last executing test programs: 9.927295103s ago: executing program 4 (id=7496): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000840)=ANY=[@ANYBLOB="0b00000005000000020000000400000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x11, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r0}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x2}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000140)={{r0}, &(0x7f0000000000), &(0x7f0000000040)}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000500)=@base={0x5, 0x1, 0x8e, 0xe7c9, 0x1, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000040)={r1, 0x0, 0x0}, 0x20) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="160000000000000004000000ff"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000058"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000400ffffffff0018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000070000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000030000009500000000000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="0b00000005000000000400000900000001"], 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f00000004c0)={r3, &(0x7f0000000340), &(0x7f00000005c0)=""/155}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000040)='qdisc_destroy\x00', r4}, 0x10) r5 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETIFF(r5, 0x400454ca, &(0x7f0000000140)={'pim6reg1\x00', 0x1}) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r6, 0x8914, &(0x7f0000000100)={'pim6reg1\x00', @link_local}) close(r5) perf_event_open(&(0x7f0000000000)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0xffffffffffffffff, 0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000005c0)={&(0x7f0000000580)='kmem_cache_free\x00'}, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) close(r7) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$unix(r7, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB="14000000000000000100000001000000", @ANYRES32=r9], 0x18, 0x40081}, 0x0) close(r8) 9.680108167s ago: executing program 4 (id=7502): bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000240)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) gettid() r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x9, 0x4, &(0x7f00000008c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @cgroup_sock, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x70) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000300)=ANY=[@ANYRES32=r0, @ANYRES32=r1, @ANYBLOB="02"], 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0xd, 0x4, &(0x7f0000000100)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0xfffffffe}, [@call={0x85, 0x0, 0x0, 0x8e}]}, &(0x7f00000004c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @sock_ops, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) socketpair(0x2, 0x1, 0x0, &(0x7f0000000200)) 9.606973138s ago: executing program 4 (id=7504): sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18020000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000980)={&(0x7f0000000640)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x7, [@volatile={0xa, 0x0, 0x0, 0x9, 0x3}]}, {0x0, [0x30, 0x2e, 0x5f, 0x0, 0x30]}}, &(0x7f0000000900)=""/102, 0x2b, 0x66, 0x1, 0x1, 0x10000, @value}, 0x28) bpf$ITER_CREATE(0x21, &(0x7f0000000a40), 0x8) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000800)={0xffffffffffffffff, 0x0, 0x0, 0x76, &(0x7f0000000580), &(0x7f00000006c0)=""/118, 0x80000000, 0x0, 0x0, 0xe, &(0x7f0000000740), &(0x7f00000003c0)="08de42d32db8f37ec7e9ebc9cffd", 0x1, 0x0, 0x2}, 0x50) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, &(0x7f0000000600)={'syz_tun\x00', 0xc00}) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000a80)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x2ca, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x48) ioctl$TUNSETLINK(0xffffffffffffffff, 0x400454cd, 0x5) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB='er -rl\x00'/17], 0x11) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000140)={0x9, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="1800000000000000000000000000000061121c00000000009500000700000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0xd, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002200)={0x11, 0x5, &(0x7f0000000680)=ANY=[@ANYBLOB="18020000000000200000000000000000850000009e000000c300000d0000000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) bpf$MAP_CREATE(0x300000000000000, &(0x7f0000000100)=@base={0x18, 0x4, 0x41, 0x0, 0x1, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x4002, 0x5, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x74, @void, @value}, 0x94) bpf$MAP_CREATE(0x0, &(0x7f0000000880)=@base={0xf, 0x4, 0x4, 0x10004, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x5, 0x0, 0x0, @void, @value, @void, @value}, 0x50) (fail_nth: 7) 9.179306535s ago: executing program 4 (id=7508): write$cgroup_int(0xffffffffffffffff, &(0x7f00000002c0)=0x9, 0x12) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000080)) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='memory.swap.current\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfbfffffc, 0x0, @perf_config_ext={0x1}, 0x0, 0x5, 0x0, 0x0, 0x0, 0x10000003}, 0x0, 0xffffffffffffffff, r0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0200000004000000060000000700000000000000", @ANYRES32, @ANYBLOB="ffffffe800000000000000000000e8adb5f6128b", @ANYRES32, @ANYBLOB='\x00'/28], 0x48) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xb, 0x2, 0x0, 0x0, 0x0, 0x0, 0x80000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000240)='ns/user\x00') perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x5, 0x0, 0x1, 0x0, 0x0, 0x6, 0x22a2, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000240), 0x1}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.throttle.io_serviced_recursive\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000001080)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x7602, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xf0, 0x0, 0x0, 0x0, 0x0, 0x100000001, 0xa264, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x3}, 0x2018, 0x3, 0x0, 0x0, 0x0, 0x80, 0xe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x8, 0x6, &(0x7f00000006c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)='GPL\x00', 0x4, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @cgroup_skb, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x70) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x15, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000edff0000000000000000850000000f00000018010000646c012500000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000800000850000000600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="0b00000005000000000400000900000001000000", @ANYRES32, @ANYBLOB="000000007f6349a8d3dadbae137f7f4cf23274dc", @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r1], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000800)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0xffffffffffffff90, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0xe, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000000)='module_request\x00', r2}, 0x10) socketpair(0x0, 0x0, 0x0, &(0x7f0000000140)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000340)={&(0x7f0000000200)='mm_page_alloc\x00'}, 0x10) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000006c0)) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)) r3 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="0200000004000000080000000100000080000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00\b\x00'/28], 0x31) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x1f, 0x18, &(0x7f00000001c0)=ANY=[@ANYBLOB="18000000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000000000018230000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7050000080000a8c5000000a5000000180100002020640500000000000400007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70400000000000085000000a700000095"], &(0x7f0000000600)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x18, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000640)={r4, 0x0, 0x0, 0xfffffffffffffdf3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) 6.013859965s ago: executing program 4 (id=7508): write$cgroup_int(0xffffffffffffffff, &(0x7f00000002c0)=0x9, 0x12) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000080)) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='memory.swap.current\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfbfffffc, 0x0, @perf_config_ext={0x1}, 0x0, 0x5, 0x0, 0x0, 0x0, 0x10000003}, 0x0, 0xffffffffffffffff, r0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0200000004000000060000000700000000000000", @ANYRES32, @ANYBLOB="ffffffe800000000000000000000e8adb5f6128b", @ANYRES32, @ANYBLOB='\x00'/28], 0x48) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xb, 0x2, 0x0, 0x0, 0x0, 0x0, 0x80000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000240)='ns/user\x00') perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x5, 0x0, 0x1, 0x0, 0x0, 0x6, 0x22a2, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000240), 0x1}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.throttle.io_serviced_recursive\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000001080)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x7602, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xf0, 0x0, 0x0, 0x0, 0x0, 0x100000001, 0xa264, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x3}, 0x2018, 0x3, 0x0, 0x0, 0x0, 0x80, 0xe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x8, 0x6, &(0x7f00000006c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)='GPL\x00', 0x4, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @cgroup_skb, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x70) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x15, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000edff0000000000000000850000000f00000018010000646c012500000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000800000850000000600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="0b00000005000000000400000900000001000000", @ANYRES32, @ANYBLOB="000000007f6349a8d3dadbae137f7f4cf23274dc", @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r1], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000800)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0xffffffffffffff90, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0xe, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000000)='module_request\x00', r2}, 0x10) socketpair(0x0, 0x0, 0x0, &(0x7f0000000140)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000340)={&(0x7f0000000200)='mm_page_alloc\x00'}, 0x10) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000006c0)) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)) r3 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="0200000004000000080000000100000080000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00\b\x00'/28], 0x31) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x1f, 0x18, &(0x7f00000001c0)=ANY=[@ANYBLOB="18000000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000000000018230000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7050000080000a8c5000000a5000000180100002020640500000000000400007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70400000000000085000000a700000095"], &(0x7f0000000600)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x18, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000640)={r4, 0x0, 0x0, 0xfffffffffffffdf3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) 5.560873493s ago: executing program 1 (id=7549): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000140)={'pim6reg1\x00', 0x1}) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000002000000b7040000000000008500000043000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000940)={&(0x7f0000000640)='console\x00', r2}, 0x10) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r3, 0x8914, &(0x7f0000000100)={'pim6reg1\x00', @broadcast}) 5.431340554s ago: executing program 1 (id=7550): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000840)=ANY=[@ANYBLOB="0b00000005000000020000000400000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x11, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r0}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x2}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000140)={{r0}, &(0x7f0000000000), &(0x7f0000000040)}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000500)=@base={0x5, 0x1, 0x8e, 0xe7c9, 0x1, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000040)={r1, 0x0, 0x0}, 0x20) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="160000000000000004000000ff"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000058"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000400ffffffff0018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000070000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000030000009500000000000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="0b00000005000000000400000900000001"], 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f00000004c0)={r3, &(0x7f0000000340), &(0x7f00000005c0)=""/155}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB, @ANYRES32=r3], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000040)='qdisc_destroy\x00', r4}, 0x10) r5 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETIFF(r5, 0x400454ca, &(0x7f0000000140)={'pim6reg1\x00', 0x1}) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r6, 0x8914, &(0x7f0000000100)={'pim6reg1\x00', @link_local}) close(r5) perf_event_open(&(0x7f0000000000)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0xffffffffffffffff, 0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000005c0)={&(0x7f0000000580)='kmem_cache_free\x00'}, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) close(r7) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$unix(r7, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB="14000000000000000100000001000000", @ANYRES32=r9], 0x18, 0x40081}, 0x0) close(r8) 5.07900934s ago: executing program 1 (id=7556): bpf$MAP_CREATE(0x0, 0x0, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000002010000850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000000008500000022000000180100002020702500000000002020207b0af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000000008500000007"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000000)='workqueue_queue_work\x00', r0}, 0x10) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000c80)=ANY=[@ANYBLOB="170000000000000004000000ff"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0xff58) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_GET_PROG_INFO(0xa, &(0x7f0000000740)={0xffffffffffffffff, 0x0, 0x0}, 0x10) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000000)='workqueue_queue_work\x00', r2}, 0x10) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000300)={0xffffffffffffffff}) setsockopt$sock_attach_bpf(r3, 0x1, 0x1d, &(0x7f00000001c0), 0x4) 5.020952461s ago: executing program 1 (id=7557): bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x11, 0x13, &(0x7f0000000080)=ANY=[@ANYBLOB="18080000000000000000000000000000851000000600000018020000", @ANYRES32, @ANYBLOB="000000000000000066d0020000000000180000000000000000400000000000009500040000000000360a020000000000180100002020782500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b50a000000000000850000000600000095"], &(0x7f0000000000)='GPL\x00', 0x2, 0xde, &(0x7f0000000340)=""/222, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) 5.019888081s ago: executing program 1 (id=7559): r0 = perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0xcb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7, 0xb0000}, 0x805, 0x0, 0x0, 0x0, 0x8, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={0x0, r1, 0x0, 0x7}, 0x18) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}, 0x0, 0x0, 0x7, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.current\x00', 0x275a, 0x0) write$cgroup_pid(r2, &(0x7f0000000000), 0x2a979d) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) r3 = perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0xc, 0xffffffffffffffff, 0x4) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, r3, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) socketpair(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x89a0, &(0x7f00000000c0)='%d\xf1\xfa\xbc$j\xfef;q1\x95\xf4\xe4\x13\x95k#Jz.F\xce\xfb\x9c\x19\xf3v\x88\x91\xbct\xb0\x1bLq\x15\x00\xad\t\x13\xf5U\x02\xc9d6q\xc3\xa5\xcf\x01t\r%\xad-\x13\xb0 U\xaaC\xc388\x13\xc6H\x0f \x03\x9e\xa98\xa1\xc3\xe9\x06C\xd4\xb5\x18}4\xa9yA8\x1fQ\xdfN\x8e\xd7m\xee\xb8N\x98\xef\xff\xddR\xec~c\xcb\x93\x84\x7f\\x6\xedZ\x82\xa0\x1by\x17\x1a\xc8\x98\x99\x0f') bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={0x0}, 0x18) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000080)='mem\x00\x10\x00\x00\x00\x00\x00\x00I\xa2l') syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000080)) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r5, &(0x7f0000000500)={&(0x7f0000000040)=@hci, 0x80, &(0x7f0000000100)=[{&(0x7f0000000400)=""/248, 0x200105d0}], 0x1}, 0x1f00) sendmsg$tipc(r6, &(0x7f0000000240)={0x0, 0xfffffff5, &(0x7f0000000200)=[{&(0x7f0000000140)="a2", 0xfffffdef}], 0x1}, 0x1000000) socketpair(0x11, 0x3, 0x300, &(0x7f0000000000)={0xffffffffffffffff}) sendmsg$tipc(r7, &(0x7f0000000280)={&(0x7f0000000180)=@nameseq={0x1e, 0x1, 0x2, {0x41, 0x2}}, 0x10, 0x0, 0x0, &(0x7f0000000780)="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", 0xfe, 0x20040080}, 0x40051) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB, @ANYRES32, @ANYBLOB], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) 4.686581966s ago: executing program 2 (id=7561): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000140)={'pim6reg1\x00', 0x1}) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000002000000b704000000000000850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000940)={&(0x7f0000000640)='console\x00', r1}, 0x10) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r2, 0x8914, &(0x7f0000000100)={'pim6reg1\x00', @broadcast}) 1.752413902s ago: executing program 0 (id=7564): sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18020000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000283d0020850000007000"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000980)={&(0x7f0000000640)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x7, [@volatile={0xa, 0x0, 0x0, 0x9, 0x3}]}, {0x0, [0x30, 0x2e, 0x5f, 0x0, 0x30]}}, &(0x7f0000000900)=""/102, 0x2b, 0x66, 0x1, 0x1, 0x10000, @value}, 0x28) r1 = bpf$ITER_CREATE(0x21, &(0x7f0000000a40), 0x8) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f00000009c0)='ns/cgroup\x00') bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000800)={0xffffffffffffffff, 0x0, 0x0, 0x76, &(0x7f0000000580), &(0x7f00000006c0)=""/118, 0x80000000, 0x0, 0x0, 0xe, &(0x7f0000000740), &(0x7f00000003c0)="08de42d32db8f37ec7e9ebc9cffd", 0x1, 0x0, 0x2}, 0x50) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, &(0x7f0000000600)={'syz_tun\x00', 0xc00}) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000a80)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x2ca, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x48) ioctl$TUNSETLINK(0xffffffffffffffff, 0x400454cd, 0x5) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB='er -rl\x00'/17], 0x11) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000140)={0x9, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="1800000000000000000000000000000061121c00000000009500000700000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0xd, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002200)={0x11, 0x5, &(0x7f0000000680)=ANY=[@ANYBLOB="18020000000000200000000000000000850000009e000000c300000d0000000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) r2 = bpf$ITER_CREATE(0xb, &(0x7f0000000100), 0x0) close(r2) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000fc0)={r1, 0xe0, &(0x7f0000000ec0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000740)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x2, 0x2, &(0x7f0000000780)=[0x0, 0x0], &(0x7f00000007c0)=[0x0, 0x0], 0x0, 0x0, &(0x7f0000000a00)=[{}, {}, {}, {}], 0x20, 0x10, &(0x7f0000000e00), &(0x7f0000000e40), 0x8, 0x4c, 0x8, 0x8, &(0x7f0000000e80)}}, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x4, 0x0, 0x0, 0x0, 0x0, 0x100, 0x10020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}, 0x100002, 0x0, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1b, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r6, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c, @void, @value}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18020000000000000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000200)={{r6}, &(0x7f0000000180), &(0x7f00000001c0)=r5}, 0x20) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000001640)={0xe, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x2, 0x0, 0x0, 0x40f00, 0x0, '\x00', r3, @fallback=0x2c, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000040)='mm_page_alloc\x00', r7}, 0x10) sendmsg$inet(r4, &(0x7f0000000500)={0x0, 0x0, &(0x7f0000001740)=[{&(0x7f0000000280)='>', 0x33fe0}], 0x1, 0x0, 0x3e80}, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000001280)={r1, 0x20, &(0x7f0000001240)={&(0x7f0000001080)=""/171, 0xab, 0x0, &(0x7f0000001140)=""/249, 0xf9}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000001300)={0x2, 0x23, &(0x7f0000001500)=ANY=[@ANYBLOB="1800000009000000000000000104000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b702000043eaa1cc92460752a78e14000000b7030000000000008500000083000000f9ff9400000000f2ffff2a3ac3ec29ca0000181100003d589b8cfc2633", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000090000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000001000000850000008200000018010000696c6c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000800000085000000060000006b618000080000008520000004000000bf91000000000000b7020000000000008500000085000000b7000000000000009500000000000000"], &(0x7f0000000300)='syzkaller\x00', 0x5, 0x39, &(0x7f0000000380)=""/57, 0x41000, 0x30, '\x00', r3, @fallback=0x2e, r1, 0x8, &(0x7f0000001000)={0x2, 0x5}, 0x8, 0x10, &(0x7f0000001040)={0x5, 0xe, 0x7, 0x80}, 0x10, r8, r0, 0x0, 0x0, &(0x7f00000012c0), 0x10, 0x5, @void, @value}, 0x94) bpf$MAP_CREATE(0x300000000000000, &(0x7f0000000100)=ANY=[@ANYBLOB="1800000004000000410000000000000001000000", @ANYRES32=0x1, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="0240000005000000000000003d2503a6663368c65200000000000000"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x74, @void, @value}, 0x94) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000002c0)={&(0x7f00000013c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)=""/13, 0x12c, 0xd, 0x0, 0x9, 0x0, @void, @value}, 0x28) 1.740236952s ago: executing program 3 (id=7565): openat$ppp(0xffffffffffffff9c, 0x0, 0x80002, 0x0) (async) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000005c0)=@base={0x19, 0x4, 0x8, 0xb, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x11, 0x14, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000000000000000000000000001801000020646c2100000000002020007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_BIND_MAP(0xa, &(0x7f00000004c0)={r1}, 0xc) (async, rerun: 32) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) (async, rerun: 32) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) (async) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) (async) r3 = bpf$PROG_LOAD_XDP(0x5, &(0x7f00000001c0)={0xa, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="1800e000000000000000000000000000000080"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0xf, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x4030582a, &(0x7f0000000040)) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) (async) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) write$cgroup_pid(r5, &(0x7f0000000980), 0x20000992) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={0x0}, 0x18) (async, rerun: 64) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) (rerun: 64) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0600000004000000ff0f000007"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r6, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b70400000000000085000000c300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) (async) syz_clone(0x40b04000, 0x0, 0x0, 0x0, 0x0, 0x0) r7 = bpf$MAP_CREATE(0x1900000000000000, &(0x7f0000000040)=ANY=[@ANYBLOB="1b0000000000001e000001000000000000000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) (async, rerun: 64) bpf$PROG_LOAD(0x5, 0x0, 0x0) (async, rerun: 64) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r8}, 0x10) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000180), 0x40010) (async) r9 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="06000000040000000300000005"], 0x48) (async) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000840)={0xffffffffffffffff, 0xe0, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, &(0x7f0000000080)=[0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x6, 0x1, &(0x7f00000006c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000700)=[0x0], 0x0, 0x48, &(0x7f0000000740)=[{}, {}, {}], 0x18, 0x10, &(0x7f0000000780), &(0x7f00000007c0), 0x8, 0xb4, 0x8, 0x8, &(0x7f0000000800)}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000001180)={0x11, 0xc, &(0x7f0000000640)=ANY=[@ANYRES32=r7, @ANYRES16=r9, @ANYRESDEC=r9], 0x0, 0x0, 0x0, 0x0, 0x0, 0x29, '\x00', 0x0, @fallback=0x37, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000b80)={{r2, 0xffffffffffffffff}, &(0x7f0000000b00), &(0x7f0000000b40)=r3}, 0x20) (async) r12 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x6, 0x4, 0xfff, 0x7, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r12], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000c00)={0x14, 0xb, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x8, 0x3, 0x0, 0x5}, @printk={@llx, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x3}}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x4}], &(0x7f0000000000)='GPL\x00', 0x1, 0x30, &(0x7f0000000400)=""/48, 0x40f00, 0x10, '\x00', 0x0, @lirc_mode2=0x10, 0xffffffffffffffff, 0x8, &(0x7f0000000900)={0xa, 0x5}, 0x8, 0x10, &(0x7f0000000940)={0x1, 0x7, 0x2, 0x645}, 0x10, r10, 0xffffffffffffffff, 0x0, &(0x7f0000000bc0)=[r11, r0, r5, r12], 0x0, 0x10, 0x400, @void, @value}, 0x94) 1.709266303s ago: executing program 2 (id=7566): bpf$MAP_CREATE(0x0, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0xfffffffe, 0x2, 0x0, 0x101}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001180)={0x3, 0xc, &(0x7f0000000140)=ANY=[@ANYBLOB], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x11, 0x13, &(0x7f0000000080)=ANY=[@ANYBLOB="18080000000000000000000000000000851000000600000018020000", @ANYRES32, @ANYBLOB="00000000000000006600020000000000180003000000000000000000000000009500040000000000360a020000000000180100002020782500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b50a00000000000085000000060000009500000000000000"], &(0x7f0000000000)='GPL\x00', 0x2, 0xff5c, &(0x7f0000000340)=""/222, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x78) r1 = perf_event_open(&(0x7f0000000380)={0x2, 0x80, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000000400000095"], &(0x7f0000001080)='syzkaller\x00', 0xfffffffe, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x4, 0x0, 0x0, 0x0, 0x0, 0x200, 0x2020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x3}, 0x12000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0xffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f0000000540)='(pu&00\t||') bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x4, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="180200"], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x6000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000040)='tasks\x00', 0x2, 0x0) write$cgroup_pid(r2, &(0x7f0000000400), 0x12) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000003000), 0x201, 0x0) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) 1.661310654s ago: executing program 3 (id=7567): r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000140)={0x1e, 0x4, &(0x7f00000004c0)=ANY=[@ANYBLOB="4e08010000000000000000000000000071123e000000080095000000000000003b8ca1625335c9e2bbed32eb8516be036bb6860c8b0ad15e8d9f7dfc6b4064a933e759faf06a8a7df6838ee35823e6c6b559f3264987815fd53943f974629253cc7cfc30f8bf15f1d77eeaf3978078"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="8fedcb7907001175f37538e486dd6307ce22667f2f00db5b68"], 0xfdef) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x11, 0xa, 0x300, &(0x7f0000000000)) perf_event_open(&(0x7f0000000380)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8, 0xc8, 0xffffffff, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x1210000000}, 0x0, 0x4, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={0xffffffffffffffff, 0x18000000000002a0, 0x12, 0x0, &(0x7f0000000000)="b9ff03076044238c9e9e15f088a84cb688a8", 0x0, 0x0, 0x60000000, 0x0, 0xfffffe99, 0x0, 0x0}, 0x50) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r2) recvmsg$unix(r1, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) ioctl$TUNATTACHFILTER(0xffffffffffffffff, 0x401054d5, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x0, 0xf}, {0x0, 0x0, 0x0, 0x81}]}) write$cgroup_subtree(r3, &(0x7f0000000000)=ANY=[], 0xfdef) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000740)={r0, 0x0, 0x0, 0x0, &(0x7f00000003c0), 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f0000000340)={'dvmrp1\x00', 0x7101}) ioctl$TUNSETLINK(r4, 0x400454cd, 0x325) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x9, 0xffff}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x6, 0xc, &(0x7f00000008c0)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @xdp, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) perf_event_open(0x0, 0x0, 0x3, 0xffffffffffffffff, 0x0) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000380)=ANY=[@ANYBLOB="1801000000000000000000000000000085000000050000001801000020646c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008008000b703000000009c8c850000006d00000095"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r5}, 0x10) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x6, 0x4, 0x8, 0x8, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0xc, 0xc, &(0x7f0000000880)=ANY=[@ANYBLOB="1800000000000000000000000000000018150000", @ANYRES32=r6, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001400000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0xa, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r7, 0x0, 0xe, 0x0, &(0x7f0000000100)="e0857f9f582f0300000000000000", 0x0, 0xdb3a, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r8, 0x8931, &(0x7f00000000c0)={'syz_tun\x00', @random='\x00\x00\x00 \x00'}) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000260018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000800007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x83c1f44c14adf90f, 0x14, '\x00', 0x0, @fallback=0x13, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x64, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d0000001801000020696c2500000000002020097b1af8ff00000000bfa100000000000007010000b8ffffffb702000000000000b7030000000000008500000070"], 0x0, 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000, @void, @value}, 0x94) 1.633829494s ago: executing program 1 (id=7568): r0 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x11, 0xf, &(0x7f0000000340)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7020000140000e5b7030000000000008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000000000008500000084000000b70000000000000095"], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x1, 0x1, 0x8000, &(0x7f0000000000)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x8, 0x6, &(0x7f00000006c0)=ANY=[], &(0x7f0000000080)='GPL\x00', 0x4, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @cgroup_skb, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) socketpair(0x20, 0x1, 0x0, &(0x7f0000000280)) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41000, 0x10, '\x00', 0x0, @fallback=0xb, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8, 0x775}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18020000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb703000008000000b703000000000020850000007300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x11, 0xb, &(0x7f0000000180)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r1}, 0x10) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000480)=ANY=[@ANYBLOB="1801000021000000000000003b810000850000006d000000850000005000000095"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000080)='mm_page_free_batched\x00', r2}, 0x10) syz_clone(0x630c1100, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x0, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="18010000000000000000000000000000850000006d00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x4, &(0x7f0000000400)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x69, 0x10, 0x83}, [@ldst={0x4}]}, &(0x7f0000000080)='GPL\x00', 0x2, 