at$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x2, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0xc06855c8, &(0x7f0000000100)={0x0, 0x0, {0x0, 0xfff, 0x0, {}, {}, @rumble}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) r1 = getpgrp(0x0) setpriority(0x0, r1, 0x0) clone3(&(0x7f0000000340)={0x80000, &(0x7f0000000000), &(0x7f0000000180), &(0x7f00000001c0), 0x2c, 0x0, &(0x7f0000000200)=""/54, 0x36, &(0x7f0000000240)=""/167, &(0x7f0000000300)=[0xffffffffffffffff, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0], 0xa}, 0x50) 13:20:05 executing program 2: r0 = socket$kcm(0x11, 0x200000000000002, 0x300) setsockopt$sock_attach_bpf(r0, 0x107, 0x12, &(0x7f00000000c0), 0x4) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b70000000000000095000000000000001a3acceed2359b6a7042f95065a090e15e1b23c404f79c61776c1a82ce772b007e62c1012097dee8d6e2a64fa661c0e29a9aaf088552f34aeeaee7eefc55cbca11d1082f44e2649eee73cb488c4b4b"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x18000000000002a0, 0xe80, 0xc0fe, &(0x7f00000000c0)="b9ff0300000d698cb89e40f086dd01000005a4004000ffa377fbac141414e9", 0x0, 0x100}, 0x28) [ 650.294704][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 650.300852][ C0] protocol 88fb is buggy, dev hsr_slave_1 13:20:05 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x400c55cb, &(0x7f0000000100)={0x0, 0x0, {0x0, 0xfff, 0x0, {}, {}, @rumble}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) 13:20:05 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(0xffffffffffffffff, 0x4004556e, &(0x7f0000000100)={0x0, 0x0, {0x0, 0xfff, 0x0, {}, {}, @rumble}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) 13:20:05 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x2, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0xc06855c8, &(0x7f0000000100)={0x0, 0x0, {0x0, 0xfff, 0x0, {}, {}, @rumble}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) r1 = getpgrp(0x0) setpriority(0x0, r1, 0x0) clone3(&(0x7f0000000340)={0x80000, &(0x7f0000000000), &(0x7f0000000180), &(0x7f00000001c0), 0x2c, 0x0, &(0x7f0000000200)=""/54, 0x36, &(0x7f0000000240)=""/167, &(0x7f0000000300)=[0xffffffffffffffff, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0], 0xa}, 0x50) 13:20:05 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x400c55cb, &(0x7f0000000100)={0x0, 0x0, {0x0, 0xfff, 0x0, {}, {}, @rumble}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) 13:20:05 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x400c55cb, &(0x7f0000000100)={0x0, 0x0, {0x0, 0xfff, 0x0, {}, {}, @rumble}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) 13:20:05 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(0xffffffffffffffff, 0x4004556e, &(0x7f0000000100)={0x0, 0x0, {0x0, 0xfff, 0x0, {}, {}, @rumble}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) 13:20:06 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) recvmmsg(r0, &(0x7f0000001d00)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}], 0x2, 0x0, 0x0) setsockopt$SO_TIMESTAMP(r0, 0x1, 0x23, &(0x7f0000000040)=0x9, 0x4) r1 = socket$inet6(0xa, 0x0, 0x80) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") 13:20:06 executing program 4: setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x107, 0x12, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b70000000000000095000000000000001a3acceed2359b6a7042f95065a090e15e1b23c404f79c61776c1a82ce772b007e62c1012097dee8d6e2a64fa661c0e29a9aaf088552f34aeeaee7eefc55cbca11d1082f44e2649eee73cb488c4b4b"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0xe80, 0xc0fe, &(0x7f00000000c0)="b9ff0300000d698cb89e40f086dd01000005a4004000ffa377fbac141414e9", 0x0, 0x100}, 0x28) 13:20:06 executing program 1: openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(0xffffffffffffffff, 0x400c55cb, &(0x7f0000000100)={0x0, 0x0, {0x0, 0xfff, 0x0, {}, {}, @rumble}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) 13:20:06 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x2, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0xc06855c8, &(0x7f0000000100)={0x0, 0x0, {0x0, 0xfff, 0x0, {}, {}, @rumble}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) r1 = getpgrp(0x0) setpriority(0x0, r1, 0x0) clone3(&(0x7f0000000340)={0x80000, &(0x7f0000000000), &(0x7f0000000180), &(0x7f00000001c0), 0x2c, 0x0, &(0x7f0000000200)=""/54, 0x36, &(0x7f0000000240)=""/167, &(0x7f0000000300)=[0xffffffffffffffff, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0], 0xa}, 0x50) 13:20:06 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x2, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x4004556e, &(0x7f0000000100)={0x0, 0x0, {0x0, 0xfff, 0x0, {}, {}, @rumble}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) 13:20:06 executing program 2: setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x107, 0x12, &(0x7f00000000c0), 0x4) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b70000000000000095000000000000001a3acceed2359b6a7042f95065a090e15e1b23c404f79c61776c1a82ce772b007e62c1012097dee8d6e2a64fa661c0e29a9aaf088552f34aeeaee7eefc55cbca11d1082f44e2649eee73cb488c4b4b"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0xe80, 0xc0fe, &(0x7f00000000c0)="b9ff0300000d698cb89e40f086dd01000005a4004000ffa377fbac141414e9", 0x0, 0x100}, 0x28) 13:20:06 executing program 1: openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(0xffffffffffffffff, 0x400c55cb, &(0x7f0000000100)={0x0, 0x0, {0x0, 0xfff, 0x0, {}, {}, @rumble}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) 13:20:06 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x4004556e, &(0x7f0000000100)={0x0, 0x0, {0x0, 0xfff, 0x0, {}, {}, @rumble}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) 13:20:06 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x2, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0xc06855c8, &(0x7f0000000100)={0x0, 0x0, {0x0, 0xfff, 0x0, {}, {}, @rumble}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) r1 = getpgrp(0x0) clone3(&(0x7f0000000340)={0x80000, &(0x7f0000000000), &(0x7f0000000180), &(0x7f00000001c0), 0x2c, 0x0, &(0x7f0000000200)=""/54, 0x36, &(0x7f0000000240)=""/167, &(0x7f0000000300)=[0xffffffffffffffff, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0], 0xa}, 0x50) 13:20:06 executing program 1: openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(0xffffffffffffffff, 0x400c55cb, &(0x7f0000000100)={0x0, 0x0, {0x0, 0xfff, 0x0, {}, {}, @rumble}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) 13:20:06 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x4004556e, &(0x7f0000000100)={0x0, 0x0, {0x0, 0xfff, 0x0, {}, {}, @rumble}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) 13:20:07 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x400c55cb, 0x0) 13:20:07 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) recvmmsg(r0, &(0x7f0000001d00)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}], 0x2, 0x0, 0x0) setsockopt$SO_TIMESTAMP(r0, 0x1, 0x23, &(0x7f0000000040)=0x9, 0x4) r1 = socket$inet6(0xa, 0x80003, 0x0) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") 13:20:07 executing program 4: setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x107, 0x12, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b70000000000000095000000000000001a3acceed2359b6a7042f95065a090e15e1b23c404f79c61776c1a82ce772b007e62c1012097dee8d6e2a64fa661c0e29a9aaf088552f34aeeaee7eefc55cbca11d1082f44e2649eee73cb488c4b4b"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0xe80, 0xc0fe, &(0x7f00000000c0)="b9ff0300000d698cb89e40f086dd01000005a4004000ffa377fbac141414e9", 0x0, 0x100}, 0x28) 13:20:07 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x2, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0xc06855c8, &(0x7f0000000100)={0x0, 0x0, {0x0, 0xfff, 0x0, {}, {}, @rumble}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) r1 = getpgrp(0x0) clone3(&(0x7f0000000340)={0x80000, &(0x7f0000000000), &(0x7f0000000180), &(0x7f00000001c0), 0x2c, 0x0, &(0x7f0000000200)=""/54, 0x36, &(0x7f0000000240)=""/167, &(0x7f0000000300)=[0xffffffffffffffff, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0], 0xa}, 0x50) 13:20:07 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x4004556e, &(0x7f0000000100)={0x0, 0x0, {0x0, 0xfff, 0x0, {}, {}, @rumble}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) 13:20:07 executing program 2: setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x107, 0x12, &(0x7f00000000c0), 0x4) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b70000000000000095000000000000001a3acceed2359b6a7042f95065a090e15e1b23c404f79c61776c1a82ce772b007e62c1012097dee8d6e2a64fa661c0e29a9aaf088552f34aeeaee7eefc55cbca11d1082f44e2649eee73cb488c4b4b"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0xe80, 0xc0fe, &(0x7f00000000c0)="b9ff0300000d698cb89e40f086dd01000005a4004000ffa377fbac141414e9", 0x0, 0x100}, 0x28) 13:20:07 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x400c55cb, 0x0) 13:20:07 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x400c55cb, 0x0) 13:20:07 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x4004556e, &(0x7f0000000100)={0x0, 0x0, {0x0, 0xfff, 0x0, {}, {}, @rumble}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) 13:20:07 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x2, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0xc06855c8, &(0x7f0000000100)={0x0, 0x0, {0x0, 0xfff, 0x0, {}, {}, @rumble}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) r1 = getpgrp(0x0) clone3(&(0x7f0000000340)={0x80000, &(0x7f0000000000), &(0x7f0000000180), &(0x7f00000001c0), 0x2c, 0x0, &(0x7f0000000200)=""/54, 0x36, &(0x7f0000000240)=""/167, &(0x7f0000000300)=[0xffffffffffffffff, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0], 0xa}, 0x50) 13:20:07 executing program 3: openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(0xffffffffffffffff, 0x4004556e, &(0x7f0000000100)={0x0, 0x0, {0x0, 0xfff, 0x0, {}, {}, @rumble}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) 13:20:07 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x400c55cb, &(0x7f0000000100)={0x0, 0x0, {0x0, 0x0, 0x0, {}, {}, @rumble}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) 13:20:08 executing program 3: openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(0xffffffffffffffff, 0x4004556e, &(0x7f0000000100)={0x0, 0x0, {0x0, 0xfff, 0x0, {}, {}, @rumble}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) 13:20:08 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) recvmmsg(r0, &(0x7f0000001d00)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}], 0x2, 0x0, 0x0) setsockopt$SO_TIMESTAMP(r0, 0x1, 0x23, &(0x7f0000000040)=0x9, 0x4) r1 = socket$inet6(0xa, 0x80003, 0x0) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") 13:20:08 executing program 4: setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x107, 0x12, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b70000000000000095000000000000001a3acceed2359b6a7042f95065a090e15e1b23c404f79c61776c1a82ce772b007e62c1012097dee8d6e2a64fa661c0e29a9aaf088552f34aeeaee7eefc55cbca11d1082f44e2649eee73cb488c4b4b"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0xe80, 0xc0fe, &(0x7f00000000c0)="b9ff0300000d698cb89e40f086dd01000005a4004000ffa377fbac141414e9", 0x0, 0x100}, 0x28) 13:20:08 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x2, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0xc06855c8, &(0x7f0000000100)={0x0, 0x0, {0x0, 0xfff, 0x0, {}, {}, @rumble}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) setpriority(0x0, 0x0, 0x0) clone3(&(0x7f0000000340)={0x80000, &(0x7f0000000000), &(0x7f0000000180), &(0x7f00000001c0), 0x2c, 0x0, &(0x7f0000000200)=""/54, 0x36, &(0x7f0000000240)=""/167, &(0x7f0000000300)=[0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0], 0xa}, 0x50) 13:20:08 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x2, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x4004556d, &(0x7f0000000100)={0x0, 0x0, {0x0, 0xfff, 0x0, {}, {}, @rumble}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) 13:20:08 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) waitid(0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/tcp6\x00') preadv(r0, &(0x7f0000000000)=[{&(0x7f00000000c0)=""/169, 0x2aa}], 0x1, 0x4c00) 13:20:08 executing program 3: openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(0xffffffffffffffff, 0x4004556e, &(0x7f0000000100)={0x0, 0x0, {0x0, 0xfff, 0x0, {}, {}, @rumble}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) 13:20:08 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x4004556e, 0x0) 13:20:08 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x2, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x4004556d, &(0x7f0000000100)={0x0, 0x0, {0x0, 0xfff, 0x0, {}, {}, @rumble}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) 13:20:08 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) waitid(0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/tcp6\x00') preadv(r0, &(0x7f0000000000)=[{&(0x7f00000000c0)=""/169, 0x2aa}], 0x1, 0xa00) 13:20:08 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x4004556e, 0x0) 13:20:08 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x2, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0xc06855c8, &(0x7f0000000100)={0x0, 0x0, {0x0, 0xfff, 0x0, {}, {}, @rumble}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) setpriority(0x0, 0x0, 0x0) clone3(&(0x7f0000000340)={0x80000, &(0x7f0000000000), &(0x7f0000000180), &(0x7f00000001c0), 0x2c, 0x0, &(0x7f0000000200)=""/54, 0x36, &(0x7f0000000240)=""/167, &(0x7f0000000300)=[0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0], 0xa}, 0x50) [ 653.644275][ C0] net_ratelimit: 8 callbacks suppressed [ 653.644284][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 653.649998][ C0] protocol 88fb is buggy, dev hsr_slave_1 13:20:08 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x2, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x4004556d, &(0x7f0000000100)={0x0, 0x0, {0x0, 0xfff, 0x0, {}, {}, @rumble}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) 13:20:09 executing program 4: setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x107, 0x12, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b70000000000000095000000000000001a3acceed2359b6a7042f95065a090e15e1b23c404f79c61776c1a82ce772b007e62c1012097dee8d6e2a64fa661c0e29a9aaf088552f34aeeaee7eefc55cbca11d1082f44e2649eee73cb488c4b4b"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0xe80, 0xc0fe, &(0x7f00000000c0)="b9ff0300000d698cb89e40f086dd01000005a4004000ffa377fbac141414e9", 0x0, 0x100}, 0x28) 13:20:09 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) recvmmsg(r0, &(0x7f0000001d00)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}], 0x2, 0x0, 0x0) setsockopt$SO_TIMESTAMP(r0, 0x1, 0x23, &(0x7f0000000040)=0x9, 0x4) r1 = socket$inet6(0xa, 0x80003, 0x0) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") 13:20:09 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x4004556e, 0x0) 13:20:09 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(0xffffffffffffffff, 0x4004556d, &(0x7f0000000100)={0x0, 0x0, {0x0, 0xfff, 0x0, {}, {}, @rumble}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) 13:20:09 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) waitid(0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/tcp6\x00') preadv(r0, &(0x7f0000000000)=[{&(0x7f00000000c0)=""/169, 0x2aa}], 0x1, 0xa00) 13:20:09 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x2, 0x0) setpriority(0x0, 0x0, 0x0) clone3(&(0x7f0000000340)={0x80000, &(0x7f0000000000), &(0x7f0000000180), &(0x7f00000001c0), 0x2c, 0x0, &(0x7f0000000200)=""/54, 0x36, &(0x7f0000000240)=""/167, &(0x7f0000000300)=[0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0], 0xa}, 0x50) 13:20:09 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x4004556e, &(0x7f0000000100)={0x0, 0x0, {0x0, 0x0, 0x0, {}, {}, @rumble}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) 13:20:09 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(0xffffffffffffffff, 0x4004556d, &(0x7f0000000100)={0x0, 0x0, {0x0, 0xfff, 0x0, {}, {}, @rumble}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) 13:20:09 executing program 4: setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x107, 0x12, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b70000000000000095000000000000001a3acceed2359b6a7042f95065a090e15e1b23c404f79c61776c1a82ce772b007e62c1012097dee8d6e2a64fa661c0e29a9aaf088552f34aeeaee7eefc55cbca11d1082f44e2649eee73cb488c4b4b"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0xe80, 0xc0fe, &(0x7f00000000c0)="b9ff0300000d698cb89e40f086dd01000005a4004000ffa377fbac141414e9", 0x0, 0x100}, 0x28) [ 654.364277][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 654.364671][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 654.370179][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 654.376211][ C0] protocol 88fb is buggy, dev hsr_slave_1 13:20:09 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x2, 0x0) setpriority(0x0, 0x0, 0x0) clone3(&(0x7f0000000340)={0x80000, &(0x7f0000000000), &(0x7f0000000180), &(0x7f00000001c0), 0x2c, 0x0, &(0x7f0000000200)=""/54, 0x36, &(0x7f0000000240)=""/167, &(0x7f0000000300)=[0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0], 0xa}, 0x50) [ 654.444302][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 654.450148][ C0] protocol 88fb is buggy, dev hsr_slave_1 13:20:09 executing program 2: setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x107, 0x12, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b70000000000000095000000000000001a3acceed2359b6a7042f95065a090e15e1b23c404f79c61776c1a82ce772b007e62c1012097dee8d6e2a64fa661c0e29a9aaf088552f34aeeaee7eefc55cbca11d1082f44e2649eee73cb488c4b4b"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0xe80, 0xc0fe, &(0x7f00000000c0)="b9ff0300000d698cb89e40f086dd01000005a4004000ffa377fbac141414e9", 0x0, 0x100}, 0x28) 13:20:09 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) waitid(0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/tcp6\x00') preadv(r0, &(0x7f0000000000)=[{&(0x7f00000000c0)=""/169, 0x2aa}], 0x1, 0x700) 13:20:09 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(0xffffffffffffffff, 0x4004556d, &(0x7f0000000100)={0x0, 0x0, {0x0, 0xfff, 0x0, {}, {}, @rumble}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) 13:20:09 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) recvmmsg(r0, &(0x7f0000001d00)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}], 0x2, 0x0, 0x0) setsockopt$SO_TIMESTAMP(r0, 0x1, 0x23, &(0x7f0000000040)=0x9, 0x4) socket$inet6(0xa, 0x80003, 0x80) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") 13:20:10 executing program 4: setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x107, 0x12, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b70000000000000095000000000000001a3acceed2359b6a7042f95065a090e15e1b23c404f79c61776c1a82ce772b007e62c1012097dee8d6e2a64fa661c0e29a9aaf088552f34aeeaee7eefc55cbca11d1082f44e2649eee73cb488c4b4b"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0xe80, 0xc0fe, &(0x7f00000000c0)="b9ff0300000d698cb89e40f086dd01000005a4004000ffa377fbac141414e9", 0x0, 0x100}, 0x28) 13:20:10 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x2, 0x0) setpriority(0x0, 0x0, 0x0) clone3(&(0x7f0000000340)={0x80000, &(0x7f0000000000), &(0x7f0000000180), &(0x7f00000001c0), 0x2c, 0x0, &(0x7f0000000200)=""/54, 0x36, &(0x7f0000000240)=""/167, &(0x7f0000000300)=[0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0], 0xa}, 0x50) 13:20:10 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x2, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x4004556d, &(0x7f0000000100)={0x0, 0x0, {0x0, 0xfff, 0x0, {}, {}, @rumble}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) 13:20:10 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x2, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x40045564, &(0x7f0000000100)={0x0, 0x0, {0x0, 0xfff, 0x0, {}, {}, @rumble}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) [ 655.084281][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 655.090236][ C1] protocol 88fb is buggy, dev hsr_slave_1 13:20:10 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x4004556d, &(0x7f0000000100)={0x0, 0x0, {0x0, 0xfff, 0x0, {}, {}, @rumble}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) 13:20:10 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setpriority(0x0, 0x0, 0x0) clone3(&(0x7f0000000340)={0x80000, &(0x7f0000000000), &(0x7f0000000180), &(0x7f00000001c0), 0x2c, 0x0, &(0x7f0000000200)=""/54, 0x36, &(0x7f0000000240)=""/167, &(0x7f0000000300)=[0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0], 0xa}, 0x50) 13:20:10 executing program 4: setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x107, 0x12, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b70000000000000095000000000000001a3acceed2359b6a7042f95065a090e15e1b23c404f79c61776c1a82ce772b007e62c1012097dee8d6e2a64fa661c0e29a9aaf088552f34aeeaee7eefc55cbca11d1082f44e2649eee73cb488c4b4b"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0xe80, 0xc0fe, &(0x7f00000000c0)="b9ff0300000d698cb89e40f086dd01000005a4004000ffa377fbac141414e9", 0x0, 0x100}, 0x28) 13:20:10 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x2, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x40045564, &(0x7f0000000100)={0x0, 0x0, {0x0, 0xfff, 0x0, {}, {}, @rumble}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) 13:20:10 executing program 2: setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x107, 0x12, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b70000000000000095000000000000001a3acceed2359b6a7042f95065a090e15e1b23c404f79c61776c1a82ce772b007e62c1012097dee8d6e2a64fa661c0e29a9aaf088552f34aeeaee7eefc55cbca11d1082f44e2649eee73cb488c4b4b"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0xe80, 0xc0fe, &(0x7f00000000c0)="b9ff0300000d698cb89e40f086dd01000005a4004000ffa377fbac141414e9", 0x0, 0x100}, 0x28) 13:20:10 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x4004556d, &(0x7f0000000100)={0x0, 0x0, {0x0, 0xfff, 0x0, {}, {}, @rumble}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) 13:20:10 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) recvmmsg(r0, &(0x7f0000001d00)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}], 0x2, 0x0, 0x0) setsockopt$SO_TIMESTAMP(r0, 0x1, 0x23, &(0x7f0000000040)=0x9, 0x4) socket$inet6(0xa, 0x80003, 0x80) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") 13:20:10 executing program 0: setpriority(0x0, 0x0, 0x0) clone3(&(0x7f0000000340)={0x80000, &(0x7f0000000000), &(0x7f0000000180), &(0x7f00000001c0), 0x2c, 0x0, &(0x7f0000000200)=""/54, 0x36, &(0x7f0000000240)=""/167, &(0x7f0000000300)=[0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0], 0xa}, 0x50) 13:20:10 executing program 4: setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x107, 0x12, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b70000000000000095000000000000001a3acceed2359b6a7042f95065a090e15e1b23c404f79c61776c1a82ce772b007e62c1012097dee8d6e2a64fa661c0e29a9aaf088552f34aeeaee7eefc55cbca11d1082f44e2649eee73cb488c4b4b"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0xe80, 0xc0fe, &(0x7f00000000c0)="b9ff0300000d698cb89e40f086dd01000005a4004000ffa377fbac141414e9", 0x0, 0x100}, 0x28) 13:20:10 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x4004556d, &(0x7f0000000100)={0x0, 0x0, {0x0, 0xfff, 0x0, {}, {}, @rumble}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) 13:20:11 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x2, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x40045564, &(0x7f0000000100)={0x0, 0x0, {0x0, 0xfff, 0x0, {}, {}, @rumble}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) 13:20:11 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x4004556d, &(0x7f0000000100)={0x0, 0x0, {0x0, 0xfff, 0x0, {}, {}, @rumble}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) 13:20:11 executing program 0: setpriority(0x0, 0x0, 0x0) clone3(&(0x7f0000000340)={0x80000, &(0x7f0000000000), &(0x7f0000000180), &(0x7f00000001c0), 0x2c, 0x0, &(0x7f0000000200)=""/54, 0x36, &(0x7f0000000240)=""/167, &(0x7f0000000300)=[0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0], 0xa}, 0x50) 13:20:11 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(0xffffffffffffffff, 0x40045564, &(0x7f0000000100)={0x0, 0x0, {0x0, 0xfff, 0x0, {}, {}, @rumble}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) 13:20:11 executing program 4: setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x107, 0x12, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b70000000000000095000000000000001a3acceed2359b6a7042f95065a090e15e1b23c404f79c61776c1a82ce772b007e62c1012097dee8d6e2a64fa661c0e29a9aaf088552f34aeeaee7eefc55cbca11d1082f44e2649eee73cb488c4b4b"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0xe80, 0xc0fe, &(0x7f00000000c0)="b9ff0300000d698cb89e40f086dd01000005a4004000ffa377fbac141414e9", 0x0, 0x100}, 0x28) 13:20:11 executing program 1: openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(0xffffffffffffffff, 0x4004556d, &(0x7f0000000100)={0x0, 0x0, {0x0, 0xfff, 0x0, {}, {}, @rumble}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) 13:20:11 executing program 2: setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x107, 0x12, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b70000000000000095000000000000001a3acceed2359b6a7042f95065a090e15e1b23c404f79c61776c1a82ce772b007e62c1012097dee8d6e2a64fa661c0e29a9aaf088552f34aeeaee7eefc55cbca11d1082f44e2649eee73cb488c4b4b"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0xe80, 0xc0fe, &(0x7f00000000c0)="b9ff0300000d698cb89e40f086dd01000005a4004000ffa377fbac141414e9", 0x0, 0x100}, 0x28) 13:20:11 executing program 0: setpriority(0x0, 0x0, 0x0) clone3(&(0x7f0000000340)={0x80000, &(0x7f0000000000), &(0x7f0000000180), &(0x7f00000001c0), 0x2c, 0x0, &(0x7f0000000200)=""/54, 0x36, &(0x7f0000000240)=""/167, &(0x7f0000000300)=[0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0], 0xa}, 0x50) 13:20:11 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) recvmmsg(r0, &(0x7f0000001d00)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}], 0x2, 0x0, 0x0) setsockopt$SO_TIMESTAMP(r0, 0x1, 0x23, &(0x7f0000000040)=0x9, 0x4) socket$inet6(0xa, 0x80003, 0x80) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") 13:20:11 executing program 4: setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x107, 0x12, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b70000000000000095000000000000001a3acceed2359b6a7042f95065a090e15e1b23c404f79c61776c1a82ce772b007e62c1012097dee8d6e2a64fa661c0e29a9aaf088552f34aeeaee7eefc55cbca11d1082f44e2649eee73cb488c4b4b"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0xe80, 0xc0fe, &(0x7f00000000c0)="b9ff0300000d698cb89e40f086dd01000005a4004000ffa377fbac141414e9", 0x0, 0x100}, 0x28) 13:20:11 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(0xffffffffffffffff, 0x40045564, &(0x7f0000000100)={0x0, 0x0, {0x0, 0xfff, 0x0, {}, {}, @rumble}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) 13:20:11 executing program 1: openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(0xffffffffffffffff, 0x4004556d, &(0x7f0000000100)={0x0, 0x0, {0x0, 0xfff, 0x0, {}, {}, @rumble}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) 13:20:11 executing program 1: openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(0xffffffffffffffff, 0x4004556d, &(0x7f0000000100)={0x0, 0x0, {0x0, 0xfff, 0x0, {}, {}, @rumble}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) 13:20:11 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(0xffffffffffffffff, 0x40045564, &(0x7f0000000100)={0x0, 0x0, {0x0, 0xfff, 0x0, {}, {}, @rumble}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) 13:20:12 executing program 0: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) setpriority(0x0, 0x0, 0x0) clone3(&(0x7f0000000340)={0x80000, &(0x7f0000000000), &(0x7f0000000180), &(0x7f00000001c0), 0x2c, 0x0, &(0x7f0000000200)=""/54, 0x36, &(0x7f0000000240)=""/167, &(0x7f0000000300)=[0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0], 0xa}, 0x50) 13:20:12 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x2, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x40045564, &(0x7f0000000100)={0x0, 0x0, {0x0, 0xfff, 0x0, {}, {}, @rumble}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) 13:20:12 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x4004556d, 0x0) 13:20:12 executing program 4: setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x107, 0x12, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b70000000000000095000000000000001a3acceed2359b6a7042f95065a090e15e1b23c404f79c61776c1a82ce772b007e62c1012097dee8d6e2a64fa661c0e29a9aaf088552f34aeeaee7eefc55cbca11d1082f44e2649eee73cb488c4b4b"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0xe80, 0xc0fe, &(0x7f00000000c0)="b9ff0300000d698cb89e40f086dd01000005a4004000ffa377fbac141414e9", 0x0, 0x100}, 0x28) 13:20:12 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) waitid(0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/tcp6\x00') preadv(r0, &(0x7f0000000000)=[{&(0x7f00000000c0)=""/169, 0x2aa}], 0x1, 0x10) 13:20:12 executing program 0: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) setpriority(0x0, 0x0, 0x0) clone3(&(0x7f0000000340)={0x80000, &(0x7f0000000000), &(0x7f0000000180), &(0x7f00000001c0), 0x2c, 0x0, &(0x7f0000000200)=""/54, 0x36, &(0x7f0000000240)=""/167, &(0x7f0000000300)=[0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0], 0xa}, 0x50) 13:20:12 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) recvmmsg(r0, &(0x7f0000001d00)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}], 0x2, 0x0, 0x0) setsockopt$SO_TIMESTAMP(r0, 0x1, 0x23, &(0x7f0000000040)=0x9, 0x4) r1 = socket$inet6(0xa, 0x80003, 0x80) ioctl(r1, 0x0, &(0x7f00000001c0)="0805b5055e0bcfe8474071") 13:20:12 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x4004556d, 0x0) 13:20:12 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x40045564, &(0x7f0000000100)={0x0, 0x0, {0x0, 0xfff, 0x0, {}, {}, @rumble}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) 13:20:12 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) waitid(0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/tcp6\x00') preadv(r0, &(0x7f0000000000)=[{&(0x7f00000000c0)=""/169, 0x2aa}], 0x1, 0xa) 13:20:12 executing program 0: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) setpriority(0x0, 0x0, 0x0) clone3(&(0x7f0000000340)={0x80000, &(0x7f0000000000), &(0x7f0000000180), &(0x7f00000001c0), 0x2c, 0x0, &(0x7f0000000200)=""/54, 0x36, &(0x7f0000000240)=""/167, &(0x7f0000000300)=[0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0], 0xa}, 0x50) 13:20:12 executing program 4: setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x107, 0x12, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b70000000000000095000000000000001a3acceed2359b6a7042f95065a090e15e1b23c404f79c61776c1a82ce772b007e62c1012097dee8d6e2a64fa661c0e29a9aaf088552f34aeeaee7eefc55cbca11d1082f44e2649eee73cb488c4b4b"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0xe80, 0xc0fe, &(0x7f00000000c0)="b9ff0300000d698cb89e40f086dd01000005a4004000ffa377fbac141414e9", 0x0, 0x100}, 0x28) 13:20:12 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x40045564, &(0x7f0000000100)={0x0, 0x0, {0x0, 0xfff, 0x0, {}, {}, @rumble}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) 13:20:12 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x4004556d, 0x0) 13:20:12 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) uname(&(0x7f0000000240)) ioctl$EVIOCGKEY(0xffffffffffffffff, 0x80404518, &(0x7f0000000000)=""/4096) syz_mount_image$ocfs2(&(0x7f0000001000)='ocfs2\x00', &(0x7f0000001040)='./file0\x00', 0x7fffffff, 0x1, &(0x7f0000002080)=[{&(0x7f0000001080)="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", 0x1000}], 0x2, &(0x7f00000020c0)='losecurity\\systemeth0\x00') 13:20:13 executing program 0: perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setpriority(0x0, 0x0, 0x0) clone3(&(0x7f0000000340)={0x80000, &(0x7f0000000000), &(0x7f0000000180), &(0x7f00000001c0), 0x2c, 0x0, &(0x7f0000000200)=""/54, 0x36, &(0x7f0000000240)=""/167, &(0x7f0000000300)=[0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0], 0xa}, 0x50) 13:20:13 executing program 4: setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x107, 0x12, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b70000000000000095000000000000001a3acceed2359b6a7042f95065a090e15e1b23c404f79c61776c1a82ce772b007e62c1012097dee8d6e2a64fa661c0e29a9aaf088552f34aeeaee7eefc55cbca11d1082f44e2649eee73cb488c4b4b"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0xe80, 0xc0fe, &(0x7f00000000c0)="b9ff0300000d698cb89e40f086dd01000005a4004000ffa377fbac141414e9", 0x0, 0x100}, 0x28) 13:20:13 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x40045564, &(0x7f0000000100)={0x0, 0x0, {0x0, 0xfff, 0x0, {}, {}, @rumble}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) [ 658.149857][T15040] (syz-executor.2,15040,1):ocfs2_parse_options:1449 ERROR: Unrecognized mount option "losecurity\systemeth0" or missing value [ 658.261181][T15040] (syz-executor.2,15040,1):ocfs2_fill_super:1175 ERROR: status = -22 13:20:13 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) recvmmsg(r0, &(0x7f0000001d00)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}], 0x2, 0x0, 0x0) setsockopt$SO_TIMESTAMP(r0, 0x1, 0x23, &(0x7f0000000040)=0x9, 0x4) r1 = socket$inet6(0xa, 0x80003, 0x80) ioctl(r1, 0x0, &(0x7f00000001c0)="0805b5055e0bcfe8474071") 13:20:13 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x4004556d, &(0x7f0000000100)={0x0, 0x0, {0x0, 0x0, 0x0, {}, {}, @rumble}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) 13:20:13 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x40045564, &(0x7f0000000100)={0x0, 0x0, {0x0, 0xfff, 0x0, {}, {}, @rumble}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) 13:20:13 executing program 0: perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setpriority(0x0, 0x0, 0x0) clone3(&(0x7f0000000340)={0x80000, &(0x7f0000000000), &(0x7f0000000180), &(0x7f00000001c0), 0x2c, 0x0, &(0x7f0000000200)=""/54, 0x36, &(0x7f0000000240)=""/167, &(0x7f0000000300)=[0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0], 0xa}, 0x50) 13:20:13 executing program 4: setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x107, 0x12, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b70000000000000095000000000000001a3acceed2359b6a7042f95065a090e15e1b23c404f79c61776c1a82ce772b007e62c1012097dee8d6e2a64fa661c0e29a9aaf088552f34aeeaee7eefc55cbca11d1082f44e2649eee73cb488c4b4b"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0xe80, 0xc0fe, &(0x7f00000000c0)="b9ff0300000d698cb89e40f086dd01000005a4004000ffa377fbac141414e9", 0x0, 0x100}, 0x28) 13:20:13 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) uname(&(0x7f0000000240)) ioctl$EVIOCGKEY(0xffffffffffffffff, 0x80404518, &(0x7f0000000000)=""/4096) syz_mount_image$ocfs2(&(0x7f0000001000)='ocfs2\x00', &(0x7f0000001040)='./file0\x00', 0x7fffffff, 0x1, &(0x7f0000002080)=[{&(0x7f0000001080)="6d9735c38320cbcdd4413207f787e55adad07a951bf3cc9a8e3cb4322e4c445c6eebd7009f2d3a9c6a2eab3a97a4dd7d3059e9939ccbdffe95422c89e874aaf9838cefc36910e704d8fefc90d69da0115288a86e73511bfe89456841aab730fd6e69a86d8722660aec78a7102281ab7d60003c84025a33320f129093b02d968a737146273ebe5db23a2159be2353dd10d89965c10b1f23cba90e6c0c3c24b2b10dc70afab17699e897d94b78d11e491a71aba00381574ebb0fe755889598002b738d9709896b5a8b32907d4f64c98c819a08354ce5c9df57f9a6f7134b4ce8d15ebc3d6610cb3601553e448dcdea235c3009bdfa11c7af411aff50bc02c2f51a106d7d9d570aee448d0e69aa421a0437baf1e29e609b619c22844c06e02c2fbc42ab423487a96edd9dd22f1209cb5aae75409d09f1b0e54a0c4b6466a9689a510ee072b9c4b8c61340602f000263b32fe0eff9b3966017b0c9f4263eb9a935779eb45fa73daa25f5f803a56a384b5fcb1aa5b22d7ecb9d5b5f549da26a5ebab3915385deaf68f21dca3d26fbad2090588c167c8d1a0fc1f7ecf3be3d001ccc484178ceeac4a861bf00a15aaf192acde232419dd1e22bb3fc2eaf9554a0dfcd4d246ab37f8eb73f908f7b273e69dcbc244ed28035066026bd2eb6ba4cb27c7656fb4cf3b966fc5dae6bd4d6587ed917fbe2ab175d3e977d0be0e498f14504c2d7c90ed6af29eb305bc0dfe97e5bf95ca64addc681231d03e3767828ff170848412aaa617a37bceb201506eafa8242bcf645f00ef5dc49803dc31836a83112ab8130db28f3008f3b07af106e7f613dcae4a2567856f8fcbbf9a9f32ecb52751f20c615b27cd4612eebf1fcfb1dc59e030f47184a7b9a0945b331ad36d3b77ca8ceb6f1a6515ab96808890b8e354747dbeb0c7be721a98f678860f6c70f70571a14e47bdae59d011499f5e98494daa12e1fd0eae7423bdfa6ea0469e2046749283b4bdaae24f44936a074d6c0b8d54c5d2d4e60efb6dac2e94ea31f0fd76c0066309594fabef3641260df8774dea08f8c4ef0600dfed989c706bcd8e0137c308a25c3eca5c8d4d88014e52c5c6a0f8e1f33836a12570678a63f4215687e175b24d033e2e650ed7ea93673f3c88cc9a489e24960f747441613e4c60c1936466b131ab382571fc0124ad57c07a60492546edc8aeed539bbafd1550700cc70425658db521ff3cf60e7414908129e71e556adda11a9b4121835fe51703e02dc4af55a46bb894dd12409e6e38560bf3f9f112b1e0f54fb980140037554ee71379de298e9cb7f34abda70a2a8e88ff7c9732386fa03de2f7045b5b1dd8e1b273d3e1018ccd3309224ed60d59eeea9d41b50c71542e1fe082cf091a495f412792a168fffee81d43e9e1fcddfb38bca1bbcf7fc58f346112114cdb45bfe539dc475fb6cd8cec7bf4ad2a63a48c8a71787f93e4a13bc6660be88f387d4afc47a81fc4adddc439e37e9a00e450936bb6954d25ad47f73a2b417edb0133cd7ec2e407a093ffb842f3d1a5d44a1c57eb99d64980f5d67f6c6cae096b73e1e2bb914f9eb09552b38ea609dff25eb0b9135f17e286a9efca2b818a117ed63cbb7c13012b5792e98d7847324ebcf035613575a38851f06ec9f36ca7f291ba446aafbbc08f1524b935bf93748fb283d48b385c26ed37568c73b3f44d52da895694b9b175a493f93434d10b65a04d273a1a3d98939eddb421f5fe51dac2c2e3214064c247d8b98f996cc34884f63e6589a2ea08247c171f17a0c6968f5e82e86553faa53d98b1311103d6f21f6bf15e14e50e7d7329f16298ca8b9af0186b14c254d328a1cee4366865f971584b2d12927498584335748a70a2ba48eedc463f894ac55ca40c0d2c10415079c720a51c2741b5f610de00a958eebe53d3bf3e60ba882569ab0e1c99a822ae36b93b46e37520358157f097a2889afa2fcb8a477cb2b4da79d6f96838e6e30859f688e95979a3faa89bddb5a0311e2387cbb6801e2e81c1f71917ff033219f228ee9403c667ac2b2a2c09b45c1271e49cf7103abf99250b35233b029ce43195a33143515e9df715e398940a0ec6d55f6c4c9733ad0c411e1dc6684e23688dbe932efd03515159a670c631d9dc317a5202f2050a4e9cdee1c12bae5a30adb468b9e14d058d02e3ecea11d4daf9a0c131c9e913c75c7bfdc6c0f1470af2ef55fd94bd3eee786eb13f706a66cb658a8675d9f42754476bf1b5cffae49e747968bffe22d0c9142ab2076718738bc2bb44b2729b040bfacc1c7b823d6084de26455aa2f0fe12e2fd44f99de93ee2cdd56e98aa1f4873b43e6167ed912c9e6576c28e68c9dc6ea8002e6b7fc6fca6b030111e59c8c18a2d16f866eeb04c61a5588401f52d9ff0ac761a2ba840aa0dc5729e7690224a07e5b9233d7ab8ec9f071f9127ee7ce96efb68ac841327a9d4f2670fb32fc4a0299e0a0a0a270ef036f39c4f2c91baf987790e31c6c1a61858bcfd6bfa5695c0b757cbf115770fdb568301f11dc682a488dec9d53b08ae5304d6a451a8b61ccbc66c21cca5629ea5ce0f2e81dc976a363b0176a9966a6fcf0b3cf8edb7d85780121fb8d383775923e664c25dcf0ac0328cddea45f9ea4c0203b625400f4f5ca5b93e782557350fc9b4acd69236c1ee9c6210dfda99feac3ed31d98b1e04acb6c12e537c06dab5cdd754b23ceefe0f54c5b1638d6c9ab1315a71f08210b6d45001bf7e2d57b1f8bc428b6f1909ad57a7dddb16eccee77bcb0f5ca8416d7e5a45c00bb249b83c6a66d33a5f820c53fdb693d7d05fea4957b408f27a209b0f378b45621a043165b1c9fe2bbe57f59b9a8adf99331f4b2a5f4b4a06801bfc6e8483b17b5fac038dfd9952b8ac6ef94d8ea99971ef3f71b3170b4276904e69e04e6bd541203c50a5e43b0ffe9184a04d9f97e1a645347b04df698b494d48dfe292eadd3475284c75cc2adf263baa780e6d56ae163796f4449b922f027df1450b10fda7129bcdc0725989642a16a8df9f09c5232cc22550f6919dac3557e085c2fe5a5f8de1e96ab8b45b721b2739656ad89a9e471a67740d80218330fd1a998e4084983b707ee96b49fb18a2077c82f3e3e1e2436a9ea3c93830796e40ba40325e98668a9ddea4f2be8419f2c1feec9d8d3c74f0df02e297d05992b091490dae4784f2d7bee7ddc45b209b605fa20727adfd75c66401bb2ed57b34022dcf3d9227b32db108ba8e362e26659f8fc13a4e48838e78dd016787989d76aae294d8fb722f28f40323171d41e1fcb36fa2cd50aee45a8bcce87e8320818b366f8db69c98a131c147e5d6ebf3e2d8c40e3f11fa922b616d17919466d752b5aefcfb50e16a79cc2bd648ed644151fb60228ecead35598b93afee7e4b5889d7ce703134416bc62be5488c7b7ae1ee7d9f1d74aafc66610a76f87a5011b5a40e42aa03b7ebe3dabb99d5529fe99fbf87cf55da0a4691695277dfd01d8e2c69377af6087178be3f75c9c6c012f3c6d47a47d764265e1c25ba7388467e8fb5abb6f37ddf0398534e6bc86de6dc9764a7ae45ed7f481d020d3555642b828ff5b5928ce37058db78aebdf3f3bcb2b3ea1806a31b377d9439058f449ed7a209023d830ee1fc3f9594098e41c2953ed2ee6cd8d62cefe8d5b20506f853ee6c6ed14ad476d30bb204dbf446758ffe4e2f4c1ead498e65285127783b64e1920f36363de959df0aae957e44a6c11a1b1f92ff290a621df549de8a03eabc6a47fc057083c78baf8b6f1c190b9aabd00093628768886853107fd3d84c6c701ac3905ae46d37cbe7fc573de643967f9e44ef1d3b94cb49ed2211254291f1f230ca963b7ccec105c09ae51b43397bed44a042771791944e23d6a77a3de26b37ef17b7a3917209d1275d2724b97bb39b5df3fe32ea28c7dd2de349db33f196862fe1f35cb9e7d8ac60860e89a19b48a5d44e97cc8b0e589a0865633cbd5bf127929785ebe46487475e5c69dc2d9f902c2242c9608d1b2f440ccd99ccd208f96e43a42d0e2b811c691f399d2f59a5dcc5e031b2c78f6daa3318db325f0251baaa764b2c24aa8020da19cbf74f045529441f70c93e5c9cdd781a1a59f7180cbd83c381a2b73075d3edf6f5f1bb0db3f8eedf82643ee66c37372e7cdc1d00739667944f84b3e3129ef7f509ad1775090eb356f0af843dbd31450af8f7e96847b0ad1133aac76ff143c7453d047b9e0ebdc73b1d2fd88c772fe4948f481b74cecd2bdbc2ec9b00ef5f047f5717124069c7b4c46a9199910f112746d2598d86c3f1ab15ae04b3d7f86a72e1e5cf2cb6ef8b6bd8cfcb921b41b72e866acda0f2f4122875f2dcc435c3884ea27add227c3224b8e8a48b4bbf5eab5fab84bb8601e7131972a1d27e0c430fad240f65ed1b3dd067541f3b91b6dac60ae96756a03d8ffb41f063c1a87d21f98da471b7ab0dbf44ae6728fe163cb1243c11976030559499c71bc179cb7be0aabf7559b0ee00a74d7f1901539123094bffdcdecba4c114ac4cdc4bf13688bbe30b42e081b81146e82665e37ed1d2905c2d5c1e5ad58fb06ef0466627e6c227161150b98e752e0f09cbc830c6aaf07a5460bd8e1b8f7f89ca280e37229f5c5303de7003ab61260f7a9d2c6f2573038858b315ff2bf05faddae17854c57506c9daf8249d1040d01c4390ef05cb4048a2425795f20b11bea7e2bc366f0a4861dd4678c86c8610d96ee157c8b869f455ca11ab254af51b04e76a14cf9f471cbdc930d3bcd2a97401b482710c71d3bca6d4213c916eeb99dfb1c40049487cf5798e862691f8f0f83b8534cf8f882f4db6d5bb02f307ae7406ffe7d645ec14e27bc3f882997b738dd0e5c1bc0ae42207e7aa24b68c0f2683f7fa15912346107f1240726b39790e254a9eda8c7e8f1380a333effbe675408409ccf15f7191072952f36b76f9536d5f2ab9f48e600fa484829fa0312caab0a781eb92cc4d6be8f620c3674b56af4929427778a9aa7376090b938b325b4c20abd5bd760fedb0230886a2804ebcc317a0fa6d6131d227d90332380fe5f11b87788881ca54c39acc3a328c6a8794996ea91f7b6e1dd9654896bf90c1db071188fbdfa699bd1ab5536ae3b5ce91033d5c3585cc9b2e7f6039d92bcff176a6165f3038f260981f1025aab511460222609ba1886b1d9ccf14da973630bc0c915e98e2ec4eadaac16c4c64103e245e7cd12a2aa72bb7cf7ad038d4412722a40754017575e3fe345ddc622e4bf65849c6f2fc41c0c8616ab05fd7c659d84a5cd3901a4bb445e0cbef3f3891a29cc1936d9d214d444d7b588770a844db76307d0d5984c2f3c381104fdadb1f642c5e158adc98b04ecf6aaccda0fd0bff6cc3432921530b3eeec455f59ba9fec5ef9ece12dc0432f2bde4dbf26b81f699e3cfdc6c1698a651695ea897f90d9b2a49495f9e7f90b588914c93858945bdb586ed2715b028ed33eaa37d55fc04a4eac36e31deb272af0b5a44c52c3f2856f33c68e4902e2dbce35fae148345d63fa205c81514b656304d7b824f9dea506e4cf769dbf52d7159496a27530cda5c3c757da88578186e7151cea576632a60a12e21ea4aa871ed2e12113f866fc2edf69d71fbdf76b1c80329f7550ba5309909036d33e9b7b18bdcf384c8abb22c545155e0ffdb55c38855d1e9146f531e8cee675e9eb49b1c12274c2b24c1459c532307d4f9c9f881e754a8b57f8bf471e1c3ca89e3eb24b15f90ab64608ef2dd200f4c72d7fdbd38469daa187a42e4091c4d32b4eb84445361", 0x1000}], 0x2, &(0x7f00000020c0)='losecurity\\systemeth0\x00') 13:20:13 executing program 3: openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(0xffffffffffffffff, 0x40045564, &(0x7f0000000100)={0x0, 0x0, {0x0, 0xfff, 0x0, {}, {}, @rumble}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) 13:20:13 executing program 3: openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(0xffffffffffffffff, 0x40045564, &(0x7f0000000100)={0x0, 0x0, {0x0, 0xfff, 0x0, {}, {}, @rumble}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) 13:20:14 executing program 0: perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setpriority(0x0, 0x0, 0x0) clone3(&(0x7f0000000340)={0x80000, &(0x7f0000000000), &(0x7f0000000180), &(0x7f00000001c0), 0x2c, 0x0, &(0x7f0000000200)=""/54, 0x36, &(0x7f0000000240)=""/167, &(0x7f0000000300)=[0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0], 0xa}, 0x50) 13:20:14 executing program 3: openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(0xffffffffffffffff, 0x40045564, &(0x7f0000000100)={0x0, 0x0, {0x0, 0xfff, 0x0, {}, {}, @rumble}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) [ 658.827484][T15067] (syz-executor.2,15067,0):ocfs2_parse_options:1449 ERROR: Unrecognized mount option "losecurity\systemeth0" or missing value [ 658.842648][T15067] (syz-executor.2,15067,0):ocfs2_fill_super:1175 ERROR: status = -22 13:20:14 executing program 4: setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x107, 0x12, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b70000000000000095000000000000001a3acceed2359b6a7042f95065a090e15e1b23c404f79c61776c1a82ce772b007e62c1012097dee8d6e2a64fa661c0e29a9aaf088552f34aeeaee7eefc55cbca11d1082f44e2649eee73cb488c4b4b"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0xe80, 0xc0fe, &(0x7f00000000c0)="b9ff0300000d698cb89e40f086dd01000005a4004000ffa377fbac141414e9", 0x0, 0x100}, 0x28) 13:20:14 executing program 2: setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x107, 0x12, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b70000000000000095000000000000001a3acceed2359b6a7042f95065a090e15e1b23c404f79c61776c1a82ce772b007e62c1012097dee8d6e2a64fa661c0e29a9aaf088552f34aeeaee7eefc55cbca11d1082f44e2649eee73cb488c4b4b"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0xe80, 0xc0fe, &(0x7f00000000c0)="b9ff0300000d698cb89e40f086dd01000005a4004000ffa377fbac141414e9", 0x0, 0x100}, 0x28) [ 659.254281][ C1] net_ratelimit: 8 callbacks suppressed [ 659.254289][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 659.265711][ C1] protocol 88fb is buggy, dev hsr_slave_1 13:20:14 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) recvmmsg(r0, &(0x7f0000001d00)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}], 0x2, 0x0, 0x0) setsockopt$SO_TIMESTAMP(r0, 0x1, 0x23, &(0x7f0000000040)=0x9, 0x4) r1 = socket$inet6(0xa, 0x80003, 0x80) ioctl(r1, 0x0, &(0x7f00000001c0)="0805b5055e0bcfe8474071") 13:20:14 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x40045564, 0x0) 13:20:14 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setpriority(0x0, 0x0, 0x0) clone3(&(0x7f0000000340)={0x80000, &(0x7f0000000000), &(0x7f0000000180), &(0x7f00000001c0), 0x2c, 0x0, &(0x7f0000000200)=""/54, 0x36, &(0x7f0000000240)=""/167, &(0x7f0000000300)=[0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0], 0xa}, 0x50) 13:20:14 executing program 4: setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x107, 0x12, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0xe80, 0xc0fe, &(0x7f00000000c0)="b9ff0300000d698cb89e40f086dd01000005a4004000ffa377fbac141414e9", 0x0, 0x100}, 0x28) 13:20:14 executing program 2: setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x107, 0x12, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b70000000000000095000000000000001a3acceed2359b6a7042f95065a090e15e1b23c404f79c61776c1a82ce772b007e62c1012097dee8d6e2a64fa661c0e29a9aaf088552f34aeeaee7eefc55cbca11d1082f44e2649eee73cb488c4b4b"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0xe80, 0xc0fe, &(0x7f00000000c0)="b9ff0300000d698cb89e40f086dd01000005a4004000ffa377fbac141414e9", 0x0, 0x100}, 0x28) 13:20:14 executing program 4: setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x107, 0x12, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0xe80, 0xc0fe, &(0x7f00000000c0)="b9ff0300000d698cb89e40f086dd01000005a4004000ffa377fbac141414e9", 0x0, 0x100}, 0x28) 13:20:14 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x40045564, 0x0) 13:20:14 executing program 4: setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x107, 0x12, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0xe80, 0xc0fe, &(0x7f00000000c0)="b9ff0300000d698cb89e40f086dd01000005a4004000ffa377fbac141414e9", 0x0, 0x100}, 0x28) 13:20:14 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setpriority(0x0, 0x0, 0x0) clone3(&(0x7f0000000340)={0x80000, &(0x7f0000000000), &(0x7f0000000180), &(0x7f00000001c0), 0x2c, 0x0, &(0x7f0000000200)=""/54, 0x36, &(0x7f0000000240)=""/167, &(0x7f0000000300)=[0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0], 0xa}, 0x50) 13:20:15 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x40045564, 0x0) 13:20:15 executing program 4: setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x107, 0x12, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x0, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b70000000000000095000000000000001a3acceed2359b6a7042f95065a090e15e1b23c404f79c61776c1a82ce772b007e62c1012097dee8d6e2a64fa661c0e29a9aaf088552f34aeeaee7eefc55cbca11d1082f44e2649eee73cb488c4b4b"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0xe80, 0xc0fe, &(0x7f00000000c0)="b9ff0300000d698cb89e40f086dd01000005a4004000ffa377fbac141414e9", 0x0, 0x100}, 0x28) 13:20:15 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(r0, 0xffffffffffffffff) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000240)={0x0}) r3 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r3, &(0x7f0000000180), 0x27a4eaa51029717, 0x0) sendmsg$NBD_CMD_RECONFIGURE(r3, &(0x7f0000000380)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000340)={0x0}, 