0 [ 82.098996][ T1354] do_syscall_64+0x3b/0xb0 [ 82.103251][ T1354] ? clear_bhb_loop+0x35/0x90 [ 82.107760][ T1354] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 82.113492][ T1354] RIP: 0033:0x7f7f1d4d7d29 [ 82.117749][ T1354] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 82.137186][ T1354] RSP: 002b:00007f7f1bb42038 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 82.145434][ T1354] RAX: ffffffffffffffda RBX: 00007f7f1d6f0fa0 RCX: 00007f7f1d4d7d29 [ 82.153238][ T1354] RDX: 000000000000fdef RSI: 0000000020000580 RDI: 0000000000000000 [ 82.161183][ T1354] RBP: 00007f7f1bb42090 R08: 0000000000000000 R09: 0000000000000000 [ 82.168984][ T1354] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 82.176797][ T1354] R13: 0000000000000000 R14: 00007f7f1d6f0fa0 R15: 00007ffc69a39a98 [ 82.184614][ T1354] [ 82.212765][ T1351] device sit0 entered promiscuous mode [ 82.879434][ T1380] device syzkaller0 entered promiscuous mode [ 83.053419][ T1385] FAULT_INJECTION: forcing a failure. [ 83.053419][ T1385] name failslab, interval 1, probability 0, space 0, times 0 [ 83.078038][ T1385] CPU: 0 PID: 1385 Comm: syz.4.343 Not tainted 5.15.176-syzkaller-00066-gd1a25a6a4b3b #0 [ 83.087767][ T1385] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 12/27/2024 [ 83.097661][ T1385] Call Trace: [ 83.100782][ T1385] [ 83.103560][ T1385] dump_stack_lvl+0x151/0x1c0 [ 83.108076][ T1385] ? io_uring_drop_tctx_refs+0x190/0x190 [ 83.113545][ T1385] dump_stack+0x15/0x20 [ 83.117535][ T1385] should_fail+0x3c6/0x510 [ 83.121788][ T1385] __should_failslab+0xa4/0xe0 [ 83.126388][ T1385] should_failslab+0x9/0x20 [ 83.130727][ T1385] slab_pre_alloc_hook+0x37/0xd0 [ 83.135508][ T1385] __kmalloc+0x6d/0x2c0 [ 83.139488][ T1385] ? kvmalloc_node+0x1f0/0x4d0 [ 83.144092][ T1385] kvmalloc_node+0x1f0/0x4d0 [ 83.148515][ T1385] ? vm_mmap+0xb0/0xb0 [ 83.152524][ T1385] map_update_elem+0x308/0x770 [ 83.157164][ T1385] __sys_bpf+0x405/0x760 [ 83.161199][ T1385] ? fput_many+0x160/0x1b0 [ 83.165450][ T1385] ? bpf_link_show_fdinfo+0x300/0x300 [ 83.170678][ T1385] ? debug_smp_processor_id+0x17/0x20 [ 83.175865][ T1385] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 83.181772][ T1385] __x64_sys_bpf+0x7c/0x90 [ 83.186019][ T1385] x64_sys_call+0x87f/0x9a0 [ 83.190366][ T1385] do_syscall_64+0x3b/0xb0 [ 83.194613][ T1385] ? clear_bhb_loop+0x35/0x90 [ 83.199130][ T1385] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 83.204852][ T1385] RIP: 0033:0x7f8902972d29 [ 83.209119][ T1385] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 83.228549][ T1385] RSP: 002b:00007f8900fdd038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 83.236801][ T1385] RAX: ffffffffffffffda RBX: 00007f8902b8bfa0 RCX: 00007f8902972d29 [ 83.244694][ T1385] RDX: 0000000000000020 RSI: 0000000020000900 RDI: 0000000000000002 [ 83.252501][ T1385] RBP: 00007f8900fdd090 R08: 0000000000000000 R09: 0000000000000000 [ 83.260311][ T1385] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 83.268126][ T1385] R13: 0000000000000000 R14: 00007f8902b8bfa0 R15: 00007ffd73f86c18 [ 83.275942][ T1385] [ 83.550707][ T30] audit: type=1400 audit(1738045219.679:126): avc: denied { write } for pid=1400 comm="syz.4.349" name="ppp" dev="devtmpfs" ino=150 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ppp_device_t tclass=chr_file permissive=1 [ 83.977168][ T1415] FAULT_INJECTION: forcing a failure. [ 83.977168][ T1415] name failslab, interval 1, probability 0, space 0, times 0 [ 83.990622][ T1415] CPU: 1 PID: 1415 Comm: syz.4.356 Not tainted 5.15.176-syzkaller-00066-gd1a25a6a4b3b #0 [ 84.000262][ T1415] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 12/27/2024 [ 84.010291][ T1415] Call Trace: [ 84.013429][ T1415] [ 84.016190][ T1415] dump_stack_lvl+0x151/0x1c0 [ 84.020705][ T1415] ? asm_sysvec_apic_timer_interrupt+0x1b/0x20 [ 84.026703][ T1415] ? io_uring_drop_tctx_refs+0x190/0x190 [ 84.032164][ T1415] ? __wake_up_klogd+0xd5/0x110 [ 84.036849][ T1415] ? dump_stack+0x9/0x20 [ 84.040931][ T1415] dump_stack+0x15/0x20 [ 84.044921][ T1415] should_fail+0x3c6/0x510 [ 84.049175][ T1415] __should_failslab+0xa4/0xe0 [ 84.053820][ T1415] should_failslab+0x9/0x20 [ 84.058113][ T1415] slab_pre_alloc_hook+0x37/0xd0 [ 84.062889][ T1415] __kmalloc+0x6d/0x2c0 [ 84.066877][ T1415] ? qdisc_alloc+0x75/0x770 [ 84.071220][ T1415] qdisc_alloc+0x75/0x770 [ 84.075473][ T1415] ? pfifo_fast_init+0x3db/0x7a0 [ 84.080333][ T1415] qdisc_create_dflt+0x6b/0x3e0 [ 84.085020][ T1415] mq_init+0x2c8/0x6b0 [ 84.089031][ T1415] ? local_bh_enable+0x30/0x30 [ 84.093891][ T1415] ? __kasan_check_write+0x14/0x20 [ 84.098837][ T1415] ? qdisc_alloc+0x5a1/0x770 [ 84.103264][ T1415] qdisc_create_dflt+0x144/0x3e0 [ 84.108037][ T1415] ? _raw_spin_lock+0xa4/0x1b0 [ 84.112635][ T1415] dev_activate+0x127/0x1140 [ 84.117067][ T1415] ? dev_set_rx_mode+0x245/0x2e0 [ 84.121840][ T1415] __dev_open+0x3bf/0x4e0 [ 84.126093][ T1415] ? dev_open+0x260/0x260 [ 84.130259][ T1415] ? _raw_spin_unlock_bh+0x51/0x60 [ 84.135207][ T1415] ? dev_set_rx_mode+0x245/0x2e0 [ 84.140005][ T1415] ? __kasan_check_read+0x11/0x20 [ 84.144839][ T1415] __dev_change_flags+0x1db/0x6e0 [ 84.149702][ T1415] ? dev_get_flags+0x1e0/0x1e0 [ 84.154308][ T1415] dev_change_flags+0x8c/0x1a0 [ 84.158898][ T1415] dev_ifsioc+0x147/0x10c0 [ 84.163149][ T1415] ? irqentry_exit+0x30/0x40 [ 84.167584][ T1415] ? dev_ioctl+0xe70/0xe70 [ 84.171828][ T1415] ? mutex_lock+0x135/0x1e0 [ 84.176168][ T1415] ? wait_for_completion_killable_timeout+0x10/0x10 [ 84.182684][ T1415] dev_ioctl+0x54d/0xe70 [ 84.186761][ T1415] sock_do_ioctl+0x34f/0x5a0 [ 84.191188][ T1415] ? sock_show_fdinfo+0xa0/0xa0 [ 84.195875][ T1415] ? sock_ioctl+0x19e/0x740 [ 84.200386][ T1415] ? sock_ioctl+0x441/0x740 [ 84.204734][ T1415] sock_ioctl+0x455/0x740 [ 84.208985][ T1415] ? sock_poll+0x400/0x400 [ 84.213230][ T1415] ? __fget_files+0x31e/0x380 [ 84.217744][ T1415] ? security_file_ioctl+0x84/0xb0 [ 84.222688][ T1415] ? sock_poll+0x400/0x400 [ 84.226946][ T1415] __se_sys_ioctl+0x114/0x190 [ 84.231460][ T1415] __x64_sys_ioctl+0x7b/0x90 [ 84.235894][ T1415] x64_sys_call+0x98/0x9a0 [ 84.240138][ T1415] do_syscall_64+0x3b/0xb0 [ 84.244475][ T1415] ? clear_bhb_loop+0x35/0x90 [ 84.249110][ T1415] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 84.254840][ T1415] RIP: 0033:0x7f8902972d29 [ 84.259090][ T1415] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 84.278543][ T1415] RSP: 002b:00007f8900fdd038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 84.286775][ T1415] RAX: ffffffffffffffda RBX: 00007f8902b8bfa0 RCX: 00007f8902972d29 [ 84.294588][ T1415] RDX: 0000000020002280 RSI: 0000000000008914 RDI: 0000000000000008 [ 84.302397][ T1415] RBP: 00007f8900fdd090 R08: 0000000000000000 R09: 0000000000000000 [ 84.310210][ T1415] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 84.318023][ T1415] R13: 0000000000000000 R14: 00007f8902b8bfa0 R15: 00007ffd73f86c18 [ 84.325836][ T1415] [ 84.335576][ T1415] syzkaller0: default qdisc (pfifo_fast) fail, fallback to noqueue [ 84.350919][ T1415] device syzkaller0 entered promiscuous mode [ 84.493024][ T1419] device veth0_vlan left promiscuous mode [ 84.500081][ T1419] device veth0_vlan entered promiscuous mode [ 