0x3f7, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x48) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f00000002c0)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) r4 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000e00)={&(0x7f0000000980)='sys_exit\x00', r3}, 0x10) r5 = bpf$ITER_CREATE(0xb, &(0x7f0000000100)={r4}, 0x8) write$cgroup_int(r5, &(0x7f00000001c0)=0x60ff20038000, 0xfffffdef) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="1b000000000000"], 0x48) r6 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f00000006c0)='sched_switch\x00', r6}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000600)=ANY=[@ANYBLOB="0a000000070000000300000001"], 0x50) 1.484983137s ago: executing program 0 (id=7569): bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[], 0x48) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB, @ANYBLOB], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1a, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r0 = perf_event_open(&(0x7f00000002c0)={0x2, 0x80, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="160000000000000004000000ff00000000000000", @ANYRES32=0x1, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="00000000000000950400000000000000000019b9833ad695dc3c7018"], 0x50) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x42, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r2}, 0x10) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, &(0x7f0000001b80)=ANY=[]) bpf$PROG_LOAD(0x5, 0x0, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0xa, 0x1, 0xff, 0x7, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x1, 0x6, 0x7fe2, 0x1, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r4}, {}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback=0xc, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000080)='contention_end\x00', r5}, 0x10) perf_event_open(&(0x7f0000000100)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0, 0x8}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20}, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000780)={0x0, 0x0, 0x0, &(0x7f0000000840), 0x75, r3}, 0x38) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000080)={r3, &(0x7f0000000340), 0x0}, 0x20) bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[], 0x48) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, 0x0, &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) gettid() perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x9, 0x8}, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x1, 0xe, &(0x7f0000001880)=ANY=[@ANYBLOB="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"], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0xfffffffffffffd00, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x48) 1.400804098s ago: executing program 2 (id=7570): bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x11, 0x13, &(0x7f0000000080)=ANY=[@ANYBLOB="18080000000000000000000000000000851000000600000018020000", @ANYRES32, @ANYBLOB="000000000000000066d0020000000000180000004000000000000000000000009500040000000000360a020000000000180100002020782500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b50a000000000000850000000600000095"], &(0x7f0000000000)='GPL\x00', 0x2, 0xde, &(0x7f0000000340)=""/222, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) 1.394867858s ago: executing program 2 (id=7571): bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000100)={{0x1, 0xffffffffffffffff}, &(0x7f0000000040), &(0x7f00000000c0)}, 0x20) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000500)=ANY=[@ANYBLOB="1800000000000000000000000000000018010000786c6c2500000000002020207b1af8ff00000000bfa100000000400007010000f8ffffffb702000008000000b703000000000000850000002d00000095"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r1}, 0x10) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000080)={{r0}, 0x0, &(0x7f00000002c0)=r1}, 0x20) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x3, &(0x7f0000000180)=ANY=[@ANYBLOB="18000046000000000000000000002b8d0012cb171210de987be5674fea8700009500000000000000"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000280)={&(0x7f00000009c0)='kfree\x00', r3}, 0x10) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'ip6_vti0\x00', 0x200}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0xb2, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x20, 0x0, 0xfffffffe}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x89f1, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x89f2, &(0x7f0000000080)) bpf$MAP_CREATE(0x0, &(0x7f0000000840)=@base={0xa, 0x101, 0x7fff, 0xcc, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x4, 0x0, 0x0, @void, @value, @void, @value}, 0x50) 670.373629ms ago: executing program 2 (id=7572): bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000040)=ANY=[@ANYBLOB="9feb01001800000000000000380000003800000004000000000000000000000200000000010000000000000e0300000000000000020000000e0000040221000002000000000000110300000000000000002e5f"], 0x0, 0x54, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x20) 627.81539ms ago: executing program 3 (id=7573): openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x200000000000009b, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000070000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000a5df850000002d00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1a, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8914, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r0}, 0x10) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4040, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="0200000004000000080000000100000080000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="00f9ffffff00000000"], 0x48) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000480)={r1}, 0x4) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) syz_open_procfs$namespace(0x0, 0xfffffffffffffffe) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000240)=ANY=[@ANYBLOB="180000000008002b000000000000000018040000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000002000000b704000000000000850000004300000095"], 0x0, 0x0, 0x11, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000240)=ANY=[], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f00000003c0)='sched_switch\x00', r2}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='ext4_ext_remove_space_done\x00'}, 0x10) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000500)={&(0x7f0000000040)=ANY=[], 0x0, 0x26, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x28) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000340)={r3, 0x58, &(0x7f0000003fc0)}, 0xe) socketpair(0x1d, 0x2, 0x2, &(0x7f0000000000)={0x0, 0x0}) bpf$MAP_CREATE(0x0, 0x0, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000003c0)={0x3, 0x3, &(0x7f0000000480)=ANY=[@ANYBLOB], &(0x7f0000000500)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sched_cls, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) 535.546552ms ago: executing program 2 (id=7574): r0 = perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0xcb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7, 0xb0000}, 0x805, 0x0, 0x0, 0x0, 0x8, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={0x0, r1, 0x0, 0x7}, 0x18) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}, 0x0, 0x0, 0x7, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.current\x00', 0x275a, 0x0) write$cgroup_pid(r2, &(0x7f0000000000), 0x2a979d) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) r3 = perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0xc, 0xffffffffffffffff, 0x4) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, r3, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) socketpair(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x89a0, &(0x7f00000000c0)='%d\xf1\xfa\xbc$j\xfef;q1\x95\xf4\xe4\x13\x95k#Jz.F\xce\xfb\x9c\x19\xf3v\x88\x91\xbct\xb0\x1bLq\x15\x00\xad\t\x13\xf5U\x02\xc9d6q\xc3\xa5\xcf\x01t\r%\xad-\x13\xb0 U\xaaC\xc388\x13\xc6H\x0f \x03\x9e\xa98\xa1\xc3\xe9\x06C\xd4\xb5\x18}4\xa9yA8\x1fQ\xdfN\x8e\xd7m\xee\xb8N\x98\xef\xff\xddR\xec~c\xcb\x93\x84\x7f\\x6\xedZ\x82\xa0\x1by\x17\x1a\xc8\x98\x99\x0f') bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={0x0}, 0x18) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000080)='mem\x00\x10\x00\x00\x00\x00\x00\x00I\xa2l') syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000080)) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r5, &(0x7f0000000500)={&(0x7f0000000040)=@hci, 0x80, &(0x7f0000000100)=[{&(0x7f0000000400)=""/248, 0x200105d0}], 0x1}, 0x1f00) sendmsg$tipc(r6, &(0x7f0000000240)={0x0, 0xfffffff5, &(0x7f0000000200)=[{&(0x7f0000000140)="a2", 0xfffffdef}], 0x1}, 0x1000000) socketpair(0x11, 0x3, 0x300, &(0x7f0000000000)={0xffffffffffffffff}) sendmsg$tipc(r7, &(0x7f0000000280)={&(0x7f0000000180)=@nameseq={0x1e, 0x1, 0x2, {0x41, 0x2}}, 0x10, 0x0, 0x0, &(0x7f0000000780)="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", 0xfe, 0x20040080}, 0x40051) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB, @ANYRES32, @ANYBLOB], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) 534.995642ms ago: executing program 3 (id=7575): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="170000000000000004000000ff"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) (async) r1 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000000c0)={0x1b, 0x0, 0x0, 0x4, 0x0, r0, 0x100, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x4, 0x1, 0x0, @void, @value, @void, @value}, 0x50) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000380)={0x1b, 0x0, 0x0, 0x3, 0x0, r1, 0x1, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x1, 0x3, 0x0, @void, @value, @void, @value}, 0x50) (async) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000080)={{r0}, 0x0, &(0x7f00000002c0)}, 0x20) (async) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000300)='sys_enter\x00', r2}, 0x10) (async) unlink(&(0x7f0000000000)='./cgroup\x00') 534.557162ms ago: executing program 0 (id=7576): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000140)={'pim6reg1\x00', 0x1}) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000002000000b704000000000000850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000940)={&(0x7f0000000640)='console\x00', r1}, 0x10) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r2, 0x8914, &(0x7f0000000100)={'pim6reg1\x00', @broadcast}) 485.154992ms ago: executing program 3 (id=7577): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000e000018110000", @ANYRES16=0x0, @ANYBLOB="0000000000000000b708000000ffffff7b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) (async, rerun: 32) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000580)=ANY=[@ANYBLOB="1b00000000000000000000000080000000000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="0000000000000000ffffffffffff0000000000000004000094dd173be5cd8e95e096a74c7bc16825ecd6d9aff948b5db198f7c39d25dae33b7e4237213038e118c6e5233916deba70e1ad2331841aac52036576c95d9eec9e36e40e96be72f20477313fd0ddb47b96038034022b291bc2e13a370246e8050eb74d2c4cbd41bb663caa08dad91201a9674b7800bc7fe6c95bdffc2295dadf9369b48e3a00d41279be4614171c31a69"], 0x48) (rerun: 32) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000020000088500000082"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) (async) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000001b40)='sched_switch\x00', r1}, 0x10) mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000000080)='syz0\x00', 0x1ff) (async) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x3f) bpf$MAP_CREATE(0x0, 0x0, 0x48) (async) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) (async) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) (async) r3 = openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) (async, rerun: 32) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000", @ANYRES32], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) (async, rerun: 32) socketpair(0x0, 0x0, 0x0, 0x0) (async) bpf$PROG_LOAD(0x5, 0x0, 0x0) (async) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x10020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000001c0), 0x4}, 0xd000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) (async) r4 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000040)={0x1f, 0x2, &(0x7f0000001c40)=ANY=[@ANYBLOB="85000000a800000095"], &(0x7f00000000c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x13, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000500)={r4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x48) (async) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0200000004000000020000000c00000000140000", @ANYRES32, @ANYBLOB="000000000000000000587cf6e66007366a5c2ee0", @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/21], 0x48) (async) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffff9b, 0x8}, 0x4000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000380)=ANY=[@ANYBLOB="0c000000040000000400000009"], 0x48) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000900)={0x0, 0x0, &(0x7f00000024c0), &(0x7f0000001280), 0xffffffff, r5}, 0x38) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f00000003c0)='sys_enter\x00', r2}, 0x18) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000004c0)) (async, rerun: 64) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0100000804000000ff0f", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/27], 0x48) (async, rerun: 64) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000000680)=ANY=[@ANYBLOB="0400000004000000040000000500010000000000", @ANYRES32, @ANYBLOB="000000000000000000000500000000000000000000000e5c3c27bd0a394cd0f63d0bcce34b9937d793438ed6303004abd6a75d1183355414d7b8c098b853393b1eae86e832e6bf436fcaab85c9fcd523d6cfad2a090d04d526a53ddb65822377bbe9929ae5c42f6bf1566c81b5c07d044fbf9e3208366f86a09935f31955654d321a53c1e362072ae31ab8d4167ffbda226e8f455407dcf92cdc6925861af807f7ca8b07e4207db220ae72b736aaf7172c82", @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) (async, rerun: 64) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async, rerun: 64) r7 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f0000000000)=ANY=[@ANYRES8=r3], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x1ff, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r7}, 0x10) close(r6) 406.773964ms ago: executing program 3 (id=7578): openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x10001, 0x4}, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) ioctl$TUNSETFILTEREBPF(r0, 0x800454e1, &(0x7f0000000200)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r2, &(0x7f0000001780)={0x0, 0x0, 0x0}, 0x0) recvmsg$unix(r1, &(0x7f0000001b40)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) setsockopt$sock_attach_bpf(r2, 0x1, 0x49, &(0x7f0000000040)=r3, 0x4) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) syz_clone(0x42164000, 0x0, 0x0, 0x0, 0x0, 0x0) r4 = bpf$PROG_LOAD(0x5, 0x0, 0x0) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="180100001c0000000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f00000000c0)='sys_enter\x00', r5}, 0x10) gettid() bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f00000005c0)='sched_switch\x00', r4}, 0x10) r6 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000280)=@bpf_lsm={0x6, 0x3, &(0x7f00000003c0)=ANY=[@ANYBLOB="18000000003f000000000000000000f195"], &(0x7f0000000140)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'gre0\x00'}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r7, 0x89f0, &(0x7f0000000080)) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x0, 0x5, &(0x7f0000000000)=ANY=[@ANYRESOCT=0x0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f3, &(0x7f0000000080)) r8 = bpf$ITER_CREATE(0xb, &(0x7f00000004c0)={r6}, 0x8) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x30, 0x30, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x1, 0x80000001, [{0x0, 0x3}]}, @ptr, @restrict={0x0, 0x0, 0x0, 0x9, 0x1}]}}, 0x0, 0x4a, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x28) openat$tun(0xffffffffffffff9c, &(0x7f0000000180), 0x40c003, 0x0) close(r8) bpf$BPF_PROG_TEST_RUN(0x1c, &(0x7f0000000240)={r6, 0x8, 0x25, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) bpf$BPF_LINK_UPDATE(0x1d, &(0x7f00000005c0)={r8, r6, 0x4, r6}, 0x10) gettid() 314.698835ms ago: executing program 0 (id=7579): ioctl$TUNSETTXFILTER(0xffffffffffffffff, 0x400454d1, &(0x7f00000005c0)={0x0, 0x8, [@empty, @remote, @broadcast, @dev={'\xaa\xaa\xaa\xaa\xaa', 0x29}, @broadcast, @broadcast, @local, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}]}) sendmsg$inet(0xffffffffffffffff, 0x0, 0xc0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYRESHEX=0x0], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffe13, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000980)={&(0x7f0000000640)=ANY=[@ANYBLOB="9feb010018000000000000000c0000000c000000070000000a00000000000009030000000035a85f003000"], &(0x7f0000000900)=""/102, 0x2b, 0x66, 0x1, 0x1, 0x10000, @value}, 0x28) r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000a40), 0x8) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x5181, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f00000009c0)='ns/cgroup\x00') bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000800)={0xffffffffffffffff, 0x0, 0x0, 0x76, &(0x7f0000000580), &(0x7f00000006c0)=""/118, 0x80000000, 0x0, 0x0, 0xe, &(0x7f0000000740), &(0x7f00000003c0)="08de42d32db8f37ec7e9ebc9cffd", 0x1, 0x0, 0x2}, 0x50) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, &(0x7f0000000600)={'syz_tun\x00', 0xc00}) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000a80)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x2ca, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x48) ioctl$TUNSETLINK(0xffffffffffffffff, 0x400454cd, 0x5) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8924, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000cc0)=ANY=[@ANYBLOB="1000000004000000080000000000000000000000a21bb37add203f38d54a7b27715f2a67fda3432a3a73a7e4c7a4837eb2c5b24d9bee0b2ab88412e56bd9ef9cf0f16d1a9f3698fc090124e5a3734371192c6103e9e89d46766144e018c3d4a224f8be00504ab81eeb451c6950a51c758cd70db9ae2de8a84bc2c7fafaa21cd1f50662f29426edcbbc025f1a8774565bb87afbdb415b713dd5c0d25742235876f13f31320fe02001fc9b8955464bfab1fc1fb0776332533a23ccecce7409fc89786b3e115564a31de2928629029eb19624bca90ea679e6b6fd4d94e28e", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="0000000000000000ffffffff00"/28], 0x50) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0xf8, 0x0, 0x0, 0x0, 0x200, 0x922, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0xfffffffffffffffe}, 0x9604, 0x4, 0x0, 0x0, 0x502, 0x11}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz1\x00', 0x1ff) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000300)='cgroup.freeze\x00', 0x275a, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r1, 0x4008240b, &(0x7f0000000040)={0x4, 0x80, 0x8, 0x7, 0x5f, 0x5, 0x0, 0x4, 0x4a401, 0xd, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0xcf, 0x1, @perf_bp={&(0x7f00000001c0)}, 0x1, 0xfffffffffffffffc, 0xd7, 0x0, 0x6, 0xffff, 0xfffb, 0x0, 0x2, 0x0, 0x2}) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8924, &(0x7f00000002c0)={'veth1_to_hsr\x00', @multicast}) bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="0e00000004000000040000000b40000000000000", @ANYBLOB="1efc1e3d866db586c575f879c294da06e72d13092b19873684a345dc4bef229a66ec2c7b775a1ec7e6ddccc4a709bb3a8750d7f6c3f86368d9c6eefebabe2837f82324ff048f2fae1adb5a994edf93977f7e94407c0f399e546dc90194f0499acc65d04f79fd310850da9d6a893b47ea2cb8d03877fc5e3590d3e94e0c533e1d1e8afb7ee32400cea2659d4e2e30e62be7cc8c1ff3f379941839a5", @ANYBLOB='\x00'/20, @ANYRES16=r0, @ANYRES32, @ANYBLOB="000000000000d900000000009799e8009b74d33fcb4c15b374c7cc"], 0x50) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={0xffffffffffffffff, 0x18000000000002a0, 0x0, 0x0, &(0x7f0000000100), 0x0, 0x24, 0x60000000, 0x0, 0x0, 0x0, 0x0}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000400)={0x6, 0x0, 0x0, 0x0, 0x0, 0x8e, &(0x7f0000000200)=""/142, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'ip6gre0\x00', 0x400}) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x89f1, &(0x7f00000004c0)) 283.770695ms ago: executing program 0 (id=7580): r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f00000006c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x304, 0x10, &(0x7f0000000000), 0xfffffea2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x48) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xa, 0x7, 0xfff, 0x7, 0x0, 0xffffffffffffffff, 0xffffffff, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000001c0)={r2, 0x58, &(0x7f0000000280)}, 0x10) (async) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000001c0)={r2, 0x58, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000001"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', r3, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000001"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', r3, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r4 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000002c0)={&(0x7f00000000c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x88, 0x88, 0x8, [@var={0x5, 0x0, 0x0, 0xe, 0x1}, @enum64={0x10, 0x9, 0x0, 0x13, 0x0, 0x7, [{0x4, 0x4, 0x2}, {0x9, 0xeae, 0x4f6d99a9}, {0x7, 0x0, 0x2}, {0xf, 0x5, 0x3}, {0xf, 0x1239, 0x1}, {0xd, 0xbb, 0xd}, {0xe, 0x3, 0x7}, {0x5, 0xffff, 0x3ff}, {0x10, 0x12000, 0x6}]}]}, {0x0, [0x61, 0x2e, 0x30, 0x5f, 0x30, 0x0]}}, &(0x7f0000000180)=""/100, 0xa8, 0x64, 0x1, 0x86, 0x10000, @value}, 0x28) r5 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000480)={&(0x7f0000000300)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0xa, [@float={0x5, 0x0, 0x0, 0x10, 0x8}]}, {0x0, [0x2e, 0x2e, 0x0, 0x61, 0x30, 0x30, 0x30, 0x2e]}}, &(0x7f0000000400)=""/87, 0x2e, 0x57, 0x1, 0x8, 0x0, @void, @value}, 0x28) bpf$MAP_CREATE(0x0, &(0x7f0000000380)=@base={0x1d, 0x80000000, 0x9, 0x2, 0x8814, r1, 0x5, '\x00', r3, r4, 0x3, 0x0, 0x2, 0x0, @value=r5, @void, @void, @value}, 0x50) (async) bpf$MAP_CREATE(0x0, &(0x7f0000000380)=@base={0x1d, 0x80000000, 0x9, 0x2, 0x8814, r1, 0x5, '\x00', r3, r4, 0x3, 0x0, 0x2, 0x0, @value=r5, @void, @void, @value}, 0x50) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000640)={r0, 0x0, 0xe, 0x0, &(0x7f0000000040)="63eced8e46dc3f0adf33c9f7b986", 0x0, 0xcfac, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x48) 99.040208ms ago: executing program 0 (id=7581): bpf$MAP_CREATE(0x0, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0xfffffffe, 0x2, 0x0, 0x101}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001180)={0x3, 0xc, &(0x7f0000000140)=ANY=[@ANYBLOB], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x11, 0x13, &(0x7f0000000080)=ANY=[@ANYBLOB="18080000000000000000000000000000851000000600000018020000", @ANYRES32, @ANYBLOB="00000000000000006600020000000000188004000000000000000000000000009500040000000000360a020000000000180100002020782500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b50a00000000000085000000060000009500000000000000"], &(0x7f0000000000)='GPL\x00', 0x2, 0xff5c, &(0x7f0000000340)=""/222, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x78) r1 = perf_event_open(&(0x7f0000000380)={0x2, 0x80, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000000400000095"], &(0x7f0000001080)='syzkaller\x00', 0xfffffffe, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x4, 0x0, 0x0, 0x0, 0x0, 0x200, 0x2020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x3}, 0x12000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0xffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f0000000540)='(pu&00\t||') bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x4, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="180200"], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x6000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000040)='tasks\x00', 0x2, 0x0) write$cgroup_pid(r2, &(0x7f0000000400), 0x12) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000003000), 0x201, 0x0) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) 0s ago: executing program 4 (id=7508): write$cgroup_int(0xffffffffffffffff, &(0x7f00000002c0)=0x9, 0x12) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000080)) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='memory.swap.current\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfbfffffc, 0x0, @perf_config_ext={0x1}, 0x0, 0x5, 0x0, 0x0, 0x0, 0x10000003}, 0x0, 0xffffffffffffffff, r0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0200000004000000060000000700000000000000", @ANYRES32, @ANYBLOB="ffffffe800000000000000000000e8adb5f6128b", @ANYRES32, @ANYBLOB='\x00'/28], 0x48) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xb, 0x2, 0x0, 0x0, 0x0, 0x0, 0x80000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000240)='ns/user\x00') perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x5, 0x0, 0x1, 0x0, 0x0, 0x6, 0x22a2, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000240), 0x1}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.throttle.io_serviced_recursive\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000001080)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x7602, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xf0, 0x0, 0x0, 0x0, 0x0, 0x100000001, 0xa264, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x3}, 0x2018, 0x3, 0x0, 0x0, 0x0, 0x80, 0xe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x8, 0x6, &(0x7f00000006c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)='GPL\x00', 0x4, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @cgroup_skb, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x70) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x15, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000edff0000000000000000850000000f00000018010000646c012500000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000800000850000000600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="0b00000005000000000400000900000001000000", @ANYRES32, @ANYBLOB="000000007f6349a8d3dadbae137f7f4cf23274dc", @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r1], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000800)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0xffffffffffffff90, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0xe, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000000)='module_request\x00', r2}, 0x10) socketpair(0x0, 0x0, 0x0, &(0x7f0000000140)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000340)={&(0x7f0000000200)='mm_page_alloc\x00'}, 0x10) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000006c0)) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)) r3 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="0200000004000000080000000100000080000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00\b\x00'/28], 0x31) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x1f, 0x18, &(0x7f00000001c0)=ANY=[@ANYBLOB="18000000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000000000018230000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7050000080000a8c5000000a5000000180100002020640500000000000400007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70400000000000085000000a700000095"], &(0x7f0000000600)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x18, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000640)={r4, 0x0, 0x0, 0xfffffffffffffdf3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) kernel console output (not intermixed with test programs): alloc_file_pseudo+0x259/0x2f0 [ 596.214302][T16312] ? alloc_empty_file_noaccount+0x80/0x80 [ 596.219858][T16312] ? _raw_spin_lock_bh+0xa4/0x1b0 [ 596.224716][T16312] anon_inode_getfile+0xa7/0x180 [ 596.229490][T16312] bpf_link_prime+0xed/0x250 [ 596.233920][T16312] bpf_tracing_prog_attach+0x7c6/0xff0 [ 596.239209][T16312] ? putname+0xfa/0x150 [ 596.243206][T16312] ? bpf_raw_tp_link_attach+0x6b0/0x6b0 [ 596.248587][T16312] ? _kstrtol+0x150/0x150 [ 596.252752][T16312] ? memcpy+0x56/0x70 [ 596.256573][T16312] ? avc_has_perm_noaudit+0x2dd/0x430 [ 596.261782][T16312] bpf_raw_tp_link_attach+0x428/0x6b0 [ 596.266987][T16312] ? bpf_insn_prepare_dump+0x950/0x950 [ 596.272291][T16312] ? __kasan_check_write+0x14/0x20 [ 596.277225][T16312] ? fput+0x15b/0x1b0 [ 596.281046][T16312] bpf_raw_tracepoint_open+0x22d/0x4a0 [ 596.286339][T16312] ? bpf_obj_get_info_by_fd+0x3e60/0x3e60 [ 596.291897][T16312] ? selinux_bpf+0xd2/0x100 [ 596.296236][T16312] ? security_bpf+0x82/0xb0 [ 596.300574][T16312] __sys_bpf+0x4f5/0x7f0 [ 596.304652][T16312] ? bpf_link_show_fdinfo+0x300/0x300 [ 596.309865][T16312] ? __ia32_sys_read+0x90/0x90 [ 596.314465][T16312] ? debug_smp_processor_id+0x17/0x20 [ 596.319670][T16312] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 596.325572][T16312] __x64_sys_bpf+0x7c/0x90 [ 596.329827][T16312] x64_sys_call+0x87f/0x9a0 [ 596.332846][T16313] device syzkaller0 entered promiscuous mode [ 596.334155][T16312] do_syscall_64+0x3b/0xb0 [ 596.344228][T16312] ? clear_bhb_loop+0x55/0xb0 [ 596.348748][T16312] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 596.354472][T16312] RIP: 0033:0x7ffa82f8d169 [ 596.358723][T16312] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 596.378172][T16312] RSP: 002b:00007ffa83dca038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 596.386414][T16312] RAX: ffffffffffffffda RBX: 00007ffa831a5fa0 RCX: 00007ffa82f8d169 [ 596.394222][T16312] RDX: 0000000000000010 RSI: 0000200000000040 RDI: 0000000000000011 [ 596.402034][T16312] RBP: 00007ffa83dca090 R08: 0000000000000000 R09: 0000000000000000 [ 596.409845][T16312] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 596.417657][T16312] R13: 0000000000000000 R14: 00007ffa831a5fa0 R15: 00007ffe48c53ca8 [ 596.425474][T16312] [ 596.956523][T16341] device pim6reg1 entered promiscuous mode [ 597.349449][T16377] FAULT_INJECTION: forcing a failure. [ 597.349449][T16377] name failslab, interval 1, probability 0, space 0, times 0 [ 597.362693][T16377] CPU: 1 PID: 16377 Comm: syz.3.5407 Not tainted 6.1.129-syzkaller-00055-gca24c52e3c25 #0 [ 597.372426][T16377] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 597.382326][T16377] Call Trace: [ 597.385441][T16377] [ 597.388220][T16377] dump_stack_lvl+0x151/0x1b7 [ 597.392736][T16377] ? nf_tcp_handle_invalid+0x3f1/0x3f1 [ 597.398031][T16377] dump_stack+0x15/0x18 [ 597.402018][T16377] should_fail_ex+0x3d0/0x520 [ 597.406533][T16377] ? security_file_alloc+0x29/0x120 [ 597.411565][T16377] __should_failslab+0xaf/0xf0 [ 597.416165][T16377] should_failslab+0x9/0x20 [ 597.420523][T16377] kmem_cache_alloc+0x3b/0x320 [ 597.425108][T16377] ? __alloc_file+0x29/0x2a0 [ 597.429531][T16377] security_file_alloc+0x29/0x120 [ 597.434393][T16377] __alloc_file+0xb2/0x2a0 [ 597.438646][T16377] alloc_empty_file+0x95/0x180 [ 597.443247][T16377] alloc_file+0x5a/0x5e0 [ 597.447328][T16377] alloc_file_pseudo+0x259/0x2f0 [ 597.452099][T16377] ? alloc_empty_file_noaccount+0x80/0x80 [ 597.457651][T16377] ? _raw_spin_lock_bh+0xa4/0x1b0 [ 597.462523][T16377] anon_inode_getfile+0xa7/0x180 [ 597.467287][T16377] bpf_link_prime+0xed/0x250 [ 597.471716][T16377] bpf_tracing_prog_attach+0x7c6/0xff0 [ 597.477006][T16377] ? putname+0xfa/0x150 [ 597.481000][T16377] ? bpf_raw_tp_link_attach+0x6b0/0x6b0 [ 597.486381][T16377] ? _kstrtol+0x150/0x150 [ 597.490551][T16377] ? memcpy+0x56/0x70 [ 597.494366][T16377] ? avc_has_perm_noaudit+0x2dd/0x430 [ 597.499574][T16377] bpf_raw_tp_link_attach+0x428/0x6b0 [ 597.504780][T16377] ? bpf_insn_prepare_dump+0x950/0x950 [ 597.510077][T16377] ? __kasan_check_write+0x14/0x20 [ 597.515016][T16377] ? fput+0x15b/0x1b0 [ 597.518844][T16377] bpf_raw_tracepoint_open+0x22d/0x4a0 [ 597.524137][T16377] ? bpf_obj_get_info_by_fd+0x3e60/0x3e60 [ 597.529779][T16377] ? selinux_bpf+0xd2/0x100 [ 597.534112][T16377] ? security_bpf+0x82/0xb0 [ 597.538452][T16377] __sys_bpf+0x4f5/0x7f0 [ 597.542533][T16377] ? bpf_link_show_fdinfo+0x300/0x300 [ 597.547744][T16377] ? __ia32_sys_read+0x90/0x90 [ 597.552341][T16377] ? debug_smp_processor_id+0x17/0x20 [ 597.557548][T16377] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 597.563452][T16377] __x64_sys_bpf+0x7c/0x90 [ 597.567702][T16377] x64_sys_call+0x87f/0x9a0 [ 597.572042][T16377] do_syscall_64+0x3b/0xb0 [ 597.576291][T16377] ? clear_bhb_loop+0x55/0xb0 [ 597.580805][T16377] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 597.586537][T16377] RIP: 0033:0x7ffa82f8d169 [ 597.590785][T16377] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 597.610234][T16377] RSP: 002b:00007ffa83dca038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 597.618476][T16377] RAX: ffffffffffffffda RBX: 00007ffa831a5fa0 RCX: 00007ffa82f8d169 [ 597.626283][T16377] RDX: 0000000000000010 RSI: 0000200000000040 RDI: 0000000000000011 [ 597.634094][T16377] RBP: 00007ffa83dca090 R08: 0000000000000000 R09: 0000000000000000 [ 597.641906][T16377] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 597.649719][T16377] R13: 0000000000000000 R14: 00007ffa831a5fa0 R15: 00007ffe48c53ca8 [ 597.657541][T16377] [ 597.973217][T16389] device macsec0 left promiscuous mode [ 598.103890][T16394] device pim6reg1 entered promiscuous mode [ 598.276310][T16411] FAULT_INJECTION: forcing a failure. [ 598.276310][T16411] name failslab, interval 1, probability 0, space 0, times 0 [ 598.371807][T16411] CPU: 1 PID: 16411 Comm: syz.2.5420 Not tainted 6.1.129-syzkaller-00055-gca24c52e3c25 #0 [ 598.381559][T16411] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 