0x1, 0x0, 0x0, 0x40000004}, 0x20020004) ioctl$SECCOMP_IOCTL_NOTIF_ID_VALID(r1, 0x80082102, &(0x7f00000002c0)=r2) r4 = socket(0x10, 0x3, 0x0) write(r4, &(0x7f0000000140)="240000001e005f1c14fffffffffffff8070000000000000001000000080002000d000000", 0x24) r5 = socket$nl_generic(0x10, 0x3, 0x10) r6 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_LINK_STATS(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000540)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r6, @ANYBLOB="3f029a0bde710000000001000000000000000c4100000214001462726f6164636173742d6c696e6b0000"], 0x30}, 0x1, 0xfffffff0}, 0x0) sendmsg$TIPC_CMD_SET_NODE_ADDR(r4, &(0x7f0000000200)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f00000001c0)={&(0x7f0000000140)={0x24, r6, 0x704, 0x70bd29, 0x25dfdbfc, {{}, 0x0, 0x8001, 0x0, {0x8, 0x11, 0x2}}, ["", "", "", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x4000}, 0x20000000) sendmsg$TIPC_CMD_SET_NODE_ADDR(r1, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x24, r6, 0x202, 0x70bd2c, 0x25dfdbfc, {{}, 0x0, 0x8001, 0x0, {0x8, 0x11, 0x4}}, ["", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x1}, 0x80180) bpf$MAP_CREATE(0x0, 0x0, 0x0) uname(&(0x7f0000000240)) [ 659.884298][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 659.890205][ C0] protocol 88fb is buggy, dev hsr_slave_1 13:20:15 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) recvmmsg(r0, &(0x7f0000001d00)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}], 0x2, 0x0, 0x0) setsockopt$SO_TIMESTAMP(r0, 0x1, 0x23, &(0x7f0000000040)=0x9, 0x4) r1 = socket$inet6(0xa, 0x80003, 0x80) ioctl(r1, 0x1000008912, 0x0) 13:20:15 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x40045564, &(0x7f0000000100)={0x0, 0x0, {0x0, 0x0, 0x0, {}, {}, @rumble}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) 13:20:15 executing program 4: setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x107, 0x12, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x0, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b70000000000000095000000000000001a3acceed2359b6a7042f95065a090e15e1b23c404f79c61776c1a82ce772b007e62c1012097dee8d6e2a64fa661c0e29a9aaf088552f34aeeaee7eefc55cbca11d1082f44e2649eee73cb488c4b4b"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0xe80, 0xc0fe, &(0x7f00000000c0)="b9ff0300000d698cb89e40f086dd01000005a4004000ffa377fbac141414e9", 0x0, 0x100}, 0x28) 13:20:15 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setpriority(0x0, 0x0, 0x0) clone3(&(0x7f0000000340)={0x80000, &(0x7f0000000000), &(0x7f0000000180), &(0x7f00000001c0), 0x2c, 0x0, &(0x7f0000000200)=""/54, 0x36, &(0x7f0000000240)=""/167, &(0x7f0000000300)=[0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0], 0xa}, 0x50) 13:20:15 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) waitid(0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/tcp6\x00') preadv(r0, &(0x7f0000000000)=[{&(0x7f00000000c0)=""/169, 0x2aa}], 0x1, 0x3) 13:20:15 executing program 4: setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x107, 0x12, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x0, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b70000000000000095000000000000001a3acceed2359b6a7042f95065a090e15e1b23c404f79c61776c1a82ce772b007e62c1012097dee8d6e2a64fa661c0e29a9aaf088552f34aeeaee7eefc55cbca11d1082f44e2649eee73cb488c4b4b"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0xe80, 0xc0fe, &(0x7f00000000c0)="b9ff0300000d698cb89e40f086dd01000005a4004000ffa377fbac141414e9", 0x0, 0x100}, 0x28) 13:20:15 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) waitid(0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/tcp6\x00') preadv(r0, &(0x7f0000000000)=[{&(0x7f00000000c0)=""/169, 0x2aa}], 0x1, 0x2) 13:20:15 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setpriority(0x0, 0x0, 0x0) clone3(0x0, 0x0) [ 660.604299][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 660.604304][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 660.604365][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 660.610116][ C0] protocol 88fb is buggy, dev hsr_slave_1 13:20:15 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) recvmmsg(r0, &(0x7f0000001d00)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}], 0x2, 0x0, 0x0) setsockopt$SO_TIMESTAMP(r0, 0x1, 0x23, &(0x7f0000000040)=0x9, 0x4) r1 = socket$inet6(0xa, 0x80003, 0x80) ioctl(r1, 0x1000008912, 0x0) 13:20:15 executing program 4: setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x107, 0x12, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x0, 0x0, &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0xe80, 0xc0fe, &(0x7f00000000c0)="b9ff0300000d698cb89e40f086dd01000005a4004000ffa377fbac141414e9", 0x0, 0x100}, 0x28) 13:20:16 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) uname(&(0x7f0000000240)) r0 = socket$inet6(0xa, 0x400000000001, 0x0) bind$inet6(r0, &(0x7f0000fa0fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20000088, &(0x7f00008d4fe4)={0xa, 0x4e20, 0xffffffff, @loopback, 0x3}, 0xffffffffffffff97) r1 = socket$inet6(0xa, 0x400000000001, 0x0) bind$inet6(r1, &(0x7f0000fa0fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r1, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r2 = open(&(0x7f0000000200)='./file0\x00', 0x141042, 0x82) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f00000001c0)=0x4, 0x4) timerfd_gettime(r2, &(0x7f0000000040)) ftruncate(r2, 0x7e) r3 = socket$inet(0xa, 0x801, 0x84) connect$inet(r3, &(0x7f0000004cc0)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r3, 0x84, 0x9, &(0x7f00000000c0)={0x0, @in={{0x2, 0x0, @rand_addr=0xac14ffbb}}, 0x3}, &(0x7f0000000180)=0x98) r4 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000240)='/dev/nullb0\x00', 0x100, 0x0) sendfile(r4, r3, &(0x7f00000000c0)=0x100000000, 0x1100000000) ioctl$KVM_CREATE_IRQCHIP(r2, 0xae60) r5 = open(&(0x7f0000000200)='./file0\x00', 0x141042, 0x82) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f00000001c0)=0x4, 0x4) timerfd_gettime(r5, &(0x7f0000000040)) r6 = socket$inet(0xa, 0x801, 0x84) connect$inet(r6, &(0x7f0000004cc0)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0xfffffffffffffe6c) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r6, 0x84, 0x9, &(0x7f00000000c0)={0x0, @in={{0x2, 0x0, @rand_addr=0xac14ffbb}}}, &(0x7f0000000180)=0x98) r7 = socket$inet(0xa, 0x801, 0x84) connect$inet(r7, &(0x7f0000004cc0)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r7, 0x84, 0x9, &(0x7f00000000c0)={0x0, @in={{0x2, 0x0, @rand_addr=0xac14ffbb}}}, &(0x7f0000000180)=0x98) r8 = socket$inet(0xa, 0x801, 0x84) connect$inet(r8, &(0x7f0000004cc0)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r8, 0x84, 0x9, &(0x7f00000000c0)={0x0, @in={{0x2, 0x0, @rand_addr=0xac14ffbb}}}, &(0x7f0000000180)=0x98) getsockopt$inet_IP_XFRM_POLICY(r8, 0x0, 0x11, &(0x7f0000000300)={{{@in6=@empty, @in=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@initdev}, 0x0, @in=@empty}}, &(0x7f0000000280)=0xe8) r10 = socket$inet6(0xa, 0x400000000001, 0x0) bind$inet6(r10, &(0x7f0000fa0fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r10, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r11 = open(&(0x7f0000000200)='./file0\x00', 0x161042, 0x82) setsockopt$SO_TIMESTAMPING(r10, 0x1, 0x25, &(0x7f00000001c0)=0x4, 0x4) timerfd_gettime(r11, &(0x7f0000000040)) ftruncate(r11, 0x7e) sendfile(r10, r11, &(0x7f00000000c0), 0x8000fffffffe) bpf$MAP_CREATE(0x0, &(0x7f0000000440)={0xc, 0x8000fb, 0x3, 0x100, 0x1, 0x1, 0x9, [], r9, r11, 0x1, 0x5}, 0x3c) r12 = socket$inet(0xa, 0x801, 0x84) connect$inet(r12, &(0x7f0000004cc0)={0x2, 0x2, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0xffffffffffffff0e) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r12, 0x84, 0x9, &(0x7f00000000c0)={0x0, @in={{0x2, 0x0, @rand_addr=0xac14ffbb}}}, &(0x7f0000000180)=0x98) ioctl$sock_SIOCGIFBR(r12, 0x8940, &(0x7f0000000080)=@generic={0x3, 0x5, 0x7}) ftruncate(r5, 0x7e) r13 = socket$inet(0xa, 0x801, 0x84) connect$inet(r13, &(0x7f0000004cc0)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r13, 0x84, 0x9, &(0x7f00000000c0)={0x0, @in={{0x2, 0x0, @rand_addr=0xac14ffbb}}}, &(0x7f0000000180)=0x98) sendfile(r13, r5, &(0x7f00000000c0)=0x80000001, 0x8) ioctl$TUNSETVNETBE(r5, 0x400454de, &(0x7f0000000000)) 13:20:16 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setpriority(0x0, 0x0, 0x0) clone3(0x0, 0x0) 13:20:16 executing program 4: setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x107, 0x12, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x0, 0x0, &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0xe80, 0xc0fe, &(0x7f00000000c0)="b9ff0300000d698cb89e40f086dd01000005a4004000ffa377fbac141414e9", 0x0, 0x100}, 0x28) 13:20:16 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setpriority(0x0, 0x0, 0x0) clone3(0x0, 0x0) 13:20:16 executing program 4: setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x107, 0x12, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x0, 0x0, &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0xe80, 0xc0fe, &(0x7f00000000c0)="b9ff0300000d698cb89e40f086dd01000005a4004000ffa377fbac141414e9", 0x0, 0x100}, 0x28) 13:20:16 executing program 4: setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x107, 0x12, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x0, &(0x7f0000000280)=ANY=[], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0xe80, 0xc0fe, &(0x7f00000000c0)="b9ff0300000d698cb89e40f086dd01000005a4004000ffa377fbac141414e9", 0x0, 0x100}, 0x28) 13:20:16 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setpriority(0x0, 0x0, 0x0) clone3(&(0x7f0000000340)={0x0, &(0x7f0000000000), &(0x7f0000000180), &(0x7f00000001c0), 0x2c, 0x0, &(0x7f0000000200)=""/54, 0x36, &(0x7f0000000240)=""/167, &(0x7f0000000300)=[0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0], 0xa}, 0x50) 13:20:16 executing program 2: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x2, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x5421, &(0x7f0000000100)={0x0, 0x0, {0x0, 0xfff, 0x0, {}, {}, @rumble}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) 13:20:16 executing program 4: setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x107, 0x12, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x0, &(0x7f0000000280)=ANY=[], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0xe80, 0xc0fe, &(0x7f00000000c0)="b9ff0300000d698cb89e40f086dd01000005a4004000ffa377fbac141414e9", 0x0, 0x100}, 0x28) [ 661.324318][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 661.330284][ C1] protocol 88fb is buggy, dev hsr_slave_1 13:20:16 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) waitid(0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/tcp6\x00') preadv(r0, &(0x7f0000000000)=[{&(0x7f00000000c0)=""/169, 0x2aa}], 0xef4, 0x0) 13:20:16 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) recvmmsg(r0, &(0x7f0000001d00)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}], 0x2, 0x0, 0x0) setsockopt$SO_TIMESTAMP(r0, 0x1, 0x23, &(0x7f0000000040)=0x9, 0x4) r1 = socket$inet6(0xa, 0x80003, 0x80) ioctl(r1, 0x1000008912, 0x0) 13:20:16 executing program 4: setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x107, 0x12, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x0, &(0x7f0000000280)=ANY=[], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0xe80, 0xc0fe, &(0x7f00000000c0)="b9ff0300000d698cb89e40f086dd01000005a4004000ffa377fbac141414e9", 0x0, 0x100}, 0x28) 13:20:16 executing program 2 (fault-call:1 fault-nth:0): r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x4004556e, &(0x7f0000000100)={0x0, 0x0, {0x0, 0x0, 0x0, {}, {}, @rumble}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) 13:20:16 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setpriority(0x0, 0x0, 0x0) clone3(&(0x7f0000000340)={0x0, 0x0, &(0x7f0000000180), &(0x7f00000001c0), 0x2c, 0x0, &(0x7f0000000200)=""/54, 0x36, &(0x7f0000000240)=""/167, &(0x7f0000000300)=[0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0], 0xa}, 0x50) [ 661.725350][T15205] FAULT_INJECTION: forcing a failure. [ 661.725350][T15205] name failslab, interval 1, probability 0, space 0, times 0 [ 661.763569][T15205] CPU: 1 PID: 15205 Comm: syz-executor.2 Not tainted 5.4.0-syzkaller #0 [ 661.771962][T15205] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 661.782035][T15205] Call Trace: [ 661.785998][T15205] dump_stack+0x197/0x210 [ 661.790394][T15205] should_fail.cold+0xa/0x15 [ 661.795040][T15205] ? fault_create_debugfs_attr+0x180/0x180 [ 661.801051][T15205] ? ___might_sleep+0x163/0x2c0 [ 661.805967][T15205] __should_failslab+0x121/0x190 [ 661.810936][T15205] should_failslab+0x9/0x14 [ 661.815439][T15205] __kmalloc+0x2e0/0x770 [ 661.819691][T15205] ? mark_held_locks+0xf0/0xf0 [ 661.824468][T15205] ? _parse_integer+0x190/0x190 [ 661.829325][T15205] ? tomoyo_realpath_from_path+0xcd/0x7b0 [ 661.835037][T15205] tomoyo_realpath_from_path+0xcd/0x7b0 [ 661.840570][T15205] ? tomoyo_path_number_perm+0x193/0x520 [ 661.846217][T15205] tomoyo_path_number_perm+0x1dd/0x520 [ 661.851663][T15205] ? tomoyo_path_number_perm+0x193/0x520 [ 661.857291][T15205] ? tomoyo_execute_permission+0x4a0/0x4a0 [ 661.863095][T15205] ? perf_trace_lock_acquire+0xf5/0x530 [ 661.868642][T15205] ? ___might_sleep+0x163/0x2c0 [ 661.873516][T15205] ? selinux_file_mprotect+0x620/0x620 [ 661.878996][T15205] ? __fget+0x37f/0x550 [ 661.883147][T15205] ? ksys_dup3+0x3e0/0x3e0 [ 661.887567][T15205] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 661.893817][T15205] ? fput_many+0x12c/0x1a0 [ 661.898270][T15205] tomoyo_file_ioctl+0x23/0x30 [ 661.903040][T15205] security_file_ioctl+0x77/0xc0 [ 661.907974][T15205] ksys_ioctl+0x57/0xd0 [ 661.912125][T15205] __x64_sys_ioctl+0x73/0xb0 [ 661.916728][T15205] do_syscall_64+0xfa/0x790 [ 661.921267][T15205] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 661.927188][T15205] RIP: 0033:0x45a679 [ 661.931076][T15205] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 661.950878][T15205] RSP: 002b:00007f108e393c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 661.959395][T15205] RAX: ffffffffffffffda RBX: 00007f108e393c90 RCX: 000000000045a679 [ 661.967409][T15205] RDX: 0000000020000100 RSI: 000000004004556e RDI: 0000000000000003 13:20:17 executing program 4: setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x107, 0x12, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0xe80, 0xc0fe, &(0x7f00000000c0)="b9ff0300000d698cb89e40f086dd01000005a4004000ffa377fbac141414e9", 0x0, 0x100}, 0x28) [ 661.975388][T15205] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 661.983348][T15205] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f108e3946d4 [ 661.991478][T15205] R13: 00000000004c5e89 R14: 00000000004dc238 R15: 0000000000000004 [ 662.014417][T15205] ERROR: Out of memory at tomoyo_realpath_from_path. 13:20:17 executing program 4: setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x107, 0x12, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0xe80, 0xc0fe, &(0x7f00000000c0)="b9ff0300000d698cb89e40f086dd01000005a4004000ffa377fbac141414e9", 0x0, 0x100}, 0x28) 13:20:17 executing program 2 (fault-call:1 fault-nth:1): r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x4004556e, &(0x7f0000000100)={0x0, 0x0, {0x0, 0x0, 0x0, {}, {}, @rumble}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) 13:20:17 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setpriority(0x0, 0x0, 0x0) clone3(&(0x7f0000000340)={0x0, 0x0, &(0x7f0000000180), &(0x7f00000001c0), 0x2c, 0x0, &(0x7f0000000200)=""/54, 0x36, &(0x7f0000000240)=""/167, &(0x7f0000000300)=[0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0], 0xa}, 0x50) [ 662.151177][T15217] FAULT_INJECTION: forcing a failure. [ 662.151177][T15217] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 662.164444][T15217] CPU: 1 PID: 15217 Comm: syz-executor.2 Not tainted 5.4.0-syzkaller #0 [ 662.173202][T15217] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 662.183273][T15217] Call Trace: [ 662.186591][T15217] dump_stack+0x197/0x210 [ 662.190969][T15217] should_fail.cold+0xa/0x15 [ 662.195590][T15217] ? fault_create_debugfs_attr+0x180/0x180 [ 662.201419][T15217] ? __kasan_check_read+0x11/0x20 [ 662.206489][T15217] should_fail_alloc_page+0x50/0x60 [ 662.211712][T15217] __alloc_pages_nodemask+0x1a1/0x910 [ 662.217232][T15217] ? avc_has_extended_perms+0x8e4/0x10f0 [ 662.222896][T15217] ? __alloc_pages_slowpath+0x2920/0x2920 [ 662.228677][T15217] ? __kasan_check_read+0x11/0x20 [ 662.233744][T15217] ? fault_create_debugfs_attr+0x180/0x180 [ 662.239566][T15217] cache_grow_begin+0x90/0xc60 [ 662.244415][T15217] ? tomoyo_realpath_from_path+0xcd/0x7b0 13:20:17 executing program 4: setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x107, 0x12, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0xe80, 0xc0fe, &(0x7f00000000c0)="b9ff0300000d698cb89e40f086dd01000005a4004000ffa377fbac141414e9", 0x0, 0x100}, 0x28) [ 662.244449][T15217] ? trace_hardirqs_off+0x62/0x240 [ 662.244467][T15217] __kmalloc+0x6b2/0x770 [ 662.244480][T15217] ? mark_held_locks+0xf0/0xf0 [ 662.244497][T15217] ? tomoyo_realpath_from_path+0xcd/0x7b0 [ 662.244513][T15217] tomoyo_realpath_from_path+0xcd/0x7b0 [ 662.244525][T15217] ? tomoyo_path_number_perm+0x193/0x520 [ 662.244545][T15217] tomoyo_path_number_perm+0x1dd/0x520 [ 662.286969][T15217] ? tomoyo_path_number_perm+0x193/0x520 [ 662.292628][T15217] ? tomoyo_execute_permission+0x4a0/0x4a0 13:20:17 executing program 4: setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x107, 0x12, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xc, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0xe80, 0xc0fe, &(0x7f00000000c0)="b9ff0300000d698cb89e40f086dd01000005a4004000ffa377fbac141414e9", 0x0, 0x100}, 0x28) [ 662.298462][T15217] ? __f_unlock_pos+0x19/0x20 [ 662.303182][T15217] ? ___might_sleep+0x163/0x2c0 [ 662.308085][T15217] ? selinux_file_mprotect+0x620/0x620 [ 662.313565][T15217] ? __fget+0x37f/0x550 [ 662.317747][T15217] ? ksys_dup3+0x3e0/0x3e0 [ 662.322181][T15217] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 662.328441][T15217] ? fput_many+0x12c/0x1a0 [ 662.332887][T15217] tomoyo_file_ioctl+0x23/0x30 [ 662.337675][T15217] security_file_ioctl+0x77/0xc0 [ 662.342642][T15217] ksys_ioctl+0x57/0xd0 [ 662.346825][T15217] __x64_sys_ioctl+0x73/0xb0 [ 662.351452][T15217] do_syscall_64+0xfa/0x790 [ 662.355965][T15217] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 662.355977][T15217] RIP: 0033:0x45a679 [ 662.355991][T15217] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 662.355998][T15217] RSP: 002b:00007f108e393c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 662.356010][T15217] RAX: ffffffffffffffda RBX: 00007f108e393c90 RCX: 000000000045a679 [ 662.356018][T15217] RDX: 0000000020000100 RSI: 000000004004556e RDI: 0000000000000003 [ 662.356024][T15217] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 662.356031][T15217] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f108e3946d4 [ 662.356038][T15217] R13: 00000000004c5e89 R14: 00000000004dc238 R15: 0000000000000004 13:20:17 executing program 4: setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x107, 0x12, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xc, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0xe80, 0xc0fe, &(0x7f00000000c0)="b9ff0300000d698cb89e40f086dd01000005a4004000ffa377fbac141414e9", 0x0, 0x100}, 0x28) 13:20:17 executing program 2 (fault-call:1 fault-nth:2): r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x4004556e, &(0x7f0000000100)={0x0, 0x0, {0x0, 0x0, 0x0, {}, {}, @rumble}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) [ 662.625026][T15236] FAULT_INJECTION: forcing a failure. [ 662.625026][T15236] name failslab, interval 1, probability 0, space 0, times 0 [ 662.641645][T15236] CPU: 0 PID: 15236 Comm: syz-executor.2 Not tainted 5.4.0-syzkaller #0 [ 662.650023][T15236] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 662.660100][T15236] Call Trace: [ 662.663424][T15236] dump_stack+0x197/0x210 [ 662.667796][T15236] should_fail.cold+0xa/0x15 [ 662.672441][T15236] ? fault_create_debugfs_attr+0x180/0x180 [ 662.678253][T15236] ? ___might_sleep+0x163/0x2c0 [ 662.678278][T15236] __should_failslab+0x121/0x190 [ 662.678297][T15236] should_failslab+0x9/0x14 [ 662.678317][T15236] kmem_cache_alloc_trace+0x2d3/0x790 [ 662.678331][T15236] ? tomoyo_path_number_perm+0x214/0x520 [ 662.678386][T15236] input_allocate_device+0x43/0x260 [ 662.678428][T15236] uinput_ioctl_handler.isra.0+0x627/0x1e90 [ 662.714914][T15236] ? uinput_read+0xdd0/0xdd0 [ 662.719493][T15236] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 662.725713][T15236] ? tomoyo_path_number_perm+0x25e/0x520 [ 662.731323][T15236] ? tomoyo_execute_permission+0x4a0/0x4a0 [ 662.737106][T15236] ? __f_unlock_pos+0x19/0x20 [ 662.741766][T15236] ? ___might_sleep+0x163/0x2c0 [ 662.746602][T15236] uinput_ioctl+0x4a/0x58 [ 662.750912][T15236] ? uinput_compat_ioctl+0xb0/0xb0 [ 662.756005][T15236] do_vfs_ioctl+0x977/0x14e0 [ 662.760589][T15236] ? compat_ioctl_preallocate+0x220/0x220 [ 662.766297][T15236] ? selinux_file_mprotect+0x620/0x620 [ 662.771747][T15236] ? __fget+0x37f/0x550 [ 662.775904][T15236] ? ksys_dup3+0x3e0/0x3e0 [ 662.780299][T15236] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 662.786521][T15236] ? fput_many+0x12c/0x1a0 [ 662.790954][T15236] ? tomoyo_file_ioctl+0x23/0x30 [ 662.795871][T15236] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 662.802090][T15236] ? security_file_ioctl+0x8d/0xc0 [ 662.807180][T15236] ksys_ioctl+0xab/0xd0 [ 662.811340][T15236] __x64_sys_ioctl+0x73/0xb0 [ 662.815928][T15236] do_syscall_64+0xfa/0x790 [ 662.820419][T15236] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 662.826291][T15236] RIP: 0033:0x45a679 [ 662.830350][T15236] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 662.849934][T15236] RSP: 002b:00007f108e393c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 662.858429][T15236] RAX: ffffffffffffffda RBX: 00007f108e393c90 RCX: 000000000045a679 [ 662.866405][T15236] RDX: 0000000020000100 RSI: 000000004004556e RDI: 0000000000000003 13:20:18 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) recvmmsg(r0, &(0x7f0000001d00)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}], 0x2, 0x0, 0x0) setsockopt$SO_TIMESTAMP(r0, 0x1, 0x23, &(0x7f0000000040)=0x9, 0x4) r1 = socket$inet6(0xa, 0x80003, 0x80) ioctl(r1, 0x1000008912, &(0x7f00000001c0)) 13:20:18 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setpriority(0x0, 0x0, 0x0) clone3(&(0x7f0000000340)={0x0, 0x0, &(0x7f0000000180), &(0x7f00000001c0), 0x2c, 0x0, &(0x7f0000000200)=""/54, 0x36, &(0x7f0000000240)=""/167, &(0x7f0000000300)=[0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0], 0xa}, 0x50) 13:20:18 executing program 4: setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x107, 0x12, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xc, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0xe80, 0xc0fe, &(0x7f00000000c0)="b9ff0300000d698cb89e40f086dd01000005a4004000ffa377fbac141414e9", 0x0, 0x100}, 0x28) 13:20:18 executing program 2 (fault-call:1 fault-nth:3): r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x4004556e, &(0x7f0000000100)={0x0, 0x0, {0x0, 0x0, 0x0, {}, {}, @rumble}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) [ 662.874366][T15236] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 662.882341][T15236] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f108e3946d4 [ 662.890302][T15236] R13: 00000000004c5e89 R14: 00000000004dc238 R15: 0000000000000004 13:20:18 executing program 4: setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x107, 0x12, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x12, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b70000000000000095000000000000001a3acceed2359b6a7042f95065a090e15e1b23c404f79c61776c1a82ce772b00"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0xe80, 0xc0fe, &(0x7f00000000c0)="b9ff0300000d698cb89e40f086dd01000005a4004000ffa377fbac141414e9", 0x0, 0x100}, 0x28) [ 663.003095][T15246] FAULT_INJECTION: forcing a failure. [ 663.003095][T15246] name failslab, interval 1, probability 0, space 0, times 0 [ 663.031473][T15246] CPU: 0 PID: 15246 Comm: syz-executor.2 Not tainted 5.4.0-syzkaller #0 [ 663.039995][T15246] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 663.050186][T15246] Call Trace: [ 663.053489][T15246] dump_stack+0x197/0x210 [ 663.057831][T15246] should_fail.cold+0xa/0x15 [ 663.062422][T15246] ? fault_create_debugfs_attr+0x180/0x180 [ 663.068230][T15246] ? ___might_sleep+0x163/0x2c0 [ 663.073080][T15246] __should_failslab+0x121/0x190 [ 663.078016][T15246] should_failslab+0x9/0x14 [ 663.082511][T15246] __kmalloc_track_caller+0x2dc/0x760 [ 663.087870][T15246] ? pointer+0x740/0x740 [ 663.092129][T15246] ? kvasprintf_const+0x65/0x190 [ 663.097092][T15246] kvasprintf+0xc8/0x170 [ 663.101673][T15246] ? bust_spinlocks+0xe0/0xe0 [ 663.106347][T15246] ? _raw_spin_unlock_irqrestore+0x9f/0xe0 [ 663.112156][T15246] ? __debug_object_init+0x4e6/0xee0 [ 663.117464][T15246] kvasprintf_const+0x65/0x190 [ 663.122259][T15246] kobject_set_name_vargs+0x5b/0x150 [ 663.127574][T15246] dev_set_name+0xbb/0xf0 [ 663.131902][T15246] ? device_initialize+0x540/0x540 [ 663.137007][T15246] ? lockdep_init_map+0x1be/0x6d0 [ 663.142036][T15246] ? init_timer_key+0x13b/0x3a0 [ 663.146881][T15246] ? input_allocate_device+0x1d0/0x260 [ 663.152332][T15246] input_allocate_device+0x1f2/0x260 [ 663.157612][T15246] uinput_ioctl_handler.isra.0+0x627/0x1e90 [ 663.163499][T15246] ? uinput_read+0xdd0/0xdd0 [ 663.168107][T15246] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 663.174347][T15246] ? tomoyo_path_number_perm+0x25e/0x520 [ 663.180108][T15246] ? tomoyo_execute_permission+0x4a0/0x4a0 [ 663.185929][T15246] ? ___might_sleep+0x163/0x2c0 [ 663.190788][T15246] uinput_ioctl+0x4a/0x58 [ 663.195128][T15246] ? uinput_compat_ioctl+0xb0/0xb0 [ 663.200229][T15246] do_vfs_ioctl+0x977/0x14e0 [ 663.204818][T15246] ? compat_ioctl_preallocate+0x220/0x220 [ 663.210524][T15246] ? selinux_file_mprotect+0x620/0x620 [ 663.216006][T15246] ? __fget+0x37f/0x550 [ 663.220156][T15246] ? ksys_dup3+0x3e0/0x3e0 [ 663.224563][T15246] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 663.230799][T15246] ? fput_many+0x12c/0x1a0 [ 663.235299][T15246] ? tomoyo_file_ioctl+0x23/0x30 [ 663.240224][T15246] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 663.246546][T15246] ? security_file_ioctl+0x8d/0xc0 [ 663.251652][T15246] ksys_ioctl+0xab/0xd0 [ 663.255805][T15246] __x64_sys_ioctl+0x73/0xb0 [ 663.260390][T15246] do_syscall_64+0xfa/0x790 [ 663.264890][T15246] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 663.270907][T15246] RIP: 0033:0x45a679 [ 663.274815][T15246] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 663.294417][T15246] RSP: 002b:00007f108e393c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 663.302822][T15246] RAX: ffffffffffffffda RBX: 00007f108e393c90 RCX: 000000000045a679 [ 663.310789][T15246] RDX: 0000000020000100 RSI: 000000004004556e RDI: 0000000000000003 [ 663.318751][T15246] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 663.326712][T15246] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f108e3946d4 [ 663.334693][T15246] R13: 00000000004c5e89 R14: 00000000004dc238 R15: 0000000000000004 13:20:18 executing program 2 (fault-call:1 fault-nth:4): r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x4004556e, &(0x7f0000000100)={0x0, 0x0, {0x0, 0x0, 0x0, {}, {}, @rumble}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) 13:20:18 executing program 4: setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x107, 0x12, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x12, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b70000000000000095000000000000001a3acceed2359b6a7042f95065a090e15e1b23c404f79c61776c1a82ce772b00"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0xe80, 0xc0fe, &(0x7f00000000c0)="b9ff0300000d698cb89e40f086dd01000005a4004000ffa377fbac141414e9", 0x0, 0x100}, 0x28) 13:20:18 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setpriority(0x0, 0x0, 0x0) clone3(&(0x7f0000000340)={0x0, &(0x7f0000000000), 0x0, &(0x7f00000001c0), 0x2c, 0x0, &(0x7f0000000200)=""/54, 0x36, &(0x7f0000000240)=""/167, &(0x7f0000000300)=[0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0], 0xa}, 0x50) [ 663.487680][T15257] FAULT_INJECTION: forcing a failure. [ 663.487680][T15257] name failslab, interval 1, probability 0, space 0, times 0 [ 663.543114][T15257] CPU: 0 PID: 15257 Comm: syz-executor.2 Not tainted 5.4.0-syzkaller #0 [ 663.551501][T15257] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 663.561762][T15257] Call Trace: [ 663.565080][T15257] dump_stack+0x197/0x210 [ 663.569442][T15257] should_fail.cold+0xa/0x15 [ 663.574075][T15257] ? fault_create_debugfs_attr+0x180/0x180 [ 663.579916][T15257] ? ___might_sleep+0x163/0x2c0 [ 663.584802][T15257] __should_failslab+0x121/0x190 13:20:18 executing program 4: setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x107, 0x12, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x12, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b70000000000000095000000000000001a3acceed2359b6a7042f95065a090e15e1b23c404f79c61776c1a82ce772b00"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0xe80, 0xc0fe, &(0x7f00000000c0)="b9ff0300000d698cb89e40f086dd01000005a4004000ffa377fbac141414e9", 0x0, 0x100}, 0x28) 13:20:18 executing program 4: setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x107, 0x12, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x15, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b70000000000000095000000000000001a3acceed2359b6a7042f95065a090e15e1b23c404f79c61776c1a82ce772b007e62c1012097dee8d6e2a64fa661c0e29a9aaf088552f34a"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0xe80, 0xc0fe, &(0x7f00000000c0)="b9ff0300000d698cb89e40f086dd01000005a4004000ffa377fbac141414e9", 0x0, 0x100}, 0x28) [ 663.589769][T15257] should_failslab+0x9/0x14 [ 663.594314][T15257] __kmalloc_track_caller+0x2dc/0x760 [ 663.599715][T15257] ? pointer+0x740/0x740 [ 663.603983][T15257] ? kvasprintf_const+0x65/0x190 [ 663.608939][T15257] kvasprintf+0xc8/0x170 [ 663.613233][T15257] ? bust_spinlocks+0xe0/0xe0 [ 663.617935][T15257] ? _raw_spin_unlock_irqrestore+0x9f/0xe0 [ 663.623767][T15257] ? __debug_object_init+0x4e6/0xee0 [ 663.629078][T15257] kvasprintf_const+0x65/0x190 [ 663.633904][T15257] kobject_set_name_vargs+0x5b/0x150 [ 663.639216][T15257] dev_set_name+0xbb/0xf0 13:20:18 executing program 4: setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x107, 0x12, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x15, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b70000000000000095000000000000001a3acceed2359b6a7042f95065a090e15e1b23c404f79c61776c1a82ce772b007e62c1012097dee8d6e2a64fa661c0e29a9aaf088552f34a"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0xe80, 0xc0fe, &(0x7f00000000c0)="b9ff0300000d698cb89e40f086dd01000005a4004000ffa377fbac141414e9", 0x0, 0x100}, 0x28) [ 663.643569][T15257] ? device_initialize+0x540/0x540 [ 663.648700][T15257] ? lockdep_init_map+0x1be/0x6d0 [ 663.654007][T15257] ? init_timer_key+0x13b/0x3a0 [ 663.658868][T15257] ? input_allocate_device+0x1d0/0x260 [ 663.664349][T15257] input_allocate_device+0x1f2/0x260 [ 663.669659][T15257] uinput_ioctl_handler.isra.0+0x627/0x1e90 [ 663.675581][T15257] ? uinput_read+0xdd0/0xdd0 [ 663.680201][T15257] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 663.686442][T15257] ? tomoyo_path_number_perm+0x25e/0x520 [ 663.686458][T15257] ? tomoyo_execute_permission+0x4a0/0x4a0 [ 663.686470][T15257] ? __f_unlock_pos+0x19/0x20 [ 663.686499][T15257] ? ___might_sleep+0x163/0x2c0 [ 663.702643][T15257] uinput_ioctl+0x4a/0x58 [ 663.702657][T15257] ? uinput_compat_ioctl+0xb0/0xb0 [ 663.702675][T15257] do_vfs_ioctl+0x977/0x14e0 [ 663.702694][T15257] ? compat_ioctl_preallocate+0x220/0x220 [ 663.702713][T15257] ? selinux_file_mprotect+0x620/0x620 [ 663.732715][T15257] ? __fget+0x37f/0x550 [ 663.736896][T15257] ? ksys_dup3+0x3e0/0x3e0 13:20:18 executing program 4: setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x107, 0x12, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x15, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b70000000000000095000000000000001a3acceed2359b6a7042f95065a090e15e1b23c404f79c61776c1a82ce772b007e62c1012097dee8d6e2a64fa661c0e29a9aaf088552f34a"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0xe80, 0xc0fe, &(0x7f00000000c0)="b9ff0300000d698cb89e40f086dd01000005a4004000ffa377fbac141414e9", 0x0, 0x100}, 0x28) [ 663.741332][T15257] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 663.747591][T15257] ? fput_many+0x12c/0x1a0 [ 663.752040][T15257] ? tomoyo_file_ioctl+0x23/0x30 [ 663.757001][T15257] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 663.763265][T15257] ? security_file_ioctl+0x8d/0xc0 [ 663.768408][T15257] ksys_ioctl+0xab/0xd0 [ 663.772587][T15257] __x64_sys_ioctl+0x73/0xb0 [ 663.777201][T15257] do_syscall_64+0xfa/0x790 [ 663.781731][T15257] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 663.787634][T15257] RIP: 0033:0x45a679 [ 663.791544][T15257] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 663.811165][T15257] RSP: 002b:00007f108e393c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 663.819592][T15257] RAX: ffffffffffffffda RBX: 00007f108e393c90 RCX: 000000000045a679 [ 663.827694][T15257] RDX: 0000000020000100 RSI: 000000004004556e RDI: 0000000000000003 [ 663.835674][T15257] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 663.843650][T15257] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f108e3946d4 [ 663.856143][T15257] R13: 00000000004c5e89 R14: 00000000004dc238 R15: 0000000000000004 13:20:19 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) recvmmsg(r0, &(0x7f0000001d00)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}], 0x2, 0x0, 0x0) setsockopt$SO_TIMESTAMP(r0, 0x1, 0x23, &(0x7f0000000040)=0x9, 0x4) r1 = socket$inet6(0xa, 0x80003, 0x80) ioctl(r1, 0x1000008912, &(0x7f00000001c0)) 13:20:19 executing program 4: setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x107, 0x12, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x16, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b70000000000000095000000000000001a3acceed2359b6a7042f95065a090e15e1b23c404f79c61776c1a82ce772b007e62c1012097dee8d6e2a64fa661c0e29a9aaf088552f34aeeaee7eefc55cbca11d1082f"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0xe80, 0xc0fe, &(0x7f00000000c0)="b9ff0300000d698cb89e40f086dd01000005a4004000ffa377fbac141414e9", 0x0, 0x100}, 0x28) 13:20:19 executing program 2 (fault-call:1 fault-nth:5): r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x4004556e, &(0x7f0000000100)={0x0, 0x0, {0x0, 0x0, 0x0, {}, {}, @rumble}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) 13:20:19 executing program 4: setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x107, 0x12, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x16, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b70000000000000095000000000000001a3acceed2359b6a7042f95065a090e15e1b23c404f79c61776c1a82ce772b007e62c1012097dee8d6e2a64fa661c0e29a9aaf088552f34aeeaee7eefc55cbca11d1082f"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0xe80, 0xc0fe, &(0x7f00000000c0)="b9ff0300000d698cb89e40f086dd01000005a4004000ffa377fbac141414e9", 0x0, 0x100}, 0x28) 13:20:19 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setpriority(0x0, 0x0, 0x0) clone3(&(0x7f0000000340)={0x0, &(0x7f0000000000), 0x0, &(0x7f00000001c0), 0x2c, 0x0, &(0x7f0000000200)=""/54, 0x36, &(0x7f0000000240)=""/167, &(0x7f0000000300)=[0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0], 0xa}, 0x50) 13:20:19 executing program 4: setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x107, 0x12, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x16, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b70000000000000095000000000000001a3acceed2359b6a7042f95065a090e15e1b23c404f79c61776c1a82ce772b007e62c1012097dee8d6e2a64fa661c0e29a9aaf088552f34aeeaee7eefc55cbca11d1082f"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0xe80, 0xc0fe, &(0x7f00000000c0)="b9ff0300000d698cb89e40f086dd01000005a4004000ffa377fbac141414e9", 0x0, 0x100}, 0x28) 13:20:19 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x4004556e, &(0x7f0000000100)={0x0, 0x0, {0x0, 0x0, 0x0, {}, {}, @rumble}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) 13:20:19 executing program 4: setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x107, 0x12, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x17, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b70000000000000095000000000000001a3acceed2359b6a7042f95065a090e15e1b23c404f79c61776c1a82ce772b007e62c1012097dee8d6e2a64fa661c0e29a9aaf088552f34aeeaee7eefc55cbca11d1082f44e2649eee73"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0xe80, 0xc0fe, &(0x7f00000000c0)="b9ff0300000d698cb89e40f086dd01000005a4004000ffa377fbac141414e9", 0x0, 0x100}, 0x28) 13:20:19 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x2, &(0x7f0000000100)={0x0, 0x0, {0x0, 0x0, 0x0, {}, {}, @rumble}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) 13:20:19 executing program 4: setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x107, 0x12, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x17, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b70000000000000095000000000000001a3acceed2359b6a7042f95065a090e15e1b23c404f79c61776c1a82ce772b007e62c1012097dee8d6e2a64fa661c0e29a9aaf088552f34aeeaee7eefc55cbca11d1082f44e2649eee73"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0xe80, 0xc0fe, &(0x7f00000000c0)="b9ff0300000d698cb89e40f086dd01000005a4004000ffa377fbac141414e9", 0x0, 0x100}, 0x28) 13:20:19 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x6, &(0x7f0000000100)={0x0, 0x0, {0x0, 0x0, 0x0, {}, {}, @rumble}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) 13:20:19 executing program 4: setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x107, 0x12, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x17, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b70000000000000095000000000000001a3acceed2359b6a7042f95065a090e15e1b23c404f79c61776c1a82ce772b007e62c1012097dee8d6e2a64fa661c0e29a9aaf088552f34aeeaee7eefc55cbca11d1082f44e2649eee73"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0xe80, 0xc0fe, &(0x7f00000000c0)="b9ff0300000d698cb89e40f086dd01000005a4004000ffa377fbac141414e9", 0x0, 0x100}, 0x28) 13:20:20 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) recvmmsg(r0, &(0x7f0000001d00)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}], 0x2, 0x0, 0x0) setsockopt$SO_TIMESTAMP(r0, 0x1, 0x23, &(0x7f0000000040)=0x9, 0x4) r1 = socket$inet6(0xa, 0x80003, 0x80) ioctl(r1, 0x1000008912, &(0x7f00000001c0)) 13:20:20 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setpriority(0x0, 0x0, 0x0) clone3(&(0x7f0000000340)={0x0, &(0x7f0000000000), 0x0, &(0x7f00000001c0), 0x2c, 0x0, &(0x7f0000000200)=""/54, 0x36, &(0x7f0000000240)=""/167, &(0x7f0000000300)=[0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0], 0xa}, 0x50) 13:20:20 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x10, &(0x7f0000000100)={0x0, 0x0, {0x0, 0x0, 0x0, {}, {}, @rumble}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) 13:20:20 executing program 4: setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x107, 0x12, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x17, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b70000000000000095000000000000001a3acceed2359b6a7042f95065a090e15e1b23c404f79c61776c1a82ce772b007e62c1012097dee8d6e2a64fa661c0e29a9aaf088552f34aeeaee7eefc55cbca11d1082f44e2649eee73cb488c"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0xe80, 0xc0fe, &(0x7f00000000c0)="b9ff0300000d698cb89e40f086dd01000005a4004000ffa377fbac141414e9", 0x0, 0x100}, 0x28) 13:20:20 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x3b72, &(0x7f0000000100)={0x0, 0x0, {0x0, 0x0, 0x0, {}, {}, @rumble}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) 13:20:20 executing program 4: setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x107, 0x12, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x17, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b70000000000000095000000000000001a3acceed2359b6a7042f95065a090e15e1b23c404f79c61776c1a82ce772b007e62c1012097dee8d6e2a64fa661c0e29a9aaf088552f34aeeaee7eefc55cbca11d1082f44e2649eee73cb488c"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0xe80, 0xc0fe, &(0x7f00000000c0)="b9ff0300000d698cb89e40f086dd01000005a4004000ffa377fbac141414e9", 0x0, 0x100}, 0x28) 13:20:20 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x4b45, &(0x7f0000000100)={0x0, 0x0, {0x0, 0x0, 0x0, {}, {}, @rumble}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) 13:20:20 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setpriority(0x0, 0x0, 0x0) clone3(&(0x7f0000000340)={0x0, &(0x7f0000000000), &(0x7f0000000180), 0x0, 0x2c, 0x0, &(0x7f0000000200)=""/54, 0x36, &(0x7f0000000240)=""/167, &(0x7f0000000300)=[0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0], 0xa}, 0x50) 13:20:20 executing program 4: setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x107, 0x12, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x17, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b70000000000000095000000000000001a3acceed2359b6a7042f95065a090e15e1b23c404f79c61776c1a82ce772b007e62c1012097dee8d6e2a64fa661c0e29a9aaf088552f34aeeaee7eefc55cbca11d1082f44e2649eee73cb488c"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0xe80, 0xc0fe, &(0x7f00000000c0)="b9ff0300000d698cb89e40f086dd01000005a4004000ffa377fbac141414e9", 0x0, 0x100}, 0x28) 13:20:20 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x4b47, &(0x7f0000000100)={0x0, 0x0, {0x0, 0x0, 0x0, {}, {}, @rumble}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) 13:20:20 executing program 4: setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x107, 0x12, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x17, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b70000000000000095000000000000001a3acceed2359b6a7042f95065a090e15e1b23c404f79c61776c1a82ce772b007e62c1012097dee8d6e2a64fa661c0e29a9aaf088552f34aeeaee7eefc55cbca11d1082f44e2649eee73cb488c4b"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0xe80, 0xc0fe, &(0x7f00000000c0)="b9ff0300000d698cb89e40f086dd01000005a4004000ffa377fbac141414e9", 0x0, 0x100}, 0x28) 13:20:20 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x4b49, &(0x7f0000000100)={0x0, 0x0, {0x0, 0x0, 0x0, {}, {}, @rumble}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) [ 665.484402][ C1] net_ratelimit: 6 callbacks suppressed [ 665.484411][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 665.496095][ C1] protocol 88fb is buggy, dev hsr_slave_1 13:20:20 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) recvmmsg(r0, &(0x7f0000001d00)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}], 0x2, 0x0, 0x0) setsockopt$SO_TIMESTAMP(r0, 0x1, 0x23, &(0x7f0000000040)=0x9, 0x4) r1 = socket$inet6(0xa, 0x80003, 0x80) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="0805b5055e0b") 13:20:20 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setpriority(0x0, 0x0, 0x0) clone3(&(0x7f0000000340)={0x0, &(0x7f0000000000), &(0x7f0000000180), 0x0, 0x2c, 0x0, &(0x7f0000000200)=""/54, 0x36, &(0x7f0000000240)=""/167, &(0x7f0000000300)=[0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0], 0xa}, 0x50) 13:20:20 executing program 4: setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x107, 0x12, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x17, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b70000000000000095000000000000001a3acceed2359b6a7042f95065a090e15e1b23c404f79c61776c1a82ce772b007e62c1012097dee8d6e2a64fa661c0e29a9aaf088552f34aeeaee7eefc55cbca11d1082f44e2649eee73cb488c4b"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0xe80, 0xc0fe, &(0x7f00000000c0)="b9ff0300000d698cb89e40f086dd01000005a4004000ffa377fbac141414e9", 0x0, 0x100}, 0x28) 13:20:20 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x4c01, &(0x7f0000000100)={0x0, 0x0, {0x0, 0x0, 0x0, {}, {}, @rumble}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) 13:20:21 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x541b, &(0x7f0000000100)={0x0, 0x0, {0x0, 0x0, 0x0, {}, {}, @rumble}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) 13:20:21 executing program 4: setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x107, 0x12, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x17, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b70000000000000095000000000000001a3acceed2359b6a7042f95065a090e15e1b23c404f79c61776c1a82ce772b007e62c1012097dee8d6e2a64fa661c0e29a9aaf088552f34aeeaee7eefc55cbca11d1082f44e2649eee73cb488c4b"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0xe80, 0xc0fe, &(0x7f00000000c0)="b9ff0300000d698cb89e40f086dd01000005a4004000ffa377fbac141414e9", 0x0, 0x100}, 0x28) 13:20:21 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x5421, &(0x7f0000000100)={0x0, 0x0, {0x0, 0x0, 0x0, {}, {}, @rumble}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) 13:20:21 executing program 4: setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x107, 0x12, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x17, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b70000000000000095000000000000001a3acceed2359b6a7042f95065a090e15e1b23c404f79c61776c1a82ce772b007e62c1012097dee8d6e2a64fa661c0e29a9aaf088552f34aeeaee7eefc55cbca11d1082f44e2649eee73cb488c4b4b"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0xe80, 0xc0fe, &(0x7f00000000c0)="b9ff0300000d698cb89e40f086dd01000005a4004000ffa377fbac141414e9", 0x0, 0x100}, 0x28) 13:20:21 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x5450, &(0x7f0000000100)={0x0, 0x0, {0x0, 0x0, 0x0, {}, {}, @rumble}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) 13:20:21 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setpriority(0x0, 0x0, 0x0) clone3(&(0x7f0000000340)={0x0, &(0x7f0000000000), &(0x7f0000000180), 0x0, 0x2c, 0x0, &(0x7f0000000200)=""/54, 0x36, &(0x7f0000000240)=""/167, &(0x7f0000000300)=[0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0], 0xa}, 0x50) 13:20:21 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x5451, &(0x7f0000000100)={0x0, 0x0, {0x0, 0x0, 0x0, {}, {}, @rumble}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) [ 666.124293][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 666.130201][ C0] protocol 88fb is buggy, dev hsr_slave_1 13:20:21 executing program 4: setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x107, 0x12, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x17, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b70000000000000095000000000000001a3acceed2359b6a7042f95065a090e15e1b23c404f79c61776c1a82ce772b007e62c1012097dee8d6e2a64fa661c0e29a9aaf088552f34aeeaee7eefc55cbca11d1082f44e2649eee73cb488c4b4b"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0xe80, 0xc0fe, &(0x7f00000000c0)="b9ff0300000d698cb89e40f086dd01000005a4004000ffa377fbac141414e9", 0x0, 0x100}, 0x28) 13:20:21 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) recvmmsg(r0, &(0x7f0000001d00)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}], 0x2, 0x0, 0x0) setsockopt$SO_TIMESTAMP(r0, 0x1, 0x23, &(0x7f0000000040)=0x9, 0x4) r1 = socket$inet6(0xa, 0x80003, 0x80) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="0805b5055e0b") 13:20:21 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x5452, &(0x7f0000000100)={0x0, 0x0, {0x0, 0x0, 0x0, {}, {}, @rumble}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) 13:20:21 executing program 4: setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x107, 0x12, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x17, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b70000000000000095000000000000001a3acceed2359b6a7042f95065a090e15e1b23c404f79c61776c1a82ce772b007e62c1012097dee8d6e2a64fa661c0e29a9aaf088552f34aeeaee7eefc55cbca11d1082f44e2649eee73cb488c4b4b"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0xe80, 0xc0fe, &(0x7f00000000c0)="b9ff0300000d698cb89e40f086dd01000005a4004000ffa377fbac141414e9", 0x0, 0x100}, 0x28) 13:20:21 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setpriority(0x0, 0x0, 0x0) clone3(&(0x7f0000000340)={0x0, &(0x7f0000000000), &(0x7f0000000180), &(0x7f00000001c0), 0x0, 0x0, &(0x7f0000000200)=""/54, 0x36, &(0x7f0000000240)=""/167, &(0x7f0000000300)=[0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0], 0xa}, 0x50) 13:20:21 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x5460, &(0x7f0000000100)={0x0, 0x0, {0x0, 0x0, 0x0, {}, {}, @rumble}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) 13:20:21 executing program 4: setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x107, 0x12, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x17, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b70000000000000095000000000000001a3acceed2359b6a7042f95065a090e15e1b23c404f79c61776c1a82ce772b007e62c1012097dee8d6e2a64fa661c0e29a9aaf088552f34aeeaee7eefc55cbca11d1082f44e2649eee73cb488c4b4b"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0xe80, 0xc0fe, &(0x7f00000000c0)="b9ff0300000d698cb89e40f086dd01000005a4004000ffa377fbac141414e9", 0x0, 0x100}, 