84.654495][ T1428] device veth0_vlan left promiscuous mode [ 84.670381][ T1428] device veth0_vlan entered promiscuous mode [ 84.691048][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 84.703431][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 84.726943][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 84.771417][ T1431] FAULT_INJECTION: forcing a failure. [ 84.771417][ T1431] name failslab, interval 1, probability 0, space 0, times 0 [ 84.784020][ T1431] CPU: 1 PID: 1431 Comm: syz.3.360 Not tainted 5.15.176-syzkaller-00066-gd1a25a6a4b3b #0 [ 84.793597][ T1431] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 12/27/2024 [ 84.803494][ T1431] Call Trace: [ 84.806616][ T1431] [ 84.809389][ T1431] dump_stack_lvl+0x151/0x1c0 [ 84.813905][ T1431] ? io_uring_drop_tctx_refs+0x190/0x190 [ 84.819372][ T1431] dump_stack+0x15/0x20 [ 84.823366][ T1431] should_fail+0x3c6/0x510 [ 84.827621][ T1431] __should_failslab+0xa4/0xe0 [ 84.832227][ T1431] should_failslab+0x9/0x20 [ 84.836557][ T1431] slab_pre_alloc_hook+0x37/0xd0 [ 84.841328][ T1431] ? fdb_notify+0x77/0x120 [ 84.845581][ T1431] __kmalloc_track_caller+0x6c/0x2c0 [ 84.850700][ T1431] ? fdb_notify+0x77/0x120 [ 84.854955][ T1431] ? fdb_notify+0x77/0x120 [ 84.859209][ T1431] __alloc_skb+0x10c/0x550 [ 84.863462][ T1431] fdb_notify+0x77/0x120 [ 84.867541][ T1431] fdb_delete+0x83c/0xac0 [ 84.871708][ T1431] fdb_delete_local+0x3d1/0x470 [ 84.876394][ T1431] br_fdb_changeaddr+0x1bb/0x1c0 [ 84.881167][ T1431] br_device_event+0x3c6/0x7c0 [ 84.885765][ T1431] ? br_boolopt_multi_get+0xf0/0xf0 [ 84.890801][ T1431] ? packet_notifier+0x8ad/0x8c0 [ 84.895574][ T1431] ? ipv6_mc_netdev_event+0xa4/0x480 [ 84.900693][ T1431] raw_notifier_call_chain+0x8c/0xf0 [ 84.905814][ T1431] dev_set_mac_address+0x325/0x470 [ 84.910763][ T1431] ? dev_pre_changeaddr_notify+0x220/0x220 [ 84.916407][ T1431] dev_set_mac_address_user+0x31/0x50 [ 84.921610][ T1431] dev_ifsioc+0x7ef/0x10c0 [ 84.925866][ T1431] ? dev_ioctl+0xe70/0xe70 [ 84.930114][ T1431] ? mutex_lock+0x135/0x1e0 [ 84.934464][ T1431] ? wait_for_completion_killable_timeout+0x10/0x10 [ 84.941002][ T1431] dev_ioctl+0x54d/0xe70 [ 84.945081][ T1431] sock_do_ioctl+0x34f/0x5a0 [ 84.949509][ T1431] ? sock_show_fdinfo+0xa0/0xa0 [ 84.954196][ T1431] ? selinux_file_ioctl+0x3cc/0x540 [ 84.959226][ T1431] sock_ioctl+0x455/0x740 [ 84.963395][ T1431] ? sock_poll+0x400/0x400 [ 84.967647][ T1431] ? __fget_files+0x31e/0x380 [ 84.972181][ T1431] ? security_file_ioctl+0x84/0xb0 [ 84.977106][ T1431] ? sock_poll+0x400/0x400 [ 84.981362][ T1431] __se_sys_ioctl+0x114/0x190 [ 84.985961][ T1431] __x64_sys_ioctl+0x7b/0x90 [ 84.990385][ T1431] x64_sys_call+0x98/0x9a0 [ 84.994639][ T1431] do_syscall_64+0x3b/0xb0 [ 84.998890][ T1431] ? clear_bhb_loop+0x35/0x90 [ 85.003407][ T1431] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 85.009255][ T1431] RIP: 0033:0x7f94d375dd29 [ 85.013472][ T1431] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 85.032924][ T1431] RSP: 002b:00007f94d1dc8038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 85.041159][ T1431] RAX: ffffffffffffffda RBX: 00007f94d3976fa0 RCX: 00007f94d375dd29 [ 85.048972][ T1431] RDX: 0000000020000000 RSI: 0000000000008924 RDI: 000000000000000a [ 85.056781][ T1431] RBP: 00007f94d1dc8090 R08: 0000000000000000 R09: 0000000000000000 [ 85.064592][ T1431] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 85.072521][ T1431] R13: 0000000000000000 R14: 00007f94d3976fa0 R15: 00007ffd25dc5628 [ 85.080309][ T1431] [ 85.470997][ T1456] FAULT_INJECTION: forcing a failure. [ 85.470997][ T1456] name failslab, interval 