598.391453][T16411] Call Trace: [ 598.394582][T16411] [ 598.397360][T16411] dump_stack_lvl+0x151/0x1b7 [ 598.401865][T16411] ? nf_tcp_handle_invalid+0x3f1/0x3f1 [ 598.407160][T16411] ? kmem_cache_alloc+0x175/0x320 [ 598.412019][T16411] dump_stack+0x15/0x18 [ 598.416010][T16411] should_fail_ex+0x3d0/0x520 [ 598.420530][T16411] __should_failslab+0xaf/0xf0 [ 598.425123][T16411] ? bpf_trampoline_update+0x7e/0x13a0 [ 598.430765][T16411] should_failslab+0x9/0x20 [ 598.435106][T16411] __kmem_cache_alloc_node+0x3d/0x2a0 [ 598.440322][T16411] ? bpf_trampoline_update+0x7e/0x13a0 [ 598.445606][T16411] kmalloc_trace+0x2a/0xa0 [ 598.449859][T16411] bpf_trampoline_update+0x7e/0x13a0 [ 598.454984][T16411] ? _raw_spin_lock_bh+0xa4/0x1b0 [ 598.459844][T16411] bpf_trampoline_link_prog+0x529/0x710 [ 598.465226][T16411] bpf_tracing_prog_attach+0x7eb/0xff0 [ 598.470518][T16411] ? putname+0xfa/0x150 [ 598.474513][T16411] ? bpf_raw_tp_link_attach+0x6b0/0x6b0 [ 598.479890][T16411] ? _kstrtol+0x150/0x150 [ 598.484063][T16411] ? memcpy+0x56/0x70 [ 598.487884][T16411] ? avc_has_perm_noaudit+0x2dd/0x430 [ 598.493087][T16411] bpf_raw_tp_link_attach+0x428/0x6b0 [ 598.498295][T16411] ? bpf_insn_prepare_dump+0x950/0x950 [ 598.503596][T16411] ? __kasan_check_write+0x14/0x20 [ 598.508532][T16411] ? fput+0x15b/0x1b0 [ 598.512355][T16411] bpf_raw_tracepoint_open+0x22d/0x4a0 [ 598.517650][T16411] ? bpf_obj_get_info_by_fd+0x3e60/0x3e60 [ 598.523212][T16411] ? selinux_bpf+0xd2/0x100 [ 598.527631][T16411] ? security_bpf+0x82/0xb0 [ 598.531965][T16411] __sys_bpf+0x4f5/0x7f0 [ 598.536050][T16411] ? bpf_link_show_fdinfo+0x300/0x300 [ 598.541256][T16411] ? __ia32_sys_read+0x90/0x90 [ 598.545856][T16411] ? debug_smp_processor_id+0x17/0x20 [ 598.551060][T16411] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 598.556964][T16411] __x64_sys_bpf+0x7c/0x90 [ 598.561221][T16411] x64_sys_call+0x87f/0x9a0 [ 598.565554][T16411] do_syscall_64+0x3b/0xb0 [ 598.569804][T16411] ? clear_bhb_loop+0x55/0xb0 [ 598.574319][T16411] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 598.580049][T16411] RIP: 0033:0x7fa76f38d169 [ 598.584301][T16411] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 598.603747][T16411] RSP: 002b:00007fa770246038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 598.611988][T16411] RAX: ffffffffffffffda RBX: 00007fa76f5a5fa0 RCX: 00007fa76f38d169 [ 598.619803][T16411] RDX: 0000000000000010 RSI: 0000200000000040 RDI: 0000000000000011 [ 598.627614][T16411] RBP: 00007fa770246090 R08: 0000000000000000 R09: 0000000000000000 [ 598.635427][T16411] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 598.643233][T16411] R13: 0000000000000000 R14: 00007fa76f5a5fa0 R15: 00007ffc46f7c658 [ 598.651056][T16411] [ 600.133585][T16480] device syzkaller0 entered promiscuous mode [ 601.846462][T16580] device syzkaller0 entered promiscuous mode [ 602.068148][T16629] device sit0 left promiscuous mode [ 602.120213][T16634] device sit0 entered promiscuous mode [ 602.338427][T16637] device veth0_vlan left promiscuous mode [ 602.382496][T16637] device veth0_vlan entered promiscuous mode [ 604.733191][T16724] FAULT_INJECTION: forcing a failure. [ 604.733191][T16724] name failslab, interval 1, probability 0, space 0, times 0 [ 604.829094][T16724] CPU: 1 PID: 16724 Comm: syz.4.5531 Not tainted 6.1.129-syzkaller-00055-gca24c52e3c25 #0 [ 604.838855][T16724] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 604.848741][T16724] Call Trace: [ 604.851863][T16724] [ 604.854640][T16724] dump_stack_lvl+0x151/0x1b7 [ 604.859152][T16724] ? nf_tcp_handle_invalid+0x3f1/0x3f1 [ 604.864450][T16724] dump_stack+0x15/0x18 [ 604.868439][T16724] should_fail_ex+0x3d0/0x520 [ 604.872955][T16724] __should_failslab+0xaf/0xf0 [ 604.877551][T16724] ? selinux_perf_event_alloc+0x51/0x140 [ 604.883095][T16724] should_failslab+0x9/0x20 [ 604.887359][T16724] __kmem_cache_alloc_node+0x3d/0x2a0 [ 604.892566][T16724] ? __mutex_lock_slowpath+0x10/0x10 [ 604.897686][T16724] ? selinux_perf_event_alloc+0x51/0x140 [ 604.903155][T16724] kmalloc_trace+0x2a/0xa0 [ 604.907408][T16724] selinux_perf_event_alloc+0x51/0x140 [ 604.912701][T16724] security_perf_event_alloc+0x62/0x90 [ 604.917992][T16724] perf_event_alloc+0x1544/0x1840 [ 604.922858][T16724] __se_sys_perf_event_open+0xb27/0x3d60 [ 604.928323][T16724] ? __mutex_lock_slowpath+0x1/0x10 [ 604.933355][T16724] ? __x64_sys_perf_event_open+0xd0/0xd0 [ 604.938824][T16724] ? fput+0x15b/0x1b0 [ 604.942645][T16724] ? __ia32_sys_read+0x90/0x90 [ 604.947245][T16724] ? debug_smp_processor_id+0x17/0x20 [ 604.952451][T16724] __x64_sys_perf_event_open+0xbf/0xd0 [ 604.957745][T16724] x64_sys_call+0x7de/0x9a0 [ 604.962091][T16724] do_syscall_64+0x3b/0xb0 [ 604.966334][T16724] ? clear_bhb_loop+0x55/0xb0 [ 604.970859][T16724] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 604.976576][T16724] RIP: 0033:0x7efeb338d169 [ 604.980829][T16724] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 605.000272][T16724] RSP: 002b:00007efeb41c8038 EFLAGS: 00000246 ORIG_RAX: 000000000000012a [ 605.008515][T16724] RAX: ffffffffffffffda RBX: 00007efeb35a5fa0 RCX: 00007efeb338d169 [ 605.016326][T16724] RDX: bfffffffffffffff RSI: 0000000000000000 RDI: 0000200000000180 [ 605.024137][T16724] RBP: 00007efeb41c8090 R08: 0000000000000000 R09: 0000000000000000 [ 605.031949][T16724] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000001 [ 605.039759][T16724] R13: 0000000000000000 R14: 00007efeb35a5fa0 R15: 00007ffc451833d8 [ 605.049661][T16724] [ 605.277991][T16744] device syzkaller0 entered promiscuous mode [ 605.624258][T16751] device syzkaller0 entered promiscuous mode [ 606.189526][T16776] device syzkaller0 entered promiscuous mode [ 606.276115][T16786] FAULT_INJECTION: forcing a failure. [ 606.276115][T16786] name failslab, interval 1, probability 0, space 0, times 0 [ 606.336513][T16786] CPU: 0 PID: 16786 Comm: syz.1.5552 Not tainted 6.1.129-syzkaller-00055-gca24c52e3c25 #0 [ 606.346267][T16786] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 606.356165][T16786] Call Trace: [ 606.359285][T16786] [ 606.362060][T16786] dump_stack_lvl+0x151/0x1b7 [ 606.366585][T16786] ? nf_tcp_handle_invalid+0x3f1/0x3f1 [ 606.371888][T16786] dump_stack+0x15/0x18 [ 606.375859][T16786] should_fail_ex+0x3d0/0x520 [ 606.380377][T16786] __should_failslab+0xaf/0xf0 [ 606.384975][T16786] ? alloc_perf_context+0x5a/0x300 [ 606.389920][T16786] should_failslab+0x9/0x20 [ 606.394396][T16786] __kmem_cache_alloc_node+0x3d/0x2a0 [ 606.399615][T16786] ? alloc_perf_context+0x5a/0x300 [ 606.404551][T16786] kmalloc_trace+0x2a/0xa0 [ 606.408804][T16786] alloc_perf_context+0x5a/0x300 [ 606.413575][T16786] find_get_context+0x267/0x9c0 [ 606.418263][T16786] ? perf_event_alloc+0x1840/0x1840 [ 606.423302][T16786] __se_sys_perf_event_open+0xcd9/0x3d60 [ 606.428769][T16786] ? __mutex_lock_slowpath+0x1/0x10 [ 606.433799][T16786] ? __x64_sys_perf_event_open+0xd0/0xd0 [ 606.439266][T16786] ? fput+0x15b/0x1b0 [ 606.443086][T16786] ? __ia32_sys_read+0x90/0x90 [ 606.447685][T16786] ? debug_smp_processor_id+0x17/0x20 [ 606.452892][T16786] __x64_sys_perf_event_open+0xbf/0xd0 [ 606.458232][T16786] x64_sys_call+0x7de/0x9a0 [ 606.462526][T16786] do_syscall_64+0x3b/0xb0 [ 606.466868][T16786] ? clear_bhb_loop+0x55/0xb0 [ 606.471387][T16786] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 606.477105][T16786] RIP: 0033:0x7f4d09b8d169 [ 606.481361][T16786] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 606.500804][T16786] RSP: 002b:00007f4d0aaae038 EFLAGS: 00000246 ORIG_RAX: 000000000000012a [ 606.509046][T16786] RAX: ffffffffffffffda RBX: 00007f4d09da5fa0 RCX: 00007f4d09b8d169 [ 606.516859][T16786] RDX: bfffffffffffffff RSI: 0000000000000000 RDI: 0000200000000180 [ 606.524678][T16786] RBP: 00007f4d0aaae090 R08: 0000000000000000 R09: 0000000000000000 [ 606.532480][T16786] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000001 [ 606.540293][T16786] R13: 0000000000000000 R14: 00007f4d09da5fa0 R15: 00007ffe3d23ed08 [ 606.548109][T16786] [ 606.761498][T16802] device pim6reg1 entered promiscuous mode [ 607.932752][T16851] FAULT_INJECTION: forcing a failure. [ 607.932752][T16851] name failslab, interval 1, probability 0, space 0, times 0 [ 608.032834][T16851] CPU: 1 PID: 16851 Comm: syz.1.5572 Not tainted 6.1.129-syzkaller-00055-gca24c52e3c25 #0 [ 608.042581][T16851] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 608.052478][T16851] Call Trace: [ 608.055600][T16851] [ 608.058378][T16851] dump_stack_lvl+0x151/0x1b7 [ 608.062891][T16851] ? nf_tcp_handle_invalid+0x3f1/0x3f1 [ 608.068188][T16851] dump_stack+0x15/0x18 [ 608.072175][T16851] should_fail_ex+0x3d0/0x520 [ 608.076693][T16851] __should_failslab+0xaf/0xf0 [ 608.081291][T16851] should_failslab+0x9/0x20 [ 608.085627][T16851] slab_pre_alloc_hook+0x2e/0x1b0 [ 608.090494][T16851] kmem_cache_alloc_lru+0x49/0x270 [ 608.095436][T16851] ? __d_alloc+0x34/0x700 [ 608.099614][T16851] __d_alloc+0x34/0x700 [ 608.103597][T16851] ? mutex_unlock+0xb2/0x260 [ 608.108021][T16851] d_alloc_pseudo+0x1d/0x70 [ 608.112363][T16851] alloc_file_pseudo+0x131/0x2f0 [ 608.117136][T16851] ? alloc_empty_file_noaccount+0x80/0x80 [ 608.122691][T16851] anon_inode_getfile+0xa7/0x180 [ 608.127462][T16851] __se_sys_perf_event_open+0x1006/0x3d60 [ 608.133022][T16851] ? __mutex_lock_slowpath+0x1/0x10 [ 608.138057][T16851] ? __x64_sys_perf_event_open+0xd0/0xd0 [ 608.143517][T16851] ? fput+0x15b/0x1b0 [ 608.147343][T16851] ? __ia32_sys_read+0x90/0x90 [ 608.151943][T16851] ? debug_smp_processor_id+0x17/0x20 [ 608.157146][T16851] __x64_sys_perf_event_open+0xbf/0xd0 [ 608.162442][T16851] x64_sys_call+0x7de/0x9a0 [ 608.166780][T16851] do_syscall_64+0x3b/0xb0 [ 608.171033][T16851] ? clear_bhb_loop+0x55/0xb0 [ 608.175547][T16851] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 608.181273][T16851] RIP: 0033:0x7f4d09b8d169 [ 608.185530][T16851] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 608.204970][T16851] RSP: 002b:00007f4d0aaae038 EFLAGS: 00000246 ORIG_RAX: 000000000000012a [ 608.213213][T16851] RAX: ffffffffffffffda RBX: 00007f4d09da5fa0 RCX: 00007f4d09b8d169 [ 608.221036][T16851] RDX: bfffffffffffffff RSI: 0000000000000000 RDI: 0000200000000180 [ 608.228839][T16851] RBP: 00007f4d0aaae090 R08: 0000000000000000 R09: 0000000000000000 [ 608.236650][T16851] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000001 [ 608.244460][T16851] R13: 0000000000000000 R14: 00007f4d09da5fa0 R15: 00007ffe3d23ed08 [ 608.252285][T16851] [ 611.500809][T16899] device syzkaller0 entered promiscuous mode [ 612.012798][T16920] FAULT_INJECTION: forcing a failure. [ 612.012798][T16920] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 612.027400][T16920] CPU: 0 PID: 16920 Comm: syz.0.5592 Not tainted 6.1.129-syzkaller-00055-gca24c52e3c25 #0 [ 612.037131][T16920] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 612.047028][T16920] Call Trace: [ 612.050149][T16920] [ 612.052927][T16920] dump_stack_lvl+0x151/0x1b7 [ 612.057439][T16920] ? nf_tcp_handle_invalid+0x3f1/0x3f1 [ 612.062741][T16920] ? vfs_write+0x952/0xed0 [ 612.066986][T16920] ? __kasan_slab_free+0x11/0x20 [ 612.071768][T16920] dump_stack+0x15/0x18 [ 612.075753][T16920] should_fail_ex+0x3d0/0x520 [ 612.080271][T16920] should_fail+0xb/0x10 [ 612.084261][T16920] should_fail_usercopy+0x1a/0x20 [ 612.089119][T16920] _copy_from_user+0x1e/0xc0 [ 612.093546][T16920] __sys_bpf+0x23b/0x7f0 [ 612.097624][T16920] ? bpf_link_show_fdinfo+0x300/0x300 [ 612.102835][T16920] ? __ia32_sys_read+0x90/0x90 [ 612.107434][T16920] ? debug_smp_processor_id+0x17/0x20 [ 612.112639][T16920] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 612.118540][T16920] __x64_sys_bpf+0x7c/0x90 [ 612.122798][T16920] x64_sys_call+0x87f/0x9a0 [ 612.127134][T16920] do_syscall_64+0x3b/0xb0 [ 612.131390][T16920] ? clear_bhb_loop+0x55/0xb0 [ 612.135901][T16920] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 612.141633][T16920] RIP: 0033:0x7fab53b8d169 [ 612.145879][T16920] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 612.165326][T16920] RSP: 002b:00007fab54aae038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 612.173578][T16920] RAX: ffffffffffffffda RBX: 00007fab53da5fa0 RCX: 00007fab53b8d169 [ 612.181381][T16920] RDX: 0000000000000050 RSI: 0000200000000340 RDI: 000000000000000a [ 612.189188][T16920] RBP: 00007fab54aae090 R08: 0000000000000000 R09: 0000000000000000 [ 612.197001][T16920] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 612.204815][T16920] R13: 0000000000000000 R14: 00007fab53da5fa0 R15: 00007fff2f8ea638 [ 612.212631][T16920] [ 624.114511][ T28] audit: type=1400 audit(1743748142.382:172): avc: denied { create } for pid=17137 comm="syz.3.5659" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bluetooth_socket permissive=1 [ 625.421448][T17177] device sit0 left promiscuous mode [ 625.559105][T17180] device sit0 entered promiscuous mode [ 626.776658][T17231] device sit0 left promiscuous mode [ 627.126996][T17237] device sit0 entered promiscuous mode [ 627.854487][T17271] device syzkaller0 entered promiscuous mode [ 627.889739][T17268] bridge0: port 2(bridge_slave_1) entered disabled state [ 627.897463][T17268] bridge0: port 1(bridge_slave_0) entered disabled state [ 627.928553][T17268] device bridge0 left promiscuous mode [ 628.034063][T17268] device bridge_slave_1 left promiscuous mode [ 628.040752][T17268] bridge0: port 2(bridge_slave_1) entered disabled state [ 628.105512][T17268] device bridge_slave_0 left promiscuous mode [ 628.124666][T17268] bridge0: port 1(bridge_slave_0) entered disabled state [ 629.682755][T17345] FAULT_INJECTION: forcing a failure. [ 629.682755][T17345] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 629.716615][T17345] CPU: 0 PID: 17345 Comm: syz.0.5733 Not tainted 6.1.129-syzkaller-00055-gca24c52e3c25 #0 [ 629.726402][T17345] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 629.736256][T17345] Call Trace: [ 629.739375][T17345] [ 629.742156][T17345] dump_stack_lvl+0x151/0x1b7 [ 629.746666][T17345] ? nf_tcp_handle_invalid+0x3f1/0x3f1 [ 629.751964][T17345] ? enqueue_hrtimer+0xca/0x250 [ 629.756650][T17345] dump_stack+0x15/0x18 [ 629.760638][T17345] should_fail_ex+0x3d0/0x520 [ 629.765159][T17345] should_fail+0xb/0x10 [ 629.769147][T17345] should_fail_usercopy+0x1a/0x20 [ 629.774011][T17345] _copy_from_user+0x1e/0xc0 [ 629.778441][T17345] __sys_bpf+0x23b/0x7f0 [ 629.782514][T17345] ? clockevents_program_event+0x22f/0x300 [ 629.788244][T17345] ? bpf_link_show_fdinfo+0x300/0x300 [ 629.793459][T17345] ? __sched_clock_gtod_offset+0x100/0x100 [ 629.799094][T17345] ? debug_smp_processor_id+0x17/0x20 [ 629.804295][T17345] __x64_sys_bpf+0x7c/0x90 [ 629.808548][T17345] x64_sys_call+0x87f/0x9a0 [ 629.812887][T17345] do_syscall_64+0x3b/0xb0 [ 629.817140][T17345] ? clear_bhb_loop+0x55/0xb0 [ 629.821658][T17345] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 629.827384][T17345] RIP: 0033:0x7fab53b8d169 [ 629.831637][T17345] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 629.851104][T17345] RSP: 002b:00007fab54aae038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 629.859321][T17345] RAX: ffffffffffffffda RBX: 00007fab53da5fa0 RCX: 00007fab53b8d169 [ 629.867131][T17345] RDX: 0000000000000050 RSI: 0000200000000880 RDI: 0000000000000000 [ 629.874943][T17345] RBP: 00007fab54aae090 R08: 0000000000000000 R09: 0000000000000000 [ 629.882756][T17345] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 629.890570][T17345] R13: 0000000000000000 R14: 00007fab53da5fa0 R15: 00007fff2f8ea638 [ 629.898390][T17345] [ 638.022719][T17529] bridge0: port 1(bridge_slave_0) entered blocking state [ 638.071133][T17529] bridge0: port 1(bridge_slave_0) entered disabled state [ 638.105323][T17529] device bridge_slave_0 entered promiscuous mode [ 638.234532][T17529] bridge0: port 2(bridge_slave_1) entered blocking state [ 638.241433][T17529] bridge0: port 2(bridge_slave_1) entered disabled state [ 638.249243][T17529] device bridge_slave_1 entered promiscuous mode [ 638.661501][T17529] bridge0: port 2(bridge_slave_1) entered blocking state [ 638.668420][T17529] bridge0: port 2(bridge_slave_1) entered forwarding state [ 638.675533][T17529] bridge0: port 1(bridge_slave_0) entered blocking state [ 638.682402][T17529] bridge0: port 1(bridge_slave_0) entered forwarding state [ 638.769688][ T10] bridge0: port 1(bridge_slave_0) entered disabled state [ 638.777124][ T10] bridge0: port 2(bridge_slave_1) entered disabled state [ 638.792187][ T8] device bridge_slave_1 left promiscuous mode [ 638.798243][ T8] bridge0: port 2(bridge_slave_1) entered disabled state [ 638.812200][ T8] device bridge_slave_0 left promiscuous mode [ 638.828961][ T8] bridge0: port 1(bridge_slave_0) entered disabled state [ 638.845743][ T8] device veth0_vlan left promiscuous mode [ 639.066537][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 639.073972][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 639.120251][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 639.135936][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 639.144465][ T10] bridge0: port 1(bridge_slave_0) entered blocking state [ 639.151351][ T10] bridge0: port 1(bridge_slave_0) entered forwarding state [ 639.182768][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 639.197304][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 639.206085][ T10] bridge0: port 2(bridge_slave_1) entered blocking state [ 639.212975][ T10] bridge0: port 2(bridge_slave_1) entered forwarding state [ 639.232969][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 639.248095][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 639.331217][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 639.341875][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 639.435484][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 639.475445][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 639.490905][T17529] device veth0_vlan entered promiscuous mode [ 639.526723][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 639.537907][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 639.546216][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 639.553947][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 639.591261][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 639.600232][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 639.610724][T17529] device veth1_macvtap entered promiscuous mode [ 639.684622][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 639.692811][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 639.701021][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 639.727737][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 639.754195][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 640.898895][ T28] audit: type=1400 audit(1743748159.162:173): avc: denied { write } for pid=17659 comm="syz.4.5836" name="task" dev="proc" ino=70306 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=dir permissive=1 [ 640.942721][ T28] audit: type=1400 audit(1743748159.162:174): avc: denied { add_name } for pid=17659 comm="syz.4.5836" name="cgroup.stat" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=dir permissive=1 [ 640.963356][ T28] audit: type=1400 audit(1743748159.162:175): avc: denied { create } for pid=17659 comm="syz.4.5836" name="cgroup.stat" scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=file permissive=1 [ 640.984496][ T28] audit: type=1400 audit(1743748159.162:176): avc: denied { associate } for pid=17659 comm="syz.4.5836" name="cgroup.stat" scontext=root:object_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 [ 641.228520][T17688] FAULT_INJECTION: forcing a failure. [ 641.228520][T17688] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 641.254726][T17688] CPU: 0 PID: 17688 Comm: syz.3.5844 Not tainted 6.1.129-syzkaller-00055-gca24c52e3c25 #0 [ 641.264476][T17688] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 641.274601][T17688] Call Trace: [ 641.277722][T17688] [ 641.280515][T17688] dump_stack_lvl+0x151/0x1b7 [ 641.285015][T17688] ? nf_tcp_handle_invalid+0x3f1/0x3f1 [ 641.290317][T17688] dump_stack+0x15/0x18 [ 641.294302][T17688] should_fail_ex+0x3d0/0x520 [ 641.298817][T17688] should_fail_alloc_page+0x68/0x90 [ 641.303845][T17688] prepare_alloc_pages+0x13b/0x6d0 [ 641.308813][T17688] ? __alloc_pages_bulk+0xcd0/0xcd0 [ 641.313824][T17688] ? slab_post_alloc_hook+0x53/0x2c0 [ 641.318944][T17688] ? alloc_vmap_area+0x1a5/0x1aa0 [ 641.323813][T17688] ? __get_vm_area_node+0x171/0x370 [ 641.328841][T17688] ? __vmalloc_node_range+0x338/0x1560 [ 641.334145][T17688] __alloc_pages+0x162/0x610 [ 641.338566][T17688] ? prep_new_page+0x110/0x110 [ 641.343167][T17688] ? _raw_spin_trylock_bh+0x190/0x190 [ 641.348390][T17688] __get_free_pages+0xe/0x30 [ 641.352797][T17688] kasan_populate_vmalloc_pte+0x39/0x130 [ 641.358261][T17688] ? __apply_to_page_range+0x8ca/0xbe0 [ 641.363559][T17688] __apply_to_page_range+0x8dd/0xbe0 [ 641.368682][T17688] ? kasan_populate_vmalloc+0x70/0x70 [ 641.373891][T17688] ? kasan_populate_vmalloc+0x70/0x70 [ 641.379093][T17688] apply_to_page_range+0x3b/0x50 [ 641.383872][T17688] kasan_populate_vmalloc+0x65/0x70 [ 641.388903][T17688] alloc_vmap_area+0x1961/0x1aa0 [ 641.393684][T17688] ? vm_map_ram+0x940/0x940 [ 641.398014][T17688] ? __kasan_kmalloc+0x9c/0xb0 [ 641.402613][T17688] ? kmalloc_node_trace+0x3d/0xb0 [ 641.407474][T17688] __get_vm_area_node+0x171/0x370 [ 641.412333][T17688] ? x64_sys_call+0x87f/0x9a0 [ 641.416852][T17688] __vmalloc_node_range+0x338/0x1560 [ 641.421972][T17688] ? sock_map_alloc+0x1d2/0x2f0 [ 641.426665][T17688] ? vmap+0x2b0/0x2b0 [ 641.430473][T17688] ? irqentry_exit+0x30/0x40 [ 641.435118][T17688] ? sysvec_apic_timer_interrupt+0x64/0xc0 [ 641.440767][T17688] bpf_map_area_alloc+0xdc/0xf0 [ 641.445453][T17688] ? sock_map_alloc+0x1d2/0x2f0 [ 641.450135][T17688] sock_map_alloc+0x1d2/0x2f0 [ 641.454655][T17688] map_create+0x44a/0xcf0 [ 641.458822][T17688] __sys_bpf+0x2e6/0x7f0 [ 641.462981][T17688] ? clockevents_program_event+0x22f/0x300 [ 641.468631][T17688] ? bpf_link_show_fdinfo+0x300/0x300 [ 641.473834][T17688] ? __sched_clock_gtod_offset+0x100/0x100 [ 641.479499][T17688] ? debug_smp_processor_id+0x17/0x20 [ 641.484684][T17688] __x64_sys_bpf+0x7c/0x90 [ 641.489073][T17688] x64_sys_call+0x87f/0x9a0 [ 641.493538][T17688] do_syscall_64+0x3b/0xb0 [ 641.497784][T17688] ? clear_bhb_loop+0x55/0xb0 [ 641.502298][T17688] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 641.508027][T17688] RIP: 0033:0x7ffa82f8d169 [ 641.512279][T17688] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 641.531729][T17688] RSP: 002b:00007ffa83dca038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 641.539964][T17688] RAX: ffffffffffffffda RBX: 00007ffa831a5fa0 RCX: 00007ffa82f8d169 [ 641.547775][T17688] RDX: 0000000000000050 RSI: 0000200000000880 RDI: 0000000000000000 [ 641.555587][T17688] RBP: 00007ffa83dca090 R08: 0000000000000000 R09: 0000000000000000 [ 641.563398][T17688] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 641.571217][T17688] R13: 0000000000000000 R14: 00007ffa831a5fa0 R15: 00007ffe48c53ca8 [ 641.579032][T17688] [ 641.694243][T17702] syz.3.5849[17702] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 641.694338][T17702] syz.3.5849[17702] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 642.278401][T17730] device pim6reg1 entered promiscuous mode [ 643.195081][T17773] device syzkaller0 entered promiscuous mode [ 644.635426][T17840] device pim6reg1 entered promiscuous mode [ 645.375811][ T28] audit: type=1400 audit(1743748163.642:177): avc: denied { create } for pid=17875 comm="syz.3.5910" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 645.851302][T17889] FAULT_INJECTION: forcing a failure. [ 645.851302][T17889] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 645.876724][T17889] CPU: 1 PID: 17889 Comm: syz.1.5916 Not tainted 6.1.129-syzkaller-00055-gca24c52e3c25 #0 [ 645.886479][T17889] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 645.896379][T17889] Call Trace: [ 645.899501][T17889] [ 645.902273][T17889] dump_stack_lvl+0x151/0x1b7 [ 645.906798][T17889] ? nf_tcp_handle_invalid+0x3f1/0x3f1 [ 645.912110][T17889] dump_stack+0x15/0x18 [ 645.916070][T17889] should_fail_ex+0x3d0/0x520 [ 645.920584][T17889] should_fail_alloc_page+0x68/0x90 [ 645.925631][T17889] prepare_alloc_pages+0x13b/0x6d0 [ 645.930570][T17889] ? __alloc_pages_bulk+0xcd0/0xcd0 [ 645.935598][T17889] ? slab_post_alloc_hook+0x53/0x2c0 [ 645.940719][T17889] ? alloc_vmap_area+0x1a5/0x1aa0 [ 645.945581][T17889] ? __get_vm_area_node+0x171/0x370 [ 645.950612][T17889] ? __vmalloc_node_range+0x338/0x1560 [ 645.955910][T17889] __alloc_pages+0x162/0x610 [ 645.960338][T17889] ? prep_new_page+0x110/0x110 [ 645.964937][T17889] ? _raw_spin_trylock_bh+0x190/0x190 [ 645.970144][T17889] __get_free_pages+0xe/0x30 [ 645.974569][T17889] kasan_populate_vmalloc_pte+0x39/0x130 [ 645.980034][T17889] ? __apply_to_page_range+0x8ca/0xbe0 [ 645.985330][T17889] __apply_to_page_range+0x8dd/0xbe0 [ 645.990455][T17889] ? kasan_populate_vmalloc+0x70/0x70 [ 645.995660][T17889] ? kasan_populate_vmalloc+0x70/0x70 [ 646.000863][T17889] apply_to_page_range+0x3b/0x50 [ 646.005644][T17889] kasan_populate_vmalloc+0x65/0x70 [ 646.010672][T17889] alloc_vmap_area+0x1961/0x1aa0 [ 646.015456][T17889] ? vm_map_ram+0x940/0x940 [ 646.019803][T17889] ? __kasan_kmalloc+0x9c/0xb0 [ 646.024386][T17889] ? kmalloc_node_trace+0x3d/0xb0 [ 646.029246][T17889] __get_vm_area_node+0x171/0x370 [ 646.034109][T17889] ? x64_sys_call+0x87f/0x9a0 [ 646.038621][T17889] __vmalloc_node_range+0x338/0x1560 [ 646.043739][T17889] ? sock_map_alloc+0x1d2/0x2f0 [ 646.048436][T17889] ? vmap+0x2b0/0x2b0 [ 646.052249][T17889] ? kasan_save_alloc_info+0x1f/0x30 [ 646.057370][T17889] ? bpf_map_area_alloc+0x4f/0xf0 [ 646.062229][T17889] ? __kmalloc_node+0xb4/0x1e0 [ 646.066826][T17889] bpf_map_area_alloc+0xdc/0xf0 [ 646.071516][T17889] ? sock_map_alloc+0x1d2/0x2f0 [ 646.076201][T17889] sock_map_alloc+0x1d2/0x2f0 [ 646.080715][T17889] map_create+0x44a/0xcf0 [ 646.084884][T17889] __sys_bpf+0x2e6/0x7f0 [ 646.088965][T17889] ? bpf_link_show_fdinfo+0x300/0x300 [ 646.094173][T17889] ? __ia32_sys_read+0x90/0x90 [ 646.098770][T17889] ? debug_smp_processor_id+0x17/0x20 [ 646.103974][T17889] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 646.109882][T17889] __x64_sys_bpf+0x7c/0x90 [ 646.114130][T17889] x64_sys_call+0x87f/0x9a0 [ 646.118471][T17889] do_syscall_64+0x3b/0xb0 [ 646.122721][T17889] ? clear_bhb_loop+0x55/0xb0 [ 646.127235][T17889] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 646.132967][T17889] RIP: 0033:0x7f4d09b8d169 [ 646.137216][T17889] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 646.156670][T17889] RSP: 002b:00007f4d0aaae038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 646.164903][T17889] RAX: ffffffffffffffda RBX: 00007f4d09da5fa0 RCX: 00007f4d09b8d169 [ 646.172729][T17889] RDX: 0000000000000050 RSI: 0000200000000880 RDI: 0000000000000000 [ 646.180529][T17889] RBP: 00007f4d0aaae090 R08: 0000000000000000 R09: 0000000000000000 [ 646.188341][T17889] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 646.196238][T17889] R13: 0000000000000000 R14: 00007f4d09da5fa0 R15: 00007ffe3d23ed08 [ 646.204064][T17889] [ 647.259814][T17923] device syzkaller0 entered promiscuous mode [ 647.932756][T17964] device syzkaller0 entered promiscuous mode [ 648.502150][T17985] device wg2 entered promiscuous mode [ 648.757383][T18004] FAULT_INJECTION: forcing a failure. [ 648.757383][T18004] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 648.816170][T18004] CPU: 0 PID: 18004 Comm: syz.4.5955 Not tainted 6.1.129-syzkaller-00055-gca24c52e3c25 #0 [ 648.825918][T18004] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 648.835819][T18004] Call Trace: [ 648.838936][T18004] [ 648.842148][T18004] dump_stack_lvl+0x151/0x1b7 [ 648.846661][T18004] ? nf_tcp_handle_invalid+0x3f1/0x3f1 [ 648.851963][T18004] dump_stack+0x15/0x18 [ 648.856052][T18004] should_fail_ex+0x3d0/0x520 [ 648.860549][T18004] should_fail_alloc_page+0x68/0x90 [ 648.865575][T18004] prepare_alloc_pages+0x13b/0x6d0 [ 648.870526][T18004] ? __alloc_pages_bulk+0xcd0/0xcd0 [ 648.875555][T18004] ? slab_post_alloc_hook+0x53/0x2c0 [ 648.880679][T18004] ? alloc_vmap_area+0x1a5/0x1aa0 [ 648.885537][T18004] ? __get_vm_area_node+0x171/0x370 [ 648.890601][T18004] ? __vmalloc_node_range+0x338/0x1560 [ 648.895873][T18004] __alloc_pages+0x162/0x610 [ 648.900292][T18004] ? sysvec_apic_timer_interrupt+0x64/0xc0 [ 648.905938][T18004] ? prep_new_page+0x110/0x110 [ 648.910539][T18004] ? _raw_spin_trylock_bh+0x190/0x190 [ 648.915746][T18004] ? kasan_check_range+0x17a/0x2a0 [ 648.920696][T18004] __get_free_pages+0xe/0x30 [ 648.925118][T18004] kasan_populate_vmalloc_pte+0x39/0x130 [ 648.930585][T18004] ? __apply_to_page_range+0x8ca/0xbe0 [ 648.935882][T18004] __apply_to_page_range+0x8dd/0xbe0 [ 648.941010][T18004] ? kasan_populate_vmalloc+0x70/0x70 [ 648.946210][T18004] ? kasan_populate_vmalloc+0x70/0x70 [ 648.951414][T18004] apply_to_page_range+0x3b/0x50 [ 648.956189][T18004] kasan_populate_vmalloc+0x65/0x70 [ 648.961222][T18004] alloc_vmap_area+0x1961/0x1aa0 [ 648.966009][T18004] ? vm_map_ram+0x940/0x940 [ 648.970338][T18004] ? __kasan_kmalloc+0x9c/0xb0 [ 648.974939][T18004] ? kmalloc_node_trace+0x3d/0xb0 [ 648.979796][T18004] __get_vm_area_node+0x171/0x370 [ 648.984656][T18004] ? x64_sys_call+0x87f/0x9a0 [ 648.989172][T18004] __vmalloc_node_range+0x338/0x1560 [ 648.994292][T18004] ? sock_map_alloc+0x1d2/0x2f0 [ 648.998990][T18004] ? vmap+0x2b0/0x2b0 [ 649.002796][T18004] ? asm_sysvec_apic_timer_interrupt+0x1b/0x20 [ 649.008804][T18004] bpf_map_area_alloc+0xdc/0xf0 [ 649.013473][T18004] ? sock_map_alloc+0x1d2/0x2f0 [ 649.018164][T18004] sock_map_alloc+0x1d2/0x2f0 [ 649.022677][T18004] map_create+0x44a/0xcf0 [ 649.026840][T18004] __sys_bpf+0x2e6/0x7f0 [ 649.030926][T18004] ? clockevents_program_event+0x22f/0x300 [ 649.036558][T18004] ? bpf_link_show_fdinfo+0x300/0x300 [ 649.041774][T18004] ? __sched_clock_gtod_offset+0x100/0x100 [ 649.047497][T18004] ? debug_smp_processor_id+0x17/0x20 [ 649.052704][T18004] __x64_sys_bpf+0x7c/0x90 [ 649.056955][T18004] x64_sys_call+0x87f/0x9a0 [ 649.061294][T18004] do_syscall_64+0x3b/0xb0 [ 649.065546][T18004] ? clear_bhb_loop+0x55/0xb0 [ 649.070060][T18004] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 649.075788][T18004] RIP: 0033:0x7efeb338d169 [ 649.080040][T18004] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 649.099486][T18004] RSP: 002b:00007efeb41c8038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 649.107730][T18004] RAX: ffffffffffffffda RBX: 00007efeb35a5fa0 RCX: 00007efeb338d169 [ 649.115544][T18004] RDX: 0000000000000050 RSI: 0000200000000880 RDI: 0000000000000000 [ 649.123350][T18004] RBP: 00007efeb41c8090 R08: 0000000000000000 R09: 0000000000000000 [ 649.131160][T18004] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 649.138973][T18004] R13: 0000000000000000 R14: 00007efeb35a5fa0 R15: 00007ffc451833d8 [ 649.146793][T18004] [ 651.860900][T18029] device wg2 left promiscuous mode [ 652.513240][T18067] device veth0_vlan left promiscuous mode [ 652.616936][T18067] device veth0_vlan entered promiscuous mode [ 652.695650][T18073] FAULT_INJECTION: forcing a failure. [ 652.695650][T18073] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 652.789349][T18073] CPU: 1 PID: 18073 Comm: syz.1.5976 Not tainted 6.1.129-syzkaller-00055-gca24c52e3c25 #0 [ 652.799100][T18073] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 652.808994][T18073] Call Trace: [ 652.812268][T18073] [ 652.815049][T18073] dump_stack_lvl+0x151/0x1b7 [ 652.819560][T18073] ? nf_tcp_handle_invalid+0x3f1/0x3f1 [ 652.824850][T18073] ? vfs_write+0x952/0xed0 [ 652.829098][T18073] ? __kasan_slab_free+0x11/0x20 [ 652.833876][T18073] dump_stack+0x15/0x18 [ 652.837866][T18073] should_fail_ex+0x3d0/0x520 [ 652.842383][T18073] should_fail+0xb/0x10 [ 652.846371][T18073] should_fail_usercopy+0x1a/0x20 [ 652.851232][T18073] _copy_from_user+0x1e/0xc0 [ 652.855658][T18073] __sys_bpf+0x23b/0x7f0 [ 652.859738][T18073] ? bpf_link_show_fdinfo+0x300/0x300 [ 652.864951][T18073] ? __ia32_sys_read+0x90/0x90 [ 652.869552][T18073] ? debug_smp_processor_id+0x17/0x20 [ 652.874754][T18073] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 652.880657][T18073] __x64_sys_bpf+0x7c/0x90 [ 652.884913][T18073] x64_sys_call+0x87f/0x9a0 [ 652.889391][T18073] do_syscall_64+0x3b/0xb0 [ 652.893641][T18073] ? clear_bhb_loop+0x55/0xb0 [ 652.898156][T18073] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 652.903886][T18073] RIP: 0033:0x7f4d09b8d169 [ 652.908139][T18073] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 652.927733][T18073] RSP: 002b:00007f4d0aaae038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 652.935973][T18073] RAX: ffffffffffffffda RBX: 00007f4d09da5fa0 RCX: 00007f4d09b8d169 [ 652.943791][T18073] RDX: 0000000000000050 RSI: 0000200000000340 RDI: 000000000000000a [ 652.951596][T18073] RBP: 00007f4d0aaae090 R08: 0000000000000000 R09: 0000000000000000 [ 652.959405][T18073] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 652.967214][T18073] R13: 0000000000000000 R14: 00007f4d09da5fa0 R15: 00007ffe3d23ed08 [ 652.975033][T18073] [ 652.978726][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 652.988001][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 