last executing test programs: 2.057059112s ago: executing program 3 (id=1014): bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x6, 0x5, &(0x7f0000000000)=ANY=[], 0x0, 0x3, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @xdp, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1801000000002000000000000000000018190000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000002400000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x17, 0x0, 0x4, 0xff, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000006c0)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x64, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x36, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000140)='sched_switch\x00', r1}, 0x10) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000200)={'rose0\x00', 0x112}) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000180)={'rose0\x00', 0x112}) ioctl$TUNSETQUEUE(r3, 0x400454d9, &(0x7f0000000100)={'vlan0\x00', 0x400}) 2.054435341s ago: executing program 2 (id=1016): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16, 0x0, 0x4, 0xff, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=ANY=[], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000f00)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x34, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000100), 0x10, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000240)={r1, 0x1f2f, 0xf, 0x3253, &(0x7f00000007c0)="9f44948721919580684010a40800", 0x0, 0x241, 0x0, 0xb1, 0x0, &(0x7f0000000700)="389ceff69d08b0af1cc71b6262d50660bbaf31a7f8cd6a6f911beb65d5fe6b54bf21a66489121f24fefd198059288c9b735e1898e77a7469489a249292c02a72bc193a3008ebdbf4e9dd4ee8fcceef55402c913c8dd0ebece1330aaa93ece835c5044a246a5967e3acd7c950b3b19f351830e545eb9bc3a9c6dd22ce97f1f857cfe8b68a2370b69ea336006b589368f92deb68f3dfc6f2bfee09f8342da437fce5dcdf658e453e3132bb42067575318c39"}, 0x23) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0xb, 0x4, &(0x7f0000000500)=ANY=[@ANYRES64=r0, @ANYRES16=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850400000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0xfffffffffffffe1c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000800)=ANY=[@ANYBLOB="0b0000000500000008040000cd00000001000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="00000000000000000000000000000000000000000000000000000000e79337"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r2], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000100)='kmem_cache_free\x00', r3}, 0x10) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r5, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000080)='0', 0x1}], 0x1}, 0x4040001) recvmsg$unix(r4, &(0x7f0000000bc0)={0x0, 0x0, 0x0}, 0x0) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000000c0)) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, 0x0, &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x5, 0x400, 0x9, 0x1, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r7 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1800000000000000000000004b64ffec8500000050000000850000000f00000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000100)='kfree\x00', r7}, 0x10) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f00000004c0)={r6, &(0x7f0000000340), &(0x7f00000005c0)=""/155}, 0x20) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000300)={r6, 0x0, &(0x7f0000000700)=""/156}, 0x20) r8 = syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000080)) write$cgroup_subtree(r8, &(0x7f00000003c0)=ANY=[], 0x4) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000080)='mem\x00\x10\x00\x00\x00\x00\x00\x00I\xa2l') r9 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x1, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TUNSETIFF(r9, 0x400454ca, &(0x7f00000000c0)={'syzkaller0\x00', 0x84aebfbd6349b7f2}) 2.015829052s ago: executing program 0 (id=1018): socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000180)={{r0}, &(0x7f00000005c0), &(0x7f0000000600)='%-010d \x00'}, 0x20) r2 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xf, &(0x7f0000000240)=ANY=[@ANYBLOB="1800000000001000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000000000008500000084000000b7000000000000009500"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000340)=ANY=[@ANYBLOB], 0xc) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, r2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x5, 0xfffffffd, 0x7fe2, 0x2, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) close(r4) r6 = openat$tun(0xffffffffffffff9c, &(0x7f00000002c0), 0x498180, 0x0) ioctl$TUNSETOFFLOAD(r6, 0x400454d0, 0x15) close(0xffffffffffffffff) sendmsg$unix(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=ANY=[@ANYRES32], 0x18}, 0x0) close(r5) syz_clone(0x62008000, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$SIOCSIFHWADDR(r1, 0x8914, &(0x7f0000000000)={'veth0_vlan\x00', @remote}) 1.976554041s ago: executing program 3 (id=1019): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x1c1842, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x5, 0x408, 0xcd, 0x1, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @cgroup_skb, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f00000004c0)={r1, &(0x7f0000000340), 0x0}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r1], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r2}, 0x10) r3 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0xcc, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x40000}, 0x0, 0x0, r3, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000140)={0x16, 0x3, &(0x7f0000000000)=@framed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) write$cgroup_devices(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="1e03"], 0x10) 1.765449381s ago: executing program 3 (id=1023): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x1c1341, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller0\x00', 0x84aebfbd6349b7f2}) (async) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) close(r1) (async) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) (async) ioctl$SIOCSIFHWADDR(r1, 0x8914, &(0x7f0000002280)={'syzkaller0\x00', @multicast}) (async) write$cgroup_subtree(r0, &(0x7f0000000440)=ANY=[@ANYBLOB="8fedcb5d07081175f37538e48906"], 0xfdef) 1.575006401s ago: executing program 3 (id=1025): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x14, &(0x7f0000000400)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000010000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000020850000000400000095"], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x40, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x19, 0x63, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000070000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000a5df"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @cgroup_sockopt=0x16, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, @void, @value}, 0x94) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2d, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f00000002c0)='sched_process_fork\x00', r0}, 0x10) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 89) 1.285177941s ago: executing program 1 (id=1026): bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x16, 0x4, &(0x7f0000000500)=ANY=[@ANYBLOB="b40000000000080079109000000000006300400000000000950000a731e931a2a7"], &(0x7f0000003ff6)='GPL\x00', 0x5, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @flow_dissector, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x48) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000540)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, @void, @value, @void, @value}, 0x48) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={0x0, r0}, 0x18) perf_event_open(&(0x7f00000004c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r1, 0x8914, &(0x7f0000000040)={'sit0\x00', @local}) sendmsg$tipc(0xffffffffffffffff, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.swap.events\x00', 0x275a, 0x0) setsockopt$sock_attach_bpf(r2, 0x1, 0x2a, &(0x7f0000000100)=r4, 0x4) sendmsg$unix(r3, &(0x7f0000000380)={0x0, 0x0, 0x0}, 0x0) sendmsg$inet(r3, &(0x7f0000000840)={0x0, 0x0, &(0x7f00000009c0)=[{&(0x7f0000000200)="2cf1723f30e9", 0x6}], 0x1}, 0x40000) recvmsg$unix(r2, &(0x7f0000000980)={0x0, 0x0, 0x0}, 0x40000062) r5 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000000)='sched_switch\x00'}, 0x10) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0xfffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_QUERY(0x10, 0x0, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r5, 0xc008240a, &(0x7f0000000400)=ANY=[]) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000e00)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r6, 0x8914, &(0x7f0000000040)={'sit0\x00', @random="4f33e363a4b1"}) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000200018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000107b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000925e850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1f, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000940)={&(0x7f0000000700)=ANY=[@ANYBLOB="9feb0100180000000000000040000000400000000600000000000000030000060400000001000000000000000400f52f0000000000000000000000f2000000000000000f03000000592cd8000000000000000f01000000d3002e00"], &(0x7f0000000880)=""/151, 0x5e, 0x97, 0x1, 0x0, 0x0, @void, @value}, 0x20) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0xb, 0x8, 0xc, 0xffffffff, 0x1, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f0000000300)='sched_switch\x00', r8}, 0x10) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000880)={r7, 0xe0, &(0x7f0000000780)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x3, 0x4, &(0x7f0000000200)=[0x0, 0x0, 0x0], &(0x7f0000000280)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x56, &(0x7f00000002c0)=[{}, {}, {}, {}], 0x20, 0x10, &(0x7f0000000680), &(0x7f00000006c0), 0x8, 0x41, 0x8, 0x8, &(0x7f0000000700)}}, 0x10) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000000), 0x2a979d) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x11, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1801000021000000000000004bc311ec8500000075000000850000000800000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) 1.218014981s ago: executing program 0 (id=1027): perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}, 0x0, 0xc8, 0x0, 0x0, 0xfffffffffffffffe, 0x8}, 0x0, 0xd, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r1) recvmsg$unix(r0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xa, 0x4, 0xffd, 0x7, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000280)={{r3}, &(0x7f0000000040), &(0x7f0000000180)=r4}, 0x20) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r5}, 0x10) write$cgroup_subtree(r2, &(0x7f0000000580)=ANY=[@ANYBLOB="8fedcb791f6f9875f37538e486dd6317ce81ea031100fe08000e40000200875a65969ff57b00ff0200"/51], 0xfdef) 1.180789311s ago: executing program 0 (id=1029): bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x6, 0x5, &(0x7f0000000000)=ANY=[], 0x0, 0x3, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @xdp, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1801000000002000000000000000000018190000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000002400000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x17, 0x0, 0x4, 0xff, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000006c0)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x64, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x36, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000140)='sched_switch\x00', r1}, 0x10) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000200)={'rose0\x00', 0x112}) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000180)={'rose0\x00', 0x112}) ioctl$TUNSETQUEUE(r3, 0x400454d9, &(0x7f0000000100)={'vlan0\x00', 0x400}) 1.031505101s ago: executing program 2 (id=1031): openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000340)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x20025, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x3, 0x13, &(0x7f0000000740)=ANY=[@ANYBLOB="1800000000000000000000000000000018010000ba20702500000000002003007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000000000008500000006000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000009b00000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sched_cls, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000240)={r0, 0x0, 0x10, 0x10, &(0x7f00000002c0)='\x00\x00\x00\x00\x00\x00\x00\x00', &(0x7f0000000300)=""/8, 0x6c00, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x4c) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="020000000400000006000000050000000010", @ANYBLOB], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000001900007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffd98, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00', r2}, 0x10) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7a2212c7a1afecd3, @perf_config_ext={0x100}, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) write$cgroup_type(r3, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2f, r3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) 1.030973901s ago: executing program 1 (id=1032): bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1801000000002000000000000000000018190000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000024000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r0], 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r1}, 0x10) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0xffcfffffffffffff, 0xffffffffffffffff, 0x0) 1.030229941s ago: executing program 0 (id=1033): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x1c1842, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x5, 0x408, 0xcd, 0x1, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @cgroup_skb, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f00000004c0)={r1, &(0x7f0000000340), 0x0}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r1], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r2}, 0x10) r3 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0xcc, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x40000}, 0x0, 0x0, r3, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000140)={0x16, 0x3, &(0x7f0000000000)=@framed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) write$cgroup_devices(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="1e03"], 0x10) 976.445091ms ago: executing program 1 (id=1034): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x5, 0x408, 0xcd, 0x1, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f00000004c0)={r0, &(0x7f0000000340), &(0x7f00000005c0)=""/155}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r1}, 0x10) r2 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0xcc, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x40000}, 0x0, 0x0, r2, 0x200000000000000) 782.738781ms ago: executing program 1 (id=1035): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16, 0x0, 0x4, 0xff, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRESOCT, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r1}, 0x10) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000540)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000058ed53f6e5cfd0f09f39143b5b4fa5020000009a5babf4c137e301837c6bf8b5b0e26b923735734b81968ae244df689ac28afd8c62f8eaea016959df28dafa92a85d314d770976"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000500)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x2, 0x4, 0x599, 0x1, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000001340), &(0x7f0000000900), 0x404, r3, 0x0, 0x1ba8847c99}, 0x38) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$TOKEN_CREATE(0x24, 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f0000000300)='sched_switch\x00', r2}, 0x10) bpf$PROG_LOAD(0x5, 0x0, 0x0) 728.493ms ago: executing program 0 (id=1036): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0x16, 0x0, 0x4, 0xff, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0xff48, 0x10, 0x0, 0x0, 0x0, 0x0, 0x42, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) (async) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000003c0)={{r0}, 0x0, &(0x7f0000000040)}, 0x20) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f00000002c0)='sched_process_fork\x00', r1}, 0x10) 626.219471ms ago: executing program 0 (id=1037): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="0100000004000000e27f000001"], 0x50) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x56, &(0x7f00000007c0)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], &(0x7f0000000340)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='kmem_cache_free\x00', r1}, 0x10) r2 = getpid() syz_open_procfs$namespace(r2, &(0x7f0000000080)='ns/pid_for_children\x00') bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000002c0)={{r0}, &(0x7f0000000200), &(0x7f0000000280)=r1}, 0x20) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0xf8, 0x0, 0x0, 0x1, 0x40000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x5}, 0x0, 0x20c8, 0x0, 0x5}, r2, 0x5, 0xffffffffffffffff, 0xb) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="19000000040000000800000006"], 0x48) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000019007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='kmem_cache_free\x00', r4}, 0x10) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x0, 0x4, 0x0, 0x0, 0x0, 0xfff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xa}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000004c0)={&(0x7f0000000440)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x9, [@volatile={0x6, 0x0, 0x0, 0x9, 0x4}, @typedef={0x9, 0x0, 0x0, 0x8, 0x4}]}, {0x0, [0x61, 0x61, 0x0, 0x0, 0x5f, 0x0, 0x61]}}, &(0x7f0000000480)=""/45, 0x39, 0x2d, 0x0, 0x2, 0x10000, @value}, 0x28) bpf$MAP_CREATE(0x0, &(0x7f0000000500)=@bloom_filter={0x1e, 0x5, 0x9, 0xe4, 0x20, r3, 0x7, '\x00', 0x0, r5, 0x0, 0x3, 0x3, 0x3, @void, @value, @void, @value}, 0x50) perf_event_open(&(0x7f0000000380)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x9100, 0xc8}, 0x0, 0x4, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r7) recvmsg$unix(r6, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r8, &(0x7f0000000000)=ANY=[], 0xfdef) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff}) recvmsg$unix(r9, &(0x7f0000000600)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r10, &(0x7f0000000300)=ANY=[@ANYBLOB="8fedcb7910009875f37538e486dd6317ce8102036c00fe08000e40000200875a65969ff57b00000000000000000000000000ac1414aa"], 0xfdef) 615.416431ms ago: executing program 2 (id=1038): socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r1) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x5, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xc00000000000}, 0x0, 0x2000000000c8, 0x10000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000}, 0x0, 0x0, 0xffffffffffffffff, 0x1) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="020000000400000005000000020000000010"], 0x48) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000010007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r4 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0), 0x1c1842, 0x0) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="1b0000200000000000000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f0000000600)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b702000020000000850000008600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000040)='kmem_cache_free\x00', r6}, 0x10) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'syzkaller0\x00', 0xca58c30f81b6079f}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r7, 0x8914, &(0x7f0000000080)) write$cgroup_devices(r4, &(0x7f0000000100)=ANY=[@ANYBLOB="1e031800dd5c980128854d4a"], 0xffdd) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={&(0x7f0000000040)='kmem_cache_free\x00', r3}, 0x10) recvmsg$unix(r0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r8, &(0x7f0000000300)=ANY=[@ANYBLOB="8fedcb7910009875f37538e486dd6317ce8102033200fe08000e40000200875a65969ff57b00000000000000000000000000ac1414aa"], 0xfdef) 423.00416ms ago: executing program 4 (id=1040): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000780)=ANY=[@ANYBLOB], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r0}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x1000}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000000)='module_request\x00', r1}, 0x10) socketpair(0x0, 0x0, 0x0, &(0x7f0000000140)) 421.108531ms ago: executing program 1 (id=1041): openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000340)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x20025, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x3, 0x13, &(0x7f0000000740)=ANY=[@ANYBLOB="1800000000000000000000000000000018010000ba20702500000000002003007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000000000008500000006000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000009b00000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sched_cls, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000240)={r0, 0x0, 0x10, 0x10, &(0x7f00000002c0)='\x00\x00\x00\x00\x00\x00\x00\x00', &(0x7f0000000300)=""/8, 0x6c00, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x4c) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="02000000040000000600000005000000001000", @ANYBLOB], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000001900007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffd98, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00', r2}, 0x10) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7a2212c7a1afecd3, @perf_config_ext={0x100}, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) write$cgroup_type(r3, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2f, r3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) 384.11273ms ago: executing program 4 (id=1042): r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000380)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x5, 0x1, 0x0, @void, @value, @void, @value}, 0x50) r1 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000400), 0x4) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)=@bloom_filter={0x1e, 0x1, 0xffff11cf, 0x4e7, 0x2, r0, 0x7, '\x00', 0x0, r1, 0x1, 0x2, 0x5, 0x0, @void, @value, @void, @value}, 0x50) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000008c0)={{r2, 0xffffffffffffffff}, &(0x7f0000000840), &(0x7f0000000880)}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000e80)={r3, &(0x7f0000000d40), 0x0}, 0x20) bpf$MAP_LOOKUP_BATCH(0x18, &(0x7f0000000000)={&(0x7f00000000c0)="b1f8f33e10d497ea1234c9e0346d997adf64f189550a38d45eb039c809209a09b4eef5ad1555a9bfbb66538ad922c732a213da745399898b1048977ca52b52c8748e810ebbd60e0e01b6c44ded72bf3f4e9c62fe3c522211e200141a8ff08e2d8d6c5936424c2c284dad20afff352884728b6baf48476075b658d0c54369c7dac49e9546d4b65be2f2110cc9d4ec77601987cb1bd912a143dd22fdd90c0cd47c87ce8f9a2c33588a4eddf012b034f999029758b428450ec36cc57f4458b38efc80daa77886d206369ac3e3739deffb94e54e348e", &(0x7f00000001c0)=""/174, &(0x7f0000000280)="bbc5a111be296c0b080d3955a828ce4337871ff6f5e26525f3b6dc88abfe5d9c838588150aa228d6b91e3270b478f1c0ae7b061e06a9a9ea2b50d101f6417c4a50de12c81d72a3f827f3258066ade4f088e74b117d8d0e9d178534a8dd8d2ed28e8805f874668c2344", &(0x7f0000000300)="bd0c33fe59ba3f8d3fcd84f095481cd558ec701093eca834f53e7e3a27e7696e3f3c58b0b52baa04faa2c8c6a92a6180d6fa99cc6e64df032b09a78a0271fe388c5439c574e9feadfb86ec34e6bd73d93398f8f3c19f56890fb40cedbbefd4539d13775f0f960bb50c", 0x0, r3}, 0x38) 353.54766ms ago: executing program 2 (id=1043): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB="1600000000000000040000000100000000000000", @ANYRES32=0x1, @ANYBLOB="0000000000009d9166b0f52a7286f1393f65ff3d", @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x50) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000300)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) (async) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000300)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r1 = getpid() perf_event_open(&(0x7f00000009c0)={0x4, 0x80, 0x5, 0x7, 0x9, 0x49, 0x0, 0x1, 0x80200, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x2, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x54, 0x4, @perf_bp={&(0x7f0000000740)}, 0x200, 0x1c113d38, 0x8, 0x2, 0x2, 0x4, 0x7ff, 0x0, 0x0, 0x0, 0x2}, r1, 0x8, 0xffffffffffffffff, 0x8) r2 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000600)={0x6, 0x14, &(0x7f0000000bc0)=ANY=[@ANYBLOB="180000000a0000000000000007000000186b000007000000000000004000000018110000", @ANYRES32=r0, @ANYBLOB="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"], &(0x7f0000000000)='syzkaller\x00', 0x6, 0x20, &(0x7f0000000180)=""/32, 0x41100, 0x29, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f00000002c0)={0x5, 0x4, 0x81, 0xc4}, 0x10, 0x0, 0x0, 0x1, &(0x7f00000003c0)=[r0, r0, r0], &(0x7f0000000400)=[{0x2, 0x3, 0x1, 0x1}], 0x10, 0x4, @void, @value}, 0x94) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000980)={r2, 0xe0, &(0x7f0000000880)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, &(0x7f00000006c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, &(0x7f0000000700)=[0x0, 0x0, 0x0, 0x0], &(0x7f0000000740), 0x0, 0xae, &(0x7f0000000780)=[{}], 0x8, 0x10, &(0x7f00000007c0), &(0x7f0000000800), 0x8, 0x60, 0x8, 0x8, &(0x7f0000000840)}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000f00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$MAP_CREATE(0x0, 0x0, 0x0) (async) bpf$MAP_CREATE(0x0, 0x0, 0x0) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="0e00000004000000ebff009770eeec5f1ffc1bc6d47cca6b000800000000000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0e000000040000000800"], 0x48) (async) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0e000000040000000800"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000069000000000000000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b7080000000000107b8af8ff00000000bfa200000000000007020000fcffffffb703000008000000b70400000000925e850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x28, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) (async) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x28, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000580)={&(0x7f0000000040)='snd_soc_dapm_walk_done\x00', r6}, 0x18) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000580)={&(0x7f0000000040)='snd_soc_dapm_walk_done\x00', r6}, 0x18) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0xc8, 0x20000, 0x0, 0x7}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x3) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) r9 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0a00000004000000010000000800000000000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/19], 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x9, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800"/15, @ANYRES32=r9], 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1e, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x9, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800"/15, @ANYRES32=r9], 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1e, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000280)={{r9}, &(0x7f0000000000), &(0x7f0000000180)}, 0x20) (async) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000280)={{r9}, &(0x7f0000000000), &(0x7f0000000180)}, 0x20) close(r8) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="8fedcb7903"], 0xfdef) (async) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="8fedcb7903"], 0xfdef) recvmsg$unix(r7, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) (async) recvmsg$unix(r7, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000580)={&(0x7f0000000540)='dlm_lock_start\x00', 0xffffffffffffffff, 0x0, 0x2e}, 0x21) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r4], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={0xffffffffffffffff, 0x18000000000002a0, 0xe40, 0x0, &(0x7f0000000100)="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", 0x0, 0x8, 0x60000000}, 0x1e) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) perf_event_open(&(0x7f0000000a00)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x4, 0xb2321, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffffe}, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) 305.191981ms ago: executing program 4 (id=1044): bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x6, 0x5, &(0x7f0000000000)=ANY=[], 0x0, 0x3, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @xdp, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1801000000002000000000000000000018190000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000002400000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x17, 0x0, 0x4, 0xff, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000006c0)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x64, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x36, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000140)='sched_switch\x00', r1}, 0x10) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000200)={'rose0\x00', 0x112}) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000180)={'rose0\x00', 0x112}) ioctl$TUNSETQUEUE(r3, 0x400454d9, &(0x7f0000000100)={'vlan0\x00', 0x400}) 304.8319ms ago: executing program 3 (id=1045): bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1801000000002000000000000000000018190000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000024000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r0], 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r1}, 0x10) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0xffcfffffffffffff, 0xffffffffffffffff, 0x0) 273.9113ms ago: executing program 2 (id=1046): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x1c1842, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x5, 0x408, 0xcd, 0x1, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @cgroup_skb, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f00000004c0)={r1, &(0x7f0000000340), &(0x7f00000005c0)=""/155}, 0x20) bpf$PROG_LOAD(0x5, 0x0, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r2}, 0x10) r3 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0xcc, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x40000}, 0x0, 0x0, r3, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000140)={0x16, 0x3, &(0x7f0000000000)=@framed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) write$cgroup_devices(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="1e03"], 0x10) 227.764341ms ago: executing program 4 (id=1047): bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYRES32=0x0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x13, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) (async) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x48) bpf$PROG_LOAD(0x5, 0x0, 0x0) (async) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) (async, rerun: 32) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) (rerun: 32) bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) perf_event_open(&(0x7f0000000340)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x21, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xa}}, 0x0, 0xaffffffdffffffff, 0xffffffffffffffff, 0x0) (async) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000040)={0x5, 0x5, &(0x7f0000000200)=ANY=[@ANYBLOB="180000000000000000000000000000b69fd6df31aca1d1367c0004000000bb7f1a00c600feff0000000a9500000000000001"], &(0x7f0000000000)='syzkaller\x00', 0x5, 0xf4240, &(0x7f0000000100)=""/147, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) (async, rerun: 64) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) (rerun: 64) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="0900000004000000ff0f00000500000000000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="0000000000000000000000fd4f413360babb00"/35], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, 0x0, 0x0) (async) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000140)='sched_switch\x00', r2}, 0x10) (async) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000240)={0xffffffffffffffff, 0x1f2f, 0x0, 0x0, 0x0, 0x0, 0x241, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) (async) bpf$PROG_LOAD(0x5, 0x0, 0x0) (async) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) (async) bpf$PROG_LOAD(0x5, 0x0, 0x0) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$MAP_CREATE(0x2000000000000000, &(0x7f0000000740)=ANY=[@ANYBLOB="0600000004000000008000005c00000000000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="00000000feffffff0400000000000000000000000000000000000000ffb7a67da6c358b1647836a0f6a25731b16be44b0417254be18b90f988e90e9f3379ea08d549b5c92a322dc7f8109a2da16af44e3ed2e3e3acd9556385"], 0x48) (async) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xa, 0x6, &(0x7f00000001c0)=ANY=[@ANYBLOB="050000000000000073112300000000008510000002000000850000000500000095000000000000009500a505000000003e91a652f63c40a8d3f7341bbb3d6fb9115988764b1ba5465940e5ccf09c922d37a9d83fe6c3"], &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x70) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r0}, 0x10) (async) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r4) (async) recvmsg$unix(r3, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) 170.77283ms ago: executing program 4 (id=1048): r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000002e00)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x222, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x48) r1 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="1b0000000000000000000000000004"], 0x48) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) write$cgroup_type(r2, &(0x7f0000000180), 0x40010) mkdirat$cgroup(r2, &(0x7f0000000180)='syz1\x00', 0x1ff) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x11, 0xf, &(0x7f0000000340)=ANY=[@ANYRES8, @ANYRES32=r1, @ANYRESDEC=r2], &(0x7f00000001c0)='syzkaller\x00', 0x1, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000280)={&(0x7f0000000040)='kmem_cache_free\x00', r3}, 0x10) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="170000000000000004000000ff"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001400)={{r4}, 0x0, &(0x7f00000013c0)}, 0x20) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r5}, 0x10) openat$cgroup_subtree(r2, &(0x7f0000000300), 0x2, 0x0) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x9, 0x7, 0x8000, 0x1, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000001c0)={{r6}, &(0x7f00000002c0), &(0x7f0000000280)}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000003c0)={r6, &(0x7f0000000600), &(0x7f0000000080)=""/61}, 0x20) perf_event_open(&(0x7f0000001080)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x7602, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xca}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0xe28, 0xfffffffffffffff5, &(0x7f0000000980)="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", 0x0, 0x2f, 0xe8034000, 0xf000, 0xfffffffffffffe2a, &(0x7f0000000000), &(0x7f00000000c0)="c6769e45b7c61302926682c7f9e9bb5ba2b3cdf023e8da0392a4cd62e2370f25ae5ba0dab896bcf5b774cd28bebbde39f796ae27d04582bb7c03e9fe830ea22c9fd03f6d2779515fdad3f5d0de07b7b70996102fdb67b1e77a34a5b7136a212fa2c0ea502588309dc3e42c55a6f93e6ba5e1b492f9db48f0fdd2f9fb937b3e8a63dcf9dd855837433998ba579da27559", 0x5dc}, 0x28) 159.504341ms ago: executing program 3 (id=1049): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="06000000040000000800000005"], 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000001007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) gettid() bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, @void, @value}, 0x94) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000006c0)={0x0, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='blkio.throttle.io_serviced_recursive\x00', 0x26e1, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x22, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={0x0, r1}, 0x18) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) syz_clone(0x40200400, 0x0, 0x0, 0x0, 0x0, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) openat$cgroup_freezer_state(r2, &(0x7f0000000380), 0x2, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x11, 0x8, &(0x7f0000003900)=ANY=[@ANYBLOB="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"], &(0x7f0000000380)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000080)=ANY=[@ANYBLOB="9feb01001800000000000000300000003000000005000000000000000100000408000000000000000300000010000000000000000000000200000000030000000000000f040000000000002e"], 0x0, 0x4d, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x20) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0x12, 0x8, 0x4, 0x2, 0x10, 0xffffffffffffffff, 0x9, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) bpf$MAP_DELETE_ELEM(0x2, &(0x7f0000000080)={r5, &(0x7f0000000240), 0x20000000}, 0x20) close(r4) recvmsg$unix(r3, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f0000000440)=""/251, 0xfb}], 0x1}, 0x0) sendmsg$inet(r3, &(0x7f0000000780)={0x0, 0x0, 0x0}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x21, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000005c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='kmem_cache_free\x00', r6}, 0x10) 146.20447ms ago: executing program 4 (id=1050): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, 0x0, &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x9, 0x7, 0x8000, 0x1, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000001c0)={{r1, 0xffffffffffffffff}, &(0x7f00000002c0), &(0x7f0000000280)}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000001000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000d0039000000000000b4a518110000", @ANYRES32=r2], 0x0, 0xfffffffd, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000300)='sys_enter\x00'}, 0x10) gettid() r3 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x6, 0x4, 0x3, 0x5, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x9, 0x5, 0x8, 0xf, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x16, 0x14, &(0x7f0000000280)=ANY=[@ANYBLOB="1800578c7aad000000000000000000001801000020646c2100000000002020207b1af8ff00000000bfa100001700000007010000f8ffffffb7020000080000000085000000100000000f110000", @ANYRES32=r4, @ANYRES32=r0], &(0x7f0000000380)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffb, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x16, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000140)='sched_switch\x00'}, 0x10) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x9, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETOFFLOAD(r5, 0xc004743e, 0x20001418) r6 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002120207b1af8ff00000000bfa100000000000007010000f8ffffffb702000004000000b7030000000000de850000000400000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000700)='signal_deliver\x00', r7}, 0x2e) syz_open_procfs$namespace(0x0, 0xfffffffffffffffe) ioctl$TUNSETOFFLOAD(r6, 0x40047438, 0x5333578052521f3b) bpf$MAP_CREATE(0x0, &(0x7f00000005c0)=ANY=[@ANYRES64, @ANYRES32, @ANYRES16=0x0, @ANYRES32, @ANYRESOCT=r0], 0x48) unlink(&(0x7f0000000200)='./cgroup\x00') r8 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002c80)={0x3, 0x5, &(0x7f0000000140)=ANY=[@ANYBLOB="1802000000fcff000000000000000000850000002200000085000000070000009500000000000000e3b791f4a4a3972200e1d2acd44498f2cfbf4ae21867953463a9211404aa0e942d2460473901162b5db03303d2731c0e8ff5f76396f3a69ef52a00e8ae396de506de923c26c5bc87e3461c93cca3b186787c11d06d49d19896534d476fb6550cd031867572ce45503f6f46284b1ce64c582ae6c0e66319f800991ca2b186824cd560affec254ea32ac97873b303fdaa7"], &(0x7f0000000080)='GPL\x00', 0x4, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000002c0)={r8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000000040)={0x7}, 0x8) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000002440)={{}, &(0x7f00000023c0), &(0x7f0000002400)=r8}, 0x20) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000dc0)={&(0x7f0000000c80)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@const]}}, &(0x7f0000000200)=""/263, 0x26, 0x107, 0x1, 0x0, 0x0, @void, @value}, 0x20) 127.13321ms ago: executing program 1 (id=1051): socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000000)) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000fc0)=@generic={&(0x7f0000000040)='./file0\x00', 0x0, 0x10}, 0x18) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x3, 0x0, 0x0, 0x1ff, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180), 0x1}, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0xfffffffe}, 0x0, 0x1, 0xffffffffffffffff, 0x1) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.bfq.sectors\x00', 0x26e1, 0x0) close(r0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r2 = openat$cgroup_type(r1, &(0x7f00000001c0), 0x2, 0x0) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="180100000700002c0000000000000004850000002300000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='kfree\x00', r3}, 0x10) perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x430, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_type(r2, &(0x7f0000000280), 0x9) r4 = openat$cgroup_procs(r1, &(0x7f00000002c0)='cgroup.threads\x00', 0x2, 0x0) openat$cgroup_ro(r1, &(0x7f00000000c0)='hugetlb.2MB.rsvd.usage_in_bytes\x00', 0x0, 0x0) write$cgroup_pid(r4, &(0x7f0000000c40), 0x12) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00', r6}, 0x10) syz_clone(0x40020000, 0x0, 0x0, 0x0, 0x0, 0x0) r7 = openat$cgroup_ro(r5, &(0x7f0000000040)='cgroup.freeze\x00', 0x275a, 0x0) write$cgroup_int(r7, &(0x7f0000000200)=0x1, 0x12) 0s ago: executing program 2 (id=1052): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000780)=ANY=[@ANYBLOB='\v\x00\x00\x00\b\x00\x00\x00\f'], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r0}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x1000}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000000)='module_request\x00', r1}, 0x10) socketpair(0x0, 0x0, 0x0, &(0x7f0000000140)) kernel console output (not intermixed with test programs): R13: ffff88810fd63000 R14: ffffc9000008d000 R15: dffffc0000000000 [ 24.914755][ T344] FS: 00007ff7d6a436c0(0000) GS:ffff8881f7100000(0000) knlGS:0000000000000000 [ 24.923717][ T344] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 24.930505][ T344] CR2: 0000000000000000 CR3: 000000012858a000 CR4: 00000000003506a0 [ 24.939697][ T344] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 24.947941][ T344] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 24.956915][ T357] device bridge0 entered promiscuous mode [ 24.963451][ T344] Call Trace: [ 24.967336][ T344] [ 24.970503][ T344] ? show_regs+0x58/0x60 [ 24.975108][ T344] ? __warn+0x160/0x2f0 [ 24.984218][ T344] ? check_map_prog_compatibility+0x6f1/0x890 [ 25.023205][ T344] ? report_bug+0x3d9/0x5b0 [ 25.034319][ T344] ? check_map_prog_compatibility+0x6f1/0x890 [ 25.044044][ T344] ? handle_bug+0x41/0x70 [ 25.054322][ T344] ? exc_invalid_op+0x1b/0x50 [ 25.058950][ T344] ? asm_exc_invalid_op+0x1b/0x20 [ 25.115164][ T344] ? __wake_up_klogd+0xd5/0x110 [ 25.119924][ T344] ? check_map_prog_compatibility+0x6f1/0x890 [ 25.279419][ T344] ? check_map_prog_compatibility+0x6f1/0x890 [ 25.364058][ T344] resolve_pseudo_ldimm64+0x682/0x1240 [ 25.413632][ T344] ? check_attach_btf_id+0xef0/0xef0 [ 25.464068][ T344] ? __mark_reg_known+0x1b0/0x1b0 [ 25.494009][ T344] ? security_capable+0x87/0xb0 [ 25.520955][ T344] bpf_check+0x3190/0x12c60 [ 25.537984][ T344] ? is_bpf_text_address+0x172/0x190 [ 25.550200][ T344] ? stack_trace_save+0x1c0/0x1c0 [ 25.561018][ T344] ? __kernel_text_address+0x9b/0x110 [ 25.569648][ T344] ? unwind_get_return_address+0x4d/0x90 [ 25.578335][ T344] ? bpf_get_btf_vmlinux+0x60/0x60 [ 25.587513][ T344] ? arch_stack_walk+0xf3/0x140 [ 25.603795][ T344] ? stack_trace_save+0x113/0x1c0 [ 25.610229][ T344] ? stack_trace_snprint+0xf0/0xf0 [ 25.615320][ T344] ? stack_trace_snprint+0xf0/0xf0 [ 25.620278][ T344] ? __stack_depot_save+0x34/0x470 [ 25.625413][ T344] ? ____kasan_kmalloc+0xed/0x110 [ 25.630283][ T344] ? ____kasan_kmalloc+0xdb/0x110 [ 25.635178][ T344] ? __kasan_kmalloc+0x9/0x10 [ 25.639656][ T344] ? kmem_cache_alloc_trace+0x11a/0x270 [ 25.645374][ T344] ? selinux_bpf_prog_alloc+0x51/0x140 [ 25.650682][ T344] ? security_bpf_prog_alloc+0x62/0x90 [ 25.656080][ T344] ? bpf_prog_load+0x9ee/0x1b50 [ 25.660775][ T344] ? __sys_bpf+0x4bc/0x760 [ 25.665058][ T344] ? __x64_sys_bpf+0x7c/0x90 [ 25.673271][ T344] ? x64_sys_call+0x87f/0x9a0 [ 25.678233][ T344] ? do_syscall_64+0x3b/0xb0 [ 25.704382][ T344] ? entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 25.723877][ T344] ? __kasan_kmalloc+0x9/0x10 [ 25.728421][ T344] ? memset+0x35/0x40 [ 25.740270][ T30] kauditd_printk_skb: 43 callbacks suppressed [ 25.740304][ T30] audit: type=1400 audit(1736947206.971:119): avc: denied { relabelfrom } for pid=375 comm="syz.0.17" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tun_socket permissive=1 [ 25.765547][ T344] ? bpf_obj_name_cpy+0x196/0x1e0 [ 25.766697][ T30] audit: type=1400 audit(1736947206.971:120): avc: denied { relabelto } for pid=375 comm="syz.0.17" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tun_socket permissive=1 [ 25.770385][ T344] bpf_prog_load+0x12ac/0x1b50 [ 25.893399][ T382] Scheduler tracepoints stat_sleep, stat_iowait, stat_blocked and stat_runtime require the kernel parameter schedstats=enable or kernel.sched_schedstats=1 [ 25.985218][ T344] ? map_freeze+0x370/0x370 [ 25.989604][ T344] ? selinux_bpf+0xcb/0x100 [ 26.022968][ T344] ? security_bpf+0x82/0xb0 [ 26.072394][ T344] __sys_bpf+0x4bc/0x760 [ 26.101006][ T344] ? bpf_link_show_fdinfo+0x300/0x300 [ 26.124336][ T344] ? __kasan_check_write+0x14/0x20 [ 26.131413][ T30] audit: type=1400 audit(1736947207.361:121): avc: denied { write } for pid=385 comm="syz.0.19" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=1 [ 26.134090][ T344] ? switch_fpu_return+0x15f/0x2e0 [ 26.269640][ T344] __x64_sys_bpf+0x7c/0x90 [ 26.293858][ T344] x64_sys_call+0x87f/0x9a0 [ 26.298252][ T344] do_syscall_64+0x3b/0xb0 [ 26.315589][ T344] ? clear_bhb_loop+0x35/0x90 [ 26.320137][ T344] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 26.364708][ T344] RIP: 0033:0x7ff7d83f2d29 [ 26.389484][ T344] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 26.564011][ T344] RSP: 002b:00007ff7d6a43038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 26.589534][ T344] RAX: ffffffffffffffda RBX: 00007ff7d85e3080 RCX: 00007ff7d83f2d29 [ 26.600389][ T344] RDX: 0000000000000094 RSI: 0000000020000000 RDI: 0000000000000005 [ 26.608668][ T344] RBP: 00007ff7d846eb08 R08: 0000000000000000 R09: 0000000000000000 [ 26.640714][ T344] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 26.689393][ T344] R13: 0000000000000000 R14: 00007ff7d85e3080 R15: 00007ffdddd1cc08 [ 26.748164][ T344] [ 26.770363][ T344] ---[ end trace 03437f0c33006f8e ]--- [ 27.177362][ T30] audit: type=1400 audit(1736947208.411:122): avc: denied { create } for pid=407 comm="syz.4.26" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 31.063777][ C1] sched: RT throttling activated [ 32.404722][ T30] audit: type=1400 audit(1736947213.641:123): avc: denied { create } for pid=508 comm="syz.1.54" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 34.254756][ T543] bridge0: port 2(bridge_slave_1) entered disabled state [ 34.266126][ T543] bridge0: port 1(bridge_slave_0) entered disabled state [ 34.277818][ T543] device bridge0 left promiscuous mode [ 34.369463][ T30] audit: type=1400 audit(1736947215.601:124): avc: denied { create } for pid=557 comm="syz.4.70" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=appletalk_socket permissive=1 [ 34.466737][ T30] audit: type=1400 audit(1736947215.701:125): avc: denied { ioctl } for pid=557 comm="syz.4.70" path="socket:[16115]" dev="sockfs" ino=16115 ioctlcmd=0x8912 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 34.976795][ T581] syz.0.79[581] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 34.976873][ T581] syz.0.79[581] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 37.212880][ T652] FAULT_INJECTION: forcing a failure. [ 37.212880][ T652] name failslab, interval 1, probability 0, space 0, times 1 [ 37.394643][ T652] CPU: 0 PID: 652 Comm: syz.4.102 Tainted: G W 5.15.176-syzkaller-00972-g829d9f138569 #0 [ 37.405615][ T652] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 37.415497][ T652] Call Trace: [ 37.418620][ T652] [ 37.421399][ T652] dump_stack_lvl+0x151/0x1c0 [ 37.425921][ T652] ? io_uring_drop_tctx_refs+0x190/0x190 [ 37.431385][ T652] dump_stack+0x15/0x20 [ 37.435372][ T652] should_fail+0x3c6/0x510 [ 37.439636][ T652] __should_failslab+0xa4/0xe0 [ 37.444231][ T652] should_failslab+0x9/0x20 [ 37.448651][ T652] slab_pre_alloc_hook+0x37/0xd0 [ 37.453427][ T652] __kmalloc+0x6d/0x2c0 [ 37.457418][ T652] ? security_prepare_creds+0x4d/0x140 [ 37.462713][ T652] security_prepare_creds+0x4d/0x140 [ 37.467838][ T652] prepare_creds+0x472/0x6a0 [ 37.472263][ T652] copy_creds+0xf0/0x630 [ 37.476338][ T652] ? dup_task_struct+0x7e6/0xc60 [ 37.481116][ T652] copy_process+0x7c3/0x3290 [ 37.485545][ T652] ? __kasan_check_write+0x14/0x20 [ 37.490579][ T652] ? selinux_file_permission+0x2c4/0x570 [ 37.496041][ T652] ? proc_fail_nth_read+0x210/0x210 [ 37.501074][ T652] ? fsnotify_perm+0x6a/0x5b0 [ 37.505624][ T652] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 37.510534][ T652] ? vfs_write+0x94d/0x1110 [ 37.515167][ T652] kernel_clone+0x21e/0x9e0 [ 37.519491][ T652] ? __kasan_check_write+0x14/0x20 [ 37.524424][ T652] ? create_io_thread+0x1e0/0x1e0 [ 37.529292][ T652] __x64_sys_clone+0x23f/0x290 [ 37.533884][ T652] ? __do_sys_vfork+0x130/0x130 [ 37.538574][ T652] ? debug_smp_processor_id+0x17/0x20 [ 37.543778][ T652] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 37.549682][ T652] ? exit_to_user_mode_prepare+0x39/0xa0 [ 37.555147][ T652] x64_sys_call+0x1b0/0x9a0 [ 37.559487][ T652] do_syscall_64+0x3b/0xb0 [ 37.563750][ T652] ? clear_bhb_loop+0x35/0x90 [ 37.568254][ T652] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 37.573982][ T652] RIP: 0033:0x7f0662dacd29 [ 37.578295][ T652] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 37.597799][ T652] RSP: 002b:00007f066141dfe8 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 37.606043][ T652] RAX: ffffffffffffffda RBX: 00007f0662f9cfa0 RCX: 00007f0662dacd29 [ 37.613855][ T652] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 37.621661][ T652] RBP: 00007f066141e090 R08: 0000000000000000 R09: 0000000000000000 [ 37.629674][ T652] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 37.637480][ T652] R13: 0000000000000000 R14: 00007f0662f9cfa0 R15: 00007ffed0733fc8 [ 37.645300][ T652] [ 38.154520][ T665] FAULT_INJECTION: forcing a failure. [ 38.154520][ T665] name failslab, interval 1, probability 0, space 0, times 0 [ 38.319106][ T665] CPU: 0 PID: 665 Comm: syz.3.107 Tainted: G W 5.15.176-syzkaller-00972-g829d9f138569 #0 [ 38.330067][ T665] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 38.339968][ T665] Call Trace: [ 38.343079][ T665] [ 38.345861][ T665] dump_stack_lvl+0x151/0x1c0 [ 38.350370][ T665] ? io_uring_drop_tctx_refs+0x190/0x190 [ 38.355844][ T665] dump_stack+0x15/0x20 [ 38.359831][ T665] should_fail+0x3c6/0x510 [ 38.364136][ T665] __should_failslab+0xa4/0xe0 [ 38.368683][ T665] ? anon_vma_clone+0x9a/0x500 [ 38.373283][ T665] should_failslab+0x9/0x20 [ 38.377626][ T665] slab_pre_alloc_hook+0x37/0xd0 [ 38.382408][ T665] ? anon_vma_clone+0x9a/0x500 [ 38.387006][ T665] kmem_cache_alloc+0x44/0x250 [ 38.391597][ T665] anon_vma_clone+0x9a/0x500 [ 38.396028][ T665] anon_vma_fork+0x91/0x4e0 [ 38.400372][ T665] ? anon_vma_name+0x4c/0x70 [ 38.404798][ T665] ? vm_area_dup+0x17a/0x230 [ 38.409216][ T665] copy_mm+0xa3a/0x13e0 [ 38.413213][ T665] ? copy_signal+0x610/0x610 [ 38.417637][ T665] ? __init_rwsem+0xfe/0x1d0 [ 38.422061][ T665] ? copy_signal+0x4e3/0x610 [ 38.426489][ T665] copy_process+0x1149/0x3290 [ 38.431009][ T665] ? __kasan_check_write+0x14/0x20 [ 38.436126][ T665] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 38.441067][ T665] ? vfs_write+0x94d/0x1110 [ 38.445412][ T665] kernel_clone+0x21e/0x9e0 [ 38.449748][ T665] ? __kasan_check_write+0x14/0x20 [ 38.454697][ T665] ? create_io_thread+0x1e0/0x1e0 [ 38.459557][ T665] __x64_sys_clone+0x23f/0x290 [ 38.464156][ T665] ? __do_sys_vfork+0x130/0x130 [ 38.468843][ T665] ? debug_smp_processor_id+0x17/0x20 [ 38.474052][ T665] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 38.479951][ T665] ? exit_to_user_mode_prepare+0x39/0xa0 [ 38.485419][ T665] x64_sys_call+0x1b0/0x9a0 [ 38.489762][ T665] do_syscall_64+0x3b/0xb0 [ 38.494020][ T665] ? clear_bhb_loop+0x35/0x90 [ 38.498526][ T665] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 38.504259][ T665] RIP: 0033:0x7fc160295d29 [ 38.508513][ T665] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 38.527949][ T665] RSP: 002b:00007fc15e906fe8 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 38.536193][ T665] RAX: ffffffffffffffda RBX: 00007fc160485fa0 RCX: 00007fc160295d29 [ 38.544015][ T665] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 38.551815][ T665] RBP: 00007fc15e907090 R08: 0000000000000000 R09: 0000000000000000 [ 38.559626][ T665] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 38.567437][ T665] R13: 0000000000000000 R14: 00007fc160485fa0 R15: 00007fff9c1b5838 [ 38.575348][ T665] [ 39.031198][ T676] device sit0 entered promiscuous mode [ 39.755671][ T690] FAULT_INJECTION: forcing a failure. [ 39.755671][ T690] name fail_page_alloc, interval 1, probability 0, space 0, times 1 [ 39.809767][ T690] CPU: 0 PID: 690 Comm: syz.2.115 Tainted: G W 5.15.176-syzkaller-00972-g829d9f138569 #0 [ 39.820727][ T690] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 39.830628][ T690] Call Trace: [ 39.833748][ T690] [ 39.836525][ T690] dump_stack_lvl+0x151/0x1c0 [ 39.841038][ T690] ? io_uring_drop_tctx_refs+0x190/0x190 [ 39.846621][ T690] ? arch_stack_walk+0xf3/0x140 [ 39.851300][ T690] dump_stack+0x15/0x20 [ 39.855293][ T690] should_fail+0x3c6/0x510 [ 39.859544][ T690] should_fail_alloc_page+0x5a/0x80 [ 39.864575][ T690] prepare_alloc_pages+0x15c/0x700 [ 39.869529][ T690] ? __alloc_pages_bulk+0xd80/0xd80 [ 39.874692][ T690] __alloc_pages+0x18c/0x8f0 [ 39.879114][ T690] ? x64_sys_call+0x1b0/0x9a0 [ 39.883628][ T690] ? prep_new_page+0x110/0x110 [ 39.888233][ T690] __get_free_pages+0x10/0x30 [ 39.892734][ T690] kasan_populate_vmalloc_pte+0x39/0x130 [ 39.898206][ T690] ? __apply_to_page_range+0x8ca/0xbe0 [ 39.903502][ T690] __apply_to_page_range+0x8dd/0xbe0 [ 39.908621][ T690] ? kasan_populate_vmalloc+0x70/0x70 [ 39.913851][ T690] ? kasan_populate_vmalloc+0x70/0x70 [ 39.919041][ T690] apply_to_page_range+0x3b/0x50 [ 39.923813][ T690] kasan_populate_vmalloc+0x65/0x70 [ 39.928852][ T690] alloc_vmap_area+0x192f/0x1a80 [ 39.933710][ T690] ? vm_map_ram+0xa90/0xa90 [ 39.938045][ T690] ? kmem_cache_alloc_trace+0x11a/0x270 [ 39.943424][ T690] ? __get_vm_area_node+0x117/0x360 [ 39.948460][ T690] __get_vm_area_node+0x158/0x360 [ 39.953326][ T690] __vmalloc_node_range+0xe2/0x8d0 [ 39.958269][ T690] ? copy_process+0x5c4/0x3290 [ 39.962870][ T690] ? slab_post_alloc_hook+0x72/0x2c0 [ 39.967995][ T690] ? dup_task_struct+0x53/0xc60 [ 39.972675][ T690] dup_task_struct+0x416/0xc60 [ 39.977277][ T690] ? copy_process+0x5c4/0x3290 [ 39.981875][ T690] ? __kasan_check_write+0x14/0x20 [ 39.986832][ T690] copy_process+0x5c4/0x3290 [ 39.991253][ T690] ? __kasan_check_write+0x14/0x20 [ 39.996199][ T690] ? selinux_file_permission+0x2c4/0x570 [ 40.001667][ T690] ? proc_fail_nth_read+0x210/0x210 [ 40.006698][ T690] ? fsnotify_perm+0x6a/0x5b0 [ 40.011214][ T690] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 40.016193][ T690] ? vfs_write+0x94d/0x1110 [ 40.020503][ T690] kernel_clone+0x21e/0x9e0 [ 40.024847][ T690] ? __kasan_check_write+0x14/0x20 [ 40.029786][ T690] ? create_io_thread+0x1e0/0x1e0 [ 40.034651][ T690] __x64_sys_clone+0x23f/0x290 [ 40.039245][ T690] ? __do_sys_vfork+0x130/0x130 [ 40.043935][ T690] ? debug_smp_processor_id+0x17/0x20 [ 40.049141][ T690] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 40.055045][ T690] ? exit_to_user_mode_prepare+0x39/0xa0 [ 40.060510][ T690] x64_sys_call+0x1b0/0x9a0 [ 40.064847][ T690] do_syscall_64+0x3b/0xb0 [ 40.069102][ T690] ? clear_bhb_loop+0x35/0x90 [ 40.073619][ T690] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 40.079345][ T690] RIP: 0033:0x7f06dd22dd29 [ 40.083686][ T690] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 40.103128][ T690] RSP: 002b:00007f06db89efe8 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 40.111382][ T690] RAX: ffffffffffffffda RBX: 00007f06dd41dfa0 RCX: 00007f06dd22dd29 [ 40.119271][ T690] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 40.127084][ T690] RBP: 00007f06db89f090 R08: 0000000000000000 R09: 0000000000000000 [ 40.135006][ T690] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 40.142902][ T690] R13: 0000000000000000 R14: 00007f06dd41dfa0 R15: 00007ffeed5d8bc8 [ 40.150721][ T690] [ 40.177926][ T690] syz.2.115: vmalloc error: size 32768, vm_struct allocation failed, mode:0xdc0(GFP_KERNEL|__GFP_ZERO), nodemask=(null),cpuset=syz2,mems_allowed=0 [ 40.195435][ T690] CPU: 0 PID: 690 Comm: syz.2.115 Tainted: G W 5.15.176-syzkaller-00972-g829d9f138569 #0 [ 40.206386][ T690] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 40.216414][ T690] Call Trace: [ 40.219537][ T690] [ 40.222314][ T690] dump_stack_lvl+0x151/0x1c0 [ 40.226840][ T690] ? io_uring_drop_tctx_refs+0x190/0x190 [ 40.232297][ T690] ? pr_cont_kernfs_name+0xf0/0x100 [ 40.237450][ T690] dump_stack+0x15/0x20 [ 40.241528][ T690] warn_alloc+0x21a/0x390 [ 40.245817][ T690] ? zone_watermark_ok_safe+0x270/0x270 [ 40.251200][ T690] ? __get_vm_area_node+0x16e/0x360 [ 40.256196][ T690] ? __get_vm_area_node+0x16e/0x360 [ 40.261234][ T690] __vmalloc_node_range+0x2c1/0x8d0 [ 40.266262][ T690] ? slab_post_alloc_hook+0x72/0x2c0 [ 40.271388][ T690] ? dup_task_struct+0x53/0xc60 [ 40.276073][ T690] dup_task_struct+0x416/0xc60 [ 40.280678][ T690] ? copy_process+0x5c4/0x3290 [ 40.285270][ T690] ? __kasan_check_write+0x14/0x20 [ 40.290217][ T690] copy_process+0x5c4/0x3290 [ 40.294647][ T690] ? __kasan_check_write+0x14/0x20 [ 40.299595][ T690] ? selinux_file_permission+0x2c4/0x570 [ 40.305061][ T690] ? proc_fail_nth_read+0x210/0x210 [ 40.310098][ T690] ? fsnotify_perm+0x6a/0x5b0 [ 40.314624][ T690] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 40.319592][ T690] ? vfs_write+0x94d/0x1110 [ 40.324070][ T690] kernel_clone+0x21e/0x9e0 [ 40.328413][ T690] ? __kasan_check_write+0x14/0x20 [ 40.333478][ T690] ? create_io_thread+0x1e0/0x1e0 [ 40.338338][ T690] __x64_sys_clone+0x23f/0x290 [ 40.343024][ T690] ? __do_sys_vfork+0x130/0x130 [ 40.347735][ T690] ? debug_smp_processor_id+0x17/0x20 [ 40.352914][ T690] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 40.358820][ T690] ? exit_to_user_mode_prepare+0x39/0xa0 [ 40.364296][ T690] x64_sys_call+0x1b0/0x9a0 [ 40.368626][ T690] do_syscall_64+0x3b/0xb0 [ 40.372875][ T690] ? clear_bhb_loop+0x35/0x90 [ 40.377393][ T690] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 40.383120][ T690] RIP: 0033:0x7f06dd22dd29 [ 40.387370][ T690] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 40.406825][ T690] RSP: 002b:00007f06db89efe8 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 40.415058][ T690] RAX: ffffffffffffffda RBX: 00007f06dd41dfa0 RCX: 00007f06dd22dd29 [ 40.422890][ T690] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 40.430681][ T690] RBP: 00007f06db89f090 R08: 0000000000000000 R09: 0000000000000000 [ 40.438494][ T690] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 40.446302][ T690] R13: 0000000000000000 R14: 00007f06dd41dfa0 R15: 00007ffeed5d8bc8 [ 40.454121][ T690] [ 40.483331][ T690] Mem-Info: [ 40.486513][ T690] active_anon:74 inactive_anon:4166 isolated_anon:0 [ 40.486513][ T690] active_file:3377 inactive_file:3102 isolated_file:0 [ 40.486513][ T690] unevictable:0 dirty:332 writeback:0 [ 40.486513][ T690] slab_reclaimable:7563 slab_unreclaimable:73094 [ 40.486513][ T690] mapped:28314 shmem:202 pagetables:593 bounce:0 [ 40.486513][ T690] kernel_misc_reclaimable:0 [ 40.486513][ T690] free:1575537 free_pcp:13301 free_cma:0 [ 40.533251][ T690] Node 0 active_anon:296kB inactive_anon:16564kB active_file:13508kB inactive_file:12508kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:113256kB dirty:1328kB writeback:0kB shmem:808kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 0kB writeback_tmp:0kB kernel_stack:4240kB pagetables:2372kB all_unreclaimable? no [ 40.651691][ T690] DMA32 free:2974676kB min:62568kB low:78208kB high:93848kB reserved_highatomic:0KB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:3145324kB managed:2978952kB mlocked:0kB bounce:0kB free_pcp:4276kB local_pcp:56kB free_cma:0kB [ 40.691723][ T713] FAULT_INJECTION: forcing a failure. [ 40.691723][ T713] name failslab, interval 1, probability 0, space 0, times 0 [ 40.709492][ T713] CPU: 0 PID: 713 Comm: syz.3.121 Tainted: G W 5.15.176-syzkaller-00972-g829d9f138569 #0 [ 40.720455][ T713] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 40.730346][ T713] Call Trace: [ 40.733470][ T713] [ 40.736246][ T713] dump_stack_lvl+0x151/0x1c0 [ 40.740762][ T713] ? io_uring_drop_tctx_refs+0x190/0x190 [ 40.746231][ T713] dump_stack+0x15/0x20 [ 40.750232][ T713] should_fail+0x3c6/0x510 [ 40.754476][ T713] __should_failslab+0xa4/0xe0 [ 40.759078][ T713] ? vm_area_dup+0x26/0x230 [ 40.763414][ T713] should_failslab+0x9/0x20 [ 40.767755][ T713] slab_pre_alloc_hook+0x37/0xd0 [ 40.772530][ T713] ? vm_area_dup+0x26/0x230 [ 40.776870][ T713] kmem_cache_alloc+0x44/0x250 [ 40.781554][ T713] vm_area_dup+0x26/0x230 [ 40.785724][ T713] copy_mm+0x9a1/0x13e0 [ 40.789747][ T713] ? copy_signal+0x610/0x610 [ 40.794140][ T713] ? __init_rwsem+0xfe/0x1d0 [ 40.798574][ T713] ? copy_signal+0x4e3/0x610 [ 40.802992][ T713] copy_process+0x1149/0x3290 [ 40.807505][ T713] ? __kasan_check_write+0x14/0x20 [ 40.812455][ T713] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 40.817399][ T713] ? vfs_write+0x94d/0x1110 [ 40.821742][ T713] kernel_clone+0x21e/0x9e0 [ 40.826079][ T713] ? __kasan_check_write+0x14/0x20 [ 40.831027][ T713] ? create_io_thread+0x1e0/0x1e0 [ 40.835897][ T713] __x64_sys_clone+0x23f/0x290 [ 40.840534][ T713] ? __do_sys_vfork+0x130/0x130 [ 40.845268][ T713] ? debug_smp_processor_id+0x17/0x20 [ 40.850473][ T713] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 40.856369][ T713] ? exit_to_user_mode_prepare+0x39/0xa0 [ 40.861852][ T713] x64_sys_call+0x1b0/0x9a0 [ 40.866177][ T713] do_syscall_64+0x3b/0xb0 [ 40.870427][ T713] ? clear_bhb_loop+0x35/0x90 [ 40.874944][ T713] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 40.880673][ T713] RIP: 0033:0x7fc160295d29 [ 40.884935][ T713] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 40.904458][ T713] RSP: 002b:00007fc15e906fe8 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 40.912733][ T713] RAX: ffffffffffffffda RBX: 00007fc160485fa0 RCX: 00007fc160295d29 [ 40.920514][ T713] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 40.928321][ T713] RBP: 00007fc15e907090 R08: 0000000000000000 R09: 0000000000000000 [ 40.936133][ T713] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 40.944551][ T713] R13: 0000000000000000 R14: 00007fc160485fa0 R15: 00007fff9c1b5838 [ 40.952454][ T713] [ 40.984430][ T30] audit: type=1400 audit(1736947222.221:126): avc: denied { create } for pid=714 comm="syz.0.120" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 41.015512][ T690] lowmem_reserve[]: 0 3941 3941 [ 41.060896][ T690] Normal free:3327280kB min:84884kB low:106104kB high:127324kB reserved_highatomic:0KB active_anon:300kB inactive_anon:16564kB active_file:13516kB inactive_file:12500kB unevictable:0kB writepending:1328kB present:5242880kB managed:4035584kB mlocked:0kB bounce:0kB free_pcp:47916kB local_pcp:34992kB free_cma:0kB [ 41.108760][ T690] lowmem_reserve[]: 0 0 0 [ 41.113020][ T690] DMA32: 3*4kB (M) 1*8kB (M) 2*16kB (M) 3*32kB (M) 3*64kB (M) 3*128kB (M) 3*256kB (M) 3*512kB (M) 4*1024kB (UM) 3*2048kB (UM) 723*4096kB (M) = 2974676kB [ 41.128828][ T690] Normal: 0*4kB 2*8kB (ME) 0*16kB 3*32kB (UME) 1*64kB (U) 1*128kB (E) 0*256kB 2*512kB (ME) 2*1024kB (ME) 1*2048kB (M) 811*4096kB (M) = 3327280kB [ 41.155382][ T690] 6707 total pagecache pages [ 41.165357][ T690] 0 pages in swap cache [ 41.174221][ T690] Swap cache stats: add 0, delete 0, find 0/0 [ 41.183958][ T690] Free swap = 124996kB [ 41.188044][ T690] Total swap = 124996kB [ 41.191994][ T690] 2097051 pages RAM [ 41.195925][ T690] 0 pages HighMem/MovableOnly [ 41.200540][ T690] 343417 pages reserved [ 41.205003][ T690] 0 pages cma reserved [ 41.959486][ T754] bond_slave_1: mtu less than device minimum [ 41.974267][ T762] FAULT_INJECTION: forcing a failure. [ 41.974267][ T762] name failslab, interval 1, probability 0, space 0, times 0 [ 42.001584][ T762] CPU: 1 PID: 762 Comm: syz.4.139 Tainted: G W 5.15.176-syzkaller-00972-g829d9f138569 #0 [ 42.012551][ T762] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 42.022541][ T762] Call Trace: [ 42.025676][ T762] [ 42.028451][ T762] dump_stack_lvl+0x151/0x1c0 [ 42.032950][ T762] ? io_uring_drop_tctx_refs+0x190/0x190 [ 42.038416][ T762] dump_stack+0x15/0x20 [ 42.042407][ T762] should_fail+0x3c6/0x510 [ 42.046661][ T762] __should_failslab+0xa4/0xe0 [ 42.051257][ T762] ? anon_vma_clone+0x9a/0x500 [ 42.055859][ T762] should_failslab+0x9/0x20 [ 42.060197][ T762] slab_pre_alloc_hook+0x37/0xd0 [ 42.064972][ T762] ? anon_vma_clone+0x9a/0x500 [ 42.069593][ T762] kmem_cache_alloc+0x44/0x250 [ 42.074178][ T762] anon_vma_clone+0x9a/0x500 [ 42.078601][ T762] anon_vma_fork+0x91/0x4e0 [ 42.082938][ T762] ? anon_vma_name+0x4c/0x70 [ 42.087364][ T762] ? vm_area_dup+0x17a/0x230 [ 42.091787][ T762] copy_mm+0xa3a/0x13e0 [ 42.095787][ T762] ? copy_signal+0x610/0x610 [ 42.100294][ T762] ? __init_rwsem+0xfe/0x1d0 [ 42.104722][ T762] ? copy_signal+0x4e3/0x610 [ 42.109152][ T762] copy_process+0x1149/0x3290 [ 42.113661][ T762] ? __kasan_check_write+0x14/0x20 [ 42.118622][ T762] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 42.123553][ T762] ? vfs_write+0x94d/0x1110 [ 42.127897][ T762] kernel_clone+0x21e/0x9e0 [ 42.132238][ T762] ? __kasan_check_write+0x14/0x20 [ 42.137187][ T762] ? create_io_thread+0x1e0/0x1e0 [ 42.142060][ T762] __x64_sys_clone+0x23f/0x290 [ 42.146661][ T762] ? __do_sys_vfork+0x130/0x130 [ 42.151468][ T762] ? debug_smp_processor_id+0x17/0x20 [ 42.156656][ T762] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 42.162563][ T762] ? exit_to_user_mode_prepare+0x39/0xa0 [ 42.168036][ T762] x64_sys_call+0x1b0/0x9a0 [ 42.172365][ T762] do_syscall_64+0x3b/0xb0 [ 42.176618][ T762] ? clear_bhb_loop+0x35/0x90 [ 42.181132][ T762] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 42.186865][ T762] RIP: 0033:0x7f0662dacd29 [ 42.191113][ T762] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 42.210553][ T762] RSP: 002b:00007f066141dfe8 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 42.218800][ T762] RAX: ffffffffffffffda RBX: 00007f0662f9cfa0 RCX: 00007f0662dacd29 [ 42.226611][ T762] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 42.234420][ T762] RBP: 00007f066141e090 R08: 0000000000000000 R09: 0000000000000000 [ 42.242240][ T762] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 42.250047][ T762] R13: 0000000000000000 R14: 00007f0662f9cfa0 R15: 00007ffed0733fc8 [ 42.257866][ T762] [ 42.422930][ T30] audit: type=1400 audit(1736947223.651:127): avc: denied { ioctl } for pid=765 comm="syz.1.140" path="net:[4026532291]" dev="nsfs" ino=4026532291 ioctlcmd=0xb701 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 42.786605][ T30] audit: type=1400 audit(1736947224.021:128): avc: denied { tracepoint } for pid=784 comm="syz.3.147" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=1 [ 42.951435][ T785] device syzkaller0 entered promiscuous mode [ 44.840692][ T30] audit: type=1400 audit(1736947226.071:129): avc: denied { cpu } for pid=884 comm="syz.4.176" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=1 [ 44.916862][ T888] : renamed from ipvlan1 [ 45.037123][ T902] syz.2.183[902] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 45.037196][ T902] syz.2.183[902] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 45.153836][ T904] device pim6reg1 entered promiscuous mode [ 45.193017][ T30] audit: type=1400 audit(1736947226.421:130): avc: denied { create } for pid=901 comm="syz.2.183" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=pppox_socket permissive=1 [ 45.346692][ T918] device pim6reg1 entered promiscuous mode [ 45.582766][ T30] audit: type=1400 audit(1736947226.811:131): avc: denied { create } for pid=937 comm="syz.0.195" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 48.216158][ T1028] device wg2 entered promiscuous mode [ 48.314696][ T30] audit: type=1400 audit(1736947229.551:132): avc: denied { create } for pid=1030 comm="syz.1.226" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=iucv_socket permissive=1 [ 48.355544][ T1031] device syzkaller0 entered promiscuous mode [ 48.373811][ T1028] device pim6reg1 entered promiscuous mode [ 48.541036][ T1044] device pim6reg1 entered promiscuous mode [ 48.734822][ T941] syz.0.195 (941) used greatest stack depth: 21720 bytes left [ 48.911244][ T1073] syz.1.240[1073] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 48.911323][ T1073] syz.1.240[1073] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 49.628423][ T1095] device veth0_vlan left promiscuous mode [ 49.680861][ T1095] device veth0_vlan entered promiscuous mode [ 50.187985][ T1124] device pim6reg1 entered promiscuous mode [ 50.322799][ T1128] syz.4.255[1128] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 50.322901][ T1128] syz.4.255[1128] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 50.522766][ T1149] device bond_slave_1 entered promiscuous mode [ 50.544826][ T30] audit: type=1400 audit(1736947231.781:133): avc: denied { create } for pid=1146 comm="syz.2.260" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=atmpvc_socket permissive=1 [ 50.579779][ T1104] IPv6: ADDRCONF(NETDEV_CHANGE): bond_slave_1: link becomes ready [ 50.595802][ T1104] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 50.665736][ T1161] syz.0.263[1161] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 50.665812][ T1161] syz.0.263[1161] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 50.683836][ T30] audit: type=1400 audit(1736947231.911:134): avc: denied { create } for pid=1164 comm="syz.2.264" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 50.902452][ T30] audit: type=1400 audit(1736947231.941:135): avc: denied { create } for pid=1164 comm="syz.2.264" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=x25_socket permissive=1 [ 51.379544][ T30] audit: type=1400 audit(1736947232.611:136): avc: denied { write } for pid=1200 comm="syz.2.274" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 51.700468][ T1208] syz.4.276[1208] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 51.700545][ T1208] syz.4.276[1208] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 52.002756][ T30] audit: type=1400 audit(1736947233.231:137): avc: denied { setopt } for pid=1216 comm="syz.0.280" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 52.097904][ T30] audit: type=1400 audit(1736947233.271:138): avc: denied { read } for pid=1216 comm="syz.0.280" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 52.214527][ T30] audit: type=1400 audit(1736947233.281:139): avc: denied { create } for pid=1222 comm="syz.1.281" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_nflog_socket permissive=1 [ 52.264443][ T1226] device pim6reg1 entered promiscuous mode [ 53.066952][ T30] audit: type=1400 audit(1736947234.301:140): avc: denied { remove_name } for pid=83 comm="syslogd" name="messages" dev="tmpfs" ino=2 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 53.157806][ T30] audit: type=1400 audit(1736947234.301:141): avc: denied { rename } for pid=83 comm="syslogd" name="messages" dev="tmpfs" ino=2 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 53.323956][ T30] audit: type=1400 audit(1736947234.541:142): avc: denied { create } for pid=1257 comm="syz.4.290" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=qipcrtr_socket permissive=1 [ 53.495525][ T1259] tun0: tun_chr_ioctl cmd 1074025675 [ 53.507367][ T1259] tun0: persist enabled [ 53.554143][ T1259] tun0: tun_chr_ioctl cmd 1074025675 [ 53.559999][ T1259] tun0: persist enabled [ 53.818048][ T1272] device syzkaller0 entered promiscuous mode [ 53.982381][ T1286] device sit0 entered promiscuous mode [ 54.160974][ T30] audit: type=1400 audit(1736947235.391:143): avc: denied { create } for pid=1297 comm="syz.4.303" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bluetooth_socket permissive=1 [ 54.449857][ T1304] FAULT_INJECTION: forcing a failure. [ 54.449857][ T1304] name failslab, interval 1, probability 0, space 0, times 0 [ 54.583028][ T1304] CPU: 1 PID: 1304 Comm: syz.2.305 Tainted: G W 5.15.176-syzkaller-00972-g829d9f138569 #0 [ 54.594073][ T1304] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 54.603969][ T1304] Call Trace: [ 54.607095][ T1304] [ 54.609869][ T1304] dump_stack_lvl+0x151/0x1c0 [ 54.614385][ T1304] ? io_uring_drop_tctx_refs+0x190/0x190 [ 54.619853][ T1304] dump_stack+0x15/0x20 [ 54.623844][ T1304] should_fail+0x3c6/0x510 [ 54.628097][ T1304] __should_failslab+0xa4/0xe0 [ 54.632699][ T1304] ? vm_area_dup+0x26/0x230 [ 54.637041][ T1304] should_failslab+0x9/0x20 [ 54.641378][ T1304] slab_pre_alloc_hook+0x37/0xd0 [ 54.646152][ T1304] ? vm_area_dup+0x26/0x230 [ 54.650489][ T1304] kmem_cache_alloc+0x44/0x250 [ 54.655194][ T1304] vm_area_dup+0x26/0x230 [ 54.659357][ T1304] copy_mm+0x9a1/0x13e0 [ 54.663353][ T1304] ? copy_signal+0x610/0x610 [ 54.667775][ T1304] ? __init_rwsem+0xfe/0x1d0 [ 54.672381][ T1304] ? copy_signal+0x4e3/0x610 [ 54.676893][ T1304] copy_process+0x1149/0x3290 [ 54.681405][ T1304] ? __kasan_check_write+0x14/0x20 [ 54.686791][ T1304] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 54.691734][ T1304] ? vfs_write+0x94d/0x1110 [ 54.696200][ T1304] kernel_clone+0x21e/0x9e0 [ 54.700502][ T1304] ? __kasan_check_write+0x14/0x20 [ 54.705448][ T1304] ? create_io_thread+0x1e0/0x1e0 [ 54.710309][ T1304] __x64_sys_clone+0x23f/0x290 [ 54.714902][ T1304] ? __do_sys_vfork+0x130/0x130 [ 54.719697][ T1304] ? debug_smp_processor_id+0x17/0x20 [ 54.724903][ T1304] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 54.730886][ T1304] ? exit_to_user_mode_prepare+0x39/0xa0 [ 54.736530][ T1304] x64_sys_call+0x1b0/0x9a0 [ 54.740848][ T1304] do_syscall_64+0x3b/0xb0 [ 54.745105][ T1304] ? clear_bhb_loop+0x35/0x90 [ 54.749616][ T1304] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 54.755350][ T1304] RIP: 0033:0x7f06dd22dd29 [ 54.759687][ T1304] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 54.779396][ T1304] RSP: 002b:00007f06db89efe8 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 54.787652][ T1304] RAX: ffffffffffffffda RBX: 00007f06dd41dfa0 RCX: 00007f06dd22dd29 [ 54.795455][ T1304] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 54.803259][ T1304] RBP: 00007f06db89f090 R08: 0000000000000000 R09: 0000000000000000 [ 54.811073][ T1304] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 54.818972][ T1304] R13: 0000000000000000 R14: 00007f06dd41dfa0 R15: 00007ffeed5d8bc8 [ 54.826789][ T1304] [ 55.223638][ T1332] device pim6reg1 entered promiscuous mode [ 55.550993][ T1353] FAULT_INJECTION: forcing a failure. [ 55.550993][ T1353] name failslab, interval 1, probability 0, space 0, times 0 [ 55.563651][ T1353] CPU: 1 PID: 1353 Comm: syz.1.323 Tainted: G W 5.15.176-syzkaller-00972-g829d9f138569 #0 [ 55.574677][ T1353] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 55.584773][ T1353] Call Trace: [ 55.587988][ T1353] [ 55.590774][ T1353] dump_stack_lvl+0x151/0x1c0 [ 55.595281][ T1353] ? io_uring_drop_tctx_refs+0x190/0x190 [ 55.600743][ T1353] dump_stack+0x15/0x20 [ 55.604735][ T1353] should_fail+0x3c6/0x510 [ 55.609025][ T1353] __should_failslab+0xa4/0xe0 [ 55.613589][ T1353] ? anon_vma_clone+0x9a/0x500 [ 55.618186][ T1353] should_failslab+0x9/0x20 [ 55.622523][ T1353] slab_pre_alloc_hook+0x37/0xd0 [ 55.627303][ T1353] ? anon_vma_clone+0x9a/0x500 [ 55.631898][ T1353] kmem_cache_alloc+0x44/0x250 [ 55.636499][ T1353] anon_vma_clone+0x9a/0x500 [ 55.640924][ T1353] anon_vma_fork+0x91/0x4e0 [ 55.645260][ T1353] ? anon_vma_name+0x4c/0x70 [ 55.649689][ T1353] ? vm_area_dup+0x17a/0x230 [ 55.654116][ T1353] copy_mm+0xa3a/0x13e0 [ 55.658111][ T1353] ? copy_signal+0x610/0x610 [ 55.662533][ T1353] ? __init_rwsem+0xfe/0x1d0 [ 55.666971][ T1353] ? copy_signal+0x4e3/0x610 [ 55.671386][ T1353] copy_process+0x1149/0x3290 [ 55.675899][ T1353] ? __kasan_check_write+0x14/0x20 [ 55.680854][ T1353] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 55.685794][ T1353] ? vfs_write+0x94d/0x1110 [ 55.690136][ T1353] kernel_clone+0x21e/0x9e0 [ 55.694472][ T1353] ? __kasan_check_write+0x14/0x20 [ 55.699422][ T1353] ? create_io_thread+0x1e0/0x1e0 [ 55.704286][ T1353] __x64_sys_clone+0x23f/0x290 [ 55.708884][ T1353] ? __do_sys_vfork+0x130/0x130 [ 55.713578][ T1353] ? debug_smp_processor_id+0x17/0x20 [ 55.718775][ T1353] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 55.724677][ T1353] ? exit_to_user_mode_prepare+0x39/0xa0 [ 55.730233][ T1353] x64_sys_call+0x1b0/0x9a0 [ 55.734572][ T1353] do_syscall_64+0x3b/0xb0 [ 55.738825][ T1353] ? clear_bhb_loop+0x35/0x90 [ 55.743340][ T1353] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 55.749066][ T1353] RIP: 0033:0x7ff7d83f2d29 [ 55.753323][ T1353] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 55.772761][ T1353] RSP: 002b:00007ff7d6a63fe8 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 55.781006][ T1353] RAX: ffffffffffffffda RBX: 00007ff7d85e2fa0 RCX: 00007ff7d83f2d29 [ 55.788826][ T1353] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 55.796631][ T1353] RBP: 00007ff7d6a64090 R08: 0000000000000000 R09: 0000000000000000 [ 55.804446][ T1353] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 55.812249][ T1353] R13: 0000000000000000 R14: 00007ff7d85e2fa0 R15: 00007ffdddd1cc08 [ 55.820070][ T1353] [ 56.073055][ T1360] device syzkaller0 entered promiscuous mode [ 56.944999][ T1404] FAULT_INJECTION: forcing a failure. [ 56.944999][ T1404] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 57.045114][ T1404] CPU: 0 PID: 1404 Comm: syz.2.338 Tainted: G W 5.15.176-syzkaller-00972-g829d9f138569 #0 [ 57.056163][ T1404] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 57.066061][ T1404] Call Trace: [ 57.069185][ T1404] [ 57.071961][ T1404] dump_stack_lvl+0x151/0x1c0 [ 57.076474][ T1404] ? io_uring_drop_tctx_refs+0x190/0x190 [ 57.081948][ T1404] dump_stack+0x15/0x20 [ 57.085939][ T1404] should_fail+0x3c6/0x510 [ 57.090184][ T1404] should_fail_alloc_page+0x5a/0x80 [ 57.095218][ T1404] prepare_alloc_pages+0x15c/0x700 [ 57.100165][ T1404] ? __alloc_pages+0x8f0/0x8f0 [ 57.104766][ T1404] ? __alloc_pages_bulk+0xd80/0xd80 [ 57.109801][ T1404] __alloc_pages+0x18c/0x8f0 [ 57.114228][ T1404] ? prep_new_page+0x110/0x110 [ 57.118827][ T1404] ? __mod_node_page_state+0xac/0xf0 [ 57.123947][ T1404] pte_alloc_one+0x73/0x1b0 [ 57.128284][ T1404] ? pfn_modify_allowed+0x2f0/0x2f0 [ 57.133319][ T1404] ? arch_stack_walk+0xf3/0x140 [ 57.138006][ T1404] __pte_alloc+0x86/0x350 [ 57.142174][ T1404] ? free_pgtables+0x280/0x280 [ 57.146773][ T1404] ? _raw_spin_lock+0xa4/0x1b0 [ 57.151371][ T1404] ? __kasan_check_write+0x14/0x20 [ 57.156322][ T1404] copy_page_range+0x2743/0x2e20 [ 57.161108][ T1404] ? pfn_valid+0x1e0/0x1e0 [ 57.165347][ T1404] ? vma_gap_callbacks_rotate+0x1e2/0x210 [ 57.170902][ T1404] ? __rb_insert_augmented+0x5de/0x610 [ 57.176214][ T1404] copy_mm+0xc7e/0x13e0 [ 57.180192][ T1404] ? copy_signal+0x610/0x610 [ 57.184615][ T1404] ? __init_rwsem+0xfe/0x1d0 [ 57.189040][ T1404] ? copy_signal+0x4e3/0x610 [ 57.193467][ T1404] copy_process+0x1149/0x3290 [ 57.197984][ T1404] ? __kasan_check_write+0x14/0x20 [ 57.202933][ T1404] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 57.207875][ T1404] ? vfs_write+0x94d/0x1110 [ 57.212216][ T1404] kernel_clone+0x21e/0x9e0 [ 57.216555][ T1404] ? __kasan_check_write+0x14/0x20 [ 57.221503][ T1404] ? create_io_thread+0x1e0/0x1e0 [ 57.226366][ T1404] __x64_sys_clone+0x23f/0x290 [ 57.230976][ T1404] ? __do_sys_vfork+0x130/0x130 [ 57.235658][ T1404] ? debug_smp_processor_id+0x17/0x20 [ 57.240857][ T1404] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 57.246922][ T1404] ? exit_to_user_mode_prepare+0x39/0xa0 [ 57.252383][ T1404] x64_sys_call+0x1b0/0x9a0 [ 57.256838][ T1404] do_syscall_64+0x3b/0xb0 [ 57.261087][ T1404] ? clear_bhb_loop+0x35/0x90 [ 57.265771][ T1404] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 57.271493][ T1404] RIP: 0033:0x7f06dd22dd29 [ 57.275745][ T1404] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 57.295187][ T1404] RSP: 002b:00007f06db89efe8 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 57.303430][ T1404] RAX: ffffffffffffffda RBX: 00007f06dd41dfa0 RCX: 00007f06dd22dd29 [ 57.311245][ T1404] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 57.319051][ T1404] RBP: 00007f06db89f090 R08: 0000000000000000 R09: 0000000000000000 [ 57.326862][ T1404] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 57.334675][ T1404] R13: 0000000000000000 R14: 00007f06dd41dfa0 R15: 00007ffeed5d8bc8 [ 57.342496][ T1404] [ 58.080401][ T1436] device veth1_macvtap left promiscuous mode [ 58.442111][ T1475] FAULT_INJECTION: forcing a failure. [ 58.442111][ T1475] name failslab, interval 1, probability 0, space 0, times 0 [ 58.574236][ T1475] CPU: 1 PID: 1475 Comm: syz.3.361 Tainted: G W 5.15.176-syzkaller-00972-g829d9f138569 #0 [ 58.585383][ T1475] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 58.595285][ T1475] Call Trace: [ 58.598401][ T1475] [ 58.601188][ T1475] dump_stack_lvl+0x151/0x1c0 [ 58.605807][ T1475] ? io_uring_drop_tctx_refs+0x190/0x190 [ 58.611334][ T1475] dump_stack+0x15/0x20 [ 58.615259][ T1475] should_fail+0x3c6/0x510 [ 58.619535][ T1475] __should_failslab+0xa4/0xe0 [ 58.624112][ T1475] ? sk_prot_alloc+0x5f/0x330 [ 58.628633][ T1475] should_failslab+0x9/0x20 [ 58.632964][ T1475] slab_pre_alloc_hook+0x37/0xd0 [ 58.637737][ T1475] ? sk_prot_alloc+0x5f/0x330 [ 58.642255][ T1475] kmem_cache_alloc+0x44/0x250 [ 58.646851][ T1475] sk_prot_alloc+0x5f/0x330 [ 58.651192][ T1475] sk_alloc+0x38/0x430 [ 58.655101][ T1475] __vsock_create+0x42/0x8f0 [ 58.659520][ T1475] ? inode_init_always+0x784/0x9d0 [ 58.664470][ T1475] vsock_create+0x138/0x3e0 [ 58.668810][ T1475] __sock_create+0x3be/0x7e0 [ 58.673241][ T1475] __sys_socketpair+0x29f/0x6e0 [ 58.677926][ T1475] ? __ia32_sys_socket+0x90/0x90 [ 58.682697][ T1475] ? __ia32_sys_read+0x90/0x90 [ 58.687299][ T1475] ? debug_smp_processor_id+0x17/0x20 [ 58.692505][ T1475] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 58.698407][ T1475] __x64_sys_socketpair+0x9b/0xb0 [ 58.703266][ T1475] x64_sys_call+0x19b/0x9a0 [ 58.707606][ T1475] do_syscall_64+0x3b/0xb0 [ 58.711859][ T1475] ? clear_bhb_loop+0x35/0x90 [ 58.716373][ T1475] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 58.722187][ T1475] RIP: 0033:0x7fc160295d29 [ 58.726441][ T1475] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 58.745975][ T1475] RSP: 002b:00007fc15e907038 EFLAGS: 00000246 ORIG_RAX: 0000000000000035 [ 58.754311][ T1475] RAX: ffffffffffffffda RBX: 00007fc160485fa0 RCX: 00007fc160295d29 [ 58.762115][ T1475] RDX: 0000000000000000 RSI: 0000000000000002 RDI: 0000000000000028 [ 58.769922][ T1475] RBP: 00007fc15e907090 R08: 0000000000000000 R09: 0000000000000000 [ 58.777734][ T1475] R10: 0000000020000040 R11: 0000000000000246 R12: 0000000000000001 [ 58.785548][ T1475] R13: 0000000000000000 R14: 00007fc160485fa0 R15: 00007fff9c1b5838 [ 58.793367][ T1475] [ 58.907029][ T30] audit: type=1400 audit(1736947240.141:144): avc: denied { create } for pid=1493 comm="syz.3.368" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 59.397435][ T1532] FAULT_INJECTION: forcing a failure. [ 59.397435][ T1532] name failslab, interval 1, probability 0, space 0, times 0 [ 59.474289][ T1532] CPU: 1 PID: 1532 Comm: syz.1.379 Tainted: G W 5.15.176-syzkaller-00972-g829d9f138569 #0 [ 59.485340][ T1532] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 59.495236][ T1532] Call Trace: [ 59.498358][ T1532] [ 59.501136][ T1532] dump_stack_lvl+0x151/0x1c0 [ 59.505649][ T1532] ? io_uring_drop_tctx_refs+0x190/0x190 [ 59.511146][ T1532] dump_stack+0x15/0x20 [ 59.515114][ T1532] should_fail+0x3c6/0x510 [ 59.519365][ T1532] __should_failslab+0xa4/0xe0 [ 59.523966][ T1532] should_failslab+0x9/0x20 [ 59.528301][ T1532] slab_pre_alloc_hook+0x37/0xd0 [ 59.533075][ T1532] kmem_cache_alloc_trace+0x48/0x270 [ 59.538195][ T1532] ? selinux_sk_alloc_security+0x7d/0x1a0 [ 59.543754][ T1532] ? sk_prot_alloc+0x5f/0x330 [ 59.548267][ T1532] selinux_sk_alloc_security+0x7d/0x1a0 [ 59.553645][ T1532] security_sk_alloc+0x72/0xb0 [ 59.558251][ T1532] sk_prot_alloc+0x114/0x330 [ 59.562676][ T1532] sk_alloc+0x38/0x430 [ 59.566608][ T1532] __vsock_create+0x42/0x8f0 [ 59.571005][ T1532] ? inode_init_always+0x784/0x9d0 [ 59.576042][ T1532] vsock_create+0x138/0x3e0 [ 59.580386][ T1532] __sock_create+0x3be/0x7e0 [ 59.584804][ T1532] __sys_socketpair+0x29f/0x6e0 [ 59.589493][ T1532] ? __ia32_sys_socket+0x90/0x90 [ 59.594440][ T1532] ? __ia32_sys_read+0x90/0x90 [ 59.599036][ T1532] ? debug_smp_processor_id+0x17/0x20 [ 59.604242][ T1532] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 59.610156][ T1532] __x64_sys_socketpair+0x9b/0xb0 [ 59.615009][ T1532] x64_sys_call+0x19b/0x9a0 [ 59.619347][ T1532] do_syscall_64+0x3b/0xb0 [ 59.623598][ T1532] ? clear_bhb_loop+0x35/0x90 [ 59.628109][ T1532] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 59.633838][ T1532] RIP: 0033:0x7ff7d83f2d29 [ 59.638093][ T1532] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 59.657533][ T1532] RSP: 002b:00007ff7d6a64038 EFLAGS: 00000246 ORIG_RAX: 0000000000000035 [ 59.665777][ T1532] RAX: ffffffffffffffda RBX: 00007ff7d85e2fa0 RCX: 00007ff7d83f2d29 [ 59.673593][ T1532] RDX: 0000000000000000 RSI: 0000000000000002 RDI: 0000000000000028 [ 59.681401][ T1532] RBP: 00007ff7d6a64090 R08: 0000000000000000 R09: 0000000000000000 [ 59.689244][ T1532] R10: 0000000020000040 R11: 0000000000000246 R12: 0000000000000001 [ 59.697023][ T1532] R13: 0000000000000000 R14: 00007ff7d85e2fa0 R15: 00007ffdddd1cc08 [ 59.704847][ T1532] [ 60.691960][ T1583] device sit0 left promiscuous mode [ 60.700400][ T1588] FAULT_INJECTION: forcing a failure. [ 60.700400][ T1588] name fail_usercopy, interval 1, probability 0, space 0, times 1 [ 60.724912][ T1588] CPU: 1 PID: 1588 Comm: syz.3.396 Tainted: G W 5.15.176-syzkaller-00972-g829d9f138569 #0 [ 60.735968][ T1588] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 60.745857][ T1588] Call Trace: [ 60.748981][ T1588] [ 60.751785][ T1588] dump_stack_lvl+0x151/0x1c0 [ 60.756281][ T1588] ? io_uring_drop_tctx_refs+0x190/0x190 [ 60.761894][ T1588] dump_stack+0x15/0x20 [ 60.765839][ T1588] should_fail+0x3c6/0x510 [ 60.770180][ T1588] should_fail_usercopy+0x1a/0x20 [ 60.775041][ T1588] _copy_to_user+0x20/0x90 [ 60.779412][ T1588] simple_read_from_buffer+0xc7/0x150 [ 60.784614][ T1588] proc_fail_nth_read+0x1a3/0x210 [ 60.789476][ T1588] ? proc_fault_inject_write+0x390/0x390 [ 60.794938][ T1588] ? fsnotify_perm+0x269/0x5b0 [ 60.799540][ T1588] ? security_file_permission+0x86/0xb0 [ 60.804923][ T1588] ? proc_fault_inject_write+0x390/0x390 [ 60.810388][ T1588] vfs_read+0x27d/0xd40 [ 60.814383][ T1588] ? __kasan_check_write+0x14/0x20 [ 60.819329][ T1588] ? kernel_read+0x1f0/0x1f0 [ 60.823755][ T1588] ? __kasan_check_write+0x14/0x20 [ 60.828703][ T1588] ? mutex_lock+0xb6/0x1e0 [ 60.832956][ T1588] ? wait_for_completion_killable_timeout+0x10/0x10 [ 60.839380][ T1588] ? __fdget_pos+0x2e7/0x3a0 [ 60.843804][ T1588] ? ksys_read+0x77/0x2c0 [ 60.847974][ T1588] ksys_read+0x199/0x2c0 [ 60.852050][ T1588] ? vfs_write+0x1110/0x1110 [ 60.856476][ T1588] ? debug_smp_processor_id+0x17/0x20 [ 60.861683][ T1588] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 60.867587][ T1588] __x64_sys_read+0x7b/0x90 [ 60.871969][ T1588] x64_sys_call+0x28/0x9a0 [ 60.876204][ T1588] do_syscall_64+0x3b/0xb0 [ 60.880433][ T1588] ? clear_bhb_loop+0x35/0x90 [ 60.884946][ T1588] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 60.890676][ T1588] RIP: 0033:0x7fc16029473c [ 60.894925][ T1588] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 93 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 ef 93 02 00 48 [ 60.914454][ T1588] RSP: 002b:00007fc15e907030 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 60.922698][ T1588] RAX: ffffffffffffffda RBX: 00007fc160485fa0 RCX: 00007fc16029473c [ 60.930509][ T1588] RDX: 000000000000000f RSI: 00007fc15e9070a0 RDI: 0000000000000005 [ 60.938319][ T1588] RBP: 00007fc15e907090 R08: 0000000000000000 R09: 0000000000000000 [ 60.946133][ T1588] R10: 0000000020000040 R11: 0000000000000246 R12: 0000000000000001 [ 60.953942][ T1588] R13: 0000000000000000 R14: 00007fc160485fa0 R15: 00007fff9c1b5838 [ 60.961760][ T1588] [ 61.173984][ T1586] device sit0 entered promiscuous mode [ 61.354629][ T1605] bridge0: port 1(bridge_slave_0) entered disabled state [ 61.553822][ T1626] syz.3.407[1626] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 61.553890][ T1626] syz.3.407[1626] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 61.615614][ T1619] device pim6reg1 entered promiscuous mode [ 61.660338][ T30] audit: type=1400 audit(1736947242.891:145): avc: denied { create } for pid=1638 comm="syz.0.410" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 61.937426][ T1650] FAULT_INJECTION: forcing a failure. [ 61.937426][ T1650] name failslab, interval 1, probability 0, space 0, times 0 [ 61.983843][ T1650] CPU: 0 PID: 1650 Comm: syz.2.412 Tainted: G W 5.15.176-syzkaller-00972-g829d9f138569 #0 [ 61.994899][ T1650] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 62.004791][ T1650] Call Trace: [ 62.007920][ T1650] [ 62.010690][ T1650] dump_stack_lvl+0x151/0x1c0 [ 62.015206][ T1650] ? io_uring_drop_tctx_refs+0x190/0x190 [ 62.020680][ T1650] dump_stack+0x15/0x20 [ 62.024663][ T1650] should_fail+0x3c6/0x510 [ 62.029010][ T1650] __should_failslab+0xa4/0xe0 [ 62.033605][ T1650] ? vm_area_dup+0x26/0x230 [ 62.037944][ T1650] should_failslab+0x9/0x20 [ 62.042286][ T1650] slab_pre_alloc_hook+0x37/0xd0 [ 62.047061][ T1650] ? vm_area_dup+0x26/0x230 [ 62.051410][ T1650] kmem_cache_alloc+0x44/0x250 [ 62.056041][ T1650] vm_area_dup+0x26/0x230 [ 62.060173][ T1650] copy_mm+0x9a1/0x13e0 [ 62.064170][ T1650] ? copy_signal+0x610/0x610 [ 62.068582][ T1650] ? __init_rwsem+0xfe/0x1d0 [ 62.073010][ T1650] ? copy_signal+0x4e3/0x610 [ 62.077439][ T1650] copy_process+0x1149/0x3290 [ 62.081953][ T1650] ? __kasan_check_write+0x14/0x20 [ 62.086901][ T1650] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 62.091847][ T1650] ? vfs_write+0x94d/0x1110 [ 62.096300][ T1650] kernel_clone+0x21e/0x9e0 [ 62.100653][ T1650] ? __kasan_check_write+0x14/0x20 [ 62.105611][ T1650] ? create_io_thread+0x1e0/0x1e0 [ 62.110464][ T1650] __x64_sys_clone+0x23f/0x290 [ 62.115059][ T1650] ? __do_sys_vfork+0x130/0x130 [ 62.119740][ T1650] ? debug_smp_processor_id+0x17/0x20 [ 62.124984][ T1650] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 62.130853][ T1650] ? exit_to_user_mode_prepare+0x39/0xa0 [ 62.136318][ T1650] x64_sys_call+0x1b0/0x9a0 [ 62.140657][ T1650] do_syscall_64+0x3b/0xb0 [ 62.144912][ T1650] ? clear_bhb_loop+0x35/0x90 [ 62.149423][ T1650] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 62.155155][ T1650] RIP: 0033:0x7f06dd22dd29 [ 62.159405][ T1650] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 62.178854][ T1650] RSP: 002b:00007f06db89efe8 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 62.187093][ T1650] RAX: ffffffffffffffda RBX: 00007f06dd41dfa0 RCX: 00007f06dd22dd29 [ 62.194992][ T1650] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 62.202887][ T1650] RBP: 00007f06db89f090 R08: 0000000000000000 R09: 0000000000000000 [ 62.210698][ T1650] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 62.218511][ T1650] R13: 0000000000000000 R14: 00007f06dd41dfa0 R15: 00007ffeed5d8bc8 [ 62.226337][ T1650] [ 62.722555][ T1668] syz.2.419[1668] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 62.722631][ T1668] syz.2.419[1668] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 63.127912][ T1691] FAULT_INJECTION: forcing a failure. [ 63.127912][ T1691] name failslab, interval 1, probability 0, space 0, times 0 [ 63.281059][ T1691] CPU: 0 PID: 1691 Comm: syz.3.425 Tainted: G W 5.15.176-syzkaller-00972-g829d9f138569 #0 [ 63.292118][ T1691] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 63.302010][ T1691] Call Trace: [ 63.305144][ T1691] [ 63.307912][ T1691] dump_stack_lvl+0x151/0x1c0 [ 63.312429][ T1691] ? io_uring_drop_tctx_refs+0x190/0x190 [ 63.317904][ T1691] dump_stack+0x15/0x20 [ 63.321884][ T1691] should_fail+0x3c6/0x510 [ 63.326171][ T1691] __should_failslab+0xa4/0xe0 [ 63.330739][ T1691] ? anon_vma_clone+0x9a/0x500 [ 63.335336][ T1691] should_failslab+0x9/0x20 [ 63.339677][ T1691] slab_pre_alloc_hook+0x37/0xd0 [ 63.344451][ T1691] ? anon_vma_clone+0x9a/0x500 [ 63.349057][ T1691] kmem_cache_alloc+0x44/0x250 [ 63.353656][ T1691] anon_vma_clone+0x9a/0x500 [ 63.358082][ T1691] anon_vma_fork+0x91/0x4e0 [ 63.362416][ T1691] ? anon_vma_name+0x4c/0x70 [ 63.366847][ T1691] ? vm_area_dup+0x17a/0x230 [ 63.371272][ T1691] copy_mm+0xa3a/0x13e0 [ 63.375302][ T1691] ? copy_signal+0x610/0x610 [ 63.379687][ T1691] ? __init_rwsem+0xfe/0x1d0 [ 63.384116][ T1691] ? copy_signal+0x4e3/0x610 [ 63.388549][ T1691] copy_process+0x1149/0x3290 [ 63.393064][ T1691] ? __kasan_check_write+0x14/0x20 [ 63.398148][ T1691] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 63.403085][ T1691] ? vfs_write+0x94d/0x1110 [ 63.407429][ T1691] kernel_clone+0x21e/0x9e0 [ 63.411855][ T1691] ? __kasan_check_write+0x14/0x20 [ 63.416799][ T1691] ? create_io_thread+0x1e0/0x1e0 [ 63.421670][ T1691] __x64_sys_clone+0x23f/0x290 [ 63.426360][ T1691] ? __do_sys_vfork+0x130/0x130 [ 63.431124][ T1691] ? debug_smp_processor_id+0x17/0x20 [ 63.436261][ T1691] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 63.442154][ T1691] ? exit_to_user_mode_prepare+0x39/0xa0 [ 63.447624][ T1691] x64_sys_call+0x1b0/0x9a0 [ 63.451962][ T1691] do_syscall_64+0x3b/0xb0 [ 63.456217][ T1691] ? clear_bhb_loop+0x35/0x90 [ 63.460726][ T1691] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 63.466463][ T1691] RIP: 0033:0x7fc160295d29 [ 63.470745][ T1691] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 63.490330][ T1691] RSP: 002b:00007fc15e906fe8 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 63.498569][ T1691] RAX: ffffffffffffffda RBX: 00007fc160485fa0 RCX: 00007fc160295d29 [ 63.506378][ T1691] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 63.514191][ T1691] RBP: 00007fc15e907090 R08: 0000000000000000 R09: 0000000000000000 [ 63.522018][ T1691] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 63.529849][ T1691] R13: 0000000000000000 R14: 00007fc160485fa0 R15: 00007fff9c1b5838 [ 63.537632][ T1691] [ 64.019437][ T1717] syz.3.431[1717] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 64.019512][ T1717] syz.3.431[1717] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 64.525528][ T1746] FAULT_INJECTION: forcing a failure. [ 64.525528][ T1746] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 64.593690][ T1746] CPU: 0 PID: 1746 Comm: syz.0.442 Tainted: G W 5.15.176-syzkaller-00972-g829d9f138569 #0 [ 64.604743][ T1746] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 64.614646][ T1746] Call Trace: [ 64.617821][ T1746] [ 64.620550][ T1746] dump_stack_lvl+0x151/0x1c0 [ 64.625075][ T1746] ? io_uring_drop_tctx_refs+0x190/0x190 [ 64.630522][ T1746] dump_stack+0x15/0x20 [ 64.634517][ T1746] should_fail+0x3c6/0x510 [ 64.638793][ T1746] should_fail_alloc_page+0x5a/0x80 [ 64.643801][ T1746] prepare_alloc_pages+0x15c/0x700 [ 64.648745][ T1746] ? __alloc_pages+0x8f0/0x8f0 [ 64.653358][ T1746] ? __alloc_pages_bulk+0xd80/0xd80 [ 64.658380][ T1746] __alloc_pages+0x18c/0x8f0 [ 64.662852][ T1746] ? prep_new_page+0x110/0x110 [ 64.667410][ T1746] ? 0xffffffffa0028000 [ 64.671395][ T1746] ? is_bpf_text_address+0x172/0x190 [ 64.676517][ T1746] pte_alloc_one+0x73/0x1b0 [ 64.680921][ T1746] ? pfn_modify_allowed+0x2f0/0x2f0 [ 64.685893][ T1746] ? arch_stack_walk+0xf3/0x140 [ 64.690580][ T1746] __pte_alloc+0x86/0x350 [ 64.694742][ T1746] ? free_pgtables+0x280/0x280 [ 64.699342][ T1746] ? _raw_spin_lock+0xa4/0x1b0 [ 64.703944][ T1746] ? __kasan_check_write+0x14/0x20 [ 64.708892][ T1746] copy_page_range+0x2743/0x2e20 [ 64.713673][ T1746] ? pfn_valid+0x1e0/0x1e0 [ 64.717923][ T1746] ? vma_gap_callbacks_rotate+0x1e2/0x210 [ 64.723473][ T1746] ? __rb_insert_augmented+0x5de/0x610 [ 64.728856][ T1746] copy_mm+0xc7e/0x13e0 [ 64.732848][ T1746] ? copy_signal+0x610/0x610 [ 64.737271][ T1746] ? __init_rwsem+0xfe/0x1d0 [ 64.741697][ T1746] ? copy_signal+0x4e3/0x610 [ 64.746131][ T1746] copy_process+0x1149/0x3290 [ 64.750642][ T1746] ? __kasan_check_write+0x14/0x20 [ 64.755602][ T1746] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 64.760533][ T1746] ? vfs_write+0x94d/0x1110 [ 64.764872][ T1746] kernel_clone+0x21e/0x9e0 [ 64.769212][ T1746] ? __kasan_check_write+0x14/0x20 [ 64.774159][ T1746] ? create_io_thread+0x1e0/0x1e0 [ 64.779023][ T1746] __x64_sys_clone+0x23f/0x290 [ 64.783626][ T1746] ? __do_sys_vfork+0x130/0x130 [ 64.788309][ T1746] ? debug_smp_processor_id+0x17/0x20 [ 64.793512][ T1746] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 64.799416][ T1746] ? exit_to_user_mode_prepare+0x39/0xa0 [ 64.804884][ T1746] x64_sys_call+0x1b0/0x9a0 [ 64.809222][ T1746] do_syscall_64+0x3b/0xb0 [ 64.813488][ T1746] ? clear_bhb_loop+0x35/0x90 [ 64.818001][ T1746] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 64.823753][ T1746] RIP: 0033:0x7fa2d6d7bd29 [ 64.827971][ T1746] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 64.847414][ T1746] RSP: 002b:00007fa2d53ecfe8 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 64.855656][ T1746] RAX: ffffffffffffffda RBX: 00007fa2d6f6bfa0 RCX: 00007fa2d6d7bd29 [ 64.863468][ T1746] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 64.871278][ T1746] RBP: 00007fa2d53ed090 R08: 0000000000000000 R09: 0000000000000000 [ 64.879090][ T1746] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 64.886903][ T1746] R13: 0000000000000000 R14: 00007fa2d6f6bfa0 R15: 00007ffe54ad7868 [ 64.894722][ T1746] [ 65.716729][ T30] audit: type=1400 audit(1736947246.951:146): avc: denied { create } for pid=1770 comm="syz.0.450" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rose_socket permissive=1 [ 66.505192][ T1797] FAULT_INJECTION: forcing a failure. [ 66.505192][ T1797] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 66.624374][ T1797] CPU: 1 PID: 1797 Comm: syz.2.458 Tainted: G W 5.15.176-syzkaller-00972-g829d9f138569 #0 [ 66.635430][ T1797] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 66.645319][ T1797] Call Trace: [ 66.648442][ T1797] [ 66.651258][ T1797] dump_stack_lvl+0x151/0x1c0 [ 66.655734][ T1797] ? io_uring_drop_tctx_refs+0x190/0x190 [ 66.661200][ T1797] dump_stack+0x15/0x20 [ 66.665303][ T1797] should_fail+0x3c6/0x510 [ 66.669558][ T1797] should_fail_alloc_page+0x5a/0x80 [ 66.674586][ T1797] prepare_alloc_pages+0x15c/0x700 [ 66.679540][ T1797] ? __alloc_pages_bulk+0xd80/0xd80 [ 66.684747][ T1797] __alloc_pages+0x18c/0x8f0 [ 66.689167][ T1797] ? prep_new_page+0x110/0x110 [ 66.693776][ T1797] get_zeroed_page+0x1b/0x40 [ 66.698196][ T1797] __pud_alloc+0x8b/0x260 [ 66.702363][ T1797] ? stack_trace_snprint+0xf0/0xf0 [ 66.707306][ T1797] ? do_handle_mm_fault+0x2400/0x2400 [ 66.712516][ T1797] ? __stack_depot_save+0x34/0x470 [ 66.717471][ T1797] ? anon_vma_clone+0x9a/0x500 [ 66.722065][ T1797] copy_page_range+0x2a84/0x2e20 [ 66.726836][ T1797] ? __kasan_slab_alloc+0xb1/0xe0 [ 66.731851][ T1797] ? anon_vma_fork+0x1df/0x4e0 [ 66.736419][ T1797] ? copy_mm+0xa3a/0x13e0 [ 66.740584][ T1797] ? copy_process+0x1149/0x3290 [ 66.745274][ T1797] ? kernel_clone+0x21e/0x9e0 [ 66.749787][ T1797] ? __x64_sys_clone+0x23f/0x290 [ 66.754838][ T1797] ? x64_sys_call+0x1b0/0x9a0 [ 66.759342][ T1797] ? do_syscall_64+0x3b/0xb0 [ 66.763786][ T1797] ? pfn_valid+0x1e0/0x1e0 [ 66.768021][ T1797] ? rwsem_write_trylock+0x153/0x340 [ 66.773140][ T1797] ? vma_interval_tree_augment_rotate+0x1d0/0x1d0 [ 66.779391][ T1797] ? vma_gap_callbacks_rotate+0x1e2/0x210 [ 66.784948][ T1797] ? __rb_insert_augmented+0x5de/0x610 [ 66.790244][ T1797] copy_mm+0xc7e/0x13e0 [ 66.794238][ T1797] ? copy_signal+0x610/0x610 [ 66.798660][ T1797] ? __init_rwsem+0xfe/0x1d0 [ 66.803083][ T1797] ? copy_signal+0x4e3/0x610 [ 66.807517][ T1797] copy_process+0x1149/0x3290 [ 66.812025][ T1797] ? __kasan_check_write+0x14/0x20 [ 66.816976][ T1797] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 66.821916][ T1797] ? vfs_write+0x94d/0x1110 [ 66.826281][ T1797] kernel_clone+0x21e/0x9e0 [ 66.830598][ T1797] ? __kasan_check_write+0x14/0x20 [ 66.835552][ T1797] ? create_io_thread+0x1e0/0x1e0 [ 66.840410][ T1797] __x64_sys_clone+0x23f/0x290 [ 66.845001][ T1797] ? __do_sys_vfork+0x130/0x130 [ 66.849691][ T1797] ? debug_smp_processor_id+0x17/0x20 [ 66.854905][ T1797] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 66.860809][ T1797] ? exit_to_user_mode_prepare+0x39/0xa0 [ 66.866266][ T1797] x64_sys_call+0x1b0/0x9a0 [ 66.870607][ T1797] do_syscall_64+0x3b/0xb0 [ 66.874858][ T1797] ? clear_bhb_loop+0x35/0x90 [ 66.879371][ T1797] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 66.885102][ T1797] RIP: 0033:0x7f06dd22dd29 [ 66.889355][ T1797] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 66.908801][ T1797] RSP: 002b:00007f06db89efe8 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 66.917038][ T1797] RAX: ffffffffffffffda RBX: 00007f06dd41dfa0 RCX: 00007f06dd22dd29 [ 66.924848][ T1797] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 66.932667][ T1797] RBP: 00007f06db89f090 R08: 0000000000000000 R09: 0000000000000000 [ 66.940471][ T1797] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 66.948284][ T1797] R13: 0000000000000000 R14: 00007f06dd41dfa0 R15: 00007ffeed5d8bc8 [ 66.956105][ T1797] [ 67.089004][ T30] audit: type=1400 audit(1736947248.321:147): avc: denied { ioctl } for pid=1808 comm="syz.0.463" path="socket:[20448]" dev="sockfs" ino=20448 ioctlcmd=0x8914 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 67.356689][ T30] audit: type=1400 audit(1736947248.591:148): avc: denied { create } for pid=1832 comm="syz.4.471" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 67.638289][ T1849] FAULT_INJECTION: forcing a failure. [ 67.638289][ T1849] name failslab, interval 1, probability 0, space 0, times 0 [ 67.697977][ T1849] CPU: 1 PID: 1849 Comm: syz.0.475 Tainted: G W 