1, probability 0, space 0, times 0 [ 85.588068][ T1456] CPU: 1 PID: 1456 Comm: syz.1.369 Not tainted 5.15.176-syzkaller-00066-gd1a25a6a4b3b #0 [ 85.597716][ T1456] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 12/27/2024 [ 85.607696][ T1456] Call Trace: [ 85.610821][ T1456] [ 85.613605][ T1456] dump_stack_lvl+0x151/0x1c0 [ 85.618111][ T1456] ? io_uring_drop_tctx_refs+0x190/0x190 [ 85.623579][ T1456] dump_stack+0x15/0x20 [ 85.627575][ T1456] should_fail+0x3c6/0x510 [ 85.631823][ T1456] __should_failslab+0xa4/0xe0 [ 85.636423][ T1456] should_failslab+0x9/0x20 [ 85.640761][ T1456] slab_pre_alloc_hook+0x37/0xd0 [ 85.645537][ T1456] kmem_cache_alloc_trace+0x48/0x270 [ 85.650655][ T1456] ? sk_psock_skb_ingress_self+0x60/0x330 [ 85.656222][ T1456] ? migrate_disable+0x190/0x190 [ 85.661005][ T1456] sk_psock_skb_ingress_self+0x60/0x330 [ 85.666397][ T1456] sk_psock_verdict_recv+0x66d/0x840 [ 85.671487][ T1456] unix_read_sock+0x132/0x370 [ 85.676001][ T1456] ? sk_psock_skb_redirect+0x440/0x440 [ 85.681294][ T1456] ? unix_stream_splice_actor+0x120/0x120 [ 85.686851][ T1456] ? _raw_spin_lock_irqsave+0xf9/0x210 [ 85.692143][ T1456] ? unix_stream_splice_actor+0x120/0x120 [ 85.697696][ T1456] sk_psock_verdict_data_ready+0x147/0x1a0 [ 85.703339][ T1456] ? sk_psock_start_verdict+0xc0/0xc0 [ 85.708548][ T1456] ? _raw_spin_lock+0xa4/0x1b0 [ 85.713148][ T1456] ? _raw_spin_unlock_irqrestore+0x5c/0x80 [ 85.718785][ T1456] ? skb_queue_tail+0xfb/0x120 [ 85.723405][ T1456] unix_dgram_sendmsg+0x15fa/0x2090 [ 85.728427][ T1456] ? unix_dgram_poll+0x690/0x690 [ 85.733215][ T1456] ? kasan_set_track+0x5d/0x70 [ 85.737793][ T1456] ? kasan_set_track+0x4b/0x70 [ 85.742404][ T1456] ? security_socket_sendmsg+0x82/0xb0 [ 85.747690][ T1456] ? unix_dgram_poll+0x690/0x690 [ 85.752466][ T1456] ____sys_sendmsg+0x59e/0x8f0 [ 85.757068][ T1456] ? __sys_sendmsg_sock+0x40/0x40 [ 85.761970][ T1456] ? import_iovec+0xe5/0x120 [ 85.766362][ T1456] ___sys_sendmsg+0x252/0x2e0 [ 85.770968][ T1456] ? __sys_sendmsg+0x260/0x260 [ 85.775558][ T1456] ? putname+0xfa/0x150 [ 85.779551][ T1456] ? __fdget+0x1bc/0x240 [ 85.783622][ T1456] __se_sys_sendmsg+0x19a/0x260 [ 85.788315][ T1456] ? __x64_sys_sendmsg+0x90/0x90 [ 85.793080][ T1456] ? ksys_write+0x260/0x2c0 [ 85.797431][ T1456] ? debug_smp_processor_id+0x17/0x20 [ 85.802633][ T1456] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 85.808535][ T1456] __x64_sys_sendmsg+0x7b/0x90 [ 85.813134][ T1456] x64_sys_call+0x16a/0x9a0 [ 85.817475][ T1456] do_syscall_64+0x3b/0xb0 [ 85.821725][ T1456] ? clear_bhb_loop+0x35/0x90 [ 85.826245][ T1456] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 85.831968][ T1456] RIP: 0033:0x7fad91d19d29 [ 85.836309][ T1456] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 85.855834][ T1456] RSP: 002b:00007fad90384038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 85.864080][ T1456] RAX: ffffffffffffffda RBX: 00007fad91f32fa0 RCX: 00007fad91d19d29 [ 85.871889][ T1456] RDX: 0000000000000000 RSI: 0000000020000500 RDI: 0000000000000004 [ 85.879787][ T1456] RBP: 00007fad90384090 R08: 0000000000000000 R09: 0000000000000000 [ 85.887632][ T1456] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 85.895412][ T1456] R13: 0000000000000000 R14: 00007fad91f32fa0 R15: 00007ffcf9a0ef58 [ 85.903235][ T1456] [ 86.167124][ T1453] ================================================================== [ 86.175020][ T1453] BUG: KASAN: use-after-free in consume_skb+0x3c/0x250 [ 86.181788][ T1453] Read of size 4 at addr ffff8881272da5ec by task syz.1.369/1453 [ 86.189342][ T1453] [ 86.191542][ T1453] CPU: 0 