652.995551][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 653.118643][T18084] device pim6reg1 entered promiscuous mode [ 653.709914][T18106] device sit0 left promiscuous mode [ 653.950979][T18114] FAULT_INJECTION: forcing a failure. [ 653.950979][T18114] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 653.985877][T18114] CPU: 1 PID: 18114 Comm: syz.0.5991 Not tainted 6.1.129-syzkaller-00055-gca24c52e3c25 #0 [ 653.995629][T18114] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 654.005613][T18114] Call Trace: [ 654.008851][T18114] [ 654.011631][T18114] dump_stack_lvl+0x151/0x1b7 [ 654.016144][T18114] ? nf_tcp_handle_invalid+0x3f1/0x3f1 [ 654.021438][T18114] ? trie_delete_elem+0x417/0x760 [ 654.026298][T18114] dump_stack+0x15/0x18 [ 654.030289][T18114] should_fail_ex+0x3d0/0x520 [ 654.034805][T18114] should_fail_alloc_page+0x68/0x90 [ 654.039837][T18114] prepare_alloc_pages+0x13b/0x6d0 [ 654.044787][T18114] ? __alloc_pages_bulk+0xcd0/0xcd0 [ 654.049827][T18114] __alloc_pages+0x162/0x610 [ 654.054249][T18114] ? prep_new_page+0x110/0x110 [ 654.058852][T18114] ? _raw_spin_trylock_bh+0x190/0x190 [ 654.064060][T18114] __get_free_pages+0xe/0x30 [ 654.068483][T18114] kasan_populate_vmalloc_pte+0x39/0x130 [ 654.073965][T18114] ? __apply_to_page_range+0x8ca/0xbe0 [ 654.079252][T18114] __apply_to_page_range+0x8dd/0xbe0 [ 654.084366][T18114] ? kasan_populate_vmalloc+0x70/0x70 [ 654.089572][T18114] ? kasan_populate_vmalloc+0x70/0x70 [ 654.094774][T18114] apply_to_page_range+0x3b/0x50 [ 654.099554][T18114] kasan_populate_vmalloc+0x65/0x70 [ 654.104586][T18114] alloc_vmap_area+0x1961/0x1aa0 [ 654.109365][T18114] ? vm_map_ram+0x940/0x940 [ 654.113698][T18114] ? __kasan_kmalloc+0x9c/0xb0 [ 654.118309][T18114] ? kmalloc_node_trace+0x3d/0xb0 [ 654.123160][T18114] __get_vm_area_node+0x171/0x370 [ 654.128032][T18114] __vmalloc_node_range+0x338/0x1560 [ 654.133140][T18114] ? sock_map_alloc+0x1d2/0x2f0 [ 654.137839][T18114] ? vmap+0x2b0/0x2b0 [ 654.141645][T18114] ? kasan_save_alloc_info+0x1f/0x30 [ 654.146778][T18114] ? bpf_map_area_alloc+0x4f/0xf0 [ 654.151625][T18114] ? __kmalloc_node+0xb4/0x1e0 [ 654.156231][T18114] bpf_map_area_alloc+0xdc/0xf0 [ 654.160913][T18114] ? sock_map_alloc+0x1d2/0x2f0 [ 654.165606][T18114] sock_map_alloc+0x1d2/0x2f0 [ 654.170114][T18114] map_create+0x44a/0xcf0 [ 654.174283][T18114] __sys_bpf+0x2e6/0x7f0 [ 654.178358][T18114] ? clockevents_program_event+0x22f/0x300 [ 654.184002][T18114] ? bpf_link_show_fdinfo+0x300/0x300 [ 654.189212][T18114] ? irqentry_exit+0x30/0x40 [ 654.193634][T18114] ? sysvec_apic_timer_interrupt+0x64/0xc0 [ 654.199382][T18114] ? asm_sysvec_apic_timer_interrupt+0x1b/0x20 [ 654.205355][T18114] __x64_sys_bpf+0x7c/0x90 [ 654.209604][T18114] x64_sys_call+0x87f/0x9a0 [ 654.213938][T18114] do_syscall_64+0x3b/0xb0 [ 654.218191][T18114] ? clear_bhb_loop+0x55/0xb0 [ 654.222702][T18114] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 654.228464][T18114] RIP: 0033:0x7f8aa3d8d169 [ 654.232684][T18114] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 654.252127][T18114] RSP: 002b:00007f8aa4bf9038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 654.260372][T18114] RAX: ffffffffffffffda RBX: 00007f8aa3fa5fa0 RCX: 00007f8aa3d8d169 [ 654.268192][T18114] RDX: 0000000000000050 RSI: 0000200000000880 RDI: 0000000000000000 [ 654.275996][T18114] RBP: 00007f8aa4bf9090 R08: 0000000000000000 R09: 0000000000000000 [ 654.283809][T18114] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 654.291615][T18114] R13: 0000000000000000 R14: 00007f8aa3fa5fa0 R15: 00007ffe9024d138 [ 654.299436][T18114] [ 654.302438][T18108] device sit0 entered promiscuous mode [ 655.831490][T18161] syz.2.6007[18161] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 655.831577][T18161] syz.2.6007[18161] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 656.948896][T18199] device syzkaller0 entered promiscuous mode [ 657.219806][T18210] FAULT_INJECTION: forcing a failure. [ 657.219806][T18210] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 657.243724][T18210] CPU: 0 PID: 18210 Comm: syz.3.6022 Not tainted 6.1.129-syzkaller-00055-gca24c52e3c25 #0 [ 657.253473][T18210] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 657.263374][T18210] Call Trace: [ 657.266549][T18210] [ 657.269356][T18210] dump_stack_lvl+0x151/0x1b7 [ 657.273871][T18210] ? nf_tcp_handle_invalid+0x3f1/0x3f1 [ 657.279166][T18210] dump_stack+0x15/0x18 [ 657.283158][T18210] should_fail_ex+0x3d0/0x520 [ 657.287669][T18210] should_fail_alloc_page+0x68/0x90 [ 657.292708][T18210] prepare_alloc_pages+0x13b/0x6d0 [ 657.297761][T18210] ? __alloc_pages_bulk+0xcd0/0xcd0 [ 657.302790][T18210] ? slab_post_alloc_hook+0x53/0x2c0 [ 657.307907][T18210] ? alloc_vmap_area+0x1a5/0x1aa0 [ 657.312782][T18210] ? __get_vm_area_node+0x171/0x370 [ 657.317802][T18210] ? __vmalloc_node_range+0x338/0x1560 [ 657.323105][T18210] __alloc_pages+0x162/0x610 [ 657.327523][T18210] ? prep_new_page+0x110/0x110 [ 657.332127][T18210] ? _raw_spin_trylock_bh+0x190/0x190 [ 657.337344][T18210] __get_free_pages+0xe/0x30 [ 657.341766][T18210] kasan_populate_vmalloc_pte+0x39/0x130 [ 657.347222][T18210] ? __apply_to_page_range+0x8ca/0xbe0 [ 657.352604][T18210] __apply_to_page_range+0x8dd/0xbe0 [ 657.357723][T18210] ? kasan_populate_vmalloc+0x70/0x70 [ 657.362933][T18210] ? kasan_populate_vmalloc+0x70/0x70 [ 657.368139][T18210] apply_to_page_range+0x3b/0x50 [ 657.372913][T18210] kasan_populate_vmalloc+0x65/0x70 [ 657.377949][T18210] alloc_vmap_area+0x1961/0x1aa0 [ 657.382737][T18210] ? vm_map_ram+0x940/0x940 [ 657.387060][T18210] ? __kasan_kmalloc+0x9c/0xb0 [ 657.391659][T18210] ? kmalloc_node_trace+0x3d/0xb0 [ 657.396525][T18210] __get_vm_area_node+0x171/0x370 [ 657.401381][T18210] ? x64_sys_call+0x87f/0x9a0 [ 657.405899][T18210] __vmalloc_node_range+0x338/0x1560 [ 657.411020][T18210] ? sock_map_alloc+0x1d2/0x2f0 [ 657.415709][T18210] ? vmap+0x2b0/0x2b0 [ 657.419523][T18210] ? kasan_save_alloc_info+0x1f/0x30 [ 657.424643][T18210] ? bpf_map_area_alloc+0x4f/0xf0 [ 657.429502][T18210] ? __kmalloc_node+0xb4/0x1e0 [ 657.434099][T18210] bpf_map_area_alloc+0xdc/0xf0 [ 657.438790][T18210] ? sock_map_alloc+0x1d2/0x2f0 [ 657.443475][T18210] sock_map_alloc+0x1d2/0x2f0 [ 657.447986][T18210] map_create+0x44a/0xcf0 [ 657.452157][T18210] __sys_bpf+0x2e6/0x7f0 [ 657.456322][T18210] ? bpf_link_show_fdinfo+0x300/0x300 [ 657.461550][T18210] ? __ia32_sys_read+0x90/0x90 [ 657.466135][T18210] ? debug_smp_processor_id+0x17/0x20 [ 657.471334][T18210] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 657.477241][T18210] __x64_sys_bpf+0x7c/0x90 [ 657.481493][T18210] x64_sys_call+0x87f/0x9a0 [ 657.485828][T18210] do_syscall_64+0x3b/0xb0 [ 657.490083][T18210] ? clear_bhb_loop+0x55/0xb0 [ 657.494597][T18210] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 657.500325][T18210] RIP: 0033:0x7ffa82f8d169 [ 657.504580][T18210] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 657.524284][T18210] RSP: 002b:00007ffa83da9038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 657.532523][T18210] RAX: ffffffffffffffda RBX: 00007ffa831a6080 RCX: 00007ffa82f8d169 [ 657.540331][T18210] RDX: 0000000000000050 RSI: 0000200000000880 RDI: 0000000000000000 [ 657.548142][T18210] RBP: 00007ffa83da9090 R08: 0000000000000000 R09: 0000000000000000 [ 657.555958][T18210] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 657.563773][T18210] R13: 0000000000000000 R14: 00007ffa831a6080 R15: 00007ffe48c53ca8 [ 657.571591][T18210] [ 657.922364][T18242] device sit0 entered promiscuous mode [ 658.215670][T18260] FAULT_INJECTION: forcing a failure. [ 658.215670][T18260] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 658.229623][T18260] CPU: 0 PID: 18260 Comm: syz.0.6042 Not tainted 6.1.129-syzkaller-00055-gca24c52e3c25 #0 [ 658.239375][T18260] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 658.249268][T18260] Call Trace: [ 658.252382][T18260] [ 658.255162][T18260] dump_stack_lvl+0x151/0x1b7 [ 658.259681][T18260] ? nf_tcp_handle_invalid+0x3f1/0x3f1 [ 658.264973][T18260] dump_stack+0x15/0x18 [ 658.268963][T18260] should_fail_ex+0x3d0/0x520 [ 658.273477][T18260] should_fail_alloc_page+0x68/0x90 [ 658.278508][T18260] prepare_alloc_pages+0x13b/0x6d0 [ 658.283459][T18260] ? __alloc_pages_bulk+0xcd0/0xcd0 [ 658.288486][T18260] ? slab_post_alloc_hook+0x53/0x2c0 [ 658.293611][T18260] ? alloc_vmap_area+0x1a5/0x1aa0 [ 658.298471][T18260] ? __get_vm_area_node+0x171/0x370 [ 658.303504][T18260] ? __vmalloc_node_range+0x338/0x1560 [ 658.308801][T18260] __alloc_pages+0x162/0x610 [ 658.313225][T18260] ? prep_new_page+0x110/0x110 [ 658.317831][T18260] ? _raw_spin_trylock_bh+0x190/0x190 [ 658.323031][T18260] __get_free_pages+0xe/0x30 [ 658.327460][T18260] kasan_populate_vmalloc_pte+0x39/0x130 [ 658.332923][T18260] ? __apply_to_page_range+0x8ca/0xbe0 [ 658.338219][T18260] __apply_to_page_range+0x8dd/0xbe0 [ 658.343340][T18260] ? kasan_populate_vmalloc+0x70/0x70 [ 658.348552][T18260] ? kasan_populate_vmalloc+0x70/0x70 [ 658.353753][T18260] apply_to_page_range+0x3b/0x50 [ 658.358533][T18260] kasan_populate_vmalloc+0x65/0x70 [ 658.363562][T18260] alloc_vmap_area+0x1961/0x1aa0 [ 658.368344][T18260] ? vm_map_ram+0x940/0x940 [ 658.372674][T18260] ? __kasan_kmalloc+0x9c/0xb0 [ 658.377274][T18260] ? kmalloc_node_trace+0x3d/0xb0 [ 658.382138][T18260] __get_vm_area_node+0x171/0x370 [ 658.386997][T18260] ? x64_sys_call+0x87f/0x9a0 [ 658.391510][T18260] __vmalloc_node_range+0x338/0x1560 [ 658.396629][T18260] ? sock_map_alloc+0x1d2/0x2f0 [ 658.401326][T18260] ? vmap+0x2b0/0x2b0 [ 658.405139][T18260] ? kasan_save_alloc_info+0x1f/0x30 [ 658.410259][T18260] ? bpf_map_area_alloc+0x4f/0xf0 [ 658.415119][T18260] ? __kmalloc_node+0xb4/0x1e0 [ 658.419718][T18260] bpf_map_area_alloc+0xdc/0xf0 [ 658.424409][T18260] ? sock_map_alloc+0x1d2/0x2f0 [ 658.429091][T18260] sock_map_alloc+0x1d2/0x2f0 [ 658.433602][T18260] map_create+0x44a/0xcf0 [ 658.437770][T18260] __sys_bpf+0x2e6/0x7f0 [ 658.441909][T18260] ? bpf_link_show_fdinfo+0x300/0x300 [ 658.447066][T18260] ? __ia32_sys_read+0x90/0x90 [ 658.451666][T18260] ? debug_smp_processor_id+0x17/0x20 [ 658.456867][T18260] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 658.462767][T18260] __x64_sys_bpf+0x7c/0x90 [ 658.467018][T18260] x64_sys_call+0x87f/0x9a0 [ 658.471357][T18260] do_syscall_64+0x3b/0xb0 [ 658.475607][T18260] ? clear_bhb_loop+0x55/0xb0 [ 658.480125][T18260] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 658.485855][T18260] RIP: 0033:0x7f8aa3d8d169 [ 658.490116][T18260] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 658.509546][T18260] RSP: 002b:00007f8aa4bf9038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 658.517799][T18260] RAX: ffffffffffffffda RBX: 00007f8aa3fa5fa0 RCX: 00007f8aa3d8d169 [ 658.525605][T18260] RDX: 0000000000000050 RSI: 0000200000000880 RDI: 0000000000000000 [ 658.533413][T18260] RBP: 00007f8aa4bf9090 R08: 0000000000000000 R09: 0000000000000000 [ 658.541225][T18260] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 658.549047][T18260] R13: 0000000000000000 R14: 00007f8aa3fa5fa0 R15: 00007ffe9024d138 [ 658.556867][T18260] [ 658.603472][T18254] bridge0: port 1(bridge_slave_0) entered blocking state [ 658.619731][T18254] bridge0: port 1(bridge_slave_0) entered disabled state [ 658.627492][T18254] device bridge_slave_0 entered promiscuous mode [ 658.636640][T18269] FAULT_INJECTION: forcing a failure. [ 658.636640][T18269] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 658.650175][T18269] CPU: 1 PID: 18269 Comm: syz.0.6046 Not tainted 6.1.129-syzkaller-00055-gca24c52e3c25 #0 [ 658.659910][T18269] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 658.669888][T18269] Call Trace: [ 658.673010][T18269] [ 658.675784][T18269] dump_stack_lvl+0x151/0x1b7 [ 658.680298][T18269] ? nf_tcp_handle_invalid+0x3f1/0x3f1 [ 658.686377][T18269] ? __kasan_check_write+0x14/0x20 [ 658.691512][T18269] dump_stack+0x15/0x18 [ 658.695540][T18269] should_fail_ex+0x3d0/0x520 [ 658.700094][T18269] should_fail+0xb/0x10 [ 658.704083][T18269] should_fail_usercopy+0x1a/0x20 [ 658.708942][T18269] _copy_from_user+0x1e/0xc0 [ 658.713367][T18269] perf_copy_attr+0x163/0x880 [ 658.717886][T18269] __se_sys_perf_event_open+0xd7/0x3d60 [ 658.723264][T18269] ? __kasan_check_write+0x14/0x20 [ 658.728212][T18269] ? mutex_unlock+0xb2/0x260 [ 658.732644][T18269] ? __mutex_lock_slowpath+0x10/0x10 [ 658.737761][T18269] ? __x64_sys_perf_event_open+0xd0/0xd0 [ 658.743227][T18269] ? fput+0x15b/0x1b0 [ 658.747054][T18269] ? __ia32_sys_read+0x90/0x90 [ 658.751653][T18269] ? debug_smp_processor_id+0x17/0x20 [ 658.756854][T18269] __x64_sys_perf_event_open+0xbf/0xd0 [ 658.762150][T18269] x64_sys_call+0x7de/0x9a0 [ 658.766486][T18269] do_syscall_64+0x3b/0xb0 [ 658.770737][T18269] ? clear_bhb_loop+0x55/0xb0 [ 658.775345][T18269] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 658.781065][T18269] RIP: 0033:0x7f8aa3d8d169 [ 658.785317][T18269] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 658.804766][T18269] RSP: 002b:00007f8aa4bf9038 EFLAGS: 00000246 ORIG_RAX: 000000000000012a [ 658.813006][T18269] RAX: ffffffffffffffda RBX: 00007f8aa3fa5fa0 RCX: 00007f8aa3d8d169 [ 658.820818][T18269] RDX: 0000000000000001 RSI: ffffffffffffffff RDI: 0000200000000100 [ 658.828631][T18269] RBP: 00007f8aa4bf9090 R08: 0000000000000000 R09: 0000000000000000 [ 658.836438][T18269] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000001 [ 658.844337][T18269] R13: 0000000000000000 R14: 00007f8aa3fa5fa0 R15: 00007ffe9024d138 [ 658.852155][T18269] [ 658.865364][T18254] bridge0: port 2(bridge_slave_1) entered blocking state [ 658.875865][T18254] bridge0: port 2(bridge_slave_1) entered disabled state [ 658.883566][T18254] device bridge_slave_1 entered promiscuous mode [ 658.968454][T18277] device syzkaller0 entered promiscuous mode [ 662.051979][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 662.065346][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 662.112682][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 662.232353][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 662.271389][ T10] bridge0: port 1(bridge_slave_0) entered blocking state [ 662.278317][ T10] bridge0: port 1(bridge_slave_0) entered forwarding state [ 662.285654][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 662.298983][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 662.307198][ T10] bridge0: port 2(bridge_slave_1) entered blocking state [ 662.314096][ T10] bridge0: port 2(bridge_slave_1) entered forwarding state [ 662.321383][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 662.351415][ T317] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 662.366285][ T317] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 662.412694][ T317] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 662.446370][T18316] device sit0 entered promiscuous mode [ 662.568524][ T317] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 662.612545][ T317] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 662.692294][ T317] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 662.746746][T18254] device veth0_vlan entered promiscuous mode [ 662.841399][T18254] device veth1_macvtap entered promiscuous mode [ 663.292419][ T317] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 663.310788][ T317] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 663.361350][ T317] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 663.399610][T18332] device syzkaller0 entered promiscuous mode [ 663.439004][ T317] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 663.449164][ T317] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 663.477656][ T317] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 663.486623][ T317] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 664.092409][T18383] device syzkaller0 entered promiscuous mode [ 666.799901][T18466] device pim6reg1 entered promiscuous mode [ 667.901729][T18503] device syzkaller0 entered promiscuous mode [ 668.106845][T18523] FAULT_INJECTION: forcing a failure. [ 668.106845][T18523] name failslab, interval 1, probability 0, space 0, times 0 [ 668.128201][T18523] CPU: 0 PID: 18523 Comm: syz.3.6134 Not tainted 6.1.129-syzkaller-00055-gca24c52e3c25 #0 [ 668.137945][T18523] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 668.147844][T18523] Call Trace: [ 668.150961][T18523] [ 668.153743][T18523] dump_stack_lvl+0x151/0x1b7 [ 668.158259][T18523] ? nf_tcp_handle_invalid+0x3f1/0x3f1 [ 668.163549][T18523] ? avc_has_perm_noaudit+0x2dd/0x430 [ 668.168870][T18523] dump_stack+0x15/0x18 [ 668.172861][T18523] should_fail_ex+0x3d0/0x520 [ 668.177370][T18523] __should_failslab+0xaf/0xf0 [ 668.181970][T18523] should_failslab+0x9/0x20 [ 668.186321][T18523] slab_pre_alloc_hook+0x2e/0x1b0 [ 668.191173][T18523] ? avc_has_perm+0x16f/0x260 [ 668.195692][T18523] kmem_cache_alloc_lru+0x49/0x270 [ 668.200630][T18523] ? __d_alloc+0x34/0x700 [ 668.204801][T18523] __d_alloc+0x34/0x700 [ 668.208792][T18523] ? _raw_spin_lock+0x1b0/0x1b0 [ 668.213576][T18523] d_alloc_pseudo+0x1d/0x70 [ 668.217915][T18523] alloc_file_pseudo+0x131/0x2f0 [ 668.222692][T18523] ? alloc_empty_file_noaccount+0x80/0x80 [ 668.228245][T18523] ? perf_event_alloc+0x1586/0x1840 [ 668.233277][T18523] anon_inode_getfile+0xa7/0x180 [ 668.238049][T18523] __se_sys_perf_event_open+0x1006/0x3d60 [ 668.243610][T18523] ? mutex_lock+0x1e0/0x1e0 [ 668.248033][T18523] ? __x64_sys_perf_event_open+0xd0/0xd0 [ 668.253498][T18523] ? fput+0x15b/0x1b0 [ 668.257319][T18523] ? __ia32_sys_read+0x90/0x90 [ 668.261916][T18523] ? debug_smp_processor_id+0x17/0x20 [ 668.267124][T18523] __x64_sys_perf_event_open+0xbf/0xd0 [ 668.272420][T18523] x64_sys_call+0x7de/0x9a0 [ 668.276762][T18523] do_syscall_64+0x3b/0xb0 [ 668.281009][T18523] ? clear_bhb_loop+0x55/0xb0 [ 668.285522][T18523] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 668.291282][T18523] RIP: 0033:0x7ffa82f8d169 [ 668.295509][T18523] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 668.314942][T18523] RSP: 002b:00007ffa83dca038 EFLAGS: 00000246 ORIG_RAX: 000000000000012a [ 668.323187][T18523] RAX: ffffffffffffffda RBX: 00007ffa831a5fa0 RCX: 00007ffa82f8d169 [ 668.331001][T18523] RDX: 0000000000000001 RSI: ffffffffffffffff RDI: 0000200000000100 [ 668.338828][T18523] RBP: 00007ffa83dca090 R08: 0000000000000000 R09: 0000000000000000 [ 668.346618][T18523] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000001 [ 668.354433][T18523] R13: 0000000000000000 R14: 00007ffa831a5fa0 R15: 00007ffe48c53ca8 [ 668.362254][T18523] [ 668.687052][T18531] device veth1_macvtap left promiscuous mode [ 670.147851][T18607] device syzkaller0 entered promiscuous mode [ 672.114377][T18647] bridge0: port 1(bridge_slave_0) entered blocking state [ 672.121296][T18647] bridge0: port 1(bridge_slave_0) entered disabled state [ 672.129552][T18647] device bridge_slave_0 entered promiscuous mode [ 672.183732][T18647] bridge0: port 2(bridge_slave_1) entered blocking state [ 672.190604][T18647] bridge0: port 2(bridge_slave_1) entered disabled state [ 672.215990][T18647] device bridge_slave_1 entered promiscuous mode [ 672.666139][ T43] device bridge_slave_1 left promiscuous mode [ 672.677567][ T43] bridge0: port 2(bridge_slave_1) entered disabled state [ 672.711627][ T43] device bridge_slave_0 left promiscuous mode [ 672.745209][ T43] bridge0: port 1(bridge_slave_0) entered disabled state [ 672.805947][ T43] device veth0_vlan left promiscuous mode [ 673.301319][T18689] ip6_vti0: mtu greater than device maximum [ 673.401474][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 673.409569][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 673.441989][ T317] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 673.452815][ T317] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 673.468985][ T317] bridge0: port 1(bridge_slave_0) entered blocking state [ 673.475906][ T317] bridge0: port 1(bridge_slave_0) entered forwarding state [ 673.484098][ T317] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 673.492492][ T317] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 673.500912][ T317] bridge0: port 2(bridge_slave_1) entered blocking state [ 673.507808][ T317] bridge0: port 2(bridge_slave_1) entered forwarding state [ 673.518470][ T317] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 673.529777][ T317] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 673.538206][ T317] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 673.557990][ T317] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 673.572476][ T317] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 673.616830][ T317] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 673.626770][ T317] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 673.643770][T18647] device veth0_vlan entered promiscuous mode [ 673.653127][ T317] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 673.673690][ T317] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 673.711298][T18647] device veth1_macvtap entered promiscuous mode [ 673.743019][ T317] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 673.751924][ T317] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 673.759545][ T317] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 673.866995][ T317] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 673.877569][ T317] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 673.893322][ T317] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 673.908105][ T317] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 674.672670][T18738] bridge0: port 1(bridge_slave_0) entered blocking state [ 674.725016][T18738] bridge0: port 1(bridge_slave_0) entered disabled state [ 674.753716][T18738] device bridge_slave_0 entered promiscuous mode [ 674.799636][T18738] bridge0: port 2(bridge_slave_1) entered blocking state [ 674.825887][T18738] bridge0: port 2(bridge_slave_1) entered disabled state [ 674.856732][T18738] device bridge_slave_1 entered promiscuous mode [ 677.316743][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 677.326158][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 677.438510][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 677.453316][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 677.502920][ T10] bridge0: port 1(bridge_slave_0) entered blocking state [ 677.509820][ T10] bridge0: port 1(bridge_slave_0) entered forwarding state [ 677.568104][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 677.608928][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 677.637605][ T10] bridge0: port 2(bridge_slave_1) entered blocking state [ 677.644525][ T10] bridge0: port 2(bridge_slave_1) entered forwarding state [ 677.763669][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 677.777616][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 678.488343][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 678.535432][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 678.724382][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 678.761656][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 678.852157][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 678.906733][T18738] device veth0_vlan entered promiscuous mode [ 678.988191][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 679.004146][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 679.033644][T18738] device veth1_macvtap entered promiscuous mode [ 679.158236][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 679.166844][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 679.175833][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 679.184660][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 679.193535][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 679.256100][ T43] device veth0 left promiscuous mode [ 679.273318][ T43] bridge0: port 3(veth0) entered disabled state [ 679.298089][ T43] device bridge_slave_1 left promiscuous mode [ 679.309653][ T43] bridge0: port 2(bridge_slave_1) entered disabled state [ 679.324104][ T43] device bridge_slave_0 left promiscuous mode [ 679.333935][ T43] bridge0: port 1(bridge_slave_0) entered disabled state [ 679.344133][ T43] device veth1_macvtap left promiscuous mode [ 679.602538][T18817] device pim6reg1 entered promiscuous mode [ 680.058549][T18841] device veth0_vlan left promiscuous mode [ 680.080055][T18841] device veth0_vlan entered promiscuous mode [ 680.324423][T18847] device veth0_vlan left promiscuous mode [ 680.358820][T18847] device veth0_vlan entered promiscuous mode [ 680.817517][T18855] bridge0: port 2(bridge_slave_1) entered disabled state [ 680.825924][T18855] bridge0: port 1(bridge_slave_0) entered disabled state [ 680.935943][T18855] bridge0: port 2(bridge_slave_1) entered blocking state [ 680.943130][T18855] bridge0: port 2(bridge_slave_1) entered forwarding state [ 680.951350][T18855] bridge0: port 1(bridge_slave_0) entered blocking state [ 680.958607][T18855] bridge0: port 1(bridge_slave_0) entered forwarding state [ 681.012885][T18855] device bridge0 entered promiscuous mode [ 681.981864][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 682.558844][T18910] device sit0 left promiscuous mode [ 682.600949][T18909] device sit0 entered promiscuous mode [ 683.133869][T18929] device veth0_vlan left promiscuous mode [ 683.149883][T18929] device veth0_vlan entered promiscuous mode [ 683.181558][ T7094] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 683.194947][ T7094] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 683.236426][ T7094] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 683.942730][T18955] device veth0_vlan left promiscuous mode [ 684.019529][T18955] device veth0_vlan entered promiscuous mode [ 684.508972][T18983] device pim6reg1 entered promiscuous mode [ 684.546405][T18982] device syzkaller0 entered promiscuous mode [ 685.510116][T19004] bridge0: port 2(bridge_slave_1) entered disabled state [ 685.517894][T19004] bridge0: port 1(bridge_slave_0) entered disabled state [ 685.589114][T19004] device bridge0 left promiscuous mode [ 688.351383][T19140] FAULT_INJECTION: forcing a failure. [ 688.351383][T19140] name failslab, interval 1, probability 0, space 0, times 0 [ 688.413200][T19140] CPU: 0 PID: 19140 Comm: syz.4.6319 Not tainted 6.1.129-syzkaller-00055-gca24c52e3c25 #0 [ 688.422964][T19140] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 688.432859][T19140] Call Trace: [ 688.435984][T19140] [ 688.438754][T19140] dump_stack_lvl+0x151/0x1b7 [ 688.443293][T19140] ? nf_tcp_handle_invalid+0x3f1/0x3f1 [ 688.448573][T19140] dump_stack+0x15/0x18 [ 688.452555][T19140] should_fail_ex+0x3d0/0x520 [ 688.457080][T19140] __should_failslab+0xaf/0xf0 [ 688.461783][T19140] ? security_prepare_creds+0x4d/0x140 [ 688.467077][T19140] should_failslab+0x9/0x20 [ 688.471416][T19140] __kmem_cache_alloc_node+0x3d/0x2a0 [ 688.476630][T19140] ? security_prepare_creds+0x4d/0x140 [ 688.481917][T19140] __kmalloc+0xa3/0x1e0 [ 688.485916][T19140] ? prepare_creds+0x2f/0x6a0 [ 688.490427][T19140] security_prepare_creds+0x4d/0x140 [ 688.495596][T19140] prepare_creds+0x472/0x6a0 [ 688.499974][T19140] copy_creds+0xf0/0x630 [ 688.504056][T19140] copy_process+0x855/0x3530 [ 688.508484][T19140] ? __kasan_check_write+0x14/0x20 [ 688.513429][T19140] ? proc_fail_nth_write+0x20b/0x290 [ 688.518779][T19140] ? proc_fail_nth_read+0x210/0x210 [ 688.523760][T19140] ? fsnotify_perm+0x6a/0x5b0 [ 688.528272][T19140] ? idle_dummy+0x10/0x10 [ 688.532439][T19140] ? vfs_write+0x952/0xed0 [ 688.536687][T19140] ? __kasan_slab_free+0x11/0x20 [ 688.541463][T19140] kernel_clone+0x229/0x890 [ 688.545798][T19140] ? __kasan_check_write+0x14/0x20 [ 688.550747][T19140] ? mutex_unlock+0xb2/0x260 [ 688.555174][T19140] ? create_io_thread+0x180/0x180 [ 688.560037][T19140] __x64_sys_clone+0x231/0x280 [ 688.564647][T19140] ? __do_sys_vfork+0x110/0x110 [ 688.569325][T19140] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 688.575225][T19140] ? exit_to_user_mode_prepare+0x39/0xa0 [ 688.580689][T19140] x64_sys_call+0x1b0/0x9a0 [ 688.585029][T19140] do_syscall_64+0x3b/0xb0 [ 688.589284][T19140] ? clear_bhb_loop+0x55/0xb0 [ 688.593796][T19140] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 688.599526][T19140] RIP: 0033:0x7f3d3c18d169 [ 688.603780][T19140] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 688.623223][T19140] RSP: 002b:00007f3d3d002fe8 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 688.631463][T19140] RAX: ffffffffffffffda RBX: 00007f3d3c3a5fa0 RCX: 00007f3d3c18d169 [ 688.639275][T19140] RDX: 0000000000000000 RSI: 0000000000009000 RDI: 0000000004021400 [ 688.647089][T19140] RBP: 00007f3d3d003090 R08: 0000000000000000 R09: 0000000000000000 [ 688.654897][T19140] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000001 [ 688.662714][T19140] R13: 0000000000000000 R14: 00007f3d3c3a5fa0 R15: 00007ffc5a411998 [ 688.670527][T19140] [ 690.263347][T19216] device pim6reg1 entered promiscuous mode [ 690.912374][T19249] device pim6reg1 entered promiscuous mode [ 690.939434][T19254] device sit0 left promiscuous mode [ 696.628949][T19437] device veth1_macvtap left promiscuous mode [ 696.639258][T19437] device macsec0 entered promiscuous mode [ 697.698848][T19482] device syzkaller0 entered promiscuous mode [ 697.935354][T19510] FAULT_INJECTION: forcing a failure. [ 697.935354][T19510] name failslab, interval 1, probability 0, space 0, times 0 [ 697.992010][T19510] CPU: 0 PID: 19510 Comm: syz.4.6441 Not tainted 6.1.129-syzkaller-00055-gca24c52e3c25 #0 [ 698.001757][T19510] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 698.011647][T19510] Call Trace: [ 698.014771][T19510] [ 698.017562][T19510] dump_stack_lvl+0x151/0x1b7 [ 698.022065][T19510] ? nf_tcp_handle_invalid+0x3f1/0x3f1 [ 698.027368][T19510] dump_stack+0x15/0x18 [ 698.031352][T19510] should_fail_ex+0x3d0/0x520 [ 698.035869][T19510] __should_failslab+0xaf/0xf0 [ 698.040472][T19510] ? alloc_perf_context+0x5a/0x300 [ 698.045414][T19510] should_failslab+0x9/0x20 [ 698.049749][T19510] __kmem_cache_alloc_node+0x3d/0x2a0 [ 698.054964][T19510] ? alloc_perf_context+0x5a/0x300 [ 698.059907][T19510] kmalloc_trace+0x2a/0xa0 [ 698.064158][T19510] alloc_perf_context+0x5a/0x300 [ 698.068933][T19510] find_get_context+0x267/0x9c0 [ 698.073624][T19510] ? perf_event_alloc+0x1840/0x1840 [ 698.078658][T19510] __se_sys_perf_event_open+0xcd9/0x3d60 [ 698.084129][T19510] ? __mutex_lock_slowpath+0x1/0x10 [ 698.089153][T19510] ? __x64_sys_perf_event_open+0xd0/0xd0 [ 698.094623][T19510] ? fput+0x15b/0x1b0 [ 698.098458][T19510] ? __ia32_sys_read+0x90/0x90 [ 698.103039][T19510] ? debug_smp_processor_id+0x17/0x20 [ 698.108247][T19510] __x64_sys_perf_event_open+0xbf/0xd0 [ 698.113545][T19510] x64_sys_call+0x7de/0x9a0 [ 698.117885][T19510] do_syscall_64+0x3b/0xb0 [ 698.122135][T19510] ? clear_bhb_loop+0x55/0xb0 [ 698.126738][T19510] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 698.132463][T19510] RIP: 0033:0x7f3d3c18d169 [ 698.136715][T19510] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 698.156164][T19510] RSP: 002b:00007f3d3d003038 EFLAGS: 00000246 ORIG_RAX: 000000000000012a [ 698.164680][T19510] RAX: ffffffffffffffda RBX: 00007f3d3c3a5fa0 RCX: 00007f3d3c18d169 [ 698.172488][T19510] RDX: bfffffffffffffff RSI: 0000000000000000 RDI: 0000200000000180 [ 698.180301][T19510] RBP: 00007f3d3d003090 R08: 0000000000000000 R09: 0000000000000000 [ 698.188108][T19510] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000001 [ 698.195925][T19510] R13: 0000000000000000 R14: 00007f3d3c3a5fa0 R15: 00007ffc5a411998 [ 698.203842][T19510] [ 698.723855][T19541] device syzkaller0 entered promiscuous mode [ 698.818391][T19550] device sit0 entered promiscuous mode [ 699.164818][T19564] FAULT_INJECTION: forcing a failure. [ 699.164818][T19564] name failslab, interval 1, probability 0, space 0, times 0 [ 699.193744][T19564] CPU: 1 PID: 19564 Comm: syz.3.6459 Not tainted 6.1.129-syzkaller-00055-gca24c52e3c25 #0 [ 699.203491][T19564] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 699.213411][T19564] Call Trace: [ 699.216512][T19564] [ 699.219550][T19564] dump_stack_lvl+0x151/0x1b7 [ 699.224147][T19564] ? nf_tcp_handle_invalid+0x3f1/0x3f1 [ 699.229445][T19564] dump_stack+0x15/0x18 [ 699.233428][T19564] should_fail_ex+0x3d0/0x520 [ 699.237948][T19564] __should_failslab+0xaf/0xf0 [ 699.242550][T19564] should_failslab+0x9/0x20 [ 699.246886][T19564] slab_pre_alloc_hook+0x2e/0x1b0 [ 699.251751][T19564] kmem_cache_alloc_lru+0x49/0x270 [ 699.256696][T19564] ? __d_alloc+0x34/0x700 [ 699.260869][T19564] __d_alloc+0x34/0x700 [ 699.264852][T19564] ? mutex_unlock+0xb2/0x260 [ 699.269283][T19564] d_alloc_pseudo+0x1d/0x70 [ 699.273617][T19564] alloc_file_pseudo+0x131/0x2f0 [ 699.278393][T19564] ? alloc_empty_file_noaccount+0x80/0x80 [ 699.283953][T19564] anon_inode_getfile+0xa7/0x180 [ 699.288724][T19564] __se_sys_perf_event_open+0x1006/0x3d60 [ 699.294280][T19564] ? __mutex_lock_slowpath+0x1/0x10 [ 699.299323][T19564] ? __x64_sys_perf_event_open+0xd0/0xd0 [ 699.304776][T19564] ? fput+0x15b/0x1b0 [ 699.308604][T19564] ? __ia32_sys_read+0x90/0x90 [ 699.313192][T19564] ? debug_smp_processor_id+0x17/0x20 [ 699.318398][T19564] __x64_sys_perf_event_open+0xbf/0xd0 [ 699.323693][T19564] x64_sys_call+0x7de/0x9a0 [ 699.328033][T19564] do_syscall_64+0x3b/0xb0 [ 699.332313][T19564] ? clear_bhb_loop+0x55/0xb0 [ 699.336799][T19564] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 699.342527][T19564] RIP: 0033:0x7ffa82f8d169 [ 