0x28) 13:20:22 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) recvmmsg(r0, &(0x7f0000001d00)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}], 0x2, 0x0, 0x0) setsockopt$SO_TIMESTAMP(r0, 0x1, 0x23, &(0x7f0000000040)=0x9, 0x4) r1 = socket$inet6(0xa, 0x80003, 0x80) ioctl(r1, 0x1000008912, &(0x7f00000001c0)) 13:20:22 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) recvmmsg(r0, &(0x7f0000001d00)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}], 0x2, 0x0, 0x0) setsockopt$SO_TIMESTAMP(r0, 0x1, 0x23, &(0x7f0000000040)=0x9, 0x4) r1 = socket$inet6(0xa, 0x80003, 0x80) ioctl(r1, 0x1000008912, &(0x7f00000001c0)) 13:20:22 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setpriority(0x0, 0x0, 0x0) clone3(&(0x7f0000000340)={0x0, &(0x7f0000000000), &(0x7f0000000180), &(0x7f00000001c0), 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)=""/167, &(0x7f0000000300)=[0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0], 0xa}, 0x50) 13:20:22 executing program 4: setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x107, 0x12, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x17, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b70000000000000095000000000000001a3acceed2359b6a7042f95065a090e15e1b23c404f79c61776c1a82ce772b007e62c1012097dee8d6e2a64fa661c0e29a9aaf088552f34aeeaee7eefc55cbca11d1082f44e2649eee73cb488c4b4b"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0xe80, 0xc0fe, &(0x7f00000000c0)="b9ff0300000d698cb89e40f086dd01000005a4004000ffa377fbac141414e9", 0x0, 0x100}, 0x28) 13:20:22 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x5501, &(0x7f0000000100)={0x0, 0x0, {0x0, 0x0, 0x0, {}, {}, @rumble}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) [ 667.004281][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 667.004319][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 667.010423][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 667.016211][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 667.027760][ C0] protocol 88fb is buggy, dev hsr_slave_1 13:20:22 executing program 1: setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x107, 0x12, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x12, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b70000000000000095000000000000001a3acceed2359b6a7042f95065a090e15e1b23c404f79c61776c1a82ce772b00"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0xe80, 0xc0fe, &(0x7f00000000c0)="b9ff0300000d698cb89e40f086dd01000005a4004000ffa377fbac141414e9", 0x0, 0x100}, 0x28) 13:20:22 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) recvmmsg(r0, &(0x7f0000001d00)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}], 0x2, 0x0, 0x0) setsockopt$SO_TIMESTAMP(r0, 0x1, 0x23, &(0x7f0000000040)=0x9, 0x4) r1 = socket$inet6(0xa, 0x80003, 0x80) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="0805b5055e0b") 13:20:22 executing program 4: setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x107, 0x12, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x17, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b70000000000000095000000000000001a3acceed2359b6a7042f95065a090e15e1b23c404f79c61776c1a82ce772b007e62c1012097dee8d6e2a64fa661c0e29a9aaf088552f34aeeaee7eefc55cbca11d1082f44e2649eee73cb488c4b4b"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0xe80, 0xc0fe, &(0x7f00000000c0)="b9ff0300000d698cb89e40f086dd01000005a4004000ffa377fbac141414e9", 0x0, 0x100}, 0x28) 13:20:22 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x5502, &(0x7f0000000100)={0x0, 0x0, {0x0, 0x0, 0x0, {}, {}, @rumble}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) 13:20:22 executing program 1 (fault-call:1 fault-nth:0): r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x4004556d, &(0x7f0000000100)={0x0, 0x0, {0x0, 0x0, 0x0, {}, {}, @rumble}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) 13:20:22 executing program 4: setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x107, 0x12, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x17, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b70000000000000095000000000000001a3acceed2359b6a7042f95065a090e15e1b23c404f79c61776c1a82ce772b007e62c1012097dee8d6e2a64fa661c0e29a9aaf088552f34aeeaee7eefc55cbca11d1082f44e2649eee73cb488c4b4b"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, 0x0}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0xe80, 0xc0fe, &(0x7f00000000c0)="b9ff0300000d698cb89e40f086dd01000005a4004000ffa377fbac141414e9", 0x0, 0x100}, 0x28) 13:20:22 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setpriority(0x0, 0x0, 0x0) clone3(&(0x7f0000000340)={0x0, &(0x7f0000000000), &(0x7f0000000180), &(0x7f00000001c0), 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)=[0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0], 0xa}, 0x50) [ 667.520269][T15428] FAULT_INJECTION: forcing a failure. [ 667.520269][T15428] name failslab, interval 1, probability 0, space 0, times 0 [ 667.564315][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 667.603106][T15428] CPU: 0 PID: 15428 Comm: syz-executor.1 Not tainted 5.4.0-syzkaller #0 [ 667.611491][T15428] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 667.621562][T15428] Call Trace: [ 667.624905][T15428] dump_stack+0x197/0x210 [ 667.629264][T15428] should_fail.cold+0xa/0x15 [ 667.633899][T15428] ? fault_create_debugfs_attr+0x180/0x180 [ 667.639731][T15428] ? ___might_sleep+0x163/0x2c0 [ 667.644605][T15428] __should_failslab+0x121/0x190 [ 667.649563][T15428] should_failslab+0x9/0x14 [ 667.654106][T15428] __kmalloc+0x2e0/0x770 [ 667.658383][T15428] ? mark_held_locks+0xf0/0xf0 [ 667.663166][T15428] ? _parse_integer+0x190/0x190 [ 667.668024][T15428] ? tomoyo_realpath_from_path+0xcd/0x7b0 [ 667.673747][T15428] tomoyo_realpath_from_path+0xcd/0x7b0 [ 667.679293][T15428] ? tomoyo_path_number_perm+0x193/0x520 [ 667.684931][T15428] tomoyo_path_number_perm+0x1dd/0x520 [ 667.690396][T15428] ? tomoyo_path_number_perm+0x193/0x520 [ 667.696019][T15428] ? tomoyo_execute_permission+0x4a0/0x4a0 [ 667.701816][T15428] ? __f_unlock_pos+0x19/0x20 [ 667.706519][T15428] ? ___might_sleep+0x163/0x2c0 [ 667.711384][T15428] ? selinux_file_mprotect+0x620/0x620 [ 667.716850][T15428] ? __fget+0x37f/0x550 [ 667.721002][T15428] ? ksys_dup3+0x3e0/0x3e0 [ 667.725429][T15428] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 667.731667][T15428] ? fput_many+0x12c/0x1a0 [ 667.736094][T15428] tomoyo_file_ioctl+0x23/0x30 [ 667.740850][T15428] security_file_ioctl+0x77/0xc0 [ 667.745793][T15428] ksys_ioctl+0x57/0xd0 [ 667.749943][T15428] __x64_sys_ioctl+0x73/0xb0 [ 667.754526][T15428] do_syscall_64+0xfa/0x790 [ 667.759025][T15428] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 667.764904][T15428] RIP: 0033:0x45a679 [ 667.768789][T15428] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 667.788472][T15428] RSP: 002b:00007f6f495a6c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 667.796977][T15428] RAX: ffffffffffffffda RBX: 00007f6f495a6c90 RCX: 000000000045a679 [ 667.804955][T15428] RDX: 0000000020000100 RSI: 000000004004556d RDI: 0000000000000003 [ 667.812919][T15428] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 667.820891][T15428] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f6f495a76d4 [ 667.828852][T15428] R13: 00000000004c5e89 R14: 00000000004dc238 R15: 0000000000000004 13:20:23 executing program 3 (fault-call:1 fault-nth:0): r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x40045564, &(0x7f0000000100)={0x0, 0x0, {0x0, 0x0, 0x0, {}, {}, @rumble}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) 13:20:23 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x550b, &(0x7f0000000100)={0x0, 0x0, {0x0, 0x0, 0x0, {}, {}, @rumble}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) 13:20:23 executing program 4: setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x107, 0x12, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x17, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b70000000000000095000000000000001a3acceed2359b6a7042f95065a090e15e1b23c404f79c61776c1a82ce772b007e62c1012097dee8d6e2a64fa661c0e29a9aaf088552f34aeeaee7eefc55cbca11d1082f44e2649eee73cb488c4b4b"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, 0x0}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0xe80, 0xc0fe, &(0x7f00000000c0)="b9ff0300000d698cb89e40f086dd01000005a4004000ffa377fbac141414e9", 0x0, 0x100}, 0x28) [ 668.073257][T15442] FAULT_INJECTION: forcing a failure. [ 668.073257][T15442] name failslab, interval 1, probability 0, space 0, times 0 [ 668.092184][T15442] CPU: 1 PID: 15442 Comm: syz-executor.3 Not tainted 5.4.0-syzkaller #0 [ 668.100666][T15442] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 668.110755][T15442] Call Trace: [ 668.114078][T15442] dump_stack+0x197/0x210 [ 668.118451][T15442] should_fail.cold+0xa/0x15 [ 668.123115][T15442] ? fault_create_debugfs_attr+0x180/0x180 [ 668.128968][T15442] ? ___might_sleep+0x163/0x2c0 [ 668.133875][T15442] __should_failslab+0x121/0x190 [ 668.138870][T15442] should_failslab+0x9/0x14 [ 668.143410][T15442] __kmalloc+0x2e0/0x770 [ 668.147676][T15442] ? mark_held_locks+0xf0/0xf0 [ 668.152477][T15442] ? tomoyo_realpath_from_path+0xcd/0x7b0 [ 668.158238][T15442] tomoyo_realpath_from_path+0xcd/0x7b0 [ 668.163866][T15442] ? tomoyo_path_number_perm+0x193/0x520 [ 668.169539][T15442] tomoyo_path_number_perm+0x1dd/0x520 [ 668.175029][T15442] ? tomoyo_path_number_perm+0x193/0x520 [ 668.180690][T15442] ? tomoyo_execute_permission+0x4a0/0x4a0 [ 668.186527][T15442] ? perf_trace_lock_acquire+0xf5/0x530 [ 668.192094][T15442] ? native_iret+0x7/0x7 [ 668.196606][T15442] ? ___might_sleep+0x163/0x2c0 [ 668.201520][T15442] ? selinux_file_mprotect+0x620/0x620 [ 668.207008][T15442] ? __fget+0x37f/0x550 [ 668.211201][T15442] ? ksys_dup3+0x3e0/0x3e0 [ 668.215644][T15442] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 668.221919][T15442] ? fput_many+0x12c/0x1a0 [ 668.226375][T15442] tomoyo_file_ioctl+0x23/0x30 [ 668.231331][T15442] security_file_ioctl+0x77/0xc0 [ 668.231355][T15442] ksys_ioctl+0x57/0xd0 [ 668.231383][T15442] __x64_sys_ioctl+0x73/0xb0 [ 668.245089][T15442] do_syscall_64+0xfa/0x790 [ 668.249634][T15442] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 668.255558][T15442] RIP: 0033:0x45a679 13:20:23 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x6364, &(0x7f0000000100)={0x0, 0x0, {0x0, 0x0, 0x0, {}, {}, @rumble}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) 13:20:23 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) recvmmsg(r0, &(0x7f0000001d00)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}], 0x2, 0x0, 0x0) setsockopt$SO_TIMESTAMP(r0, 0x1, 0x23, &(0x7f0000000040)=0x9, 0x4) r1 = socket$inet6(0xa, 0x80003, 0x80) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe847") [ 668.259480][T15442] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 668.279364][T15442] RSP: 002b:00007f4da986dc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 668.279382][T15442] RAX: ffffffffffffffda RBX: 00007f4da986dc90 RCX: 000000000045a679 [ 668.279392][T15442] RDX: 0000000020000100 RSI: 0000000040045564 RDI: 0000000000000003 [ 668.279402][T15442] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 668.279411][T15442] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f4da986e6d4 13:20:23 executing program 4: setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x107, 0x12, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x17, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b70000000000000095000000000000001a3acceed2359b6a7042f95065a090e15e1b23c404f79c61776c1a82ce772b007e62c1012097dee8d6e2a64fa661c0e29a9aaf088552f34aeeaee7eefc55cbca11d1082f44e2649eee73cb488c4b4b"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, 0x0}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0xe80, 0xc0fe, &(0x7f00000000c0)="b9ff0300000d698cb89e40f086dd01000005a4004000ffa377fbac141414e9", 0x0, 0x100}, 0x28) [ 668.279420][T15442] R13: 00000000004c5e89 R14: 00000000004dc238 R15: 0000000000000004 [ 668.329827][T15428] ERROR: Out of memory at tomoyo_realpath_from_path. 13:20:23 executing program 4: setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x107, 0x12, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b70000000000000095000000000000001a3acceed2359b6a7042f95065a090e15e1b23c404f79c61776c1a82ce772b007e62c1012097dee8d6e2a64fa661c0e29a9aaf088552f34aeeaee7eefc55cbca11d1082f44e2649eee73cb488c4b4b"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) [ 668.454978][T15442] ERROR: Out of memory at tomoyo_realpath_from_path. 13:20:23 executing program 3 (fault-call:1 fault-nth:1): r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x40045564, &(0x7f0000000100)={0x0, 0x0, {0x0, 0x0, 0x0, {}, {}, @rumble}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) 13:20:23 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x8901, &(0x7f0000000100)={0x0, 0x0, {0x0, 0x0, 0x0, {}, {}, @rumble}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) 13:20:23 executing program 1 (fault-call:1 fault-nth:1): r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x4004556d, &(0x7f0000000100)={0x0, 0x0, {0x0, 0x0, 0x0, {}, {}, @rumble}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) 13:20:23 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setpriority(0x0, 0x0, 0x0) clone3(&(0x7f0000000340)={0x0, &(0x7f0000000000), &(0x7f0000000180), &(0x7f00000001c0), 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)=[0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0], 0xa}, 0x50) [ 668.672967][T15502] FAULT_INJECTION: forcing a failure. [ 668.672967][T15502] name failslab, interval 1, probability 0, space 0, times 0 [ 668.725195][T15502] CPU: 0 PID: 15502 Comm: syz-executor.3 Not tainted 5.4.0-syzkaller #0 [ 668.733588][T15502] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 668.743656][T15502] Call Trace: [ 668.746965][T15502] dump_stack+0x197/0x210 [ 668.751329][T15502] should_fail.cold+0xa/0x15 [ 668.755950][T15502] ? fault_create_debugfs_attr+0x180/0x180 [ 668.761930][T15502] ? ___might_sleep+0x163/0x2c0 [ 668.764126][T15524] FAULT_INJECTION: forcing a failure. [ 668.764126][T15524] name failslab, interval 1, probability 0, space 0, times 0 [ 668.766799][T15502] __should_failslab+0x121/0x190 [ 668.766818][T15502] should_failslab+0x9/0x14 [ 668.766833][T15502] __kmalloc+0x2e0/0x770 [ 668.766849][T15502] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 668.766863][T15502] ? d_absolute_path+0x11b/0x170 [ 668.766876][T15502] ? __d_path+0x140/0x140 [ 668.766892][T15502] ? tomoyo_encode2.part.0+0xf5/0x400 [ 668.766910][T15502] tomoyo_encode2.part.0+0xf5/0x400 [ 668.766933][T15502] tomoyo_encode+0x2b/0x50 [ 668.823650][T15502] tomoyo_realpath_from_path+0x1d3/0x7b0 [ 668.829305][T15502] tomoyo_path_number_perm+0x1dd/0x520 [ 668.834779][T15502] ? tomoyo_path_number_perm+0x193/0x520 [ 668.840420][T15502] ? tomoyo_execute_permission+0x4a0/0x4a0 [ 668.846251][T15502] ? __f_unlock_pos+0x19/0x20 [ 668.850950][T15502] ? ___might_sleep+0x163/0x2c0 [ 668.855826][T15502] ? selinux_file_mprotect+0x620/0x620 [ 668.861287][T15502] ? __fget+0x37f/0x550 [ 668.865447][T15502] ? ksys_dup3+0x3e0/0x3e0 [ 668.865463][T15502] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 668.865478][T15502] ? fput_many+0x12c/0x1a0 [ 668.865499][T15502] tomoyo_file_ioctl+0x23/0x30 [ 668.865517][T15502] security_file_ioctl+0x77/0xc0 [ 668.865532][T15502] ksys_ioctl+0x57/0xd0 [ 668.865552][T15502] __x64_sys_ioctl+0x73/0xb0 [ 668.899161][T15502] do_syscall_64+0xfa/0x790 [ 668.903786][T15502] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 668.909685][T15502] RIP: 0033:0x45a679 [ 668.913595][T15502] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 668.933201][T15502] RSP: 002b:00007f4da986dc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 668.941645][T15502] RAX: ffffffffffffffda RBX: 00007f4da986dc90 RCX: 000000000045a679 [ 668.949624][T15502] RDX: 0000000020000100 RSI: 0000000040045564 RDI: 0000000000000003 [ 668.957607][T15502] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 668.965603][T15502] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f4da986e6d4 13:20:24 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x8907, &(0x7f0000000100)={0x0, 0x0, {0x0, 0x0, 0x0, {}, {}, @rumble}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) [ 668.973668][T15502] R13: 00000000004c5e89 R14: 00000000004dc238 R15: 0000000000000004 [ 668.989543][T15524] CPU: 0 PID: 15524 Comm: syz-executor.1 Not tainted 5.4.0-syzkaller #0 [ 668.997938][T15524] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 669.008026][T15524] Call Trace: [ 669.011341][T15524] dump_stack+0x197/0x210 [ 669.015692][T15524] should_fail.cold+0xa/0x15 [ 669.020305][T15524] ? fault_create_debugfs_attr+0x180/0x180 [ 669.026130][T15524] ? ___might_sleep+0x163/0x2c0 [ 669.030979][T15524] __should_failslab+0x121/0x190 [ 669.035940][T15524] should_failslab+0x9/0x14 [ 669.040439][T15524] __kmalloc+0x2e0/0x770 [ 669.044680][T15524] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 669.051038][T15524] ? d_absolute_path+0x11b/0x170 [ 669.056058][T15524] ? __d_path+0x140/0x140 [ 669.060387][T15524] ? tomoyo_encode2.part.0+0xf5/0x400 [ 669.065760][T15524] tomoyo_encode2.part.0+0xf5/0x400 [ 669.070964][T15524] tomoyo_encode+0x2b/0x50 [ 669.075376][T15524] tomoyo_realpath_from_path+0x1d3/0x7b0 [ 669.081025][T15524] tomoyo_path_number_perm+0x1dd/0x520 [ 669.086480][T15524] ? tomoyo_path_number_perm+0x193/0x520 [ 669.092372][T15524] ? tomoyo_execute_permission+0x4a0/0x4a0 [ 669.098187][T15524] ? __f_unlock_pos+0x19/0x20 [ 669.102871][T15524] ? ___might_sleep+0x163/0x2c0 [ 669.107734][T15524] ? selinux_file_mprotect+0x620/0x620 [ 669.113519][T15524] ? __fget+0x37f/0x550 [ 669.117689][T15524] ? ksys_dup3+0x3e0/0x3e0 [ 669.122108][T15524] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 669.128350][T15524] ? fput_many+0x12c/0x1a0 [ 669.132772][T15524] tomoyo_file_ioctl+0x23/0x30 [ 669.137536][T15524] security_file_ioctl+0x77/0xc0 [ 669.142641][T15524] ksys_ioctl+0x57/0xd0 [ 669.146798][T15524] __x64_sys_ioctl+0x73/0xb0 [ 669.151472][T15524] do_syscall_64+0xfa/0x790 [ 669.155980][T15524] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 669.161962][T15524] RIP: 0033:0x45a679 [ 669.165892][T15524] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 669.185751][T15524] RSP: 002b:00007f6f495a6c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 669.194280][T15524] RAX: ffffffffffffffda RBX: 00007f6f495a6c90 RCX: 000000000045a679 [ 669.202854][T15524] RDX: 0000000020000100 RSI: 000000004004556d RDI: 0000000000000003 [ 669.211165][T15524] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 669.219132][T15524] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f6f495a76d4 [ 669.227097][T15524] R13: 00000000004c5e89 R14: 00000000004dc238 R15: 0000000000000004 13:20:24 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) recvmmsg(r0, &(0x7f0000001d00)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}], 0x2, 0x0, 0x0) setsockopt$SO_TIMESTAMP(r0, 0x1, 0x23, &(0x7f0000000040)=0x9, 0x4) r1 = socket$inet6(0xa, 0x80003, 0x80) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe847") [ 669.280638][T15524] ERROR: Out of memory at tomoyo_realpath_from_path. 13:20:24 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x8912, &(0x7f0000000100)={0x0, 0x0, {0x0, 0x0, 0x0, {}, {}, @rumble}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) [ 669.334744][T15502] ERROR: Out of memory at tomoyo_realpath_from_path. 13:20:24 executing program 1 (fault-call:1 fault-nth:2): r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x4004556d, &(0x7f0000000100)={0x0, 0x0, {0x0, 0x0, 0x0, {}, {}, @rumble}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) 13:20:24 executing program 3 (fault-call:1 fault-nth:2): r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x40045564, &(0x7f0000000100)={0x0, 0x0, {0x0, 0x0, 0x0, {}, {}, @rumble}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) 13:20:24 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setpriority(0x0, 0x0, 0x0) clone3(&(0x7f0000000340)={0x0, &(0x7f0000000000), &(0x7f0000000180), &(0x7f00000001c0), 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) 13:20:24 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x8933, &(0x7f0000000100)={0x0, 0x0, {0x0, 0x0, 0x0, {}, {}, @rumble}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) [ 669.578936][T15584] FAULT_INJECTION: forcing a failure. [ 669.578936][T15584] name failslab, interval 1, probability 0, space 0, times 0 [ 669.604314][T15585] FAULT_INJECTION: forcing a failure. [ 669.604314][T15585] name failslab, interval 1, probability 0, space 0, times 0 [ 669.651051][T15584] CPU: 0 PID: 15584 Comm: syz-executor.3 Not tainted 5.4.0-syzkaller #0 [ 669.660030][T15584] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 669.670118][T15584] Call Trace: [ 669.673429][T15584] dump_stack+0x197/0x210 [ 669.677773][T15584] should_fail.cold+0xa/0x15 [ 669.682373][T15584] ? fault_create_debugfs_attr+0x180/0x180 [ 669.688205][T15584] ? ___might_sleep+0x163/0x2c0 [ 669.693058][T15584] __should_failslab+0x121/0x190 [ 669.697997][T15584] should_failslab+0x9/0x14 [ 669.702494][T15584] __kmalloc+0x2e0/0x770 [ 669.706727][T15584] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 669.712969][T15584] ? d_absolute_path+0x11b/0x170 [ 669.717905][T15584] ? __d_path+0x140/0x140 [ 669.722225][T15584] ? tomoyo_encode2.part.0+0xf5/0x400 [ 669.727593][T15584] tomoyo_encode2.part.0+0xf5/0x400 [ 669.732960][T15584] tomoyo_encode+0x2b/0x50 [ 669.737367][T15584] tomoyo_realpath_from_path+0x1d3/0x7b0 [ 669.743005][T15584] tomoyo_path_number_perm+0x1dd/0x520 [ 669.748456][T15584] ? tomoyo_path_number_perm+0x193/0x520 [ 669.755037][T15584] ? tomoyo_execute_permission+0x4a0/0x4a0 [ 669.760830][T15584] ? __f_unlock_pos+0x19/0x20 [ 669.765519][T15584] ? ___might_sleep+0x163/0x2c0 [ 669.770384][T15584] ? selinux_file_mprotect+0x620/0x620 [ 669.775828][T15584] ? __fget+0x37f/0x550 [ 669.779992][T15584] ? ksys_dup3+0x3e0/0x3e0 [ 669.784436][T15584] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 669.790670][T15584] ? fput_many+0x12c/0x1a0 [ 669.795084][T15584] tomoyo_file_ioctl+0x23/0x30 [ 669.799841][T15584] security_file_ioctl+0x77/0xc0 [ 669.804770][T15584] ksys_ioctl+0x57/0xd0 [ 669.808931][T15584] __x64_sys_ioctl+0x73/0xb0 [ 669.813514][T15584] do_syscall_64+0xfa/0x790 [ 669.818014][T15584] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 669.823982][T15584] RIP: 0033:0x45a679 [ 669.827867][T15584] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 669.847542][T15584] RSP: 002b:00007f4da986dc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 669.856896][T15584] RAX: ffffffffffffffda RBX: 00007f4da986dc90 RCX: 000000000045a679 [ 669.864885][T15584] RDX: 0000000020000100 RSI: 0000000040045564 RDI: 0000000000000003 [ 669.872861][T15584] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 669.880820][T15584] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f4da986e6d4 [ 669.888781][T15584] R13: 00000000004c5e89 R14: 00000000004dc238 R15: 0000000000000004 [ 669.911014][T15585] CPU: 0 PID: 15585 Comm: syz-executor.1 Not tainted 5.4.0-syzkaller #0 [ 669.919397][T15585] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 669.929491][T15585] Call Trace: [ 669.932811][T15585] dump_stack+0x197/0x210 [ 669.937173][T15585] should_fail.cold+0xa/0x15 [ 669.942010][T15585] ? fault_create_debugfs_attr+0x180/0x180 [ 669.947857][T15585] ? ___might_sleep+0x163/0x2c0 [ 669.952759][T15585] __should_failslab+0x121/0x190 [ 669.957727][T15585] should_failslab+0x9/0x14 [ 669.962248][T15585] __kmalloc+0x2e0/0x770 [ 669.966506][T15585] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 669.972762][T15585] ? d_absolute_path+0x11b/0x170 [ 669.977714][T15585] ? __d_path+0x140/0x140 [ 669.982053][T15585] ? tomoyo_encode2.part.0+0xf5/0x400 [ 669.987441][T15585] tomoyo_encode2.part.0+0xf5/0x400 [ 669.992659][T15585] tomoyo_encode+0x2b/0x50 [ 669.997104][T15585] tomoyo_realpath_from_path+0x1d3/0x7b0 [ 670.002761][T15585] tomoyo_path_number_perm+0x1dd/0x520 [ 670.008237][T15585] ? tomoyo_path_number_perm+0x193/0x520 [ 670.013889][T15585] ? tomoyo_execute_permission+0x4a0/0x4a0 [ 670.019719][T15585] ? __f_unlock_pos+0x19/0x20 [ 670.024431][T15585] ? ___might_sleep+0x163/0x2c0 [ 670.029324][T15585] ? selinux_file_mprotect+0x620/0x620 [ 670.034789][T15585] ? __fget+0x37f/0x550 [ 670.038968][T15585] ? ksys_dup3+0x3e0/0x3e0 [ 670.043407][T15585] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 670.049683][T15585] ? fput_many+0x12c/0x1a0 [ 670.054144][T15585] tomoyo_file_ioctl+0x23/0x30 [ 670.058940][T15585] security_file_ioctl+0x77/0xc0 [ 670.063904][T15585] ksys_ioctl+0x57/0xd0 [ 670.068065][T15585] __x64_sys_ioctl+0x73/0xb0 [ 670.072652][T15585] do_syscall_64+0xfa/0x790 [ 670.077154][T15585] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 670.083033][T15585] RIP: 0033:0x45a679 [ 670.086923][T15585] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 670.106612][T15585] RSP: 002b:00007f6f495a6c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 670.115016][T15585] RAX: ffffffffffffffda RBX: 00007f6f495a6c90 RCX: 000000000045a679 [ 670.122978][T15585] RDX: 0000000020000100 RSI: 000000004004556d RDI: 0000000000000003 [ 670.130962][T15585] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 670.138929][T15585] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f6f495a76d4 [ 670.146901][T15585] R13: 00000000004c5e89 R14: 00000000004dc238 R15: 0000000000000004 13:20:25 executing program 4: setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x107, 0x12, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b70000000000000095000000000000001a3acceed2359b6a7042f95065a090e15e1b23c404f79c61776c1a82ce772b007e62c1012097dee8d6e2a64fa661c0e29a9aaf088552f34aeeaee7eefc55cbca11d1082f44e2649eee73cb488c4b4b"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) [ 670.156493][T15584] ERROR: Out of memory at tomoyo_realpath_from_path. 13:20:25 executing program 3 (fault-call:1 fault-nth:3): r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x40045564, &(0x7f0000000100)={0x0, 0x0, {0x0, 0x0, 0x0, {}, {}, @rumble}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) [ 670.284546][T15585] ERROR: Out of memory at tomoyo_realpath_from_path. 13:20:25 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) recvmmsg(r0, &(0x7f0000001d00)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}], 0x2, 0x0, 0x0) setsockopt$SO_TIMESTAMP(r0, 0x1, 0x23, &(0x7f0000000040)=0x9, 0x4) r1 = socket$inet6(0xa, 0x80003, 0x80) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe847") 13:20:25 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x894b, &(0x7f0000000100)={0x0, 0x0, {0x0, 0x0, 0x0, {}, {}, @rumble}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) 13:20:25 executing program 4: setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x107, 0x12, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b70000000000000095000000000000001a3acceed2359b6a7042f95065a090e15e1b23c404f79c61776c1a82ce772b007e62c1012097dee8d6e2a64fa661c0e29a9aaf088552f34aeeaee7eefc55cbca11d1082f44e2649eee73cb488c4b4b"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) 13:20:25 executing program 1 (fault-call:1 fault-nth:3): r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x4004556d, &(0x7f0000000100)={0x0, 0x0, {0x0, 0x0, 0x0, {}, {}, @rumble}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) [ 670.442258][T15700] FAULT_INJECTION: forcing a failure. [ 670.442258][T15700] name failslab, interval 1, probability 0, space 0, times 0 [ 670.494407][T15700] CPU: 0 PID: 15700 Comm: syz-executor.3 Not tainted 5.4.0-syzkaller #0 [ 670.502807][T15700] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 670.513066][T15700] Call Trace: [ 670.516383][T15700] dump_stack+0x197/0x210 [ 670.520743][T15700] should_fail.cold+0xa/0x15 [ 670.525362][T15700] ? fault_create_debugfs_attr+0x180/0x180 [ 670.531206][T15700] ? ___might_sleep+0x163/0x2c0 [ 670.536442][T15700] __should_failslab+0x121/0x190 [ 670.541414][T15700] should_failslab+0x9/0x14 [ 670.544891][T15706] FAULT_INJECTION: forcing a failure. [ 670.544891][T15706] name failslab, interval 1, probability 0, space 0, times 0 [ 670.545936][T15700] kmem_cache_alloc_trace+0x2d3/0x790 [ 670.545953][T15700] ? tomoyo_path_number_perm+0x214/0x520 [ 670.545975][T15700] input_allocate_device+0x43/0x260 [ 670.545997][T15700] uinput_ioctl_handler.isra.0+0x627/0x1e90 [ 670.581114][T15700] ? uinput_read+0xdd0/0xdd0 [ 670.586483][T15700] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 670.586497][T15700] ? tomoyo_path_number_perm+0x25e/0x520 [ 670.586512][T15700] ? tomoyo_execute_permission+0x4a0/0x4a0 [ 670.586526][T15700] ? __f_unlock_pos+0x19/0x20 [ 670.586548][T15700] ? ___might_sleep+0x163/0x2c0 [ 670.586572][T15700] uinput_ioctl+0x4a/0x58 [ 670.618414][T15700] ? uinput_compat_ioctl+0xb0/0xb0 [ 670.623530][T15700] do_vfs_ioctl+0x977/0x14e0 [ 670.628662][T15700] ? compat_ioctl_preallocate+0x220/0x220 [ 670.634395][T15700] ? selinux_file_mprotect+0x620/0x620 [ 670.639876][T15700] ? __fget+0x37f/0x550 [ 670.644033][T15700] ? ksys_dup3+0x3e0/0x3e0 [ 670.648464][T15700] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 670.654897][T15700] ? fput_many+0x12c/0x1a0 [ 670.659343][T15700] ? tomoyo_file_ioctl+0x23/0x30 [ 670.664301][T15700] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 670.670562][T15700] ? security_file_ioctl+0x8d/0xc0 [ 670.675691][T15700] ksys_ioctl+0xab/0xd0 [ 670.679870][T15700] __x64_sys_ioctl+0x73/0xb0 [ 670.679891][T15700] do_syscall_64+0xfa/0x790 [ 670.679915][T15700] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 670.694923][T15700] RIP: 0033:0x45a679 [ 670.698825][T15700] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 670.718512][T15700] RSP: 002b:00007f4da986dc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 670.718528][T15700] RAX: ffffffffffffffda RBX: 00007f4da986dc90 RCX: 000000000045a679 [ 670.718537][T15700] RDX: 0000000020000100 RSI: 0000000040045564 RDI: 0000000000000003 13:20:25 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setpriority(0x0, 0x0, 0x0) clone3(&(0x7f0000000340)={0x0, &(0x7f0000000000), &(0x7f0000000180), &(0x7f00000001c0), 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) [ 670.718546][T15700] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 670.718561][T15700] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f4da986e6d4 [ 670.759204][T15700] R13: 00000000004c5e89 R14: 00000000004dc238 R15: 0000000000000004 [ 670.767596][T15706] CPU: 1 PID: 15706 Comm: syz-executor.1 Not tainted 5.4.0-syzkaller #0 [ 670.775948][T15706] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 670.786110][T15706] Call Trace: [ 670.789589][T15706] dump_stack+0x197/0x210 [ 670.794133][T15706] should_fail.cold+0xa/0x15 [ 670.798734][T15706] ? fault_create_debugfs_attr+0x180/0x180 [ 670.804555][T15706] ? ___might_sleep+0x163/0x2c0 [ 670.809499][T15706] __should_failslab+0x121/0x190 [ 670.814439][T15706] should_failslab+0x9/0x14 [ 670.818960][T15706] kmem_cache_alloc_trace+0x2d3/0x790 [ 670.824337][T15706] ? tomoyo_path_number_perm+0x214/0x520 [ 670.829978][T15706] input_allocate_device+0x43/0x260 [ 670.835365][T15706] uinput_ioctl_handler.isra.0+0x627/0x1e90 [ 670.841259][T15706] ? uinput_read+0xdd0/0xdd0 [ 670.845850][T15706] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 670.852110][T15706] ? tomoyo_path_number_perm+0x25e/0x520 [ 670.857826][T15706] ? tomoyo_execute_permission+0x4a0/0x4a0 [ 670.863631][T15706] ? __f_unlock_pos+0x19/0x20 [ 670.868315][T15706] ? ___might_sleep+0x163/0x2c0 [ 670.873168][T15706] uinput_ioctl+0x4a/0x58 [ 670.877490][T15706] ? uinput_compat_ioctl+0xb0/0xb0 [ 670.882600][T15706] do_vfs_ioctl+0x977/0x14e0 [ 670.887190][T15706] ? compat_ioctl_preallocate+0x220/0x220 [ 670.892904][T15706] ? selinux_file_mprotect+0x620/0x620 [ 670.898354][T15706] ? __fget+0x37f/0x550 [ 670.903471][T15706] ? ksys_dup3+0x3e0/0x3e0 [ 670.907886][T15706] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 670.914118][T15706] ? fput_many+0x12c/0x1a0 [ 670.918539][T15706] ? tomoyo_file_ioctl+0x23/0x30 [ 670.923471][T15706] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 670.929723][T15706] ? security_file_ioctl+0x8d/0xc0 [ 670.934831][T15706] ksys_ioctl+0xab/0xd0 [ 670.938994][T15706] __x64_sys_ioctl+0x73/0xb0 [ 670.943587][T15706] do_syscall_64+0xfa/0x790 [ 670.948094][T15706] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 670.953984][T15706] RIP: 0033:0x45a679 [ 670.957878][T15706] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 670.977574][T15706] RSP: 002b:00007f6f495a6c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 670.986154][T15706] RAX: ffffffffffffffda RBX: 00007f6f495a6c90 RCX: 000000000045a679 [ 670.994140][T15706] RDX: 0000000020000100 RSI: 000000004004556d RDI: 0000000000000003 [ 671.002105][T15706] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 671.010074][T15706] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f6f495a76d4 [ 671.018037][T15706] R13: 00000000004c5e89 R14: 00000000004dc238 R15: 0000000000000004 13:20:26 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x89f1, &(0x7f0000000100)={0x0, 0x0, {0x0, 0x0, 0x0, {}, {}, @rumble}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) 13:20:26 executing program 3 (fault-call:1 fault-nth:4): r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x40045564, &(0x7f0000000100)={0x0, 0x0, {0x0, 0x0, 0x0, {}, {}, @rumble}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) 13:20:26 executing program 1 (fault-call:1 fault-nth:4): r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x4004556d, &(0x7f0000000100)={0x0, 0x0, {0x0, 0x0, 0x0, {}, {}, @rumble}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) 13:20:26 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setpriority(0x0, 0x0, 0x0) clone3(&(0x7f0000000340)={0x0, &(0x7f0000000000), &(0x7f0000000180), &(0x7f00000001c0), 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) 13:20:26 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0xae01, &(0x7f0000000100)={0x0, 0x0, {0x0, 0x0, 0x0, {}, {}, @rumble}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) [ 671.164290][ C1] net_ratelimit: 11 callbacks suppressed [ 671.164299][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 671.176097][ C1] protocol 88fb is buggy, dev hsr_slave_1 13:20:26 executing program 4: setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x107, 0x12, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b70000000000000095000000000000001a3acceed2359b6a7042f95065a090e15e1b23c404f79c61776c1a82ce772b007e62c1012097dee8d6e2a64fa661c0e29a9aaf088552f34aeeaee7eefc55cbca11d1082f44e2649eee73cb488c4b4b"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={0xffffffffffffffff, 0x18000000000002a0, 0xe80, 0xc0fe, &(0x7f00000000c0)="b9ff0300000d698cb89e40f086dd01000005a4004000ffa377fbac141414e9", 0x0, 0x100}, 0x28) 13:20:26 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x40045564, &(0x7f0000000100)={0x0, 0x0, {0x0, 0x0, 0x0, {}, {}, @rumble}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) 13:20:26 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) recvmmsg(r0, &(0x7f0000001d00)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}], 0x2, 0x0, 0x0) setsockopt$SO_TIMESTAMP(r0, 0x1, 0x23, &(0x7f0000000040)=0x9, 0x4) r1 = socket$inet6(0xa, 0x80003, 0x80) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe84740") 13:20:26 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x4004556d, &(0x7f0000000100)={0x0, 0x0, {0x0, 0x0, 0x0, {}, {}, @rumble}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) 13:20:26 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x400454ca, &(0x7f0000000100)={0x0, 0x0, {0x0, 0x0, 0x0, {}, {}, @rumble}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) 13:20:26 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x2, &(0x7f0000000100)={0x0, 0x0, {0x0, 0x0, 0x0, {}, {}, @rumble}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) 13:20:26 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setpriority(0x0, 0x0, 0x0) clone3(&(0x7f0000000340)={0x0, &(0x7f0000000000), &(0x7f0000000180), &(0x7f00000001c0), 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)=[0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff], 0x9}, 0x50) 13:20:26 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x2, &(0x7f0000000100)={0x0, 0x0, {0x0, 0x0, 0x0, {}, {}, @rumble}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) 13:20:26 executing program 4: setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x107, 0x12, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b70000000000000095000000000000001a3acceed2359b6a7042f95065a090e15e1b23c404f79c61776c1a82ce772b007e62c1012097dee8d6e2a64fa661c0e29a9aaf088552f34aeeaee7eefc55cbca11d1082f44e2649eee73cb488c4b4b"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={0xffffffffffffffff, 0x18000000000002a0, 0xe80, 0xc0fe, &(0x7f00000000c0)="b9ff0300000d698cb89e40f086dd01000005a4004000ffa377fbac141414e9", 0x0, 0x100}, 0x28) [ 671.724302][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 671.730165][ C1] protocol 88fb is buggy, dev hsr_slave_1 13:20:26 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x40045525, &(0x7f0000000100)={0x0, 0x0, {0x0, 0x0, 0x0, {}, {}, @rumble}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) 13:20:27 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x10, &(0x7f0000000100)={0x0, 0x0, {0x0, 0x0, 0x0, {}, {}, @rumble}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) 13:20:27 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setpriority(0x0, 0x0, 0x0) clone3(&(0x7f0000000340)={0x0, &(0x7f0000000000), &(0x7f0000000180), &(0x7f00000001c0), 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)=[0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff], 0x9}, 0x50) 13:20:27 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x5, &(0x7f0000000100)={0x0, 0x0, {0x0, 0x0, 0x0, {}, {}, @rumble}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) 13:20:27 executing program 4: setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x107, 0x12, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b70000000000000095000000000000001a3acceed2359b6a7042f95065a090e15e1b23c404f79c61776c1a82ce772b007e62c1012097dee8d6e2a64fa661c0e29a9aaf088552f34aeeaee7eefc55cbca11d1082f44e2649eee73cb488c4b4b"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={0xffffffffffffffff, 0x18000000000002a0, 0xe80, 0xc0fe, &(0x7f00000000c0)="b9ff0300000d698cb89e40f086dd01000005a4004000ffa377fbac141414e9", 0x0, 0x100}, 0x28) 13:20:27 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) recvmmsg(r0, &(0x7f0000001d00)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}], 0x2, 0x0, 0x0) setsockopt$SO_TIMESTAMP(r0, 0x1, 0x23, &(0x7f0000000040)=0x9, 0x4) r1 = socket$inet6(0xa, 0x80003, 0x80) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe84740") 13:20:27 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x4004555c, &(0x7f0000000100)={0x0, 0x0, {0x0, 0x0, 0x0, {}, {}, @rumble}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) 13:20:27 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x4b47, &(0x7f0000000100)={0x0, 0x0, {0x0, 0x0, 0x0, {}, {}, @rumble}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) 13:20:27 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x10, &(0x7f0000000100)={0x0, 0x0, {0x0, 0x0, 0x0, {}, {}, @rumble}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) 13:20:27 executing program 4: setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x107, 0x12, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b70000000000000095000000000000001a3acceed2359b6a7042f95065a090e15e1b23c404f79c61776c1a82ce772b007e62c1012097dee8d6e2a64fa661c0e29a9aaf088552f34aeeaee7eefc55cbca11d1082f44e2649eee73cb488c4b4b"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x0, 0x0, 0x0, 0x0, 0x100}, 0x40) 13:20:27 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setpriority(0x0, 0x0, 0x0) clone3(&(0x7f0000000340)={0x0, &(0x7f0000000000), &(0x7f0000000180), &(0x7f00000001c0), 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)=[0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff], 0x9}, 0x50) 13:20:27 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x40045564, &(0x7f0000000100)={0x0, 0x0, {0x0, 0x0, 0x0, {}, {}, @rumble}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) 13:20:27 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x2285, &(0x7f0000000100)={0x0, 0x0, {0x0, 0x0, 0x0, {}, {}, @rumble}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) 13:20:27 executing program 4: setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x107, 0x12, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b70000000000000095000000000000001a3acceed2359b6a7042f95065a090e15e1b23c404f79c61776c1a82ce772b007e62c1012097dee8d6e2a64fa661c0e29a9aaf088552f34aeeaee7eefc55cbca11d1082f44e2649eee73cb488c4b4b"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x0, 0x0, 0x0, 0x0, 0x100}, 0x40) 13:20:27 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x4b49, &(0x7f0000000100)={0x0, 0x0, {0x0, 0x0, 0x0, {}, {}, @rumble}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) 13:20:27 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setpriority(0x0, 0x0, 0x0) clone3(&(0x7f0000000340)={0x0, &(0x7f0000000000), &(0x7f0000000180), &(0x7f00000001c0), 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)=[0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0], 0x9}, 0x50) 13:20:27 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x40045565, &(0x7f0000000100)={0x0, 0x0, {0x0, 0x0, 0x0, {}, {}, @rumble}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) [ 673.244343][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 673.250293][ C1] protocol 88fb is buggy, dev hsr_slave_1 13:20:28 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) recvmmsg(r0, &(0x7f0000001d00)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}], 0x2, 0x0, 0x0) setsockopt$SO_TIMESTAMP(r0, 0x1, 0x23, &(0x7f0000000040)=0x9, 0x4) r1 = socket$inet6(0xa, 0x80003, 0x80) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe84740") 13:20:28 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x4b33, &(0x7f0000000100)={0x0, 0x0, {0x0, 0x0, 0x0, {}, {}, @rumble}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) 13:20:28 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x4c00, &(0x7f0000000100)={0x0, 0x0, {0x0, 0x0, 0x0, {}, {}, @rumble}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) 13:20:28 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x40045566, &(0x7f0000000100)={0x0, 0x0, {0x0, 0x0, 0x0, {}, {}, @rumble}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) 13:20:28 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setpriority(0x0, 0x0, 0x0) clone3(&(0x7f0000000340)={0x0, &(0x7f0000000000), &(0x7f0000000180), &(0x7f00000001c0), 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)=[0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0], 0x9}, 0x50) 13:20:28 executing program 4: setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x107, 0x12, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b70000000000000095000000000000001a3acceed2359b6a7042f95065a090e15e1b23c404f79c61776c1a82ce772b007e62c1012097dee8d6e2a64fa661c0e29a9aaf088552f34aeeaee7eefc55cbca11d1082f44e2649eee73cb488c4b4b"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x0, 0x0, 0x0, 0x0, 0x100}, 0x40) 13:20:28 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x4c01, &(0x7f0000000100)={0x0, 0x0, {0x0, 0x0, 0x0, {}, {}, @rumble}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) 13:20:28 executing program 4: setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x107, 0x12, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b70000000000000095000000000000001a3acceed2359b6a7042f95065a090e15e1b23c404f79c61776c1a82ce772b007e62c1012097dee8d6e2a64fa661c0e29a9aaf088552f34aeeaee7eefc55cbca11d1082f44e2649eee73cb488c4b4b"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x0, 0x0, &(0x7f00000000c0), 0x0, 0x100}, 0x40) 13:20:28 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x4b47, &(0x7f0000000100)={0x0, 0x0, {0x0, 0x0, 0x0, {}, {}, @rumble}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) 13:20:28 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x40045567, &(0x7f0000000100)={0x0, 0x0, {0x0, 0x0, 0x0, {}, {}, @rumble}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) 13:20:28 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setpriority(0x0, 0x0, 0x0) clone3(&(0x7f0000000340)={0x0, &(0x7f0000000000), &(0x7f0000000180), &(0x7f00000001c0), 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)=[0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0], 0x9}, 0x50) 13:20:28 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x4b49, &(0x7f0000000100)={0x0, 0x0, {0x0, 0x0, 0x0, {}, {}, @rumble}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) [ 673.804281][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 673.810135][ C1] protocol 88fb is buggy, dev hsr_slave_1 13:20:29 executing program 4: setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x107, 0x12, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b70000000000000095000000000000001a3acceed2359b6a7042f95065a090e15e1b23c404f79c61776c1a82ce772b007e62c1012097dee8d6e2a64fa661c0e29a9aaf088552f34aeeaee7eefc55cbca11d1082f44e2649eee73cb488c4b4b"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x0, 0x0, &(0x7f00000000c0), 0x0, 0x100}, 0x40) 13:20:29 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x40045568, &(0x7f0000000100)={0x0, 0x0, {0x0, 0x0, 0x0, {}, {}, @rumble}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) 13:20:29 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x4c00, &(0x7f0000000100)={0x0, 0x0, {0x0, 0x0, 0x0, {}, {}, @rumble}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) 13:20:29 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x4c04, &(0x7f0000000100)={0x0, 0x0, {0x0, 0x0, 0x0, {}, {}, @rumble}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) 13:20:29 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setpriority(0x0, 0x0, 0x0) clone3(&(0x7f0000000340)={0x0, &(0x7f0000000000), &(0x7f0000000180), &(0x7f00000001c0), 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)=[0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0], 0x9}, 0x50) 13:20:29 executing program 5 (fault-call:1 fault-nth:0): r0 = socket$packet(0x11, 0x3, 0x300) recvmmsg(r0, &(0x7f0000001d00)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}], 0x2, 0x0, 0x0) setsockopt$SO_TIMESTAMP(r0, 0x1, 0x23, &(0x7f0000000040)=0x9, 0x4) r1 = socket$inet6(0xa, 0x80003, 0x80) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") 13:20:29 executing program 4: setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x107, 0x12, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b70000000000000095000000000000001a3acceed2359b6a7042f95065a090e15e1b23c404f79c61776c1a82ce772b007e62c1012097dee8d6e2a64fa661c0e29a9aaf088552f34aeeaee7eefc55cbca11d1082f44e2649eee73cb488c4b4b"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x0, 0x0, &(0x7f00000000c0), 0x0, 0x100}, 0x40) 13:20:29 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x4c05, &(0x7f0000000100)={0x0, 0x0, {0x0, 0x0, 0x0, {}, {}, @rumble}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) 13:20:29 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x40045569, &(0x7f0000000100)={0x0, 0x0, {0x0, 0x0, 0x0, {}, {}, @rumble}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) 13:20:29 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x4c01, &(0x7f0000000100)={0x0, 0x0, {0x0, 0x0, 0x0, {}, {}, @rumble}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) 13:20:29 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setpriority(0x0, 0x0, 0x0) clone3(&(0x7f0000000340)={0x0, &(0x7f0000000000), &(0x7f0000000180), &(0x7f00000001c0), 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)=[0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff, 0x0], 0x8}, 0x50) [ 674.524363][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 674.530256][ C0] protocol 88fb is buggy, dev hsr_slave_1 13:20:29 executing program 4: setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x107, 0x12, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b70000000000000095000000000000001a3acceed2359b6a7042f95065a090e15e1b23c404f79c61776c1a82ce772b007e62c1012097dee8d6e2a64fa661c0e29a9aaf088552f34aeeaee7eefc55cbca11d1082f44e2649eee73cb488c4b4b"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x10, 0x0, &(0x7f00000000c0)="b9ff0300000d698cb89e40f086dd0100", 0x0, 0x100}, 0x40) 13:20:29 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x4004556a, &(0x7f0000000100)={0x0, 0x0, {0x0, 0x0, 0x0, {}, {}, @rumble}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) 13:20:29 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x4c80, &(0x7f0000000100)={0x0, 0x0, {0x0, 0x0, 0x0, {}, {}, @rumble}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) 13:20:29 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x541b, &(0x7f0000000100)={0x0, 0x0, {0x0, 0x0, 0x0, {}, {}, @rumble}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) 13:20:30 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x4004556b, &(0x7f0000000100)={0x0, 