PID: 1453 Comm: syz.1.369 Not tainted 5.15.176-syzkaller-00066-gd1a25a6a4b3b #0 [ 86.201141][ T1453] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 12/27/2024 [ 86.211037][ T1453] Call Trace: [ 86.214171][ T1453] [ 86.216938][ T1453] dump_stack_lvl+0x151/0x1c0 [ 86.221451][ T1453] ? io_uring_drop_tctx_refs+0x190/0x190 [ 86.226921][ T1453] ? panic+0x760/0x760 [ 86.230828][ T1453] print_address_description+0x87/0x3b0 [ 86.236212][ T1453] ? bpf_ksym_del+0x145/0x150 [ 86.240731][ T1453] kasan_report+0x179/0x1c0 [ 86.245157][ T1453] ? consume_skb+0x3c/0x250 [ 86.249484][ T1453] ? consume_skb+0x3c/0x250 [ 86.253825][ T1453] kasan_check_range+0x293/0x2a0 [ 86.258601][ T1453] __kasan_check_read+0x11/0x20 [ 86.263282][ T1453] consume_skb+0x3c/0x250 [ 86.267450][ T1453] __sk_msg_free+0x2dd/0x370 [ 86.271875][ T1453] ? _raw_spin_unlock_irqrestore+0x5c/0x80 [ 86.277520][ T1453] sk_psock_stop+0x4e3/0x580 [ 86.281944][ T1453] sk_psock_drop+0x219/0x310 [ 86.286370][ T1453] sock_map_unref+0x3c6/0x430 [ 86.290883][ T1453] ? _raw_spin_unlock_bh+0x51/0x60 [ 86.295830][ T1453] sock_map_remove_links+0x41c/0x650 [ 86.300962][ T1453] ? sock_map_unhash+0x120/0x120 [ 86.305728][ T1453] ? locks_remove_posix+0x610/0x610 [ 86.310760][ T1453] sock_map_close+0x114/0x530 [ 86.315272][ T1453] ? unix_peer_get+0xe0/0xe0 [ 86.319698][ T1453] ? sock_map_remove_links+0x650/0x650 [ 86.325001][ T1453] ? rwsem_mark_wake+0x770/0x770 [ 86.329767][ T1453] unix_release+0x82/0xc0 [ 86.333938][ T1453] sock_close+0xdf/0x270 [ 86.338013][ T1453] ? sock_mmap+0xa0/0xa0 [ 86.342093][ T1453] __fput+0x228/0x8c0 [ 86.345914][ T1453] ____fput+0x15/0x20 [ 86.349730][ T1453] task_work_run+0x129/0x190 [ 86.354157][ T1453] exit_to_user_mode_loop+0xc4/0xe0 [ 86.359188][ T1453] exit_to_user_mode_prepare+0x5a/0xa0 [ 86.364488][ T1453] syscall_exit_to_user_mode+0x26/0x160 [ 86.369867][ T1453] do_syscall_64+0x47/0xb0 [ 86.374124][ T1453] ? clear_bhb_loop+0x35/0x90 [ 86.378664][ T1453] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 86.384361][ T1453] RIP: 0033:0x7fad91d19d29 [ 86.388619][ T1453] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 86.408059][ T1453] RSP: 002b:00007ffcf9a0f0b8 EFLAGS: 00000246 ORIG_RAX: 00000000000001b4 [ 86.416395][ T1453] RAX: 0000000000000000 RBX: 00007fad91f34ba0 RCX: 00007fad91d19d29 [ 86.424197][ T1453] RDX: 0000000000000000 RSI: 000000000000001e RDI: 0000000000000003 [ 86.432007][ T1453] RBP: 00007fad91f34ba0 R08: 0000000000000000 R09: 00007ffcf9a0f3af [ 86.439822][ T1453] R10: 000000000003fd44 R11: 0000000000000246 R12: 00000000000150fc [ 86.447631][ T1453] R13: 00007ffcf9a0f1c0 R14: 0000000000000032 R15: ffffffffffffffff [ 86.455540][ T1453] [ 86.458398][ T1453] [ 86.460565][ T1453] Allocated by task 1456: [ 86.464732][ T1453] __kasan_slab_alloc+0xb1/0xe0 [ 86.469418][ T1453] slab_post_alloc_hook+0x53/0x2c0 [ 86.474363][ T1453] kmem_cache_alloc+0xf5/0x250 [ 86.479052][ T1453] skb_clone+0x1d1/0x360 [ 86.483131][ T1453] sk_psock_verdict_recv+0x53/0x840 [ 86.488164][ T1453] unix_read_sock+0x132/0x370 [ 86.492677][ T1453] sk_psock_verdict_data_ready+0x147/0x1a0 [ 86.498321][ T1453] unix_dgram_sendmsg+0x15fa/0x2090 [ 86.503353][ T1453] ____sys_sendmsg+0x59e/0x8f0 [ 86.508387][ T1453] ___sys_sendmsg+0x252/0x2e0 [ 86.512900][ T1453] __se_sys_sendmsg+0x19a/0x260 [ 86.517585][ T1453] __x64_sys_sendmsg+0x7b/0x90 [ 86.522188][ T1453] x64_sys_call+0x16a/0x9a0 [ 86.526525][ T1453] do_syscall_64+0x3b/0xb0 [ 86.530780][ T1453] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 86.536531][ T1453] [ 86.538679][ T1453] Freed by task 540: [ 86.542411][ T1453] kasan_set_track+0x4b/0x70 [ 86.546835][ T1453] kasan_set_free_info+0x23/0x40 [ 86.551702][ T1453] ____kasan_slab_free+0x126/0x160 [ 86.556740][ T1453] __kasan_slab_free+0x11/0x20 [ 86.561332][ T1453] slab_free_freelist_hook+0xbd/0x190 [ 86.566626][ T1453] kmem_cache_free+0x115/0x330 [ 86.571223][ T1453] kfree_skbmem+0x104/0x170 [ 86.575562][ T1453] kfree_skb+0xc2/0x360 [ 86.579560][ T1453] sk_psock_backlog+0xad1/0xdc0 [ 86.584258][ T1453] process_one_work+0x6bb/0xc10 [ 86.588929][ T1453] worker_thread+0xad5/0x12a0 [ 86.593442][ T1453] kthread+0x421/0x510 [ 86.597349][ T1453] ret_from_fork+0x1f/0x30 [ 86.601622][ T1453] [ 86.603780][ T1453] The buggy address belongs to the object at ffff8881272da500 [ 86.603780][ T1453] which belongs to the cache skbuff_head_cache of size 248 [ 86.618209][ T1453] The buggy address is located 236 bytes inside of [ 86.618209][ T1453] 248-byte region [ffff8881272da500, ffff8881272da5f8) [ 86.631470][ T1453] The buggy address belongs to the page: [ 86.636938][ T1453] page:ffffea00049cb680 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1272da [ 86.647004][ T1453] flags: 0x4000000000000200(slab|zone=1) [ 86.652482][ T1453] raw: 4000000000000200 0000000000000000 0000000100000001 ffff8881081aa780 [ 86.660996][ T1453] raw: 0000000000000000 00000000000c000c 00000001ffffffff 0000000000000000 [ 86.669409][ T1453] page dumped because: kasan: bad access detected [ 86.675676][ T1453] page_owner tracks the page as allocated [ 86.681212][ T1453] page last allocated via order 0, migratetype Unmovable, gfp_mask 0x12cc0(GFP_KERNEL|__GFP_NOWARN|__GFP_NORETRY), pid 293, ts 23972550051, free_ts 0 [ 86.696231][ T1453] post_alloc_hook+0x1a3/0x1b0 [ 86.700833][ T1453] prep_new_page+0x1b/0x110 [ 86.705166][ T1453] get_page_from_freelist+0x3550/0x35d0 [ 86.710549][ T1453] __alloc_pages+0x27e/0x8f0 [ 86.714974][ T1453] new_slab+0x9a/0x4e0 [ 86.718880][ T1453] ___slab_alloc+0x39e/0x830 [ 86.723313][ T1453] __slab_alloc+0x4a/0x90 [ 86.727473][ T1453] kmem_cache_alloc+0x139/0x250 [ 86.732158][ T1453] __alloc_skb+0xbe/0x550 [ 86.736342][ T1453] inet6_netconf_notify_devconf+0xdd/0x190 [ 86.741968][ T1453] __addrconf_sysctl_register+0x380/0x3e0 [ 86.747521][ T1453] addrconf_sysctl_register+0x141/0x1a0 [ 86.752904][ T1453] ipv6_add_dev+0xc84/0x1140 [ 86.757331][ T1453] addrconf_notify+0x593/0xdd0 [ 86.761932][ T1453] raw_notifier_call_chain+0x8c/0xf0 [ 86.767056][ T1453] call_netdevice_notifiers+0x145/0x1b0 [ 86.772435][ T1453] page_owner free stack trace missing [ 86.777639][ T1453] [ 86.779820][ T1453] Memory state around the buggy address: [ 86.785366][ T1453] ffff8881272da480: fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc fc [ 86.793267][ T1453] ffff8881272da500: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 86.801161][ T1453] >ffff8881272da580: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fc [ 86.809071][ T1453] ^ [ 86.816437][ T1453] ffff8881272da600: fc fc fc fc fc fc fc fc fa fb fb fb fb fb fb fb [ 86.824337][ T1453] ffff8881272da680: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 86.832232][ T1453] ================================================================== [ 86.840130][ T1453] Disabling lock debugging due to kernel taint [ 86.846200][ T1453] ================================================================== [ 86.854032][ T1453] BUG: KASAN: double-free or invalid-free in kmem_cache_free+0x115/0x330 [ 86.862266][ T1453] [ 86.864433][ T1453] CPU: 0 PID: 1453 Comm: syz.1.369 Tainted: G B 5.15.176-syzkaller-00066-gd1a25a6a4b3b #0 [ 86.875457][ T1453] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 