5.15.176-syzkaller-00972-g829d9f138569 #0 [ 67.709023][ T1849] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 67.718915][ T1849] Call Trace: [ 67.722051][ T1849] [ 67.724817][ T1849] dump_stack_lvl+0x151/0x1c0 [ 67.729332][ T1849] ? io_uring_drop_tctx_refs+0x190/0x190 [ 67.734799][ T1849] dump_stack+0x15/0x20 [ 67.738875][ T1849] should_fail+0x3c6/0x510 [ 67.743129][ T1849] __should_failslab+0xa4/0xe0 [ 67.747727][ T1849] ? vm_area_dup+0x26/0x230 [ 67.752068][ T1849] should_failslab+0x9/0x20 [ 67.756673][ T1849] slab_pre_alloc_hook+0x37/0xd0 [ 67.761438][ T1849] ? vm_area_dup+0x26/0x230 [ 67.765863][ T1849] kmem_cache_alloc+0x44/0x250 [ 67.770461][ T1849] vm_area_dup+0x26/0x230 [ 67.774629][ T1849] copy_mm+0x9a1/0x13e0 [ 67.778623][ T1849] ? copy_signal+0x610/0x610 [ 67.783046][ T1849] ? __init_rwsem+0xfe/0x1d0 [ 67.787471][ T1849] ? copy_signal+0x4e3/0x610 [ 67.791986][ T1849] copy_process+0x1149/0x3290 [ 67.796516][ T1849] ? __kasan_check_write+0x14/0x20 [ 67.801450][ T1849] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 67.806394][ T1849] ? vfs_write+0x94d/0x1110 [ 67.810737][ T1849] kernel_clone+0x21e/0x9e0 [ 67.815075][ T1849] ? __kasan_check_write+0x14/0x20 [ 67.820194][ T1849] ? create_io_thread+0x1e0/0x1e0 [ 67.825233][ T1849] __x64_sys_clone+0x23f/0x290 [ 67.829844][ T1849] ? __do_sys_vfork+0x130/0x130 [ 67.834521][ T1849] ? debug_smp_processor_id+0x17/0x20 [ 67.839714][ T1849] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 67.848309][ T1849] ? exit_to_user_mode_prepare+0x39/0xa0 [ 67.853904][ T1849] x64_sys_call+0x1b0/0x9a0 [ 67.858249][ T1849] do_syscall_64+0x3b/0xb0 [ 67.862493][ T1849] ? clear_bhb_loop+0x35/0x90 [ 67.867000][ T1849] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 67.872727][ T1849] RIP: 0033:0x7fa2d6d7bd29 [ 67.876989][ T1849] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 67.896424][ T1849] RSP: 002b:00007fa2d53ecfe8 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 67.904669][ T1849] RAX: ffffffffffffffda RBX: 00007fa2d6f6bfa0 RCX: 00007fa2d6d7bd29 [ 67.912478][ T1849] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 67.920290][ T1849] RBP: 00007fa2d53ed090 R08: 0000000000000000 R09: 0000000000000000 [ 67.928101][ T1849] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 67.935918][ T1849] R13: 0000000000000000 R14: 00007fa2d6f6bfa0 R15: 00007ffe54ad7868 [ 67.943735][ T1849] [ 68.209946][ T30] audit: type=1400 audit(1736947249.441:149): avc: denied { create } for pid=1871 comm="syz.2.484" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 68.346621][ T1882] FAULT_INJECTION: forcing a failure. [ 68.346621][ T1882] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 68.368812][ T1882] CPU: 1 PID: 1882 Comm: syz.4.488 Tainted: G W 5.15.176-syzkaller-00972-g829d9f138569 #0 [ 68.379863][ T1882] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 68.389763][ T1882] Call Trace: [ 68.392875][ T1882] [ 68.395656][ T1882] dump_stack_lvl+0x151/0x1c0 [ 68.400176][ T1882] ? io_uring_drop_tctx_refs+0x190/0x190 [ 68.405638][ T1882] dump_stack+0x15/0x20 [ 68.409635][ T1882] should_fail+0x3c6/0x510 [ 68.413882][ T1882] should_fail_alloc_page+0x5a/0x80 [ 68.418913][ T1882] prepare_alloc_pages+0x15c/0x700 [ 68.423860][ T1882] ? __alloc_pages_bulk+0xd80/0xd80 [ 68.429021][ T1882] __alloc_pages+0x18c/0x8f0 [ 68.433437][ T1882] ? prep_new_page+0x110/0x110 [ 68.438033][ T1882] ? __alloc_pages+0x27e/0x8f0 [ 68.442637][ T1882] ? __kasan_check_write+0x14/0x20 [ 68.447580][ T1882] ? _raw_spin_lock+0xa4/0x1b0 [ 68.452199][ T1882] pte_alloc_one+0x73/0x1b0 [ 68.456565][ T1882] ? pfn_modify_allowed+0x2f0/0x2f0 [ 68.461567][ T1882] ? __pmd_alloc+0x48d/0x550 [ 68.465980][ T1882] __pte_alloc+0x86/0x350 [ 68.470145][ T1882] ? __pud_alloc+0x260/0x260 [ 68.474574][ T1882] ? __pud_alloc+0x213/0x260 [ 68.479001][ T1882] ? free_pgtables+0x280/0x280 [ 68.483601][ T1882] ? do_handle_mm_fault+0x2400/0x2400 [ 68.488822][ T1882] ? __stack_depot_save+0x34/0x470 [ 68.493752][ T1882] ? anon_vma_clone+0x9a/0x500 [ 68.498356][ T1882] copy_page_range+0x2743/0x2e20 [ 68.503128][ T1882] ? __kasan_slab_alloc+0xb1/0xe0 [ 68.507989][ T1882] ? x64_sys_call+0x1b0/0x9a0 [ 68.512507][ T1882] ? do_syscall_64+0x3b/0xb0 [ 68.516978][ T1882] ? pfn_valid+0x1e0/0x1e0 [ 68.521188][ T1882] ? rwsem_write_trylock+0x153/0x340 [ 68.526504][ T1882] ? vma_interval_tree_augment_rotate+0x1d0/0x1d0 [ 68.532761][ T1882] ? vma_gap_callbacks_rotate+0x1e2/0x210 [ 68.538310][ T1882] ? __rb_insert_augmented+0x5de/0x610 [ 68.543692][ T1882] copy_mm+0xc7e/0x13e0 [ 68.547687][ T1882] ? copy_signal+0x610/0x610 [ 68.552108][ T1882] ? __init_rwsem+0xfe/0x1d0 [ 68.556550][ T1882] ? copy_signal+0x4e3/0x610 [ 68.560966][ T1882] copy_process+0x1149/0x3290 [ 68.565473][ T1882] ? __kasan_check_write+0x14/0x20 [ 68.570443][ T1882] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 68.575373][ T1882] ? vfs_write+0x94d/0x1110 [ 68.579759][ T1882] kernel_clone+0x21e/0x9e0 [ 68.584047][ T1882] ? __kasan_check_write+0x14/0x20 [ 68.588996][ T1882] ? create_io_thread+0x1e0/0x1e0 [ 68.593858][ T1882] __x64_sys_clone+0x23f/0x290 [ 68.598458][ T1882] ? __do_sys_vfork+0x130/0x130 [ 68.603144][ T1882] ? debug_smp_processor_id+0x17/0x20 [ 68.608348][ T1882] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 68.614259][ T1882] ? exit_to_user_mode_prepare+0x39/0xa0 [ 68.619722][ T1882] x64_sys_call+0x1b0/0x9a0 [ 68.624060][ T1882] do_syscall_64+0x3b/0xb0 [ 68.628309][ T1882] ? clear_bhb_loop+0x35/0x90 [ 68.632828][ T1882] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 68.638564][ T1882] RIP: 0033:0x7f0662dacd29 [ 68.642807][ T1882] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 68.662253][ T1882] RSP: 002b:00007f066141dfe8 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 68.670506][ T1882] RAX: ffffffffffffffda RBX: 00007f0662f9cfa0 RCX: 00007f0662dacd29 [ 68.678310][ T1882] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 68.686122][ T1882] RBP: 00007f066141e090 R08: 0000000000000000 R09: 0000000000000000 [ 68.693931][ T1882] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 68.701740][ T1882] R13: 0000000000000000 R14: 00007f0662f9cfa0 R15: 00007ffed0733fc8 [ 68.709561][ T1882] [ 68.779514][ T1891] device pim6reg1 entered promiscuous mode [ 69.139319][ T1894] syzkaller0: default qdisc (pfifo_fast) fail, fallback to noqueue [ 69.216120][ T1894] device syzkaller0 entered promiscuous mode [ 69.229009][ T30] audit: type=1400 audit(1736947250.461:150): avc: denied { create } for pid=1897 comm="syz.2.495" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 69.954955][ T1931] device veth0_vlan left promiscuous mode [ 70.022443][ T1931] device veth0_vlan entered promiscuous mode [ 70.186089][ T1104] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 70.228191][ T1104] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 70.273240][ T1104] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 71.245844][ T30] audit: type=1400 audit(1736947252.471:151): avc: denied { create } for pid=1962 comm="syz.0.511" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 71.896848][ T30] audit: type=1400 audit(1736947253.131:152): avc: denied { create } for pid=2004 comm="syz.1.524" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netrom_socket permissive=1 [ 72.035492][ T2007] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 72.208185][ T2003] device pim6reg1 entered promiscuous mode [ 72.431431][ T2020] syz.2.529 (2020) used obsolete PPPIOCDETACH ioctl [ 72.773427][ T30] audit: type=1400 audit(1736947254.001:153): avc: denied { write } for pid=2047 comm="syz.4.537" name="cgroup.subtree_control" dev="cgroup2" ino=139 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 [ 72.826151][ T30] audit: type=1400 audit(1736947254.041:154): avc: denied { open } for pid=2047 comm="syz.4.537" path="" dev="cgroup2" ino=139 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 [ 73.141901][ T2057] device syzkaller0 entered promiscuous mode [ 73.834898][ T2077] device syzkaller0 entered promiscuous mode [ 74.306149][ T2088] device wg2 entered promiscuous mode [ 74.389435][ T2098] device macsec0 entered promiscuous mode [ 74.563657][ T2111] device pim6reg1 entered promiscuous mode [ 74.934626][ T30] audit: type=1400 audit(1736947256.171:155): avc: denied { append } for pid=2131 comm="syz.0.563" name="ppp" dev="devtmpfs" ino=150 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ppp_device_t tclass=chr_file permissive=1 [ 77.198583][ T2203] bridge0: port 3(veth0_to_batadv) entered blocking state [ 77.213659][ T2203] bridge0: port 3(veth0_to_batadv) entered disabled state [ 77.228331][ T2203] device veth0_to_batadv entered promiscuous mode [ 77.237380][ T2203] bridge0: port 3(veth0_to_batadv) entered blocking state [ 77.244537][ T2203] bridge0: port 3(veth0_to_batadv) entered forwarding state [ 77.332315][ T2209] device pim6reg1 entered promiscuous mode [ 77.546099][ T2223] FAULT_INJECTION: forcing a failure. [ 77.546099][ T2223] name failslab, interval 1, probability 0, space 0, times 0 [ 77.559035][ T2223] CPU: 1 PID: 2223 Comm: syz.3.590 Tainted: G W 5.15.176-syzkaller-00972-g829d9f138569 #0 [ 77.570068][ T2223] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 77.579965][ T2223] Call Trace: [ 77.583090][ T2223] [ 77.585865][ T2223] dump_stack_lvl+0x151/0x1c0 [ 77.590389][ T2223] ? io_uring_drop_tctx_refs+0x190/0x190 [ 77.595848][ T2223] dump_stack+0x15/0x20 [ 77.599841][ T2223] should_fail+0x3c6/0x510 [ 77.604092][ T2223] __should_failslab+0xa4/0xe0 [ 77.608689][ T2223] ? security_inode_alloc+0x29/0x120 [ 77.613817][ T2223] should_failslab+0x9/0x20 [ 77.618265][ T2223] slab_pre_alloc_hook+0x37/0xd0 [ 77.623031][ T2223] ? security_inode_alloc+0x29/0x120 [ 77.628322][ T2223] kmem_cache_alloc+0x44/0x250 [ 77.632923][ T2223] security_inode_alloc+0x29/0x120 [ 77.637866][ T2223] inode_init_always+0x76d/0x9d0 [ 77.642641][ T2223] ? sockfs_init_fs_context+0xb0/0xb0 [ 77.647871][ T2223] new_inode_pseudo+0x93/0x220 [ 77.652457][ T2223] __sock_create+0x132/0x7e0 [ 77.656877][ T2223] __sys_socketpair+0x29f/0x6e0 [ 77.661670][ T2223] ? __ia32_sys_socket+0x90/0x90 [ 77.666445][ T2223] ? __ia32_sys_read+0x90/0x90 [ 77.671035][ T2223] ? debug_smp_processor_id+0x17/0x20 [ 77.676253][ T2223] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 77.682154][ T2223] __x64_sys_socketpair+0x9b/0xb0 [ 77.687005][ T2223] x64_sys_call+0x19b/0x9a0 [ 77.691344][ T2223] do_syscall_64+0x3b/0xb0 [ 77.695613][ T2223] ? clear_bhb_loop+0x35/0x90 [ 77.700119][ T2223] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 77.705835][ T2223] RIP: 0033:0x7fc160295d29 [ 77.710091][ T2223] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 77.729536][ T2223] RSP: 002b:00007fc15e907038 EFLAGS: 00000246 ORIG_RAX: 0000000000000035 [ 77.737788][ T2223] RAX: ffffffffffffffda RBX: 00007fc160485fa0 RCX: 00007fc160295d29 [ 77.745703][ T2223] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 77.753515][ T2223] RBP: 00007fc15e907090 R08: 0000000000000000 R09: 0000000000000000 [ 77.761322][ T2223] R10: 0000000020000140 R11: 0000000000000246 R12: 0000000000000001 [ 77.769136][ T2223] R13: 0000000000000000 R14: 00007fc160485fa0 R15: 00007fff9c1b5838 [ 77.777042][ T2223] [ 77.782859][ T2223] socket: no more sockets [ 78.012704][ T30] audit: type=1400 audit(1736947259.241:156): avc: denied { create } for pid=2236 comm="syz.2.596" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=ax25_socket permissive=1 [ 78.261606][ T2256] FAULT_INJECTION: forcing a failure. [ 78.261606][ T2256] name failslab, interval 1, probability 0, space 0, times 0 [ 78.282383][ T2256] CPU: 0 PID: 2256 Comm: syz.2.603 Tainted: G W 5.15.176-syzkaller-00972-g829d9f138569 #0 [ 78.293432][ T2256] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 78.303326][ T2256] Call Trace: [ 78.306447][ T2256] [ 78.309229][ T2256] dump_stack_lvl+0x151/0x1c0 [ 78.313753][ T2256] ? io_uring_drop_tctx_refs+0x190/0x190 [ 78.319296][ T2256] dump_stack+0x15/0x20 [ 78.323202][ T2256] should_fail+0x3c6/0x510 [ 78.327456][ T2256] __should_failslab+0xa4/0xe0 [ 78.332062][ T2256] should_failslab+0x9/0x20 [ 78.336395][ T2256] slab_pre_alloc_hook+0x37/0xd0 [ 78.341291][ T2256] kmem_cache_alloc_trace+0x48/0x270 [ 78.346392][ T2256] ? __request_module+0x28c/0x8e0 [ 78.351255][ T2256] ? __sock_create+0x32e/0x7e0 [ 78.355848][ T2256] __request_module+0x28c/0x8e0 [ 78.360532][ T2256] ? get_next_ino+0xe5/0x190 [ 78.364958][ T2256] ? _trace_android_vh_delayacct_thrashing_end+0x120/0x120 [ 78.372336][ T2256] ? slab_post_alloc_hook+0x72/0x2c0 [ 78.377461][ T2256] ? _raw_spin_lock+0xa4/0x1b0 [ 78.382055][ T2256] ? _raw_spin_trylock_bh+0x190/0x190 [ 78.387265][ T2256] ? security_inode_alloc+0xc0/0x120 [ 78.392385][ T2256] ? inode_init_always+0x784/0x9d0 [ 78.397335][ T2256] __sock_create+0x32e/0x7e0 [ 78.401760][ T2256] __sys_socketpair+0x29f/0x6e0 [ 78.406483][ T2256] ? __ia32_sys_socket+0x90/0x90 [ 78.411219][ T2256] ? __ia32_sys_read+0x90/0x90 [ 78.415824][ T2256] ? debug_smp_processor_id+0x17/0x20 [ 78.421025][ T2256] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 78.426935][ T2256] __x64_sys_socketpair+0x9b/0xb0 [ 78.431789][ T2256] x64_sys_call+0x19b/0x9a0 [ 78.436129][ T2256] do_syscall_64+0x3b/0xb0 [ 78.440379][ T2256] ? clear_bhb_loop+0x35/0x90 [ 78.444894][ T2256] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 78.450623][ T2256] RIP: 0033:0x7f06dd22dd29 [ 78.454933][ T2256] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 78.474318][ T2256] RSP: 002b:00007f06db89f038 EFLAGS: 00000246 ORIG_RAX: 0000000000000035 [ 78.482574][ T2256] RAX: ffffffffffffffda RBX: 00007f06dd41dfa0 RCX: 00007f06dd22dd29 [ 78.490372][ T2256] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 78.498183][ T2256] RBP: 00007f06db89f090 R08: 0000000000000000 R09: 0000000000000000 [ 78.505995][ T2256] R10: 0000000020000140 R11: 0000000000000246 R12: 0000000000000001 [ 78.513806][ T2256] R13: 0000000000000000 R14: 00007f06dd41dfa0 R15: 00007ffeed5d8bc8 [ 78.521628][ T2256] [ 79.509638][ T2276] Â: renamed from pim6reg1 [ 80.683400][ T2308] syz.0.621[2308] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 80.683516][ T2308] syz.0.621[2308] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 81.103527][ T2318] device pim6reg1 entered promiscuous mode [ 81.290171][ T2327] bridge0: port 3(veth0_to_batadv) entered disabled state [ 81.300284][ T2327] bridge0: port 2(bridge_slave_1) entered disabled state [ 81.312091][ T2327] bridge0: port 1(bridge_slave_0) entered disabled state [ 81.434560][ T2327] device veth0_to_batadv left promiscuous mode [ 81.452709][ T2327] bridge0: port 3(veth0_to_batadv) entered disabled state [ 81.488908][ T2327] device bridge_slave_1 left promiscuous mode [ 81.500592][ T2327] bridge0: port 2(bridge_slave_1) entered disabled state [ 81.529076][ T2327] bridge0: port 1(bridge_slave_0) entered disabled state [ 83.114668][ T2341] device veth1_macvtap left promiscuous mode [ 83.152452][ T2352] syz.0.632[2352] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 83.152586][ T2352] syz.0.632[2352] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 83.167200][ T2342] device veth1_macvtap entered promiscuous mode [ 83.200082][ T2342] device macsec0 entered promiscuous mode [ 83.302518][ T2363] bond_slave_1: mtu less than device minimum [ 84.270000][ T2387] syzkaller0: default qdisc (pfifo_fast) fail, fallback to noqueue [ 84.376259][ T2387] device syzkaller0 entered promiscuous mode [ 86.335937][ T2440] syz.2.660[2440] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 86.336017][ T2440] syz.2.660[2440] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 86.605274][ T2449] device syzkaller0 entered promiscuous mode [ 87.560710][ T2474] device syzkaller0 entered promiscuous mode [ 87.605448][ T2481] syz.2.674[2481] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 87.605522][ T2481] syz.2.674[2481] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 87.678816][ T2463] bridge0: port 1(bridge_slave_0) entered disabled state [ 88.659336][ T2531] device syzkaller0 entered promiscuous mode [ 88.970853][ T2548] device wg2 left promiscuous mode [ 88.979099][ T2548] device wg2 entered promiscuous mode [ 89.229992][ T2558] device pim6reg1 entered promiscuous mode [ 101.658365][ T2648] bridge0: port 2(bridge_slave_1) entered disabled state [ 101.722924][ T2649] device bridge_slave_1 left promiscuous mode [ 101.811315][ T2649] bridge0: port 2(bridge_slave_1) entered disabled state [ 101.874988][ T2649] device bridge_slave_0 left promiscuous mode [ 101.881082][ T2649] bridge0: port 1(bridge_slave_0) entered disabled state [ 102.972410][ T2698] FAULT_INJECTION: forcing a failure. [ 102.972410][ T2698] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 102.987385][ T2698] CPU: 0 PID: 2698 Comm: syz.1.734 Tainted: G W 5.15.176-syzkaller-00972-g829d9f138569 #0 [ 102.998419][ T2698] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 103.008346][ T2698] Call Trace: [ 103.011437][ T2698] [ 103.014219][ T2698] dump_stack_lvl+0x151/0x1c0 [ 103.018750][ T2698] ? io_uring_drop_tctx_refs+0x190/0x190 [ 103.024225][ T2698] dump_stack+0x15/0x20 [ 103.028187][ T2698] should_fail+0x3c6/0x510 [ 103.032444][ T2698] should_fail_alloc_page+0x5a/0x80 [ 103.037483][ T2698] prepare_alloc_pages+0x15c/0x700 [ 103.042431][ T2698] ? __alloc_pages+0x8f0/0x8f0 [ 103.047219][ T2698] ? __alloc_pages_bulk+0xd80/0xd80 [ 103.052247][ T2698] __alloc_pages+0x18c/0x8f0 [ 103.056676][ T2698] ? prep_new_page+0x110/0x110 [ 103.061275][ T2698] ? 0xffffffffa0028000 [ 103.065783][ T2698] ? is_bpf_text_address+0x172/0x190 [ 103.070907][ T2698] pte_alloc_one+0x73/0x1b0 [ 103.075329][ T2698] ? pfn_modify_allowed+0x2f0/0x2f0 [ 103.080523][ T2698] ? arch_stack_walk+0xf3/0x140 [ 103.085142][ T2698] __pte_alloc+0x86/0x350 [ 103.090001][ T2698] ? free_pgtables+0x280/0x280 [ 103.094599][ T2698] ? _raw_spin_lock+0xa4/0x1b0 [ 103.099201][ T2698] ? __kasan_check_write+0x14/0x20 [ 103.104147][ T2698] copy_page_range+0x2743/0x2e20 [ 103.108933][ T2698] ? pfn_valid+0x1e0/0x1e0 [ 103.113178][ T2698] ? vma_gap_callbacks_rotate+0x1e2/0x210 [ 103.118730][ T2698] ? __rb_insert_augmented+0x5de/0x610 [ 103.124026][ T2698] copy_mm+0xc7e/0x13e0 [ 103.128018][ T2698] ? copy_signal+0x610/0x610 [ 103.132440][ T2698] ? __init_rwsem+0xfe/0x1d0 [ 103.136865][ T2698] ? copy_signal+0x4e3/0x610 [ 103.141298][ T2698] copy_process+0x1149/0x3290 [ 103.145806][ T2698] ? __kasan_check_write+0x14/0x20 [ 103.150757][ T2698] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 103.155705][ T2698] ? vfs_write+0x94d/0x1110 [ 103.160041][ T2698] kernel_clone+0x21e/0x9e0 [ 103.164383][ T2698] ? __kasan_check_write+0x14/0x20 [ 103.169329][ T2698] ? create_io_thread+0x1e0/0x1e0 [ 103.174190][ T2698] __x64_sys_clone+0x23f/0x290 [ 103.178880][ T2698] ? __do_sys_vfork+0x130/0x130 [ 103.183569][ T2698] ? debug_smp_processor_id+0x17/0x20 [ 103.188767][ T2698] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 103.194673][ T2698] ? exit_to_user_mode_prepare+0x39/0xa0 [ 103.200141][ T2698] x64_sys_call+0x1b0/0x9a0 [ 103.204515][ T2698] do_syscall_64+0x3b/0xb0 [ 103.208741][ T2698] ? clear_bhb_loop+0x35/0x90 [ 103.213247][ T2698] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 103.218973][ T2698] RIP: 0033:0x7ff7d83f2d29 [ 103.223229][ T2698] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 103.242756][ T2698] RSP: 002b:00007ff7d6a63fe8 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 103.251018][ T2698] RAX: ffffffffffffffda RBX: 00007ff7d85e2fa0 RCX: 00007ff7d83f2d29 [ 103.258897][ T2698] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 103.266710][ T2698] RBP: 00007ff7d6a64090 R08: 0000000000000000 R09: 0000000000000000 [ 103.274522][ T2698] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 103.282332][ T2698] R13: 0000000000000000 R14: 00007ff7d85e2fa0 R15: 00007ffdddd1cc08 [ 103.290152][ T2698] [ 103.347758][ T2689] device veth0_vlan left promiscuous mode [ 103.363027][ T2689] device veth0_vlan entered promiscuous mode [ 103.405347][ T1104] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 103.416736][ T1104] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 103.432300][ T1104] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 107.073120][ T2766] device bridge_slave_1 left promiscuous mode [ 107.082857][ T2766] bridge0: port 2(bridge_slave_1) entered disabled state [ 107.170360][ T2766] device bridge_slave_0 left promiscuous mode [ 107.196809][ T2766] bridge0: port 1(bridge_slave_0) entered disabled state [ 108.050637][ T2790] FAULT_INJECTION: forcing a failure. [ 108.050637][ T2790] name