0x0, {0x0, 0x0, 0x0, {}, {}, @rumble}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) 13:20:30 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x4c82, &(0x7f0000000100)={0x0, 0x0, {0x0, 0x0, 0x0, {}, {}, @rumble}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) [ 675.205184][T16168] FAULT_INJECTION: forcing a failure. [ 675.205184][T16168] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 675.219343][T16168] CPU: 1 PID: 16168 Comm: syz-executor.5 Not tainted 5.4.0-syzkaller #0 [ 675.227691][T16168] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 675.237934][T16168] Call Trace: [ 675.241335][T16168] dump_stack+0x197/0x210 [ 675.245665][T16168] should_fail.cold+0xa/0x15 [ 675.250305][T16168] ? fault_create_debugfs_attr+0x180/0x180 [ 675.256361][T16168] ? debug_smp_processor_id+0x33/0x18a [ 675.261821][T16168] ? perf_trace_lock_acquire+0xf5/0x530 [ 675.267468][T16168] should_fail_alloc_page+0x50/0x60 [ 675.272666][T16168] __alloc_pages_nodemask+0x1a1/0x910 [ 675.278096][T16168] ? __unlock_page_memcg+0x53/0x100 [ 675.283309][T16168] ? __alloc_pages_slowpath+0x2920/0x2920 [ 675.289114][T16168] ? task_css.constprop.0+0x120/0x120 [ 675.294481][T16168] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 675.301079][T16168] alloc_pages_current+0x107/0x210 [ 675.306177][T16168] __get_free_pages+0xc/0x40 [ 675.310751][T16168] __tlb_remove_page_size+0x288/0x4a0 [ 675.316120][T16168] unmap_page_range+0xf42/0x2930 [ 675.321060][T16168] ? vm_normal_page_pmd+0x420/0x420 [ 675.326278][T16168] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 675.332576][T16168] ? uprobe_munmap+0xad/0x320 [ 675.337244][T16168] unmap_single_vma+0x19d/0x300 [ 675.342098][T16168] unmap_vmas+0x184/0x2f0 [ 675.346454][T16168] ? zap_vma_ptes+0x110/0x110 [ 675.351123][T16168] ? __kasan_check_write+0x14/0x20 [ 675.356319][T16168] exit_mmap+0x2ba/0x530 [ 675.360555][T16168] ? __ia32_sys_munmap+0x80/0x80 [ 675.365489][T16168] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 675.371909][T16168] ? __khugepaged_exit+0xcf/0x410 [ 675.377006][T16168] mmput+0x179/0x4d0 [ 675.381389][T16168] do_exit+0x806/0x2ef0 [ 675.385770][T16168] ? mm_update_next_owner+0x7c0/0x7c0 [ 675.391152][T16168] ? lock_downgrade+0x920/0x920 [ 675.396003][T16168] ? _raw_spin_unlock_irq+0x23/0x80 [ 675.401243][T16168] ? get_signal+0x392/0x24f0 [ 675.405913][T16168] ? _raw_spin_unlock_irq+0x23/0x80 [ 675.414438][T16168] do_group_exit+0x135/0x360 [ 675.419030][T16168] get_signal+0x47c/0x24f0 [ 675.423566][T16168] ? ___sys_recvmsg+0x190/0x190 [ 675.428488][T16168] do_signal+0x87/0x1700 [ 675.432733][T16168] ? setup_sigcontext+0x7d0/0x7d0 [ 675.437753][T16168] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 675.443983][T16168] ? __sys_recvmmsg+0x131/0x270 [ 675.448854][T16168] ? exit_to_usermode_loop+0x43/0x380 [ 675.454226][T16168] ? do_syscall_64+0x676/0x790 [ 675.458985][T16168] ? exit_to_usermode_loop+0x43/0x380 [ 675.464358][T16168] ? lockdep_hardirqs_on+0x421/0x5e0 [ 675.469628][T16168] ? trace_hardirqs_on+0x67/0x240 [ 675.474661][T16168] exit_to_usermode_loop+0x286/0x380 [ 675.479964][T16168] do_syscall_64+0x676/0x790 [ 675.484557][T16168] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 675.490516][T16168] RIP: 0033:0x45a679 [ 675.494429][T16168] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 675.514524][T16168] RSP: 002b:00007fd1652a2c78 EFLAGS: 00000246 ORIG_RAX: 000000000000012b [ 675.522938][T16168] RAX: fffffffffffffe00 RBX: 00007fd1652a2c90 RCX: 000000000045a679 [ 675.531117][T16168] RDX: 0000000000000002 RSI: 0000000020001d00 RDI: 0000000000000003 [ 675.539175][T16168] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 675.547146][T16168] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fd1652a36d4 13:20:30 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) recvmmsg(r0, &(0x7f0000001d00)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}], 0x2, 0x0, 0x0) setsockopt$SO_TIMESTAMP(r0, 0x1, 0x23, &(0x7f0000000040)=0x9, 0x4) r1 = socket$inet6(0xa, 0x80003, 0x80) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") 13:20:30 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setpriority(0x0, 0x0, 0x0) clone3(&(0x7f0000000340)={0x0, &(0x7f0000000000), &(0x7f0000000180), &(0x7f00000001c0), 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)=[0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff, 0x0], 0x8}, 0x50) 13:20:30 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x5421, &(0x7f0000000100)={0x0, 0x0, {0x0, 0x0, 0x0, {}, {}, @rumble}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) 13:20:30 executing program 4: setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x107, 0x12, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b70000000000000095000000000000001a3acceed2359b6a7042f95065a090e15e1b23c404f79c61776c1a82ce772b007e62c1012097dee8d6e2a64fa661c0e29a9aaf088552f34aeeaee7eefc55cbca11d1082f44e2649eee73cb488c4b4b"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x10, 0x0, &(0x7f00000000c0)="b9ff0300000d698cb89e40f086dd0100", 0x0, 0x100}, 0x40) 13:20:30 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x4004556d, &(0x7f0000000100)={0x0, 0x0, {0x0, 0x0, 0x0, {}, {}, @rumble}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) 13:20:30 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x541b, &(0x7f0000000100)={0x0, 0x0, {0x0, 0x0, 0x0, {}, {}, @rumble}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) [ 675.555107][T16168] R13: 00000000004c8c7f R14: 00000000004e0540 R15: 0000000000000004 13:20:30 executing program 4: setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x107, 0x12, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b70000000000000095000000000000001a3acceed2359b6a7042f95065a090e15e1b23c404f79c61776c1a82ce772b007e62c1012097dee8d6e2a64fa661c0e29a9aaf088552f34aeeaee7eefc55cbca11d1082f44e2649eee73cb488c4b4b"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x10, 0x0, &(0x7f00000000c0)="b9ff0300000d698cb89e40f086dd0100", 0x0, 0x100}, 0x40) 13:20:30 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x5421, &(0x7f0000000100)={0x0, 0x0, {0x0, 0x0, 0x0, {}, {}, @rumble}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) 13:20:30 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x40049409, &(0x7f0000000100)={0x0, 0x0, {0x0, 0x0, 0x0, {}, {}, @rumble}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) 13:20:30 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x5450, &(0x7f0000000100)={0x0, 0x0, {0x0, 0x0, 0x0, {}, {}, @rumble}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) 13:20:31 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setpriority(0x0, 0x0, 0x0) clone3(&(0x7f0000000340)={0x0, &(0x7f0000000000), &(0x7f0000000180), &(0x7f00000001c0), 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)=[0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff, 0x0], 0x8}, 0x50) 13:20:31 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x5451, &(0x7f0000000100)={0x0, 0x0, {0x0, 0x0, 0x0, {}, {}, @rumble}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) 13:20:31 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) recvmmsg(r0, &(0x7f0000001d00)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}], 0x2, 0x0, 0x0) setsockopt$SO_TIMESTAMP(r0, 0x1, 0x23, &(0x7f0000000040)=0x9, 0x4) r1 = socket$inet6(0xa, 0x80003, 0x80) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") 13:20:31 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x4008556c, &(0x7f0000000100)={0x0, 0x0, {0x0, 0x0, 0x0, {}, {}, @rumble}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) 13:20:31 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x5450, &(0x7f0000000100)={0x0, 0x0, {0x0, 0x0, 0x0, {}, {}, @rumble}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) 13:20:31 executing program 4: setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x107, 0x12, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b70000000000000095000000000000001a3acceed2359b6a7042f95065a090e15e1b23c404f79c61776c1a82ce772b007e62c1012097dee8d6e2a64fa661c0e29a9aaf088552f34aeeaee7eefc55cbca11d1082f44e2649eee73cb488c4b4b"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x18, 0x0, &(0x7f00000000c0)="b9ff0300000d698cb89e40f086dd01000005a4004000ffa3", 0x0, 0x100}, 0x40) 13:20:31 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x5452, &(0x7f0000000100)={0x0, 0x0, {0x0, 0x0, 0x0, {}, {}, @rumble}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) 13:20:31 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setpriority(0x0, 0x0, 0x0) clone3(&(0x7f0000000340)={0x0, &(0x7f0000000000), &(0x7f0000000180), &(0x7f00000001c0), 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)=[0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff, 0x0], 0x8}, 0x50) 13:20:31 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x5460, &(0x7f0000000100)={0x0, 0x0, {0x0, 0x0, 0x0, {}, {}, @rumble}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) 13:20:31 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x40086409, &(0x7f0000000100)={0x0, 0x0, {0x0, 0x0, 0x0, {}, {}, @rumble}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) 13:20:31 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x5451, &(0x7f0000000100)={0x0, 0x0, {0x0, 0x0, 0x0, {}, {}, @rumble}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) 13:20:31 executing program 4: setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x107, 0x12, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b70000000000000095000000000000001a3acceed2359b6a7042f95065a090e15e1b23c404f79c61776c1a82ce772b007e62c1012097dee8d6e2a64fa661c0e29a9aaf088552f34aeeaee7eefc55cbca11d1082f44e2649eee73cb488c4b4b"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x18, 0x0, &(0x7f00000000c0)="b9ff0300000d698cb89e40f086dd01000005a4004000ffa3", 0x0, 0x100}, 0x40) 13:20:32 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setpriority(0x0, 0x0, 0x0) clone3(&(0x7f0000000340)={0x0, &(0x7f0000000000), &(0x7f0000000180), &(0x7f00000001c0), 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)=[0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff, 0x0], 0x8}, 0x50) 13:20:32 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x5501, &(0x7f0000000100)={0x0, 0x0, {0x0, 0x0, 0x0, {}, {}, @rumble}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) 13:20:32 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) recvmmsg(r0, &(0x7f0000001d00)=[{{0x0, 0x4, 0x0}}, {{0x0, 0x0, 0x0}}], 0x2, 0x0, 0x0) setsockopt$SO_TIMESTAMP(r0, 0x1, 0x23, &(0x7f0000000040)=0x9, 0x4) r1 = socket$inet6(0xa, 0x80003, 0x80) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") 13:20:32 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x40086602, &(0x7f0000000100)={0x0, 0x0, {0x0, 0x0, 0x0, {}, {}, @rumble}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) 13:20:32 executing program 4: setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x107, 0x12, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b70000000000000095000000000000001a3acceed2359b6a7042f95065a090e15e1b23c404f79c61776c1a82ce772b007e62c1012097dee8d6e2a64fa661c0e29a9aaf088552f34aeeaee7eefc55cbca11d1082f44e2649eee73cb488c4b4b"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x18, 0x0, &(0x7f00000000c0)="b9ff0300000d698cb89e40f086dd01000005a4004000ffa3", 0x0, 0x100}, 0x40) 13:20:32 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x5452, &(0x7f0000000100)={0x0, 0x0, {0x0, 0x0, 0x0, {}, {}, @rumble}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) 13:20:32 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x5502, &(0x7f0000000100)={0x0, 0x0, {0x0, 0x0, 0x0, {}, {}, @rumble}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) 13:20:32 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setpriority(0x0, 0x0, 0x0) clone3(&(0x7f0000000340)={0x0, &(0x7f0000000000), &(0x7f0000000180), &(0x7f00000001c0), 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)=[0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff, 0x0], 0x8}, 0x50) 13:20:32 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x40087602, &(0x7f0000000100)={0x0, 0x0, {0x0, 0x0, 0x0, {}, {}, @rumble}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) 13:20:32 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x5460, &(0x7f0000000100)={0x0, 0x0, {0x0, 0x0, 0x0, {}, {}, @rumble}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) 13:20:32 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x6364, &(0x7f0000000100)={0x0, 0x0, {0x0, 0x0, 0x0, {}, {}, @rumble}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) [ 677.644367][ C0] net_ratelimit: 2 callbacks suppressed [ 677.644375][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 677.655971][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 677.661826][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 677.667670][ C0] protocol 88fb is buggy, dev hsr_slave_1 13:20:32 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setpriority(0x0, 0x0, 0x0) clone3(&(0x7f0000000340)={0x0, &(0x7f0000000000), &(0x7f0000000180), &(0x7f00000001c0), 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)=[0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff, 0x0], 0x8}, 0x50) 13:20:33 executing program 4: setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x107, 0x12, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b70000000000000095000000000000001a3acceed2359b6a7042f95065a090e15e1b23c404f79c61776c1a82ce772b007e62c1012097dee8d6e2a64fa661c0e29a9aaf088552f34aeeaee7eefc55cbca11d1082f44e2649eee73cb488c4b4b"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x1c, 0x0, &(0x7f00000000c0)="b9ff0300000d698cb89e40f086dd01000005a4004000ffa377fbac14", 0x0, 0x100}, 0x40) 13:20:33 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x400c55cb, &(0x7f0000000100)={0x0, 0x0, {0x0, 0x0, 0x0, {}, {}, @rumble}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) [ 677.964299][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 677.970161][ C1] protocol 88fb is buggy, dev hsr_slave_1 13:20:33 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) recvmmsg(r0, &(0x7f0000001d00)=[{{0x0, 0x40000, 0x0}}, {{0x0, 0x0, 0x0}}], 0x2, 0x0, 0x0) setsockopt$SO_TIMESTAMP(r0, 0x1, 0x23, &(0x7f0000000040)=0x9, 0x4) r1 = socket$inet6(0xa, 0x80003, 0x80) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") 13:20:33 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x5501, &(0x7f0000000100)={0x0, 0x0, {0x0, 0x0, 0x0, {}, {}, @rumble}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) 13:20:33 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x8912, &(0x7f0000000100)={0x0, 0x0, {0x0, 0x0, 0x0, {}, {}, @rumble}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) 13:20:33 executing program 4: setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x107, 0x12, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b70000000000000095000000000000001a3acceed2359b6a7042f95065a090e15e1b23c404f79c61776c1a82ce772b007e62c1012097dee8d6e2a64fa661c0e29a9aaf088552f34aeeaee7eefc55cbca11d1082f44e2649eee73cb488c4b4b"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x1c, 0x0, &(0x7f00000000c0)="b9ff0300000d698cb89e40f086dd01000005a4004000ffa377fbac14", 0x0, 0x100}, 0x40) 13:20:33 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setpriority(0x0, 0x0, 0x0) clone3(&(0x7f0000000340)={0x0, &(0x7f0000000000), &(0x7f0000000180), &(0x7f00000001c0), 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)=[0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff, 0x0], 0x7}, 0x50) 13:20:33 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x40106614, &(0x7f0000000100)={0x0, 0x0, {0x0, 0x0, 0x0, {}, {}, @rumble}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) 13:20:33 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x4020940d, &(0x7f0000000100)={0x0, 0x0, {0x0, 0x0, 0x0, {}, {}, @rumble}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) 13:20:33 executing program 4: setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x107, 0x12, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b70000000000000095000000000000001a3acceed2359b6a7042f95065a090e15e1b23c404f79c61776c1a82ce772b007e62c1012097dee8d6e2a64fa661c0e29a9aaf088552f34aeeaee7eefc55cbca11d1082f44e2649eee73cb488c4b4b"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x1c, 0x0, &(0x7f00000000c0)="b9ff0300000d698cb89e40f086dd01000005a4004000ffa377fbac14", 0x0, 0x100}, 0x40) 13:20:33 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x8914, &(0x7f0000000100)={0x0, 0x0, {0x0, 0x0, 0x0, {}, {}, @rumble}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) 13:20:33 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x5502, &(0x7f0000000100)={0x0, 0x0, {0x0, 0x0, 0x0, {}, {}, @rumble}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) [ 678.684384][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 678.690230][ C0] protocol 88fb is buggy, dev hsr_slave_1 13:20:34 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x4040ae9e, &(0x7f0000000100)={0x0, 0x0, {0x0, 0x0, 0x0, {}, {}, @rumble}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) 13:20:34 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setpriority(0x0, 0x0, 0x0) clone3(&(0x7f0000000340)={0x0, &(0x7f0000000000), &(0x7f0000000180), &(0x7f00000001c0), 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)=[0xffffffffffffffff, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0], 0x6}, 0x50) 13:20:34 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) recvmmsg(r0, &(0x7f0000001d00)=[{{0x0, 0x0, 0x0, 0x4}}, {{0x0, 0x0, 0x0}}], 0x2, 0x0, 0x0) setsockopt$SO_TIMESTAMP(r0, 0x1, 0x23, &(0x7f0000000040)=0x9, 0x4) r1 = socket$inet6(0xa, 0x80003, 0x80) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") 13:20:34 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x8933, &(0x7f0000000100)={0x0, 0x0, {0x0, 0x0, 0x0, {}, {}, @rumble}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) 13:20:34 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x6364, &(0x7f0000000100)={0x0, 0x0, {0x0, 0x0, 0x0, {}, {}, @rumble}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) 13:20:34 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x405c5503, &(0x7f0000000100)={0x0, 0x0, {0x0, 0x0, 0x0, {}, {}, @rumble}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) 13:20:34 executing program 4: setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x107, 0x12, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b70000000000000095000000000000001a3acceed2359b6a7042f95065a090e15e1b23c404f79c61776c1a82ce772b007e62c1012097dee8d6e2a64fa661c0e29a9aaf088552f34aeeaee7eefc55cbca11d1082f44e2649eee73cb488c4b4b"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x1e, 0x0, &(0x7f00000000c0)="b9ff0300000d698cb89e40f086dd01000005a4004000ffa377fbac141414", 0x0, 0x100}, 0x40) 13:20:34 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setpriority(0x0, 0x0, 0x0) clone3(&(0x7f0000000340)={0x0, &(0x7f0000000000), &(0x7f0000000180), &(0x7f00000001c0), 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)=[0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff, 0x0], 0x5}, 0x50) 13:20:34 executing program 4: setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x107, 0x12, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b70000000000000095000000000000001a3acceed2359b6a7042f95065a090e15e1b23c404f79c61776c1a82ce772b007e62c1012097dee8d6e2a64fa661c0e29a9aaf088552f34aeeaee7eefc55cbca11d1082f44e2649eee73cb488c4b4b"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x1e, 0x0, &(0x7f00000000c0)="b9ff0300000d698cb89e40f086dd01000005a4004000ffa377fbac141414", 0x0, 0x100}, 0x40) 13:20:34 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x406855c9, &(0x7f0000000100)={0x0, 0x0, {0x0, 0x0, 0x0, {}, {}, @rumble}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) 13:20:34 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x8982, &(0x7f0000000100)={0x0, 0x0, {0x0, 0x0, 0x0, {}, {}, @rumble}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) 13:20:34 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x6612, &(0x7f0000000100)={0x0, 0x0, {0x0, 0x0, 0x0, {}, {}, @rumble}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) [ 679.724409][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 679.730270][ C0] protocol 88fb is buggy, dev hsr_slave_1 13:20:35 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setpriority(0x0, 0x0, 0x0) clone3(&(0x7f0000000340)={0x0, &(0x7f0000000000), &(0x7f0000000180), &(0x7f00000001c0), 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)=[0x0, 0x0, 0xffffffffffffffff, 0x0], 0x4}, 0x50) 13:20:35 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x4080aea2, &(0x7f0000000100)={0x0, 0x0, {0x0, 0x0, 0x0, {}, {}, @rumble}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) 13:20:35 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) recvmmsg(r0, &(0x7f0000001d00)=[{{0x0, 0x0, 0x0, 0x40000}}, {{0x0, 0x0, 0x0}}], 0x2, 0x0, 0x0) setsockopt$SO_TIMESTAMP(r0, 0x1, 0x23, &(0x7f0000000040)=0x9, 0x4) r1 = socket$inet6(0xa, 0x80003, 0x80) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") 13:20:35 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x89f1, &(0x7f0000000100)={0x0, 0x0, {0x0, 0x0, 0x0, {}, {}, @rumble}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) 13:20:35 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x8912, &(0x7f0000000100)={0x0, 0x0, {0x0, 0x0, 0x0, {}, {}, @rumble}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) 13:20:35 executing program 4: setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x107, 0x12, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b70000000000000095000000000000001a3acceed2359b6a7042f95065a090e15e1b23c404f79c61776c1a82ce772b007e62c1012097dee8d6e2a64fa661c0e29a9aaf088552f34aeeaee7eefc55cbca11d1082f44e2649eee73cb488c4b4b"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x1e, 0x0, &(0x7f00000000c0)="b9ff0300000d698cb89e40f086dd01000005a4004000ffa377fbac141414", 0x0, 0x100}, 0x40) 13:20:35 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x8004500b, &(0x7f0000000100)={0x0, 0x0, {0x0, 0x0, 0x0, {}, {}, @rumble}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) 13:20:35 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x400454ca, &(0x7f0000000100)={0x0, 0x0, {0x0, 0x0, 0x0, {}, {}, @rumble}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) 13:20:35 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x8933, &(0x7f0000000100)={0x0, 0x0, {0x0, 0x0, 0x0, {}, {}, @rumble}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) 13:20:35 executing program 0: unshare(0x600) r0 = syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x8002) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer2\x00', 0x0, 0x0) ioctl$TIOCSTI(r1, 0x5412, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer2\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r2, 0x40085112, &(0x7f0000000200)) ioctl$sock_inet_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000000)) rt_sigprocmask(0x0, 0x0, 0x0, 0x0) timer_create(0x0, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000140)={0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) pread64(0xffffffffffffffff, 0x0, 0x0, 0x0) write(r0, &(0x7f0000000100)="b63db85e1e8d020000000000003ef0011dcc606aed69d2c5f600af77c4312bb4f8acbc7037cebc9bc2feffffffff9e19faab64f79f3b15a23336c2f0ffff3a91ba35160096aa1f", 0x47) readv(r0, &(0x7f000085dff0)=[{&(0x7f0000e94000)=""/62, 0x23}], 0xd) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000180)) 13:20:35 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) recvmmsg(r0, &(0x7f0000001d00)=[{{0x0, 0x0, 0x0, 0x4000000000000}}, {{0x0, 0x0, 0x0}}], 0x2, 0x0, 0x0) setsockopt$SO_TIMESTAMP(r0, 0x1, 0x23, &(0x7f0000000040)=0x9, 0x4) r1 = socket$inet6(0xa, 0x80003, 0x80) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") 13:20:35 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x800454d2, &(0x7f0000000100)={0x0, 0x0, {0x0, 0x0, 0x0, {}, {}, @rumble}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) 13:20:35 executing program 4: setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x107, 0x12, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b70000000000000095000000000000001a3acceed2359b6a7042f95065a090e15e1b23c404f79c61776c1a82ce772b007e62c1012097dee8d6e2a64fa661c0e29a9aaf088552f34aeeaee7eefc55cbca11d1082f44e2649eee73cb488c4b4b"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x1f, 0x0, &(0x7f00000000c0)="b9ff0300000d698cb89e40f086dd01000005a4004000ffa377fbac141414e9", 0x0}, 0x40) 13:20:35 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x40045564, &(0x7f0000000100)={0x0, 0x0, {0x0, 0x0, 0x0, {}, {}, @rumble}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) 13:20:35 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x89f1, &(0x7f0000000100)={0x0, 0x0, {0x0, 0x0, 0x0, {}, {}, @rumble}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) 13:20:35 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x8004552d, &(0x7f0000000100)={0x0, 0x0, {0x0, 0x0, 0x0, {}, {}, @rumble}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) [ 680.614063][T16914] sg_write: data in/out 167162/25 bytes for SCSI command 0x37-- guessing data in; [ 680.614063][T16914] program syz-executor.0 not setting count and/or reply_len properly 13:20:35 executing program 4: setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x107, 0x12, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b70000000000000095000000000000001a3acceed2359b6a7042f95065a090e15e1b23c404f79c61776c1a82ce772b007e62c1012097dee8d6e2a64fa661c0e29a9aaf088552f34aeeaee7eefc55cbca11d1082f44e2649eee73cb488c4b4b"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x1f, 0x0, &(0x7f00000000c0)="b9ff0300000d698cb89e40f086dd01000005a4004000ffa377fbac141414e9", 0x0}, 0x40) 13:20:35 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) recvmmsg(r0, &(0x7f0000001d00)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x4}}, {{0x0, 0x0, 0x0}}], 0x2, 0x0, 0x0) setsockopt$SO_TIMESTAMP(r0, 0x1, 0x23, &(0x7f0000000040)=0x9, 0x4) r1 = socket$inet6(0xa, 0x80003, 0x80) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") 13:20:36 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x40045565, &(0x7f0000000100)={0x0, 0x0, {0x0, 0x0, 0x0, {}, {}, @rumble}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) 13:20:36 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x400454ca, &(0x7f0000000100)={0x0, 0x0, {0x0, 0x0, 0x0, {}, {}, @rumble}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) 13:20:36 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x8004e500, &(0x7f0000000100)={0x0, 0x0, {0x0, 0x0, 0x0, {}, {}, @rumble}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) 13:20:36 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) readv(r0, &(0x7f00000000c0)=[{&(0x7f0000000000)=""/134, 0x86}, {0x0}], 0x2) r1 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r1, 0x0, 0x26ba, 0x0, 0x0, 0x800e00517) shutdown(r0, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) dup2(r1, r2) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x1010, 0xffffffffffffffff, 0x7) recvfrom$inet(r2, 0x0, 0x675cc48c53c244b, 0x0, 0x0, 0x800e0050e) shutdown(r1, 0x0) 13:20:36 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x40045566, &(0x7f0000000100)={0x0, 0x0, {0x0, 0x0, 0x0, {}, {}, @rumble}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) 13:20:36 executing program 4: setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x107, 0x12, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b70000000000000095000000000000001a3acceed2359b6a7042f95065a090e15e1b23c404f79c61776c1a82ce772b007e62c1012097dee8d6e2a64fa661c0e29a9aaf088552f34aeeaee7eefc55cbca11d1082f44e2649eee73cb488c4b4b"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x1f, 0x0, &(0x7f00000000c0)="b9ff0300000d698cb89e40f086dd01000005a4004000ffa377fbac141414e9", 0x0}, 0x40) 13:20:36 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x80086301, &(0x7f0000000100)={0x0, 0x0, {0x0, 0x0, 0x0, {}, {}, @rumble}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) 13:20:36 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x4004555c, &(0x7f0000000100)={0x0, 0x0, {0x0, 0x0, 0x0, {}, {}, @rumble}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) 13:20:36 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x40045565, &(0x7f0000000100)={0x0, 0x0, {0x0, 0x0, 0x0, {}, {}, @rumble}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) 13:20:36 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x40045567, &(0x7f0000000100)={0x0, 0x0, {0x0, 0x0, 0x0, {}, {}, @rumble}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) 13:20:36 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x80086601, &(0x7f0000000100)={0x0, 0x0, {0x0, 0x0, 0x0, {}, {}, @rumble}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) 13:20:36 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) recvmmsg(r0, &(0x7f0000001d00)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x40000}}, {{0x0, 0x0, 0x0}}], 0x2, 0x0, 0x0) setsockopt$SO_TIMESTAMP(r0, 0x1, 0x23, &(0x7f0000000040)=0x9, 0x4) r1 = socket$inet6(0xa, 0x80003, 0x80) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") 13:20:36 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x40045566, &(0x7f0000000100)={0x0, 0x0, {0x0, 0x0, 0x0, {}, {}, @rumble}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) 13:20:36 executing program 0: r0 = socket$netlink(0x10, 0x3, 0xc) writev(r0, &(0x7f0000fb5ff0)=[{&(0x7f0000fb4000)="1f00000002031900000007000000068100023b0509000100010100ff3ffe58", 0x1f}], 0x1) r1 = socket$netlink(0x10, 0x3, 0xc) writev(r1, &(0x7f0000fb5ff0)=[{&(0x7f0000fb6000)="1f00000002031900000007000000e3800802bb0509000100010100493ffe58", 0x1f}], 0x1) close(r1) mount$9p_fd(0x0, 0x0, 0x0, 0x0, 0x0) setxattr$trusted_overlay_nlink(0x0, 0x0, 0x0, 0x0, 0x0) 13:20:37 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x40045568, &(0x7f0000000100)={0x0, 0x0, {0x0, 0x0, 0x0, {}, {}, @rumble}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) 13:20:37 executing program 4: setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x107, 0x12, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b70000000000000095000000000000001a3acceed2359b6a7042f95065a090e15e1b23c404f79c61776c1a82ce772b007e62c1012097dee8d6e2a64fa661c0e29a9aaf088552f34aeeaee7eefc55cbca11d1082f44e2649eee73cb488c4b4b"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x1f, 0x0, &(0x7f00000000c0)="b9ff0300000d698cb89e40f086dd01000005a4004000ffa377fbac141414e9", 0x0, 0x100, 0x0, 0x0, 0x0, 0x0}, 0x40) 13:20:37 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x40045567, &(0x7f0000000100)={0x0, 0x0, {0x0, 0x0, 0x0, {}, {}, @rumble}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) 13:20:37 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x80087601, &(0x7f0000000100)={0x0, 0x0, {0x0, 0x0, 0x0, {}, {}, @rumble}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) 13:20:37 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x6, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000780)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000040)={'nr0\x01\x00', 0x1132}) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'nr0\x01\x00', 0x7132}) r2 = socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xb1m\x8c\xce\xf3\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb') socket$kcm(0x11, 0x0, 0x300) write$cgroup_subtree(r0, &(0x7f0000000180)=ANY=[@ANYPTR64, @ANYPTR], 0x10) close(r1) sendmsg$tipc(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) 13:20:37 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x40045569, &(0x7f0000000100)={0x0, 0x0, {0x0, 0x0, 0x0, {}, {}, @rumble}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) 13:20:37 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x40045568, &(0x7f0000000100)={0x0, 0x0, {0x0, 0x0, 0x0, {}, {}, @rumble}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) 13:20:37 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x80247009, &(0x7f0000000100)={0x0, 0x0, {0x0, 0x0, 0x0, {}, {}, @rumble}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) 13:20:37 executing program 4: setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x107, 0x12, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b70000000000000095000000000000001a3acceed2359b6a7042f95065a090e15e1b23c404f79c61776c1a82ce772b007e62c1012097dee8d6e2a64fa661c0e29a9aaf088552f34aeeaee7eefc55cbca11d1082f44e2649eee73cb488c4b4b"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x1f, 0x0, &(0x7f00000000c0)="b9ff0300000d698cb89e40f086dd01000005a4004000ffa377fbac141414e9", 0x0, 0x100, 0x0, 0x0, 0x0, 0x0}, 0x40) [ 682.430879][T17237] device nr0 entered promiscuous mode 13:20:37 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) recvmmsg(r0, &(0x7f0000001d00)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000000}}, {{0x0, 0x0, 0x0}}], 0x2, 0x0, 0x0) setsockopt$SO_TIMESTAMP(r0, 0x1, 0x23, &(0x7f0000000040)=0x9, 0x4) r1 = socket$inet6(0xa, 0x80003, 0x80) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") 13:20:37 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x4004556a, &(0x7f0000000100)={0x0, 0x0, {0x0, 0x0, 0x0, {}, {}, @rumble}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) 13:20:37 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x80487436, &(0x7f0000000100)={0x0, 0x0, {0x0, 0x0, 0x0, {}, {}, @rumble}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) 13:20:37 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x40045569, &(0x7f0000000100)={0x0, 0x0, {0x0, 0x0, 0x0, {}, {}, @rumble}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) 13:20:37 executing program 4: setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x107, 0x12, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b70000000000000095000000000000001a3acceed2359b6a7042f95065a090e15e1b23c404f79c61776c1a82ce772b007e62c1012097dee8d6e2a64fa661c0e29a9aaf088552f34aeeaee7eefc55cbca11d1082f44e2649eee73cb488c4b4b"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x1f, 0x0, &(0x7f00000000c0)="b9ff0300000d698cb89e40f086dd01000005a4004000ffa377fbac141414e9", 0x0, 0x100, 0x0, 0x0, 0x0, 0x0}, 0x40) 13:20:38 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x4004556b, &(0x7f0000000100)={0x0, 0x0, {0x0, 0x0, 0x0, {}, {}, @rumble}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) 13:20:38 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x4004556a, &(0x7f0000000100)={0x0, 0x0, {0x0, 0x0, 0x0, {}, {}, @rumble}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) [ 683.204866][T17313] device nr0 entered promiscuous mode 13:20:38 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x6, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000780)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000040)={'nr0\x01\x00', 0x1132}) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'nr0\x01\x00', 0x7132}) r2 = socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xb1m\x8c\xce\xf3\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb') socket$kcm(0x11, 0x0, 0x300) write$cgroup_subtree(r0, &(0x7f0000000180)=ANY=[@ANYPTR64, @ANYPTR], 0x10) close(r1) sendmsg$tipc(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) 13:20:38 executing program 4: setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x107, 0x12, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b70000000000000095000000000000001a3acceed2359b6a7042f95065a090e15e1b23c404f79c61776c1a82ce772b007e62c1012097dee8d6e2a64fa661c0e29a9aaf088552f34aeeaee7eefc55cbca11d1082f44e2649eee73cb488c4b4b"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x1f, 0x0, &(0x7f00000000c0)="b9ff0300000d698cb89e40f086dd01000005a4004000ffa377fbac141414e9", 0x0, 0x100, 0x0, 0x0, 0x0, &(0x7f0000000000), 0x0}, 0x40) 13:20:38 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x80e85411, &(0x7f0000000100)={0x0, 0x0, {0x0, 0x0, 0x0, {}, {}, @rumble}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) 13:20:38 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x4004556e, &(0x7f0000000100)={0x0, 0x0, {0x0, 0x0, 0x0, {}, {}, @rumble}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) 13:20:38 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x4004556b, &(0x7f0000000100)={0x0, 0x0, {0x0, 0x0, 0x0, {}, {}, @rumble}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) 13:20:39 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) recvmmsg(r0, &(0x7f0000001d00)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}], 0x2, 0x0, 0x0) setsockopt$SO_TIMESTAMP(r0, 0x1, 0x23, &(0x7f0000000040)=0x9, 0x4) r1 = socket$inet6(0xa, 0x80003, 0x80) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") 13:20:39 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0xc0045878, &(0x7f0000000100)={0x0, 0x0, {0x0, 0x0, 0x0, {}, {}, @rumble}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) 13:20:39 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x4004556d, &(0x7f0000000100)={0x0, 0x0, {0x0, 0x0, 0x0, {}, {}, @rumble}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) 13:20:39 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x40049409, &(0x7f0000000100)={0x0, 0x0, {0x0, 0x0, 0x0, {}, {}, @rumble}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) 13:20:39 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0xc0045878, &(0x7f0000000100)={0x0, 0x0, {0x0, 0x0, 0x0, {}, {}, @rumble}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) 13:20:39 executing program 4: setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x107, 0x12, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b70000000000000095000000000000001a3acceed2359b6a7042f95065a090e15e1b23c404f79c61776c1a82ce772b007e62c1012097dee8d6e2a64fa661c0e29a9aaf088552f34aeeaee7eefc55cbca11d1082f44e2649eee73cb488c4b4b"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x1f, 0x0, &(0x7f00000000c0)="b9ff0300000d698cb89e40f086dd01000005a4004000ffa377fbac141414e9", 0x0, 0x100, 0x0, 0x0, 0x0, &(0x7f0000000000), 0x0}, 0x40) 13:20:39 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x4008556c, &(0x7f0000000100)={0x0, 0x0, {0x0, 0x0, 0x0, {}, {}, @rumble}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) [ 684.162595][T17526] device nr0 entered promiscuous mode [ 684.204275][ C1] net_ratelimit: 4 callbacks suppressed [ 684.204282][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 684.215684][ C1] protocol 88fb is buggy, dev hsr_slave_1 13:20:39 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x6, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000780)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000040)={'nr0\x01\x00', 0x1132}) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'nr0\x01\x00', 0x7132}) r2 = socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xb1m\x8c\xce\xf3\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb') socket$kcm(0x11, 0x0, 0x300) write$cgroup_subtree(r0, &(0x7f0000000180)=ANY=[@ANYPTR64, @ANYPTR], 0x10) close(r1) sendmsg$tipc(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) 13:20:39 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x4004556e, &(0x7f0000000100)={0x0, 0x0, {0x0, 0x0, 0x0, {}, {}, @rumble}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) 13:20:39 executing program 4: setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x107, 0x12, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b70000000000000095000000000000001a3acceed2359b6a7042f95065a090e15e1b23c404f79c61776c1a82ce772b007e62c1012097dee8d6e2a64fa661c0e29a9aaf088552f34aeeaee7eefc55cbca11d1082f44e2649eee73cb488c4b4b"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x1f, 0x0, &(0x7f00000000c0)="b9ff0300000d698cb89e40f086dd01000005a4004000ffa377fbac141414e9", 0x0, 0x100, 0x0, 0x0, 0x0, &(0x7f0000000000), 0x0}, 0x40) 13:20:39 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x40086602, &(0x7f0000000100)={0x0, 0x0, {0x0, 0x0, 0x0, {}, {}, @rumble}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) 13:20:39 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0xc008af12, &(0x7f0000000100)={0x0, 0x0, {0x0, 0x0, 0x0, {}, {}, @rumble}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) 13:20:40 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) recvmmsg(r0, &(0x7f0000001d00)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}}, {{0x0, 0x0, 0x0}}], 0x2, 0x0, 0x0) setsockopt$SO_TIMESTAMP(r0, 0x1, 0x23, &(0x7f0000000040)=0x9, 0x4) r1 = socket$inet6(0xa, 0x80003, 0x80) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") 13:20:40 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0xc00c55ca, &(0x7f0000000100)={0x0, 0x0, {0x0, 0x0, 0x0, {}, {}, @rumble}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) 13:20:40 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x40087602, &(0x7f0000000100)={0x0, 0x0, {0x0, 0x0, 0x0, {}, {}, @rumble}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) 13:20:40 executing program 4: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x6, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000780)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000040)={'nr0\x01\x00', 0x1132}) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'nr0\x01\x00', 0x7132}) r2 = socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xb1m\x8c\xce\xf3\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb') socket$kcm(0x11, 0x0, 0x300) write$cgroup_subtree(r0, &(0x7f0000000180)=ANY=[@ANYPTR64, @ANYPTR], 0x10) close(r1) sendmsg$tipc(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) 13:20:40 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x40049409, &(0x7f0000000100)={0x0, 0x0, {0x0, 0x0, 0x0, {}, {}, @rumble}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) 13:20:40 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x4008556c, &(0x7f0000000100)={0x0, 0x0, {0x0, 0x0, 0x0, {}, {}, @rumble}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) 13:20:40 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0xc0189436, &(0x7f0000000100)={0x0, 0x0, {0x0, 0x0, 0x0, {}, {}, @rumble}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) [ 685.188871][T17636] device nr0 entered promiscuous mode 13:20:40 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x6, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000780)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000040)={'nr0\x01\x00', 0x1132}) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'nr0\x01\x00', 0x7132}) r2 = socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xb1m\x8c\xce\xf3\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb') socket$kcm(0x11, 0x0, 0x300) write$cgroup_subtree(r0, &(0x7f0000000180)=ANY=[@ANYPTR64, @ANYPTR], 0x10) close(r1) sendmsg$tipc(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) 13:20:40 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x400c55cb, &(0x7f0000000100)={0x0, 0x0, {0x0, 0x0, 0x0, {}, {}, @rumble}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) 13:20:40 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0xc020660b, &(0x7f0000000100)={0x0, 0x0, {0x0, 0x0, 0x0, {}, {}, @rumble}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) 13:20:40 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x40086602, &(0x7f0000000100)={0x0, 0x0, {0x0, 0x0, 0x0, {}, {}, @rumble}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) 13:20:40 executing program 4: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x6, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000780)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000040)={'nr0\x01\x00', 0x1132}) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'nr0\x01\x00', 0x7132}) r2 = socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xb1m\x8c\xce\xf3\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb') socket$kcm(0x11, 0x0, 0x300) write$cgroup_subtree(r0, &(0x7f0000000180)=ANY=[@ANYPTR64, @ANYPTR], 0x10) close(r1) sendmsg$tipc(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) [ 685.884289][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 685.890253][ C1] protocol 88fb is buggy, dev hsr_slave_1 13:20:41 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) recvmmsg(r0, &(0x7f0000001d00)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000}}, {{0x0, 0x0, 0x0}}], 0x2, 0x0, 0x0) setsockopt$SO_TIMESTAMP(r0, 0x1, 0x23, &(0x7f0000000040)=0x9, 0x4) r1 = socket$inet6(0xa, 0x80003, 0x80) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") 13:20:41 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x4020940d, &(0x7f0000000100)={0x0, 0x0, {0x0, 0x0, 0x0, {}, {}, @rumble}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) 13:20:41 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0xc0406618, &(0x7f0000000100)={0x0, 0x0, {0x0, 0x0, 0x0, {}, {}, @rumble}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) 13:20:41 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x40087602, &(0x7f0000000100)={0x0, 0x0, {0x0, 0x0, 0x0, {}, {}, @rumble}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) 13:20:41 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0xc06855c8, &(0x7f0000000100)={0x0, 0x0, {0x0, 0x0, 0x0, {}, {}, @rumble}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) 13:20:41 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x4008ae9c, &(0x7f0000000100)={0x0, 0x0, {0x0, 0x0, 0x0, {}, {}, @rumble}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) 13:20:41 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x40286608, &(0x7f0000000100)={0x0, 0x0, {0x0, 0x0, 0x0, {}, {}, @rumble}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) [ 686.279483][T17773] device nr0 entered promiscuous mode [ 686.284319][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 686.290818][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 686.427853][T17775] device nr0 entered promiscuous mode 13:20:42 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x6, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000780)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000040)={'nr0\x01\x00', 0x1132}) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'nr0\x01\x00', 0x7132}) r2 = socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xb1m\x8c\xce\xf3\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb') socket$kcm(0x11, 0x0, 0x300) write$cgroup_subtree(r0, &(0x7f0000000180)=ANY=[@ANYPTR64, @ANYPTR], 0x10) close(r1) sendmsg$tipc(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) 13:20:42 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0xc1105518, &(0x7f0000000100)={0x0, 0x0, {0x0, 0x0, 0x0, {}, {}, @rumble}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) 13:20:42 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x400c55cb, &(0x7f0000000100)={0x0, 0x0, {0x0, 0x0, 0x0, {}, {}, @rumble}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) 13:20:42 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x4030582a, &(0x7f0000000100)={0x0, 0x0, {0x0, 0x0, 0x0, {}, {}, @rumble}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) 13:20:42 executing program 4: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x6, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000780)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000040)={'nr0\x01\x00', 0x1132}) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'nr0\x01\x00', 0x7132}) r2 = socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xb1m\x8c\xce\xf3\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb') socket$kcm(0x11, 0x0, 0x300) write$cgroup_subtree(r0, &(0x7f0000000180)=ANY=[@ANYPTR64, @ANYPTR], 0x10) close(r1) sendmsg$tipc(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) 13:20:42 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) recvmmsg(r0, &(0x7f0000001d00)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}], 0x2, 0x0, 0x0) setsockopt$SO_TIMESTAMP(r0, 0x1, 0x23, &(0x7f0000000040)=0x9, 0x4) r1 = socket$inet6(0xa, 0x80003, 0x80) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") 13:20:42 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x40106614, &(0x7f0000000100)={0x0, 0x0, {0x0, 0x0, 0x0, {}, {}, @rumble}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) 13:20:42 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x4004556e, &(0x7f0000000100)={0x0, 0x0, {0x0, 0x0, 0x0, {}, {}, @rumble}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) 13:20:42 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x4040ae9e, &(0x7f0000000100)={0x0, 0x0, {0x0, 0x0, 0x0, {}, {}, @rumble}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) 13:20:42 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x4004556e, &(0x7f0000000100)={0x2, 0x0, {0x0, 0x0, 0x0, {}, {}, @rumble}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) 13:20:42 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x405c5503, &(0x7f0000000100)={0x0, 0x0, {0x0, 0x0, 0x0, {}, {}, @rumble}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) 13:20:42 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x4020940d, &(0x7f0000000100)={0x0, 0x0, {0x0, 0x0, 0x0, {}, {}, @rumble}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) [ 687.437893][T17913] device nr0 entered promiscuous mode [ 687.638428][T17957] device nr0 entered promiscuous mode 13:20:43 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x4004556e, &(0x7f0000000100)={0x3, 0x0, {0x0, 0x0, 0x0, {}, {}, @rumble}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) 13:20:43 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x405c5503, &(0x7f0000000100)={0x0, 