12/27/2024 [ 86.885356][ T1453] Call Trace: [ 86.888476][ T1453] [ 86.891340][ T1453] dump_stack_lvl+0x151/0x1c0 [ 86.895853][ T1453] ? io_uring_drop_tctx_refs+0x190/0x190 [ 86.901320][ T1453] ? __wake_up_klogd+0xd5/0x110 [ 86.906021][ T1453] ? panic+0x760/0x760 [ 86.910001][ T1453] ? kmem_cache_free+0x115/0x330 [ 86.914772][ T1453] print_address_description+0x87/0x3b0 [ 86.920267][ T1453] ? asm_common_interrupt+0x27/0x40 [ 86.925302][ T1453] ? kmem_cache_free+0x115/0x330 [ 86.930070][ T1453] ? kmem_cache_free+0x115/0x330 [ 86.934841][ T1453] kasan_report_invalid_free+0x6b/0xa0 [ 86.940140][ T1453] ____kasan_slab_free+0x13e/0x160 [ 86.945083][ T1453] __kasan_slab_free+0x11/0x20 [ 86.949683][ T1453] slab_free_freelist_hook+0xbd/0x190 [ 86.954893][ T1453] kmem_cache_free+0x115/0x330 [ 86.959491][ T1453] ? kfree_skbmem+0x104/0x170 [ 86.964020][ T1453] kfree_skbmem+0x104/0x170 [ 86.968346][ T1453] consume_skb+0xb4/0x250 [ 86.972509][ T1453] __sk_msg_free+0x2dd/0x370 [ 86.976936][ T1453] ? _raw_spin_unlock_irqrestore+0x5c/0x80 [ 86.982669][ T1453] sk_psock_stop+0x4e3/0x580 [ 86.987270][ T1453] sk_psock_drop+0x219/0x310 [ 86.991690][ T1453] sock_map_unref+0x3c6/0x430 [ 86.996205][ T1453] ? _raw_spin_unlock_bh+0x51/0x60 [ 87.001157][ T1453] sock_map_remove_links+0x41c/0x650 [ 87.006287][ T1453] ? sock_map_unhash+0x120/0x120 [ 87.011046][ T1453] ? locks_remove_posix+0x610/0x610 [ 87.016080][ T1453] sock_map_close+0x114/0x530 [ 87.020738][ T1453] ? unix_peer_get+0xe0/0xe0 [ 87.025131][ T1453] ? sock_map_remove_links+0x650/0x650 [ 87.030427][ T1453] ? rwsem_mark_wake+0x770/0x770 [ 87.035198][ T1453] unix_release+0x82/0xc0 [ 87.039365][ T1453] sock_close+0xdf/0x270 [ 87.043444][ T1453] ? sock_mmap+0xa0/0xa0 [ 87.047522][ T1453] __fput+0x228/0x8c0 [ 87.051345][ T1453] ____fput+0x15/0x20 [ 87.055160][ T1453] task_work_run+0x129/0x190 [ 87.059589][ T1453] exit_to_user_mode_loop+0xc4/0xe0 [ 87.064619][ T1453] exit_to_user_mode_prepare+0x5a/0xa0 [ 87.069916][ T1453] syscall_exit_to_user_mode+0x26/0x160 [ 87.075300][ T1453] do_syscall_64+0x47/0xb0 [ 87.079549][ T1453] ? clear_bhb_loop+0x35/0x90 [ 87.084061][ T1453] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 87.089794][ T1453] RIP: 0033:0x7fad91d19d29 [ 87.094047][ T1453] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 87.113574][ T1453] RSP: 002b:00007ffcf9a0f0b8 EFLAGS: 00000246 ORIG_RAX: 00000000000001b4 [ 87.121817][ T1453] RAX: 0000000000000000 RBX: 00007fad91f34ba0 RCX: 00007fad91d19d29 [ 87.129625][ T1453] RDX: 0000000000000000 RSI: 000000000000001e RDI: 0000000000000003 [ 87.137442][ T1453] RBP: 00007fad91f34ba0 R08: 0000000000000000 R09: 00007ffcf9a0f3af [ 87.145252][ T1453] R10: 000000000003fd44 R11: 0000000000000246 R12: 00000000000150fc [ 87.153061][ T1453] R13: 00007ffcf9a0f1c0 R14: 0000000000000032 R15: ffffffffffffffff [ 87.160878][ T1453] [ 87.163736][ T1453] [ 87.165906][ T1453] Allocated by task 1456: [ 87.170074][ T1453] __kasan_slab_alloc+0xb1/0xe0 [ 87.174760][ T1453] slab_post_alloc_hook+0x53/0x2c0 [ 87.179708][ T1453] kmem_cache_alloc+0xf5/0x250 [ 87.184305][ T1453] skb_clone+0x1d1/0x360 [ 87.188386][ T1453] sk_psock_verdict_recv+0x53/0x840 [ 87.193417][ T1453] unix_read_sock+0x132/0x370 [ 87.198016][ T1453] sk_psock_verdict_data_ready+0x147/0x1a0 [ 87.203660][ T1453] unix_dgram_sendmsg+0x15fa/0x2090 [ 87.208695][ T1453] ____sys_sendmsg+0x59e/0x8f0 [ 87.213406][ T1453] ___sys_sendmsg+0x252/0x2e0 [ 87.217918][ T1453] __se_sys_sendmsg+0x19a/0x260 [ 87.222608][ T1453] __x64_sys_sendmsg+0x7b/0x90 [ 87.227202][ T1453] x64_sys_call+0x16a/0x9a0 [ 87.231547][ T1453] do_syscall_64+0x3b/0xb0 [ 87.235795][ T1453] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 87.241530][ T1453] [ 87.243692][ T1453] Freed by task 540: [ 87.247427][ T1453] kasan_set_track+0x4b/0x70 [ 87.251850][ T1453] kasan_set_free_info+0x23/0x40 [ 87.256622][ T1453] ____kasan_slab_free+0x126/0x160 [ 87.261572][ T1453] __kasan_slab_free+0x11/0x20 [ 87.266183][ T1453] slab_free_freelist_hook+0xbd/0x190 [ 87.271378][ T1453] kmem_cache_free+0x115/0x330 [ 87.275981][ T1453] kfree_skbmem+0x104/0x170 [ 87.280325][ T1453] kfree_skb+0xc2/0x360 [ 87.284309][ T1453] sk_psock_backlog+0xad1/0xdc0 [ 87.288997][ T1453] process_one_work+0x6bb/0xc10 [ 87.293690][ T1453] worker_thread+0xad5/0x12a0 [ 87.298197][ T1453] kthread+0x421/0x510 [ 87.302102][ T1453] ret_from_fork+0x1f/0x30 [ 87.306359][ T1453] [ 87.308526][ T1453] The buggy address belongs to the object at ffff8881272da500 [ 87.308526][ T1453] which belongs to the cache skbuff_head_cache of size 248 [ 87.322932][ T1453] The buggy address is located 0 bytes inside of [ 87.322932][ T1453] 248-byte region [ffff8881272da500, ffff8881272da5f8) [ 87.335867][ T1453] The buggy address belongs to the page: [ 87.341425][ T1453] page:ffffea00049cb680 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1272da [ 87.351487][ T1453] flags: 0x4000000000000200(slab|zone=1) [ 87.356963][ T1453] raw: 4000000000000200 0000000000000000 0000000100000001 ffff8881081aa780 [ 87.365384][ T1453] raw: 0000000000000000 00000000000c000c 00000001ffffffff 0000000000000000 [ 87.373793][ T1453] page dumped because: kasan: bad access detected [ 87.380045][ T1453] page_owner tracks the page as allocated [ 87.385598][ T1453] page last allocated via order 0, migratetype Unmovable, gfp_mask 0x12cc0(GFP_KERNEL|__GFP_NOWARN|__GFP_NORETRY), pid 293, ts 23972550051, free_ts 0 [ 87.400528][ T1453] post_alloc_hook+0x1a3/0x1b0 [ 87.405131][ T1453] prep_new_page+0x1b/0x110 [ 87.409470][ T1453] get_page_from_freelist+0x3550/0x35d0 [ 87.414865][ T1453] __alloc_pages+0x27e/0x8f0 [ 87.419275][ T1453] new_slab+0x9a/0x4e0 [ 87.423184][ T1453] ___slab_alloc+0x39e/0x830 [ 87.427608][ T1453] __slab_alloc+0x4a/0x90 [ 87.431775][ T1453] kmem_cache_alloc+0x139/0x250 [ 87.436458][ T1453] __alloc_skb+0xbe/0x550 [ 87.440625][ T1453] inet6_netconf_notify_devconf+0xdd/0x190 [ 87.446286][ T1453] __addrconf_sysctl_register+0x380/0x3e0 [ 87.451937][ T1453] addrconf_sysctl_register+0x141/0x1a0 [ 87.457400][ T1453] ipv6_add_dev+0xc84/0x1140 [ 87.461846][ T1453] addrconf_notify+0x593/0xdd0 [ 87.466429][ T1453] raw_notifier_call_chain+0x8c/0xf0 [ 87.471551][ T1453] call_netdevice_notifiers+0x145/0x1b0 [ 87.476929][ T1453] page_owner free stack trace missing [ 87.482138][ T1453] [ 87.484304][ T1453] Memory state around the buggy address: [ 87.489779][ T1453] ffff8881272da400: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 87.497680][ T1453] ffff8881272da480: fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc fc [ 87.505571][ T1453] >ffff8881272da500: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 87.513466][ T1453] ^ [ 87.517377][ T1453] ffff8881272da580: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fc [ 87.525275][ T1453] ffff8881272da600: fc fc fc fc fc fc fc fc fa fb fb fb fb fb fb fb [ 87.533170][ T1453] ================================================================== [ 87.636524][ T30] audit: type=1400 audit(1738045223.759:127): avc: denied { ioctl } for pid=1462 comm="syz.2.371" path="net:[4026532560]" dev="nsfs" ino=4026532560 ioctlcmd=0x9409 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1