699.346778][T19564] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 699.366223][T19564] RSP: 002b:00007ffa83dca038 EFLAGS: 00000246 ORIG_RAX: 000000000000012a [ 699.374464][T19564] RAX: ffffffffffffffda RBX: 00007ffa831a5fa0 RCX: 00007ffa82f8d169 [ 699.382420][T19564] RDX: bfffffffffffffff RSI: 0000000000000000 RDI: 0000200000000180 [ 699.390229][T19564] RBP: 00007ffa83dca090 R08: 0000000000000000 R09: 0000000000000000 [ 699.398041][T19564] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000001 [ 699.405850][T19564] R13: 0000000000000000 R14: 00007ffa831a5fa0 R15: 00007ffe48c53ca8 [ 699.413672][T19564] [ 699.698295][T19585] device syzkaller0 entered promiscuous mode [ 699.873081][T19601] FAULT_INJECTION: forcing a failure. [ 699.873081][T19601] name failslab, interval 1, probability 0, space 0, times 0 [ 700.002550][T19601] CPU: 0 PID: 19601 Comm: syz.2.6472 Not tainted 6.1.129-syzkaller-00055-gca24c52e3c25 #0 [ 700.012305][T19601] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 700.022198][T19601] Call Trace: [ 700.025318][T19601] [ 700.028117][T19601] dump_stack_lvl+0x151/0x1b7 [ 700.032613][T19601] ? nf_tcp_handle_invalid+0x3f1/0x3f1 [ 700.037904][T19601] dump_stack+0x15/0x18 [ 700.041895][T19601] should_fail_ex+0x3d0/0x520 [ 700.046415][T19601] ? vm_area_dup+0x65/0x290 [ 700.051010][T19601] __should_failslab+0xaf/0xf0 [ 700.055757][T19601] should_failslab+0x9/0x20 [ 700.060096][T19601] kmem_cache_alloc+0x3b/0x320 [ 700.064820][T19601] vm_area_dup+0x65/0x290 [ 700.069070][T19601] copy_mm+0xd19/0x1bc0 [ 700.073067][T19601] ? copy_signal+0x650/0x650 [ 700.077488][T19601] ? _raw_spin_lock+0xa4/0x1b0 [ 700.082091][T19601] ? __init_rwsem+0x130/0x240 [ 700.086603][T19601] ? copy_signal+0x503/0x650 [ 700.091029][T19601] copy_process+0x12b6/0x3530 [ 700.095540][T19601] ? __kasan_check_write+0x14/0x20 [ 700.100490][T19601] ? proc_fail_nth_write+0x20b/0x290 [ 700.105616][T19601] ? idle_dummy+0x10/0x10 [ 700.109774][T19601] ? vfs_write+0x952/0xed0 [ 700.114032][T19601] ? __kasan_slab_free+0x11/0x20 [ 700.118801][T19601] kernel_clone+0x229/0x890 [ 700.123143][T19601] ? __kasan_check_write+0x14/0x20 [ 700.128089][T19601] ? mutex_unlock+0xb2/0x260 [ 700.132517][T19601] ? create_io_thread+0x180/0x180 [ 700.137379][T19601] __x64_sys_clone+0x231/0x280 [ 700.141973][T19601] ? __do_sys_vfork+0x110/0x110 [ 700.147270][T19601] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 700.153189][T19601] ? exit_to_user_mode_prepare+0x39/0xa0 [ 700.158641][T19601] x64_sys_call+0x1b0/0x9a0 [ 700.162979][T19601] do_syscall_64+0x3b/0xb0 [ 700.167233][T19601] ? clear_bhb_loop+0x55/0xb0 [ 700.171741][T19601] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 700.177469][T19601] RIP: 0033:0x7f402df8d169 [ 700.181728][T19601] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 700.201173][T19601] RSP: 002b:00007f402ee11fe8 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 700.209411][T19601] RAX: ffffffffffffffda RBX: 00007f402e1a5fa0 RCX: 00007f402df8d169 [ 700.217224][T19601] RDX: 0000000000000000 RSI: 0000000000009000 RDI: 0000000004021400 [ 700.225036][T19601] RBP: 00007f402ee12090 R08: 0000000000000000 R09: 0000000000000000 [ 700.232842][T19601] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000002 [ 700.240655][T19601] R13: 0000000000000000 R14: 00007f402e1a5fa0 R15: 00007fff170fa1c8 [ 700.248473][T19601] [ 700.346601][T19608] FAULT_INJECTION: forcing a failure. [ 700.346601][T19608] name failslab, interval 1, probability 0, space 0, times 0 [ 700.369240][T19608] CPU: 0 PID: 19608 Comm: syz.0.6474 Not tainted 6.1.129-syzkaller-00055-gca24c52e3c25 #0 [ 700.378988][T19608] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 700.388878][T19608] Call Trace: [ 700.392004][T19608] [ 700.394778][T19608] dump_stack_lvl+0x151/0x1b7 [ 700.399428][T19608] ? nf_tcp_handle_invalid+0x3f1/0x3f1 [ 700.404734][T19608] dump_stack+0x15/0x18 [ 700.408711][T19608] should_fail_ex+0x3d0/0x520 [ 700.413225][T19608] ? __alloc_file+0x29/0x2a0 [ 700.417649][T19608] __should_failslab+0xaf/0xf0 [ 700.422272][T19608] should_failslab+0x9/0x20 [ 700.426627][T19608] kmem_cache_alloc+0x3b/0x320 [ 700.431189][T19608] ? _raw_spin_trylock_bh+0x190/0x190 [ 700.436412][T19608] __alloc_file+0x29/0x2a0 [ 700.440654][T19608] alloc_empty_file+0x95/0x180 [ 700.445256][T19608] alloc_file+0x5a/0x5e0 [ 700.449329][T19608] alloc_file_pseudo+0x259/0x2f0 [ 700.454104][T19608] ? alloc_empty_file_noaccount+0x80/0x80 [ 700.459750][T19608] anon_inode_getfile+0xa7/0x180 [ 700.464529][T19608] __se_sys_perf_event_open+0x1006/0x3d60 [ 700.470082][T19608] ? __mutex_lock_slowpath+0x1/0x10 [ 700.475112][T19608] ? __x64_sys_perf_event_open+0xd0/0xd0 [ 700.480576][T19608] ? fput+0x15b/0x1b0 [ 700.484395][T19608] ? __ia32_sys_read+0x90/0x90 [ 700.488994][T19608] ? debug_smp_processor_id+0x17/0x20 [ 700.494204][T19608] __x64_sys_perf_event_open+0xbf/0xd0 [ 700.499497][T19608] x64_sys_call+0x7de/0x9a0 [ 700.503843][T19608] do_syscall_64+0x3b/0xb0 [ 700.508089][T19608] ? clear_bhb_loop+0x55/0xb0 [ 700.512605][T19608] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 700.518353][T19608] RIP: 0033:0x7f8aa3d8d169 [ 700.522581][T19608] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 700.542029][T19608] RSP: 002b:00007f8aa4bd8038 EFLAGS: 00000246 ORIG_RAX: 000000000000012a [ 700.550269][T19608] RAX: ffffffffffffffda RBX: 00007f8aa3fa6080 RCX: 00007f8aa3d8d169 [ 700.558082][T19608] RDX: bfffffffffffffff RSI: 0000000000000000 RDI: 0000200000000180 [ 700.565893][T19608] RBP: 00007f8aa4bd8090 R08: 0000000000000000 R09: 0000000000000000 [ 700.573702][T19608] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000001 [ 700.581515][T19608] R13: 0000000000000000 R14: 00007f8aa3fa6080 R15: 00007ffe9024d138 [ 700.589332][T19608] [ 700.900086][T19616] device pim6reg1 entered promiscuous mode [ 701.202691][T19649] FAULT_INJECTION: forcing a failure. [ 701.202691][T19649] name failslab, interval 1, probability 0, space 0, times 0 [ 701.223206][T19649] CPU: 1 PID: 19649 Comm: syz.2.6488 Not tainted 6.1.129-syzkaller-00055-gca24c52e3c25 #0 [ 701.232957][T19649] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 701.242943][T19649] Call Trace: [ 701.246061][T19649] [ 701.248842][T19649] dump_stack_lvl+0x151/0x1b7 [ 701.253361][T19649] ? nf_tcp_handle_invalid+0x3f1/0x3f1 [ 701.258741][T19649] dump_stack+0x15/0x18 [ 701.262728][T19649] should_fail_ex+0x3d0/0x520 [ 701.267244][T19649] __should_failslab+0xaf/0xf0 [ 701.271840][T19649] ? selinux_perf_event_alloc+0x51/0x140 [ 701.277315][T19649] should_failslab+0x9/0x20 [ 701.281648][T19649] __kmem_cache_alloc_node+0x3d/0x2a0 [ 701.286855][T19649] ? __mutex_lock_slowpath+0x10/0x10 [ 701.291975][T19649] ? selinux_perf_event_alloc+0x51/0x140 [ 701.297446][T19649] kmalloc_trace+0x2a/0xa0 [ 701.301695][T19649] selinux_perf_event_alloc+0x51/0x140 [ 701.307002][T19649] security_perf_event_alloc+0x62/0x90 [ 701.312288][T19649] perf_event_alloc+0x1544/0x1840 [ 701.317151][T19649] __se_sys_perf_event_open+0xb27/0x3d60 [ 701.322616][T19649] ? __mutex_lock_slowpath+0x1/0x10 [ 701.327650][T19649] ? __x64_sys_perf_event_open+0xd0/0xd0 [ 701.333112][T19649] ? fput+0x15b/0x1b0 [ 701.337025][T19649] ? __ia32_sys_read+0x90/0x90 [ 701.341619][T19649] ? debug_smp_processor_id+0x17/0x20 [ 701.346826][T19649] __x64_sys_perf_event_open+0xbf/0xd0 [ 701.352207][T19649] x64_sys_call+0x7de/0x9a0 [ 701.356546][T19649] do_syscall_64+0x3b/0xb0 [ 701.360805][T19649] ? clear_bhb_loop+0x55/0xb0 [ 701.365321][T19649] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 701.371049][T19649] RIP: 0033:0x7f402df8d169 [ 701.375382][T19649] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 701.394912][T19649] RSP: 002b:00007f402ee12038 EFLAGS: 00000246 ORIG_RAX: 000000000000012a [ 701.403155][T19649] RAX: ffffffffffffffda RBX: 00007f402e1a5fa0 RCX: 00007f402df8d169 [ 701.410968][T19649] RDX: bfffffffffffffff RSI: 0000000000000000 RDI: 0000200000000180 [ 701.418780][T19649] RBP: 00007f402ee12090 R08: 0000000000000000 R09: 0000000000000000 [ 701.426590][T19649] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000001 [ 701.434414][T19649] R13: 0000000000000000 R14: 00007f402e1a5fa0 R15: 00007fff170fa1c8 [ 701.442218][T19649] [ 701.757202][T19689] FAULT_INJECTION: forcing a failure. [ 701.757202][T19689] name failslab, interval 1, probability 0, space 0, times 0 [ 701.769793][T19689] CPU: 0 PID: 19689 Comm: syz.3.6500 Not tainted 6.1.129-syzkaller-00055-gca24c52e3c25 #0 [ 701.779537][T19689] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 701.789515][T19689] Call Trace: [ 701.792639][T19689] [ 701.795416][T19689] dump_stack_lvl+0x151/0x1b7 [ 701.799930][T19689] ? nf_tcp_handle_invalid+0x3f1/0x3f1 [ 701.805224][T19689] ? pfn_valid+0x1e0/0x1e0 [ 701.809475][T19689] ? mas_wr_store_entry+0x492/0x730 [ 701.814507][T19689] dump_stack+0x15/0x18 [ 701.818498][T19689] should_fail_ex+0x3d0/0x520 [ 701.823014][T19689] ? vm_area_dup+0x27/0x290 [ 701.827352][T19689] __should_failslab+0xaf/0xf0 [ 701.831953][T19689] should_failslab+0x9/0x20 [ 701.836294][T19689] kmem_cache_alloc+0x3b/0x320 [ 701.840894][T19689] vm_area_dup+0x27/0x290 [ 701.845147][T19689] ? copy_mm+0xc8f/0x1bc0 [ 701.849403][T19689] copy_mm+0xd19/0x1bc0 [ 701.853401][T19689] ? copy_signal+0x650/0x650 [ 701.857815][T19689] ? _raw_spin_lock+0xa4/0x1b0 [ 701.862418][T19689] ? __init_rwsem+0x130/0x240 [ 701.866930][T19689] ? copy_signal+0x503/0x650 [ 701.871360][T19689] copy_process+0x12b6/0x3530 [ 701.875873][T19689] ? __kasan_check_write+0x14/0x20 [ 701.880816][T19689] ? proc_fail_nth_write+0x20b/0x290 [ 701.885940][T19689] ? idle_dummy+0x10/0x10 [ 701.890105][T19689] ? vfs_write+0x952/0xed0 [ 701.894360][T19689] ? __kasan_slab_free+0x11/0x20 [ 701.899142][T19689] kernel_clone+0x229/0x890 [ 701.903470][T19689] ? __kasan_check_write+0x14/0x20 [ 701.908507][T19689] ? mutex_unlock+0xb2/0x260 [ 701.912927][T19689] ? create_io_thread+0x180/0x180 [ 701.917794][T19689] __x64_sys_clone+0x231/0x280 [ 701.922395][T19689] ? __do_sys_vfork+0x110/0x110 [ 701.927079][T19689] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 701.932981][T19689] ? exit_to_user_mode_prepare+0x39/0xa0 [ 701.938451][T19689] x64_sys_call+0x1b0/0x9a0 [ 701.942961][T19689] do_syscall_64+0x3b/0xb0 [ 701.947302][T19689] ? clear_bhb_loop+0x55/0xb0 [ 701.951816][T19689] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 701.957541][T19689] RIP: 0033:0x7ffa82f8d169 [ 701.961800][T19689] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 701.981255][T19689] RSP: 002b:00007ffa83dc9fe8 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 701.989485][T19689] RAX: ffffffffffffffda RBX: 00007ffa831a5fa0 RCX: 00007ffa82f8d169 [ 701.997294][T19689] RDX: 0000000000000000 RSI: 0000000000009000 RDI: 0000000004021400 [ 702.005105][T19689] RBP: 00007ffa83dca090 R08: 0000000000000000 R09: 0000000000000000 [ 702.012914][T19689] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000002 [ 702.020736][T19689] R13: 0000000000000000 R14: 00007ffa831a5fa0 R15: 00007ffe48c53ca8 [ 702.028541][T19689] [ 702.393509][T19712] FAULT_INJECTION: forcing a failure. [ 702.393509][T19712] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 702.485364][T19712] CPU: 0 PID: 19712 Comm: syz.2.6510 Not tainted 6.1.129-syzkaller-00055-gca24c52e3c25 #0 [ 702.495205][T19712] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 702.505100][T19712] Call Trace: [ 702.508218][T19712] [ 702.511145][T19712] dump_stack_lvl+0x151/0x1b7 [ 702.515651][T19712] ? nf_tcp_handle_invalid+0x3f1/0x3f1 [ 702.521029][T19712] dump_stack+0x15/0x18 [ 702.525019][T19712] should_fail_ex+0x3d0/0x520 [ 702.529529][T19712] should_fail+0xb/0x10 [ 702.533518][T19712] should_fail_usercopy+0x1a/0x20 [ 702.538384][T19712] _copy_to_user+0x1e/0x90 [ 702.542634][T19712] simple_read_from_buffer+0xc7/0x150 [ 702.547847][T19712] proc_fail_nth_read+0x1a3/0x210 [ 702.552709][T19712] ? proc_fault_inject_write+0x390/0x390 [ 702.558179][T19712] ? fsnotify_perm+0x269/0x5b0 [ 702.562896][T19712] ? security_file_permission+0x86/0xb0 [ 702.568278][T19712] ? proc_fault_inject_write+0x390/0x390 [ 702.573745][T19712] vfs_read+0x26c/0xae0 [ 702.577744][T19712] ? kernel_read+0x1f0/0x1f0 [ 702.582160][T19712] ? mutex_lock+0xb1/0x1e0 [ 702.586425][T19712] ? bit_wait_io_timeout+0x120/0x120 [ 702.591539][T19712] ? __fdget_pos+0x2e2/0x390 [ 702.595965][T19712] ? ksys_read+0x77/0x2c0 [ 702.600134][T19712] ksys_read+0x199/0x2c0 [ 702.604214][T19712] ? vfs_write+0xed0/0xed0 [ 702.608465][T19712] ? debug_smp_processor_id+0x17/0x20 [ 702.613667][T19712] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 702.619571][T19712] __x64_sys_read+0x7b/0x90 [ 702.623914][T19712] x64_sys_call+0x28/0x9a0 [ 702.628166][T19712] do_syscall_64+0x3b/0xb0 [ 702.632419][T19712] ? clear_bhb_loop+0x55/0xb0 [ 702.636942][T19712] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 702.642663][T19712] RIP: 0033:0x7f402df8bb7c [ 702.646909][T19712] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 93 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 ef 93 02 00 48 [ 702.666754][T19712] RSP: 002b:00007f402ee12030 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 702.675005][T19712] RAX: ffffffffffffffda RBX: 00007f402e1a5fa0 RCX: 00007f402df8bb7c [ 702.682809][T19712] RDX: 000000000000000f RSI: 00007f402ee120a0 RDI: 0000000000000006 [ 702.690621][T19712] RBP: 00007f402ee12090 R08: 0000000000000000 R09: 0000000000000000 [ 702.698428][T19712] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000001 [ 702.706240][T19712] R13: 0000000000000000 R14: 00007f402e1a5fa0 R15: 00007fff170fa1c8 [ 702.714059][T19712] [ 703.351621][T19743] FAULT_INJECTION: forcing a failure. [ 703.351621][T19743] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 703.364880][T19743] CPU: 0 PID: 19743 Comm: syz.1.6517 Not tainted 6.1.129-syzkaller-00055-gca24c52e3c25 #0 [ 703.374626][T19743] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 703.384602][T19743] Call Trace: [ 703.387710][T19743] [ 703.390496][T19743] dump_stack_lvl+0x151/0x1b7 [ 703.395000][T19743] ? nf_tcp_handle_invalid+0x3f1/0x3f1 [ 703.400295][T19743] ? vfs_write+0x952/0xed0 [ 703.404552][T19743] dump_stack+0x15/0x18 [ 703.408542][T19743] should_fail_ex+0x3d0/0x520 [ 703.413055][T19743] should_fail+0xb/0x10 [ 703.417046][T19743] should_fail_usercopy+0x1a/0x20 [ 703.421912][T19743] _copy_from_user+0x1e/0xc0 [ 703.426336][T19743] __sys_bpf+0x23b/0x7f0 [ 703.430410][T19743] ? bpf_link_show_fdinfo+0x300/0x300 [ 703.435625][T19743] ? asm_sysvec_apic_timer_interrupt+0x1b/0x20 [ 703.441721][T19743] __x64_sys_bpf+0x7c/0x90 [ 703.445972][T19743] x64_sys_call+0x87f/0x9a0 [ 703.450310][T19743] do_syscall_64+0x3b/0xb0 [ 703.454559][T19743] ? clear_bhb_loop+0x55/0xb0 [ 703.459082][T19743] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 703.464805][T19743] RIP: 0033:0x7f8c4018d169 [ 703.469053][T19743] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 703.488497][T19743] RSP: 002b:00007f8c410a5038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 703.496744][T19743] RAX: ffffffffffffffda RBX: 00007f8c403a5fa0 RCX: 00007f8c4018d169 [ 703.504558][T19743] RDX: 0000000000000048 RSI: 0000200000000100 RDI: 0300000000000000 [ 703.512366][T19743] RBP: 00007f8c410a5090 R08: 0000000000000000 R09: 0000000000000000 [ 703.520176][T19743] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 703.527990][T19743] R13: 0000000000000000 R14: 00007f8c403a5fa0 R15: 00007ffdc331e648 [ 703.535938][T19743] [ 704.457554][T19799] device pim6reg1 entered promiscuous mode [ 705.269632][T19824] FAULT_INJECTION: forcing a failure. [ 705.269632][T19824] name failslab, interval 1, probability 0, space 0, times 0 [ 705.314977][T19824] CPU: 1 PID: 19824 Comm: syz.3.6546 Not tainted 6.1.129-syzkaller-00055-gca24c52e3c25 #0 [ 705.324730][T19824] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 705.334754][T19824] Call Trace: [ 705.337874][T19824] [ 705.340659][T19824] dump_stack_lvl+0x151/0x1b7 [ 705.345162][T19824] ? nf_tcp_handle_invalid+0x3f1/0x3f1 [ 705.350463][T19824] dump_stack+0x15/0x18 [ 705.354449][T19824] should_fail_ex+0x3d0/0x520 [ 705.358971][T19824] ? vm_area_dup+0x65/0x290 [ 705.363306][T19824] __should_failslab+0xaf/0xf0 [ 705.367906][T19824] should_failslab+0x9/0x20 [ 705.372245][T19824] kmem_cache_alloc+0x3b/0x320 [ 705.376850][T19824] vm_area_dup+0x65/0x290 [ 705.381012][T19824] copy_mm+0xd19/0x1bc0 [ 705.385013][T19824] ? copy_signal+0x650/0x650 [ 705.389426][T19824] ? _raw_spin_lock+0xa4/0x1b0 [ 705.394027][T19824] ? __init_rwsem+0x130/0x240 [ 705.398537][T19824] ? copy_signal+0x503/0x650 [ 705.402965][T19824] copy_process+0x12b6/0x3530 [ 705.407480][T19824] ? __kasan_check_write+0x14/0x20 [ 705.412425][T19824] ? proc_fail_nth_write+0x20b/0x290 [ 705.417549][T19824] ? idle_dummy+0x10/0x10 [ 705.421722][T19824] ? vfs_write+0x952/0xed0 [ 705.426098][T19824] ? __kasan_slab_free+0x11/0x20 [ 705.430871][T19824] kernel_clone+0x229/0x890 [ 705.435299][T19824] ? __kasan_check_write+0x14/0x20 [ 705.440243][T19824] ? mutex_unlock+0xb2/0x260 [ 705.444673][T19824] ? create_io_thread+0x180/0x180 [ 705.449632][T19824] __x64_sys_clone+0x231/0x280 [ 705.454231][T19824] ? __do_sys_vfork+0x110/0x110 [ 705.458909][T19824] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 705.464813][T19824] ? exit_to_user_mode_prepare+0x39/0xa0 [ 705.470274][T19824] x64_sys_call+0x1b0/0x9a0 [ 705.474610][T19824] do_syscall_64+0x3b/0xb0 [ 705.478866][T19824] ? clear_bhb_loop+0x55/0xb0 [ 705.483377][T19824] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 705.489105][T19824] RIP: 0033:0x7ffa82f8d169 [ 705.493358][T19824] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 705.512802][T19824] RSP: 002b:00007ffa83dc9fe8 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 705.521175][T19824] RAX: ffffffffffffffda RBX: 00007ffa831a5fa0 RCX: 00007ffa82f8d169 [ 705.528980][T19824] RDX: 0000000000000000 RSI: 0000000000009000 RDI: 0000000004021400 [ 705.536791][T19824] RBP: 00007ffa83dca090 R08: 0000000000000000 R09: 0000000000000000 [ 705.544601][T19824] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000002 [ 705.552411][T19824] R13: 0000000000000000 R14: 00007ffa831a5fa0 R15: 00007ffe48c53ca8 [ 705.560233][T19824] [ 705.784937][T19834] device pim6reg1 entered promiscuous mode [ 707.052474][T19896] FAULT_INJECTION: forcing a failure. [ 707.052474][T19896] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 707.114328][T19896] CPU: 0 PID: 19896 Comm: syz.3.6572 Not tainted 6.1.129-syzkaller-00055-gca24c52e3c25 #0 [ 707.124077][T19896] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 707.133975][T19896] Call Trace: [ 707.137091][T19896] [ 707.139870][T19896] dump_stack_lvl+0x151/0x1b7 [ 707.144387][T19896] ? nf_tcp_handle_invalid+0x3f1/0x3f1 [ 707.149679][T19896] ? __check_object_size+0x76/0x650 [ 707.154714][T19896] dump_stack+0x15/0x18 [ 707.158704][T19896] should_fail_ex+0x3d0/0x520 [ 707.163224][T19896] should_fail+0xb/0x10 [ 707.167211][T19896] should_fail_usercopy+0x1a/0x20 [ 707.172075][T19896] _copy_to_user+0x1e/0x90 [ 707.176325][T19896] simple_read_from_buffer+0xc7/0x150 [ 707.181538][T19896] proc_fail_nth_read+0x1a3/0x210 [ 707.186397][T19896] ? proc_fault_inject_write+0x390/0x390 [ 707.191866][T19896] ? fsnotify_perm+0x269/0x5b0 [ 707.196550][T19896] ? security_file_permission+0x86/0xb0 [ 707.201939][T19896] ? proc_fault_inject_write+0x390/0x390 [ 707.207395][T19896] vfs_read+0x26c/0xae0 [ 707.211388][T19896] ? kernel_read+0x1f0/0x1f0 [ 707.215810][T19896] ? mutex_lock+0xb1/0x1e0 [ 707.220068][T19896] ? bit_wait_io_timeout+0x120/0x120 [ 707.225188][T19896] ? __fdget_pos+0x2e2/0x390 [ 707.229613][T19896] ? ksys_read+0x77/0x2c0 [ 707.233781][T19896] ksys_read+0x199/0x2c0 [ 707.237861][T19896] ? vfs_write+0xed0/0xed0 [ 707.242113][T19896] ? asm_sysvec_apic_timer_interrupt+0x1b/0x20 [ 707.248212][T19896] __x64_sys_read+0x7b/0x90 [ 707.252526][T19896] x64_sys_call+0x28/0x9a0 [ 707.256779][T19896] do_syscall_64+0x3b/0xb0 [ 707.261053][T19896] ? clear_bhb_loop+0x55/0xb0 [ 707.265547][T19896] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 707.271285][T19896] RIP: 0033:0x7ffa82f8bb7c [ 707.275531][T19896] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 93 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 ef 93 02 00 48 [ 707.294970][T19896] RSP: 002b:00007ffa83dca030 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 707.303208][T19896] RAX: ffffffffffffffda RBX: 00007ffa831a5fa0 RCX: 00007ffa82f8bb7c [ 707.311025][T19896] RDX: 000000000000000f RSI: 00007ffa83dca0a0 RDI: 0000000000000007 [ 707.318841][T19896] RBP: 00007ffa83dca090 R08: 0000000000000000 R09: 0000000000000000 [ 707.326732][T19896] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 707.334544][T19896] R13: 0000000000000000 R14: 00007ffa831a5fa0 R15: 00007ffe48c53ca8 [ 707.342364][T19896] [ 707.706421][T19920] device pim6reg1 entered promiscuous mode [ 707.756963][T19926] FAULT_INJECTION: forcing a failure. [ 707.756963][T19926] name failslab, interval 1, probability 0, space 0, times 0 [ 707.769669][T19926] CPU: 0 PID: 19926 Comm: syz.0.6585 Not tainted 6.1.129-syzkaller-00055-gca24c52e3c25 #0 [ 707.779395][T19926] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 707.789286][T19926] Call Trace: [ 707.792412][T19926] [ 707.795190][T19926] dump_stack_lvl+0x151/0x1b7 [ 707.799701][T19926] ? nf_tcp_handle_invalid+0x3f1/0x3f1 [ 707.804991][T19926] ? kernel_clone+0x229/0x890 [ 707.809506][T19926] ? x64_sys_call+0x1b0/0x9a0 [ 707.814016][T19926] ? do_syscall_64+0x3b/0xb0 [ 707.818441][T19926] ? entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 707.824592][T19926] dump_stack+0x15/0x18 [ 707.828559][T19926] should_fail_ex+0x3d0/0x520 [ 707.833162][T19926] ? copy_mm+0x15b/0x1bc0 [ 707.837324][T19926] __should_failslab+0xaf/0xf0 [ 707.841926][T19926] should_failslab+0x9/0x20 [ 707.846265][T19926] kmem_cache_alloc+0x3b/0x320 [ 707.850865][T19926] copy_mm+0x15b/0x1bc0 [ 707.854859][T19926] ? kasan_save_alloc_info+0x1f/0x30 [ 707.859981][T19926] ? kasan_save_alloc_info+0x1f/0x30 [ 707.865102][T19926] ? __kasan_slab_alloc+0x6c/0x80 [ 707.869960][T19926] ? copy_signal+0x650/0x650 [ 707.874384][T19926] ? _raw_spin_lock+0xa4/0x1b0 [ 707.878987][T19926] ? memset+0x35/0x40 [ 707.882804][T19926] ? __init_rwsem+0x130/0x240 [ 707.887319][T19926] ? copy_signal+0x503/0x650 [ 707.891743][T19926] copy_process+0x12b6/0x3530 [ 707.896259][T19926] ? __kasan_check_write+0x14/0x20 [ 707.901202][T19926] ? proc_fail_nth_write+0x20b/0x290 [ 707.906327][T19926] ? idle_dummy+0x10/0x10 [ 707.910667][T19926] ? vfs_write+0x952/0xed0 [ 707.914917][T19926] ? __kasan_slab_free+0x11/0x20 [ 707.919691][T19926] kernel_clone+0x229/0x890 [ 707.924030][T19926] ? __kasan_check_write+0x14/0x20 [ 707.928978][T19926] ? mutex_unlock+0xb2/0x260 [ 707.933409][T19926] ? create_io_thread+0x180/0x180 [ 707.938271][T19926] __x64_sys_clone+0x231/0x280 [ 707.942864][T19926] ? __do_sys_vfork+0x110/0x110 [ 707.947582][T19926] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 707.953453][T19926] ? exit_to_user_mode_prepare+0x39/0xa0 [ 707.958919][T19926] x64_sys_call+0x1b0/0x9a0 [ 707.963262][T19926] do_syscall_64+0x3b/0xb0 [ 707.967577][T19926] ? clear_bhb_loop+0x55/0xb0 [ 707.972041][T19926] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 707.977792][T19926] RIP: 0033:0x7f8aa3d8d169 [ 707.982023][T19926] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 708.001450][T19926] RSP: 002b:00007f8aa4bf8fe8 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 708.009693][T19926] RAX: ffffffffffffffda RBX: 00007f8aa3fa5fa0 RCX: 00007f8aa3d8d169 [ 708.017557][T19926] RDX: 0000000000000000 RSI: 0000000000009000 RDI: 0000000004021400 [ 708.025315][T19926] RBP: 00007f8aa4bf9090 R08: 0000000000000000 R09: 0000000000000000 [ 708.033129][T19926] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000002 [ 708.040937][T19926] R13: 0000000000000000 R14: 00007f8aa3fa5fa0 R15: 00007ffe9024d138 [ 708.048760][T19926] [ 708.139320][T19928] bond_slave_1: mtu less than device minimum [ 708.169649][T19934] device syzkaller0 entered promiscuous mode [ 708.610985][T19968] FAULT_INJECTION: forcing a failure. [ 708.610985][T19968] name failslab, interval 1, probability 0, space 0, times 0 [ 708.643801][T19968] CPU: 0 PID: 19968 Comm: syz.3.6600 Not tainted 6.1.129-syzkaller-00055-gca24c52e3c25 #0 [ 708.653560][T19968] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 708.663465][T19968] Call Trace: [ 708.666579][T19968] [ 708.669348][T19968] dump_stack_lvl+0x151/0x1b7 [ 708.673859][T19968] ? nf_tcp_handle_invalid+0x3f1/0x3f1 [ 708.679159][T19968] ? vma_interval_tree_augment_rotate+0x1d0/0x1d0 [ 708.685402][T19968] dump_stack+0x15/0x18 [ 708.689399][T19968] should_fail_ex+0x3d0/0x520 [ 708.693908][T19968] ? anon_vma_fork+0x1d6/0x4d0 [ 708.698506][T19968] __should_failslab+0xaf/0xf0 [ 708.703115][T19968] should_failslab+0x9/0x20 [ 708.707447][T19968] kmem_cache_alloc+0x3b/0x320 [ 708.712044][T19968] ? anon_vma_fork+0xee/0x4d0 [ 708.716571][T19968] anon_vma_fork+0x1d6/0x4d0 [ 708.720994][T19968] copy_mm+0xdcb/0x1bc0 [ 708.724986][T19968] ? copy_signal+0x650/0x650 [ 708.729406][T19968] ? _raw_spin_lock+0xa4/0x1b0 [ 708.734011][T19968] ? __init_rwsem+0x130/0x240 [ 708.738525][T19968] ? copy_signal+0x503/0x650 [ 708.742949][T19968] copy_process+0x12b6/0x3530 [ 708.747559][T19968] ? __kasan_check_write+0x14/0x20 [ 708.752497][T19968] ? proc_fail_nth_write+0x20b/0x290 [ 708.757618][T19968] ? idle_dummy+0x10/0x10 [ 708.761781][T19968] ? vfs_write+0x952/0xed0 [ 708.766035][T19968] ? __kasan_slab_free+0x11/0x20 [ 708.770815][T19968] kernel_clone+0x229/0x890 [ 708.775150][T19968] ? __kasan_check_write+0x14/0x20 [ 708.780092][T19968] ? mutex_unlock+0xb2/0x260 [ 708.784522][T19968] ? create_io_thread+0x180/0x180 [ 708.789384][T19968] __x64_sys_clone+0x231/0x280 [ 708.793982][T19968] ? __do_sys_vfork+0x110/0x110 [ 708.798669][T19968] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 708.804572][T19968] ? exit_to_user_mode_prepare+0x39/0xa0 [ 708.810041][T19968] x64_sys_call+0x1b0/0x9a0 [ 708.814377][T19968] do_syscall_64+0x3b/0xb0 [ 708.818626][T19968] ? clear_bhb_loop+0x55/0xb0 [ 708.823143][T19968] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 708.828870][T19968] RIP: 0033:0x7ffa82f8d169 [ 708.833126][T19968] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 708.852566][T19968] RSP: 002b:00007ffa83dc9fe8 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 708.860805][T19968] RAX: ffffffffffffffda RBX: 00007ffa831a5fa0 RCX: 00007ffa82f8d169 [ 708.868622][T19968] RDX: 0000000000000000 RSI: 0000000000009000 RDI: 0000000004021400 [ 708.876432][T19968] RBP: 00007ffa83dca090 R08: 0000000000000000 R09: 0000000000000000 [ 708.884241][T19968] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000002 [ 708.892051][T19968] R13: 0000000000000000 R14: 00007ffa831a5fa0 R15: 00007ffe48c53ca8 [ 708.899868][T19968] [ 709.068725][T19986] device sit0 entered promiscuous mode [ 709.213469][T19989] device syzkaller0 entered promiscuous mode [ 710.408076][T20027] FAULT_INJECTION: forcing a failure. [ 710.408076][T20027] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 710.421222][T20027] CPU: 1 PID: 20027 Comm: syz.1.6616 Not tainted 6.1.129-syzkaller-00055-gca24c52e3c25 #0 [ 710.430949][T20027] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 710.440847][T20027] Call Trace: [ 710.443962][T20027] [ 710.446738][T20027] dump_stack_lvl+0x151/0x1b7 [ 710.451255][T20027] ? nf_tcp_handle_invalid+0x3f1/0x3f1 [ 710.456554][T20027] dump_stack+0x15/0x18 [ 710.460542][T20027] should_fail_ex+0x3d0/0x520 [ 710.465053][T20027] should_fail_alloc_page+0x68/0x90 [ 710.470091][T20027] prepare_alloc_pages+0x13b/0x6d0 [ 710.475036][T20027] ? __alloc_pages_bulk+0xcd0/0xcd0 [ 710.480072][T20027] __alloc_pages+0x162/0x610 [ 710.484494][T20027] ? prep_new_page+0x110/0x110 [ 710.489099][T20027] ? kasan_save_alloc_info+0x1f/0x30 [ 710.494215][T20027] ? __kasan_slab_alloc+0x6c/0x80 [ 710.499072][T20027] __get_free_pages+0xe/0x30 [ 710.503499][T20027] pgd_alloc+0x21/0x2c0 [ 710.507492][T20027] mm_init+0x501/0x960 [ 710.511406][T20027] copy_mm+0x1b1/0x1bc0 [ 710.515395][T20027] ? kasan_save_alloc_info+0x1f/0x30 [ 710.520523][T20027] ? kasan_save_alloc_info+0x1f/0x30 [ 710.525633][T20027] ? __kasan_slab_alloc+0x6c/0x80 [ 710.530494][T20027] ? copy_signal+0x650/0x650 [ 710.534915][T20027] ? _raw_spin_lock+0xa4/0x1b0 [ 710.539517][T20027] ? memset+0x35/0x40 [ 710.543337][T20027] ? __init_rwsem+0x130/0x240 [ 710.547853][T20027] ? copy_signal+0x503/0x650 [ 710.552277][T20027] copy_process+0x12b6/0x3530 [ 710.556792][T20027] ? __kasan_check_write+0x14/0x20 [ 710.561735][T20027] ? proc_fail_nth_write+0x20b/0x290 [ 710.566859][T20027] ? idle_dummy+0x10/0x10 [ 710.571022][T20027] ? vfs_write+0x952/0xed0 [ 710.575273][T20027] ? __kasan_slab_free+0x11/0x20 [ 710.580049][T20027] kernel_clone+0x229/0x890 [ 710.584391][T20027] ? __kasan_check_write+0x14/0x20 [ 710.589348][T20027] ? mutex_unlock+0xb2/0x260 [ 710.593760][T20027] ? create_io_thread+0x180/0x180 [ 710.598626][T20027] __x64_sys_clone+0x231/0x280 [ 710.603224][T20027] ? __do_sys_vfork+0x110/0x110 [ 710.607911][T20027] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 710.613813][T20027] ? exit_to_user_mode_prepare+0x39/0xa0 [ 710.619283][T20027] x64_sys_call+0x1b0/0x9a0 [ 710.623618][T20027] do_syscall_64+0x3b/0xb0 [ 710.627873][T20027] ? clear_bhb_loop+0x55/0xb0 [ 710.632387][T20027] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 710.638111][T20027] RIP: 0033:0x7f8c4018d169 [ 710.642367][T20027] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 710.661897][T20027] RSP: 002b:00007f8c410a4fe8 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 710.670138][T20027] RAX: ffffffffffffffda RBX: 00007f8c403a5fa0 RCX: 00007f8c4018d169 [ 710.678038][T20027] RDX: 0000000000000000 RSI: 0000000000009000 RDI: 0000000004021400 [ 710.685846][T20027] RBP: 00007f8c410a5090 R08: 0000000000000000 R09: 0000000000000000 [ 710.693658][T20027] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000002 [ 710.701475][T20027] R13: 0000000000000000 R14: 00007f8c403a5fa0 R15: 00007ffdc331e648 [ 710.709331][T20027] [ 710.875827][T20036] device syzkaller0 entered promiscuous mode [ 714.027108][T20067] FAULT_INJECTION: forcing a failure. [ 714.027108][T20067] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 714.037970][T20059] device syzkaller0 entered promiscuous mode [ 714.080674][T20067] CPU: 0 PID: 20067 Comm: syz.1.6630 Not tainted 6.1.129-syzkaller-00055-gca24c52e3c25 #0 [ 714.090434][T20067] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 714.100325][T20067] Call Trace: [ 714.103449][T20067] [ 714.106234][T20067] dump_stack_lvl+0x151/0x1b7 [ 714.110735][T20067] ? nf_tcp_handle_invalid+0x3f1/0x3f1 [ 714.116031][T20067] ? stack_trace_save+0x1c0/0x1c0 [ 714.120890][T20067] dump_stack+0x15/0x18 [ 714.124883][T20067] should_fail_ex+0x3d0/0x520 [ 714.129394][T20067] should_fail_alloc_page+0x68/0x90 [ 714.134426][T20067] prepare_alloc_pages+0x13b/0x6d0 [ 714.139377][T20067] ? __alloc_pages_bulk+0xcd0/0xcd0 [ 714.144410][T20067] __alloc_pages+0x162/0x610 [ 714.148838][T20067] ? prep_new_page+0x110/0x110 [ 714.153433][T20067] ? __alloc_pages+0x234/0x610 [ 714.158040][T20067] ? __kasan_check_write+0x14/0x20 [ 714.163022][T20067] ? _raw_spin_lock+0xa4/0x1b0 [ 714.167584][T20067] __pmd_alloc+0xb1/0x550 [ 714.171748][T20067] ? __pud_alloc+0x260/0x260 [ 714.176173][T20067] ? __pud_alloc+0x214/0x260 [ 714.180605][T20067] ? lock_vma_under_rcu+0x590/0x590 [ 714.185634][T20067] ? __stack_depot_save+0x36/0x480 [ 714.190589][T20067] copy_page_range+0x2af4/0x2ed0 [ 714.195356][T20067] ? __kasan_slab_alloc+0x6c/0x80 [ 714.200333][T20067] ? slab_post_alloc_hook+0x53/0x2c0 [ 714.205451][T20067] ? kmem_cache_alloc+0x175/0x320 [ 714.210316][T20067] ? copy_mm+0xdcb/0x1bc0 [ 714.214477][T20067] ? copy_process+0x12b6/0x3530 [ 714.219167][T20067] ? __x64_sys_clone+0x231/0x280 [ 714.223938][T20067] ? x64_sys_call+0x1b0/0x9a0 [ 714.228453][T20067] ? mas_wr_node_walk+0x5bf/0x720 [ 714.233319][T20067] ? pfn_valid+0x1e0/0x1e0 [ 714.237568][T20067] ? mas_wr_store_entry+0x492/0x730 [ 714.242710][T20067] ? mas_store+0x258/0x400 [ 714.246957][T20067] ? mas_empty_area_rev+0x17f0/0x17f0 [ 714.252170][T20067] ? anon_vma_fork+0x488/0x4d0 [ 714.256785][T20067] copy_mm+0x10ee/0x1bc0 [ 714.260950][T20067] ? copy_signal+0x650/0x650 [ 714.265360][T20067] ? _raw_spin_lock+0xa4/0x1b0 [ 714.269971][T20067] ? __init_rwsem+0x130/0x240 [ 714.274473][T20067] ? copy_signal+0x503/0x650 [ 714.278902][T20067] copy_process+0x12b6/0x3530 [ 714.283414][T20067] ? __kasan_check_write+0x14/0x20 [ 714.288391][T20067] ? proc_fail_nth_write+0x20b/0x290 [ 714.293482][T20067] ? idle_dummy+0x10/0x10 [ 714.297660][T20067] ? vfs_write+0x952/0xed0 [ 714.301899][T20067] ? __kasan_slab_free+0x11/0x20 [ 714.306679][T20067] kernel_clone+0x229/0x890 [ 714.311013][T20067] ? __kasan_check_write+0x14/0x20 [ 714.315969][T20067] ? mutex_unlock+0xb2/0x260 [ 714.320387][T20067] ? create_io_thread+0x180/0x180 [ 714.325252][T20067] __x64_sys_clone+0x231/0x280 [ 714.329844][T20067] ? __do_sys_vfork+0x110/0x110 [ 714.334538][T20067] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 714.340433][T20067] ? exit_to_user_mode_prepare+0x39/0xa0 [ 714.345906][T20067] x64_sys_call+0x1b0/0x9a0 [ 714.350241][T20067] do_syscall_64+0x3b/0xb0 [ 