0x0, {0x0, 0x0, 0x0, {}, {}, @rumble}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) 13:20:43 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x406855c9, &(0x7f0000000100)={0x0, 0x0, {0x0, 0x0, 0x0, {}, {}, @rumble}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) 13:20:43 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) recvmmsg(r0, &(0x7f0000001d00)=[{{0x0, 0x0, 0x0}, 0x4}, {{0x0, 0x0, 0x0}}], 0x2, 0x0, 0x0) setsockopt$SO_TIMESTAMP(r0, 0x1, 0x23, &(0x7f0000000040)=0x9, 0x4) r1 = socket$inet6(0xa, 0x80003, 0x80) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") 13:20:43 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086602, 0x0) getpid() r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_pid(r0, &(0x7f0000000000), 0x12) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000140)={0xffffffffffffffff, r1, 0x0, 0x0, 0x0}, 0x30) perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0xb, r0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) perf_event_open$cgroup(&(0x7f0000000200)={0x0, 0x70, 0x0, 0x34, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0xb102, 0x71, 0x9, 0x0, 0xfffffffe}, r0, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_type(0xffffffffffffffff, &(0x7f00000002c0)='threaded\x00', 0x9) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x7880, 0xff, 0x0, 0xffffffffffffffff, 0x12d40, [0xa003000000000000, 0x0, 0x0, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x13]}, 0x3c) 13:20:43 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x6, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000780)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000040)={'nr0\x01\x00', 0x1132}) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'nr0\x01\x00', 0x7132}) r2 = socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xb1m\x8c\xce\xf3\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb') socket$kcm(0x11, 0x0, 0x300) write$cgroup_subtree(r0, &(0x7f0000000180)=ANY=[@ANYPTR64, @ANYPTR], 0x10) close(r1) sendmsg$tipc(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) 13:20:43 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x4068aea3, &(0x7f0000000100)={0x0, 0x0, {0x0, 0x0, 0x0, {}, {}, @rumble}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) 13:20:43 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x4004556e, &(0x7f0000000100)={0x4, 0x0, {0x0, 0x0, 0x0, {}, {}, @rumble}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) 13:20:43 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x406855c9, &(0x7f0000000100)={0x0, 0x0, {0x0, 0x0, 0x0, {}, {}, @rumble}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) [ 688.364297][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 688.370143][ C1] protocol 88fb is buggy, dev hsr_slave_1 13:20:43 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x800448d2, &(0x7f0000000100)={0x0, 0x0, {0x0, 0x0, 0x0, {}, {}, @rumble}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) 13:20:43 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x4004556e, &(0x7f0000000100)={0x5, 0x0, {0x0, 0x0, 0x0, {}, {}, @rumble}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) 13:20:43 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x800454d2, &(0x7f0000000100)={0x0, 0x0, {0x0, 0x0, 0x0, {}, {}, @rumble}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) 13:20:43 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x800454d2, &(0x7f0000000100)={0x0, 0x0, {0x0, 0x0, 0x0, {}, {}, @rumble}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) 13:20:43 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x4004556e, &(0x7f0000000100)={0x6, 0x0, {0x0, 0x0, 0x0, {}, {}, @rumble}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) 13:20:43 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x8004552d, &(0x7f0000000100)={0x0, 0x0, {0x0, 0x0, 0x0, {}, {}, @rumble}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) [ 688.709093][T18066] device nr0 entered promiscuous mode 13:20:44 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) recvmmsg(r0, &(0x7f0000001d00)=[{{0x0, 0x0, 0x0}, 0x40000}, {{0x0, 0x0, 0x0}}], 0x2, 0x0, 0x0) setsockopt$SO_TIMESTAMP(r0, 0x1, 0x23, &(0x7f0000000040)=0x9, 0x4) r1 = socket$inet6(0xa, 0x80003, 0x80) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") 13:20:44 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x8004552d, &(0x7f0000000100)={0x0, 0x0, {0x0, 0x0, 0x0, {}, {}, @rumble}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) 13:20:44 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x6, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000780)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000040)={'nr0\x01\x00', 0x1132}) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'nr0\x01\x00', 0x7132}) r2 = socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xb1m\x8c\xce\xf3\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb') socket$kcm(0x11, 0x0, 0x300) write$cgroup_subtree(r0, &(0x7f0000000180)=ANY=[@ANYPTR64, @ANYPTR], 0x10) close(r1) sendmsg$tipc(0xffffffffffffffff, 0x0, 0x0) 13:20:44 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x4004556e, &(0x7f0000000100)={0x7, 0x0, {0x0, 0x0, 0x0, {}, {}, @rumble}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) 13:20:44 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x80086301, &(0x7f0000000100)={0x0, 0x0, {0x0, 0x0, 0x0, {}, {}, @rumble}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) 13:20:44 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086602, 0x0) getpid() r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_pid(r0, &(0x7f0000000000), 0x12) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000140)={0xffffffffffffffff, r1, 0x0, 0x0, 0x0}, 0x30) perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0xb, r0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) perf_event_open$cgroup(&(0x7f0000000200)={0x0, 0x70, 0x0, 0x34, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0xb102, 0x71, 0x9, 0x0, 0xfffffffe}, r0, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_type(0xffffffffffffffff, &(0x7f00000002c0)='threaded\x00', 0x9) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x7880, 0xff, 0x0, 0xffffffffffffffff, 0x12d40, [0xa003000000000000, 0x0, 0x0, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x13]}, 0x3c) 13:20:44 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x80086301, &(0x7f0000000100)={0x0, 0x0, {0x0, 0x0, 0x0, {}, {}, @rumble}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) 13:20:44 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x4004556e, &(0x7f0000000100)={0x8, 0x0, {0x0, 0x0, 0x0, {}, {}, @rumble}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) 13:20:44 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x80086601, &(0x7f0000000100)={0x0, 0x0, {0x0, 0x0, 0x0, {}, {}, @rumble}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) 13:20:44 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x80086601, &(0x7f0000000100)={0x0, 0x0, {0x0, 0x0, 0x0, {}, {}, @rumble}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) 13:20:45 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x80087601, &(0x7f0000000100)={0x0, 0x0, {0x0, 0x0, 0x0, {}, {}, @rumble}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) 13:20:45 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x80087601, &(0x7f0000000100)={0x0, 0x0, {0x0, 0x0, 0x0, {}, {}, @rumble}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) 13:20:45 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) recvmmsg(r0, &(0x7f0000001d00)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}], 0x2, 0x0, 0x0) setsockopt$SO_TIMESTAMP(r0, 0x1, 0x23, &(0x7f0000000040)=0x9, 0x4) r1 = socket$inet6(0xa, 0x80003, 0x80) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") 13:20:45 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x4004556e, &(0x7f0000000100)={0x300, 0x0, {0x0, 0x0, 0x0, {}, {}, @rumble}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) [ 690.051241][T18212] device nr0 entered promiscuous mode [ 690.444278][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 690.450175][ C1] protocol 88fb is buggy, dev hsr_slave_1 13:20:45 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x6, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000780)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000040)={'nr0\x01\x00', 0x1132}) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'nr0\x01\x00', 0x7132}) r2 = socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xb1m\x8c\xce\xf3\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb') socket$kcm(0x11, 0x0, 0x300) write$cgroup_subtree(r0, &(0x7f0000000180)=ANY=[@ANYPTR64, @ANYPTR], 0x10) close(r1) 13:20:45 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086602, 0x0) getpid() r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_pid(r0, &(0x7f0000000000), 0x12) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000140)={0xffffffffffffffff, r1, 0x0, 0x0, 0x0}, 0x30) perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0xb, r0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) perf_event_open$cgroup(&(0x7f0000000200)={0x0, 0x70, 0x0, 0x34, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0xb102, 0x71, 0x9, 0x0, 0xfffffffe}, r0, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_type(0xffffffffffffffff, &(0x7f00000002c0)='threaded\x00', 0x9) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x7880, 0xff, 0x0, 0xffffffffffffffff, 0x12d40, [0xa003000000000000, 0x0, 0x0, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x13]}, 0x3c) 13:20:45 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x8040451b, &(0x7f0000000100)={0x0, 0x0, {0x0, 0x0, 0x0, {}, {}, @rumble}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) 13:20:45 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0xc0045878, &(0x7f0000000100)={0x0, 0x0, {0x0, 0x0, 0x0, {}, {}, @rumble}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) 13:20:45 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x4004556e, &(0x7f0000000100)={0x500, 0x0, {0x0, 0x0, 0x0, {}, {}, @rumble}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) 13:20:45 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x4004556e, &(0x7f0000000100)={0x600, 0x0, {0x0, 0x0, 0x0, {}, {}, @rumble}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) 13:20:45 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0xc0045878, &(0x7f0000000100)={0x0, 0x0, {0x0, 0x0, 0x0, {}, {}, @rumble}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) 13:20:46 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0xc0045878, &(0x7f0000000100)={0x0, 0x0, {0x0, 0x0, 0x0, {}, {}, @rumble}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) 13:20:46 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x4004556e, &(0x7f0000000100)={0x700, 0x0, {0x0, 0x0, 0x0, {}, {}, @rumble}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) 13:20:46 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) recvmmsg(r0, &(0x7f0000001d00)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x4, 0x0}}], 0x2, 0x0, 0x0) setsockopt$SO_TIMESTAMP(r0, 0x1, 0x23, &(0x7f0000000040)=0x9, 0x4) r1 = socket$inet6(0xa, 0x80003, 0x80) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") 13:20:46 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0xc00c55ca, &(0x7f0000000100)={0x0, 0x0, {0x0, 0x0, 0x0, {}, {}, @rumble}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) 13:20:46 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0xc0045878, &(0x7f0000000100)={0x0, 0x0, {0x0, 0x0, 0x0, {}, {}, @rumble}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) [ 691.151894][T18251] device nr0 entered promiscuous mode 13:20:47 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x6, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000780)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000040)={'nr0\x01\x00', 0x1132}) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'nr0\x01\x00', 0x7132}) r2 = socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xb1m\x8c\xce\xf3\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb') socket$kcm(0x11, 0x0, 0x300) close(r1) 13:20:47 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x4004556e, &(0x7f0000000100)={0x2088, 0x0, {0x0, 0x0, 0x0, {}, {}, @rumble}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) 13:20:47 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0xc0106403, &(0x7f0000000100)={0x0, 0x0, {0x0, 0x0, 0x0, {}, {}, @rumble}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) 13:20:47 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086602, 0x0) getpid() r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_pid(r0, &(0x7f0000000000), 0x12) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000140)={0xffffffffffffffff, r1, 0x0, 0x0, 0x0}, 0x30) perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0xb, r0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) perf_event_open$cgroup(&(0x7f0000000200)={0x0, 0x70, 0x0, 0x34, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0xb102, 0x71, 0x9, 0x0, 0xfffffffe}, r0, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_type(0xffffffffffffffff, &(0x7f00000002c0)='threaded\x00', 0x9) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x7880, 0xff, 0x0, 0xffffffffffffffff, 0x12d40, [0xa003000000000000, 0x0, 0x0, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x13]}, 0x3c) 13:20:47 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0xc00c55ca, &(0x7f0000000100)={0x0, 0x0, {0x0, 0x0, 0x0, {}, {}, @rumble}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) 13:20:47 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x4004556e, &(0x7f0000000100)={0x4000, 0x0, {0x0, 0x0, 0x0, {}, {}, @rumble}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) 13:20:47 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0xc01064b5, &(0x7f0000000100)={0x0, 0x0, {0x0, 0x0, 0x0, {}, {}, @rumble}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) 13:20:47 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0xc0189436, &(0x7f0000000100)={0x0, 0x0, {0x0, 0x0, 0x0, {}, {}, @rumble}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) 13:20:47 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) recvmmsg(r0, &(0x7f0000001d00)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x40000, 0x0}}], 0x2, 0x0, 0x0) setsockopt$SO_TIMESTAMP(r0, 0x1, 0x23, &(0x7f0000000040)=0x9, 0x4) r1 = socket$inet6(0xa, 0x80003, 0x80) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") 13:20:47 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x4004556e, &(0x7f0000000100)={0xff00, 0x0, {0x0, 0x0, 0x0, {}, {}, @rumble}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) 13:20:47 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0xc0189436, &(0x7f0000000100)={0x0, 0x0, {0x0, 0x0, 0x0, {}, {}, @rumble}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) 13:20:47 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0xc020660b, &(0x7f0000000100)={0x0, 0x0, {0x0, 0x0, 0x0, {}, {}, @rumble}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) [ 692.258192][T18292] device nr0 entered promiscuous mode [ 692.524282][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 692.530233][ C1] protocol 88fb is buggy, dev hsr_slave_1 13:20:48 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x6, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000780)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000040)={'nr0\x01\x00', 0x1132}) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'nr0\x01\x00', 0x7132}) r2 = socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xb1m\x8c\xce\xf3\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb') close(r1) 13:20:48 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086602, 0x0) getpid() r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_pid(r0, &(0x7f0000000000), 0x12) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000140)={0xffffffffffffffff, r1, 0x0, 0x0, 0x0}, 0x30) perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0xb, r0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) perf_event_open$cgroup(&(0x7f0000000200)={0x0, 0x70, 0x0, 0x34, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0xb102, 0x71, 0x9, 0x0, 0xfffffffe}, r0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x7880, 0xff, 0x0, 0xffffffffffffffff, 0x12d40, [0xa003000000000000, 0x0, 0x0, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x13]}, 0x3c) 13:20:48 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0xc020660b, &(0x7f0000000100)={0x0, 0x0, {0x0, 0x0, 0x0, {}, {}, @rumble}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) 13:20:48 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x4004556e, &(0x7f0000000100)={0x1000000, 0x0, {0x0, 0x0, 0x0, {}, {}, @rumble}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) 13:20:48 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0xc06855c8, &(0x7f0000000100)={0x0, 0x0, {0x0, 0x0, 0x0, {}, {}, @rumble}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) 13:20:48 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x4004556e, &(0x7f0000000100)={0x2000000, 0x0, {0x0, 0x0, 0x0, {}, {}, @rumble}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) 13:20:48 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0xc028660f, &(0x7f0000000100)={0x0, 0x0, {0x0, 0x0, 0x0, {}, {}, @rumble}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) 13:20:48 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x40045564, &(0x7f0000000100)={0x0, 0x0, {0x0, 0x0, 0x0, {}, {}, @rumble}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) 13:20:48 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) recvmmsg(r0, &(0x7f0000001d00)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0, 0x4}}], 0x2, 0x0, 0x0) setsockopt$SO_TIMESTAMP(r0, 0x1, 0x23, &(0x7f0000000040)=0x9, 0x4) r1 = socket$inet6(0xa, 0x80003, 0x80) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") 13:20:48 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086602, 0x0) getpid() r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_pid(r0, &(0x7f0000000000), 0x12) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000140)={0xffffffffffffffff, r1, 0x0, 0x0, 0x0}, 0x30) perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0xb, r0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x7880, 0xff, 0x0, 0xffffffffffffffff, 0x12d40, [0xa003000000000000, 0x0, 0x0, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x13]}, 0x3c) 13:20:48 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x4004556e, &(0x7f0000000100)={0x3000000, 0x0, {0x0, 0x0, 0x0, {}, {}, @rumble}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) 13:20:48 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0xc0404309, &(0x7f0000000100)={0x0, 0x0, {0x0, 0x0, 0x0, {}, {}, @rumble}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) [ 693.409600][T18329] device nr0 entered promiscuous mode 13:20:49 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x6, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000780)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000040)={'nr0\x01\x00', 0x1132}) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'nr0\x01\x00', 0x7132}) socket$kcm(0x29, 0x5, 0x0) close(r1) 13:20:49 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x40045564, &(0x7f0000000100)={0x2, 0x0, {0x0, 0x0, 0x0, {}, {}, @rumble}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) 13:20:49 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0xc058560f, &(0x7f0000000100)={0x0, 0x0, {0x0, 0x0, 0x0, {}, {}, @rumble}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) 13:20:49 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x4004556e, &(0x7f0000000100)={0x4000000, 0x0, {0x0, 0x0, 0x0, {}, {}, @rumble}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) 13:20:49 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086602, 0x0) getpid() r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_pid(r0, &(0x7f0000000000), 0x12) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000140)={0xffffffffffffffff, r1, 0x0, 0x0, 0x0}, 0x30) perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0xb, r0, 0x0) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x7880, 0xff, 0x0, 0xffffffffffffffff, 0x12d40, [0xa003000000000000, 0x0, 0x0, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x13]}, 0x3c) 13:20:49 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) recvmmsg(r0, &(0x7f0000001d00)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0, 0x40000}}], 0x2, 0x0, 0x0) setsockopt$SO_TIMESTAMP(r0, 0x1, 0x23, &(0x7f0000000040)=0x9, 0x4) r1 = socket$inet6(0xa, 0x80003, 0x80) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") 13:20:49 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x4004556e, &(0x7f0000000100)={0x5000000, 0x0, {0x0, 0x0, 0x0, {}, {}, @rumble}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) 13:20:49 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0xc06855c8, &(0x7f0000000100)={0x0, 0x0, {0x0, 0x0, 0x0, {}, {}, @rumble}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) 13:20:49 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x40045564, &(0x7f0000000100)={0x3, 0x0, {0x0, 0x0, 0x0, {}, {}, @rumble}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) 13:20:49 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x4004556e, &(0x7f0000000100)={0x6000000, 0x0, {0x0, 0x0, 0x0, {}, {}, @rumble}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) 13:20:49 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086602, 0x0) getpid() r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_pid(r0, &(0x7f0000000000), 0x12) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000140)={0xffffffffffffffff, r1, 0x0, 0x0, 0x0}, 0x30) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x7880, 0xff, 0x0, 0xffffffffffffffff, 0x12d40, [0xa003000000000000, 0x0, 0x0, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x13]}, 0x3c) 13:20:49 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0xc080661a, &(0x7f0000000100)={0x0, 0x0, {0x0, 0x0, 0x0, {}, {}, @rumble}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) [ 694.604289][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 694.610223][ C1] protocol 88fb is buggy, dev hsr_slave_1 13:20:49 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x6, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000780)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000040)={'nr0\x01\x00', 0x1132}) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'nr0\x01\x00', 0x7132}) close(r1) 13:20:49 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x40045564, &(0x7f0000000100)={0x4, 0x0, {0x0, 0x0, 0x0, {}, {}, @rumble}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) 13:20:49 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x4004556d, &(0x7f0000000100)={0x0, 0x0, {0x0, 0x0, 0x0, {}, {}, @rumble}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) 13:20:49 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x4004556e, &(0x7f0000000100)={0x7000000, 0x0, {0x0, 0x0, 0x0, {}, {}, @rumble}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) 13:20:50 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086602, 0x0) getpid() perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_pid(r0, &(0x7f0000000000), 0x12) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x7880, 0xff, 0x0, 0xffffffffffffffff, 0x12d40, [0xa003000000000000, 0x0, 0x0, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x13]}, 0x3c) 13:20:50 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) recvmmsg(r0, &(0x7f0000001d00)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0, 0x4000000000000}}], 0x2, 0x0, 0x0) setsockopt$SO_TIMESTAMP(r0, 0x1, 0x23, &(0x7f0000000040)=0x9, 0x4) r1 = socket$inet6(0xa, 0x80003, 0x80) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") 13:20:50 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x40045564, &(0x7f0000000100)={0x5, 0x0, {0x0, 0x0, 0x0, {}, {}, @rumble}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) 13:20:50 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x4004556d, &(0x7f0000000100)={0x2, 0x0, {0x0, 0x0, 0x0, {}, {}, @rumble}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) 13:20:50 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x4004556e, &(0x7f0000000100)={0x8000000, 0x0, {0x0, 0x0, 0x0, {}, {}, @rumble}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) 13:20:50 executing program 0: openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x6, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000780)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'nr0\x01\x00', 0x1132}) close(r0) 13:20:50 executing program 4: openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086602, 0x0) getpid() perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x7880, 0xff, 0x0, 0xffffffffffffffff, 0x12d40, [0xa003000000000000, 0x0, 0x0, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x13]}, 0x3c) 13:20:50 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x4004556d, &(0x7f0000000100)={0x3, 0x0, {0x0, 0x0, 0x0, {}, {}, @rumble}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) 13:20:50 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x4004556e, &(0x7f0000000100)={0x40000000, 0x0, {0x0, 0x0, 0x0, {}, {}, @rumble}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) 13:20:50 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x40045564, &(0x7f0000000100)={0x6, 0x0, {0x0, 0x0, 0x0, {}, {}, @rumble}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) 13:20:50 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x4004556d, &(0x7f0000000100)={0x4, 0x0, {0x0, 0x0, 0x0, {}, {}, @rumble}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) 13:20:50 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x4004556e, &(0x7f0000000100)={0x88200000, 0x0, {0x0, 0x0, 0x0, {}, {}, @rumble}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) 13:20:51 executing program 0: openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x6, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000780)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'nr0\x01\x00', 0x1132}) close(r0) 13:20:51 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) recvmmsg(r0, &(0x7f0000001d00)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0, 0x0, 0x0, 0x4}}], 0x2, 0x0, 0x0) setsockopt$SO_TIMESTAMP(r0, 0x1, 0x23, &(0x7f0000000040)=0x9, 0x4) r1 = socket$inet6(0xa, 0x80003, 0x80) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") 13:20:51 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x40045564, &(0x7f0000000100)={0x7, 0x0, {0x0, 0x0, 0x0, {}, {}, @rumble}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) 13:20:51 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x4004556d, &(0x7f0000000100)={0x5, 0x0, {0x0, 0x0, 0x0, {}, {}, @rumble}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) 13:20:51 executing program 4: openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086602, 0x0) getpid() bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x7880, 0xff, 0x0, 0xffffffffffffffff, 0x12d40, [0xa003000000000000, 0x0, 0x0, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x13]}, 0x3c) 13:20:51 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x4004556e, &(0x7f0000000100)={0xff000000, 0x0, {0x0, 0x0, 0x0, {}, {}, @rumble}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) 13:20:51 executing program 0: openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x6, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000780)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'nr0\x01\x00', 0x1132}) close(r0) 13:20:51 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x4004556e, &(0x7f0000000100)={0xffffff7f, 0x0, {0x0, 0x0, 0x0, {}, {}, @rumble}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) 13:20:51 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x4004556d, &(0x7f0000000100)={0x6, 0x0, {0x0, 0x0, 0x0, {}, {}, @rumble}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) 13:20:51 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x40045564, &(0x7f0000000100)={0x8, 0x0, {0x0, 0x0, 0x0, {}, {}, @rumble}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) 13:20:51 executing program 4: openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086602, 0x0) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x7880, 0xff, 0x0, 0xffffffffffffffff, 0x12d40, [0xa003000000000000, 0x0, 0x0, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x13]}, 0x3c) 13:20:51 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x4004556d, &(0x7f0000000100)={0x7, 0x0, {0x0, 0x0, 0x0, {}, {}, @rumble}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) 13:20:51 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x4004556e, &(0x7f0000000100)={0xffffffff, 0x0, {0x0, 0x0, 0x0, {}, {}, @rumble}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) [ 696.684297][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 696.690301][ C1] protocol 88fb is buggy, dev hsr_slave_1 13:20:52 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x6, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000780)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'nr0\x01\x00', 0x7132}) close(r1) 13:20:52 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x40045564, &(0x7f0000000100)={0x300, 0x0, {0x0, 0x0, 0x0, {}, {}, @rumble}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) 13:20:52 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x4004556e, &(0x7f0000000100)={0x0, 0x0, {0x0, 0x0, 0x0, {}, {}, @rumble}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) 13:20:52 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x4004556d, &(0x7f0000000100)={0x8, 0x0, {0x0, 0x0, 0x0, {}, {}, @rumble}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) 13:20:52 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) recvmmsg(r0, &(0x7f0000001d00)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0, 0x0, 0x0, 0x40000}}], 0x2, 0x0, 0x0) setsockopt$SO_TIMESTAMP(r0, 0x1, 0x23, &(0x7f0000000040)=0x9, 0x4) r1 = socket$inet6(0xa, 0x80003, 0x80) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") 13:20:52 executing program 4: openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x7880, 0xff, 0x0, 0xffffffffffffffff, 0x12d40, [0xa003000000000000, 0x0, 0x0, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x13]}, 0x3c) 13:20:52 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x4004556d, &(0x7f0000000100)={0x300, 0x0, {0x0, 0x0, 0x0, {}, {}, @rumble}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) 13:20:52 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x40045564, &(0x7f0000000100)={0x500, 0x0, {0x0, 0x0, 0x0, {}, {}, @rumble}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) 13:20:52 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x4004556e, &(0x7f0000000100)={0x0, 0x2, {0x0, 0x0, 0x0, {}, {}, @rumble}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) [ 697.404334][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 697.410175][ C0] protocol 88fb is buggy, dev hsr_slave_1 13:20:52 executing program 4: bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x7880, 0xff, 0x0, 0xffffffffffffffff, 0x12d40, [0xa003000000000000, 0x0, 0x0, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x13]}, 0x3c) 13:20:52 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x40045564, &(0x7f0000000100)={0x600, 0x0, {0x0, 0x0, 0x0, {}, {}, @rumble}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) 13:20:52 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x6, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000780)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'nr0\x01\x00', 0x7132}) close(r1) 13:20:52 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x4004556d, &(0x7f0000000100)={0x500, 0x0, {0x0, 0x0, 0x0, {}, {}, @rumble}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) 13:20:52 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x4004556e, &(0x7f0000000100)={0x0, 0x3, {0x0, 0x0, 0x0, {}, {}, @rumble}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) 13:20:53 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x40045564, &(0x7f0000000100)={0x700, 0x0, {0x0, 0x0, 0x0, {}, {}, @rumble}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) 13:20:53 executing program 4: bpf$MAP_CREATE(0x405a020000000000, 0x0, 0x0) 13:20:53 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x4004556d, &(0x7f0000000100)={0x600, 0x0, {0x0, 0x0, 0x0, {}, {}, @rumble}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) 13:20:53 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x4004556e, &(0x7f0000000100)={0x0, 0x4, {0x0, 0x0, 0x0, {}, {}, @rumble}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) 13:20:53 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x40045564, &(0x7f0000000100)={0x2088, 0x0, {0x0, 0x0, 0x0, {}, {}, @rumble}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) 13:20:53 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) recvmmsg(r0, &(0x7f0000001d00)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000000}}], 0x2, 0x0, 0x0) setsockopt$SO_TIMESTAMP(r0, 0x1, 0x23, &(0x7f0000000040)=0x9, 0x4) r1 = socket$inet6(0xa, 0x80003, 0x80) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") 13:20:53 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x6, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000780)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'nr0\x01\x00', 0x7132}) close(r1) 13:20:53 executing program 4: bpf$MAP_CREATE(0x405a020000000000, 0x0, 0x0) 13:20:53 executing program 4: bpf$MAP_CREATE(0x405a020000000000, 0x0, 0x0) 13:20:53 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x4004556e, &(0x7f0000000100)={0x0, 0x5, {0x0, 0x0, 0x0, {}, {}, @rumble}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) [ 698.364282][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 698.370254][ C1] protocol 88fb is buggy, dev hsr_slave_1 13:20:53 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x4004556d, &(0x7f0000000100)={0x700, 0x0, {0x0, 0x0, 0x0, {}, {}, @rumble}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) 13:20:53 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x40045564, &(0x7f0000000100)={0x3f00, 0x0, {0x0, 0x0, 0x0, {}, {}, @rumble}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) 13:20:53 executing program 4: bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x0, 0x1ff, 0x7880, 0xff, 0x0, 0xffffffffffffffff, 0x12d40, [0xa003000000000000, 0x0, 0x0, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x13]}, 0x3c) [ 698.444327][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 698.450176][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 698.456063][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 698.461857][ C0] protocol 88fb is buggy, dev hsr_slave_1 13:20:53 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) recvmmsg(r0, &(0x7f0000001d00)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}], 0x2, 0x0, 0x0) setsockopt$SO_TIMESTAMP(r0, 0x1, 0x23, &(0x7f0000000040)=0x9, 0x4) r1 = socket$inet6(0xa, 0x80003, 0x80) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") 13:20:53 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x6, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000040)={'nr0\x01\x00', 0x1132}) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'nr0\x01\x00', 0x7132}) close(0xffffffffffffffff) 13:20:53 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x4004556e, &(0x7f0000000100)={0x0, 0x6, {0x0, 0x0, 0x0, {}, {}, @rumble}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) 13:20:53 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x4004556d, &(0x7f0000000100)={0x2088, 0x0, {0x0, 0x0, 0x0, {}, {}, @rumble}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) 13:20:53 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x40045564, &(0x7f0000000100)={0x4000, 0x0, {0x0, 0x0, 0x0, {}, {}, @rumble}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) 13:20:53 executing program 4: bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x0, 0x1ff, 0x7880, 0xff, 0x0, 0xffffffffffffffff, 0x12d40, [0xa003000000000000, 0x0, 0x0, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x13]}, 0x3c) 13:20:54 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x4004556e, &(0x7f0000000100)={0x0, 0x7, {0x0, 0x0, 0x0, {}, {}, @rumble}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) 13:20:54 executing program 4: bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x0, 0x1ff, 0x7880, 0xff, 0x0, 0xffffffffffffffff, 0x12d40, [0xa003000000000000, 0x0, 0x0, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x13]}, 0x3c) 13:20:54 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x4004556d, &(0x7f0000000100)={0x3f00, 0x0, {0x0, 0x0, 0x0, {}, {}, @rumble}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) 13:20:54 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x40045564, &(0x7f0000000100)={0xff00, 0x0, {0x0, 0x0, 0x0, {}, {}, @rumble}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) 13:20:54 executing program 4: bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x0, 0x7880, 0xff, 0x0, 0xffffffffffffffff, 0x12d40, [0xa003000000000000, 0x0, 0x0, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x13]}, 0x3c) 13:20:54 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x4004556e, &(0x7f0000000100)={0x0, 0x8, {0x0, 0x0, 0x0, {}, {}, @rumble}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) 13:20:54 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x40045564, &(0x7f0000000100)={0x1000000, 0x0, {0x0, 0x0, 0x0, {}, {}, @rumble}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) 13:20:54 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x6, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000040)={'nr0\x01\x00', 0x1132}) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'nr0\x01\x00', 0x7132}) close(0xffffffffffffffff) 13:20:54 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x4004556d, &(0x7f0000000100)={0x4000, 0x0, {0x0, 0x0, 0x0, {}, {}, @rumble}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) 13:20:54 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) recvmmsg(r0, &(0x7f0000001d00)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}}], 0x2, 0x0, 0x0) setsockopt$SO_TIMESTAMP(r0, 0x1, 0x23, &(0x7f0000000040)=0x9, 0x4) r1 = socket$inet6(0xa, 0x80003, 0x80) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") 13:20:54 executing program 4: bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x0, 0x7880, 0xff, 0x0, 0xffffffffffffffff, 0x12d40, [0xa003000000000000, 0x0, 0x0, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x13]}, 0x3c) 13:20:54 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x4004556e, &(0x7f0000000100)={0x0, 0x300, {0x0, 0x0, 0x0, {}, {}, @rumble}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) 13:20:54 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x40045564, &(0x7f0000000100)={0x2000000, 0x0, {0x0, 0x0, 0x0, {}, {}, @rumble}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) 13:20:54 executing program 4: bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x0, 0x7880, 0xff, 0x0, 0xffffffffffffffff, 0x12d40, [0xa003000000000000, 0x0, 0x0, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x13]}, 0x3c) 13:20:54 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x4004556d, &(0x7f0000000100)={0xff00, 0x0, {0x0, 0x0, 0x0, {}, {}, @rumble}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) 13:20:54 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x4004556e, &(0x7f0000000100)={0x0, 0x500, {0x0, 0x0, 0x0, {}, {}, @rumble}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) 13:20:55 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x40045564, &(0x7f0000000100)={0x3000000, 0x0, {0x0, 0x0, 0x0, {}, {}, @rumble}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) 13:20:55 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x6, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000040)={'nr0\x01\x00', 0x1132}) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'nr0\x01\x00', 0x7132}) close(0xffffffffffffffff) 13:20:55 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x4004556d, &(0x7f0000000100)={0x2000a0, 0x0, {0x0, 0x0, 0x0, {}, {}, @rumble}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) 13:20:55 executing program 4: bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x0, 0xff, 0x0, 0xffffffffffffffff, 0x12d40, [0xa003000000000000, 0x0, 0x0, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x13]}, 0x3c) 13:20:55 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x4004556e, &(0x7f0000000100)={0x0, 0x600, {0x0, 0x0, 0x0, {}, {}, @rumble}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) 13:20:55 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) recvmmsg(r0, &(0x7f0000001d00)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000}}], 0x2, 0x0, 0x0) setsockopt$SO_TIMESTAMP(r0, 0x1, 0x23, &(0x7f0000000040)=0x9, 0x4) r1 = socket$inet6(0xa, 0x80003, 0x80) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") 13:20:55 executing program 4: bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x0, 0xff, 0x0, 0xffffffffffffffff, 0x12d40, [0xa003000000000000, 0x0, 0x0, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x13]}, 0x3c) 13:20:55 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x4004556e, &(0x7f0000000100)={0x0, 0x700, {0x0, 0x0, 0x0, {}, {}, @rumble}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) 13:20:55 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x40045564, &(0x7f0000000100)={0x4000000, 0x0, {0x0, 0x0, 0x0, {}, {}, @rumble}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) 13:20:55 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x4004556d, &(0x7f0000000100)={0x1000000, 0x0, {0x0, 0x0, 0x0, {}, {}, @rumble}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) 13:20:55 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000780)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'nr0\x01\x00', 0x1132}) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000000)={'nr0\x01\x00', 0x7132}) close(r0) 13:20:55 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x40045564, &(0x7f0000000100)={0x5000000, 0x0, {0x0, 0x0, 0x0, {}, {}, @rumble}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) 13:20:55 executing program 4: bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x0, 0xff, 0x0, 0xffffffffffffffff, 0x12d40, [0xa003000000000000, 0x0, 0x0, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x13]}, 0x3c) 13:20:55 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x4004556e, &(0x7f0000000100)={0x0, 0x2088, {0x0, 0x0, 0x0, {}, {}, @rumble}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) 13:20:55 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x4004556d, &(0x7f0000000100)={0x2000000, 0x0, {0x0, 0x0, 0x0, {}, {}, @rumble}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) 13:20:55 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x40045564, &(0x7f0000000100)={0x6000000, 0x0, {0x0, 0x0, 0x0, {}, {}, @rumble}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) 13:20:56 executing program 4: bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x7880, 0x0, 0x0, 0xffffffffffffffff, 0x12d40, [0xa003000000000000, 0x0, 0x0, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x13]}, 0x3c) 13:20:56 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) recvmmsg(r0, &(0x7f0000001d00)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}], 0x2, 0x0, 0x0) setsockopt$SO_TIMESTAMP(r0, 0x1, 0x23, &(0x7f0000000040)=0x9, 0x4) r1 = socket$inet6(0xa, 0x80003, 0x80) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") 13:20:56 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x4004556d, &(0x7f0000000100)={0x3000000, 0x0, {0x0, 0x0, 0x0, {}, {}, @rumble}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) 13:20:56 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x4004556e, &(0x7f0000000100)={0x0, 0x4000, {0x0, 0x0, 0x0, {}, {}, @rumble}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) 13:20:56 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000780)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'nr0\x01\x00', 0x1132}) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000000)={'nr0\x01\x00', 0x7132}) close(r0) 13:20:56 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x40045564, &(0x7f0000000100)={0x7000000, 0x0, {0x0, 0x0, 0x0, {}, {}, @rumble}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) 13:20:56 executing program 4: bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x7880, 0x0, 0x0, 0xffffffffffffffff, 0x12d40, [0xa003000000000000, 0x0, 0x0, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x13]}, 0x3c) 13:20:56 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x40045564, &(0x7f0000000100)={0x8000000, 0x0, {0x0, 0x0, 0x0, {}, {}, @rumble}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) 13:20:56 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x4004556d, &(0x7f0000000100)={0x4000000, 0x0, {0x0, 0x0, 0x0, {}, {}, @rumble}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) 13:20:56 executing program 4: bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x7880, 0x0, 0x0, 0xffffffffffffffff, 0x12d40, [0xa003000000000000, 0x0, 0x0, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x13]}, 0x3c) 13:20:56 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x4004556e, &(0x7f0000000100)={0x0, 0xff00, {0x0, 0x0, 0x0, {}, {}, @rumble}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) 13:20:57 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x40045564, &(0x7f0000000100)={0x3f000000, 0x0, {0x0, 0x0, 0x0, {}, {}, @rumble}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) 13:20:57 executing program 4: bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x7880, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000, 0x0, 0x0, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x13]}, 0x3c) 13:20:57 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) recvmmsg(r0, &(0x7f0000001d00)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}, 0x4}], 0x2, 0x0, 0x0) setsockopt$SO_TIMESTAMP(r0, 0x1, 0x23, &(0x7f0000000040)=0x9, 0x4) r1 = socket$inet6(0xa, 0x80003, 0x80) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") 13:20:57 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x4004556e, &(0x7f0000000100)={0x0, 0x1000000, {0x0, 0x0, 0x0, {}, {}, @rumble}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) 13:20:57 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000780)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'nr0\x01\x00', 0x1132}) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000000)={'nr0\x01\x00', 0x7132}) close(r0) 13:20:57 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x4004556d, &(0x7f0000000100)={0x5000000, 0x0, {0x0, 0x0, 0x0, {}, {}, @rumble}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) 13:20:57 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x40045564, &(0x7f0000000100)={0x40000000, 0x0, {0x0, 0x0, 0x0, {}, {}, @rumble}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) 13:20:57 executing program 4: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x6, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000780)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000040)={'nr0\x01\x00', 0x1132}) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'nr0\x01\x00', 0x7132}) r2 = socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xb1m\x8c\xce\xf3\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb') write$cgroup_subtree(r0, &(0x7f0000000180)=ANY=[@ANYPTR64, @ANYPTR], 0x10) close(r1) getpid() perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) gettid() 13:20:57 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x40045564, &(0x7f0000000100)={0x88200000, 0x0, {0x0, 0x0, 0x0, {}, {}, @rumble}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) 13:20:57 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x4004556e, &(0x7f0000000100)={0x0, 0x2000000, {0x0, 0x0, 0x0, {}, {}, @rumble}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) 13:20:57 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x4004556d, &(0x7f0000000100)={0x6000000, 0x0, {0x0, 0x0, 0x0, {}, {}, @rumble}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) 13:20:58 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x40045564, &(0x7f0000000100)={0xff000000, 0x0, {0x0, 0x0, 0x0, {}, {}, @rumble}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) 13:20:58 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x4004556d, &(0x7f0000000100)={0x7000000, 0x0, {0x0, 0x0, 0x0, {}, {}, @rumble}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) 13:20:58 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x4004556e, &(0x7f0000000100)={0x0, 0x3000000, {0x0, 0x0, 0x0, {}, {}, @rumble}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) [ 702.924284][ C1] net_ratelimit: 6 callbacks suppressed [ 702.924293][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 702.935817][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 702.954037][T18736] device nr0 entered promiscuous mode 13:20:58 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) recvmmsg(r0, &(0x7f0000001d00)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}, 0x40000}], 0x2, 0x0, 0x0) setsockopt$SO_TIMESTAMP(r0, 0x1, 0x23, &(0x7f0000000040)=0x9, 0x4) r1 = socket$inet6(0xa, 0x80003, 0x80) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") 13:20:58 executing program 0: r0 = openat$tun(0xffffffffffffff9c, 0x0, 0x6, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000780)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000040)={'nr0\x01\x00', 0x1132}) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'nr0\x01\x00', 0x7132}) close(r1) 13:20:58 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x4004556d, &(0x7f0000000100)={0x8000000, 0x0, {0x0, 0x0, 0x0, {}, {}, @rumble}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) 13:20:58 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x40045564, &(0x7f0000000100)={0xffffff7f, 0x0, {0x0, 0x0, 0x0, {}, {}, @rumble}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) 13:20:58 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x4004556e, &(0x7f0000000100)={0x0, 0x4000000, {0x0, 0x0, 0x0, {}, {}, @rumble}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) 13:20:58 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_TIOCINQ(0xffffffffffffffff, 0x541b, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x0, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000400)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r2, @ANYBLOB="0000000000000000280012000c000100766574680000000018000200fd0001000000000023c0306554362dddcb892ef8051404bde5bf296e3c566a03d724f7ead1ef33adfdbe08b8c5236b93b9797b4409f6e370d1515d2e1fa63259e6d4bd05772981", @ANYRES32=0x0, @ANYBLOB="00000079abd1932a"], 0x48}}, 0x0) 13:20:58 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x4004556e, &(0x7f0000000100)={0x0, 0x5000000, {0x0, 0x0, 0x0, {}, {}, @rumble}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) 13:20:58 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x4004556d, &(0x7f0000000100)={0x3f000000, 0x0, {0x0, 0x0, 0x0, {}, {}, @rumble}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) 13:20:58 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x40045564, &(0x7f0000000100)={0xffffffff, 0x0, {0x0, 0x0, 0x0, {}, {}, @rumble}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) [ 703.767982][T18878] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.4'. 