failslab, interval 1, probability 0, space 0, times 0 [ 108.184742][ T2790] CPU: 1 PID: 2790 Comm: syz.2.769 Tainted: G W 5.15.176-syzkaller-00972-g829d9f138569 #0 [ 108.195790][ T2790] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 108.205685][ T2790] Call Trace: [ 108.208802][ T2790] [ 108.211584][ T2790] dump_stack_lvl+0x151/0x1c0 [ 108.216305][ T2790] ? io_uring_drop_tctx_refs+0x190/0x190 [ 108.221762][ T2790] dump_stack+0x15/0x20 [ 108.225754][ T2790] should_fail+0x3c6/0x510 [ 108.230007][ T2790] __should_failslab+0xa4/0xe0 [ 108.234607][ T2790] ? anon_vma_clone+0x9a/0x500 [ 108.239208][ T2790] should_failslab+0x9/0x20 [ 108.243544][ T2790] slab_pre_alloc_hook+0x37/0xd0 [ 108.248324][ T2790] ? anon_vma_clone+0x9a/0x500 [ 108.252918][ T2790] kmem_cache_alloc+0x44/0x250 [ 108.257525][ T2790] anon_vma_clone+0x9a/0x500 [ 108.261953][ T2790] anon_vma_fork+0x91/0x4e0 [ 108.266291][ T2790] ? anon_vma_name+0x43/0x70 [ 108.270710][ T2790] ? vm_area_dup+0x17a/0x230 [ 108.275137][ T2790] copy_mm+0xa3a/0x13e0 [ 108.279134][ T2790] ? copy_signal+0x610/0x610 [ 108.283558][ T2790] ? __init_rwsem+0xfe/0x1d0 [ 108.287984][ T2790] ? copy_signal+0x4e3/0x610 [ 108.292414][ T2790] copy_process+0x1149/0x3290 [ 108.296923][ T2790] ? __kasan_check_write+0x14/0x20 [ 108.301879][ T2790] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 108.306815][ T2790] ? vfs_write+0x94d/0x1110 [ 108.311159][ T2790] kernel_clone+0x21e/0x9e0 [ 108.315498][ T2790] ? __kasan_check_write+0x14/0x20 [ 108.320460][ T2790] ? create_io_thread+0x1e0/0x1e0 [ 108.325314][ T2790] __x64_sys_clone+0x23f/0x290 [ 108.329914][ T2790] ? __do_sys_vfork+0x130/0x130 [ 108.334597][ T2790] ? debug_smp_processor_id+0x17/0x20 [ 108.339799][ T2790] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 108.345701][ T2790] ? exit_to_user_mode_prepare+0x39/0xa0 [ 108.351171][ T2790] x64_sys_call+0x1b0/0x9a0 [ 108.355511][ T2790] do_syscall_64+0x3b/0xb0 [ 108.359758][ T2790] ? clear_bhb_loop+0x35/0x90 [ 108.364282][ T2790] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 108.370000][ T2790] RIP: 0033:0x7f06dd22dd29 [ 108.374342][ T2790] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 108.393786][ T2790] RSP: 002b:00007f06db89efe8 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 108.402037][ T2790] RAX: ffffffffffffffda RBX: 00007f06dd41dfa0 RCX: 00007f06dd22dd29 [ 108.409844][ T2790] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 108.417652][ T2790] RBP: 00007f06db89f090 R08: 0000000000000000 R09: 0000000000000000 [ 108.425463][ T2790] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 108.433277][ T2790] R13: 0000000000000000 R14: 00007f06dd41dfa0 R15: 00007ffeed5d8bc8 [ 108.441089][ T2790] [ 109.445775][ T2849] FAULT_INJECTION: forcing a failure. [ 109.445775][ T2849] name failslab, interval 1, probability 0, space 0, times 0 [ 109.473043][ T2849] CPU: 1 PID: 2849 Comm: syz.4.775 Tainted: G W 5.15.176-syzkaller-00972-g829d9f138569 #0 [ 109.484088][ T2849] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 109.493981][ T2849] Call Trace: [ 109.497103][ T2849] [ 109.499881][ T2849] dump_stack_lvl+0x151/0x1c0 [ 109.504404][ T2849] ? io_uring_drop_tctx_refs+0x190/0x190 [ 109.509869][ T2849] dump_stack+0x15/0x20 [ 109.513856][ T2849] should_fail+0x3c6/0x510 [ 109.518120][ T2849] __should_failslab+0xa4/0xe0 [ 109.522707][ T2849] ? anon_vma_clone+0x9a/0x500 [ 109.527333][ T2849] should_failslab+0x9/0x20 [ 109.531652][ T2849] slab_pre_alloc_hook+0x37/0xd0 [ 109.536424][ T2849] ? anon_vma_clone+0x9a/0x500 [ 109.541018][ T2849] kmem_cache_alloc+0x44/0x250 [ 109.545623][ T2849] anon_vma_clone+0x9a/0x500 [ 109.550049][ T2849] anon_vma_fork+0x91/0x4e0 [ 109.554388][ T2849] ? anon_vma_name+0x43/0x70 [ 109.558812][ T2849] ? vm_area_dup+0x17a/0x230 [ 109.563242][ T2849] copy_mm+0xa3a/0x13e0 [ 109.567251][ T2849] ? copy_signal+0x610/0x610 [ 109.571659][ T2849] ? __init_rwsem+0xfe/0x1d0 [ 109.576084][ T2849] ? copy_signal+0x4e3/0x610 [ 109.580514][ T2849] copy_process+0x1149/0x3290 [ 109.585028][ T2849] ? __kasan_check_write+0x14/0x20 [ 109.589976][ T2849] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 109.594918][ T2849] ? vfs_write+0x94d/0x1110 [ 109.599261][ T2849] kernel_clone+0x21e/0x9e0 [ 109.603598][ T2849] ? __kasan_check_write+0x14/0x20 [ 109.608559][ T2849] ? create_io_thread+0x1e0/0x1e0 [ 109.613415][ T2849] __x64_sys_clone+0x23f/0x290 [ 109.618008][ T2849] ? __do_sys_vfork+0x130/0x130 [ 109.622829][ T2849] ? debug_smp_processor_id+0x17/0x20 [ 109.628030][ T2849] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 109.633932][ T2849] ? exit_to_user_mode_prepare+0x39/0xa0 [ 109.639402][ T2849] x64_sys_call+0x1b0/0x9a0 [ 109.643739][ T2849] do_syscall_64+0x3b/0xb0 [ 109.647992][ T2849] ? clear_bhb_loop+0x35/0x90 [ 109.652506][ T2849] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 109.658234][ T2849] RIP: 0033:0x7f0662dacd29 [ 109.662488][ T2849] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 109.681931][ T2849] RSP: 002b:00007f066141dfe8 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 109.690183][ T2849] RAX: ffffffffffffffda RBX: 00007f0662f9cfa0 RCX: 00007f0662dacd29 [ 109.697983][ T2849] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 109.705798][ T2849] RBP: 00007f066141e090 R08: 0000000000000000 R09: 0000000000000000 [ 109.713606][ T2849] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 109.721419][ T2849] R13: 0000000000000000 R14: 00007f0662f9cfa0 R15: 00007ffed0733fc8 [ 109.729242][ T2849] [ 109.887708][ T2856] syz.3.778[2856] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 109.887787][ T2856] syz.3.778[2856] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 110.135513][ T2865] device wg2 left promiscuous mode [ 110.166841][ T30] audit: type=1400 audit(1736947291.401:157): avc: denied { create } for pid=2866 comm="syz.2.783" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rxrpc_socket permissive=1 [ 110.358870][ T2884] syz.3.788[2884] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 110.358948][ T2884] syz.3.788[2884] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 110.376856][ T2882] FAULT_INJECTION: forcing a failure. [ 110.376856][ T2882] name failslab, interval 1, probability 0, space 0, times 0 [ 110.412632][ T2882] CPU: 1 PID: 2882 Comm: syz.2.787 Tainted: G W 5.15.176-syzkaller-00972-g829d9f138569 #0 [ 110.423682][ T2882] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 110.433589][ T2882] Call Trace: [ 110.436696][ T2882] [ 110.439472][ T2882] dump_stack_lvl+0x151/0x1c0 [ 110.443985][ T2882] ? io_uring_drop_tctx_refs+0x190/0x190 [ 110.449459][ T2882] dump_stack+0x15/0x20 [ 110.453447][ T2882] should_fail+0x3c6/0x510 [ 110.457701][ T2882] __should_failslab+0xa4/0xe0 [ 110.462301][ T2882] ? anon_vma_fork+0x1df/0x4e0 [ 110.466898][ T2882] should_failslab+0x9/0x20 [ 110.471238][ T2882] slab_pre_alloc_hook+0x37/0xd0 [ 110.476011][ T2882] ? anon_vma_fork+0x1df/0x4e0 [ 110.480616][ T2882] kmem_cache_alloc+0x44/0x250 [ 110.485209][ T2882] anon_vma_fork+0x1df/0x4e0 [ 110.489640][ T2882] copy_mm+0xa3a/0x13e0 [ 110.493632][ T2882] ? copy_signal+0x610/0x610 [ 110.498058][ T2882] ? __init_rwsem+0xfe/0x1d0 [ 110.502490][ T2882] ? copy_signal+0x4e3/0x610 [ 110.506908][ T2882] copy_process+0x1149/0x3290 [ 110.511425][ T2882] ? __kasan_check_write+0x14/0x20 [ 110.516380][ T2882] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 110.521315][ T2882] ? vfs_write+0x94d/0x1110 [ 110.525659][ T2882] kernel_clone+0x21e/0x9e0 [ 110.529999][ T2882] ? __kasan_check_write+0x14/0x20 [ 110.534945][ T2882] ? create_io_thread+0x1e0/0x1e0 [ 110.539806][ T2882] __x64_sys_clone+0x23f/0x290 [ 110.544406][ T2882] ? __do_sys_vfork+0x130/0x130 [ 110.549094][ T2882] ? debug_smp_processor_id+0x17/0x20 [ 110.554300][ T2882] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 110.560204][ T2882] ? exit_to_user_mode_prepare+0x39/0xa0 [ 110.565672][ T2882] x64_sys_call+0x1b0/0x9a0 [ 110.570020][ T2882] do_syscall_64+0x3b/0xb0 [ 110.574261][ T2882] ? clear_bhb_loop+0x35/0x90 [ 110.578774][ T2882] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 110.584503][ T2882] RIP: 0033:0x7f06dd22dd29 [ 110.588758][ T2882] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 110.608199][ T2882] RSP: 002b:00007f06db89efe8 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 110.616530][ T2882] RAX: ffffffffffffffda RBX: 00007f06dd41dfa0 RCX: 00007f06dd22dd29 [ 110.624345][ T2882] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 110.632164][ T2882] RBP: 00007f06db89f090 R08: 0000000000000000 R09: 0000000000000000 [ 110.639966][ T2882] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 110.647774][ T2882] R13: 0000000000000000 R14: 00007f06dd41dfa0 R15: 00007ffeed5d8bc8 [ 110.655702][ T2882] [ 110.860616][ T30] audit: type=1400 audit(1736947292.091:158): avc: denied { create } for pid=2906 comm="syz.2.796" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 110.993878][ T30] audit: type=1400 audit(1736947292.221:159): avc: denied { append } for pid=83 comm="syslogd" name="messages" dev="tmpfs" ino=6 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 111.064962][ T30] audit: type=1400 audit(1736947292.221:160): avc: denied { open } for pid=83 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=6 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 111.161305][ T30] audit: type=1400 audit(1736947292.221:161): avc: denied { getattr } for pid=83 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=6 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 111.252384][ T2952] Â: renamed from pim6reg1 [ 111.334589][ T2962] bond_slave_1: mtu less than device minimum [ 112.727486][ T3039] device veth0_vlan left promiscuous mode [ 112.758071][ T3039] device veth0_vlan entered promiscuous mode [ 112.809630][ T3059] syz.0.841[3059] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 112.809713][ T3059] syz.0.841[3059] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 112.815120][ T312] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 112.844151][ T312] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 112.857138][ T312] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 114.252389][ T3151] syz.2.869[3151] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 114.252469][ T3151] syz.2.869[3151] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 114.465960][ T3151] syz.2.869[3151] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 114.547009][ T3151] syz.2.869[3151] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 115.224697][ T30] audit: type=1400 audit(1736947296.451:162): avc: denied { create } for pid=3205 comm="syz.0.888" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 119.266552][ T3223] FAULT_INJECTION: forcing a failure. [ 119.266552][ T3223] name failslab, interval 1, probability 0, space 0, times 0 [ 119.288782][ T3223] CPU: 0 PID: 3223 Comm: syz.0.891 Tainted: G W 5.15.176-syzkaller-00972-g829d9f138569 #0 [ 119.299828][ T3223] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 119.309725][ T3223] Call Trace: [ 119.312844][ T3223] [ 119.315629][ T3223] dump_stack_lvl+0x151/0x1c0 [ 119.320139][ T3223] ? io_uring_drop_tctx_refs+0x190/0x190 [ 119.325720][ T3223] dump_stack+0x15/0x20 [ 119.329703][ T3223] should_fail+0x3c6/0x510 [ 119.333956][ T3223] __should_failslab+0xa4/0xe0 [ 119.338556][ T3223] ? anon_vma_clone+0x9a/0x500 [ 119.343155][ T3223] should_failslab+0x9/0x20 [ 119.347495][ T3223] slab_pre_alloc_hook+0x37/0xd0 [ 119.352270][ T3223] ? anon_vma_clone+0x9a/0x500 [ 119.356870][ T3223] kmem_cache_alloc+0x44/0x250 [ 119.361470][ T3223] anon_vma_clone+0x9a/0x500 [ 119.365898][ T3223] anon_vma_fork+0x91/0x4e0 [ 119.370357][ T3223] ? anon_vma_name+0x43/0x70 [ 119.374782][ T3223] ? vm_area_dup+0x17a/0x230 [ 119.379210][ T3223] copy_mm+0xa3a/0x13e0 [ 119.383207][ T3223] ? copy_signal+0x610/0x610 [ 119.387631][ T3223] ? __init_rwsem+0xfe/0x1d0 [ 119.392054][ T3223] ? copy_signal+0x4e3/0x610 [ 119.396480][ T3223] copy_process+0x1149/0x3290 [ 119.400997][ T3223] ? __kasan_check_write+0x14/0x20 [ 119.405945][ T3223] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 119.410889][ T3223] ? vfs_write+0x94d/0x1110 [ 119.415232][ T3223] kernel_clone+0x21e/0x9e0 [ 119.419568][ T3223] ? __kasan_check_write+0x14/0x20 [ 119.424515][ T3223] ? create_io_thread+0x1e0/0x1e0 [ 119.429380][ T3223] __x64_sys_clone+0x23f/0x290 [ 119.433975][ T3223] ? __do_sys_vfork+0x130/0x130 [ 119.438664][ T3223] ? debug_smp_processor_id+0x17/0x20 [ 119.443872][ T3223] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 119.449771][ T3223] ? exit_to_user_mode_prepare+0x39/0xa0 [ 119.455242][ T3223] x64_sys_call+0x1b0/0x9a0 [ 119.459580][ T3223] do_syscall_64+0x3b/0xb0 [ 119.463832][ T3223] ? clear_bhb_loop+0x35/0x90 [ 119.468347][ T3223] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 119.474072][ T3223] RIP: 0033:0x7fa2d6d7bd29 [ 119.478331][ T3223] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 119.497770][ T3223] RSP: 002b:00007fa2d53ecfe8 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 119.506015][ T3223] RAX: ffffffffffffffda RBX: 00007fa2d6f6bfa0 RCX: 00007fa2d6d7bd29 [ 119.513826][ T3223] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 119.521637][ T3223] RBP: 00007fa2d53ed090 R08: 0000000000000000 R09: 0000000000000000 [ 119.529536][ T3223] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 119.537355][ T3223] R13: 0000000000000000 R14: 00007fa2d6f6bfa0 R15: 00007ffe54ad7868 [ 119.545163][ T3223] [ 119.970733][ T3238] device syzkaller0 entered promiscuous mode [ 120.061443][ T3251] device syzkaller0 entered promiscuous mode [ 121.247369][ T3286] syzkaller0: default qdisc (pfifo_fast) fail, fallback to noqueue [ 122.806747][ T3371] FAULT_INJECTION: forcing a failure. [ 122.806747][ T3371] name failslab, interval 1, probability 0, space 0, times 0 [ 122.980940][ T3371] CPU: 0 PID: 3371 Comm: syz.2.937 Tainted: G W 5.15.176-syzkaller-00972-g829d9f138569 #0 [ 122.991989][ T3371] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 123.001895][ T3371] Call Trace: [ 123.005114][ T3371] [ 123.007887][ T3371] dump_stack_lvl+0x151/0x1c0 [ 123.012394][ T3371] ? io_uring_drop_tctx_refs+0x190/0x190 [ 123.018027][ T3371] dump_stack+0x15/0x20 [ 123.022024][ T3371] should_fail+0x3c6/0x510 [ 123.026273][ T3371] __should_failslab+0xa4/0xe0 [ 123.030871][ T3371] ? vm_area_dup+0x26/0x230 [ 123.035211][ T3371] should_failslab+0x9/0x20 [ 123.039550][ T3371] slab_pre_alloc_hook+0x37/0xd0 [ 123.044324][ T3371] ? vm_area_dup+0x26/0x230 [ 123.048664][ T3371] kmem_cache_alloc+0x44/0x250 [ 123.053262][ T3371] vm_area_dup+0x26/0x230 [ 123.057430][ T3371] copy_mm+0x9a1/0x13e0 [ 123.061426][ T3371] ? copy_signal+0x610/0x610 [ 123.065848][ T3371] ? __init_rwsem+0xfe/0x1d0 [ 123.070275][ T3371] ? copy_signal+0x4e3/0x610 [ 123.074702][ T3371] copy_process+0x1149/0x3290 [ 123.079215][ T3371] ? __kasan_check_write+0x14/0x20 [ 123.084164][ T3371] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 123.089108][ T3371] ? vfs_write+0x94d/0x1110 [ 123.093453][ T3371] kernel_clone+0x21e/0x9e0 [ 123.097788][ T3371] ? __kasan_check_write+0x14/0x20 [ 123.102734][ T3371] ? create_io_thread+0x1e0/0x1e0 [ 123.107598][ T3371] __x64_sys_clone+0x23f/0x290 [ 123.112199][ T3371] ? __do_sys_vfork+0x130/0x130 [ 123.116885][ T3371] ? debug_smp_processor_id+0x17/0x20 [ 123.122090][ T3371] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 123.127995][ T3371] ? exit_to_user_mode_prepare+0x39/0xa0 [ 123.133464][ T3371] x64_sys_call+0x1b0/0x9a0 [ 123.137799][ T3371] do_syscall_64+0x3b/0xb0 [ 123.142053][ T3371] ? clear_bhb_loop+0x35/0x90 [ 123.146568][ T3371] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 123.152302][ T3371] RIP: 0033:0x7f06dd22dd29 [ 123.156551][ T3371] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 123.175991][ T3371] RSP: 002b:00007f06db89efe8 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 123.184233][ T3371] RAX: ffffffffffffffda RBX: 00007f06dd41dfa0 RCX: 00007f06dd22dd29 [ 123.192049][ T3371] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 123.199857][ T3371] RBP: 00007f06db89f090 R08: 0000000000000000 R09: 0000000000000000 [ 123.207682][ T3371] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 123.215571][ T3371] R13: 0000000000000000 R14: 00007f06dd41dfa0 R15: 00007ffeed5d8bc8 [ 123.223387][ T3371] [ 123.588640][ T3380] device wg2 left promiscuous mode [ 123.651709][ T3384] device wg2 entered promiscuous mode [ 125.909398][ T3473] ÿÿÿÿÿÿ: renamed from vlan1 [ 125.959657][ T3482] FAULT_INJECTION: forcing a failure. [ 125.959657][ T3482] name failslab, interval 1, probability 0, space 0, times 0 [ 125.972938][ T3482] CPU: 1 PID: 3482 Comm: syz.1.969 Tainted: G W 5.15.176-syzkaller-00972-g829d9f138569 #0 [ 125.983971][ T3482] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 125.993864][ T3482] Call Trace: [ 125.996989][ T3482] [ 125.999766][ T3482] dump_stack_lvl+0x151/0x1c0 [ 126.004280][ T3482] ? io_uring_drop_tctx_refs+0x190/0x190 [ 126.009757][ T3482] dump_stack+0x15/0x20 [ 126.013745][ T3482] should_fail+0x3c6/0x510 [ 126.017993][ T3482] __should_failslab+0xa4/0xe0 [ 126.022591][ T3482] ? anon_vma_clone+0x9a/0x500 [ 126.027202][ T3482] should_failslab+0x9/0x20 [ 126.031533][ T3482] slab_pre_alloc_hook+0x37/0xd0 [ 126.036308][ T3482] ? anon_vma_clone+0x9a/0x500 [ 126.040911][ T3482] kmem_cache_alloc+0x44/0x250 [ 126.045508][ T3482] anon_vma_clone+0x9a/0x500 [ 126.049944][ T3482] anon_vma_fork+0x91/0x4e0 [ 126.054273][ T3482] ? anon_vma_name+0x4c/0x70 [ 126.058701][ T3482] ? vm_area_dup+0x17a/0x230 [ 126.063127][ T3482] copy_mm+0xa3a/0x13e0 [ 126.067122][ T3482] ? copy_signal+0x610/0x610 [ 126.071543][ T3482] ? __init_rwsem+0xfe/0x1d0 [ 126.075973][ T3482] ? copy_signal+0x4e3/0x610 [ 126.080398][ T3482] copy_process+0x1149/0x3290 [ 126.084909][ T3482] ? __kasan_check_write+0x14/0x20 [ 126.089863][ T3482] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 126.094800][ T3482] ? vfs_write+0x94d/0x1110 [ 126.099198][ T3482] kernel_clone+0x21e/0x9e0 [ 126.103498][ T3482] ? __kasan_check_write+0x14/0x20 [ 126.108428][ T3482] ? create_io_thread+0x1e0/0x1e0 [ 126.113293][ T3482] __x64_sys_clone+0x23f/0x290 [ 126.117896][ T3482] ? __do_sys_vfork+0x130/0x130 [ 126.122580][ T3482] ? debug_smp_processor_id+0x17/0x20 [ 126.127783][ T3482] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 126.134050][ T3482] ? exit_to_user_mode_prepare+0x39/0xa0 [ 126.139514][ T3482] x64_sys_call+0x1b0/0x9a0 [ 126.143838][ T3482] do_syscall_64+0x3b/0xb0 [ 126.148092][ T3482] ? clear_bhb_loop+0x35/0x90 [ 126.152610][ T3482] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 126.158331][ T3482] RIP: 0033:0x7ff7d83f2d29 [ 126.162586][ T3482] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 126.182099][ T3482] RSP: 002b:00007ff7d6a63fe8 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 126.190274][ T3482] RAX: ffffffffffffffda RBX: 00007ff7d85e2fa0 RCX: 00007ff7d83f2d29 [ 126.198089][ T3482] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 126.205895][ T3482] RBP: 00007ff7d6a64090 R08: 0000000000000000 R09: 0000000000000000 [ 126.213725][ T3482] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 126.221520][ T3482] R13: 0000000000000000 R14: 00007ff7d85e2fa0 R15: 00007ffdddd1cc08 [ 126.229423][ T3482] [ 126.320589][ T3498] bpf_get_probe_write_proto: 4 callbacks suppressed [ 126.320611][ T3498] syz.2.973[3498] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 126.340736][ T3498] syz.2.973[3498] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 127.021010][ T3525] FAULT_INJECTION: forcing a failure. [ 127.021010][ T3525] name failslab, interval 1, probability 0, space 0, times 0 [ 127.101054][ T3525] CPU: 0 PID: 3525 Comm: syz.1.982 Tainted: G W 5.15.176-syzkaller-00972-g829d9f138569 #0 [ 127.112104][ T3525] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 127.121995][ T3525] Call Trace: [ 127.125128][ T3525] [ 127.127898][ T3525] dump_stack_lvl+0x151/0x1c0 [ 127.132414][ T3525] ? io_uring_drop_tctx_refs+0x190/0x190 [ 127.137880][ T3525] dump_stack+0x15/0x20 [ 127.141868][ T3525] should_fail+0x3c6/0x510 [ 127.146127][ T3525] __should_failslab+0xa4/0xe0 [ 127.150725][ T3525] ? anon_vma_clone+0x9a/0x500 [ 127.155323][ T3525] should_failslab+0x9/0x20 [ 127.159666][ T3525] slab_pre_alloc_hook+0x37/0xd0 [ 127.164439][ T3525] ? anon_vma_clone+0x9a/0x500 [ 127.169163][ T3525] kmem_cache_alloc+0x44/0x250 [ 127.173769][ T3525] anon_vma_clone+0x9a/0x500 [ 127.178190][ T3525] anon_vma_fork+0x91/0x4e0 [ 127.182540][ T3525] ? anon_vma_name+0x43/0x70 [ 127.186966][ T3525] ? vm_area_dup+0x17a/0x230 [ 127.191383][ T3525] copy_mm+0xa3a/0x13e0 [ 127.195379][ T3525] ? copy_signal+0x610/0x610 [ 127.199804][ T3525] ? __init_rwsem+0xfe/0x1d0 [ 127.204226][ T3525] ? copy_signal+0x4e3/0x610 [ 127.208655][ T3525] copy_process+0x1149/0x3290 [ 127.213169][ T3525] ? __kasan_check_write+0x14/0x20 [ 127.218119][ T3525] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 127.223063][ T3525] ? vfs_write+0x94d/0x1110 [ 127.227412][ T3525] kernel_clone+0x21e/0x9e0 [ 127.231826][ T3525] ? __kasan_check_write+0x14/0x20 [ 127.236777][ T3525] ? create_io_thread+0x1e0/0x1e0 [ 127.241639][ T3525] __x64_sys_clone+0x23f/0x290 [ 127.246236][ T3525] ? __do_sys_vfork+0x130/0x130 [ 127.250923][ T3525] ? debug_smp_processor_id+0x17/0x20 [ 127.256130][ T3525] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 127.262032][ T3525] ? exit_to_user_mode_prepare+0x39/0xa0 [ 127.267501][ T3525] x64_sys_call+0x1b0/0x9a0 [ 127.271837][ T3525] do_syscall_64+0x3b/0xb0 [ 127.276094][ T3525] ? clear_bhb_loop+0x35/0x90 [ 127.280606][ T3525] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 127.286332][ T3525] RIP: 0033:0x7ff7d83f2d29 [ 127.290587][ T3525] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 127.310028][ T3525] RSP: 002b:00007ff7d6a63fe8 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 127.318274][ T3525] RAX: ffffffffffffffda RBX: 00007ff7d85e2fa0 RCX: 00007ff7d83f2d29 [ 127.326087][ T3525] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 127.333895][ T3525] RBP: 00007ff7d6a64090 R08: 0000000000000000 R09: 0000000000000000 [ 127.341707][ T3525] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 127.349517][ T3525] R13: 0000000000000000 R14: 00007ff7d85e2fa0 R15: 00007ffdddd1cc08 [ 127.357336][ T3525] [ 128.748384][ T3570] FAULT_INJECTION: forcing a failure. [ 128.748384][ T3570] name failslab, interval 1, probability 0, space 0, times 0 [ 128.823842][ T3570] CPU: 0 PID: 3570 Comm: syz.3.996 Tainted: G W 5.15.176-syzkaller-00972-g829d9f138569 #0 [ 128.834900][ T3570] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 128.844791][ T3570] Call Trace: [ 128.847913][ T3570] [ 128.850696][ T3570] dump_stack_lvl+0x151/0x1c0 [ 128.855204][ T3570] ? io_uring_drop_tctx_refs+0x190/0x190 [ 128.860669][ T3570] ? avc_denied+0x1b0/0x1b0 [ 128.865010][ T3570] dump_stack+0x15/0x20 [ 128.869001][ T3570] should_fail+0x3c6/0x510 [ 128.873260][ T3570] __should_failslab+0xa4/0xe0 [ 128.877859][ T3570] ? vm_area_dup+0x26/0x230 [ 128.882200][ T3570] should_failslab+0x9/0x20 [ 128.886537][ T3570] slab_pre_alloc_hook+0x37/0xd0 [ 128.891307][ T3570] ? vm_area_dup+0x26/0x230 [ 128.895647][ T3570] kmem_cache_alloc+0x44/0x250 [ 128.900251][ T3570] vm_area_dup+0x26/0x230 [ 128.904416][ T3570] copy_mm+0x9a1/0x13e0 [ 128.908410][ T3570] ? copy_signal+0x610/0x610 [ 128.912833][ T3570] ? __init_rwsem+0xfe/0x1d0 [ 128.917257][ T3570] ? copy_signal+0x4e3/0x610 [ 128.921689][ T3570] copy_process+0x1149/0x3290 [ 128.926200][ T3570] ? __kasan_check_write+0x14/0x20 [ 128.931149][ T3570] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 128.936094][ T3570] ? vfs_write+0x94d/0x1110 [ 128.940438][ T3570] kernel_clone+0x21e/0x9e0 [ 128.944771][ T3570] ? __kasan_check_write+0x14/0x20 [ 128.949722][ T3570] ? create_io_thread+0x1e0/0x1e0 [ 128.954581][ T3570] __x64_sys_clone+0x23f/0x290 [ 128.959178][ T3570] ? __do_sys_vfork+0x130/0x130 [ 128.963866][ T3570] ? debug_smp_processor_id+0x17/0x20 [ 128.969073][ T3570] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 128.974975][ T3570] ? exit_to_user_mode_prepare+0x39/0xa0 [ 128.980444][ T3570] x64_sys_call+0x1b0/0x9a0 [ 128.984783][ T3570] do_syscall_64+0x3b/0xb0 [ 128.989033][ T3570] ? clear_bhb_loop+0x35/0x90 [ 128.993550][ T3570] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 128.999276][ T3570] RIP: 0033:0x7fc160295d29 [ 129.003531][ T3570] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 129.022971][ T3570] RSP: 002b:00007fc15e906fe8 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 129.031217][ T3570] RAX: ffffffffffffffda RBX: 00007fc160485fa0 RCX: 00007fc160295d29 [ 129.039028][ T3570] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 129.046842][ T3570] RBP: 00007fc15e907090 R08: 0000000000000000 R09: 0000000000000000 [ 129.054652][ T3570] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 129.062461][ T3570] R13: 0000000000000000 R14: 00007fc160485fa0 R15: 00007fff9c1b5838 [ 129.070282][ T3570] [ 129.257374][ T3574] device syzkaller0 entered promiscuous mode [ 129.907862][ T3619] FAULT_INJECTION: forcing a failure. [ 129.907862][ T3619] name failslab, interval 1, probability 0, space 0, times 0 [ 129.920832][ T3619] CPU: 0 PID: 3619 Comm: syz.3.1011 Tainted: G W 5.15.176-syzkaller-00972-g829d9f138569 #0 [ 129.932170][ T3619] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 129.942064][ T3619] Call Trace: [ 129.945187][ T3619] [ 129.947962][ T3619] dump_stack_lvl+0x151/0x1c0 [ 129.952476][ T3619] ? io_uring_drop_tctx_refs+0x190/0x190 [ 129.957948][ T3619] dump_stack+0x15/0x20 [ 129.961937][ T3619] should_fail+0x3c6/0x510 [ 129.966192][ T3619] __should_failslab+0xa4/0xe0 [ 129.970789][ T3619] ? anon_vma_fork+0xf7/0x4e0 [ 129.975302][ T3619] should_failslab+0x9/0x20 [ 129.979643][ T3619] slab_pre_alloc_hook+0x37/0xd0 [ 129.984414][ T3619] ? anon_vma_fork+0xf7/0x4e0 [ 129.988929][ T3619] kmem_cache_alloc+0x44/0x250 [ 129.993529][ T3619] anon_vma_fork+0xf7/0x4e0 [ 129.997869][ T3619] ? anon_vma_name+0x43/0x70 [ 130.002293][ T3619] ? vm_area_dup+0x17a/0x230 [ 130.006720][ T3619] copy_mm+0xa3a/0x13e0 [ 130.010717][ T3619] ? copy_signal+0x610/0x610 [ 130.015141][ T3619] ? __init_rwsem+0xfe/0x1d0 [ 130.019566][ T3619] ? copy_signal+0x4e3/0x610 [ 130.023994][ T3619] copy_process+0x1149/0x3290 [ 130.028506][ T3619] ? __kasan_check_write+0x14/0x20 [ 130.033454][ T3619] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 130.038401][ T3619] ? vfs_write+0x94d/0x1110 [ 130.042744][ T3619] kernel_clone+0x21e/0x9e0 [ 130.047080][ T3619] ? __kasan_check_write+0x14/0x20 [ 130.052027][ T3619] ? create_io_thread+0x1e0/0x1e0 [ 130.056891][ T3619] __x64_sys_clone+0x23f/0x290 [ 130.061489][ T3619] ? __do_sys_vfork+0x130/0x130 [ 130.066176][ T3619] ? debug_smp_processor_id+0x17/0x20 [ 130.071381][ T3619] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 130.077284][ T3619] ? exit_to_user_mode_prepare+0x39/0xa0 [ 130.082754][ T3619] x64_sys_call+0x1b0/0x9a0 [ 130.087091][ T3619] do_syscall_64+0x3b/0xb0 [ 130.091341][ T3619] ? clear_bhb_loop+0x35/0x90 [ 130.095856][ T3619] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 130.101590][ T3619] RIP: 0033:0x7fc160295d29 [ 130.105839][ T3619] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 130.125582][ T3619] RSP: 002b:00007fc15e906fe8 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 130.133823][ T3619] RAX: ffffffffffffffda RBX: 00007fc160485fa0 RCX: 00007fc160295d29 [ 130.141628][ T3619] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 130.149435][ T3619] RBP: 00007fc15e907090 R08: 0000000000000000 R09: 0000000000000000 [ 130.157247][ T3619] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 130.165057][ T3619] R13: 0000000000000000 R14: 00007fc160485fa0 R15: 00007fff9c1b5838 [ 130.172878][ T3619] [ 130.732563][ T3661] FAULT_INJECTION: forcing a failure. [ 130.732563][ T3661] name failslab, interval 1, probability 0, space 0, times 0 [ 130.766200][ T3661] CPU: 0 PID: 3661 Comm: syz.3.1025 Tainted: G W 5.15.176-syzkaller-00972-g829d9f138569 #0 [ 130.777420][ T3661] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 130.787314][ T3661] Call Trace: [ 130.790443][ T3661] [ 130.793218][ T3661] dump_stack_lvl+0x151/0x1c0 [ 130.797726][ T3661] ? io_uring_drop_tctx_refs+0x190/0x190 [ 130.803198][ T3661] dump_stack+0x15/0x20 [ 130.807186][ T3661] should_fail+0x3c6/0x510 [ 130.811443][ T3661] __should_failslab+0xa4/0xe0 [ 130.816036][ T3661] ? anon_vma_fork+0xf7/0x4e0 [ 130.820554][ T3661] should_failslab+0x9/0x20 [ 130.824894][ T3661] slab_pre_alloc_hook+0x37/0xd0 [ 130.829661][ T3661] ? anon_vma_fork+0xf7/0x4e0 [ 130.834181][ T3661] kmem_cache_alloc+0x44/0x250 [ 130.838772][ T3661] anon_vma_fork+0xf7/0x4e0 [ 130.843112][ T3661] ? anon_vma_name+0x43/0x70 [ 130.847539][ T3661] ? vm_area_dup+0x17a/0x230 [ 130.851965][ T3661] copy_mm+0xa3a/0x13e0 [ 130.855962][ T3661] ? copy_signal+0x610/0x610 [ 130.860385][ T3661] ? __init_rwsem+0xfe/0x1d0 [ 130.864816][ T3661] ? copy_signal+0x4e3/0x610 [ 130.869238][ T3661] copy_process+0x1149/0x3290 [ 130.873753][ T3661] ? __kasan_check_write+0x14/0x20 [ 130.878701][ T3661] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 130.883663][ T3661] ? vfs_write+0x94d/0x1110 [ 130.887986][ T3661] kernel_clone+0x21e/0x9e0 [ 130.892325][ T3661] ? __kasan_check_write+0x14/0x20 [ 130.897273][ T3661] ? create_io_thread+0x1e0/0x1e0 [ 130.902138][ T3661] __x64_sys_clone+0x23f/0x290 [ 130.906733][ T3661] ? __do_sys_vfork+0x130/0x130 [ 130.911422][ T3661] ? debug_smp_processor_id+0x17/0x20 [ 130.916627][ T3661] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 130.922529][ T3661] ? exit_to_user_mode_prepare+0x39/0xa0 [ 130.927999][ T3661] x64_sys_call+0x1b0/0x9a0 [ 130.932340][ T3661] do_syscall_64+0x3b/0xb0 [ 130.936589][ T3661] ? clear_bhb_loop+0x35/0x90 [ 130.941103][ T3661] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 130.946833][ T3661] RIP: 0033:0x7fc160295d29 [ 130.951091][ T3661] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 130.970526][ T3661] RSP: 002b:00007fc15e906fe8 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 130.978774][ T3661] RAX: ffffffffffffffda RBX: 00007fc160485fa0 RCX: 00007fc160295d29 [ 130.986588][ T3661] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 130.994395][ T3661] RBP: 00007fc15e907090 R08: 0000000000000000 R09: 0000000000000000 [ 131.002207][ T3661] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 131.010016][ T3661] R13: 0000000000000000 R14: 00007fc160485fa0 R15: 00007fff9c1b5838 [ 131.017834][ T3661] [ 131.021786][ T3661] ------------[ cut here ]------------ [ 131.027286][ T3661] refcount_t: underflow; use-after-free. [ 131.032952][ T3661] WARNING: CPU: 0 PID: 3661 at lib/refcount.c:28 refcount_warn_saturate+0x158/0x1a0 [ 131.042521][ T3661] Modules linked in: [ 131.048422][ T3661] CPU: 0 PID: 3661 Comm: syz.3.1025 Tainted: G W 5.15.176-syzkaller-00972-g829d9f138569 #0 [ 131.060716][ T3661] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 131.070863][ T3661] RIP: 0010:refcount_warn_saturate+0x158/0x1a0 [ 131.077015][ T3661] Code: 04 01 48 c7 c7 e0 10 a3 85 e8 84 8d db fe 0f 0b eb 8b e8 cb 47 0a ff c6 05 d9 6e c0 04 01 48 c7 c7 40 11 a3 85 e8 68 8d db fe <0f> 0b e9 6c ff ff ff e8 ac 47 0a ff c6 05 bb 6e c0 04 01 48 c7 c7 [ 131.105281][ T3661] RSP: 0018:ffffc90000d47968 EFLAGS: 00010246 [ 131.111362][ T3661] RAX: fdc08b9e5e1bae00 RBX: 0000000000000003 RCX: ffff8881168f13c0 [ 131.120041][ T3661] RDX: 0000000000000000 RSI: 0000000080000000 RDI: 0000000000000000 [ 131.129609][ T3666] device sit0 entered promiscuous mode [ 131.138141][ T3661] RBP: ffffc90000d47978 R08: ffffffff8157a565 R09: ffffed103ee04e93 [ 131.177630][ T3661] R10: 0000000000000000 R11: dffffc0000000001 R12: 1ffff11025a28aa8 [ 131.186303][ T3661] R13: ffff88812d145540 R14: 0000000000000003 R15: ffff888101bb8181 [ 131.194703][ T3661] FS: 00007fc15e9076c0(0000) GS:ffff8881f7100000(0000) knlGS:0000000000000000 [ 131.203600][ T3661] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 131.211258][ T3661] CR2: 0000000000000000 CR3: 000000011b88c000 CR4: 00000000003506a0 [ 131.219314][ T3661] DR0: 0000000000000000 DR1: 0000000020000300 DR2: 0000000000000000 [ 131.227413][ T3661] DR3: 0000000000000000 DR6: 00000000ffff0ff0 DR7: 0000000000000600 [ 131.241797][ T3661] Call Trace: [ 131.247772][ T3661] [ 131.251315][ T3661] ? show_regs+0x58/0x60 [ 131.270699][ T3661] ? __warn+0x160/0x2f0 [ 131.323884][ T3661] ? refcount_warn_saturate+0x158/0x1a0 [ 131.329295][ T3661] ? report_bug+0x3d9/0x5b0 [ 131.409141][ T3661] ? refcount_warn_saturate+0x158/0x1a0 [ 131.437073][ T3661] ? handle_bug+0x41/0x70 [ 131.441269][ T3661] ? exc_invalid_op+0x1b/0x50 [ 131.480197][ T3661] ? asm_exc_invalid_op+0x1b/0x20 [ 131.496091][ T3661] ? __wake_up_klogd+0xd5/0x110 [ 131.521119][ T3661] ? refcount_warn_saturate+0x158/0x1a0 [ 131.551489][ T3661] ? refcount_warn_saturate+0x158/0x1a0 [ 131.583815][ T3661] vm_area_free_no_check+0x123/0x130 [ 131.612759][ T3661] copy_mm+0xefb/0x13e0 [ 131.635543][ T3661] ? copy_signal+0x610/0x610 [ 131.640015][ T3661] ? __init_rwsem+0xfe/0x1d0 [ 131.689240][ T3661] ? copy_signal+0x4e3/0x610 [ 131.693690][ T3661] copy_process+0x1149/0x3290 [ 131.739194][ T3661] ? __kasan_check_write+0x14/0x20 [ 131.758574][ T3661] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 131.778404][ T3661] ? vfs_write+0x94d/0x1110 [ 131.782827][ T3661] kernel_clone+0x21e/0x9e0 [ 131.787514][ T3661] ? __kasan_check_write+0x14/0x20 [ 131.792541][ T3661] ? create_io_thread+0x1e0/0x1e0 [ 131.803550][ T3661] __x64_sys_clone+0x23f/0x290 [ 131.810555][ T3661] ? __do_sys_vfork+0x130/0x130 [ 131.817882][ T3698] device syzkaller0 entered promiscuous mode [ 131.823819][ T3661] ? debug_smp_processor_id+0x17/0x20 [ 131.839575][ T3661] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 131.845643][ T3661] ? exit_to_user_mode_prepare+0x39/0xa0 [ 131.851199][ T3661] x64_sys_call+0x1b0/0x9a0 [ 131.855627][ T3661] do_syscall_64+0x3b/0xb0 [ 131.859951][ T3661] ? clear_bhb_loop+0x35/0x90 [ 131.866646][ T3661] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 131.872444][ T3661] RIP: 0033:0x7fc160295d29 [ 131.876775][ T3661] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 131.897862][ T3661] RSP: 002b:00007fc15e906fe8 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 131.908292][ T3661] RAX: ffffffffffffffda RBX: 00007fc160485fa0 RCX: 00007fc160295d29 [ 131.918371][ T3661] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 131.926504][ T3661] RBP: 00007fc15e907090 R08: 0000000000000000 R09: 0000000000000000 [ 131.939788][ T3661] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 131.964971][ T3661] R13: 0000000000000000 R14: 00007fc160485fa0 R15: 00007fff9c1b5838 [ 131.972976][ T3661] [ 131.992259][ T3661] ---[ end trace 03437f0c33006f8f ]--- [ 132.353306][ T3733] BUG: unable to handle page fault for address: ffffed1800000003 [ 132.360877][ T3733] #PF: supervisor read access in kernel mode [ 132.366863][ T3733] #PF: error_code(0x0000) - not-present page [ 132.372682][ T3733] PGD 23fff2067 P4D 23fff2067 PUD 0 [ 132.377796][ T3733] Oops: 0000 [#1] PREEMPT SMP KASAN [ 132.382832][ T3733] CPU: 1 PID: 3733 Comm: syz.3.1049 Tainted: G W 5.15.176-syzkaller-00972-g829d9f138569 #0 [ 132.393944][ T3733] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 132.403836][ T3733] RIP: 0010:__rb_insert_augmented+0x91/0x610 [ 132.409653][ T3733] Code: 00 74 08 4c 89 ef e8 6e 5a 2a ff 49 8b 45 00 a8 01 0f 85 60 05 00 00 48 89 5d a0 48 89 45 c0 48 8d 58 08 49 89 de 49 c1 ee 03 <43> 80 3c 26 00 74 08 48 89 df e8 40 5a 2a ff 48 89 d8 48 8b 1b 4c [ 132.429094][ T3733] RSP: 0018:ffffc90000d178f8 EFLAGS: 00010a06 [ 132.434997][ T3733] RAX: ffff88c000000010 RBX: ffff88c000000018 RCX: dffffc0000000000 [ 132.442811][ T3733] RDX: ffffffff81a59460 RSI: ffff8881125af828 RDI: ffff88810d93bd10 [ 132.450701][ T3733] RBP: ffffc90000d17960 R08: dffffc0000000000 R09: ffff88810d93bd18 [ 132.458514][ T3733] R10: 0000000000000000 R11: dffffc0000000001 R12: dffffc0000000000 [ 132.466325][ T3733] R13: ffff888101bb8180 R14: 1ffff11800000003 R15: ffff88810f3e1e38 [ 132.474138][ T3733] FS: 00007fc15e9076c0(0000) GS:ffff8881f7100000(0000) knlGS:0000000000000000 [ 132.482901][ T3733] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 132.489324][ T3733] CR2: ffffed1800000003 CR3: 000000011078f000 CR4: 00000000003506a0 [ 132.497136][ T3733] DR0: 0000000000000000 DR1: 0000000020000300 DR2: 0000000000000000 [ 132.504948][ T3733] DR3: 0000000000000000 DR6: 00000000ffff0ff0 DR7: 0000000000000600 [ 132.512774][ T3733] Call Trace: [ 132.515886][ T3733] [ 132.518664][ T3733] ? __die_body+0x62/0xb0 [ 132.522832][ T3733] ? __die+0x7e/0x90 [ 132.526566][ T3733] ? page_fault_oops+0x7f9/0xa90 [ 132.531333][ T3733] ? kernelmode_fixup_or_oops+0xd0/0xd0 [ 132.536925][ T3733] ? 0xffffffffa0028000 [ 132.540939][ T3733] ? is_prefetch+0x47a/0x6d0 [ 132.545339][ T3733] ? __rb_insert_augmented+0x91/0x610 [ 132.550550][ T3733] ? __rb_insert_augmented+0x91/0x610 [ 132.555759][ T3733] ? fixup_exception+0xbb/0x13c0 [ 132.560527][ T3733] ? kernelmode_fixup_or_oops+0xb9/0xd0 [ 132.565910][ T3733] ? __bad_area_nosemaphore+0xc2/0x480 [ 132.571206][ T3733] ? bad_area_nosemaphore+0x2d/0x40 [ 132.576240][ T3733] ? do_kern_addr_fault+0x69/0x80 [ 132.581098][ T3733] ? exc_page_fault+0x4dd/0x7f0 [ 132.585787][ T3733] ? irqentry_exit+0x30/0x40 [ 132.590208][ T3733] ? sysvec_apic_timer_interrupt+0x64/0xc0 [ 132.595851][ T3733] ? asm_sysvec_apic_timer_interrupt+0x1b/0x20 [ 132.601844][ T3733] ? irqentry_exit+0x30/0x40 [ 132.606266][ T3733] ? asm_exc_page_fault+0x27/0x30 [ 132.611131][ T3733] ? anon_vma_interval_tree_iter_next+0x390/0x390 [ 132.617380][ T3733] ? __rb_insert_augmented+0x91/0x610 [ 132.622585][ T3733] ? anon_vma_interval_tree_iter_next+0x390/0x390 [ 132.628834][ T3733] vma_interval_tree_insert_after+0x2be/0x2d0 [ 132.634736][ T3733] copy_mm+0xba2/0x13e0 [ 132.638728][ T3733] ? asm_sysvec_apic_timer_interrupt+0x1b/0x20 [ 132.644723][ T3733] ? copy_signal+0x610/0x610 [ 132.649143][ T3733] ? __init_rwsem+0xfe/0x1d0 [ 132.653570][ T3733] ? copy_signal+0x4e3/0x610 [ 132.657996][ T3733] copy_process+0x1149/0x3290 [ 132.662514][ T3733] ? timerqueue_add+0x250/0x270 [ 132.667196][ T3733] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 132.672147][ T3733] kernel_clone+0x21e/0x9e0 [ 132.676489][ T3733] ? native_apic_msr_write+0x3a/0x50 [ 132.681605][ T3733] ? create_io_thread+0x1e0/0x1e0 [ 132.686467][ T3733] ? clockevents_program_event+0x22f/0x300 [ 132.692108][ T3733] __x64_sys_clone+0x23f/0x290 [ 132.696707][ T3733] ? __do_sys_vfork+0x130/0x130 [ 132.701396][ T3733] ? __kasan_check_write+0x14/0x20 [ 132.706340][ T3733] ? switch_fpu_return+0x15f/0x2e0 [ 132.711700][ T3733] ? exit_to_user_mode_prepare+0x7e/0xa0 [ 132.717152][ T3733] x64_sys_call+0x1b0/0x9a0 [ 132.721486][ T3733] do_syscall_64+0x3b/0xb0 [ 132.725737][ T3733] ? clear_bhb_loop+0x35/0x90 [ 132.730250][ T3733] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 132.735981][ T3733] RIP: 0033:0x7fc160295d29 [ 132.740239][ T3733] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 132.759675][ T3733] RSP: 002b:00007fc15e906fe8 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 132.767921][ T3733] RAX: ffffffffffffffda RBX: 00007fc160485fa0 RCX: 00007fc160295d29 [ 132.775844][ T3733] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000040200400 [ 132.783648][ T3733] RBP: 00007fc160311b08 R08: 0000000000000000 R09: 0000000000000000 [ 132.791458][ T3733] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000000 [ 132.799272][ T3733] R13: 0000000000000000 R14: 00007fc160485fa0 R15: 00007fff9c1b5838 [ 132.807091][ T3733] [ 132.809947][ T3733] Modules linked in: [ 132.813695][ T3733] CR2: ffffed1800000003 [ 132.817686][ T3733] ---[ end trace 03437f0c33006f90 ]--- [ 132.822967][ T3733] RIP: 0010:__rb_insert_augmented+0x91/0x610 [ 132.828781][ T3733] Code: 00 74 08 4c 89 ef e8 6e 5a 2a ff 49 8b 45 00 a8 01 0f 85 60 05 00 00 48 89 5d a0 48 89 45 c0 48 8d 58 08 49 89 de 49 c1 ee 03 <43> 80 3c 26 00 74 08 48 89 df e8 40 5a 2a ff 48 89 d8 48 8b 1b 4c [ 132.848227][ T3733] RSP: 0018:ffffc90000d178f8 EFLAGS: 00010a06 [ 132.854125][ T3733] RAX: ffff88c000000010 RBX: ffff88c000000018 RCX: dffffc0000000000 [ 132.861936][ T3733] RDX: ffffffff81a59460 RSI: ffff8881125af828 RDI: ffff88810d93bd10 [ 132.869748][ T3733] RBP: ffffc90000d17960 R08: dffffc0000000000 R09: ffff88810d93bd18 [ 132.877557][ T3733] R10: 0000000000000000 R11: dffffc0000000001 R12: dffffc0000000000 [ 132.885371][ T3733] R13: ffff888101bb8180 R14: 1ffff11800000003 R15: ffff88810f3e1e38 [ 132.893181][ T3733] FS: 00007fc15e9076c0(0000) GS:ffff8881f7100000(0000) knlGS:0000000000000000 [ 132.901950][ T3733] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 132.908370][ T3733] CR2: ffffed1800000003 CR3: 000000011078f000 CR4: 00000000003506a0 [ 132.916186][ T3733] DR0: 0000000000000000 DR1: 0000000020000300 DR2: 0000000000000000 [ 132.923996][ T3733] DR3: 0000000000000000 DR6: 00000000ffff0ff0 DR7: 0000000000000600 [ 132.931815][ T3733] Kernel panic - not syncing: Fatal exception [ 132.937971][ T3733] Kernel Offset: disabled [ 132.942107][ T3733] Rebooting in 86400 seconds..