714.354492][T20067] ? clear_bhb_loop+0x55/0xb0 [ 714.359009][T20067] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 714.364737][T20067] RIP: 0033:0x7f8c4018d169 [ 714.368988][T20067] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 714.388429][T20067] RSP: 002b:00007f8c410a4fe8 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 714.396671][T20067] RAX: ffffffffffffffda RBX: 00007f8c403a5fa0 RCX: 00007f8c4018d169 [ 714.404485][T20067] RDX: 0000000000000000 RSI: 0000000000009000 RDI: 0000000004021400 [ 714.412299][T20067] RBP: 00007f8c410a5090 R08: 0000000000000000 R09: 0000000000000000 [ 714.420111][T20067] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000002 [ 714.427919][T20067] R13: 0000000000000000 R14: 00007f8c403a5fa0 R15: 00007ffdc331e648 [ 714.435739][T20067] [ 715.330896][T20105] device veth0_vlan left promiscuous mode [ 715.339062][T20105] device veth0_vlan entered promiscuous mode [ 715.414104][ T7721] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 715.434581][ T7721] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 715.455360][ T7721] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 715.843681][T20123] FAULT_INJECTION: forcing a failure. [ 715.843681][T20123] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 715.857527][T20123] CPU: 0 PID: 20123 Comm: syz.0.6647 Not tainted 6.1.129-syzkaller-00055-gca24c52e3c25 #0 [ 715.867261][T20123] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 715.877156][T20123] Call Trace: [ 715.880282][T20123] [ 715.883054][T20123] dump_stack_lvl+0x151/0x1b7 [ 715.887570][T20123] ? nf_tcp_handle_invalid+0x3f1/0x3f1 [ 715.892864][T20123] dump_stack+0x15/0x18 [ 715.896855][T20123] should_fail_ex+0x3d0/0x520 [ 715.901428][T20123] should_fail_alloc_page+0x68/0x90 [ 715.906414][T20123] prepare_alloc_pages+0x13b/0x6d0 [ 715.911355][T20123] ? __alloc_pages_bulk+0xcd0/0xcd0 [ 715.916390][T20123] ? __alloc_pages+0x610/0x610 [ 715.921069][T20123] __alloc_pages+0x162/0x610 [ 715.925492][T20123] ? prep_new_page+0x110/0x110 [ 715.930091][T20123] ? __alloc_pages+0x234/0x610 [ 715.934691][T20123] ? prep_new_page+0x110/0x110 [ 715.939293][T20123] ? __kasan_check_write+0x14/0x20 [ 715.944352][T20123] ? _raw_spin_lock+0xa4/0x1b0 [ 715.948930][T20123] pte_alloc_one+0x73/0x1b0 [ 715.953267][T20123] ? pfn_modify_allowed+0x2f0/0x2f0 [ 715.958301][T20123] ? __pmd_alloc+0x48d/0x550 [ 715.962727][T20123] __pte_alloc+0x86/0x350 [ 715.966977][T20123] ? __pud_alloc+0x260/0x260 [ 715.971409][T20123] ? __pud_alloc+0x214/0x260 [ 715.975835][T20123] ? pmd_install+0x260/0x260 [ 715.980263][T20123] ? lock_vma_under_rcu+0x590/0x590 [ 715.985292][T20123] ? __stack_depot_save+0x36/0x480 [ 715.990288][T20123] copy_page_range+0x2748/0x2ed0 [ 715.995014][T20123] ? __kasan_slab_alloc+0x6c/0x80 [ 715.999872][T20123] ? slab_post_alloc_hook+0x53/0x2c0 [ 716.005108][T20123] ? kmem_cache_alloc+0x175/0x320 [ 716.009963][T20123] ? copy_mm+0xdcb/0x1bc0 [ 716.014137][T20123] ? pfn_valid+0x1e0/0x1e0 [ 716.018526][T20123] ? mas_wr_store_entry+0x492/0x730 [ 716.023671][T20123] ? mas_store+0x258/0x400 [ 716.027925][T20123] ? mas_empty_area_rev+0x17f0/0x17f0 [ 716.033144][T20123] ? anon_vma_fork+0x488/0x4d0 [ 716.037730][T20123] copy_mm+0x10ee/0x1bc0 [ 716.041811][T20123] ? copy_signal+0x650/0x650 [ 716.046235][T20123] ? _raw_spin_lock+0xa4/0x1b0 [ 716.050847][T20123] ? __init_rwsem+0x130/0x240 [ 716.055348][T20123] ? copy_signal+0x503/0x650 [ 716.059778][T20123] copy_process+0x12b6/0x3530 [ 716.064290][T20123] ? __kasan_check_write+0x14/0x20 [ 716.069233][T20123] ? proc_fail_nth_write+0x20b/0x290 [ 716.074356][T20123] ? idle_dummy+0x10/0x10 [ 716.078520][T20123] ? vfs_write+0x952/0xed0 [ 716.082771][T20123] ? __kasan_slab_free+0x11/0x20 [ 716.087547][T20123] kernel_clone+0x229/0x890 [ 716.091897][T20123] ? __kasan_check_write+0x14/0x20 [ 716.096959][T20123] ? mutex_unlock+0xb2/0x260 [ 716.101640][T20123] ? create_io_thread+0x180/0x180 [ 716.106504][T20123] __x64_sys_clone+0x231/0x280 [ 716.111100][T20123] ? __do_sys_vfork+0x110/0x110 [ 716.115782][T20123] ? debug_smp_processor_id+0x17/0x20 [ 716.121105][T20123] ? perf_trace_sys_enter+0x30/0x140 [ 716.126227][T20123] x64_sys_call+0x1b0/0x9a0 [ 716.130661][T20123] do_syscall_64+0x3b/0xb0 [ 716.135039][T20123] ? clear_bhb_loop+0x55/0xb0 [ 716.139537][T20123] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 716.145267][T20123] RIP: 0033:0x7f8aa3d8d169 [ 716.149517][T20123] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 716.168964][T20123] RSP: 002b:00007f8aa4bf8fe8 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 716.177202][T20123] RAX: ffffffffffffffda RBX: 00007f8aa3fa5fa0 RCX: 00007f8aa3d8d169 [ 716.185014][T20123] RDX: 0000000000000000 RSI: 0000000000009000 RDI: 0000000004021400 [ 716.192832][T20123] RBP: 00007f8aa4bf9090 R08: 0000000000000000 R09: 0000000000000000 [ 716.200643][T20123] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000002 [ 716.208450][T20123] R13: 0000000000000000 R14: 00007f8aa3fa5fa0 R15: 00007ffe9024d138 [ 716.216269][T20123] [ 717.551565][T20154] device veth0_vlan left promiscuous mode [ 717.557922][T20154] device veth0_vlan entered promiscuous mode [ 718.147686][T20189] device sit0 left promiscuous mode [ 718.544994][T20207] syz.0.6674[20207] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 718.545074][T20207] syz.0.6674[20207] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 718.684431][T20207] bridge0: port 1(bridge_slave_0) entered disabled state [ 719.352991][T20236] FAULT_INJECTION: forcing a failure. [ 719.352991][T20236] name failslab, interval 1, probability 0, space 0, times 0 [ 719.412029][T20236] CPU: 1 PID: 20236 Comm: syz.2.6683 Not tainted 6.1.129-syzkaller-00055-gca24c52e3c25 #0 [ 719.421775][T20236] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 719.431669][T20236] Call Trace: [ 719.434798][T20236] [ 719.437567][T20236] dump_stack_lvl+0x151/0x1b7 [ 719.442080][T20236] ? nf_tcp_handle_invalid+0x3f1/0x3f1 [ 719.447382][T20236] ? pfn_valid+0x1e0/0x1e0 [ 719.451629][T20236] ? mas_wr_store_entry+0x492/0x730 [ 719.456677][T20236] dump_stack+0x15/0x18 [ 719.460659][T20236] should_fail_ex+0x3d0/0x520 [ 719.465179][T20236] ? vm_area_dup+0x27/0x290 [ 719.469512][T20236] __should_failslab+0xaf/0xf0 [ 719.474110][T20236] should_failslab+0x9/0x20 [ 719.478447][T20236] kmem_cache_alloc+0x3b/0x320 [ 719.483053][T20236] vm_area_dup+0x27/0x290 [ 719.487214][T20236] ? copy_mm+0xc8f/0x1bc0 [ 719.491380][T20236] copy_mm+0xd19/0x1bc0 [ 719.495380][T20236] ? copy_signal+0x650/0x650 [ 719.499801][T20236] ? _raw_spin_lock+0xa4/0x1b0 [ 719.504402][T20236] ? __init_rwsem+0x130/0x240 [ 719.508917][T20236] ? copy_signal+0x503/0x650 [ 719.513341][T20236] copy_process+0x12b6/0x3530 [ 719.517860][T20236] ? __kasan_check_write+0x14/0x20 [ 719.522798][T20236] ? proc_fail_nth_write+0x20b/0x290 [ 719.527921][T20236] ? idle_dummy+0x10/0x10 [ 719.532080][T20236] ? vfs_write+0x952/0xed0 [ 719.536426][T20236] ? __kasan_slab_free+0x11/0x20 [ 719.541197][T20236] kernel_clone+0x229/0x890 [ 719.545540][T20236] ? __kasan_check_write+0x14/0x20 [ 719.550482][T20236] ? mutex_unlock+0xb2/0x260 [ 719.554909][T20236] ? create_io_thread+0x180/0x180 [ 719.559780][T20236] __x64_sys_clone+0x231/0x280 [ 719.564375][T20236] ? __do_sys_vfork+0x110/0x110 [ 719.569061][T20236] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 719.574959][T20236] ? exit_to_user_mode_prepare+0x39/0xa0 [ 719.580429][T20236] x64_sys_call+0x1b0/0x9a0 [ 719.584774][T20236] do_syscall_64+0x3b/0xb0 [ 719.589021][T20236] ? clear_bhb_loop+0x55/0xb0 [ 719.593552][T20236] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 719.599387][T20236] RIP: 0033:0x7f402df8d169 [ 719.603647][T20236] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 719.623082][T20236] RSP: 002b:00007f402ee11fe8 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 719.631324][T20236] RAX: ffffffffffffffda RBX: 00007f402e1a5fa0 RCX: 00007f402df8d169 [ 719.639130][T20236] RDX: 0000000000000000 RSI: 0000000000009000 RDI: 0000000004021400 [ 719.646943][T20236] RBP: 00007f402ee12090 R08: 0000000000000000 R09: 0000000000000000 [ 719.654754][T20236] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000002 [ 719.662572][T20236] R13: 0000000000000000 R14: 00007f402e1a5fa0 R15: 00007fff170fa1c8 [ 719.670384][T20236] [ 720.186093][ T28] audit: type=1400 audit(1743748238.452:178): avc: denied { create } for pid=20261 comm="syz.1.6693" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=mctp_socket permissive=1 [ 720.842795][T20283] device syzkaller0 entered promiscuous mode [ 721.602997][ T28] audit: type=1400 audit(1743748239.872:179): avc: denied { create } for pid=20316 comm="syz.4.6709" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_scsitransport_socket permissive=1 [ 727.873508][T20469] device syzkaller0 entered promiscuous mode [ 727.964515][T20472] device syzkaller0 entered promiscuous mode [ 728.598971][T20512] bond_slave_1: mtu less than device minimum [ 728.610488][T20508] device syzkaller0 entered promiscuous mode [ 729.059871][T20533] tun0: tun_chr_ioctl cmd 1074025677 [ 729.074878][T20533] tun0: linktype set to 513 [ 729.337621][T20555] device sit0 entered promiscuous mode [ 730.032390][T20568] device syzkaller0 entered promiscuous mode [ 730.647671][T20609] device syzkaller0 entered promiscuous mode [ 732.180826][T20652] device syzkaller0 entered promiscuous mode [ 732.903686][T20695] FAULT_INJECTION: forcing a failure. [ 732.903686][T20695] name failslab, interval 1, probability 0, space 0, times 0 [ 732.926308][T20688] device pim6reg1 entered promiscuous mode [ 732.945372][T20695] CPU: 0 PID: 20695 Comm: syz.2.6841 Not tainted 6.1.129-syzkaller-00055-gca24c52e3c25 #0 [ 732.955121][T20695] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 732.965013][T20695] Call Trace: [ 732.968135][T20695] [ 732.970917][T20695] dump_stack_lvl+0x151/0x1b7 [ 732.975429][T20695] ? nf_tcp_handle_invalid+0x3f1/0x3f1 [ 732.980721][T20695] ? pfn_valid+0x1e0/0x1e0 [ 732.984977][T20695] ? mas_wr_store_entry+0x492/0x730 [ 732.990009][T20695] dump_stack+0x15/0x18 [ 732.994010][T20695] should_fail_ex+0x3d0/0x520 [ 732.998517][T20695] ? vm_area_dup+0x27/0x290 [ 733.002860][T20695] __should_failslab+0xaf/0xf0 [ 733.007452][T20695] should_failslab+0x9/0x20 [ 733.011800][T20695] kmem_cache_alloc+0x3b/0x320 [ 733.016392][T20695] vm_area_dup+0x27/0x290 [ 733.020557][T20695] ? copy_mm+0xc8f/0x1bc0 [ 733.024726][T20695] copy_mm+0xd19/0x1bc0 [ 733.028725][T20695] ? copy_signal+0x650/0x650 [ 733.033141][T20695] ? _raw_spin_lock+0xa4/0x1b0 [ 733.037745][T20695] ? __init_rwsem+0x130/0x240 [ 733.042258][T20695] ? copy_signal+0x503/0x650 [ 733.046686][T20695] copy_process+0x12b6/0x3530 [ 733.051200][T20695] ? __kasan_check_write+0x14/0x20 [ 733.056141][T20695] ? proc_fail_nth_write+0x20b/0x290 [ 733.061272][T20695] ? idle_dummy+0x10/0x10 [ 733.065431][T20695] ? vfs_write+0x952/0xed0 [ 733.069686][T20695] ? __kasan_slab_free+0x11/0x20 [ 733.074461][T20695] kernel_clone+0x229/0x890 [ 733.078797][T20695] ? __kasan_check_write+0x14/0x20 [ 733.083742][T20695] ? mutex_unlock+0xb2/0x260 [ 733.088172][T20695] ? create_io_thread+0x180/0x180 [ 733.093032][T20695] __x64_sys_clone+0x231/0x280 [ 733.097635][T20695] ? __do_sys_vfork+0x110/0x110 [ 733.102321][T20695] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 733.108221][T20695] ? exit_to_user_mode_prepare+0x39/0xa0 [ 733.113689][T20695] x64_sys_call+0x1b0/0x9a0 [ 733.118027][T20695] do_syscall_64+0x3b/0xb0 [ 733.122282][T20695] ? clear_bhb_loop+0x55/0xb0 [ 733.126794][T20695] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 733.132522][T20695] RIP: 0033:0x7f402df8d169 [ 733.136772][T20695] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 733.156218][T20695] RSP: 002b:00007f402ee11fe8 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 733.164463][T20695] RAX: ffffffffffffffda RBX: 00007f402e1a5fa0 RCX: 00007f402df8d169 [ 733.172280][T20695] RDX: 0000000000000000 RSI: 0000000000009000 RDI: 0000000004021400 [ 733.180181][T20695] RBP: 00007f402ee12090 R08: 0000000000000000 R09: 0000000000000000 [ 733.187978][T20695] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000002 [ 733.195791][T20695] R13: 0000000000000000 R14: 00007f402e1a5fa0 R15: 00007fff170fa1c8 [ 733.203609][T20695] [ 739.218236][T20923] FAULT_INJECTION: forcing a failure. [ 739.218236][T20923] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 739.332230][T20923] CPU: 1 PID: 20923 Comm: syz.3.6917 Not tainted 6.1.129-syzkaller-00055-gca24c52e3c25 #0 [ 739.341980][T20923] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 739.351878][T20923] Call Trace: [ 739.354997][T20923] [ 739.357768][T20923] dump_stack_lvl+0x151/0x1b7 [ 739.362305][T20923] ? nf_tcp_handle_invalid+0x3f1/0x3f1 [ 739.367582][T20923] dump_stack+0x15/0x18 [ 739.371659][T20923] should_fail_ex+0x3d0/0x520 [ 739.376174][T20923] should_fail+0xb/0x10 [ 739.380161][T20923] should_fail_usercopy+0x1a/0x20 [ 739.385083][T20923] _copy_from_user+0x1e/0xc0 [ 739.389452][T20923] get_user_ifreq+0xd5/0x230 [ 739.393875][T20923] sock_do_ioctl+0x1a7/0x450 [ 739.398303][T20923] ? has_cap_mac_admin+0x3c0/0x3c0 [ 739.403251][T20923] ? sock_show_fdinfo+0xa0/0xa0 [ 739.407940][T20923] ? selinux_file_ioctl+0x3cc/0x540 [ 739.412969][T20923] sock_ioctl+0x455/0x740 [ 739.417138][T20923] ? sock_poll+0x400/0x400 [ 739.421387][T20923] ? __fget_files+0x2cb/0x330 [ 739.425903][T20923] ? security_file_ioctl+0x84/0xb0 [ 739.430849][T20923] ? sock_poll+0x400/0x400 [ 739.435107][T20923] __se_sys_ioctl+0x114/0x190 [ 739.439613][T20923] __x64_sys_ioctl+0x7b/0x90 [ 739.444045][T20923] x64_sys_call+0x98/0x9a0 [ 739.448294][T20923] do_syscall_64+0x3b/0xb0 [ 739.452547][T20923] ? clear_bhb_loop+0x55/0xb0 [ 739.457061][T20923] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 739.462787][T20923] RIP: 0033:0x7ffa82f8d169 [ 739.467041][T20923] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 739.486485][T20923] RSP: 002b:00007ffa83dca038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 739.494727][T20923] RAX: ffffffffffffffda RBX: 00007ffa831a5fa0 RCX: 00007ffa82f8d169 [ 739.502543][T20923] RDX: 0000200000000080 RSI: 0000000000008922 RDI: 0000000000000007 [ 739.510353][T20923] RBP: 00007ffa83dca090 R08: 0000000000000000 R09: 0000000000000000 [ 739.518160][T20923] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 739.525971][T20923] R13: 0000000000000000 R14: 00007ffa831a5fa0 R15: 00007ffe48c53ca8 [ 739.533792][T20923] [ 739.905210][T20935] device veth0_vlan left promiscuous mode [ 739.940306][T20935] device veth0_vlan entered promiscuous mode [ 740.582392][T20971] device sit0 left promiscuous mode [ 740.647752][T20971] device sit0 entered promiscuous mode [ 742.128428][T21025] FAULT_INJECTION: forcing a failure. [ 742.128428][T21025] name failslab, interval 1, probability 0, space 0, times 0 [ 742.356466][T21025] CPU: 1 PID: 21025 Comm: syz.4.6947 Not tainted 6.1.129-syzkaller-00055-gca24c52e3c25 #0 [ 742.366212][T21025] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 742.376107][T21025] Call Trace: [ 742.379235][T21025] [ 742.382006][T21025] dump_stack_lvl+0x151/0x1b7 [ 742.386523][T21025] ? nf_tcp_handle_invalid+0x3f1/0x3f1 [ 742.391835][T21025] dump_stack+0x15/0x18 [ 742.395805][T21025] should_fail_ex+0x3d0/0x520 [ 742.400322][T21025] ? vm_area_dup+0x65/0x290 [ 742.404668][T21025] __should_failslab+0xaf/0xf0 [ 742.409260][T21025] should_failslab+0x9/0x20 [ 742.413603][T21025] kmem_cache_alloc+0x3b/0x320 [ 742.418205][T21025] vm_area_dup+0x65/0x290 [ 742.422366][T21025] copy_mm+0xd19/0x1bc0 [ 742.426363][T21025] ? copy_signal+0x650/0x650 [ 742.430788][T21025] ? _raw_spin_lock+0xa4/0x1b0 [ 742.435387][T21025] ? __init_rwsem+0x130/0x240 [ 742.439900][T21025] ? copy_signal+0x503/0x650 [ 742.444325][T21025] copy_process+0x12b6/0x3530 [ 742.448842][T21025] ? __kasan_check_write+0x14/0x20 [ 742.453792][T21025] ? proc_fail_nth_write+0x20b/0x290 [ 742.458910][T21025] ? idle_dummy+0x10/0x10 [ 742.463072][T21025] ? vfs_write+0x952/0xed0 [ 742.467322][T21025] ? __kasan_slab_free+0x11/0x20 [ 742.472102][T21025] kernel_clone+0x229/0x890 [ 742.476436][T21025] ? __kasan_check_write+0x14/0x20 [ 742.481387][T21025] ? mutex_unlock+0xb2/0x260 [ 742.485810][T21025] ? create_io_thread+0x180/0x180 [ 742.490675][T21025] __x64_sys_clone+0x231/0x280 [ 742.495274][T21025] ? __do_sys_vfork+0x110/0x110 [ 742.499967][T21025] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 742.505860][T21025] ? exit_to_user_mode_prepare+0x39/0xa0 [ 742.511455][T21025] x64_sys_call+0x1b0/0x9a0 [ 742.515803][T21025] do_syscall_64+0x3b/0xb0 [ 742.520416][T21025] ? clear_bhb_loop+0x55/0xb0 [ 742.524931][T21025] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 742.530655][T21025] RIP: 0033:0x7f3d3c18d169 [ 742.534908][T21025] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 742.554474][T21025] RSP: 002b:00007f3d3d002fe8 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 742.562911][T21025] RAX: ffffffffffffffda RBX: 00007f3d3c3a5fa0 RCX: 00007f3d3c18d169 [ 742.570739][T21025] RDX: 0000000000000000 RSI: 0000000000009000 RDI: 0000000004021400 [ 742.578532][T21025] RBP: 00007f3d3d003090 R08: 0000000000000000 R09: 0000000000000000 [ 742.586343][T21025] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000002 [ 742.594289][T21025] R13: 0000000000000000 R14: 00007f3d3c3a5fa0 R15: 00007ffc5a411998 [ 742.602110][T21025] [ 743.109199][T21050] device syzkaller0 entered promiscuous mode [ 743.529889][T21074] FAULT_INJECTION: forcing a failure. [ 743.529889][T21074] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 743.662834][T21074] CPU: 1 PID: 21074 Comm: syz.2.6963 Not tainted 6.1.129-syzkaller-00055-gca24c52e3c25 #0 [ 743.672590][T21074] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 743.682480][T21074] Call Trace: [ 743.685604][T21074] [ 743.688380][T21074] dump_stack_lvl+0x151/0x1b7 [ 743.692892][T21074] ? nf_tcp_handle_invalid+0x3f1/0x3f1 [ 743.698210][T21074] dump_stack+0x15/0x18 [ 743.702221][T21074] should_fail_ex+0x3d0/0x520 [ 743.706692][T21074] should_fail_alloc_page+0x68/0x90 [ 743.711726][T21074] prepare_alloc_pages+0x13b/0x6d0 [ 743.716676][T21074] ? __alloc_pages_bulk+0xcd0/0xcd0 [ 743.721710][T21074] __alloc_pages+0x162/0x610 [ 743.726136][T21074] ? prep_new_page+0x110/0x110 [ 743.730733][T21074] ? __kernel_text_address+0xd/0x40 [ 743.735763][T21074] ? arch_stack_walk+0xf3/0x140 [ 743.740457][T21074] get_zeroed_page+0x19/0x40 [ 743.744879][T21074] __pud_alloc+0x8c/0x260 [ 743.749047][T21074] ? __kasan_check_write+0x14/0x20 [ 743.753995][T21074] ? lock_vma_under_rcu+0x590/0x590 [ 743.759026][T21074] copy_page_range+0x2b8b/0x2ed0 [ 743.763801][T21074] ? kasan_set_track+0x4b/0x70 [ 743.768396][T21074] ? kasan_save_alloc_info+0x1f/0x30 [ 743.773520][T21074] ? slab_post_alloc_hook+0x53/0x2c0 [ 743.778638][T21074] ? kmem_cache_alloc+0x175/0x320 [ 743.783503][T21074] ? copy_process+0x12b6/0x3530 [ 743.788186][T21074] ? kernel_clone+0x229/0x890 [ 743.792700][T21074] ? __x64_sys_clone+0x231/0x280 [ 743.797475][T21074] ? x64_sys_call+0x1b0/0x9a0 [ 743.801987][T21074] ? do_syscall_64+0x3b/0xb0 [ 743.806417][T21074] ? entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 743.812320][T21074] ? mas_wr_node_walk+0x5bf/0x720 [ 743.817180][T21074] ? pfn_valid+0x1e0/0x1e0 [ 743.821429][T21074] ? mas_wr_store_entry+0x492/0x730 [ 743.826467][T21074] ? mas_store+0x258/0x400 [ 743.830717][T21074] ? mas_empty_area_rev+0x17f0/0x17f0 [ 743.835929][T21074] copy_mm+0x10ee/0x1bc0 [ 743.840009][T21074] ? copy_signal+0x650/0x650 [ 743.844426][T21074] ? _raw_spin_lock+0xa4/0x1b0 [ 743.849034][T21074] ? __init_rwsem+0x130/0x240 [ 743.853542][T21074] ? copy_signal+0x503/0x650 [ 743.857971][T21074] copy_process+0x12b6/0x3530 [ 743.862485][T21074] ? __kasan_check_write+0x14/0x20 [ 743.867429][T21074] ? proc_fail_nth_write+0x20b/0x290 [ 743.872557][T21074] ? idle_dummy+0x10/0x10 [ 743.876718][T21074] ? vfs_write+0x952/0xed0 [ 743.880968][T21074] ? __kasan_slab_free+0x11/0x20 [ 743.885745][T21074] kernel_clone+0x229/0x890 [ 743.890082][T21074] ? __kasan_check_write+0x14/0x20 [ 743.895031][T21074] ? mutex_unlock+0xb2/0x260 [ 743.899456][T21074] ? create_io_thread+0x180/0x180 [ 743.904320][T21074] __x64_sys_clone+0x231/0x280 [ 743.908916][T21074] ? __do_sys_vfork+0x110/0x110 [ 743.913633][T21074] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 743.919511][T21074] ? exit_to_user_mode_prepare+0x39/0xa0 [ 743.924974][T21074] x64_sys_call+0x1b0/0x9a0 [ 743.929316][T21074] do_syscall_64+0x3b/0xb0 [ 743.933566][T21074] ? clear_bhb_loop+0x55/0xb0 [ 743.938080][T21074] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 743.943804][T21074] RIP: 0033:0x7f402df8d169 [ 743.948063][T21074] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 743.967504][T21074] RSP: 002b:00007f402ee11fe8 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 743.975747][T21074] RAX: ffffffffffffffda RBX: 00007f402e1a5fa0 RCX: 00007f402df8d169 [ 743.983555][T21074] RDX: 0000000000000000 RSI: 0000000000009000 RDI: 0000000004021400 [ 743.991403][T21074] RBP: 00007f402ee12090 R08: 0000000000000000 R09: 0000000000000000 [ 743.999180][T21074] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000002 [ 744.006989][T21074] R13: 0000000000000000 R14: 00007f402e1a5fa0 R15: 00007fff170fa1c8 [ 744.014832][T21074] [ 744.042674][T21078] device pim6reg1 entered promiscuous mode [ 744.121791][T21085] device xfrm0 entered promiscuous mode [ 744.466375][T21100] device syzkaller0 entered promiscuous mode [ 744.511761][T21108] device veth0_vlan left promiscuous mode [ 744.527881][T21108] device veth0_vlan entered promiscuous mode [ 744.544351][T21110] FAULT_INJECTION: forcing a failure. [ 744.544351][T21110] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 744.559057][T21110] CPU: 1 PID: 21110 Comm: syz.3.6976 Not tainted 6.1.129-syzkaller-00055-gca24c52e3c25 #0 [ 744.568798][T21110] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 744.578693][T21110] Call Trace: [ 744.581813][T21110] [ 744.584589][T21110] dump_stack_lvl+0x151/0x1b7 [ 744.589103][T21110] ? nf_tcp_handle_invalid+0x3f1/0x3f1 [ 744.594400][T21110] dump_stack+0x15/0x18 [ 744.598392][T21110] should_fail_ex+0x3d0/0x520 [ 744.602903][T21110] should_fail_alloc_page+0x68/0x90 [ 744.608038][T21110] prepare_alloc_pages+0x13b/0x6d0 [ 744.612988][T21110] ? __alloc_pages_bulk+0xcd0/0xcd0 [ 744.618155][T21110] __alloc_pages+0x162/0x610 [ 744.622574][T21110] ? prep_new_page+0x110/0x110 [ 744.627173][T21110] ? arch_stack_walk+0xf3/0x140 [ 744.631863][T21110] get_zeroed_page+0x19/0x40 [ 744.636287][T21110] __pud_alloc+0x8c/0x260 [ 744.640455][T21110] ? lock_vma_under_rcu+0x590/0x590 [ 744.645485][T21110] ? __stack_depot_save+0x36/0x480 [ 744.650525][T21110] copy_page_range+0x2b8b/0x2ed0 [ 744.655294][T21110] ? __kasan_slab_alloc+0x6c/0x80 [ 744.660155][T21110] ? slab_post_alloc_hook+0x53/0x2c0 [ 744.665277][T21110] ? kmem_cache_alloc+0x175/0x320 [ 744.670137][T21110] ? copy_mm+0xdcb/0x1bc0 [ 744.674301][T21110] ? copy_process+0x12b6/0x3530 [ 744.678988][T21110] ? __x64_sys_clone+0x231/0x280 [ 744.683764][T21110] ? x64_sys_call+0x1b0/0x9a0 [ 744.688279][T21110] ? mas_wr_node_walk+0x5b5/0x720 [ 744.693141][T21110] ? pfn_valid+0x1e0/0x1e0 [ 744.697391][T21110] ? mas_wr_store_entry+0x492/0x730 [ 744.702447][T21110] ? mas_store+0x258/0x400 [ 744.706681][T21110] ? mas_empty_area_rev+0x17f0/0x17f0 [ 744.711887][T21110] ? anon_vma_fork+0x488/0x4d0 [ 744.716494][T21110] copy_mm+0x10ee/0x1bc0 [ 744.720570][T21110] ? copy_signal+0x650/0x650 [ 744.724990][T21110] ? _raw_spin_lock+0xa4/0x1b0 [ 744.729598][T21110] ? __init_rwsem+0x130/0x240 [ 744.734108][T21110] ? copy_signal+0x503/0x650 [ 744.738533][T21110] copy_process+0x12b6/0x3530 [ 744.743055][T21110] ? __kasan_check_write+0x14/0x20 [ 744.747993][T21110] ? proc_fail_nth_write+0x20b/0x290 [ 744.753112][T21110] ? idle_dummy+0x10/0x10 [ 744.757282][T21110] ? vfs_write+0x952/0xed0 [ 744.761529][T21110] ? __kasan_slab_free+0x11/0x20 [ 744.766309][T21110] kernel_clone+0x229/0x890 [ 744.770644][T21110] ? __kasan_check_write+0x14/0x20 [ 744.775590][T21110] ? mutex_unlock+0xb2/0x260 [ 744.780025][T21110] ? create_io_thread+0x180/0x180 [ 744.784886][T21110] __x64_sys_clone+0x231/0x280 [ 744.789478][T21110] ? __do_sys_vfork+0x110/0x110 [ 744.794165][T21110] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 744.800065][T21110] ? exit_to_user_mode_prepare+0x39/0xa0 [ 744.805530][T21110] x64_sys_call+0x1b0/0x9a0 [ 744.809867][T21110] do_syscall_64+0x3b/0xb0 [ 744.814120][T21110] ? clear_bhb_loop+0x55/0xb0 [ 744.818637][T21110] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 744.824372][T21110] RIP: 0033:0x7ffa82f8d169 [ 744.828625][T21110] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 744.848062][T21110] RSP: 002b:00007ffa83dc9fe8 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 744.856303][T21110] RAX: ffffffffffffffda RBX: 00007ffa831a5fa0 RCX: 00007ffa82f8d169 [ 744.864119][T21110] RDX: 0000000000000000 RSI: 0000000000009000 RDI: 0000000004021400 [ 744.871923][T21110] RBP: 00007ffa83dca090 R08: 0000000000000000 R09: 0000000000000000 [ 744.879740][T21110] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000002 [ 744.887549][T21110] R13: 0000000000000000 R14: 00007ffa831a5fa0 R15: 00007ffe48c53ca8 [ 744.895566][T21110] [ 745.004996][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 745.020142][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 745.029719][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 746.102701][T21163] FAULT_INJECTION: forcing a failure. [ 746.102701][T21163] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 746.185452][T21163] CPU: 1 PID: 21163 Comm: syz.4.6990 Not tainted 6.1.129-syzkaller-00055-gca24c52e3c25 #0 [ 746.195211][T21163] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 746.205109][T21163] Call Trace: [ 746.208223][T21163] [ 746.211002][T21163] dump_stack_lvl+0x151/0x1b7 [ 746.215523][T21163] ? nf_tcp_handle_invalid+0x3f1/0x3f1 [ 746.220813][T21163] dump_stack+0x15/0x18 [ 746.224802][T21163] should_fail_ex+0x3d0/0x520 [ 746.229317][T21163] should_fail_alloc_page+0x68/0x90 [ 746.234347][T21163] prepare_alloc_pages+0x13b/0x6d0 [ 746.239299][T21163] ? __alloc_pages_bulk+0xcd0/0xcd0 [ 746.244328][T21163] ? __alloc_pages+0x610/0x610 [ 746.248932][T21163] __alloc_pages+0x162/0x610 [ 746.253355][T21163] ? prep_new_page+0x110/0x110 [ 746.257957][T21163] ? __alloc_pages+0x234/0x610 [ 746.262560][T21163] ? prep_new_page+0x110/0x110 [ 746.267156][T21163] ? __kasan_check_write+0x14/0x20 [ 746.272105][T21163] ? _raw_spin_lock+0xa4/0x1b0 [ 746.276705][T21163] pte_alloc_one+0x73/0x1b0 [ 746.281042][T21163] ? pfn_modify_allowed+0x2f0/0x2f0 [ 746.286085][T21163] ? __pmd_alloc+0x48d/0x550 [ 746.290506][T21163] __pte_alloc+0x86/0x350 [ 746.294668][T21163] ? __pud_alloc+0x260/0x260 [ 746.299094][T21163] ? __pud_alloc+0x214/0x260 [ 746.303523][T21163] ? pmd_install+0x260/0x260 [ 746.307948][T21163] ? lock_vma_under_rcu+0x590/0x590 [ 746.312989][T21163] copy_page_range+0x2748/0x2ed0 [ 746.317757][T21163] ? kasan_set_track+0x4b/0x70 [ 746.322357][T21163] ? copy_process+0x12b6/0x3530 [ 746.327040][T21163] ? entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 746.332960][T21163] ? pfn_valid+0x1e0/0x1e0 [ 746.337203][T21163] ? mas_wr_store_entry+0x492/0x730 [ 746.342245][T21163] ? mas_store+0x258/0x400 [ 746.346487][T21163] ? mas_empty_area_rev+0x17f0/0x17f0 [ 746.351711][T21163] copy_mm+0x10ee/0x1bc0 [ 746.355779][T21163] ? copy_signal+0x650/0x650 [ 746.360198][T21163] ? _raw_spin_lock+0xa4/0x1b0 [ 746.364803][T21163] ? __init_rwsem+0x130/0x240 [ 746.369313][T21163] ? copy_signal+0x503/0x650 [ 746.373740][T21163] copy_process+0x12b6/0x3530 [ 746.378254][T21163] ? __kasan_check_write+0x14/0x20 [ 746.383201][T21163] ? proc_fail_nth_write+0x20b/0x290 [ 746.388325][T21163] ? idle_dummy+0x10/0x10 [ 746.392487][T21163] ? vfs_write+0x952/0xed0 [ 746.396738][T21163] ? __kasan_slab_free+0x11/0x20 [ 746.401514][T21163] kernel_clone+0x229/0x890 [ 746.405851][T21163] ? __kasan_check_write+0x14/0x20 [ 746.410913][T21163] ? mutex_unlock+0xb2/0x260 [ 746.415495][T21163] ? create_io_thread+0x180/0x180 [ 746.420362][T21163] __x64_sys_clone+0x231/0x280 [ 746.424959][T21163] ? __do_sys_vfork+0x110/0x110 [ 746.429651][T21163] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 746.435544][T21163] ? exit_to_user_mode_prepare+0x39/0xa0 [ 746.441014][T21163] x64_sys_call+0x1b0/0x9a0 [ 746.445350][T21163] do_syscall_64+0x3b/0xb0 [ 746.449605][T21163] ? clear_bhb_loop+0x55/0xb0 [ 746.454115][T21163] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 746.460020][T21163] RIP: 0033:0x7f3d3c18d169 [ 746.464281][T21163] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 746.483713][T21163] RSP: 002b:00007f3d3d002fe8 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 746.491958][T21163] RAX: ffffffffffffffda RBX: 00007f3d3c3a5fa0 RCX: 00007f3d3c18d169 [ 746.499777][T21163] RDX: 0000000000000000 RSI: 0000000000009000 RDI: 0000000004021400 [ 746.507584][T21163] RBP: 00007f3d3d003090 R08: 0000000000000000 R09: 0000000000000000 [ 746.515394][T21163] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000002 [ 746.523203][T21163] R13: 0000000000000000 R14: 00007f3d3c3a5fa0 R15: 00007ffc5a411998 [ 746.531023][T21163] [ 747.243653][T21191] device syzkaller0 entered promiscuous mode [ 747.366693][T21207] FAULT_INJECTION: forcing a failure. [ 747.366693][T21207] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 747.379946][T21207] CPU: 0 PID: 21207 Comm: syz.0.7006 Not tainted 6.1.129-syzkaller-00055-gca24c52e3c25 #0 [ 747.389674][T21207] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 747.399568][T21207] Call Trace: [ 747.402687][T21207] [ 747.405469][T21207] dump_stack_lvl+0x151/0x1b7 [ 747.409981][T21207] ? nf_tcp_handle_invalid+0x3f1/0x3f1 [ 747.415285][T21207] dump_stack+0x15/0x18 [ 747.419271][T21207] should_fail_ex+0x3d0/0x520 [ 747.423779][T21207] should_fail_alloc_page+0x68/0x90 [ 747.428817][T21207] prepare_alloc_pages+0x13b/0x6d0 [ 747.433767][T21207] ? __alloc_pages_bulk+0xcd0/0xcd0 [ 747.438801][T21207] __alloc_pages+0x162/0x610 [ 747.443225][T21207] ? prep_new_page+0x110/0x110 [ 747.447821][T21207] ? __alloc_pages+0x234/0x610 [ 747.452425][T21207] ? __kasan_check_write+0x14/0x20 [ 747.457376][T21207] ? _raw_spin_lock+0xa4/0x1b0 [ 747.461966][T21207] __pmd_alloc+0xb1/0x550 [ 747.466139][T21207] ? __pud_alloc+0x260/0x260 [ 747.470561][T21207] ? __pud_alloc+0x214/0x260 [ 747.474989][T21207] ? lock_vma_under_rcu+0x590/0x590 [ 747.480041][T21207] ? __stack_depot_save+0x36/0x480 [ 747.484971][T21207] copy_page_range+0x2af4/0x2ed0 [ 747.489740][T21207] ? __kasan_slab_alloc+0x6c/0x80 [ 747.494603][T21207] ? slab_post_alloc_hook+0x53/0x2c0 [ 747.499880][T21207] ? kmem_cache_alloc+0x175/0x320 [ 747.504730][T21207] ? copy_mm+0xdcb/0x1bc0 [ 747.508895][T21207] ? copy_process+0x12b6/0x3530 [ 747.513584][T21207] ? __x64_sys_clone+0x231/0x280 [ 747.518382][T21207] ? x64_sys_call+0x1b0/0x9a0 [ 747.522872][T21207] ? mas_wr_node_walk+0x5b5/0x720 [ 747.527751][T21207] ? pfn_valid+0x1e0/0x1e0 [ 747.531985][T21207] ? mas_wr_store_entry+0x492/0x730 [ 747.537013][T21207] ? mas_store+0x258/0x400 [ 747.541268][T21207] ? mas_empty_area_rev+0x17f0/0x17f0 [ 747.546478][T21207] ? anon_vma_fork+0x488/0x4d0 [ 747.551108][T21207] copy_mm+0x10ee/0x1bc0 [ 747.555169][T21207] ? copy_signal+0x650/0x650 [ 747.559585][T21207] ? _raw_spin_lock+0xa4/0x1b0 [ 747.564185][T21207] ? __init_rwsem+0x130/0x240 [ 747.568694][T21207] ? copy_signal+0x503/0x650 [ 747.573124][T21207] copy_process+0x12b6/0x3530 [ 747.577637][T21207] ? __kasan_check_write+0x14/0x20 [ 747.582578][T21207] ? proc_fail_nth_write+0x20b/0x290 [ 747.587704][T21207] ? idle_dummy+0x10/0x10 [ 747.591871][T21207] ? vfs_write+0x952/0xed0 [ 747.596122][T21207] ? __kasan_slab_free+0x11/0x20 [ 747.600895][T21207] kernel_clone+0x229/0x890 [ 747.605372][T21207] ? __kasan_check_write+0x14/0x20 [ 747.610292][T21207] ? mutex_unlock+0xb2/0x260 [ 747.614711][T21207] ? create_io_thread+0x180/0x180 [ 747.619579][T21207] __x64_sys_clone+0x231/0x280 [ 747.624176][T21207] ? __do_sys_vfork+0x110/0x110 [ 747.628994][T21207] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 747.634892][T21207] ? exit_to_user_mode_prepare+0x39/0xa0 [ 747.640373][T21207] x64_sys_call+0x1b0/0x9a0 [ 747.644697][T21207] do_syscall_64+0x3b/0xb0 [ 747.648952][T21207] ? clear_bhb_loop+0x55/0xb0 [ 747.653467][T21207] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 747.659190][T21207] RIP: 0033:0x7f8aa3d8d169 [ 747.663447][T21207] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 747.682886][T21207] RSP: 002b:00007f8aa4bf8fe8 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 747.691134][T21207] RAX: ffffffffffffffda RBX: 00007f8aa3fa5fa0 RCX: 00007f8aa3d8d169 [ 747.698942][T21207] RDX: 0000000000000000 RSI: 0000000000009000 RDI: 0000000004021400 [ 747.706758][T21207] RBP: 00007f8aa4bf9090 R08: 0000000000000000 R09: 0000000000000000 [ 747.714741][T21207] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000002 [ 747.722558][T21207] R13: 0000000000000000 R14: 00007f8aa3fa5fa0 R15: 00007ffe9024d138 [ 747.730383][T21207] [ 748.629601][T21235] device syzkaller0 entered promiscuous mode [ 749.675805][ T28] audit: type=1400 audit(1743748267.942:180): avc: denied { create } for pid=21279 