13:20:59 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x4004556e, &(0x7f0000000100)={0x0, 0x6000000, {0x0, 0x0, 0x0, {}, {}, @rumble}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) 13:20:59 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x40045564, &(0x7f0000000100)={0x0, 0x0, {0x0, 0x0, 0x0, {}, {}, @rumble}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) 13:20:59 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x4004556d, &(0x7f0000000100)={0x40000000, 0x0, {0x0, 0x0, 0x0, {}, {}, @rumble}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) 13:20:59 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) recvmmsg(r0, &(0x7f0000001d00)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}], 0x2, 0x4, 0x0) setsockopt$SO_TIMESTAMP(r0, 0x1, 0x23, &(0x7f0000000040)=0x9, 0x4) r1 = socket$inet6(0xa, 0x80003, 0x80) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") 13:20:59 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x4004556e, &(0x7f0000000100)={0x0, 0x7000000, {0x0, 0x0, 0x0, {}, {}, @rumble}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) 13:20:59 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x40045564, &(0x7f0000000100)={0x0, 0x2, {0x0, 0x0, 0x0, {}, {}, @rumble}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) 13:20:59 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x4004556d, &(0x7f0000000100)={0x88200000, 0x0, {0x0, 0x0, 0x0, {}, {}, @rumble}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) 13:20:59 executing program 0: r0 = openat$tun(0xffffffffffffff9c, 0x0, 0x6, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000780)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000040)={'nr0\x01\x00', 0x1132}) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'nr0\x01\x00', 0x7132}) close(r1) 13:20:59 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_TIOCINQ(0xffffffffffffffff, 0x541b, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x0, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000400)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r2, @ANYBLOB="0000000000000000280012000c000100766574680000000018000200fd0001000000000023c0306554362dddcb892ef8051404bde5bf296e3c566a03d724f7ead1ef33adfdbe08b8c5236b93b9797b4409f6e370d1515d2e1fa63259e6d4bd05772981", @ANYRES32=0x0, @ANYBLOB="00000079abd1932a"], 0x48}}, 0x0) 13:20:59 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x4004556e, &(0x7f0000000100)={0x0, 0x8000000, {0x0, 0x0, 0x0, {}, {}, @rumble}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) [ 704.670906][T19007] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.4'. 13:20:59 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x40045564, &(0x7f0000000100)={0x0, 0x3, {0x0, 0x0, 0x0, {}, {}, @rumble}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) 13:20:59 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x4004556d, &(0x7f0000000100)={0xa0002000, 0x0, {0x0, 0x0, 0x0, {}, {}, @rumble}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) 13:21:00 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x4004556d, &(0x7f0000000100)={0xff000000, 0x0, {0x0, 0x0, 0x0, {}, {}, @rumble}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) 13:21:00 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x4004556e, &(0x7f0000000100)={0x0, 0x40000000, {0x0, 0x0, 0x0, {}, {}, @rumble}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) 13:21:00 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x40045564, &(0x7f0000000100)={0x0, 0x4, {0x0, 0x0, 0x0, {}, {}, @rumble}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) [ 705.004287][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 705.010470][ C1] protocol 88fb is buggy, dev hsr_slave_1 13:21:00 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) recvmmsg(r0, &(0x7f0000001d00)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}], 0x2, 0x40000, 0x0) setsockopt$SO_TIMESTAMP(r0, 0x1, 0x23, &(0x7f0000000040)=0x9, 0x4) r1 = socket$inet6(0xa, 0x80003, 0x80) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") 13:21:00 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x4004556e, &(0x7f0000000100)={0x0, 0x88200000, {0x0, 0x0, 0x0, {}, {}, @rumble}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) 13:21:00 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x4004556d, &(0x7f0000000100)={0xffffff7f, 0x0, {0x0, 0x0, 0x0, {}, {}, @rumble}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) 13:21:00 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x40045564, &(0x7f0000000100)={0x0, 0x5, {0x0, 0x0, 0x0, {}, {}, @rumble}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) 13:21:00 executing program 0: r0 = openat$tun(0xffffffffffffff9c, 0x0, 0x6, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000780)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000040)={'nr0\x01\x00', 0x1132}) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'nr0\x01\x00', 0x7132}) close(r1) 13:21:00 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x40045564, &(0x7f0000000100)={0x0, 0x6, {0x0, 0x0, 0x0, {}, {}, @rumble}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) 13:21:00 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086602, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x9d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 13:21:00 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x4004556e, &(0x7f0000000100)={0x0, 0xff000000, {0x0, 0x0, 0x0, {}, {}, @rumble}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) 13:21:00 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x4004556d, &(0x7f0000000100)={0xffffffff, 0x0, {0x0, 0x0, 0x0, {}, {}, @rumble}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) 13:21:00 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) recvmmsg(r0, &(0x7f0000001d00)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}], 0x2, 0x4000000000000, 0x0) setsockopt$SO_TIMESTAMP(r0, 0x1, 0x23, &(0x7f0000000040)=0x9, 0x4) r1 = socket$inet6(0xa, 0x80003, 0x80) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") 13:21:00 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x40045564, &(0x7f0000000100)={0x0, 0x7, {0x0, 0x0, 0x0, {}, {}, @rumble}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) 13:21:00 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x4004556e, &(0x7f0000000100)={0x0, 0xffffff7f, {0x0, 0x0, 0x0, {}, {}, @rumble}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) [ 705.724326][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 705.730277][ C0] protocol 88fb is buggy, dev hsr_slave_1 13:21:00 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x4004556d, &(0x7f0000000100)={0x0, 0x0, {0x0, 0x0, 0x0, {}, {}, @rumble}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) 13:21:00 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x40045564, &(0x7f0000000100)={0x0, 0x8, {0x0, 0x0, 0x0, {}, {}, @rumble}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) 13:21:01 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000780)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000040)={'nr0\x01\x00', 0x1132}) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'nr0\x01\x00', 0x7132}) close(r1) 13:21:01 executing program 4: r0 = socket$kcm(0x11, 0x200000000000002, 0x300) r1 = socket$kcm(0x11, 0x2, 0x0) setsockopt$sock_attach_bpf(r0, 0x107, 0x12, &(0x7f00000000c0)=r1, 0x4) 13:21:01 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x4004556e, &(0x7f0000000100)={0x0, 0xffffffff, {0x0, 0x0, 0x0, {}, {}, @rumble}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) 13:21:01 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x4004556d, &(0x7f0000000100)={0x0, 0x2, {0x0, 0x0, 0x0, {}, {}, @rumble}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) 13:21:01 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x40045564, &(0x7f0000000100)={0x0, 0x300, {0x0, 0x0, 0x0, {}, {}, @rumble}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) 13:21:01 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x4004556e, &(0x7f0000000100)={0x0, 0x0, {0x0, 0x0, 0x0, {}, {}, @rumble}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) 13:21:01 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x4004556d, &(0x7f0000000100)={0x0, 0x3, {0x0, 0x0, 0x0, {}, {}, @rumble}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) 13:21:01 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) r1 = socket$inet(0xa, 0x801, 0x84) connect$inet(r1, &(0x7f0000004cc0)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r1, 0x84, 0x9, &(0x7f00000000c0)={0x0, @in={{0x2, 0x0, @rand_addr=0xac14ffbb}}}, &(0x7f0000000180)=0x98) r2 = socket$inet(0xa, 0x801, 0x84) connect$inet(r2, &(0x7f0000004cc0)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r2, 0x84, 0x9, &(0x7f00000000c0)={0x0, @in={{0x2, 0x0, @rand_addr=0xac14ffbb}}}, &(0x7f0000000180)=0x98) recvmmsg(r2, &(0x7f0000001d00)=[{{0x0, 0x0, 0x0}, 0xffffffff}, {{0x0, 0x0, 0x0, 0xfffffffffffffdf4}}], 0x2, 0x40002000, 0x0) setsockopt$SO_TIMESTAMP(r0, 0x1, 0x23, &(0x7f0000000040)=0x9, 0x4) r3 = socket$inet6(0xa, 0x80003, 0x80) ioctl(r3, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") ioctl$sock_SIOCBRADDBR(r0, 0x89a0, &(0x7f0000000000)='bcsh0\x00') 13:21:01 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x40045564, &(0x7f0000000100)={0x0, 0x500, {0x0, 0x0, 0x0, {}, {}, @rumble}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) 13:21:01 executing program 4: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$inet_udp(0x2, 0x2, 0x0) close(r4) socket(0x10, 0x802, 0x0) write(0xffffffffffffffff, &(0x7f0000000140)="fc0000001c00071bab092500090007000aab06000000000000004c93210001", 0xfffffffffffffcd1) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r4, 0x0, 0x10001, 0x0) 13:21:01 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) r1 = openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000040)={'nr0\x01\x00', 0x1132}) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'nr0\x01\x00', 0x7132}) close(r1) 13:21:01 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x4004556d, &(0x7f0000000100)={0x0, 0x4, {0x0, 0x0, 0x0, {}, {}, @rumble}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) 13:21:01 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x4004556e, &(0x7f0000000100)={0x0, 0x0, {0x2, 0x0, 0x0, {}, {}, @rumble}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) 13:21:01 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x40045564, &(0x7f0000000100)={0x0, 0x600, {0x0, 0x0, 0x0, {}, {}, @rumble}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) 13:21:01 executing program 4: syz_emit_ethernet(0x66, &(0x7f0000000400)={@link_local, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, 'f`Q', 0x30, 0x33, 0x0, @initdev={0xfe, 0x88, [0xa0], 0x0, 0x0}, @mcast2={0xff, 0x2, [0x0, 0xfffffffffffff000]}, {[], @icmpv6=@time_exceed={0x3, 0x0, 0x0, 0x0, [], {0x0, 0x6, "aecb98", 0x0, 0x0, 0x0, @local, @local}}}}}}}, 0x0) [ 706.684330][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 706.690174][ C1] protocol 88fb is buggy, dev hsr_slave_1 13:21:01 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x4004556e, &(0x7f0000000100)={0x0, 0x0, {0x3, 0x0, 0x0, {}, {}, @rumble}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) 13:21:01 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x4004556d, &(0x7f0000000100)={0x0, 0x5, {0x0, 0x0, 0x0, {}, {}, @rumble}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) 13:21:01 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x40045564, &(0x7f0000000100)={0x0, 0x700, {0x0, 0x0, 0x0, {}, {}, @rumble}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) [ 706.764370][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 706.770208][ C0] protocol 88fb is buggy, dev hsr_slave_1 13:21:02 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r2 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/raw6\x00HT\xf4\xfa\x92\xcaH\x1ci\xccui\x13W}9\x00ah\xde\x84\xf0\xbdU\x96\xbd11=*w\x81\x8d\x1c\x82\x04\x99n\xdf\xbcD\xe6{\t\x04\xaf\x92W\x00\xe4wt&\xff-\xae\x19\x9b\x97\nS\xe5\xafu_s\xf6\xf7\x14P\a\xe3\xc0\xed\xe28F/S\xcc\xcc\xeae\r\x97Z\xd1Q0\xa8Aj\x15\xaf\xf0\xc96bJ\xeeH%\x0f=\x01\x82\xf00\x9bE!\x9e\xbf\x12w\xcb\xc1\xd0\xf1*\xf9\xe7\xc7\xd3uI\x1c#\xfa\x92\x95\xca\xd6\xa39\xd1\xf0g\xe2!\f\\;qO\x97\xce\xcc\xbcU\xadLR\xf5 \xb0\xe8\x00'/176) mkdirat$cgroup(r2, &(0x7f0000000000)='syz\xff\xda', 0x1ff) ioctl$SIOCGSTAMPNS(r1, 0x8907, &(0x7f00000003c0)) fcntl$lock(r1, 0x7, &(0x7f00000001c0)={0x1, 0x0, 0xfffffffffffffffe, 0x3ff}) getsockopt$inet6_mreq(r1, 0x29, 0x14, &(0x7f0000000380)={@remote, 0x0}, &(0x7f0000000600)=0x14) sendto$packet(r2, &(0x7f0000000500)="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", 0xff, 0x51, &(0x7f0000000640)={0x11, 0xf8, r3, 0x1, 0x3d, 0x6, @dev={[], 0x2a}}, 0x14) bind$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x15, r3, 0x1, 0x8, 0x6, @local}, 0x14) recvmmsg(r0, &(0x7f0000001d00)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}], 0x2, 0x0, 0x0) setsockopt$SO_TIMESTAMP(r0, 0x1, 0x23, &(0x7f0000000040)=0x9, 0x4) r4 = socket$inet6(0xa, 0x80003, 0x80) r5 = openat$null(0xffffffffffffff9c, &(0x7f0000000080)='/dev/null\x00', 0x2040, 0x0) ioctl$KVM_ENABLE_CAP(r5, 0x4068aea3, &(0x7f00000000c0)={0x74, 0x0, [0x80000000, 0x5, 0x200000000000000, 0x4]}) ioctl(r4, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") 13:21:02 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b70000000000000095000000000000001a3acceed2359b6a7042f95065a090e15e1b23c404f79c61776c1a82ce772b007e62c1012097dee8d6e2a64fa661c0e29a9aaf088552f34aeeaee7eefc55cbca11d1082f44e2649eee73cb488c4b4b"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_DETACH(0x9, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0xe80, 0xc0fe, &(0x7f00000000c0)="b9ff0300030d698cb89e40f086dd01000005a4004000ffa377fbac141414e9", 0x0, 0x100}, 0x28) 13:21:02 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) r1 = openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000040)={'nr0\x01\x00', 0x1132}) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'nr0\x01\x00', 0x7132}) close(r1) 13:21:02 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x4004556d, &(0x7f0000000100)={0x0, 0x6, {0x0, 0x0, 0x0, {}, {}, @rumble}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) 13:21:02 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x40045564, &(0x7f0000000100)={0x0, 0x2088, {0x0, 0x0, 0x0, {}, {}, @rumble}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) 13:21:02 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x4004556e, &(0x7f0000000100)={0x0, 0x0, {0x4, 0x0, 0x0, {}, {}, @rumble}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) 13:21:02 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x4004556e, &(0x7f0000000100)={0x0, 0x0, {0x5, 0x0, 0x0, {}, {}, @rumble}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) 13:21:02 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x4004556d, &(0x7f0000000100)={0x0, 0x7, {0x0, 0x0, 0x0, {}, {}, @rumble}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) 13:21:02 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x40045564, &(0x7f0000000100)={0x0, 0x3f00, {0x0, 0x0, 0x0, {}, {}, @rumble}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) 13:21:02 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x4004556e, &(0x7f0000000100)={0x0, 0x0, {0x6, 0x0, 0x0, {}, {}, @rumble}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) 13:21:02 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) r1 = openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000040)={'nr0\x01\x00', 0x1132}) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'nr0\x01\x00', 0x7132}) close(r1) 13:21:02 executing program 4: openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086602, 0x0) getpid() perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x7880, 0xff, 0x0, 0xffffffffffffffff, 0x12d40, [0xa003000000000000, 0x0, 0x0, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x13]}, 0x3c) 13:21:03 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) recvmmsg(r0, &(0x7f0000001d00)=[{{0x0, 0x0, 0x0, 0x11c}}, {{0x0, 0x0, 0x0}}], 0x2, 0x40000120, 0x0) setsockopt$SO_TIMESTAMP(r0, 0x1, 0x23, &(0x7f0000000040)=0x9, 0x4) r1 = socket$inet6(0xa, 0x80003, 0x80) r2 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/cache_stats\x00', 0x0, 0x0) ioctl$KVM_GET_XCRS(r2, 0x8188aea6, &(0x7f0000000080)={0x1, 0x200000, [{0x9, 0x0, 0x3ff}]}) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") 13:21:03 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x40045564, &(0x7f0000000100)={0x0, 0x4000, {0x0, 0x0, 0x0, {}, {}, @rumble}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) 13:21:03 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x4004556d, &(0x7f0000000100)={0x0, 0x8, {0x0, 0x0, 0x0, {}, {}, @rumble}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) 13:21:03 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x4004556e, &(0x7f0000000100)={0x0, 0x0, {0x7, 0x0, 0x0, {}, {}, @rumble}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) 13:21:03 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000780)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000040)={'nr0\x01\x00', 0x1132}) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'nr0\x01\x00', 0x7132}) close(r1) 13:21:03 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x40045564, &(0x7f0000000100)={0x0, 0xff00, {0x0, 0x0, 0x0, {}, {}, @rumble}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) 13:21:03 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x4004556d, &(0x7f0000000100)={0x0, 0x300, {0x0, 0x0, 0x0, {}, {}, @rumble}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) 13:21:03 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x4004556e, &(0x7f0000000100)={0x0, 0x0, {0x8, 0x0, 0x0, {}, {}, @rumble}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) 13:21:03 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x40045564, &(0x7f0000000100)={0x0, 0x1000000, {0x0, 0x0, 0x0, {}, {}, @rumble}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) 13:21:03 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) recvmmsg(r0, &(0x7f0000001d00)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}], 0x2, 0x0, 0x0) setsockopt$SO_TIMESTAMP(r0, 0x1, 0x23, &(0x7f0000000040)=0x9, 0x34e) r1 = socket$vsock_stream(0x28, 0x1, 0x0) getsockopt$IP_VS_SO_GET_SERVICE(r1, 0x0, 0x483, &(0x7f0000000080), &(0x7f0000000000)=0x68) r2 = socket$inet6(0xa, 0x80009, 0x80) ioctl(r2, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") 13:21:03 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x4004556d, &(0x7f0000000100)={0x0, 0x500, {0x0, 0x0, 0x0, {}, {}, @rumble}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) 13:21:03 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086602, 0x0) getpid() perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_pid(r0, &(0x7f0000000000), 0x12) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x7880, 0xff, 0x0, 0xffffffffffffffff, 0x12d40, [0xa003000000000000, 0x0, 0x0, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x13]}, 0x3c) 13:21:03 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x4004556e, &(0x7f0000000100)={0x0, 0x0, {0x300, 0x0, 0x0, {}, {}, @rumble}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) 13:21:03 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000780)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000040)={'nr0\x01\x00', 0x1132}) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'nr0\x01\x00', 0x7132}) close(r1) 13:21:03 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x40045564, &(0x7f0000000100)={0x0, 0x2000000, {0x0, 0x0, 0x0, {}, {}, @rumble}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) 13:21:03 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x4004556d, &(0x7f0000000100)={0x0, 0x600, {0x0, 0x0, 0x0, {}, {}, @rumble}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) 13:21:03 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x4004556e, &(0x7f0000000100)={0x0, 0x0, {0x500, 0x0, 0x0, {}, {}, @rumble}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) 13:21:03 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x4004556d, &(0x7f0000000100)={0x0, 0x700, {0x0, 0x0, 0x0, {}, {}, @rumble}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) 13:21:04 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000780)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000040)={'nr0\x01\x00', 0x1132}) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'nr0\x01\x00', 0x7132}) close(r1) 13:21:04 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x40045564, &(0x7f0000000100)={0x0, 0x3000000, {0x0, 0x0, 0x0, {}, {}, @rumble}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) [ 708.764300][ C1] net_ratelimit: 6 callbacks suppressed [ 708.764310][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 708.775992][ C1] protocol 88fb is buggy, dev hsr_slave_1 13:21:04 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x4004556e, &(0x7f0000000100)={0x0, 0x0, {0x600, 0x0, 0x0, {}, {}, @rumble}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) 13:21:04 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) recvmmsg(r0, &(0x7f0000001d00)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}], 0x2, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/tcp6\x00') preadv(r1, &(0x7f0000000000)=[{&(0x7f00000000c0)=""/169, 0x2aa}], 0x1, 0x0) utimensat(r1, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)={{0x77359400}}, 0x0) setsockopt$SO_TIMESTAMP(r0, 0x1, 0x23, &(0x7f0000000040)=0x9, 0x4) r2 = socket$inet6(0xa, 0x80003, 0x80) ioctl(r2, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") ioctl$sock_x25_SIOCDELRT(r2, 0x890c, &(0x7f0000000200)={@remote={[], 0x3}, 0x3, 'tunl0\x00'}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/expire_quiescent_template\x00', 0x2, 0x0) r3 = socket$inet(0xa, 0x801, 0x84) connect$inet(r3, &(0x7f0000004cc0)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r3, 0x84, 0x9, &(0x7f00000000c0)={0x0, @in={{0x2, 0x0, @rand_addr=0xac14ffbb}}}, &(0x7f0000000180)=0x98) getsockopt$inet_sctp_SCTP_INITMSG(r3, 0x84, 0x2, &(0x7f0000000180), &(0x7f0000000340)=0xfffffffffffffdce) 13:21:04 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086602, 0x0) getpid() r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_pid(r0, &(0x7f0000000000), 0x12) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000140)={0xffffffffffffffff, r1, 0x0, 0x0, 0x0}, 0x30) perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0xb, r0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x7880, 0xff, 0x0, 0xffffffffffffffff, 0x12d40, [0xa003000000000000, 0x0, 0x0, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x13]}, 0x3c) 13:21:04 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x4004556d, &(0x7f0000000100)={0x0, 0x2088, {0x0, 0x0, 0x0, {}, {}, @rumble}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) 13:21:04 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x40045564, &(0x7f0000000100)={0x0, 0x4000000, {0x0, 0x0, 0x0, {}, {}, @rumble}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) 13:21:04 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x4004556e, &(0x7f0000000100)={0x0, 0x0, {0x700, 0x0, 0x0, {}, {}, @rumble}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) [ 709.164285][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 709.170271][ C1] protocol 88fb is buggy, dev hsr_slave_1 13:21:04 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x4004556d, &(0x7f0000000100)={0x0, 0x3f00, {0x0, 0x0, 0x0, {}, {}, @rumble}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) 13:21:04 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000780)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'nr0\x01\x00', 0x7132}) close(r1) 13:21:04 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x40045564, &(0x7f0000000100)={0x0, 0x5000000, {0x0, 0x0, 0x0, {}, {}, @rumble}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) 13:21:04 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x4004556e, &(0x7f0000000100)={0x0, 0x0, {0x4000, 0x0, 0x0, {}, {}, @rumble}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) 13:21:04 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x40045564, &(0x7f0000000100)={0x0, 0x6000000, {0x0, 0x0, 0x0, {}, {}, @rumble}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) 13:21:04 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x4004556d, &(0x7f0000000100)={0x0, 0x4000, {0x0, 0x0, 0x0, {}, {}, @rumble}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) 13:21:04 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x4004556e, &(0x7f0000000100)={0x0, 0x0, {0xff00, 0x0, 0x0, {}, {}, @rumble}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) [ 709.884285][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 709.890210][ C0] protocol 88fb is buggy, dev hsr_slave_1 13:21:05 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) recvmmsg(r0, &(0x7f0000001d00), 0x40000000000031b, 0x0, 0x0) setsockopt$SO_TIMESTAMP(r0, 0x1, 0x23, &(0x7f0000000040)=0x9, 0x4) r1 = openat$nvme_fabrics(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nvme-fabrics\x00', 0x200000, 0x0) write$FUSE_IOCTL(r1, &(0x7f00000000c0)={0x20, 0x0, 0x3, {0x5, 0x0, 0x8001, 0x4}}, 0x20) ioctl$sock_inet_SIOCSIFNETMASK(r0, 0x891c, &(0x7f0000000000)={'veth0_to_team\x00', {0x2, 0x4e20, @multicast1}}) r2 = socket$inet6(0xa, 0x80003, 0x80) ioctl(r2, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") 13:21:05 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000780)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'nr0\x01\x00', 0x7132}) close(r1) 13:21:05 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x40045564, &(0x7f0000000100)={0x0, 0x7000000, {0x0, 0x0, 0x0, {}, {}, @rumble}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) 13:21:05 executing program 4: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x6, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000780)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000040)={'nr0\x01\x00', 0x1132}) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'nr0\x01\x00', 0x7132}) r2 = socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xb1m\x8c\xce\xf3\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb') socket$kcm(0x11, 0x0, 0x300) write$cgroup_subtree(r0, &(0x7f0000000180)=ANY=[@ANYPTR64, @ANYPTR], 0x10) close(r1) sendmsg$tipc(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) 13:21:05 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x4004556d, &(0x7f0000000100)={0x0, 0xff00, {0x0, 0x0, 0x0, {}, {}, @rumble}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) 13:21:05 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x4004556e, &(0x7f0000000100)={0x0, 0x0, {0x0, 0x0, 0x0, {}, {}, @rumble}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) 13:21:05 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x40045564, &(0x7f0000000100)={0x0, 0x8000000, {0x0, 0x0, 0x0, {}, {}, @rumble}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) 13:21:05 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x4004556d, &(0x7f0000000100)={0x0, 0x2000a0, {0x0, 0x0, 0x0, {}, {}, @rumble}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) 13:21:05 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x4004556e, &(0x7f0000000100)={0x0, 0x0, {0x0, 0x2, 0x0, {}, {}, @rumble}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) 13:21:05 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x40045564, &(0x7f0000000100)={0x0, 0x3f000000, {0x0, 0x0, 0x0, {}, {}, @rumble}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) 13:21:05 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x4004556d, &(0x7f0000000100)={0x0, 0x1000000, {0x0, 0x0, 0x0, {}, {}, @rumble}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) 13:21:05 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x4004556e, &(0x7f0000000100)={0x0, 0x0, {0x0, 0x3, 0x0, {}, {}, @rumble}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) [ 710.429804][T19690] device nr0 entered promiscuous mode [ 710.844363][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 710.850380][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 710.924389][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 710.930374][ C0] protocol 88fb is buggy, dev hsr_slave_1 13:21:06 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) recvmmsg(r0, &(0x7f0000001d00)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}], 0x2, 0x0, 0x0) r1 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcsa\x00', 0xf946b6c3d9e5af1b, 0x0) ioctl$NBD_DISCONNECT(r1, 0xab08) setsockopt$SO_TIMESTAMP(r0, 0x1, 0x23, &(0x7f0000000040)=0x9, 0x4) r2 = socket$inet6(0xa, 0x80003, 0x80) recvmsg$kcm(r1, &(0x7f0000000200)={&(0x7f0000000080)=@sco, 0x80, &(0x7f0000000140)=[{&(0x7f0000000100)=""/18, 0x12}], 0x1, &(0x7f0000000180)=""/23, 0x17}, 0x10033) ioctl(r2, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") 13:21:06 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000780)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'nr0\x01\x00', 0x7132}) close(r1) 13:21:06 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x40045564, &(0x7f0000000100)={0x0, 0x40000000, {0x0, 0x0, 0x0, {}, {}, @rumble}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) 13:21:06 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x4004556e, &(0x7f0000000100)={0x0, 0x0, {0x0, 0x4, 0x0, {}, {}, @rumble}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) 13:21:06 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x4004556d, &(0x7f0000000100)={0x0, 0x2000000, {0x0, 0x0, 0x0, {}, {}, @rumble}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) 13:21:06 executing program 4: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x6, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000780)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000040)={'nr0\x01\x00', 0x1132}) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'nr0\x01\x00', 0x7132}) r2 = socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xb1m\x8c\xce\xf3\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb') socket$kcm(0x11, 0x0, 0x300) write$cgroup_subtree(r0, &(0x7f0000000180)=ANY=[@ANYPTR64, @ANYPTR], 0x10) close(r1) sendmsg$tipc(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) 13:21:06 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x4004556d, &(0x7f0000000100)={0x0, 0x3000000, {0x0, 0x0, 0x0, {}, {}, @rumble}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) 13:21:06 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x40045564, &(0x7f0000000100)={0x0, 0x88200000, {0x0, 0x0, 0x0, {}, {}, @rumble}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) 13:21:06 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x4004556e, &(0x7f0000000100)={0x0, 0x0, {0x0, 0x5, 0x0, {}, {}, @rumble}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) 13:21:06 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x40045564, &(0x7f0000000100)={0x0, 0xff000000, {0x0, 0x0, 0x0, {}, {}, @rumble}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) 13:21:06 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x4004556e, &(0x7f0000000100)={0x0, 0x0, {0x0, 0x6, 0x0, {}, {}, @rumble}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) 13:21:06 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x4004556d, &(0x7f0000000100)={0x0, 0x4000000, {0x0, 0x0, 0x0, {}, {}, @rumble}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) [ 711.584554][T19833] device nr0 entered promiscuous mode 13:21:07 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000780)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000040)={'nr0\x01\x00'}) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'nr0\x01\x00', 0x7132}) close(r1) 13:21:07 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x4004556e, &(0x7f0000000100)={0x0, 0x0, {0x0, 0x7, 0x0, {}, {}, @rumble}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) 13:21:07 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x4004556d, &(0x7f0000000100)={0x0, 0x5000000, {0x0, 0x0, 0x0, {}, {}, @rumble}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) 13:21:07 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x40045564, &(0x7f0000000100)={0x0, 0xffffff7f, {0x0, 0x0, 0x0, {}, {}, @rumble}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) 13:21:07 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) recvmmsg(r0, &(0x7f0000001d00)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}], 0x2, 0x0, 0x0) setsockopt$SO_TIMESTAMP(r0, 0x1, 0x23, &(0x7f0000000040)=0x9, 0x4) r1 = socket$inet6(0xa, 0x80003, 0x80) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) fsconfig$FSCONFIG_SET_BINARY(r2, 0x2, &(0x7f0000000080)='vboxnet1!lo\x00', &(0x7f00000000c0)="8f797b43786ff1cb9a71901ad6564c438740d4b47eb37c54a72d8fee2814f48ad88d0d1baa847bb7a71b9fbf11e5e6fb968982c8df716afa56cf9c40a173ad0dbbfa731301f3809c9c9f7a20ea5b848f04942759bf9860311a4d4fe6f8620d1983d38e00618595", 0x67) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") 13:21:07 executing program 4: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x6, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000780)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000040)={'nr0\x01\x00', 0x1132}) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'nr0\x01\x00', 0x7132}) r2 = socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xb1m\x8c\xce\xf3\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb') socket$kcm(0x11, 0x0, 0x300) write$cgroup_subtree(r0, &(0x7f0000000180)=ANY=[@ANYPTR64, @ANYPTR], 0x10) close(r1) sendmsg$tipc(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) 13:21:07 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x40045564, &(0x7f0000000100)={0x0, 0xffffffff, {0x0, 0x0, 0x0, {}, {}, @rumble}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) 13:21:07 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x4004556d, &(0x7f0000000100)={0x0, 0x6000000, {0x0, 0x0, 0x0, {}, {}, @rumble}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) 13:21:07 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x4004556e, &(0x7f0000000100)={0x0, 0x0, {0x0, 0x8, 0x0, {}, {}, @rumble}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) 13:21:07 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000780)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000040)={'nr0\x01\x00'}) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'nr0\x01\x00', 0x7132}) close(r1) 13:21:07 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x4004556d, &(0x7f0000000100)={0x0, 0x7000000, {0x0, 0x0, 0x0, {}, {}, @rumble}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) 13:21:07 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x40045564, &(0x7f0000000100)={0x0, 0x0, {0x0, 0x0, 0x0, {}, {}, @rumble}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) 13:21:07 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x4004556e, &(0x7f0000000100)={0x0, 0x0, {0x0, 0x300, 0x0, {}, {}, @rumble}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) 13:21:07 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x4004556d, &(0x7f0000000100)={0x0, 0x8000000, {0x0, 0x0, 0x0, {}, {}, @rumble}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) 13:21:07 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x4004556e, &(0x7f0000000100)={0x0, 0x0, {0x0, 0x500, 0x0, {}, {}, @rumble}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) 13:21:07 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x40045564, &(0x7f0000000100)={0x0, 0x0, {0x2, 0x0, 0x0, {}, {}, @rumble}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) [ 712.690763][T19975] device nr0 entered promiscuous mode 13:21:08 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) r1 = socket$inet(0xa, 0x801, 0x84) connect$inet(r1, &(0x7f0000004cc0)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r1, 0x84, 0x9, &(0x7f00000000c0)={0x0, @in={{0x2, 0x0, @rand_addr=0xac14ffbb}}}, &(0x7f0000000180)=0x98) fallocate(r1, 0x10, 0x8, 0x1) r2 = accept4$ax25(0xffffffffffffffff, &(0x7f0000000080)={{0x3, @rose}, [@remote, @default, @null, @rose, @remote, @netrom, @bcast, @bcast]}, &(0x7f0000000000)=0x48, 0x0) tee(r2, r0, 0x6, 0x4) r3 = socket$inet(0xa, 0x801, 0x84) connect$inet(r3, &(0x7f0000004cc0)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r3, 0x84, 0x9, &(0x7f00000000c0)={0x0, @in={{0x2, 0x0, @rand_addr=0xac14ffbb}}}, &(0x7f0000000180)=0x98) recvmmsg(r3, &(0x7f0000001d00)=[{{0x0, 0x0, 0x0}}, {{0x0, 0xffffffffffffffd6, 0x0}}], 0x2, 0x0, 0x0) setsockopt$SO_TIMESTAMP(r0, 0x1, 0x23, &(0x7f0000000040)=0x9, 0x4) r4 = socket$inet6(0xa, 0x80003, 0x80) ioctl(r4, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") 13:21:08 executing program 4 (fault-call:0 fault-nth:0): bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x7880, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000, 0x0, 0x0, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x13]}, 0x3c) 13:21:08 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x4004556e, &(0x7f0000000100)={0x0, 0x0, {0x0, 0x600, 0x0, {}, {}, @rumble}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) 13:21:08 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x4004556d, &(0x7f0000000100)={0x0, 0x3f000000, {0x0, 0x0, 0x0, {}, {}, @rumble}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) 13:21:08 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x40045564, &(0x7f0000000100)={0x0, 0x0, {0x3, 0x0, 0x0, {}, {}, @rumble}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) 13:21:08 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000780)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000040)={'nr0\x01\x00'}) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'nr0\x01\x00', 0x7132}) close(r1) 13:21:08 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm_plock\x00', 0xa9000, 0x0) ioctl$SIOCX25SCALLUSERDATA(r1, 0x89e5, &(0x7f00000000c0)={0x4d, "0d84d0c010a7356f18d37a52ae57261ff7816a2da7b1963720a85d4f9d9247251ab66b82688ec28f7e14cb63d899aa544e05eb41039230954f8b4f50b82c2157337155e0aedc2b88910c2c7ea621dc43a049fea5a314d559b4bd6001990a1be0e0d0ee27659216c62a69287d182134758c14f50e4753e6a041453ad8e83392d4"}) recvmmsg(r0, &(0x7f0000001d00)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}], 0x2, 0x0, 0x0) setsockopt$SO_TIMESTAMP(r0, 0x1, 0x23, &(0x7f0000000040)=0x9, 0x4) r2 = socket$inet6(0xa, 0x80003, 0x80) ioctl(r2, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") syz_genetlink_get_family_id$tipc(&(0x7f0000000000)='TIPC\x00') 13:21:08 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x4004556e, &(0x7f0000000100)={0x0, 0x0, {0x0, 0x700, 0x0, {}, {}, @rumble}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) [ 713.451457][T20124] FAULT_INJECTION: forcing a failure. [ 713.451457][T20124] name failslab, interval 1, probability 0, space 0, times 0 13:21:08 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x4004556d, &(0x7f0000000100)={0x0, 0x40000000, {0x0, 0x0, 0x0, {}, {}, @rumble}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) 13:21:08 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x40045564, &(0x7f0000000100)={0x0, 0x0, {0x4, 0x0, 0x0, {}, {}, @rumble}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) [ 713.491670][T20124] CPU: 0 PID: 20124 Comm: syz-executor.4 Not tainted 5.4.0-syzkaller #0 [ 713.500247][T20124] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 713.510411][T20124] Call Trace: [ 713.513729][T20124] dump_stack+0x197/0x210 [ 713.518092][T20124] should_fail.cold+0xa/0x15 [ 713.522691][T20124] ? fault_create_debugfs_attr+0x180/0x180 [ 713.528522][T20124] ? ___might_sleep+0x163/0x2c0 [ 713.533382][T20124] __should_failslab+0x121/0x190 [ 713.538347][T20124] should_failslab+0x9/0x14 [ 713.542886][T20124] kmem_cache_alloc_trace+0x2d3/0x790 [ 713.548374][T20124] htab_map_alloc+0xe3/0x11c0 [ 713.548402][T20124] ? selinux_bpf+0xee/0x140 [ 713.557583][T20124] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 713.563850][T20124] ? htab_map_update_elem+0xca0/0xca0 [ 713.563940][T20124] __do_sys_bpf+0x478/0x37b0 [ 713.563960][T20124] ? bpf_prog_load+0x18a0/0x18a0 [ 713.578854][T20124] ? __kasan_check_write+0x14/0x20 [ 713.584001][T20124] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 713.589577][T20124] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 713.594892][T20124] ? wait_for_completion+0x440/0x440 [ 713.600221][T20124] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 713.606507][T20124] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 713.611995][T20124] ? do_syscall_64+0x26/0x790 [ 713.616703][T20124] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 713.622818][T20124] ? do_syscall_64+0x26/0x790 [ 713.627557][T20124] __x64_sys_bpf+0x73/0xb0 [ 713.632134][T20124] do_syscall_64+0xfa/0x790 [ 713.636900][T20124] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 713.642822][T20124] RIP: 0033:0x45a679 [ 713.646739][T20124] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 713.666889][T20124] RSP: 002b:00007fd557596c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 713.666905][T20124] RAX: ffffffffffffffda RBX: 00007fd557596c90 RCX: 000000000045a679 [ 713.666912][T20124] RDX: 000000000000003c RSI: 0000000020000040 RDI: 405a020000000000 [ 713.666919][T20124] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 713.666928][T20124] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fd5575976d4 [ 713.666936][T20124] R13: 00000000004c0c65 R14: 00000000004d4750 R15: 0000000000000003 13:21:08 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x40045564, &(0x7f0000000100)={0x0, 0x0, {0x5, 0x0, 0x0, {}, {}, @rumble}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) 13:21:08 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x4004556d, &(0x7f0000000100)={0x0, 0x88200000, {0x0, 0x0, 0x0, {}, {}, @rumble}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) 13:21:09 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) recvmmsg(r0, &(0x7f0000001d00)=[{{0x0, 0x0, 0x0}, 0xfffffffe}, {{0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffece}}], 0x2, 0x0, 0x0) setsockopt$SO_TIMESTAMP(r0, 0x1, 0x23, &(0x7f0000000040)=0x9, 0x4) r1 = socket$inet6(0xa, 0x80003, 0x80) r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x81fd) ioctl$SNDCTL_DSP_GETBLKSIZE(r2, 0xc0045004, &(0x7f0000000000)) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") 13:21:09 executing program 4 (fault-call:0 fault-nth:1): bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x7880, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000, 0x0, 0x0, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x13]}, 0x3c) 13:21:09 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x4004556e, &(0x7f0000000100)={0x0, 0x0, {0x0, 0x4000, 0x0, {}, {}, @rumble}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) 13:21:09 executing program 0: openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000780)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'nr0\x01\x00', 0x1132}) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000000)={'nr0\x01\x00', 0x7132}) close(r0) 13:21:09 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x4004556d, &(0x7f0000000100)={0x0, 0xa0002000, {0x0, 0x0, 0x0, {}, {}, @rumble}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) [ 714.035244][T20152] FAULT_INJECTION: forcing a failure. [ 714.035244][T20152] name failslab, interval 1, probability 0, space 0, times 0 [ 714.048084][ C0] net_ratelimit: 8 callbacks suppressed [ 714.048093][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 714.048153][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 714.105297][T20152] CPU: 1 PID: 20152 Comm: syz-executor.4 Not tainted 5.4.0-syzkaller #0 [ 714.113726][T20152] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 714.123801][T20152] Call Trace: [ 714.127121][T20152] dump_stack+0x197/0x210 [ 714.131498][T20152] should_fail.cold+0xa/0x15 [ 714.136128][T20152] ? fault_create_debugfs_attr+0x180/0x180 [ 714.141953][T20152] ? ___might_sleep+0x163/0x2c0 [ 714.141978][T20152] __should_failslab+0x121/0x190 [ 714.141997][T20152] should_failslab+0x9/0x14 [ 714.142021][T20152] kmem_cache_alloc_node_trace+0x274/0x750 [ 714.151793][T20152] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 714.151811][T20152] ? rcu_read_lock_any_held.part.0+0x50/0x50 [ 714.151828][T20152] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 714.151851][T20152] __kmalloc_node+0x3d/0x70 [ 714.151873][T20152] __bpf_map_area_alloc+0xbd/0xf0 [ 714.189010][T20152] bpf_map_area_alloc+0x20/0x30 [ 714.193880][T20152] htab_map_alloc+0x589/0x11c0 [ 714.198681][T20152] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 714.204967][T20152] ? htab_map_update_elem+0xca0/0xca0 [ 714.210364][T20152] __do_sys_bpf+0x478/0x37b0 [ 714.214987][T20152] ? bpf_prog_load+0x18a0/0x18a0 [ 714.219947][T20152] ? __kasan_check_write+0x14/0x20 [ 714.225093][T20152] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 714.230651][T20152] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 714.235945][T20152] ? wait_for_completion+0x440/0x440 [ 714.241246][T20152] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 714.247501][T20152] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 714.252968][T20152] ? do_syscall_64+0x26/0x790 [ 714.257652][T20152] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 714.263728][T20152] ? do_syscall_64+0x26/0x790 [ 714.268412][T20152] __x64_sys_bpf+0x73/0xb0 [ 714.272834][T20152] do_syscall_64+0xfa/0x790 [ 714.277344][T20152] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 714.283243][T20152] RIP: 0033:0x45a679 13:21:09 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x4004556e, &(0x7f0000000100)={0x0, 0x0, {0x0, 0xff00, 0x0, {}, {}, @rumble}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) 13:21:09 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x40045564, &(0x7f0000000100)={0x0, 0x0, {0x6, 0x0, 0x0, {}, {}, @rumble}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) [ 714.287139][T20152] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 714.306743][T20152] RSP: 002b:00007fd557596c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 714.315163][T20152] RAX: ffffffffffffffda RBX: 00007fd557596c90 RCX: 000000000045a679 [ 714.323136][T20152] RDX: 000000000000003c RSI: 0000000020000040 RDI: 405a020000000000 [ 714.331109][T20152] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 714.339164][T20152] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fd5575976d4 [ 714.347144][T20152] R13: 00000000004c0c65 R14: 00000000004d4750 R15: 0000000000000003 13:21:09 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x4004556e, &(0x7f0000000100)={0x0, 0x0, {0x0, 0x0, 0x0, {}, {}, @rumble}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) 13:21:09 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x4004556d, &(0x7f0000000100)={0x0, 0xff000000, {0x0, 0x0, 0x0, {}, {}, @rumble}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) 13:21:09 executing program 4 (fault-call:0 fault-nth:2): bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x7880, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000, 0x0, 0x0, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x13]}, 0x3c) 13:21:09 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x40045564, &(0x7f0000000100)={0x0, 0x0, {0x7, 0x0, 0x0, {}, {}, @rumble}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) 13:21:09 executing program 0: openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000780)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'nr0\x01\x00', 0x1132}) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000000)={'nr0\x01\x00', 0x7132}) close(r0) [ 714.704020][T20174] FAULT_INJECTION: forcing a failure. [ 714.704020][T20174] name failslab, interval 1, probability 0, space 0, times 0 [ 714.789235][T20174] CPU: 0 PID: 20174 Comm: syz-executor.4 Not tainted 5.4.0-syzkaller #0 [ 714.797679][T20174] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 714.807756][T20174] Call Trace: [ 714.811076][T20174] dump_stack+0x197/0x210 [ 714.815438][T20174] should_fail.cold+0xa/0x15 [ 714.820070][T20174] ? fault_create_debugfs_attr+0x180/0x180 [ 714.825912][T20174] ? ___might_sleep+0x163/0x2c0 [ 714.830781][T20174] __should_failslab+0x121/0x190 [ 714.835763][T20174] should_failslab+0x9/0x14 [ 714.840288][T20174] kmem_cache_alloc_node_trace+0x274/0x750 [ 714.846803][T20174] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 714.846819][T20174] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 714.846835][T20174] ? debug_smp_processor_id+0x33/0x18a [ 714.846856][T20174] __get_vm_area_node+0x12b/0x4f0 [ 714.846870][T20174] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 714.846886][T20174] __vmalloc_node_range+0xd4/0x810 [ 714.846900][T20174] ? bpf_map_area_alloc+0x20/0x30 [ 714.846928][T20174] ? kasan_unpoison_shadow+0x35/0x50 [ 714.869891][T20174] ? bpf_map_area_alloc+0x20/0x30 [ 714.869909][T20174] __vmalloc_node_flags_caller+0x71/0x90 [ 714.869932][T20174] ? bpf_map_area_alloc+0x20/0x30 [ 714.895983][T20174] __bpf_map_area_alloc+0xde/0xf0 [ 714.896001][T20174] bpf_map_area_alloc+0x20/0x30 [ 714.896015][T20174] htab_map_alloc+0x8d3/0x11c0 [ 714.896044][T20174] ? htab_map_update_elem+0xca0/0xca0 [ 714.896061][T20174] __do_sys_bpf+0x478/0x37b0 [ 714.896078][T20174] ? bpf_prog_load+0x18a0/0x18a0 [ 714.896093][T20174] ? __kasan_check_write+0x14/0x20 [ 714.896109][T20174] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 714.896126][T20174] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 714.896142][T20174] ? wait_for_completion+0x440/0x440 [ 714.896165][T20174] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 714.896192][T20174] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 714.896211][T20174] ? do_syscall_64+0x26/0x790 [ 714.927014][T20174] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 714.927032][T20174] ? do_syscall_64+0x26/0x790 [ 714.927054][T20174] __x64_sys_bpf+0x73/0xb0 13:21:10 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) recvmmsg(r0, &(0x7f0000001d00)=[{{0x0, 0x0, 0x0, 0x118}}, {{0x0, 0x0, 0x0}}], 0x2, 0x0, 0x0) setsockopt$SO_TIMESTAMP(r0, 0x1, 0x23, &(0x7f0000000040)=0x9, 0x4) r1 = socket$inet6(0xa, 0x80003, 0x80) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") 13:21:10 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x4004556d, &(0x7f0000000100)={0x0, 0xffffff7f, {0x0, 0x0, 0x0, {}, {}, @rumble}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) 13:21:10 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x4004556e, &(0x7f0000000100)={0x0, 0x0, {0x0, 0x0, 0x2, {}, {}, @rumble}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) 13:21:10 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x40045564, &(0x7f0000000100)={0x0, 0x0, {0x8, 0x0, 0x0, {}, {}, @rumble}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) [ 714.927071][T20174] do_syscall_64+0xfa/0x790 [ 714.927089][T20174] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 714.927100][T20174] RIP: 0033:0x45a679 [ 714.927115][T20174] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 714.927123][T20174] RSP: 002b:00007fd557596c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 13:21:10 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x4004556d, &(0x7f0000000100)={0x0, 0xffffffff, {0x0, 0x0, 0x0, {}, {}, @rumble}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) [ 714.927136][T20174] RAX: ffffffffffffffda RBX: 00007fd557596c90 RCX: 000000000045a679 [ 714.927145][T20174] RDX: 000000000000003c RSI: 0000000020000040 RDI: 405a020000000000 [ 714.927153][T20174] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 714.927161][T20174] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fd5575976d4 [ 714.927170][T20174] R13: 00000000004c0c65 R14: 00000000004d4750 R15: 0000000000000003 13:21:10 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x40045564, &(0x7f0000000100)={0x0, 0x0, {0x300, 0x0, 0x0, {}, {}, @rumble}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) 13:21:10 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x4004556e, &(0x7f0000000100)={0x0, 0x0, {0x0, 0x0, 0x3, {}, {}, @rumble}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) 13:21:10 executing program 5: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x800, 0x0) ioctl$TIOCLINUX3(r0, 0x541c, &(0x7f0000000080)) r1 = socket$packet(0x11, 0x3, 0x300) r2 = socket$inet(0xa, 0x801, 0x84) connect$inet(r2, &(0x7f0000004cc0)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r2, 0x84, 0x9, &(0x7f00000000c0)={0x0, @in={{0x2, 0x0, @rand_addr=0xac14ffbb}}}, &(0x7f0000000180)=0x98) r3 = socket$inet(0xa, 0x801, 0x84) connect$inet(r3, &(0x7f0000004cc0)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r3, 0x84, 0x9, &(0x7f00000000c0)={0x0, @in={{0x2, 0x0, @rand_addr=0xac14ffbb}}}, &(0x7f0000000180)=0x98) ioctl$FICLONE(r2, 0x40049409, r3) recvmmsg(r1, &(0x7f0000001d00)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}], 0x2, 0x0, 0x0) setsockopt$SO_TIMESTAMP(r1, 0x1, 0x23, &(0x7f0000000040)=0x9, 0x4) r4 = syz_open_dev$media(&(0x7f0000000200)='/dev/media#\x00', 0x401, 0x10000) ioctl$EVIOCSREP(r4, 0x40084503, &(0x7f0000000240)=[0x6, 0x8]) r5 = socket$inet6(0xa, 0x80003, 0x80) ioctl(r5, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") 13:21:10 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x4004556d, &(0x7f0000000100)={0x0, 0x0, {0x0, 0x0, 0x0, {}, {}, @rumble}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) 13:21:10 executing program 4 (fault-call:0 fault-nth:3): bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x7880, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000, 0x0, 0x0, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x13]}, 0x3c) 13:21:10 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x40045564, &(0x7f0000000100)={0x0, 0x0, {0x500, 0x0, 0x0, {}, {}, @rumble}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) 13:21:10 executing program 0: openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000780)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'nr0\x01\x00', 0x1132}) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000000)={'nr0\x01\x00', 0x7132}) close(r0) 13:21:10 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x4004556e, &(0x7f0000000100)={0x0, 0x0, {0x0, 0x0, 0x4, {}, {}, @rumble}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) [ 715.606066][T20212] FAULT_INJECTION: forcing a failure. [ 715.606066][T20212] name failslab, interval 1, probability 0, space 0, times 0 [ 715.644411][T20212] CPU: 0 PID: 20212 Comm: syz-executor.4 Not tainted 5.4.0-syzkaller #0 [ 715.652943][T20212] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 715.663311][T20212] Call Trace: [ 715.663341][T20212] dump_stack+0x197/0x210 [ 715.663364][T20212] should_fail.cold+0xa/0x15 [ 715.663379][T20212] ? htab_map_alloc+0x8d3/0x11c0 [ 715.663402][T20212] ? fault_create_debugfs_attr+0x180/0x180 [ 715.686371][T20212] ? ___might_sleep+0x163/0x2c0 [ 715.691265][T20212] __should_failslab+0x121/0x190 [ 715.696224][T20212] should_failslab+0x9/0x14 [ 715.696244][T20212] kmem_cache_alloc_node+0x268/0x740 [ 715.696256][T20212] ? ___might_sleep+0x163/0x2c0 [ 715.696280][T20212] alloc_vmap_area+0x147/0x2030 [ 715.710940][T20212] ? __get_vm_area_node+0x12b/0x4f0 [ 715.710959][T20212] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 715.710985][T20212] ? purge_vmap_area_lazy+0x40/0x40 [ 715.721067][T20212] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 715.721087][T20212] ? debug_smp_processor_id+0x33/0x18a [ 715.721107][T20212] __get_vm_area_node+0x179/0x4f0 [ 715.721128][T20212] __vmalloc_node_range+0xd4/0x810 [ 715.731900][T20212] ? bpf_map_area_alloc+0x20/0x30 [ 715.743617][T20212] ? kasan_unpoison_shadow+0x35/0x50 [ 715.753763][T20212] ? bpf_map_area_alloc+0x20/0x30 [ 715.753783][T20212] __vmalloc_node_flags_caller+0x71/0x90 [ 715.753799][T20212] ? bpf_map_area_alloc+0x20/0x30 [ 715.753820][T20212] __bpf_map_area_alloc+0xde/0xf0 [ 715.764275][T20212] bpf_map_area_alloc+0x20/0x30 [ 715.764291][T20212] htab_map_alloc+0x8d3/0x11c0 [ 715.764320][T20212] ? htab_map_update_elem+0xca0/0xca0 [ 715.764335][T20212] __do_sys_bpf+0x478/0x37b0 [ 715.764352][T20212] ? bpf_prog_load+0x18a0/0x18a0 [ 715.764367][T20212] ? __kasan_check_write+0x14/0x20 [ 715.764383][T20212] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 715.764399][T20212] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 715.764414][T20212] ? wait_for_completion+0x440/0x440 [ 715.764433][T20212] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 715.764460][T20212] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 715.775287][T20212] ? do_syscall_64+0x26/0x790 [ 715.775306][T20212] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe 13:21:11 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x40045564, &(0x7f0000000100)={0x0, 0x0, {0x600, 0x0, 0x0, {}, {}, @rumble}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) 13:21:11 executing program 4 (fault-call:0 fault-nth:4): bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x7880, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000, 0x0, 0x0, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x13]}, 0x3c) [ 715.775320][T20212] ? do_syscall_64+0x26/0x790 [ 715.775339][T20212] __x64_sys_bpf+0x73/0xb0 [ 715.775355][T20212] do_syscall_64+0xfa/0x790 [ 715.775375][T20212] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 715.775386][T20212] RIP: 0033:0x45a679 [ 715.775402][T20212] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 715.775410][T20212] RSP: 002b:00007fd557596c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 715.775424][T20212] RAX: ffffffffffffffda RBX: 00007fd557596c90 RCX: 000000000045a679 [ 715.775433][T20212] RDX: 000000000000003c RSI: 0000000020000040 RDI: 405a020000000000 [ 715.775440][T20212] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 715.775454][T20212] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fd5575976d4 [ 715.785654][T20212] R13: 00000000004c0c65 R14: 00000000004d4750 R15: 0000000000000003 [ 715.967276][T20224] FAULT_INJECTION: forcing a failure. [ 715.967276][T20224] name failslab, interval 1, probability 0, space 0, times 0 [ 715.991797][T20224] CPU: 0 PID: 20224 Comm: syz-executor.4 Not tainted 5.4.0-syzkaller #0 [ 716.000180][T20224] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 716.010254][T20224] Call Trace: [ 716.013609][T20224] dump_stack+0x197/0x210 [ 716.017972][T20224] should_fail.cold+0xa/0x15 [ 716.022587][T20224] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 716.028861][T20224] ? fault_create_debugfs_attr+0x180/0x180 [ 716.034702][T20224] ? ___might_sleep+0x163/0x2c0 [ 716.039589][T20224] __should_failslab+0x121/0x190 [ 716.044552][T20224] should_failslab+0x9/0x14 [ 716.044574][T20224] kmem_cache_alloc_node+0x268/0x740 [ 716.044590][T20224] ? ___might_sleep+0x163/0x2c0 [ 716.044613][T20224] alloc_vmap_area+0xc8d/0x2030 [ 716.044629][T20224] ? __get_vm_area_node+0x12b/0x4f0 [ 716.044644][T20224] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 716.044671][T20224] ? purge_vmap_area_lazy+0x40/0x40 [ 716.044688][T20224] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 716.044704][T20224] ? debug_smp_processor_id+0x33/0x18a [ 716.044722][T20224] __get_vm_area_node+0x179/0x4f0 [ 716.044742][T20224] __vmalloc_node_range+0xd4/0x810 [ 716.044761][T20224] ? bpf_map_area_alloc+0x20/0x30 [ 716.059386][T20224] ? kasan_unpoison_shadow+0x35/0x50 [ 716.069437][T20224] ? bpf_map_area_alloc+0x20/0x30 [ 716.069460][T20224] __vmalloc_node_flags_caller+0x71/0x90 [ 716.086510][T20224] ? bpf_map_area_alloc+0x20/0x30 [ 716.086527][T20224] __bpf_map_area_alloc+0xde/0xf0 [ 716.086542][T20224] bpf_map_area_alloc+0x20/0x30 [ 716.086557][T20224] htab_map_alloc+0x8d3/0x11c0 [ 716.086590][T20224] ? htab_map_update_elem+0xca0/0xca0 [ 716.097058][T20224] __do_sys_bpf+0x478/0x37b0 [ 716.097078][T20224] ? bpf_prog_load+0x18a0/0x18a0 [ 716.097093][T20224] ? __kasan_check_write+0x14/0x20 13:21:11 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x4004556d, &(0x7f0000000100)={0x0, 0x0, {0x2, 0x0, 0x0, {}, {}, @rumble}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) [ 716.097109][T20224] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 716.097124][T20224] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 716.097139][T20224] ? wait_for_completion+0x440/0x440 [ 716.097162][T20224] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 716.097196][T20224] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 716.097211][T20224] ? do_syscall_64+0x26/0x790 [ 716.097225][T20224] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 716.097238][T20224] ? do_syscall_64+0x26/0x790 [ 716.097258][T20224] __x64_sys_bpf+0x73/0xb0 [ 716.097275][T20224] do_syscall_64+0xfa/0x790 [ 716.097296][T20224] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 716.107537][T20224] RIP: 0033:0x45a679 [ 716.107557][T20224] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 716.123476][T20224] RSP: 002b:00007fd557596c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 716.133494][T20224] RAX: ffffffffffffffda RBX: 00007fd557596c90 RCX: 000000000045a679 13:21:11 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x40045564, &(0x7f0000000100)={0x0, 0x0, {0x700, 0x0, 0x0, {}, {}, @rumble}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) [ 716.133503][T20224] RDX: 000000000000003c RSI: 0000000020000040 RDI: 405a020000000000 [ 716.133511][T20224] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 716.133519][T20224] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fd5575976d4 [ 716.133532][T20224] R13: 00000000004c0c65 R14: 00000000004d4750 R15: 0000000000000003 [ 716.148812][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 716.163272][ C0] protocol 88fb is buggy, dev hsr_slave_1 13:21:11 executing program 4 (fault-call:0 fault-nth:5): bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x7880, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000, 0x0, 0x0, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x13]}, 0x3c) 13:21:11 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x4004556e, &(0x7f0000000100)={0x0, 0x0, {0x0, 0x0, 0x5, {}, {}, @rumble}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) 13:21:11 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) recvmmsg(r0, &(0x7f0000001d00)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}], 0x2, 0x0, 0x0) r1 = socket$inet(0xa, 0x801, 0x84) connect$inet(r1, &(0x7f0000004cc0)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r1, 0x84, 0x9, &(0x7f00000000c0)={0x0, @in={{0x2, 0x0, @rand_addr=0xac14ffbb}}}, &(0x7f0000000180)=0x98) r2 = socket$inet(0xa, 0x801, 0x84) connect$inet(r2, &(0x7f0000004cc0)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r2, 0x84, 0x9, &(0x7f00000000c0)={0x0, @in={{0x2, 0x0, @rand_addr=0xac14ffbb}}}, &(0x7f0000000180)=0x3) r3 = socket$inet(0xa, 0x801, 0x84) connect$inet(r3, &(0x7f0000004cc0)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x16}}, 0x279) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r3, 0x84, 0x9, &(0x7f00000000c0)={0x0, @in={{0x2, 0x0, @rand_addr=0xac14ffbb}}}, &(0x7f0000000180)=0x98) r4 = socket$inet(0xa, 0x801, 0x84) connect$inet(r4, &(0x7f0000004cc0)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r4, 0x84, 0x9, &(0x7f00000000c0)={0x0, @in6={{0xa, 0x4e23, 0x10001, @empty, 0x1}}}, &(0x7f0000000180)=0x98) r5 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f00000016c0)='/dev/dlm-monitor\x00', 0x80200, 0x0) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(r5, 0x84, 0x15, &(0x7f0000001700)={0x6}, 0x1) r6 = syz_open_dev$ttys(0xc, 0x2, 0x0) r7 = socket$inet(0xa, 0x801, 0x84) chmod(&(0x7f0000001680)='./file0/file1\x00', 0x0) connect$inet(r7, &(0x7f0000004cc0)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r7, 0x84, 0x9, &(0x7f00000000c0)={0x0, @in={{0x2, 0x0, @rand_addr=0xac14ffbb}}}, &(0x7f0000000180)=0x98) ioctl$FIDEDUPERANGE(r1, 0xc0189436, &(0x7f0000000080)=ANY=[@ANYBLOB='_gDF\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\t\x00\x00\x00\x00\x00\x00\x00', @ANYRES32=r2, @ANYBLOB="00000000000400"/28, @ANYRES32=r0, @ANYBLOB="0000000025dd00000000000000000000000000000000000000000013", @ANYRES32=r3, @ANYBLOB='\x00'/28, @ANYRES32=r4, @ANYBLOB="000000000500"/28, @ANYRES32=r6, @ANYBLOB='\x00\x00\x00\x00\x00\b\x00'/28, @ANYRES32=r0, @ANYBLOB='\x00'/28, @ANYRES32=r0, @ANYBLOB="000000000400"/28, @ANYRES32=r7, @ANYBLOB="000000000200"/28, @ANYRES32, @ANYBLOB='\x00\x00\x00\x00\a\x00'/28]) syz_mount_image$vfat(&(0x7f0000000240)='vfat\x00', &(0x7f0000000280)='./file0\x00', 0x7, 0x5, &(0x7f0000000540)=[{&(0x7f00000002c0)="a39a5bcc24db72b2e302d12afe569666962d4d5304382b0e1abd29e2cf77266dc754f2e80d44534a7d30f451dcb6ac5ca789bb1f34db883ad1ce987555537c6cd7ce55ac83fa6489ef0d0eda1ff3b1e9af6f74ef0fe90067714e6df51ab9ad86beba8fc029c284e09937fe9743b9e477e1afb28e", 0x74, 0x400}, {&(0x7f0000000340)="5c672ab3714de0ca450d87a999889ce4bdb69258508145476579a569775db039290719f82cc02489c1548446de59b3749c8a1eaf46a0f9581f07262a209914b58d14fde0f88aafef2acd76da0437f676800530e275594d4ec76948a27f245e6aeb6b43963355d3a23da15cae4fb5596d43b7d4c3f246d19bfc4bad0a89c16babb37cc4aa23dad0fcba02b84552db3f69adbc7f3d6a3ca79b5e64b385b3c343aca32d09170ccfde77a2720cacda828acdf025bc4437bba8715f60", 0xba}, {&(0x7f0000000400)="0e9d9904bfe39b60f1670e369a6ffd", 0xf, 0xf81}, {&(0x7f0000000440)="5c4f7a0f7d69eff459927c51cf1a553788c5a973dc4edee361b6", 0x1a, 0x7fff}, {&(0x7f0000000480)="9f2a4c28bd40bea5b99ef952eca192cf0b14f23005fe62d21f9de9f1ac3620ac82558978e48a891d38aca9a49488636ce839faeaa003edbe863e58e85f8b86d538b5945c3cd7a38c85d56d6ffbc462d47728656436cdfe639214b0346779c507e581580f03c01b2b2033be6411ebe5cfd9669a6037d8b9b2a8c167ae48d21f27cf80dca30a1f62f5c0862d95b737ad13f3b43a8b131b75568ba7638a10869c", 0x9f, 0x3}], 0x0, &(0x7f0000001840)=ANY=[@ANYBLOB="75746638070000006e695f786c6174654e312c736d61636b6673726f6e1c1e6bb90b743d2f646576a89fdaaaec30abb3002cb7c8a7e5789530c251672f4bca2cd61912cce157b39dfd3798a26cbb5c7b3450772568928bfefee5201bf43a9dde8985594170d1268e92add12fa13e9b100e3f29bba033b52fe28d524795e51bfd63c1fd7d07507e70f6699d36df9a49ab364d617eec6212a995b0ccb9266545236849d884405decd30ea8501d9201eee23a73c46e1f9461a8a4e32f738924acca8a275d98438042c9fd920a2d7627ad84e3f8000e3be55505318a5c1414ed937cc7dae6f1d78da7656b8e82ab834f7774811810c4c89472ca51"]) setsockopt$SO_TIMESTAMP(r0, 0x1, 0x23, &(0x7f0000000040)=0x9, 0x4) r8 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-control\x00', 0x111e80, 0x0) ioctl$TCGETS(r8, 0x5401, &(0x7f0000000200)) r9 = socket$inet6(0xa, 0x80003, 0x80) r10 = open(&(0x7f0000000600)='./file0/file0\x00', 0x20000, 0xc2) ioctl$CAPI_MANUFACTURER_CMD(r10, 0xc0104320, &(0x7f0000001640)={0x4, &(0x7f0000000640)="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"}) ioctl(r9, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") 13:21:11 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x40045564, &(0x7f0000000100)={0x0, 0x0, {0x3f00, 0x0, 0x0, {}, {}, @rumble}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) [ 716.502490][T20238] FAULT_INJECTION: forcing a failure. [ 716.502490][T20238] name failslab, interval 1, probability 0, space 0, times 0 [ 716.524068][T20238] CPU: 1 PID: 20238 Comm: syz-executor.4 Not tainted 5.4.0-syzkaller #0 [ 716.532454][T20238] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 716.542530][T20238] Call Trace: [ 716.542555][T20238] dump_stack+0x197/0x210 [ 716.542578][T20238] should_fail.cold+0xa/0x15 [ 716.542597][T20238] ? fault_create_debugfs_attr+0x180/0x180 [ 716.542615][T20238] ? ___might_sleep+0x163/0x2c0 [ 716.542636][T20238] __should_failslab+0x121/0x190 [ 716.570432][T20238] should_failslab+0x9/0x14 [ 716.574963][T20238] kmem_cache_alloc_node_trace+0x274/0x750 [ 716.580798][T20238] ? do_raw_spin_unlock+0x178/0x270 [ 716.586032][T20238] __kmalloc_node+0x3d/0x70 [ 716.590564][T20238] __vmalloc_node_range+0x1db/0x810 [ 716.595812][T20238] ? bpf_map_area_alloc+0x20/0x30 [ 716.595836][T20238] __vmalloc_node_flags_caller+0x71/0x90 [ 716.606504][T20238] ? bpf_map_area_alloc+0x20/0x30 [ 716.606522][T20238] __bpf_map_area_alloc+0xde/0xf0 [ 716.606537][T20238] bpf_map_area_alloc+0x20/0x30 [ 716.606551][T20238] htab_map_alloc+0x8d3/0x11c0 [ 716.606584][T20238] ? htab_map_update_elem+0xca0/0xca0 [ 716.621473][T20238] __do_sys_bpf+0x478/0x37b0 [ 716.621492][T20238] ? bpf_prog_load+0x18a0/0x18a0 [ 716.621510][T20238] ? __kasan_check_write+0x14/0x20 [ 716.648003][T20238] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 716.648022][T20238] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 716.648040][T20238] ? wait_for_completion+0x440/0x440 [ 716.658873][T20238] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 716.658902][T20238] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 716.658919][T20238] ? do_syscall_64+0x26/0x790 [ 716.658935][T20238] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 716.658947][T20238] ? do_syscall_64+0x26/0x790 [ 716.658968][T20238] __x64_sys_bpf+0x73/0xb0 [ 716.670466][T20238] do_syscall_64+0xfa/0x790 [ 716.670490][T20238] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 716.670506][T20238] RIP: 0033:0x45a679 [ 716.706139][T20238] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 716.706148][T20238] RSP: 002b:00007fd557596c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 716.706161][T20238] RAX: ffffffffffffffda RBX: 00007fd557596c90 RCX: 000000000045a679 13:21:11 executing program 4 (fault-call:0 fault-nth:6): bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x7880, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000, 0x0, 0x0, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x13]}, 0x3c) 13:21:11 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x4004556e, &(0x7f0000000100)={0x0, 0x0, {0x0, 0x0, 0x6, {}, {}, @rumble}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) [ 716.706169][T20238] RDX: 000000000000003c RSI: 0000000020000040 RDI: 405a020000000000 [ 716.706176][T20238] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 716.706183][T20238] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fd5575976d4 [ 716.706191][T20238] R13: 00000000004c0c65 R14: 00000000004d4750 R15: 0000000000000003 [ 716.816937][T20249] FAULT_INJECTION: forcing a failure. [ 716.816937][T20249] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 716.839514][T20243] FAT-fs (loop5): Unrecognized mount option "utf8" or missing value [ 716.856307][T20249] CPU: 1 PID: 20249 Comm: syz-executor.4 Not tainted 5.4.0-syzkaller #0 [ 716.864686][T20249] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 716.874754][T20249] Call Trace: [ 716.878181][T20249] dump_stack+0x197/0x210 [ 716.882545][T20249] should_fail.cold+0xa/0x15 [ 716.887345][T20249] ? fault_create_debugfs_attr+0x180/0x180 [ 716.893178][T20249] ? ___might_sleep+0x163/0x2c0 [ 716.893209][T20249] should_fail_alloc_page+0x50/0x60 [ 716.893235][T20249] __alloc_pages_nodemask+0x1a1/0x910 [ 716.903381][T20249] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 716.903405][T20249] ? __alloc_pages_slowpath+0x2920/0x2920 [ 716.903431][T20249] ? kasan_unpoison_shadow+0x35/0x50 [ 716.925372][T20249] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 716.931645][T20249] alloc_pages_current+0x107/0x210 [ 716.936791][T20249] __vmalloc_node_range+0x4f8/0x810 [ 716.942030][T20249] ? bpf_map_area_alloc+0x20/0x30 [ 716.947087][T20249] __vmalloc_node_flags_caller+0x71/0x90 [ 716.952906][T20249] ? bpf_map_area_alloc+0x20/0x30 [ 716.957964][T20249] __bpf_map_area_alloc+0xde/0xf0 [ 716.963016][T20249] bpf_map_area_alloc+0x20/0x30 [ 716.967900][T20249] htab_map_alloc+0x8d3/0x11c0 [ 716.972780][T20249] ? htab_map_update_elem+0xca0/0xca0 [ 716.978178][T20249] __do_sys_bpf+0x478/0x37b0 [ 716.982796][T20249] ? bpf_prog_load+0x18a0/0x18a0 [ 716.987754][T20249] ? __kasan_check_write+0x14/0x20 [ 716.992894][T20249] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 716.998455][T20249] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 717.003757][T20249] ? wait_for_completion+0x440/0x440 [ 717.009077][T20249] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 717.015359][T20249] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 717.021017][T20249] ? do_syscall_64+0x26/0x790 [ 717.025725][T20249] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 717.031781][T20249] ? do_syscall_64+0x26/0x790 [ 717.036465][T20249] __x64_sys_bpf+0x73/0xb0 [ 717.040880][T20249] do_syscall_64+0xfa/0x790 [ 717.045380][T20249] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 717.052059][T20249] RIP: 0033:0x45a679 [ 717.055960][T20249] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 717.075666][T20249] RSP: 002b:00007fd557596c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 717.084391][T20249] RAX: ffffffffffffffda RBX: 00007fd557596c90 RCX: 000000000045a679 [ 717.092496][T20249] RDX: 000000000000003c RSI: 0000000020000040 RDI: 405a020000000000 [ 717.100611][T20249] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 717.108885][T20249] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fd5575976d4 [ 717.116850][T20249] R13: 00000000004c0c65 R14: 00000000004d4750 R15: 0000000000000003 [ 717.125272][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 717.131099][ C1] protocol 88fb is buggy, dev hsr_slave_1 13:21:12 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000780)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000040)={'nr0\x01\x00', 0x1132}) ioctl$TUNSETIFF(r0, 0x400454ca, 0x0) close(r1) 13:21:12 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x4004556d, &(0x7f0000000100)={0x0, 0x0, {0x3, 0x0, 0x0, {}, {}, @rumble}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) 13:21:12 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x40045564, &(0x7f0000000100)={0x0, 0x0, {0x4000, 0x0, 0x0, {}, {}, @rumble}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) 13:21:12 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x4004556e, &(0x7f0000000100)={0x0, 0x0, {0x0, 0x0, 0x7, {}, {}, @rumble}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) 13:21:12 executing program 4 (fault-call:0 fault-nth:7): bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x7880, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000, 0x0, 0x0, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x13]}, 0x3c) [ 717.164319][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 717.170151][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 717.176071][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 717.181866][ C0] protocol 88fb is buggy, dev hsr_slave_1 13:21:12 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x40045564, &(0x7f0000000100)={0x0, 0x0, {0xff00, 0x0, 0x0, {}, {}, @rumble}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) 13:21:12 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x4004556d, &(0x7f0000000100)={0x0, 0x0, {0x4, 0x0, 0x0, {}, {}, @rumble}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) [ 717.352181][T20266] FAULT_INJECTION: forcing a failure. [ 717.352181][T20266] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 717.452488][T20266] CPU: 1 PID: 20266 Comm: syz-executor.4 Not tainted 5.4.0-syzkaller #0 [ 717.460889][T20266] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 717.470968][T20266] Call Trace: [ 717.474263][T20266] dump_stack+0x197/0x210 [ 717.474288][T20266] should_fail.cold+0xa/0x15 [ 717.474306][T20266] ? fault_create_debugfs_attr+0x180/0x180 [ 717.474326][T20266] ? ___might_sleep+0x163/0x2c0 [ 717.489069][T20266] should_fail_alloc_page+0x50/0x60 [ 717.489097][T20266] __alloc_pages_nodemask+0x1a1/0x910 [ 717.499135][T20266] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 717.499154][T20266] ? __alloc_pages_slowpath+0x2920/0x2920 [ 717.499175][T20266] ? kasan_unpoison_shadow+0x35/0x50 [ 717.499194][T20266] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 717.499210][T20266] alloc_pages_current+0x107/0x210 [ 717.499227][T20266] ? ___might_sleep+0x163/0x2c0 [ 717.510319][T20266] __vmalloc_node_range+0x4f8/0x810 [ 717.510344][T20266] ? bpf_map_area_alloc+0x20/0x30 13:21:12 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x4004556e, &(0x7f0000000100)={0x0, 0x0, {0x0, 0x0, 0x8, {}, {}, @rumble}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) [ 717.510363][T20266] __vmalloc_node_flags_caller+0x71/0x90 [ 717.521336][T20266] ? bpf_map_area_alloc+0x20/0x30 [ 717.521355][T20266] __bpf_map_area_alloc+0xde/0xf0 [ 717.521376][T20266] bpf_map_area_alloc+0x20/0x30 [ 717.532701][T20266] htab_map_alloc+0x8d3/0x11c0 [ 717.532730][T20266] ? htab_map_update_elem+0xca0/0xca0 [ 717.532748][T20266] __do_sys_bpf+0x478/0x37b0 [ 717.583113][T20266] ? bpf_prog_load+0x18a0/0x18a0 [ 717.588072][T20266] ? __kasan_check_write+0x14/0x20 [ 717.588092][T20266] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 717.588115][T20266] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 717.588131][T20266] ? wait_for_completion+0x440/0x440 [ 717.588154][T20266] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 717.598803][T20266] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 717.598820][T20266] ? do_syscall_64+0x26/0x790 [ 717.598837][T20266] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 717.598851][T20266] ? do_syscall_64+0x26/0x790 [ 717.598874][T20266] __x64_sys_bpf+0x73/0xb0 [ 717.598890][T20266] do_syscall_64+0xfa/0x790 [ 717.598909][T20266] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 717.609481][T20266] RIP: 0033:0x45a679 [ 717.609498][T20266] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 717.609506][T20266] RSP: 002b:00007fd557596c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 717.609521][T20266] RAX: ffffffffffffffda RBX: 00007fd557596c90 RCX: 000000000045a679 [ 717.609530][T20266] RDX: 000000000000003c RSI: 0000000020000040 RDI: 405a020000000000 13:21:12 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) r1 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r1, &(0x7f0000000180), 0x27a4eaa51029717, 0x0) getsockopt$inet_sctp6_SCTP_AUTOCLOSE(r1, 0x84, 0x4, &(0x7f0000000000), &(0x7f0000000080)=0x4) recvmmsg(r0, &(0x7f0000001d00)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}], 0x2, 0x40000005, 0x0) setsockopt$SO_TIMESTAMP(r0, 0x1, 0x23, &(0x7f0000000040)=0x9, 0x4) r2 = socket$inet6(0xa, 0x80003, 0x80) ioctl(r2, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") 13:21:12 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x40045564, &(0x7f0000000100)={0x0, 0x0, {0x0, 0x0, 0x0, {}, {}, @rumble}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) 13:21:12 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x4004556d, &(0x7f0000000100)={0x0, 0x0, {0x5, 0x0, 0x0, {}, {}, @rumble}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) [ 717.609539][T20266] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 717.609548][T20266] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fd5575976d4 [ 717.609562][T20266] R13: 00000000004c0c65 R14: 00000000004d4750 R15: 0000000000000003 13:21:12 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x4004556e, &(0x7f0000000100)={0x0, 0x0, {0x0, 0x0, 0x300, {}, {}, @rumble}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) 13:21:13 executing program 4 (fault-call:0 fault-nth:8): bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x7880, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000, 0x0, 0x0, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x13]}, 0x3c) 13:21:13 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000780)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000040)={'nr0\x01\x00', 0x1132}) ioctl$TUNSETIFF(r0, 0x400454ca, 0x0) close(r1) 13:21:13 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x4004556d, &(0x7f0000000100)={0x0, 0x0, {0x6, 0x0, 0x0, {}, {}, @rumble}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) 13:21:13 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x40045564, &(0x7f0000000100)={0x0, 0x0, {0x0, 0x2, 0x0, {}, {}, @rumble}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) [ 717.989359][T20291] FAULT_INJECTION: forcing a failure. [ 717.989359][T20291] name fail_page_alloc, interval 1, probability 0, space 0, times 0 13:21:13 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x4004556e, &(0x7f0000000100)={0x0, 0x0, {0x0, 0x0, 0x500, {}, {}, @rumble}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) [ 718.066907][T20291] CPU: 1 PID: 20291 Comm: syz-executor.4 Not tainted 5.4.0-syzkaller #0 [ 718.075295][T20291] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 718.085371][T20291] Call Trace: [ 718.088691][T20291] dump_stack+0x197/0x210 [ 718.093060][T20291] should_fail.cold+0xa/0x15 [ 718.097689][T20291] ? fault_create_debugfs_attr+0x180/0x180 [ 718.103544][T20291] ? ___might_sleep+0x163/0x2c0 [ 718.108435][T20291] should_fail_alloc_page+0x50/0x60 [ 718.113665][T20291] __alloc_pages_nodemask+0x1a1/0x910 [ 718.119078][T20291] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 718.124648][T20291] ? __alloc_pages_slowpath+0x2920/0x2920 [ 718.130490][T20291] ? kasan_unpoison_shadow+0x35/0x50 [ 718.135799][T20291] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 718.142061][T20291] alloc_pages_current+0x107/0x210 [ 718.147191][T20291] ? ___might_sleep+0x163/0x2c0 [ 718.152070][T20291] __vmalloc_node_range+0x4f8/0x810 [ 718.152095][T20291] ? bpf_map_area_alloc+0x20/0x30 [ 718.152113][T20291] __vmalloc_node_flags_caller+0x71/0x90 [ 718.167955][T20291] ? bpf_map_area_alloc+0x20/0x30 [ 718.167972][T20291] __bpf_map_area_alloc+0xde/0xf0 [ 718.167989][T20291] bpf_map_area_alloc+0x20/0x30 [ 718.168003][T20291] htab_map_alloc+0x8d3/0x11c0 [ 718.168029][T20291] ? htab_map_update_elem+0xca0/0xca0 [ 718.187664][T20291] __do_sys_bpf+0x478/0x37b0 [ 718.197621][T20291] ? bpf_prog_load+0x18a0/0x18a0 [ 718.202578][T20291] ? __kasan_check_write+0x14/0x20 [ 718.207717][T20291] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 718.207740][T20291] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 718.218642][T20291] ? wait_for_completion+0x440/0x440 [ 718.218667][T20291] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 718.218699][T20291] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 718.230208][T20291] ? do_syscall_64+0x26/0x790 [ 718.230228][T20291] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 718.230241][T20291] ? do_syscall_64+0x26/0x790 [ 718.230263][T20291] __x64_sys_bpf+0x73/0xb0 [ 718.240393][T20291] do_syscall_64+0xfa/0x790 [ 718.240413][T20291] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 718.240430][T20291] RIP: 0033:0x45a679 [ 718.251144][T20291] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 718.251153][T20291] RSP: 002b:00007fd557596c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 718.251166][T20291] RAX: ffffffffffffffda RBX: 00007fd557596c90 RCX: 000000000045a679 [ 718.251184][T20291] RDX: 000000000000003c RSI: 0000000020000040 RDI: 405a020000000000 13:21:13 executing program 5: r0 = socket$bt_rfcomm(0x1f, 0x1, 0x3) ioctl$sock_SIOCBRDELBR(r0, 0x89a1, &(0x7f0000000000)='caif0\x00') r1 = socket$packet(0x11, 0x3, 0x300) r2 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x189) getsockopt$TIPC_CONN_TIMEOUT(r2, 0x10f, 0x82, &(0x7f00000000c0), &(0x7f0000000100)=0x4) recvmmsg(r1, &(0x7f0000001d00)=[{{0x0, 0x0, 0x0, 0x213}}, {{0x0, 0x0, 0x0}}], 0x4, 0x0, 0x0) setsockopt$SO_TIMESTAMP(r1, 0x1, 0x1d, &(0x7f0000000040)=0x7149, 0xfffffffffffffe28) r3 = socket$inet6(0xa, 0x80003, 0x80) r4 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r4, &(0x7f0000001b40)=[{0x0, 0x0, &(0x7f0000001c00)=[{&(0x7f0000000200)="73fe0e06f67492a1fb1c833b810a9a83e7c1f8ead7108b8b9db15677605d50f0d8e2e8ed7977be41925407c7a6b44a313539b9e72180bfba64c910ffc79684aaad253ee93fe98f41d3c4e2693b58e7fe66c1ad1498", 0x55}, {&(0x7f0000000280)="e16cc02dffee13161e9d56c012e338e93a4bc4fb06fc6039415fb0b95f6a23fbed5240bd1cb256d8b587c8168adb29ccadda4e373df893df19a18e72128a88e26b148783a0e141d9e5210cc0812518a23f41b2d20f4d1df70418f5b320dd4efde18ab955cc92543bf44367e2da8647dba55c0d6f7589f2060ff23e201e2edf05921ec24485a7c1a435f80f0f990377efe553fb37424dedf0fe569a", 0x9b}], 0x2, &(0x7f0000000340)=[@op={0x18, 0x117, 0x3, 0x2}, @op={0x18, 0x117, 0x3, 0x1}, @assoc={0x18, 0x117, 0x4, 0x43f}], 0x48, 0x20040014}, {0x0, 0x0, &(0x7f0000001880)=[{&(0x7f00000003c0)="6fd7a2e05ef73234adc8bfb8771676b85143b30ca67f99d7e7b269", 0x1b}, {&(0x7f0000000400)="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", 0x1000}, {&(0x7f0000001400)="08c38ba713fd54cd480ce7f65ade3d30b8a3ea87d713ffc5fe92ec80c619b25454e581476d93742fb02f84d2ca4505fb41c386ff94666d12e11206a6e33a9a8bc20d0402c7d42b976a2aadbba871010e25bc790c82308c609f6e514f702d4bf7e6ed2865fd1de562fc574f8f118b3ab8bcd963e9606ffd04177e", 0x118}, {&(0x7f0000001480)="62157e4084809003ea3ff4ff260bc253f5d642433d22802369c9966d65c820d54a3ec59cff1dc151ad11d1ed1ea0c282a3a148c9a151c67d1c522eca91c1837aa6924892fec45c60490eecf3862ed10798f658122ac18030caa7ec97a3ff3107374c935c2ca67d9a4f7eb375615d834edbfd1de8bcf2cc3413add8af26ca1e716076beb634ef65d70921643696ac4f0945c1bec482edd30ccb0e68d00ca9b851497eb3ab6016efc9fc46a989ad9940bbe117939173a40d962f30e49bd4074141b69292085b7bc9883174014efdea8eba7a773cc95448b0cc16", 0xd9}, {&(0x7f0000002dc0)="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", 0xff}, {&(0x7f0000001680)="a2346af480ff55fb5bae20e4a566e6936b33eea49acae0ea48db06461b998f1426ce33855676908e14e31938bcb0940239a600", 0xc}, {&(0x7f00000016c0)="36247c2b7fa893e6ea0f80d665efbc5632fcd2fc60cfbccf211bb587070aab4034712658f2dbaf7c3fc1f5f3784801477a", 0x31}, {&(0x7f0000001700)="1fee8c62b2b28c1e8acf258c40f1fe09c38ca7cbede3c32c1984e6416aa0fdbf32fe4fbf9ac820590c1196e67929b03964b61d26503488e622622c7a86d5f41cfb98", 0x42}, {&(0x7f0000001780)="42b18ddaec0e335b", 0x8}, {&(0x7f00000017c0)="35e3a0dcd251d69e6e88b62bc78aa67aa48af26b11819d22b99c760c73d8c02d207f6648a2bf64c71507159df561d6c89bb3ecc98de24c4db36468a25fa3ea47d1a0736591166e963df4dd41887a0b600ff2de9beed73ce8f629b902ec280827bd89b4b10f9fe5b4b2a250fbe1cfb34521afd0c933d0cf07e6c617c91b9d254413fd", 0x82}], 0xa, &(0x7f0000001d80)=[@iv={0x1018, 0x117, 0x2, 0x1000, "3993519cacffacae9f80f791d078c9fa4da1b9119ee3c8e95abace59e076cc29692f000eb0fc78a775f97e43dcf54226f50a5648eeca16674ea1febdd113add91ef87f4a75040394bb9870106889ae272661b2e04d92d53411d871aecdafcf1cdf8fccfc8aa18f2b4871a48fab1662d9017cb437d9ac0f81ad06fbd4e59b3d259b0e884ee5be04ff12832856c69b54dc432b72c6259c7cb0c93d19f93875b76d7662f31f994372e0dde1077afb3ea301568f702941644a9c8ce71b17551d9cb0ca5937df9cc5869f1d1bb040c088f1adba6af70a87b911a95ff4d58e31789b814cd9db119350a29bf7622b420fa0685a6d23f133365aecb4bc8adf2fc7a5851787cb34ee804fc0ec0752c4cb8ced9c7a16462c67d104ed3a55a4c17fc473ad34eecda00f0dfa92e9cdff21b5ed4caabbce03fae0f9f8d87eee91920e5803c376ac4c81e6d702ad2f9f0a5192c00ab9ae225f29b56ef130823d4e7f5a1fe85f1317e3b8e5dc1f8f3604cea792c98236d7278bd0006db1fa8107f8eee451a10ada2103c32ea837ee2f6f3a69ae8671b9c7f4c09bc940e3c7c88bb94f16398ac76d612a6cdc67235cafae18fcb3c159cec37f0d486c49497cd696fb0858af8424c5648209f7fe368146343e5124046350f75c11a05c1d1447bc82bef78291972660367095bf942d33b534515fe70fcf9b551ec3e64ee9547ec31a5eaace0173677d6183c1e6940c238868a8536d1113f3397bef6e93926b97918d7ab855e1fa83d96ef387b5e2dd65fc2c343faf57015ba45da8d08d371522507282b13154d3015c5e1effdbb0ad3ef92dbe5ac5de270ba93dc3159c83fc46c12d749a0a6804faf24274fcd6b51ba0cf0234df4fd3e9e2acb5d1f557c9a408e9f1d227880996ac9f06289980fde5586f7a863ccad994c800e4784cb2f8be9e3cd06df73ac1344bd7bf740a10ce43788260fbcab79fe7b1eecf140aba6e3c586e8720c7c9629176ae534b09d30ed875c4483a8ab46f115d264118bae3a30db72e4d301236bf4188eb06e560851a21135940aa14be1ee6746a8ca837bb5c11ddfdf34d4a985dc63c11b711e27f915c345ba422d9a50ca474bd0cd2ac024bdfa8b06f83c0a98badc4bd92b3ce0b58180ab5ad3dbb78ddd3a83d4366fd0f6ef386c4f102c27128f282a77d39b964dddab119b39ec4c0d1bc2d6e7f4f5235369c61fa840ded216b643e927571b296ec44e94e14f13f27f7057e11386edbcddaa255f674c4b3a4c2811dd17a55e003515b8ed5e9128715d4b3517ba300089279d56347010d9494cd9c0a744c655f23b5a6ed3e472200b8457ae26e37e9297802fec6b5d1df56eaa0fefbc9d288f9e7d9fe735c3c2fb2904c99689d39234c7684085a7cbd361fdc557aec7f290546631a913d2768b6de98a878087daca1aea069e1e99e138fc14e48e654d594f9859edeb9c08c15f0010cf22c8abc1e007e2cc80d33ca56ad7b8829316ad84016c9aa39cc25ddeec1a7c40cdba420cf320fec1fa0d58c73a5c04c100433deaed926923da2a9bb1650ead140c348a16a6388a3b85b9dcb785d6cc634383a8ff24036e7415924c9a3d87bfe355e9dba82e305440183d676c9cc4721227bdfed04c024beaa3f9f822ab3740aa51d257b794be3181974ac01579a43dce9d50faf99a2dcb840b7ce91055cd373bbd84647386202e320fc671ab2e12c69bc406d24e233bfde94a2cec8eab12f2ad383abb09bc7dfc28be2e7642e64b8bc26f9386fc5d3a4495cdd78d402f901f8701d7bd1f875b83f21b9ce0d9460f1a0cdf350c8f1b6b27de4e1644a9add476035fad424e99fb3f4da362748acdcba649e68dbdd0728d38c053dd27b05e161eb9a8757acf1fbf96db8f1fa730e01f8670695c7aa062fb8290d33f915378863df32846ebf87e59582a31b9f9d0961e948987dd5ffb34de219ffecb742ed5103796ba8f647629e4381c6ea09944d638106abf91c2f6d50ef5e5d0b3983b4844525f4cab9235402cf92b231049084ec249cfd28c5a2b433afc0f2ca8e5fa01c5b159916448fffecd81255a1b2539ff27e3ed7fa6bbcb9eaf8ee270a4a7c0cf209246e3b51a593be019a81e998428d9e55f2abf15526067bca311e1ab8d076b67a8c6f7874dc70ce661e1ec02479e1968dcf957b92c73757996de60ff8152f9518371ab06187b11b2fb57baa97352af0c8e85e31c3a7ace3868df24d9264775f6d07fd06051400549e57945fba8fb224beb765870780b2375e14fef5186329ed9aa0df0e12734cb5d0210bf7d20da5f8d6acc5865903b90c83733c64a7b58d0a6edb742239f4ff317aab2733b70eef69da2daad581375d2b497c4decc8f855f5288de2501aeb627d3d0efe3298ad2875d0552928a967fc7a950c345bec1be16fbe656045ca30063cd6671c909506bd0de28f4dd3a637cf35d3196c796b552b1bf1b39d75b5eda0be2ff972fe81144853142b9f4e295566b87cabda206bc3f501a8fb10d06dce71e994e4a5ca1b106bba9363627e280e7f4c87a6d6ed512ad5b40a49a8dbc3ca2a393ab9694e2aabf75cfed57787d444bb70fac358497381e65a1a9c6b0ae15e6e8ca51270dab2c1c92f1b93003675cbe7a49dfb350d34bc89b41d2ed4e05800f66a7780cecd03acc31b8d679430d7042aff32b5026f426cebec580ca69aaa43a36c015eaa64ac5492476f0c444fff411cd3be7fe9faafbdef515474b5018172325698016d485fd6fa4d5c2e22aafb211b1aa74b42f848cf358c5403d998e8304d91fd3827d4f9f57ccab756e235457d7ee956d554d3d28357c1864d38441a08d513b69a03760eb8b8ac229dadb9a4233e8f1c8d05ac8135988d7809f659717d58364a2edddeb0f0af1a9ea624d673210221aa87ae3429bc2dc7cf2c7aa70e27fa575fdd488840f11c53f3e14414987cb5222862c4b3ca369d01806d10c82d6803bc0a7cacf18b00203c4cc68dc030e7da39bdc42d28ab287844bc8b0c7513e59a4dc3bcbb598616531684b2aa66a88f5790d75d8fc6e33342db52a717f5b7882059b4ad5f9aa56d5db3d4b73d6a4157262af9f3ac3cc824b4ff4f6d124a640095bb2a53dfa48a61e1ae08b9fcbd8234aa906b97f785ab89c395ee3c3c351e47d6eb3bb2431405edc80c381a8a339ca13dd105399dcf898600eaa62b791c2944aef8957e080be1c2ec31ef3023ba7c77341f900486cb6f63ade03a05eec8a507a17b9e1abf9e59aaaa69e2a2319fc06ef8ed437f8acaf9915f6d7ffeebee067a5ed888c617433ae7c90f561dff20dede5cce70cc57b3dd6c0c0e079056f901383be51c9b6045c7128ab12c20bb3a1e94207f68e59d18b48101c8385d97fb8fa1d16e1d638e483916e30ba71f0a3484923222f499aa0d835ccb5d602c8e6d31d3c9924a40abba71db8f40b0ca2fec3a72f91b1d0df7d31c8bc7784f40c21ec9b0e3cc3c69cd5ffe9253d0934fa488154ba433b6606013601316ffdcdd9a54bd799e22103965fa326ea550fc826c133a484709a03e228581f0da2118dfb435763f0d3e30af9d4a241bce70f6ea7b785d46176d787e78b7c8d11441a6a432a42caececc20fd4ce6a26ab10a0f5dafe9e9c02148280f0592c6e012086e8f37ff6dbb3a1ad00e00f5266b5483bf765c16c46234306b8463b5addd9aeac791a84f5d8f611928b4f113687443656b96182eacb549fb1d3fc757722247e27b609f03bb23792db876ca6bae45c34e09649ca06f5c330b1c91c37bf5cb97b80566deb23721c6185b7fea91ff3c21ebfea0b0be3fa44026eae7f6f2f50ef475f10fdc10aec1935d553d2f0497cafe83d33cc8133edd01f206a4e9a1906992788777d60f5b9fc5b76eb09968f072b9e729b42a9ab1864443e41509757fa000482e7549f7f81478249c5aa2fbb700d8c7f2dea3aed9554af68c9c690732ddec666ed81b1ddd0934df78f30142c057220319aa7f1dfaa262b5d8d73f3a641883f77066ff9f464b92ce31c0ab5dfb09f518f5369b7019f7eed6bc0edf052fc33add0ac06002423d7e5e751a7df833b6e97bacb4c397808049de915cd38117ef40b2c9197752339a7def02bebb667232c0a18c25ca82a5ecc33a9bb0640deb390fbde069d11b9e5a4a39857b6a4c420d0fd19fce7635cf3742a5f6b84d5b5e56efff570bafb74f969e425e25cc138d5653bc887bc109306afbb1f176bd97e934e2b205d5050070d5d89194d81207041fb2cb8f6a827e2f65d4494aa0d28e019a7f3d44f4128ac63ff47616aea853b62b5a7123beb6fac22801b2969576c008aed3f453ba56f3ef9b7413a67069a670003cebf9c2a8af6d81914a2b1d27b7a2216b831730aa5cfb95f71f2e77f95074c913b66615b6fc21b35fcc1778c94c9b1d8f7609cf58b44fce2c6516ca4d10b5cd0e5ef9d83057edbeb6dca48d87f577ac6eb24dc0f56a3cb325768c6029f47f64d6e31c7a2486b0e38367af24068246853a2e30c425373ee00793489ba68a783fbdcf343c80967dd38bb6bee9301829dcf7d763481ed4c431506b5ae8ccb6d0a1bb5b95703a5b6d9891bb81267c3e35d538ce1d287f7c2caa97b428bce26cddad82ec16a176745ca4e1f523575308d39cd7b7326d1dbaa0f67e30c83432d1ca22867edef4b3522f0765de5d0da09d61aba14b8100ce64bb558557f0c5990d8a0732a7301bce94d0f08d7bb79011f9100379c462cfd1044f333900fac58518295c09953841ca5be33fd9dc3437ed79f07412412bb00daf1099d7fc27b974814c74e58254ac7e310a99c4b9027fd17feda1347c3715f60d60219d2ed0a5cf484d9aaf885dccddf00d9e68fe4dcc9a8e0c035c46491c1a6bd242b1b4275b81028c3c9d3065cc343e2e2cb7c3a228a1d64eb31dc790943fc2d3fc3100d03ce264ce1258a38b27e09e540d0fe2c82d6ae4a5105485750dc36df5ea88947a3d8cef70f676c5f4e7aa2469efe433648cc9cda5ec6a6255e8bc14cea7dd67708da39616e36e7786a9a3edf1e29b74e816909028ba22dd898dac02e8cd49c40329202ef3b56729c74209ffcfb70777cdae5d83426db9377d361b3e6aa8812253ca971518c3cf092fe44e006a237c83a0cd5387b3a9994d8a4bcc919ad7b6f08adc8ba3a44be63500e2aacfd7124c6e919d797d2f2069383cab9f6dcc7fad6a296b264280298c2d3ee0c4648ff26cc94cf75d726ab91dc6b80729d88604be9775471c0e5720bac25b00183c1e320fc82df1a71d1f1bb3a600bd81830c5b92cd8def3856a35c1217a0c0ec2c8089d8d68d58315a103dc4a56481911c5279849c43f122e9487cf471ff99937351785237b881bfd374aa25a789191ee80570832dcf0b17420d63bc9e9fd57e3ae8595d9c50a1a5cd720dbad1bfa47d671f424df65cb5cc6032e415b84ec3e9199b7989cbea806856042c83845146be35a9666b3033af1a3a30c559d0d8f3aa77e34c9da479a7d36bb1f07a02774c9feef7e85345b8d39e1daa392778413d9dfb9800b613fd2b7aec4e45976735ce4666245d693d342bab048461c79a530a3f705e5afa65fa3a653645f9edeffd10e41397c8f3668ed20f87ce734e56088362041a5fe1f2ce62c00d836a61e67268af29d6f62e3782a172f392049e07537eee8b1dd115944d5f6f25f7d7d9492c97ce4d4e1eb8a87c5da17ff4c0c6227242719ebbba77d169de802feda4c23d8d1a0466b6022d7a933a834b0f11db8a74be584d15bc34255570e265f52a2a4c33de985237195a2ed8330574dfcbb146f9a043d2752e"}], 0xfffffffffffffee6, 0x800}, {0x0, 0x0, &(0x7f0000001b00)=[{&(0x7f0000001940)="04230e0308776fd84c7bf2786bfc6b27258e9ad0bdfd7dc0279a28aeb99508791fc1b30e311d3de94e1f6701ab1a3990d0925c3c5c4864c7d7cc17b106ee4086c8e2c5b93d1d5a6ea1b66e5fa93fce151d2cd537eb91aeee713e9945d06e49aa18df7c4e3092507ef914031cd34b114e37144b9333e159c23068c0d8a1d414fde4ce4f6ccf5906645969a061c81d37873b2264c0d4fc1ea213fb3cdbb2f3ecbb0acb3b3eff73a1ef4f8405172af1fb5d3fbae705a0d9cf0b3812877e299b1bf7a37951ed1885ecd84fa7671e3da5562398c5cb5a6b3a58a267c2b8db48f5", 0xde}, {&(0x7f0000001a40)="a78ac1148ec685c10841cb0d1f0b19db10efe7870a8d16b1a47015c78abd954bf9cb680746b0e1ee65f7692559848257565bc685c84ae38371227c928ae47198a9bb69dbd4408a23e339c78437d0f0d37d5d04afd7eab0f609f127a5288158d31e89b9f129a896abed846575ef07dc0051adaf3aa5735e9b253bc0a66875787c895c08e705ccdeb3ca0e71387be62cf6b584f6f504fd016e74167a69733908378b590467d2ff03fc", 0xa8}], 0x2, 0x0, 0x1de, 0x1}], 0x0, 0x0) setsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r4, 0x84, 0x71, &(0x7f0000000140)={0x0, 0x80}, 0x8) ioctl(r3, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") [ 718.260112][T20291] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 718.260121][T20291] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fd5575976d4 [ 718.260130][T20291] R13: 00000000004c0c65 R14: 00000000004d4750 R15: 0000000000000003 13:21:13 executing program 4 (fault-call:0 fault-nth:9): bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x7880, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000, 0x0, 0x0, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x13]}, 0x3c) 13:21:13 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x4004556e, &(0x7f0000000100)={0x0, 0x0, {0x0, 0x0, 0x600, {}, {}, @rumble}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) 13:21:13 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x4004556d, &(0x7f0000000100)={0x0, 0x0, {0x7, 0x0, 0x0, {}, {}, @rumble}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) 13:21:13 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x40045564, &(0x7f0000000100)={0x0, 0x0, {0x0, 0x3, 0x0, {}, {}, @rumble}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) 13:21:13 