comm="syz.0.7029" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=ipx_socket permissive=1 [ 749.727562][T21283] device pim6reg1 entered promiscuous mode [ 749.830277][T21291] device syzkaller0 entered promiscuous mode [ 750.253389][T21325] FAULT_INJECTION: forcing a failure. [ 750.253389][T21325] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 750.331945][T21325] CPU: 1 PID: 21325 Comm: syz.4.7044 Not tainted 6.1.129-syzkaller-00055-gca24c52e3c25 #0 [ 750.341694][T21325] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 750.351589][T21325] Call Trace: [ 750.354712][T21325] [ 750.357485][T21325] dump_stack_lvl+0x151/0x1b7 [ 750.362005][T21325] ? nf_tcp_handle_invalid+0x3f1/0x3f1 [ 750.367303][T21325] dump_stack+0x15/0x18 [ 750.371285][T21325] should_fail_ex+0x3d0/0x520 [ 750.375807][T21325] should_fail_alloc_page+0x68/0x90 [ 750.380847][T21325] prepare_alloc_pages+0x13b/0x6d0 [ 750.385789][T21325] ? __alloc_pages_bulk+0xcd0/0xcd0 [ 750.390822][T21325] ? __alloc_pages+0x610/0x610 [ 750.395423][T21325] __alloc_pages+0x162/0x610 [ 750.399857][T21325] ? prep_new_page+0x110/0x110 [ 750.404451][T21325] ? __this_cpu_preempt_check+0x13/0x20 [ 750.409827][T21325] ? __mod_node_page_state+0xac/0xf0 [ 750.415085][T21325] pte_alloc_one+0x73/0x1b0 [ 750.419419][T21325] ? pfn_modify_allowed+0x2f0/0x2f0 [ 750.424462][T21325] __pte_alloc+0x86/0x350 [ 750.428624][T21325] ? pmd_install+0x260/0x260 [ 750.433053][T21325] ? _raw_spin_lock+0xa4/0x1b0 [ 750.437652][T21325] ? __kasan_check_write+0x14/0x20 [ 750.442602][T21325] copy_page_range+0x2748/0x2ed0 [ 750.447385][T21325] ? pfn_valid+0x1e0/0x1e0 [ 750.451621][T21325] ? mas_wr_store_entry+0x492/0x730 [ 750.456672][T21325] ? mas_store+0x258/0x400 [ 750.460910][T21325] ? mas_empty_area_rev+0x17f0/0x17f0 [ 750.466123][T21325] copy_mm+0x10ee/0x1bc0 [ 750.470200][T21325] ? copy_signal+0x650/0x650 [ 750.474618][T21325] ? _raw_spin_lock+0xa4/0x1b0 [ 750.479222][T21325] ? __init_rwsem+0x130/0x240 [ 750.483734][T21325] ? copy_signal+0x503/0x650 [ 750.488162][T21325] copy_process+0x12b6/0x3530 [ 750.492678][T21325] ? __kasan_check_write+0x14/0x20 [ 750.497617][T21325] ? proc_fail_nth_write+0x20b/0x290 [ 750.502750][T21325] ? idle_dummy+0x10/0x10 [ 750.507028][T21325] ? vfs_write+0x952/0xed0 [ 750.511389][T21325] ? __kasan_slab_free+0x11/0x20 [ 750.516166][T21325] kernel_clone+0x229/0x890 [ 750.520587][T21325] ? __kasan_check_write+0x14/0x20 [ 750.525534][T21325] ? mutex_unlock+0xb2/0x260 [ 750.529961][T21325] ? create_io_thread+0x180/0x180 [ 750.534828][T21325] __x64_sys_clone+0x231/0x280 [ 750.539425][T21325] ? __do_sys_vfork+0x110/0x110 [ 750.544115][T21325] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 750.550010][T21325] ? exit_to_user_mode_prepare+0x39/0xa0 [ 750.555479][T21325] x64_sys_call+0x1b0/0x9a0 [ 750.559814][T21325] do_syscall_64+0x3b/0xb0 [ 750.564074][T21325] ? clear_bhb_loop+0x55/0xb0 [ 750.568586][T21325] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 750.574309][T21325] RIP: 0033:0x7f3d3c18d169 [ 750.578564][T21325] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 750.598008][T21325] RSP: 002b:00007f3d3d002fe8 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 750.606253][T21325] RAX: ffffffffffffffda RBX: 00007f3d3c3a5fa0 RCX: 00007f3d3c18d169 [ 750.614072][T21325] RDX: 0000000000000000 RSI: 0000000000009000 RDI: 0000000004021400 [ 750.621958][T21325] RBP: 00007f3d3d003090 R08: 0000000000000000 R09: 0000000000000000 [ 750.629770][T21325] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000002 [ 750.637582][T21325] R13: 0000000000000000 R14: 00007f3d3c3a5fa0 R15: 00007ffc5a411998 [ 750.645409][T21325] [ 750.794082][T21339] device pim6reg1 entered promiscuous mode [ 751.410116][T21372] FAULT_INJECTION: forcing a failure. [ 751.410116][T21372] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 751.434367][T21372] CPU: 0 PID: 21372 Comm: syz.3.7057 Not tainted 6.1.129-syzkaller-00055-gca24c52e3c25 #0 [ 751.444116][T21372] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 751.454006][T21372] Call Trace: [ 751.457125][T21372] [ 751.459906][T21372] dump_stack_lvl+0x151/0x1b7 [ 751.464415][T21372] ? nf_tcp_handle_invalid+0x3f1/0x3f1 [ 751.470116][T21372] dump_stack+0x15/0x18 [ 751.474094][T21372] should_fail_ex+0x3d0/0x520 [ 751.478608][T21372] should_fail_alloc_page+0x68/0x90 [ 751.483645][T21372] prepare_alloc_pages+0x13b/0x6d0 [ 751.488744][T21372] ? __alloc_pages_bulk+0xcd0/0xcd0 [ 751.493778][T21372] ? __alloc_pages+0x610/0x610 [ 751.498374][T21372] __alloc_pages+0x162/0x610 [ 751.502798][T21372] ? prep_new_page+0x110/0x110 [ 751.507406][T21372] ? __this_cpu_preempt_check+0x13/0x20 [ 751.512779][T21372] ? __mod_node_page_state+0xac/0xf0 [ 751.517907][T21372] pte_alloc_one+0x73/0x1b0 [ 751.522238][T21372] ? pfn_modify_allowed+0x2f0/0x2f0 [ 751.527275][T21372] __pte_alloc+0x86/0x350 [ 751.531437][T21372] ? pmd_install+0x260/0x260 [ 751.536404][T21372] ? __kasan_check_write+0x14/0x20 [ 751.541463][T21372] copy_page_range+0x2748/0x2ed0 [ 751.546242][T21372] ? pfn_valid+0x1e0/0x1e0 [ 751.550487][T21372] ? mas_wr_store_entry+0x492/0x730 [ 751.555518][T21372] ? mas_store+0x258/0x400 [ 751.559778][T21372] ? mas_empty_area_rev+0x17f0/0x17f0 [ 751.564985][T21372] copy_mm+0x10ee/0x1bc0 [ 751.569069][T21372] ? copy_signal+0x650/0x650 [ 751.573485][T21372] ? _raw_spin_lock+0xa4/0x1b0 [ 751.578084][T21372] ? __init_rwsem+0x130/0x240 [ 751.582598][T21372] ? copy_signal+0x503/0x650 [ 751.587023][T21372] copy_process+0x12b6/0x3530 [ 751.591537][T21372] ? __kasan_check_write+0x14/0x20 [ 751.596485][T21372] ? proc_fail_nth_write+0x20b/0x290 [ 751.601607][T21372] ? idle_dummy+0x10/0x10 [ 751.605773][T21372] ? vfs_write+0x952/0xed0 [ 751.610025][T21372] ? __kasan_slab_free+0x11/0x20 [ 751.614831][T21372] kernel_clone+0x229/0x890 [ 751.619137][T21372] ? __kasan_check_write+0x14/0x20 [ 751.624080][T21372] ? mutex_unlock+0xb2/0x260 [ 751.628507][T21372] ? create_io_thread+0x180/0x180 [ 751.633371][T21372] __x64_sys_clone+0x231/0x280 [ 751.637969][T21372] ? __do_sys_vfork+0x110/0x110 [ 751.642661][T21372] ? debug_smp_processor_id+0x17/0x20 [ 751.647861][T21372] ? perf_trace_sys_enter+0x30/0x140 [ 751.652986][T21372] x64_sys_call+0x1b0/0x9a0 [ 751.657322][T21372] do_syscall_64+0x3b/0xb0 [ 751.661577][T21372] ? clear_bhb_loop+0x55/0xb0 [ 751.666090][T21372] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 751.671821][T21372] RIP: 0033:0x7ffa82f8d169 [ 751.676077][T21372] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 751.695520][T21372] RSP: 002b:00007ffa83dc9fe8 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 751.703760][T21372] RAX: ffffffffffffffda RBX: 00007ffa831a5fa0 RCX: 00007ffa82f8d169 [ 751.711573][T21372] RDX: 0000000000000000 RSI: 0000000000009000 RDI: 0000000004021400 [ 751.719383][T21372] RBP: 00007ffa83dca090 R08: 0000000000000000 R09: 0000000000000000 [ 751.727204][T21372] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000002 [ 751.735007][T21372] R13: 0000000000000000 R14: 00007ffa831a5fa0 R15: 00007ffe48c53ca8 [ 751.742826][T21372] [ 751.810922][T21382] device pim6reg1 entered promiscuous mode [ 751.829306][T21384] FAULT_INJECTION: forcing a failure. [ 751.829306][T21384] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 751.846793][T21384] CPU: 0 PID: 21384 Comm: syz.1.7063 Not tainted 6.1.129-syzkaller-00055-gca24c52e3c25 #0 [ 751.856531][T21384] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 751.866426][T21384] Call Trace: [ 751.869545][T21384] [ 751.872327][T21384] dump_stack_lvl+0x151/0x1b7 [ 751.876840][T21384] ? nf_tcp_handle_invalid+0x3f1/0x3f1 [ 751.882136][T21384] ? dump_stack+0x9/0x18 [ 751.886221][T21384] dump_stack+0x15/0x18 [ 751.890204][T21384] should_fail_ex+0x3d0/0x520 [ 751.894720][T21384] should_fail+0xb/0x10 [ 751.898713][T21384] should_fail_usercopy+0x1a/0x20 [ 751.903571][T21384] _copy_from_user+0x1e/0xc0 [ 751.907997][T21384] __sys_bpf+0x23b/0x7f0 [ 751.912083][T21384] ? bpf_link_show_fdinfo+0x300/0x300 [ 751.917289][T21384] ? __ia32_sys_read+0x90/0x90 [ 751.921888][T21384] ? debug_smp_processor_id+0x17/0x20 [ 751.927090][T21384] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 751.932994][T21384] __x64_sys_bpf+0x7c/0x90 [ 751.937254][T21384] x64_sys_call+0x87f/0x9a0 [ 751.941584][T21384] do_syscall_64+0x3b/0xb0 [ 751.945837][T21384] ? clear_bhb_loop+0x55/0xb0 [ 751.950355][T21384] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 751.956083][T21384] RIP: 0033:0x7f8c4018d169 [ 751.960334][T21384] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 751.979780][T21384] RSP: 002b:00007f8c410a5038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 751.988016][T21384] RAX: ffffffffffffffda RBX: 00007f8c403a5fa0 RCX: 00007f8c4018d169 [ 751.995828][T21384] RDX: 0000000000000020 RSI: 0000200000000280 RDI: 0000000000000002 [ 752.003653][T21384] RBP: 00007f8c410a5090 R08: 0000000000000000 R09: 0000000000000000 [ 752.011455][T21384] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 752.019445][T21384] R13: 0000000000000000 R14: 00007f8c403a5fa0 R15: 00007ffdc331e648 [ 752.027263][T21384] [ 752.560827][T21408] FAULT_INJECTION: forcing a failure. [ 752.560827][T21408] name failslab, interval 1, probability 0, space 0, times 0 [ 752.726759][T21408] CPU: 0 PID: 21408 Comm: syz.3.7071 Not tainted 6.1.129-syzkaller-00055-gca24c52e3c25 #0 [ 752.736507][T21408] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 752.746402][T21408] Call Trace: [ 752.749524][T21408] [ 752.752302][T21408] dump_stack_lvl+0x151/0x1b7 [ 752.756816][T21408] ? nf_tcp_handle_invalid+0x3f1/0x3f1 [ 752.762112][T21408] ? __kasan_slab_alloc+0x6c/0x80 [ 752.766970][T21408] ? vma_interval_tree_augment_rotate+0x1d0/0x1d0 [ 752.773217][T21408] dump_stack+0x15/0x18 [ 752.777211][T21408] should_fail_ex+0x3d0/0x520 [ 752.781729][T21408] ? anon_vma_fork+0xee/0x4d0 [ 752.786238][T21408] __should_failslab+0xaf/0xf0 [ 752.790837][T21408] should_failslab+0x9/0x20 [ 752.795178][T21408] kmem_cache_alloc+0x3b/0x320 [ 752.799779][T21408] anon_vma_fork+0xee/0x4d0 [ 752.804118][T21408] ? vm_area_dup+0x1e0/0x290 [ 752.808544][T21408] copy_mm+0xdcb/0x1bc0 [ 752.812540][T21408] ? copy_signal+0x650/0x650 [ 752.816961][T21408] ? _raw_spin_lock+0xa4/0x1b0 [ 752.821567][T21408] ? __init_rwsem+0x130/0x240 [ 752.826085][T21408] ? copy_signal+0x503/0x650 [ 752.830505][T21408] copy_process+0x12b6/0x3530 [ 752.835024][T21408] ? __kasan_check_write+0x14/0x20 [ 752.839960][T21408] ? proc_fail_nth_write+0x20b/0x290 [ 752.845085][T21408] ? idle_dummy+0x10/0x10 [ 752.849253][T21408] ? vfs_write+0x952/0xed0 [ 752.853504][T21408] ? __kasan_slab_free+0x11/0x20 [ 752.858278][T21408] kernel_clone+0x229/0x890 [ 752.862616][T21408] ? __kasan_check_write+0x14/0x20 [ 752.867566][T21408] ? mutex_unlock+0xb2/0x260 [ 752.871987][T21408] ? create_io_thread+0x180/0x180 [ 752.876853][T21408] __x64_sys_clone+0x231/0x280 [ 752.881458][T21408] ? __do_sys_vfork+0x110/0x110 [ 752.886145][T21408] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 752.892039][T21408] ? exit_to_user_mode_prepare+0x39/0xa0 [ 752.897504][T21408] x64_sys_call+0x1b0/0x9a0 [ 752.901846][T21408] do_syscall_64+0x3b/0xb0 [ 752.906094][T21408] ? clear_bhb_loop+0x55/0xb0 [ 752.910607][T21408] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 752.916333][T21408] RIP: 0033:0x7ffa82f8d169 [ 752.920592][T21408] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 752.940033][T21408] RSP: 002b:00007ffa83dc9fe8 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 752.948277][T21408] RAX: ffffffffffffffda RBX: 00007ffa831a5fa0 RCX: 00007ffa82f8d169 [ 752.956086][T21408] RDX: 0000000000000000 RSI: 0000000000009000 RDI: 0000000004021400 [ 752.963904][T21408] RBP: 00007ffa83dca090 R08: 0000000000000000 R09: 0000000000000000 [ 752.971711][T21408] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000002 [ 752.979520][T21408] R13: 0000000000000000 R14: 00007ffa831a5fa0 R15: 00007ffe48c53ca8 [ 752.987337][T21408] [ 755.328739][T21417] device bridge_slave_1 left promiscuous mode [ 755.335009][T21417] bridge0: port 2(bridge_slave_1) entered disabled state [ 755.344036][T21417] device bridge_slave_0 left promiscuous mode [ 755.350029][T21417] bridge0: port 1(bridge_slave_0) entered disabled state [ 755.457878][T21433] device pim6reg1 entered promiscuous mode [ 755.710653][T21443] device pim6reg1 entered promiscuous mode [ 761.781128][T21484] device pim6reg1 entered promiscuous mode [ 761.969928][T21497] device syzkaller0 entered promiscuous mode [ 763.324105][T21533] device pim6reg1 entered promiscuous mode [ 764.393406][T21577] device pim6reg1 entered promiscuous mode [ 765.552074][T21628] device veth0_vlan left promiscuous mode [ 765.686947][T21628] device veth0_vlan entered promiscuous mode [ 766.002309][ T28] audit: type=1400 audit(1743748284.262:181): avc: denied { create } for pid=21649 comm="syz.1.7144" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 767.039986][T21695] device pim6reg1 entered promiscuous mode [ 768.101549][T21738] device pim6reg1 entered promiscuous mode [ 769.099277][T21776] device pim6reg1 entered promiscuous mode [ 769.119609][T21778] device pim6reg1 entered promiscuous mode [ 770.802797][T21818] device pim6reg1 entered promiscuous mode [ 772.485980][T21864] FAULT_INJECTION: forcing a failure. [ 772.485980][T21864] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 772.533777][T21867] device pim6reg1 entered promiscuous mode [ 772.553384][T21864] CPU: 0 PID: 21864 Comm: syz.1.7214 Not tainted 6.1.129-syzkaller-00055-gca24c52e3c25 #0 [ 772.563128][T21864] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 772.573022][T21864] Call Trace: [ 772.576140][T21864] [ 772.578926][T21864] dump_stack_lvl+0x151/0x1b7 [ 772.583435][T21864] ? nf_tcp_handle_invalid+0x3f1/0x3f1 [ 772.588744][T21864] dump_stack+0x15/0x18 [ 772.592718][T21864] should_fail_ex+0x3d0/0x520 [ 772.597236][T21864] should_fail_alloc_page+0x68/0x90 [ 772.602275][T21864] prepare_alloc_pages+0x13b/0x6d0 [ 772.607218][T21864] ? __alloc_pages_bulk+0xcd0/0xcd0 [ 772.612249][T21864] ? __alloc_pages+0x610/0x610 [ 772.616847][T21864] __alloc_pages+0x162/0x610 [ 772.621284][T21864] ? prep_new_page+0x110/0x110 [ 772.625900][T21864] ? __this_cpu_preempt_check+0x13/0x20 [ 772.631264][T21864] ? __mod_node_page_state+0xac/0xf0 [ 772.636501][T21864] pte_alloc_one+0x73/0x1b0 [ 772.640841][T21864] ? pfn_modify_allowed+0x2f0/0x2f0 [ 772.645875][T21864] __pte_alloc+0x86/0x350 [ 772.650038][T21864] ? pmd_install+0x260/0x260 [ 772.654463][T21864] ? _raw_spin_lock+0xa4/0x1b0 [ 772.659064][T21864] ? __kasan_check_write+0x14/0x20 [ 772.664033][T21864] copy_page_range+0x2748/0x2ed0 [ 772.668807][T21864] ? pfn_valid+0x1e0/0x1e0 [ 772.673048][T21864] ? mas_wr_store_entry+0x492/0x730 [ 772.678074][T21864] ? mas_store+0x258/0x400 [ 772.682326][T21864] ? mas_empty_area_rev+0x17f0/0x17f0 [ 772.687535][T21864] ? rwsem_write_trylock+0x153/0x340 [ 772.692660][T21864] copy_mm+0x10ee/0x1bc0 [ 772.696740][T21864] ? copy_signal+0x650/0x650 [ 772.701162][T21864] ? _raw_spin_lock+0xa4/0x1b0 [ 772.705774][T21864] ? __init_rwsem+0x130/0x240 [ 772.710272][T21864] ? copy_signal+0x503/0x650 [ 772.714702][T21864] copy_process+0x12b6/0x3530 [ 772.719212][T21864] ? __kasan_check_write+0x14/0x20 [ 772.724157][T21864] ? proc_fail_nth_write+0x20b/0x290 [ 772.729370][T21864] ? idle_dummy+0x10/0x10 [ 772.733532][T21864] ? vfs_write+0x952/0xed0 [ 772.737789][T21864] ? __kasan_slab_free+0x11/0x20 [ 772.742564][T21864] kernel_clone+0x229/0x890 [ 772.746903][T21864] ? __kasan_check_write+0x14/0x20 [ 772.751843][T21864] ? mutex_unlock+0xb2/0x260 [ 772.756274][T21864] ? create_io_thread+0x180/0x180 [ 772.761134][T21864] __x64_sys_clone+0x231/0x280 [ 772.765731][T21864] ? __do_sys_vfork+0x110/0x110 [ 772.770420][T21864] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 772.776324][T21864] ? exit_to_user_mode_prepare+0x39/0xa0 [ 772.781790][T21864] x64_sys_call+0x1b0/0x9a0 [ 772.786126][T21864] do_syscall_64+0x3b/0xb0 [ 772.790380][T21864] ? clear_bhb_loop+0x55/0xb0 [ 772.794897][T21864] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 772.800619][T21864] RIP: 0033:0x7f8c4018d169 [ 772.804874][T21864] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 772.824315][T21864] RSP: 002b:00007f8c410a4fe8 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 772.832562][T21864] RAX: ffffffffffffffda RBX: 00007f8c403a5fa0 RCX: 00007f8c4018d169 [ 772.840371][T21864] RDX: 0000000000000000 RSI: 0000000000009000 RDI: 0000000004021400 [ 772.848183][T21864] RBP: 00007f8c410a5090 R08: 0000000000000000 R09: 0000000000000000 [ 772.855993][T21864] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000002 [ 772.863806][T21864] R13: 0000000000000000 R14: 00007f8c403a5fa0 R15: 00007ffdc331e648 [ 772.871623][T21864] [ 773.869761][T21916] bond_slave_1: mtu less than device minimum [ 773.929153][T21921] FAULT_INJECTION: forcing a failure. [ 773.929153][T21921] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 773.942325][T21921] CPU: 1 PID: 21921 Comm: syz.1.7230 Not tainted 6.1.129-syzkaller-00055-gca24c52e3c25 #0 [ 773.952043][T21921] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 773.961940][T21921] Call Trace: [ 773.965064][T21921] [ 773.967841][T21921] dump_stack_lvl+0x151/0x1b7 [ 773.972352][T21921] ? nf_tcp_handle_invalid+0x3f1/0x3f1 [ 773.977650][T21921] dump_stack+0x15/0x18 [ 773.981637][T21921] should_fail_ex+0x3d0/0x520 [ 773.986154][T21921] should_fail_alloc_page+0x68/0x90 [ 773.991189][T21921] prepare_alloc_pages+0x13b/0x6d0 [ 773.996137][T21921] ? __alloc_pages_bulk+0xcd0/0xcd0 [ 774.001166][T21921] ? __alloc_pages+0x610/0x610 [ 774.005769][T21921] __alloc_pages+0x162/0x610 [ 774.010194][T21921] ? prep_new_page+0x110/0x110 [ 774.014798][T21921] ? __this_cpu_preempt_check+0x13/0x20 [ 774.020174][T21921] ? __mod_node_page_state+0xac/0xf0 [ 774.025302][T21921] pte_alloc_one+0x73/0x1b0 [ 774.029635][T21921] ? pfn_modify_allowed+0x2f0/0x2f0 [ 774.034675][T21921] __pte_alloc+0x86/0x350 [ 774.038832][T21921] ? pmd_install+0x260/0x260 [ 774.043254][T21921] ? _raw_spin_lock+0xa4/0x1b0 [ 774.047856][T21921] ? __kasan_check_write+0x14/0x20 [ 774.052899][T21921] copy_page_range+0x2748/0x2ed0 [ 774.057673][T21921] ? pfn_valid+0x1e0/0x1e0 [ 774.061924][T21921] ? mas_wr_store_entry+0x492/0x730 [ 774.066952][T21921] ? mas_store+0x258/0x400 [ 774.071202][T21921] ? mas_empty_area_rev+0x17f0/0x17f0 [ 774.076418][T21921] copy_mm+0x10ee/0x1bc0 [ 774.080495][T21921] ? copy_signal+0x650/0x650 [ 774.084918][T21921] ? _raw_spin_lock+0xa4/0x1b0 [ 774.089520][T21921] ? __init_rwsem+0x130/0x240 [ 774.094030][T21921] ? copy_signal+0x503/0x650 [ 774.098461][T21921] copy_process+0x12b6/0x3530 [ 774.102973][T21921] ? __kasan_check_write+0x14/0x20 [ 774.107916][T21921] ? proc_fail_nth_write+0x20b/0x290 [ 774.113040][T21921] ? idle_dummy+0x10/0x10 [ 774.117203][T21921] ? vfs_write+0x952/0xed0 [ 774.121454][T21921] ? __kasan_slab_free+0x11/0x20 [ 774.126232][T21921] kernel_clone+0x229/0x890 [ 774.130573][T21921] ? __kasan_check_write+0x14/0x20 [ 774.135521][T21921] ? mutex_unlock+0xb2/0x260 [ 774.139943][T21921] ? create_io_thread+0x180/0x180 [ 774.144811][T21921] __x64_sys_clone+0x231/0x280 [ 774.149402][T21921] ? __do_sys_vfork+0x110/0x110 [ 774.154093][T21921] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 774.159993][T21921] ? exit_to_user_mode_prepare+0x39/0xa0 [ 774.165461][T21921] x64_sys_call+0x1b0/0x9a0 [ 774.169810][T21921] do_syscall_64+0x3b/0xb0 [ 774.174051][T21921] ? clear_bhb_loop+0x55/0xb0 [ 774.178571][T21921] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 774.184293][T21921] RIP: 0033:0x7f8c4018d169 [ 774.188547][T21921] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 774.208000][T21921] RSP: 002b:00007f8c410a4fe8 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 774.216238][T21921] RAX: ffffffffffffffda RBX: 00007f8c403a5fa0 RCX: 00007f8c4018d169 [ 774.224047][T21921] RDX: 0000000000000000 RSI: 0000000000009000 RDI: 0000000004021400 [ 774.231865][T21921] RBP: 00007f8c410a5090 R08: 0000000000000000 R09: 0000000000000000 [ 774.239666][T21921] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000002 [ 774.247478][T21921] R13: 0000000000000000 R14: 00007f8c403a5fa0 R15: 00007ffdc331e648 [ 774.255392][T21921] [ 774.729993][T21948] device syzkaller0 entered promiscuous mode [ 774.807254][T21951] device pim6reg1 entered promiscuous mode [ 775.934180][T21961] FAULT_INJECTION: forcing a failure. [ 775.934180][T21961] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 776.058078][T21961] CPU: 0 PID: 21961 Comm: syz.1.7242 Not tainted 6.1.129-syzkaller-00055-gca24c52e3c25 #0 [ 776.067831][T21961] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 776.077731][T21961] Call Trace: [ 776.080847][T21961] [ 776.083744][T21961] dump_stack_lvl+0x151/0x1b7 [ 776.088264][T21961] ? nf_tcp_handle_invalid+0x3f1/0x3f1 [ 776.093557][T21961] ? __this_cpu_preempt_check+0x13/0x20 [ 776.098936][T21961] ? xfd_validate_state+0x6f/0x170 [ 776.103893][T21961] dump_stack+0x15/0x18 [ 776.107872][T21961] should_fail_ex+0x3d0/0x520 [ 776.112390][T21961] should_fail_alloc_page+0x68/0x90 [ 776.117425][T21961] prepare_alloc_pages+0x13b/0x6d0 [ 776.122380][T21961] ? __this_cpu_preempt_check+0x13/0x20 [ 776.127755][T21961] ? __alloc_pages_bulk+0xcd0/0xcd0 [ 776.132784][T21961] ? __update_idle_core+0x310/0x310 [ 776.137824][T21961] __alloc_pages+0x162/0x610 [ 776.142248][T21961] ? prep_new_page+0x110/0x110 [ 776.146847][T21961] ? __schedule+0xcbd/0x1560 [ 776.151449][T21961] pte_alloc_one+0x73/0x1b0 [ 776.155785][T21961] ? pfn_modify_allowed+0x2f0/0x2f0 [ 776.160817][T21961] ? preempt_schedule+0xd9/0xe0 [ 776.165505][T21961] ? preempt_schedule_common+0xbe/0xf0 [ 776.170816][T21961] __pte_alloc+0x86/0x350 [ 776.174966][T21961] ? pmd_install+0x260/0x260 [ 776.179389][T21961] ? _raw_spin_lock+0xa4/0x1b0 [ 776.183989][T21961] ? __kasan_check_write+0x14/0x20 [ 776.188942][T21961] copy_page_range+0x2748/0x2ed0 [ 776.193725][T21961] ? pfn_valid+0x1e0/0x1e0 [ 776.198049][T21961] ? mas_wr_store_entry+0x492/0x730 [ 776.203090][T21961] ? mas_store+0x258/0x400 [ 776.207421][T21961] ? mas_empty_area_rev+0x17f0/0x17f0 [ 776.212647][T21961] copy_mm+0x10ee/0x1bc0 [ 776.216713][T21961] ? copy_signal+0x650/0x650 [ 776.221137][T21961] ? _raw_spin_lock+0xa4/0x1b0 [ 776.225738][T21961] ? __init_rwsem+0x130/0x240 [ 776.230258][T21961] ? copy_signal+0x503/0x650 [ 776.234761][T21961] copy_process+0x12b6/0x3530 [ 776.239274][T21961] ? __kasan_check_write+0x14/0x20 [ 776.244222][T21961] ? proc_fail_nth_write+0x20b/0x290 [ 776.249344][T21961] ? idle_dummy+0x10/0x10 [ 776.253509][T21961] ? vfs_write+0x952/0xed0 [ 776.257763][T21961] ? __kasan_slab_free+0x11/0x20 [ 776.262537][T21961] kernel_clone+0x229/0x890 [ 776.266877][T21961] ? __kasan_check_write+0x14/0x20 [ 776.271820][T21961] ? mutex_unlock+0xb2/0x260 [ 776.276245][T21961] ? create_io_thread+0x180/0x180 [ 776.281111][T21961] __x64_sys_clone+0x231/0x280 [ 776.285711][T21961] ? __do_sys_vfork+0x110/0x110 [ 776.290399][T21961] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 776.296301][T21961] ? exit_to_user_mode_prepare+0x39/0xa0 [ 776.301769][T21961] x64_sys_call+0x1b0/0x9a0 [ 776.306102][T21961] do_syscall_64+0x3b/0xb0 [ 776.310359][T21961] ? clear_bhb_loop+0x55/0xb0 [ 776.314872][T21961] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 776.320601][T21961] RIP: 0033:0x7f8c4018d169 [ 776.324852][T21961] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 776.344380][T21961] RSP: 002b:00007f8c410a4fe8 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 776.352623][T21961] RAX: ffffffffffffffda RBX: 00007f8c403a5fa0 RCX: 00007f8c4018d169 [ 776.360434][T21961] RDX: 0000000000000000 RSI: 0000000000009000 RDI: 0000000004021400 [ 776.368245][T21961] RBP: 00007f8c410a5090 R08: 0000000000000000 R09: 0000000000000000 [ 776.376061][T21961] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000002 [ 776.383884][T21961] R13: 0000000000000000 R14: 00007f8c403a5fa0 R15: 00007ffdc331e648 [ 776.391689][T21961] [ 776.728161][T21980] device syzkaller0 entered promiscuous mode [ 777.094981][T22005] FAULT_INJECTION: forcing a failure. [ 777.094981][T22005] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 777.141963][T22005] CPU: 1 PID: 22005 Comm: syz.1.7259 Not tainted 6.1.129-syzkaller-00055-gca24c52e3c25 #0 [ 777.151709][T22005] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 777.161606][T22005] Call Trace: [ 777.164727][T22005] [ 777.167514][T22005] dump_stack_lvl+0x151/0x1b7 [ 777.172018][T22005] ? nf_tcp_handle_invalid+0x3f1/0x3f1 [ 777.177315][T22005] dump_stack+0x15/0x18 [ 777.181311][T22005] should_fail_ex+0x3d0/0x520 [ 777.185821][T22005] should_fail_alloc_page+0x68/0x90 [ 777.190851][T22005] prepare_alloc_pages+0x13b/0x6d0 [ 777.195799][T22005] ? __alloc_pages_bulk+0xcd0/0xcd0 [ 777.200831][T22005] ? __alloc_pages+0x610/0x610 [ 777.205434][T22005] __alloc_pages+0x162/0x610 [ 777.209963][T22005] ? prep_new_page+0x110/0x110 [ 777.214565][T22005] ? __this_cpu_preempt_check+0x13/0x20 [ 777.219941][T22005] ? __mod_node_page_state+0xac/0xf0 [ 777.225063][T22005] pte_alloc_one+0x73/0x1b0 [ 777.229399][T22005] ? pfn_modify_allowed+0x2f0/0x2f0 [ 777.234433][T22005] __pte_alloc+0x86/0x350 [ 777.238596][T22005] ? pmd_install+0x260/0x260 [ 777.243020][T22005] ? _raw_spin_lock+0xa4/0x1b0 [ 777.247623][T22005] ? __kasan_check_write+0x14/0x20 [ 777.252571][T22005] copy_page_range+0x2748/0x2ed0 [ 777.257355][T22005] ? pfn_valid+0x1e0/0x1e0 [ 777.261594][T22005] ? mas_wr_store_entry+0x492/0x730 [ 777.266634][T22005] ? mas_store+0x258/0x400 [ 777.270887][T22005] ? mas_empty_area_rev+0x17f0/0x17f0 [ 777.276095][T22005] copy_mm+0x10ee/0x1bc0 [ 777.280176][T22005] ? copy_signal+0x650/0x650 [ 777.284681][T22005] ? _raw_spin_lock+0xa4/0x1b0 [ 777.289285][T22005] ? __init_rwsem+0x130/0x240 [ 777.293796][T22005] ? copy_signal+0x503/0x650 [ 777.298225][T22005] copy_process+0x12b6/0x3530 [ 777.302741][T22005] ? __kasan_check_write+0x14/0x20 [ 777.307682][T22005] ? proc_fail_nth_write+0x20b/0x290 [ 777.312806][T22005] ? idle_dummy+0x10/0x10 [ 777.316973][T22005] ? vfs_write+0x952/0xed0 [ 777.321354][T22005] ? __kasan_slab_free+0x11/0x20 [ 777.326125][T22005] kernel_clone+0x229/0x890 [ 777.330546][T22005] ? __kasan_check_write+0x14/0x20 [ 777.335494][T22005] ? mutex_unlock+0xb2/0x260 [ 777.339923][T22005] ? create_io_thread+0x180/0x180 [ 777.344788][T22005] __x64_sys_clone+0x231/0x280 [ 777.349386][T22005] ? __do_sys_vfork+0x110/0x110 [ 777.354081][T22005] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 777.359984][T22005] ? exit_to_user_mode_prepare+0x39/0xa0 [ 777.365443][T22005] x64_sys_call+0x1b0/0x9a0 [ 777.369778][T22005] do_syscall_64+0x3b/0xb0 [ 777.374029][T22005] ? clear_bhb_loop+0x55/0xb0 [ 777.378546][T22005] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 777.384274][T22005] RIP: 0033:0x7f8c4018d169 [ 777.388525][T22005] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 777.407970][T22005] RSP: 002b:00007f8c410a4fe8 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 777.416221][T22005] RAX: ffffffffffffffda RBX: 00007f8c403a5fa0 RCX: 00007f8c4018d169 [ 777.424026][T22005] RDX: 0000000000000000 RSI: 0000000000009000 RDI: 0000000004021400 [ 777.431834][T22005] RBP: 00007f8c410a5090 R08: 0000000000000000 R09: 0000000000000000 [ 777.439649][T22005] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000002 [ 777.447463][T22005] R13: 0000000000000000 R14: 00007f8c403a5fa0 R15: 00007ffdc331e648 [ 777.455275][T22005] [ 777.492281][T22006] device pim6reg1 entered promiscuous mode [ 780.307818][T22059] device syzkaller0 entered promiscuous mode [ 780.397052][T22063] device syzkaller0 entered promiscuous mode [ 783.617408][T22117] device sit0 left promiscuous mode [ 783.733309][T22120] device sit0 entered promiscuous mode [ 783.900857][T22128] FAULT_INJECTION: forcing a failure. [ 783.900857][T22128] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 783.998799][T22128] CPU: 1 PID: 22128 Comm: syz.1.7294 Not tainted 6.1.129-syzkaller-00055-gca24c52e3c25 #0 [ 784.008546][T22128] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 784.018443][T22128] Call Trace: [ 784.021565][T22128] [ 784.024346][T22128] dump_stack_lvl+0x151/0x1b7 [ 784.028857][T22128] ? nf_tcp_handle_invalid+0x3f1/0x3f1 [ 784.034152][T22128] dump_stack+0x15/0x18 [ 784.038140][T22128] should_fail_ex+0x3d0/0x520 [ 784.042659][T22128] should_fail+0xb/0x10 [ 784.046662][T22128] should_fail_usercopy+0x1a/0x20 [ 784.051507][T22128] _copy_to_user+0x1e/0x90 [ 784.055758][T22128] simple_read_from_buffer+0xc7/0x150 [ 784.060970][T22128] proc_fail_nth_read+0x1a3/0x210 [ 784.065825][T22128] ? proc_fault_inject_write+0x390/0x390 [ 784.071293][T22128] ? fsnotify_perm+0x269/0x5b0 [ 784.075900][T22128] ? security_file_permission+0x86/0xb0 [ 784.081278][T22128] ? proc_fault_inject_write+0x390/0x390 [ 784.086743][T22128] vfs_read+0x26c/0xae0 [ 784.090739][T22128] ? kernel_read+0x1f0/0x1f0 [ 784.095161][T22128] ? mutex_lock+0xb1/0x1e0 [ 784.099418][T22128] ? bit_wait_io_timeout+0x120/0x120 [ 784.104543][T22128] ? __fdget_pos+0x2e2/0x390 [ 784.108960][T22128] ? ksys_read+0x77/0x2c0 [ 784.113129][T22128] ksys_read+0x199/0x2c0 [ 784.117217][T22128] ? __this_cpu_preempt_check+0x13/0x20 [ 784.122587][T22128] ? xfd_validate_state+0x6f/0x170 [ 784.127534][T22128] ? vfs_write+0xed0/0xed0 [ 784.131784][T22128] ? fpregs_restore_userregs+0x130/0x290 [ 784.137254][T22128] __x64_sys_read+0x7b/0x90 [ 784.141591][T22128] x64_sys_call+0x28/0x9a0 [ 784.145848][T22128] do_syscall_64+0x3b/0xb0 [ 784.150100][T22128] ? clear_bhb_loop+0x55/0xb0 [ 784.154611][T22128] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 784.160337][T22128] RIP: 0033:0x7f8c4018bb7c [ 784.164591][T22128] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 93 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 ef 93 02 00 48 [ 784.184060][T22128] RSP: 002b:00007f8c410a5030 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 784.192281][T22128] RAX: ffffffffffffffda RBX: 00007f8c403a5fa0 RCX: 00007f8c4018bb7c [ 784.200090][T22128] RDX: 000000000000000f RSI: 00007f8c410a50a0 RDI: 0000000000000005 [ 784.207902][T22128] RBP: 00007f8c410a5090 R08: 0000000000000000 R09: 0000000000000000 [ 784.215712][T22128] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000001 [ 784.223523][T22128] R13: 0000000000000000 R14: 00007f8c403a5fa0 R15: 00007ffdc331e648 [ 784.231342][T22128] [ 786.543030][T22161] device pim6reg1 entered promiscuous mode [ 788.622606][T22214] device syzkaller0 entered promiscuous mode [ 788.929709][T22239] FAULT_INJECTION: forcing a failure. [ 788.929709][T22239] name failslab, interval 1, probability 0, space 0, times 0 [ 788.968458][T22239] CPU: 1 PID: 22239 Comm: syz.0.7325 Not tainted 6.1.129-syzkaller-00055-gca24c52e3c25 #0 [ 788.978213][T22239] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 788.988103][T22239] Call Trace: [ 788.991228][T22239] [ 788.994003][T22239] dump_stack_lvl+0x151/0x1b7 [ 788.998520][T22239] ? nf_tcp_handle_invalid+0x3f1/0x3f1 [ 789.003809][T22239] ? pfn_valid+0x1e0/0x1e0 [ 789.008058][T22239] ? mas_wr_store_entry+0x492/0x730 [ 789.013094][T22239] dump_stack+0x15/0x18 [ 789.017087][T22239] should_fail_ex+0x3d0/0x520 [ 789.021600][T22239] ? vm_area_dup+0x27/0x290 [ 789.025941][T22239] __should_failslab+0xaf/0xf0 [ 789.030539][T22239] should_failslab+0x9/0x20 [ 789.034877][T22239] kmem_cache_alloc+0x3b/0x320 [ 789.039478][T22239] vm_area_dup+0x27/0x290 [ 789.043644][T22239] ? copy_mm+0xc8f/0x1bc0 [ 789.047812][T22239] copy_mm+0xd19/0x1bc0 [ 789.051807][T22239] ? copy_signal+0x650/0x650 [ 789.056230][T22239] ? _raw_spin_lock+0xa4/0x1b0 [ 789.060830][T22239] ? __init_rwsem+0x130/0x240 [ 789.065342][T22239] ? copy_signal+0x503/0x650 [ 789.069927][T22239] copy_process+0x12b6/0x3530 [ 789.074431][T22239] ? __kasan_check_write+0x14/0x20 [ 789.079375][T22239] ? proc_fail_nth_write+0x20b/0x290 [ 789.084498][T22239] ? idle_dummy+0x10/0x10 [ 789.088665][T22239] ? vfs_write+0x952/0xed0 [ 789.092912][T22239] ? perf_pmu_sched_task+0x190/0x190 [ 789.098037][T22239] kernel_clone+0x229/0x890 [ 789.102372][T22239] ? __kasan_check_write+0x14/0x20 [ 789.107319][T22239] ? mutex_unlock+0xb2/0x260 [ 789.111744][T22239] ? create_io_thread+0x180/0x180 [ 789.116610][T22239] __x64_sys_clone+0x231/0x280 [ 789.121209][T22239] ? __do_sys_vfork+0x110/0x110 [ 789.125896][T22239] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 789.131794][T22239] ? exit_to_user_mode_prepare+0x39/0xa0 [ 789.137265][T22239] x64_sys_call+0x1b0/0x9a0 [ 789.141604][T22239] do_syscall_64+0x3b/0xb0 [ 789.145857][T22239] ? clear_bhb_loop+0x55/0xb0 [ 789.150372][T22239] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 789.156097][T22239] RIP: 0033:0x7f8aa3d8d169 [ 789.160351][T22239] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 789.179791][T22239] RSP: 002b:00007f8aa4bf8fe8 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 789.188038][T22239] RAX: ffffffffffffffda RBX: 00007f8aa3fa5fa0 RCX: 00007f8aa3d8d169 [ 789.195847][T22239] RDX: 0000000000000000 RSI: 0000000000009000 RDI: 0000000004021400 [ 789.203660][T22239] RBP: 00007f8aa4bf9090 R08: 0000000000000000 R09: 0000000000000000 [ 789.211473][T22239] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000002 [ 789.219283][T22239] R13: 0000000000000000 R14: 00007f8aa3fa5fa0 R15: 00007ffe9024d138 [ 789.227098][T22239] [ 790.856076][T22273] device sit0 left promiscuous mode [ 793.128183][T22373] device pim6reg1 entered promiscuous mode [ 793.418369][T22387] syz.0.7362[22387] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 793.418459][T22387] syz.0.7362[22387] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 794.337320][T22427] device pim6reg1 entered promiscuous mode [ 794.683373][T22458] bridge0: port 3(dummy0) entered blocking state [ 794.701979][T22458] bridge0: port 3(dummy0) entered disabled state [ 794.730711][T22458] device dummy0 entered promiscuous mode [ 794.758485][T22458] bridge0: port 3(dummy0) entered blocking state [ 794.764806][T22458] bridge0: port 3(dummy0) entered forwarding state [ 794.826719][T22461] device dummy0 left promiscuous mode [ 794.833560][T22461] bridge0: port 3(dummy0) entered disabled state [ 794.969883][T22474] device pim6reg1 entered promiscuous mode [ 795.171022][T22485] device pim6reg1 entered promiscuous mode [ 795.608179][T22505] device sit0 entered promiscuous mode [ 796.601160][T22534] bridge0: port 1(bridge_slave_0) entered blocking state [ 796.608138][T22534] bridge0: port 1(bridge_slave_0) entered disabled state [ 796.615648][T22534] device bridge_slave_0 entered promiscuous mode [ 796.622721][T22534] bridge0: port 2(bridge_slave_1) entered blocking state [ 796.629694][T22534] bridge0: port 2(bridge_slave_1) entered disabled state [ 796.637136][T22534] device bridge_slave_1 entered promiscuous mode [ 797.026398][T22534] bridge0: port 2(bridge_slave_1) entered blocking state [ 797.033428][T22534] bridge0: port 2(bridge_slave_1) entered forwarding state [ 797.088246][T22434] bridge0: port 2(bridge_slave_1) entered disabled state [ 797.120340][T22434] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 797.127851][T22434] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 799.752945][T22429] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 799.761828][T22429] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 799.779551][T22429] bridge0: port 1(bridge_slave_0) entered blocking state [ 799.786493][T22429] bridge0: port 1(bridge_slave_0) entered forwarding state [ 799.794291][T22429] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 799.804999][T22429] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 799.818671][T22429] bridge0: port 2(bridge_slave_1) entered blocking state [ 799.825580][T22429] bridge0: port 2(bridge_slave_1) entered forwarding state [ 799.839001][T22429] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 799.847671][T22429] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 799.927272][T22429] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 799.943760][T22429] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 800.841296][T22434] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 800.857934][T22434] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 800.901591][T22534] device veth0_vlan entered promiscuous mode [ 800.939732][T22434] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 800.948257][T22434] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 801.002449][T22434] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 801.042108][T22434] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 801.059749][T22434] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 801.098544][T22434] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 801.123029][T22534] device veth1_macvtap entered promiscuous mode [ 801.165346][T22434] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 801.177522][T22434] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 801.186483][T22434] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 801.259756][T22434] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 801.300007][T22434] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 801.336765][T22601] device pim6reg1 entered promiscuous mode [ 805.270954][T22639] FAULT_INJECTION: forcing a failure. [ 805.270954][T22639] name failslab, interval 1, probability 0, space 0, times 0 [ 805.325967][T22639] CPU: 0 PID: 22639 Comm: syz.0.7433 Not tainted 6.1.129-syzkaller-00055-gca24c52e3c25 #0 [ 805.335830][T22639] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 805.345726][T22639] Call Trace: [ 805.348846][T22639] [ 805.351762][T22639] dump_stack_lvl+0x151/0x1b7 [ 805.356281][T22639] ? nf_tcp_handle_invalid+0x3f1/0x3f1 [ 805.361570][T22639] ? pfn_valid+0x1e0/0x1e0 [ 805.365826][T22639] ? mas_wr_store_entry+0x492/0x730 [ 805.370861][T22639] dump_stack+0x15/0x18 [ 805.374846][T22639] should_fail_ex+0x3d0/0x520 [ 805.379360][T22639] ? vm_area_dup+0x27/0x290 [ 805.383698][T22639] __should_failslab+0xaf/0xf0 [ 805.388298][T22639] should_failslab+0x9/0x20 [ 805.392636][T22639] kmem_cache_alloc+0x3b/0x320 [ 805.397327][T22639] vm_area_dup+0x27/0x290 [ 805.401495][T22639] ? copy_mm+0xc8f/0x1bc0 [ 805.405658][T22639] copy_mm+0xd19/0x1bc0 [ 805.409656][T22639] ? copy_signal+0x650/0x650 [ 805.414186][T22639] ? _raw_spin_lock+0xa4/0x1b0 [ 805.418764][T22639] ? __init_rwsem+0x130/0x240 [ 805.423277][T22639] ? copy_signal+0x503/0x650 [ 805.427701][T22639] copy_process+0x12b6/0x3530 [ 805.432215][T22639] ? __kasan_check_write+0x14/0x20 [ 805.437160][T22639] ? proc_fail_nth_write+0x20b/0x290 [ 805.442283][T22639] ? idle_dummy+0x10/0x10 [ 805.446448][T22639] ? vfs_write+0x952/0xed0 [ 805.450697][T22639] ? __kasan_slab_free+0x11/0x20 [ 805.455476][T22639] kernel_clone+0x229/0x890 [ 805.459815][T22639] ? __kasan_check_write+0x14/0x20 [ 805.464760][T22639] ? mutex_unlock+0xb2/0x260 [ 805.469186][T22639] ? create_io_thread+0x180/0x180 [ 805.474051][T22639] __x64_sys_clone+0x231/0x280 [ 805.478651][T22639] ? __do_sys_vfork+0x110/0x110 [ 805.483337][T22639] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 805.489236][T22639] ? exit_to_user_mode_prepare+0x39/0xa0 [ 805.494704][T22639] x64_sys_call+0x1b0/0x9a0 [ 805.499044][T22639] do_syscall_64+0x3b/0xb0 [ 805.503296][T22639] ? clear_bhb_loop+0x55/0xb0 [ 805.507810][T22639] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 805.513544][T22639] RIP: 0033:0x7f8aa3d8d169 [ 805.517791][T22639] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 805.537233][T22639] RSP: 002b:00007f8aa4bf8fe8 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 805.545489][T22639] RAX: ffffffffffffffda RBX: 00007f8aa3fa5fa0 RCX: 00007f8aa3d8d169 [ 805.553302][T22639] RDX: 0000000000000000 RSI: 0000000000009000 RDI: 0000000004021400 [ 805.561103][T22639] RBP: 00007f8aa4bf9090 R08: 0000000000000000 R09: 0000000000000000 [ 805.568914][T22639] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000002 [ 805.576719][T22639] R13: 0000000000000000 R14: 00007f8aa3fa5fa0 R15: 00007ffe9024d138 [ 805.584540][T22639] [ 809.125930][T22667] device veth0_vlan left promiscuous mode [ 809.137153][T22667] device veth0_vlan entered promiscuous mode [ 809.144515][T22671] device pim6reg1 entered promiscuous mode [ 809.191809][T22424] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 809.200131][T22424] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 809.239617][T22424] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 809.389038][T22679] FAULT_INJECTION: forcing a failure. [ 809.389038][T22679] name failslab, interval 1, probability 0, space 0, times 0 [ 809.413889][T22679] CPU: 0 PID: 22679 Comm: syz.2.7447 Not tainted 6.1.129-syzkaller-00055-gca24c52e3c25 #0 [ 809.423632][T22679] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 809.433526][T22679] Call Trace: [ 809.436642][T22679] [ 809.439423][T22679] dump_stack_lvl+0x151/0x1b7 [ 809.443937][T22679] ? nf_tcp_handle_invalid+0x3f1/0x3f1 [ 809.449242][T22679] dump_stack+0x15/0x18 [ 809.453222][T22679] should_fail_ex+0x3d0/0x520 [ 809.457739][T22679] ? vm_area_dup+0x65/0x290 [ 809.462075][T22679] __should_failslab+0xaf/0xf0 [ 809.466682][T22679] should_failslab+0x9/0x20 [ 809.471027][T22679] kmem_cache_alloc+0x3b/0x320 [ 809.475616][T22679] vm_area_dup+0x65/0x290 [ 809.479792][T22679] copy_mm+0xd19/0x1bc0 [ 809.483803][T22679] ? copy_signal+0x650/0x650 [ 809.488199][T22679] ? _raw_spin_lock+0xa4/0x1b0 [ 809.492806][T22679] ? __init_rwsem+0x130/0x240 [ 809.497312][T22679] ? copy_signal+0x503/0x650 [ 809.501741][T22679] copy_process+0x12b6/0x3530 [ 809.506344][T22679] ? __kasan_check_write+0x14/0x20 [ 809.511307][T22679] ? proc_fail_nth_write+0x20b/0x290 [ 809.516421][T22679] ? idle_dummy+0x10/0x10 [ 809.520581][T22679] ? vfs_write+0x952/0xed0 [ 809.524825][T22679] ? __kasan_slab_free+0x11/0x20 [ 809.529600][T22679] kernel_clone+0x229/0x890 [ 809.533938][T22679] ? __kasan_check_write+0x14/0x20 [ 809.538885][T22679] ? mutex_unlock+0xb2/0x260 [ 809.543314][T22679] ? create_io_thread+0x180/0x180 [ 809.548179][T22679] __x64_sys_clone+0x231/0x280 [ 809.552774][T22679] ? __do_sys_vfork+0x110/0x110 [ 809.557464][T22679] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 809.563363][T22679] ? exit_to_user_mode_prepare+0x39/0xa0 [ 809.568833][T22679] x64_sys_call+0x1b0/0x9a0 [ 809.573168][T22679] do_syscall_64+0x3b/0xb0 [ 809.577421][T22679] ? clear_bhb_loop+0x55/0xb0 [ 809.581936][T22679] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 809.587669][T22679] RIP: 0033:0x7f402df8d169 [ 809.591915][T22679] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 809.611358][T22679] RSP: 002b:00007f402ee11fe8 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 809.619609][T22679] RAX: ffffffffffffffda RBX: 00007f402e1a5fa0 RCX: 00007f402df8d169 [ 809.627417][T22679] RDX: 0000000000000000 RSI: 0000000000009000 RDI: 0000000004021400 [ 809.635223][T22679] RBP: 00007f402ee12090 R08: 0000000000000000 R09: 0000000000000000 [ 809.643122][T22679] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000002 [ 809.650937][T22679] R13: 0000000000000000 R14: 00007f402e1a5fa0 R15: 00007fff170fa1c8 [ 809.658750][T22679] [ 810.606229][T22707] device pim6reg1 entered promiscuous mode [ 810.684626][T22711] FAULT_INJECTION: forcing a failure. [ 810.684626][T22711] name failslab, interval 1, probability 0, space 0, times 0 [ 810.837743][T22711] CPU: 0 PID: 22711 Comm: syz.0.7460 Not tainted 6.1.129-syzkaller-00055-gca24c52e3c25 #0 [ 810.847493][T22711] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 810.857388][T22711] Call Trace: [ 810.860507][T22711] [ 810.863290][T22711] dump_stack_lvl+0x151/0x1b7 [ 810.867805][T22711] ? nf_tcp_handle_invalid+0x3f1/0x3f1 [ 810.873100][T22711] ? pfn_valid+0x1e0/0x1e0 [ 810.877345][T22711] ? mas_wr_store_entry+0x492/0x730 [ 810.882387][T22711] dump_stack+0x15/0x18 [ 810.886376][T22711] should_fail_ex+0x3d0/0x520 [ 810.890886][T22711] ? vm_area_dup+0x27/0x290 [ 810.895226][T22711] __should_failslab+0xaf/0xf0 [ 810.899825][T22711] should_failslab+0x9/0x20 [ 810.904175][T22711] kmem_cache_alloc+0x3b/0x320 [ 810.908766][T22711] vm_area_dup+0x27/0x290 [ 810.912934][T22711] ? copy_mm+0xc8f/0x1bc0 [ 810.917099][T22711] copy_mm+0xd19/0x1bc0 [ 810.921096][T22711] ? copy_signal+0x650/0x650 [ 810.925516][T22711] ? _raw_spin_lock+0xa4/0x1b0 [ 810.930118][T22711] ? __init_rwsem+0x130/0x240 [ 810.934660][T22711] ? copy_signal+0x503/0x650 [ 810.939059][T22711] copy_process+0x12b6/0x3530 [ 810.943575][T22711] ? __kasan_check_write+0x14/0x20 [ 810.948514][T22711] ? proc_fail_nth_write+0x20b/0x290 [ 810.953642][T22711] ? idle_dummy+0x10/0x10 [ 810.957805][T22711] ? vfs_write+0x952/0xed0 [ 810.962055][T22711] ? __kasan_slab_free+0x11/0x20 [ 810.966832][T22711] kernel_clone+0x229/0x890 [ 810.971170][T22711] ? __kasan_check_write+0x14/0x20 [ 810.976118][T22711] ? mutex_unlock+0xb2/0x260 [ 810.980546][T22711] ? create_io_thread+0x180/0x180 [ 810.985407][T22711] __x64_sys_clone+0x231/0x280 [ 810.990010][T22711] ? __do_sys_vfork+0x110/0x110 [ 810.994696][T22711] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 811.000597][T22711] ? exit_to_user_mode_prepare+0x39/0xa0 [ 811.006064][T22711] x64_sys_call+0x1b0/0x9a0 [ 811.010404][T22711] do_syscall_64+0x3b/0xb0 [ 811.014655][T22711] ? clear_bhb_loop+0x55/0xb0 [ 811.019170][T22711] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 811.024897][T22711] RIP: 0033:0x7f8aa3d8d169 [ 811.029180][T22711] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 811.048680][T22711] RSP: 002b:00007f8aa4bf8fe8 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 811.056920][T22711] RAX: ffffffffffffffda RBX: 00007f8aa3fa5fa0 RCX: 00007f8aa3d8d169 [ 811.064731][T22711] RDX: 0000000000000000 RSI: 0000000000009000 RDI: 0000000004021400 [ 811.072543][T22711] RBP: 00007f8aa4bf9090 R08: 0000000000000000 R09: 0000000000000000 [ 811.080354][T22711] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000002 [ 811.088167][T22711] R13: 0000000000000000 R14: 00007f8aa3fa5fa0 R15: 00007ffe9024d138 [ 811.095986][T22711] [ 811.903533][T22747] device pim6reg1 entered promiscuous mode [ 812.796292][T22775] device veth0_vlan left promiscuous mode [ 812.862803][T22775] device veth0_vlan entered promiscuous mode [ 813.116344][T22789] syzkaller0: tun_chr_ioctl cmd 1074025675 [ 813.123025][T22789] syzkaller0: persist disabled [ 813.140467][T22793] syzkaller0: tun_chr_ioctl cmd 1074025675 [ 813.146674][T22793] syzkaller0: persist enabled [ 813.593114][T22810] device pim6reg1 entered promiscuous mode [ 813.737196][T22816] FAULT_INJECTION: forcing a failure. [ 813.737196][T22816] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 813.758673][T22814] tap0: tun_chr_ioctl cmd 1074025677 [ 813.771881][T22816] CPU: 1 PID: 22816 Comm: syz.0.7488 Not tainted 6.1.129-syzkaller-00055-gca24c52e3c25 #0 [ 813.781625][T22816] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 813.791528][T22816] Call Trace: [ 813.794638][T22816] [ 813.797414][T22816] dump_stack_lvl+0x151/0x1b7 [ 813.801928][T22816] ? nf_tcp_handle_invalid+0x3f1/0x3f1 [ 813.807223][T22816] dump_stack+0x15/0x18 [ 813.811213][T22816] should_fail_ex+0x3d0/0x520 [ 813.815728][T22816] should_fail_alloc_page+0x68/0x90 [ 813.820760][T22816] prepare_alloc_pages+0x13b/0x6d0 [ 813.825710][T22816] ? __alloc_pages_bulk+0xcd0/0xcd0 [ 813.830744][T22816] __alloc_pages+0x162/0x610 [ 813.835169][T22816] ? prep_new_page+0x110/0x110 [ 813.839770][T22816] ? is_bpf_text_address+0x172/0x190 [ 813.844890][T22816] ? stack_trace_save+0x1c0/0x1c0 [ 813.849751][T22816] ? kernel_text_address+0xa9/0xe0 [ 813.854701][T22816] pte_alloc_one+0x73/0x1b0 [ 813.859038][T22816] ? pfn_modify_allowed+0x2f0/0x2f0 [ 813.864071][T22816] ? arch_stack_walk+0xf3/0x140 [ 813.868763][T22816] __pte_alloc+0x86/0x350 [ 813.872924][T22816] ? pmd_install+0x260/0x260 [ 813.877349][T22816] ? _raw_spin_lock+0xa4/0x1b0 [ 813.881950][T22816] ? __kasan_check_write+0x14/0x20 [ 813.886900][T22816] copy_page_range+0x2748/0x2ed0 [ 813.891684][T22816] ? pfn_valid+0x1e0/0x1e0 [ 813.895923][T22816] ? mas_wr_store_entry+0x492/0x730 [ 813.900960][T22816] ? mas_store+0x258/0x400 [ 813.905210][T22816] ? mas_empty_area_rev+0x17f0/0x17f0 [ 813.910425][T22816] copy_mm+0x10ee/0x1bc0 [ 813.914501][T22816] ? copy_signal+0x650/0x650 [ 813.918924][T22816] ? _raw_spin_lock+0xa4/0x1b0 [ 813.923528][T22816] ? __init_rwsem+0x130/0x240 [ 813.928036][T22816] ? copy_signal+0x503/0x650 [ 813.932463][T22816] copy_process+0x12b6/0x3530 [ 813.936992][T22816] ? __kasan_check_write+0x14/0x20 [ 813.941924][T22816] ? proc_fail_nth_write+0x20b/0x290 [ 813.947045][T22816] ? idle_dummy+0x10/0x10 [ 813.951212][T22816] ? vfs_write+0x952/0xed0 [ 813.955465][T22816] ? __kasan_slab_free+0x11/0x20 [ 813.960242][T22816] kernel_clone+0x229/0x890 [ 813.964586][T22816] ? __kasan_check_write+0x14/0x20 [ 813.969523][T22816] ? mutex_unlock+0xb2/0x260 [ 813.973952][T22816] ? create_io_thread+0x180/0x180 [ 813.978815][T22816] __x64_sys_clone+0x231/0x280 [ 813.983411][T22816] ? __do_sys_vfork+0x110/0x110 [ 813.988101][T22816] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 813.994002][T22816] ? exit_to_user_mode_prepare+0x39/0xa0 [ 813.999466][T22816] x64_sys_call+0x1b0/0x9a0 [ 814.003807][T22816] do_syscall_64+0x3b/0xb0 [ 814.008061][T22816] ? clear_bhb_loop+0x55/0xb0 [ 814.012604][T22816] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 814.018303][T22816] RIP: 0033:0x7f8aa3d8d169 [ 814.022554][T22816] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 814.041994][T22816] RSP: 002b:00007f8aa4bf8fe8 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 814.050239][T22816] RAX: ffffffffffffffda RBX: 00007f8aa3fa5fa0 RCX: 00007f8aa3d8d169 [ 814.058053][T22816] RDX: 0000000000000000 RSI: 0000000000009000 RDI: 0000000004021400 [ 814.065862][T22816] RBP: 00007f8aa4bf9090 R08: 0000000000000000 R09: 0000000000000000 [ 814.073677][T22816] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000002 [ 814.081484][T22816] R13: 0000000000000000 R14: 00007f8aa3fa5fa0 R15: 00007ffe9024d138 [ 814.089305][T22816] [ 814.112116][T22814] tap0: linktype set to 780 [ 815.285792][T22862] FAULT_INJECTION: forcing a failure. [ 815.285792][T22862] name failslab, interval 1, probability 0, space 0, times 0 [ 815.434305][T22862] CPU: 1 PID: 22862 Comm: syz.1.7503 Not tainted 6.1.129-syzkaller-00055-gca24c52e3c25 #0 [ 815.444057][T22862] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 815.453953][T22862] Call Trace: [ 815.457075][T22862] [ 815.459854][T22862] dump_stack_lvl+0x151/0x1b7 [ 815.464371][T22862] ? nf_tcp_handle_invalid+0x3f1/0x3f1 [ 815.469665][T22862] dump_stack+0x15/0x18 [ 815.473652][T22862] should_fail_ex+0x3d0/0x520 [ 815.478175][T22862] ? vm_area_dup+0x65/0x290 [ 815.482509][T22862] __should_failslab+0xaf/0xf0 [ 815.487103][T22862] should_failslab+0x9/0x20 [ 815.491447][T22862] kmem_cache_alloc+0x3b/0x320 [ 815.496057][T22862] vm_area_dup+0x65/0x290 [ 815.500245][T22862] copy_mm+0xd19/0x1bc0 [ 815.504211][T22862] ? copy_signal+0x650/0x650 [ 815.508630][T22862] ? _raw_spin_lock+0xa4/0x1b0 [ 815.513325][T22862] ? __init_rwsem+0x130/0x240 [ 815.517944][T22862] ? copy_signal+0x503/0x650 [ 815.522367][T22862] copy_process+0x12b6/0x3530 [ 815.526877][T22862] ? __kasan_check_write+0x14/0x20 [ 815.531821][T22862] ? proc_fail_nth_write+0x20b/0x290 [ 815.537139][T22862] ? idle_dummy+0x10/0x10 [ 815.541302][T22862] ? vfs_write+0x952/0xed0 [ 815.545557][T22862] ? __kasan_slab_free+0x11/0x20 [ 815.550330][T22862] kernel_clone+0x229/0x890 [ 815.554665][T22862] ? __kasan_check_write+0x14/0x20 [ 815.559612][T22862] ? mutex_unlock+0xb2/0x260 [ 815.564039][T22862] ? create_io_thread+0x180/0x180 [ 815.568907][T22862] __x64_sys_clone+0x231/0x280 [ 815.573500][T22862] ? __do_sys_vfork+0x110/0x110 [ 815.578225][T22862] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 815.584088][T22862] ? exit_to_user_mode_prepare+0x39/0xa0 [ 815.589559][T22862] x64_sys_call+0x1b0/0x9a0 [ 815.593898][T22862] do_syscall_64+0x3b/0xb0 [ 815.598153][T22862] ? clear_bhb_loop+0x55/0xb0 [ 815.602661][T22862] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 815.608389][T22862] RIP: 0033:0x7f8c4018d169 [ 815.612641][T22862] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 815.632087][T22862] RSP: 002b:00007f8c410a4fe8 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 815.640328][T22862] RAX: ffffffffffffffda RBX: 00007f8c403a5fa0 RCX: 00007f8c4018d169 [ 815.648149][T22862] RDX: 0000000000000000 RSI: 0000000000009000 RDI: 0000000004021400 [ 815.655952][T22862] RBP: 00007f8c410a5090 R08: 0000000000000000 R09: 0000000000000000 [ 815.663766][T22862] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000002 [ 815.671573][T22862] R13: 0000000000000000 R14: 00007f8c403a5fa0 R15: 00007ffdc331e648 [ 815.679394][T22862] [ 816.166681][T22885] device veth1_macvtap left promiscuous mode [ 816.182135][T22885] device macsec0 entered promiscuous mode [ 816.227574][T22902] FAULT_INJECTION: forcing a failure. [ 816.227574][T22902] name failslab, interval 1, probability 0, space 0, times 0 [ 816.246836][T22902] CPU: 1 PID: 22902 Comm: syz.1.7516 Not tainted 6.1.129-syzkaller-00055-gca24c52e3c25 #0 [ 816.256582][T22902] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 816.266466][T22902] Call Trace: [ 816.269688][T22902] [ 816.272451][T22902] dump_stack_lvl+0x151/0x1b7 [ 816.276966][T22902] ? nf_tcp_handle_invalid+0x3f1/0x3f1 [ 816.282268][T22902] ? mas_next_node+0x769/0x8b0 [ 816.286871][T22902] dump_stack+0x15/0x18 [ 816.290862][T22902] should_fail_ex+0x3d0/0x520 [ 816.295389][T22902] ? vm_area_dup+0x27/0x290 [ 816.299707][T22902] __should_failslab+0xaf/0xf0 [ 816.304316][T22902] should_failslab+0x9/0x20 [ 816.308645][T22902] kmem_cache_alloc+0x3b/0x320 [ 816.313248][T22902] vm_area_dup+0x27/0x290 [ 816.317410][T22902] ? copy_mm+0xc8f/0x1bc0 [ 816.321579][T22902] copy_mm+0xd19/0x1bc0 [ 816.325574][T22902] ? copy_signal+0x650/0x650 [ 816.330000][T22902] ? _raw_spin_lock+0xa4/0x1b0 [ 816.334596][T22902] ? __init_rwsem+0x130/0x240 [ 816.339109][T22902] ? copy_signal+0x503/0x650 [ 816.343534][T22902] copy_process+0x12b6/0x3530 [ 816.348049][T22902] ? __kasan_check_write+0x14/0x20 [ 816.353002][T22902] ? proc_fail_nth_write+0x20b/0x290 [ 816.358134][T22902] ? idle_dummy+0x10/0x10 [ 816.362287][T22902] ? vfs_write+0x952/0xed0 [ 816.366621][T22902] ? __kasan_slab_free+0x11/0x20 [ 816.371397][T22902] kernel_clone+0x229/0x890 [ 816.375734][T22902] ? __kasan_check_write+0x14/0x20 [ 816.380789][T22902] ? mutex_unlock+0xb2/0x260 [ 816.385213][T22902] ? create_io_thread+0x180/0x180 [ 816.390077][T22902] __x64_sys_clone+0x231/0x280 [ 816.394678][T22902] ? __do_sys_vfork+0x110/0x110 [ 816.399366][T22902] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 816.405268][T22902] ? exit_to_user_mode_prepare+0x39/0xa0 [ 816.410729][T22902] x64_sys_call+0x1b0/0x9a0 [ 816.415069][T22902] do_syscall_64+0x3b/0xb0 [ 816.419322][T22902] ? clear_bhb_loop+0x55/0xb0 [ 816.423835][T22902] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 816.429564][T22902] RIP: 0033:0x7f8c4018d169 [ 816.433817][T22902] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 816.453257][T22902] RSP: 002b:00007f8c410a4fe8 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 816.461499][T22902] RAX: ffffffffffffffda RBX: 00007f8c403a5fa0 RCX: 00007f8c4018d169 [ 816.469315][T22902] RDX: 0000000000000000 RSI: 0000000000009000 RDI: 0000000004021400 [ 816.477136][T22902] RBP: 00007f8c410a5090 R08: 0000000000000000 R09: 0000000000000000 [ 816.484943][T22902] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000002 [ 816.492753][T22902] R13: 0000000000000000 R14: 00007f8c403a5fa0 R15: 00007ffdc331e648 [ 816.500564][T22902] [ 816.566663][T22901] bridge0: port 1(bridge_slave_0) entered blocking state [ 816.573816][T22901] bridge0: port 1(bridge_slave_0) entered disabled state [ 816.581224][T22901] device bridge_slave_0 entered promiscuous mode [ 816.588130][T22901] bridge0: port 2(bridge_slave_1) entered blocking state [ 816.595125][T22901] bridge0: port 2(bridge_slave_1) entered disabled state [ 816.602951][T22901] device bridge_slave_1 entered promiscuous mode [ 816.611495][T22429] device bridge_slave_1 left promiscuous mode [ 816.618990][T22429] bridge0: port 2(bridge_slave_1) entered disabled state [ 816.635169][T22429] device bridge_slave_0 left promiscuous mode [ 816.641263][T22429] bridge0: port 1(bridge_slave_0) entered disabled state [ 816.649700][T22429] device veth0_vlan left promiscuous mode [ 816.923559][T22928] device sit0 left promiscuous mode [ 817.130375][T22940] FAULT_INJECTION: forcing a failure. [ 817.130375][T22940] name failslab, interval 1, probability 0, space 0, times 0 [ 817.239977][T22938] device syzkaller0 entered promiscuous mode [ 817.248562][T22940] CPU: 1 PID: 22940 Comm: syz.3.7528 Not tainted 6.1.129-syzkaller-00055-gca24c52e3c25 #0 [ 817.258386][T22940] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 817.268281][T22940] Call Trace: [ 817.271411][T22940] [ 817.274184][T22940] dump_stack_lvl+0x151/0x1b7 [ 817.278698][T22940] ? nf_tcp_handle_invalid+0x3f1/0x3f1 [ 817.283992][T22940] ? __kasan_slab_alloc+0x6c/0x80 [ 817.288848][T22940] ? vma_interval_tree_augment_rotate+0x1d0/0x1d0 [ 817.295103][T22940] dump_stack+0x15/0x18 [ 817.299090][T22940] should_fail_ex+0x3d0/0x520 [ 817.303602][T22940] ? anon_vma_fork+0xee/0x4d0 [ 817.308118][T22940] __should_failslab+0xaf/0xf0 [ 817.312720][T22940] should_failslab+0x9/0x20 [ 817.317126][T22940] kmem_cache_alloc+0x3b/0x320 [ 817.321663][T22940] anon_vma_fork+0xee/0x4d0 [ 817.325996][T22940] ? vm_area_dup+0x1e0/0x290 [ 817.330425][T22940] copy_mm+0xdcb/0x1bc0 [ 817.334421][T22940] ? copy_signal+0x650/0x650 [ 817.338839][T22940] ? _raw_spin_lock+0xa4/0x1b0 [ 817.343446][T22940] ? __init_rwsem+0x130/0x240 [ 817.347956][T22940] ? copy_signal+0x503/0x650 [ 817.352393][T22940] copy_process+0x12b6/0x3530 [ 817.356902][T22940] ? __kasan_check_write+0x14/0x20 [ 817.361842][T22940] ? proc_fail_nth_write+0x20b/0x290 [ 817.366968][T22940] ? idle_dummy+0x10/0x10 [ 817.371136][T22940] ? vfs_write+0x952/0xed0 [ 817.375384][T22940] ? __kasan_slab_free+0x11/0x20 [ 817.380161][T22940] kernel_clone+0x229/0x890 [ 817.384498][T22940] ? __kasan_check_write+0x14/0x20 [ 817.389444][T22940] ? mutex_unlock+0xb2/0x260 [ 817.393868][T22940] ? create_io_thread+0x180/0x180 [ 817.398733][T22940] __x64_sys_clone+0x231/0x280 [ 817.403334][T22940] ? __do_sys_vfork+0x110/0x110 [ 817.408033][T22940] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 817.413922][T22940] ? exit_to_user_mode_prepare+0x39/0xa0 [ 817.419390][T22940] x64_sys_call+0x1b0/0x9a0 [ 817.423726][T22940] do_syscall_64+0x3b/0xb0 [ 817.427974][T22940] ? clear_bhb_loop+0x55/0xb0 [ 817.432491][T22940] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 817.438218][T22940] RIP: 0033:0x7f796538d169 [ 817.442471][T22940] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 817.461913][T22940] RSP: 002b:00007f796617cfe8 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 817.470156][T22940] RAX: ffffffffffffffda RBX: 00007f79655a5fa0 RCX: 00007f796538d169 [ 817.477971][T22940] RDX: 0000000000000000 RSI: 0000000000009000 RDI: 0000000004021400 [ 817.485781][T22940] RBP: 00007f796617d090 R08: 0000000000000000 R09: 0000000000000000 [ 817.493593][T22940] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000002 [ 817.501402][T22940] R13: 0000000000000000 R14: 00007f79655a5fa0 R15: 00007ffea53031e8 [ 817.509333][T22940] [ 817.528715][T22936] syzkaller0: refused to change device tx_queue_len [ 817.549056][T22429] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 817.563067][T22429] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 817.595223][T22429] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 817.634051][T22429] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 817.722591][T22429] bridge0: port 1(bridge_slave_0) entered blocking state [ 817.729466][T22429] bridge0: port 1(bridge_slave_0) entered forwarding state [ 817.842811][T22429] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 817.873130][T22429] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 817.885052][T22429] bridge0: port 2(bridge_slave_1) entered blocking state [ 817.891964][T22429] bridge0: port 2(bridge_slave_1) entered forwarding state [ 817.988151][T22429] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 818.088398][T22429] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 818.096961][T22429] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 818.191695][T22429] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 818.215048][T22429] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 818.275334][T22429] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 818.290189][T22429] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 818.311091][T22901] device veth0_vlan entered promiscuous mode [ 818.456849][T22969] device syzkaller0 entered promiscuous mode [ 818.478959][T22429] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 818.492755][T22429] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 818.511037][T22901] device veth1_macvtap entered promiscuous mode [ 818.637757][T22429] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 818.645341][T22429] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 818.653040][T22429] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 818.661376][T22429] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 818.670921][T22429] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 818.785170][T22434] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 818.801053][T22434] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 818.810221][T22434] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 818.822504][T22434] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 819.037125][T22992] device syzkaller0 entered promiscuous mode [ 819.404874][T23011] device pim6reg1 entered promiscuous mode [ 819.606499][T23008] bridge0: port 1(bridge_slave_0) entered blocking state [ 819.629876][T23008] bridge0: port 1(bridge_slave_0) entered disabled state [ 819.648741][T23008] device bridge_slave_0 entered promiscuous mode [ 819.705666][T23008] bridge0: port 2(bridge_slave_1) entered blocking state [ 819.713425][T23008] bridge0: port 2(bridge_slave_1) entered disabled state [ 819.721142][T23008] device bridge_slave_1 entered promiscuous mode [ 820.210218][T23043] device syzkaller0 entered promiscuous mode [ 823.207045][T22426] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 823.233509][T22426] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 823.260989][T22426] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 823.282740][T22426] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 823.321376][T22426] bridge0: port 1(bridge_slave_0) entered blocking state [ 823.328285][T22426] bridge0: port 1(bridge_slave_0) entered forwarding state [ 823.389595][T22426] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 823.404861][T22426] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 823.414856][T22426] bridge0: port 2(bridge_slave_1) entered blocking state [ 823.421723][T22426] bridge0: port 2(bridge_slave_1) entered forwarding state [ 823.429026][T22426] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 823.636831][T22424] device bridge_slave_1 left promiscuous mode [ 823.652400][T22424] bridge0: port 2(bridge_slave_1) entered disabled state [ 823.670110][T22424] device bridge_slave_0 left promiscuous mode [ 823.737790][T22424] bridge0: port 1(bridge_slave_0) entered disabled state [ 823.781541][T22424] device veth1_macvtap left promiscuous mode [ 823.812246][T22424] device veth0_vlan left promiscuous mode [ 824.124258][T22426] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 824.138060][T22426] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 824.161249][T22426] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 824.189319][T22426] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 824.288507][T23008] device veth0_vlan entered promiscuous mode [ 824.312600][T22426] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 824.331104][T22426] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 824.387512][T22426] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 824.399646][T22426] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 824.445975][T22426] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 824.455867][T22426] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 824.464096][T22426] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 824.484277][T22426] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 824.494643][T23100] device pim6reg1 entered promiscuous mode [ 824.517788][T23008] device veth1_macvtap entered promiscuous mode [ 824.575450][T22426] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 824.584209][T22426] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 824.593897][T22426] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 824.659192][T22426] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 824.710111][T22426] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 826.374219][T22424] device bridge_slave_1 left promiscuous mode [ 826.380245][T22424] bridge0: port 2(bridge_slave_1) entered disabled state [ 826.387590][T22424] device bridge_slave_0 left promiscuous mode [ 826.393646][T22424] bridge0: port 1(bridge_slave_0) entered disabled state [ 826.401491][T22424] device bridge_slave_1 left promiscuous mode [ 826.407531][T22424] bridge0: port 2(bridge_slave_1) entered disabled state [ 826.414992][T22424] device bridge_slave_0 left promiscuous mode [ 826.420914][T22424] bridge0: port 1(bridge_slave_0) entered disabled state [ 826.431010][T22424] device bridge_slave_1 left promiscuous mode [ 826.437072][T22424] bridge0: port 2(bridge_slave_1) entered disabled state [ 826.444567][T22424] device bridge_slave_0 left promiscuous mode [ 826.450488][T22424] bridge0: port 1(bridge_slave_0) entered disabled state [ 826.458306][T22424] device bridge_slave_1 left promiscuous mode [ 826.464242][T22424] bridge0: port 2(bridge_slave_1) entered disabled state [ 826.471603][T22424] device bridge_slave_0 left promiscuous mode [ 826.477692][T22424] bridge0: port 1(bridge_slave_0) entered disabled state [ 826.486375][T22424] device veth1_macvtap left promiscuous mode [ 826.492272][T22424] device veth0_vlan left promiscuous mode [ 826.498094][T22424] device veth1_macvtap left promiscuous mode [ 826.504038][T22424] device veth0_vlan left promiscuous mode [ 826.510223][T22424] device veth1_macvtap left promiscuous mode [ 826.516300][T22424] device veth0_vlan left promiscuous mode [ 826.522552][T22424] device veth1_macvtap left promiscuous mode [ 826.528395][T22424] device veth0_vlan left promiscuous mode