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) recvmmsg(r0, &(0x7f0000001d00)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}], 0x2, 0x0, 0x0) r1 = socket$inet(0xa, 0x801, 0x84) connect$inet(r1, &(0x7f0000004cc0)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r1, 0x84, 0x9, &(0x7f00000000c0)={0x0, @in={{0x2, 0x0, @rand_addr=0xac14ffbb}}}, &(0x7f0000000180)=0x98) r2 = socket$inet(0xa, 0x801, 0x84) r3 = creat(&(0x7f00000003c0)='./file0\x00', 0x1) mmap$dsp(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x4000000, 0x10, r3, 0x0) connect$inet(r2, &(0x7f0000004cc0)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r2, 0x84, 0x9, &(0x7f00000000c0)={0x0, @in={{0x2, 0x0, @rand_addr=0xac14ffbb}}}, &(0x7f0000000180)=0x98) r4 = syz_init_net_socket$bt_l2cap(0x1f, 0x96e1ee56613d3bd1, 0x0) setsockopt$SO_TIMESTAMP(r4, 0x1, 0x1d, &(0x7f0000000040)=0x9, 0xffffffffffffff49) r5 = socket$inet6(0xa, 0x80003, 0x80) ioctl(r5, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") r6 = getpgrp(0x0) getsockopt$inet_sctp6_SCTP_EVENTS(0xffffffffffffffff, 0x84, 0xb, &(0x7f0000000400), &(0x7f0000000440)=0xb) setpriority(0x0, r6, 0x0) r7 = syz_open_procfs(r6, &(0x7f0000000080)='schedstat\x00') preadv(r7, &(0x7f0000000000)=[{&(0x7f00000000c0)=""/169, 0x2aa}], 0x1, 0x0) symlinkat(&(0x7f0000000340)='./file0\x00', r2, &(0x7f0000000380)='./file0\x00') pipe(&(0x7f0000000200)={0xffffffffffffffff}) r9 = syz_open_procfs(0x0, &(0x7f00000001c0)='mounts\x00') getsockname$inet(r1, &(0x7f00000002c0)={0x2, 0x0, @local}, &(0x7f0000000300)=0x10) sendfile(r9, r9, &(0x7f0000000180)=0x74000000, 0x5) ioctl$VT_OPENQRY(r9, 0x5600, &(0x7f0000000280)) r10 = socket$inet(0xa, 0x801, 0x84) connect$inet(r10, &(0x7f0000004cc0)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r10, 0x84, 0x9, &(0x7f00000000c0)={0x0, @in={{0x2, 0x0, @rand_addr=0xac14ffbb}}}, &(0x7f0000000180)=0x98) setsockopt$IP_VS_SO_SET_TIMEOUT(r10, 0x0, 0x48a, &(0x7f0000000480)={0x3, 0x0, 0x2}, 0xc) ioctl$USBDEVFS_RESETEP(r8, 0x80045503, &(0x7f0000000240)={0x7}) ioctl$PIO_CMAP(r7, 0x4b71, &(0x7f0000000000)={0x4, 0x7fff, 0x2, 0x7fffffff, 0x0, 0x1}) [ 718.546486][T20311] FAULT_INJECTION: forcing a failure. [ 718.546486][T20311] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 718.613811][T20311] CPU: 0 PID: 20311 Comm: syz-executor.4 Not tainted 5.4.0-syzkaller #0 [ 718.622185][T20311] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 718.622191][T20311] Call Trace: [ 718.622215][T20311] dump_stack+0x197/0x210 [ 718.622241][T20311] should_fail.cold+0xa/0x15 [ 718.644576][T20311] ? fault_create_debugfs_attr+0x180/0x180 [ 718.650406][T20311] ? ___might_sleep+0x163/0x2c0 [ 718.655290][T20311] should_fail_alloc_page+0x50/0x60 [ 718.660516][T20311] __alloc_pages_nodemask+0x1a1/0x910 [ 718.665911][T20311] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 718.671463][T20311] ? __alloc_pages_slowpath+0x2920/0x2920 [ 718.671491][T20311] ? kasan_unpoison_shadow+0x35/0x50 [ 718.671510][T20311] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 718.671530][T20311] alloc_pages_current+0x107/0x210 [ 718.693963][T20311] ? ___might_sleep+0x163/0x2c0 [ 718.698845][T20311] __vmalloc_node_range+0x4f8/0x810 [ 718.704081][T20311] ? bpf_map_area_alloc+0x20/0x30 [ 718.709139][T20311] __vmalloc_node_flags_caller+0x71/0x90 [ 718.714783][T20311] ? bpf_map_area_alloc+0x20/0x30 [ 718.714799][T20311] __bpf_map_area_alloc+0xde/0xf0 [ 718.714815][T20311] bpf_map_area_alloc+0x20/0x30 [ 718.714831][T20311] htab_map_alloc+0x8d3/0x11c0 [ 718.714859][T20311] ? htab_map_update_elem+0xca0/0xca0 [ 718.714874][T20311] __do_sys_bpf+0x478/0x37b0 [ 718.714894][T20311] ? bpf_prog_load+0x18a0/0x18a0 [ 718.714907][T20311] ? __kasan_check_write+0x14/0x20 [ 718.714927][T20311] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 718.724965][T20311] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 718.724984][T20311] ? wait_for_completion+0x440/0x440 [ 718.725006][T20311] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 718.725032][T20311] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 718.725047][T20311] ? do_syscall_64+0x26/0x790 [ 718.725062][T20311] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 718.725074][T20311] ? do_syscall_64+0x26/0x790 [ 718.725094][T20311] __x64_sys_bpf+0x73/0xb0 [ 718.725113][T20311] do_syscall_64+0xfa/0x790 [ 718.740177][T20311] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 718.740191][T20311] RIP: 0033:0x45a679 [ 718.740205][T20311] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 718.740218][T20311] RSP: 002b:00007fd557596c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 718.749727][T20311] RAX: ffffffffffffffda RBX: 00007fd557596c90 RCX: 000000000045a679 [ 718.760370][T20311] RDX: 000000000000003c RSI: 0000000020000040 RDI: 405a020000000000 13:21:14 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000780)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000040)={'nr0\x01\x00', 0x1132}) ioctl$TUNSETIFF(r0, 0x400454ca, 0x0) close(r1) [ 718.760379][T20311] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 718.760388][T20311] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fd5575976d4 [ 718.760398][T20311] R13: 00000000004c0c65 R14: 00000000004d4750 R15: 0000000000000003 13:21:14 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x4004556e, &(0x7f0000000100)={0x0, 0x0, {0x0, 0x0, 0x700, {}, {}, @rumble}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) 13:21:14 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x4004556d, &(0x7f0000000100)={0x0, 0x0, {0x8, 0x0, 0x0, {}, {}, @rumble}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) 13:21:14 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x40045564, &(0x7f0000000100)={0x0, 0x0, {0x0, 0x4, 0x0, {}, {}, @rumble}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) 13:21:14 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x4004556e, &(0x7f0000000100)={0x0, 0x0, {0x0, 0x0, 0x4000, {}, {}, @rumble}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) 13:21:14 executing program 4 (fault-call:0 fault-nth:10): bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x7880, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000, 0x0, 0x0, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x13]}, 0x3c) [ 719.164272][ C1] net_ratelimit: 2 callbacks suppressed [ 719.164282][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 719.175835][ C1] protocol 88fb is buggy, dev hsr_slave_1 13:21:14 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x4004556d, &(0x7f0000000100)={0x0, 0x0, {0x300, 0x0, 0x0, {}, {}, @rumble}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) [ 719.244301][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 719.250193][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 719.256114][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 719.261912][ C0] protocol 88fb is buggy, dev hsr_slave_1 13:21:14 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x40045564, &(0x7f0000000100)={0x0, 0x0, {0x0, 0x5, 0x0, {}, {}, @rumble}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) 13:21:14 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x4004556e, &(0x7f0000000100)={0x0, 0x0, {0x0, 0x0, 0xff00, {}, {}, @rumble}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) 13:21:14 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) recvmmsg(r0, &(0x7f0000001d00)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}], 0x2, 0x0, 0x0) setsockopt$SO_TIMESTAMP(r0, 0x1, 0x23, &(0x7f0000000040)=0x9, 0x4) r1 = socket$inet(0xa, 0x801, 0x84) connect$inet(r1, &(0x7f0000004cc0)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) r2 = socket$inet(0xa, 0x801, 0x84) connect$inet(r2, &(0x7f0000004cc0)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r2, 0x84, 0x9, &(0x7f00000000c0)={0x0, @in={{0x2, 0x0, @rand_addr=0xac14ffbb}}}, &(0x7f0000000180)=0x98) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r2, 0x84, 0x9, &(0x7f00000000c0)={0x0, @in={{0x2, 0x4e20, @rand_addr=0xac14ffbb}}, 0x0, 0x0, 0x1}, &(0x7f0000000180)=0x98) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r1, 0x84, 0x12, &(0x7f0000000000), &(0x7f0000000080)=0x4) r3 = socket$inet6(0xa, 0x80003, 0x80) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000240)) r4 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) ftruncate(r4, 0x81fd) write$FUSE_NOTIFY_INVAL_ENTRY(r4, &(0x7f0000000200)={0x32, 0x3, 0x0, {0x5, 0x11, 0x0, 'wlan0bdevbdevem1]'}}, 0x32) ioctl(r3, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") [ 719.327602][T20344] FAULT_INJECTION: forcing a failure. [ 719.327602][T20344] name fail_page_alloc, interval 1, probability 0, space 0, times 0 13:21:14 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000780)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000040)={'nr0\x01\x00', 0x1132}) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'nr0\x01\x00'}) close(r1) [ 719.444606][T20344] CPU: 1 PID: 20344 Comm: syz-executor.4 Not tainted 5.4.0-syzkaller #0 [ 719.452986][T20344] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 719.452994][T20344] Call Trace: [ 719.453020][T20344] dump_stack+0x197/0x210 [ 719.453043][T20344] should_fail.cold+0xa/0x15 [ 719.453069][T20344] ? fault_create_debugfs_attr+0x180/0x180 [ 719.481165][T20344] ? ___might_sleep+0x163/0x2c0 [ 719.486058][T20344] should_fail_alloc_page+0x50/0x60 [ 719.491283][T20344] __alloc_pages_nodemask+0x1a1/0x910 [ 719.496686][T20344] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 719.502262][T20344] ? __alloc_pages_slowpath+0x2920/0x2920 [ 719.508024][T20344] ? kasan_unpoison_shadow+0x35/0x50 [ 719.508042][T20344] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 719.508063][T20344] alloc_pages_current+0x107/0x210 [ 719.519579][T20344] ? ___might_sleep+0x163/0x2c0 [ 719.519598][T20344] __vmalloc_node_range+0x4f8/0x810 [ 719.519622][T20344] ? bpf_map_area_alloc+0x20/0x30 [ 719.519638][T20344] __vmalloc_node_flags_caller+0x71/0x90 [ 719.519653][T20344] ? bpf_map_area_alloc+0x20/0x30 [ 719.519668][T20344] __bpf_map_area_alloc+0xde/0xf0 [ 719.519688][T20344] bpf_map_area_alloc+0x20/0x30 [ 719.529619][T20344] htab_map_alloc+0x8d3/0x11c0 [ 719.539842][T20344] ? htab_map_update_elem+0xca0/0xca0 [ 719.539863][T20344] __do_sys_bpf+0x478/0x37b0 [ 719.550482][T20344] ? bpf_prog_load+0x18a0/0x18a0 [ 719.550497][T20344] ? __kasan_check_write+0x14/0x20 [ 719.550517][T20344] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 719.560452][T20344] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 719.560470][T20344] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 719.560492][T20344] ? debug_smp_processor_id+0x33/0x18a [ 719.571086][T20344] ? rcu_lockdep_current_cpu_online+0xe3/0x130 [ 719.571118][T20344] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 719.580607][T20344] ? do_syscall_64+0x26/0x790 [ 719.580624][T20344] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 719.580642][T20344] ? do_syscall_64+0x26/0x790 [ 719.591291][T20344] __x64_sys_bpf+0x73/0xb0 [ 719.591317][T20344] do_syscall_64+0xfa/0x790 [ 719.602808][T20344] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 719.602819][T20344] RIP: 0033:0x45a679 [ 719.602836][T20344] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 719.614411][T20344] RSP: 002b:00007fd557596c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 719.614426][T20344] RAX: ffffffffffffffda RBX: 00007fd557596c90 RCX: 000000000045a679 13:21:14 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x4004556d, &(0x7f0000000100)={0x0, 0x0, {0x500, 0x0, 0x0, {}, {}, @rumble}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) 13:21:14 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x40045564, &(0x7f0000000100)={0x0, 0x0, {0x0, 0x6, 0x0, {}, {}, @rumble}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) [ 719.614435][T20344] RDX: 000000000000003c RSI: 0000000020000040 RDI: 405a020000000000 [ 719.614444][T20344] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 719.614453][T20344] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fd5575976d4 [ 719.614460][T20344] R13: 00000000004c0c65 R14: 00000000004d4750 R15: 0000000000000003 13:21:15 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x4004556e, &(0x7f0000000100)={0x0, 0x0, {0x0, 0x0, 0x0, {}, {}, @rumble}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) 13:21:15 executing program 4 (fault-call:0 fault-nth:11): bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x7880, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000, 0x0, 0x0, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x13]}, 0x3c) 13:21:15 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x4004556d, &(0x7f0000000100)={0x0, 0x0, {0x600, 0x0, 0x0, {}, {}, @rumble}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) 13:21:15 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x40045564, &(0x7f0000000100)={0x0, 0x0, {0x0, 0x7, 0x0, {}, {}, @rumble}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) [ 720.010621][T20371] FAULT_INJECTION: forcing a failure. [ 720.010621][T20371] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 720.066902][T20371] CPU: 1 PID: 20371 Comm: syz-executor.4 Not tainted 5.4.0-syzkaller #0 [ 720.075543][T20371] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 720.075549][T20371] Call Trace: [ 720.075575][T20371] dump_stack+0x197/0x210 [ 720.075599][T20371] should_fail.cold+0xa/0x15 [ 720.075617][T20371] ? fault_create_debugfs_attr+0x180/0x180 [ 720.075637][T20371] ? ___might_sleep+0x163/0x2c0 [ 720.093679][T20371] should_fail_alloc_page+0x50/0x60 13:21:15 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x4004556d, &(0x7f0000000100)={0x0, 0x0, {0x700, 0x0, 0x0, {}, {}, @rumble}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) [ 720.093697][T20371] __alloc_pages_nodemask+0x1a1/0x910 [ 720.093713][T20371] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 720.093728][T20371] ? __alloc_pages_slowpath+0x2920/0x2920 [ 720.093749][T20371] ? kasan_unpoison_shadow+0x35/0x50 [ 720.104172][T20371] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 720.104193][T20371] alloc_pages_current+0x107/0x210 [ 720.104207][T20371] ? ___might_sleep+0x163/0x2c0 [ 720.104224][T20371] __vmalloc_node_range+0x4f8/0x810 [ 720.104247][T20371] ? bpf_map_area_alloc+0x20/0x30 [ 720.104261][T20371] __vmalloc_node_flags_caller+0x71/0x90 [ 720.104279][T20371] ? bpf_map_area_alloc+0x20/0x30 [ 720.114321][T20371] __bpf_map_area_alloc+0xde/0xf0 [ 720.114338][T20371] bpf_map_area_alloc+0x20/0x30 [ 720.114353][T20371] htab_map_alloc+0x8d3/0x11c0 [ 720.114380][T20371] ? htab_map_update_elem+0xca0/0xca0 [ 720.125268][T20371] __do_sys_bpf+0x478/0x37b0 [ 720.125290][T20371] ? bpf_prog_load+0x18a0/0x18a0 [ 720.125305][T20371] ? __kasan_check_write+0x14/0x20 [ 720.125322][T20371] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 720.125342][T20371] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 720.136309][T20371] ? wait_for_completion+0x440/0x440 [ 720.136334][T20371] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 720.136363][T20371] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 720.136382][T20371] ? do_syscall_64+0x26/0x790 [ 720.188012][T20371] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 720.188030][T20371] ? do_syscall_64+0x26/0x790 [ 720.188055][T20371] __x64_sys_bpf+0x73/0xb0 [ 720.198108][T20371] do_syscall_64+0xfa/0x790 [ 720.198131][T20371] entry_SYSCALL_64_after_hwframe+0x49/0xbe 13:21:15 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x4004556e, &(0x7f0000000100)={0x0, 0x0, {0x0, 0x0, 0x0, {0x2}, {}, @rumble}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) 13:21:15 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000780)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000040)={'nr0\x01\x00', 0x1132}) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'nr0\x01\x00'}) close(r1) [ 720.198144][T20371] RIP: 0033:0x45a679 [ 720.198161][T20371] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 720.198168][T20371] RSP: 002b:00007fd557596c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 720.198186][T20371] RAX: ffffffffffffffda RBX: 00007fd557596c90 RCX: 000000000045a679 13:21:15 executing program 4 (fault-call:0 fault-nth:12): bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x7880, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000, 0x0, 0x0, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x13]}, 0x3c) [ 720.208187][T20371] RDX: 000000000000003c RSI: 0000000020000040 RDI: 405a020000000000 [ 720.208195][T20371] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 720.208205][T20371] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fd5575976d4 [ 720.208213][T20371] R13: 00000000004c0c65 R14: 00000000004d4750 R15: 0000000000000003 [ 720.294346][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 720.294404][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 720.450134][T20386] FAULT_INJECTION: forcing a failure. [ 720.450134][T20386] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 720.634390][T20386] CPU: 0 PID: 20386 Comm: syz-executor.4 Not tainted 5.4.0-syzkaller #0 [ 720.642964][T20386] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 720.653037][T20386] Call Trace: [ 720.656351][T20386] dump_stack+0x197/0x210 [ 720.660718][T20386] should_fail.cold+0xa/0x15 [ 720.665332][T20386] ? fault_create_debugfs_attr+0x180/0x180 [ 720.665354][T20386] ? ___might_sleep+0x163/0x2c0 [ 720.676180][T20386] should_fail_alloc_page+0x50/0x60 [ 720.681407][T20386] __alloc_pages_nodemask+0x1a1/0x910 [ 720.686788][T20386] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 720.686812][T20386] ? __alloc_pages_slowpath+0x2920/0x2920 [ 720.686833][T20386] ? kasan_unpoison_shadow+0x35/0x50 [ 720.686854][T20386] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 720.709657][T20386] alloc_pages_current+0x107/0x210 [ 720.714778][T20386] ? ___might_sleep+0x163/0x2c0 [ 720.719646][T20386] __vmalloc_node_range+0x4f8/0x810 [ 720.724955][T20386] ? bpf_map_area_alloc+0x20/0x30 [ 720.729999][T20386] __vmalloc_node_flags_caller+0x71/0x90 [ 720.735655][T20386] ? bpf_map_area_alloc+0x20/0x30 [ 720.740699][T20386] __bpf_map_area_alloc+0xde/0xf0 [ 720.745919][T20386] bpf_map_area_alloc+0x20/0x30 [ 720.750787][T20386] htab_map_alloc+0x8d3/0x11c0 [ 720.755690][T20386] ? htab_map_update_elem+0xca0/0xca0 [ 720.761175][T20386] __do_sys_bpf+0x478/0x37b0 [ 720.765781][T20386] ? bpf_prog_load+0x18a0/0x18a0 [ 720.765798][T20386] ? __kasan_check_write+0x14/0x20 [ 720.765813][T20386] ? __mutex_unlock_slowpath+0xf0/0x6a0 13:21:16 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) recvmmsg(r0, &(0x7f0000001d00)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}], 0x2, 0x0, 0x0) setsockopt$SO_TIMESTAMP(r0, 0x1, 0x23, &(0x7f0000000040)=0x9, 0x4) r1 = socket$inet6(0xa, 0x80003, 0x80) ioctl(r1, 0x1000008912, &(0x7f0000000200)="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") [ 720.765827][T20386] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 720.765842][T20386] ? wait_for_completion+0x440/0x440 [ 720.765868][T20386] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 720.765902][T20386] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 720.765916][T20386] ? do_syscall_64+0x26/0x790 [ 720.765935][T20386] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 720.775971][T20386] ? do_syscall_64+0x26/0x790 [ 720.775992][T20386] __x64_sys_bpf+0x73/0xb0 [ 720.776008][T20386] do_syscall_64+0xfa/0x790 [ 720.776032][T20386] entry_SYSCALL_64_after_hwframe+0x49/0xbe 13:21:16 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x4004556e, &(0x7f0000000100)={0x0, 0x0, {0x0, 0x0, 0x0, {0x3}, {}, @rumble}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) 13:21:16 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x40045564, &(0x7f0000000100)={0x0, 0x0, {0x0, 0x8, 0x0, {}, {}, @rumble}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) 13:21:16 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x4004556d, &(0x7f0000000100)={0x0, 0x0, {0x3f00, 0x0, 0x0, {}, {}, @rumble}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) 13:21:16 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000780)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000040)={'nr0\x01\x00', 0x1132}) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'nr0\x01\x00'}) close(r1) 13:21:16 executing program 4 (fault-call:0 fault-nth:13): bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x7880, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000, 0x0, 0x0, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x13]}, 0x3c) [ 720.776044][T20386] RIP: 0033:0x45a679 [ 720.776058][T20386] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 720.776066][T20386] RSP: 002b:00007fd557596c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 720.776080][T20386] RAX: ffffffffffffffda RBX: 00007fd557596c90 RCX: 000000000045a679 [ 720.776089][T20386] RDX: 000000000000003c RSI: 0000000020000040 RDI: 405a020000000000 [ 720.776097][T20386] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 720.776106][T20386] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fd5575976d4 [ 720.776113][T20386] R13: 00000000004c0c65 R14: 00000000004d4750 R15: 0000000000000003 [ 720.936689][T20400] FAULT_INJECTION: forcing a failure. [ 720.936689][T20400] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 720.974314][T20400] CPU: 1 PID: 20400 Comm: syz-executor.4 Not tainted 5.4.0-syzkaller #0 13:21:16 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x4004556e, &(0x7f0000000100)={0x0, 0x0, {0x0, 0x0, 0x0, {0x4}, {}, @rumble}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) [ 720.982793][T20400] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 720.992975][T20400] Call Trace: [ 720.996432][T20400] dump_stack+0x197/0x210 [ 721.000915][T20400] should_fail.cold+0xa/0x15 [ 721.005535][T20400] ? fault_create_debugfs_attr+0x180/0x180 [ 721.005554][T20400] ? ___might_sleep+0x163/0x2c0 [ 721.005585][T20400] should_fail_alloc_page+0x50/0x60 [ 721.005603][T20400] __alloc_pages_nodemask+0x1a1/0x910 [ 721.005620][T20400] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 721.005641][T20400] ? __alloc_pages_slowpath+0x2920/0x2920 [ 721.026900][T20400] ? kasan_unpoison_shadow+0x35/0x50 [ 721.026922][T20400] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 721.026939][T20400] alloc_pages_current+0x107/0x210 [ 721.026954][T20400] ? ___might_sleep+0x163/0x2c0 [ 721.026972][T20400] __vmalloc_node_range+0x4f8/0x810 [ 721.027007][T20400] ? bpf_map_area_alloc+0x20/0x30 [ 721.027025][T20400] __vmalloc_node_flags_caller+0x71/0x90 [ 721.043589][T20400] ? bpf_map_area_alloc+0x20/0x30 [ 721.043608][T20400] __bpf_map_area_alloc+0xde/0xf0 [ 721.043626][T20400] bpf_map_area_alloc+0x20/0x30 [ 721.043642][T20400] htab_map_alloc+0x8d3/0x11c0 [ 721.043668][T20400] ? htab_map_update_elem+0xca0/0xca0 [ 721.059847][T20400] __do_sys_bpf+0x478/0x37b0 [ 721.059869][T20400] ? bpf_prog_load+0x18a0/0x18a0 [ 721.059885][T20400] ? __kasan_check_write+0x14/0x20 [ 721.059902][T20400] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 721.059922][T20400] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 721.070125][T20400] ? wait_for_completion+0x440/0x440 [ 721.070152][T20400] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 721.070183][T20400] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 721.070201][T20400] ? do_syscall_64+0x26/0x790 [ 721.080825][T20400] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 721.080845][T20400] ? do_syscall_64+0x26/0x790 [ 721.080868][T20400] __x64_sys_bpf+0x73/0xb0 [ 721.080886][T20400] do_syscall_64+0xfa/0x790 [ 721.080905][T20400] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 721.080920][T20400] RIP: 0033:0x45a679 [ 721.090777][T20400] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 721.090787][T20400] RSP: 002b:00007fd557596c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 721.090803][T20400] RAX: ffffffffffffffda RBX: 00007fd557596c90 RCX: 000000000045a679 [ 721.090812][T20400] RDX: 000000000000003c RSI: 0000000020000040 RDI: 405a020000000000 [ 721.090821][T20400] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 13:21:16 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x40045564, &(0x7f0000000100)={0x0, 0x0, {0x0, 0x300, 0x0, {}, {}, @rumble}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) 13:21:16 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x4004556d, &(0x7f0000000100)={0x0, 0x0, {0x4000, 0x0, 0x0, {}, {}, @rumble}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) 13:21:16 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) recvmmsg(r0, &(0x7f0000001d00)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}], 0x2, 0x0, 0x0) r1 = socket$inet(0xa, 0x801, 0x84) connect$inet(r1, &(0x7f0000004cc0)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r1, 0x84, 0x9, &(0x7f00000000c0)={0x0, @in={{0x2, 0x0, @rand_addr=0xac14ffbb}}}, &(0x7f0000000180)=0x98) setsockopt$SO_TIMESTAMP(r1, 0x1, 0xdbc848cb99f048a7, &(0x7f0000000080)=0x9, 0x2) r2 = socket$inet6(0xa, 0x80003, 0x80) ioctl(r2, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") r3 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r3, &(0x7f0000000180), 0x27a4eaa51029717, 0x0) ioctl$sock_inet6_SIOCSIFDSTADDR(r3, 0x8918, &(0x7f0000000000)={@mcast2, 0x6e}) [ 721.090830][T20400] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fd5575976d4 [ 721.090848][T20400] R13: 00000000004c0c65 R14: 00000000004d4750 R15: 0000000000000003 13:21:16 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x4004556e, &(0x7f0000000100)={0x0, 0x0, {0x0, 0x0, 0x0, {0x5}, {}, @rumble}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) 13:21:16 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x4004556d, &(0x7f0000000100)={0x0, 0x0, {0xff00, 0x0, 0x0, {}, {}, @rumble}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) 13:21:16 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x40045564, &(0x7f0000000100)={0x0, 0x0, {0x0, 0x500, 0x0, {}, {}, @rumble}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) 13:21:16 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000780)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000040)={'nr0\x01\x00', 0x1132}) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'nr0\x01\x00', 0x7132}) close(0xffffffffffffffff) 13:21:16 executing program 4 (fault-call:0 fault-nth:14): bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x7880, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000, 0x0, 0x0, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x13]}, 0x3c) 13:21:16 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) recvmmsg(r0, &(0x7f0000001d00)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}], 0x2, 0x0, 0x0) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x200000, 0x0) ioctl$SG_GET_REQUEST_TABLE(r1, 0x2286, &(0x7f0000000200)) setsockopt$SO_TIMESTAMP(r0, 0x1, 0x23, &(0x7f0000000040)=0x9, 0x4) r2 = socket$inet6(0xa, 0x80003, 0x80) ioctl(r2, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") 13:21:16 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x4004556e, &(0x7f0000000100)={0x0, 0x0, {0x0, 0x0, 0x0, {0x6}, {}, @rumble}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) 13:21:16 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x4004556d, &(0x7f0000000100)={0x0, 0x0, {0x0, 0x0, 0x0, {}, {}, @rumble}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) 13:21:16 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x40045564, &(0x7f0000000100)={0x0, 0x0, {0x0, 0x600, 0x0, {}, {}, @rumble}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) [ 721.829899][T20444] FAULT_INJECTION: forcing a failure. [ 721.829899][T20444] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 721.891620][T20444] CPU: 0 PID: 20444 Comm: syz-executor.4 Not tainted 5.4.0-syzkaller #0 [ 721.900010][T20444] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 721.910078][T20444] Call Trace: [ 721.913397][T20444] dump_stack+0x197/0x210 [ 721.917780][T20444] should_fail.cold+0xa/0x15 [ 721.922425][T20444] ? fault_create_debugfs_attr+0x180/0x180 [ 721.928252][T20444] ? ___might_sleep+0x163/0x2c0 [ 721.928285][T20444] should_fail_alloc_page+0x50/0x60 [ 721.928308][T20444] __alloc_pages_nodemask+0x1a1/0x910 [ 721.928325][T20444] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 721.928347][T20444] ? __alloc_pages_slowpath+0x2920/0x2920 [ 721.928371][T20444] ? kasan_unpoison_shadow+0x35/0x50 [ 721.928395][T20444] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 721.949413][T20444] alloc_pages_current+0x107/0x210 [ 721.949434][T20444] ? ___might_sleep+0x163/0x2c0 [ 721.971782][T20444] __vmalloc_node_range+0x4f8/0x810 [ 721.981816][T20444] ? bpf_map_area_alloc+0x20/0x30 [ 721.986880][T20444] __vmalloc_node_flags_caller+0x71/0x90 [ 721.986895][T20444] ? bpf_map_area_alloc+0x20/0x30 [ 721.986911][T20444] __bpf_map_area_alloc+0xde/0xf0 [ 721.986927][T20444] bpf_map_area_alloc+0x20/0x30 [ 721.986944][T20444] htab_map_alloc+0x8d3/0x11c0 [ 721.986976][T20444] ? htab_map_update_elem+0xca0/0xca0 [ 722.002645][T20444] __do_sys_bpf+0x478/0x37b0 [ 722.022528][T20444] ? bpf_prog_load+0x18a0/0x18a0 [ 722.022548][T20444] ? __kasan_check_write+0x14/0x20 [ 722.032586][T20444] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 722.038149][T20444] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 722.043446][T20444] ? wait_for_completion+0x440/0x440 [ 722.043470][T20444] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 722.043497][T20444] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 722.060463][T20444] ? do_syscall_64+0x26/0x790 [ 722.060484][T20444] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 722.060502][T20444] ? do_syscall_64+0x26/0x790 [ 722.071452][T20444] __x64_sys_bpf+0x73/0xb0 [ 722.071472][T20444] do_syscall_64+0xfa/0x790 [ 722.071496][T20444] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 722.080731][T20444] RIP: 0033:0x45a679 [ 722.080748][T20444] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 722.080756][T20444] RSP: 002b:00007fd557596c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 722.080777][T20444] RAX: ffffffffffffffda RBX: 00007fd557596c90 RCX: 000000000045a679 [ 722.114658][T20444] RDX: 000000000000003c RSI: 0000000020000040 RDI: 405a020000000000 13:21:17 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x4004556e, &(0x7f0000000100)={0x0, 0x0, {0x0, 0x0, 0x0, {0x7}, {}, @rumble}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) 13:21:17 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x4004556d, &(0x7f0000000100)={0x0, 0x0, {0x0, 0x2, 0x0, {}, {}, @rumble}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) 13:21:17 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x40045564, &(0x7f0000000100)={0x0, 0x0, {0x0, 0x700, 0x0, {}, {}, @rumble}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) [ 722.114667][T20444] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 722.114675][T20444] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fd5575976d4 [ 722.114681][T20444] R13: 00000000004c0c65 R14: 00000000004d4750 R15: 0000000000000003 13:21:17 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x4004556e, &(0x7f0000000100)={0x0, 0x0, {0x0, 0x0, 0x0, {0x8}, {}, @rumble}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) 13:21:17 executing program 4 (fault-call:0 fault-nth:15): bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x7880, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000, 0x0, 0x0, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x13]}, 0x3c) 13:21:17 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x4004556d, &(0x7f0000000100)={0x0, 0x0, {0x0, 0x3, 0x0, {}, {}, @rumble}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) 13:21:17 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000780)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000040)={'nr0\x01\x00', 0x1132}) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'nr0\x01\x00', 0x7132}) close(0xffffffffffffffff) [ 722.364285][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 722.370134][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 722.408307][T20464] FAULT_INJECTION: forcing a failure. [ 722.408307][T20464] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 722.481068][T20464] CPU: 1 PID: 20464 Comm: syz-executor.4 Not tainted 5.4.0-syzkaller #0 [ 722.489455][T20464] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 722.499529][T20464] Call Trace: [ 722.502850][T20464] dump_stack+0x197/0x210 [ 722.507215][T20464] should_fail.cold+0xa/0x15 [ 722.511847][T20464] ? fault_create_debugfs_attr+0x180/0x180 [ 722.517655][T20464] ? ___might_sleep+0x163/0x2c0 [ 722.517681][T20464] should_fail_alloc_page+0x50/0x60 [ 722.517698][T20464] __alloc_pages_nodemask+0x1a1/0x910 [ 722.517715][T20464] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 722.517740][T20464] ? __alloc_pages_slowpath+0x2920/0x2920 [ 722.538739][T20464] ? kasan_unpoison_shadow+0x35/0x50 [ 722.538765][T20464] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 722.538789][T20464] alloc_pages_current+0x107/0x210 [ 722.561131][T20464] ? ___might_sleep+0x163/0x2c0 [ 722.566021][T20464] __vmalloc_node_range+0x4f8/0x810 [ 722.566050][T20464] ? bpf_map_area_alloc+0x20/0x30 [ 722.566065][T20464] __vmalloc_node_flags_caller+0x71/0x90 [ 722.566078][T20464] ? bpf_map_area_alloc+0x20/0x30 [ 722.566095][T20464] __bpf_map_area_alloc+0xde/0xf0 [ 722.566109][T20464] bpf_map_area_alloc+0x20/0x30 [ 722.566127][T20464] htab_map_alloc+0x8d3/0x11c0 [ 722.581979][T20464] ? htab_map_update_elem+0xca0/0xca0 [ 722.582000][T20464] __do_sys_bpf+0x478/0x37b0 [ 722.582021][T20464] ? bpf_prog_load+0x18a0/0x18a0 [ 722.601663][T20464] ? __kasan_check_write+0x14/0x20 [ 722.601682][T20464] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 722.601698][T20464] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 722.601716][T20464] ? wait_for_completion+0x440/0x440 [ 722.611751][T20464] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 722.611781][T20464] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 722.611800][T20464] ? do_syscall_64+0x26/0x790 [ 722.621902][T20464] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 722.621917][T20464] ? do_syscall_64+0x26/0x790 [ 722.621940][T20464] __x64_sys_bpf+0x73/0xb0 [ 722.621958][T20464] do_syscall_64+0xfa/0x790 [ 722.671594][T20464] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 722.681959][T20464] RIP: 0033:0x45a679 [ 722.681977][T20464] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 722.681990][T20464] RSP: 002b:00007fd557596c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 722.714846][T20464] RAX: ffffffffffffffda RBX: 00007fd557596c90 RCX: 000000000045a679 13:21:17 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x4004556e, &(0x7f0000000100)={0x0, 0x0, {0x0, 0x0, 0x0, {0x300}, {}, @rumble}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) [ 722.722836][T20464] RDX: 000000000000003c RSI: 0000000020000040 RDI: 405a020000000000 [ 722.734651][T20464] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 722.742640][T20464] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fd5575976d4 [ 722.750630][T20464] R13: 00000000004c0c65 R14: 00000000004d4750 R15: 0000000000000003 13:21:18 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) recvmmsg(r0, &(0x7f0000001d00)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}], 0x2, 0x0, 0x0) setsockopt$SO_TIMESTAMP(r0, 0x1, 0x23, &(0x7f0000000040)=0x9, 0x4) r1 = socket$inet6(0xa, 0x400000000001, 0x0) bind$inet6(r1, &(0x7f0000fa0fe4)={0xa, 0x4e20, 0x0, @loopback}, 0xfffffdb3) sendto$inet6(r1, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r2 = open(&(0x7f0000000200)='./file0\x00', 0x141042, 0x82) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f00000001c0)=0x4, 0x4) socket$inet6(0xa, 0x80000, 0x1f) timerfd_gettime(r2, &(0x7f0000000040)) ftruncate(r2, 0x7e) sendfile(r1, r2, &(0x7f00000000c0), 0x8000fffffffe) ioctl$IMDELTIMER(r2, 0x80044941, &(0x7f0000000000)=0x4) r3 = socket$inet6(0xa, 0x80003, 0x80) ioctl(r3, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") 13:21:18 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x4004556d, &(0x7f0000000100)={0x0, 0x0, {0x0, 0x4, 0x0, {}, {}, @rumble}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) 13:21:18 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x40045564, &(0x7f0000000100)={0x0, 0x0, {0x0, 0x3f00, 0x0, {}, {}, @rumble}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) 13:21:18 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x4004556e, &(0x7f0000000100)={0x0, 0x0, {0x0, 0x0, 0x0, {0x500}, {}, @rumble}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) 13:21:18 executing program 4 (fault-call:0 fault-nth:16): bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x7880, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000, 0x0, 0x0, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x13]}, 0x3c) [ 722.983808][T20487] FAULT_INJECTION: forcing a failure. [ 722.983808][T20487] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 723.011473][T20487] CPU: 1 PID: 20487 Comm: syz-executor.4 Not tainted 5.4.0-syzkaller #0 [ 723.019855][T20487] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 723.029915][T20487] Call Trace: [ 723.033247][T20487] dump_stack+0x197/0x210 [ 723.037606][T20487] should_fail.cold+0xa/0x15 [ 723.042237][T20487] ? fault_create_debugfs_attr+0x180/0x180 [ 723.048073][T20487] ? ___might_sleep+0x163/0x2c0 [ 723.052962][T20487] should_fail_alloc_page+0x50/0x60 [ 723.058279][T20487] __alloc_pages_nodemask+0x1a1/0x910 [ 723.064311][T20487] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 723.064336][T20487] ? __alloc_pages_slowpath+0x2920/0x2920 [ 723.064360][T20487] ? kasan_unpoison_shadow+0x35/0x50 [ 723.080997][T20487] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 723.087346][T20487] alloc_pages_current+0x107/0x210 [ 723.087362][T20487] ? ___might_sleep+0x163/0x2c0 [ 723.087388][T20487] __vmalloc_node_range+0x4f8/0x810 [ 723.102832][T20487] ? bpf_map_area_alloc+0x20/0x30 [ 723.107882][T20487] __vmalloc_node_flags_caller+0x71/0x90 [ 723.113536][T20487] ? bpf_map_area_alloc+0x20/0x30 [ 723.119021][T20487] __bpf_map_area_alloc+0xde/0xf0 [ 723.124069][T20487] bpf_map_area_alloc+0x20/0x30 [ 723.128941][T20487] htab_map_alloc+0x8d3/0x11c0 [ 723.133736][T20487] ? htab_map_update_elem+0xca0/0xca0 [ 723.139127][T20487] __do_sys_bpf+0x478/0x37b0 [ 723.143740][T20487] ? bpf_prog_load+0x18a0/0x18a0 [ 723.148691][T20487] ? __kasan_check_write+0x14/0x20 [ 723.153823][T20487] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 723.159394][T20487] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 723.164700][T20487] ? wait_for_completion+0x440/0x440 [ 723.164726][T20487] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 723.164753][T20487] ? trace_hardirqs_on_thunk+0x1a/0x1c 13:21:18 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x40045564, &(0x7f0000000100)={0x0, 0x0, {0x0, 0x4000, 0x0, {}, {}, @rumble}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) 13:21:18 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x4004556e, &(0x7f0000000100)={0x0, 0x0, {0x0, 0x0, 0x0, {0x600}, {}, @rumble}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) [ 723.164773][T20487] ? do_syscall_64+0x26/0x790 [ 723.176279][T20487] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 723.176296][T20487] ? do_syscall_64+0x26/0x790 [ 723.176318][T20487] __x64_sys_bpf+0x73/0xb0 [ 723.176333][T20487] do_syscall_64+0xfa/0x790 [ 723.176353][T20487] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 723.186644][T20487] RIP: 0033:0x45a679 [ 723.186662][T20487] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 723.186670][T20487] RSP: 002b:00007fd557596c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 723.186685][T20487] RAX: ffffffffffffffda RBX: 00007fd557596c90 RCX: 000000000045a679 [ 723.186692][T20487] RDX: 000000000000003c RSI: 0000000020000040 RDI: 405a020000000000 [ 723.186705][T20487] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 723.197409][T20487] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fd5575976d4 [ 723.197419][T20487] R13: 00000000004c0c65 R14: 00000000004d4750 R15: 0000000000000003 13:21:18 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x4004556d, &(0x7f0000000100)={0x0, 0x0, {0x0, 0x5, 0x0, {}, {}, @rumble}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) 13:21:18 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) recvmmsg(r0, &(0x7f0000001d00)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}], 0x2, 0x0, 0x0) setsockopt$packet_fanout_data(r0, 0x107, 0x16, &(0x7f0000000080)={0x5, &(0x7f0000000000)=[{0x101, 0x81, 0x9, 0x7da}, {0x3, 0x1f, 0x1, 0x1f}, {0x400, 0x6, 0x3f, 0x3}, {0x3, 0x5, 0x3, 0x6}, {0x401, 0x3, 0x80, 0x81}]}, 0x10) ioctl$SIOCGIFHWADDR(0xffffffffffffffff, 0x8927, &(0x7f00000000c0)) setsockopt$SO_TIMESTAMP(r0, 0x1, 0x23, &(0x7f0000000040)=0x9, 0x4) r1 = socket$inet6(0xa, 0x80003, 0x80) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") 13:21:18 executing program 4 (fault-call:0 fault-nth:17): bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x7880, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000, 0x0, 0x0, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x13]}, 0x3c) 13:21:18 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000780)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000040)={'nr0\x01\x00', 0x1132}) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'nr0\x01\x00', 0x7132}) close(0xffffffffffffffff) 13:21:18 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x4004556d, &(0x7f0000000100)={0x0, 0x0, {0x0, 0x6, 0x0, {}, {}, @rumble}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) 13:21:18 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x4004556e, &(0x7f0000000100)={0x0, 0x0, {0x0, 0x0, 0x0, {0x700}, {}, @rumble}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) [ 723.459596][T20506] FAULT_INJECTION: forcing a failure. [ 723.459596][T20506] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 723.514393][T20506] CPU: 0 PID: 20506 Comm: syz-executor.4 Not tainted 5.4.0-syzkaller #0 [ 723.522804][T20506] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 723.533004][T20506] Call Trace: [ 723.536328][T20506] dump_stack+0x197/0x210 [ 723.540802][T20506] should_fail.cold+0xa/0x15 [ 723.545450][T20506] ? fault_create_debugfs_attr+0x180/0x180 [ 723.551345][T20506] ? ___might_sleep+0x163/0x2c0 [ 723.556420][T20506] should_fail_alloc_page+0x50/0x60 [ 723.561749][T20506] __alloc_pages_nodemask+0x1a1/0x910 [ 723.567154][T20506] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 723.572823][T20506] ? __alloc_pages_slowpath+0x2920/0x2920 [ 723.578577][T20506] ? kasan_unpoison_shadow+0x35/0x50 [ 723.583889][T20506] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 723.590256][T20506] alloc_pages_current+0x107/0x210 [ 723.595400][T20506] ? ___might_sleep+0x163/0x2c0 [ 723.600531][T20506] __vmalloc_node_range+0x4f8/0x810 [ 723.605773][T20506] ? bpf_map_area_alloc+0x20/0x30 [ 723.610839][T20506] __vmalloc_node_flags_caller+0x71/0x90 [ 723.616511][T20506] ? bpf_map_area_alloc+0x20/0x30 [ 723.622875][T20506] __bpf_map_area_alloc+0xde/0xf0 [ 723.627924][T20506] bpf_map_area_alloc+0x20/0x30 [ 723.627939][T20506] htab_map_alloc+0x8d3/0x11c0 [ 723.627968][T20506] ? htab_map_update_elem+0xca0/0xca0 [ 723.627986][T20506] __do_sys_bpf+0x478/0x37b0 [ 723.628007][T20506] ? bpf_prog_load+0x18a0/0x18a0 [ 723.628020][T20506] ? __kasan_check_write+0x14/0x20 [ 723.628037][T20506] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 723.628054][T20506] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 723.628068][T20506] ? wait_for_completion+0x440/0x440 [ 723.628091][T20506] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 723.643173][T20506] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 723.643191][T20506] ? do_syscall_64+0x26/0x790 [ 723.643208][T20506] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 723.643225][T20506] ? do_syscall_64+0x26/0x790 [ 723.652832][T20506] __x64_sys_bpf+0x73/0xb0 [ 723.652853][T20506] do_syscall_64+0xfa/0x790 [ 723.652876][T20506] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 723.652894][T20506] RIP: 0033:0x45a679 [ 723.669080][T20506] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 723.669090][T20506] RSP: 002b:00007fd557596c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 723.669105][T20506] RAX: ffffffffffffffda RBX: 00007fd557596c90 RCX: 000000000045a679 [ 723.669115][T20506] RDX: 000000000000003c RSI: 0000000020000040 RDI: 405a020000000000 [ 723.669124][T20506] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 723.669131][T20506] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fd5575976d4 [ 723.669145][T20506] R13: 00000000004c0c65 R14: 00000000004d4750 R15: 0000000000000003 13:21:19 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x40045564, &(0x7f0000000100)={0x0, 0x0, {0x0, 0xff00, 0x0, {}, {}, @rumble}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) 13:21:19 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x4004556d, &(0x7f0000000100)={0x0, 0x0, {0x0, 0x7, 0x0, {}, {}, @rumble}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) 13:21:19 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x4004556e, &(0x7f0000000100)={0x0, 0x0, {0x0, 0x0, 0x0, {0x4000}, {}, @rumble}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) 13:21:19 executing program 4 (fault-call:0 fault-nth:18): bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x7880, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000, 0x0, 0x0, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x13]}, 0x3c) 13:21:19 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x4004556d, &(0x7f0000000100)={0x0, 0x0, {0x0, 0x8, 0x0, {}, {}, @rumble}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) 13:21:19 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x40045564, &(0x7f0000000100)={0x0, 0x0, {0x0, 0x0, 0x0, {}, {}, @rumble}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) 13:21:19 executing program 0 (fault-call:4 fault-nth:0): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000780)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000040)={'nr0\x01\x00', 0x1132}) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'nr0\x01\x00', 0x7132}) close(r1) [ 724.111779][T20531] FAULT_INJECTION: forcing a failure. [ 724.111779][T20531] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 724.175719][T20531] CPU: 1 PID: 20531 Comm: syz-executor.4 Not tainted 5.4.0-syzkaller #0 [ 724.184651][T20531] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 724.194956][T20531] Call Trace: [ 724.198279][T20531] dump_stack+0x197/0x210 [ 724.202676][T20531] should_fail.cold+0xa/0x15 [ 724.207321][T20531] ? fault_create_debugfs_attr+0x180/0x180 [ 724.213539][T20531] ? ___might_sleep+0x163/0x2c0 [ 724.218818][T20531] should_fail_alloc_page+0x50/0x60 [ 724.224310][T20531] __alloc_pages_nodemask+0x1a1/0x910 [ 724.229804][T20531] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 724.236034][T20531] ? __alloc_pages_slowpath+0x2920/0x2920 [ 724.241931][T20531] ? kasan_unpoison_shadow+0x35/0x50 [ 724.241951][T20531] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 724.241969][T20531] alloc_pages_current+0x107/0x210 [ 724.241989][T20531] ? ___might_sleep+0x163/0x2c0 [ 724.265180][T20531] __vmalloc_node_range+0x4f8/0x810 [ 724.271169][T20531] ? bpf_map_area_alloc+0x20/0x30 [ 724.276706][T20531] __vmalloc_node_flags_caller+0x71/0x90 [ 724.276726][T20531] ? bpf_map_area_alloc+0x20/0x30 [ 724.276742][T20531] __bpf_map_area_alloc+0xde/0xf0 [ 724.276758][T20531] bpf_map_area_alloc+0x20/0x30 [ 724.276772][T20531] htab_map_alloc+0x8d3/0x11c0 [ 724.276799][T20531] ? htab_map_update_elem+0xca0/0xca0 [ 724.276813][T20531] __do_sys_bpf+0x478/0x37b0 [ 724.276835][T20531] ? bpf_prog_load+0x18a0/0x18a0 [ 724.298037][T20531] ? __kasan_check_write+0x14/0x20 [ 724.298055][T20531] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 724.298071][T20531] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 724.298093][T20531] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 724.309017][T20531] ? debug_smp_processor_id+0x33/0x18a [ 724.309037][T20531] ? rcu_lockdep_current_cpu_online+0xe3/0x130 [ 724.309066][T20531] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 724.309081][T20531] ? do_syscall_64+0x26/0x790 [ 724.309101][T20531] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 724.309113][T20531] ? do_syscall_64+0x26/0x790 [ 724.309131][T20531] __x64_sys_bpf+0x73/0xb0 [ 724.309151][T20531] do_syscall_64+0xfa/0x790 [ 724.319062][T20531] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 724.319080][T20531] RIP: 0033:0x45a679 [ 724.319099][T20531] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 724.330695][T20531] RSP: 002b:00007fd557596c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 13:21:19 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) recvmmsg(r0, &(0x7f0000001d00)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}], 0x2, 0x0, 0x0) setsockopt$SO_TIMESTAMP(r0, 0x1, 0x23, &(0x7f0000000040)=0x9, 0x4) r1 = socket$inet6(0xa, 0x80003, 0x80) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) readv(r2, &(0x7f0000000140)=[{&(0x7f0000000080)=""/138, 0x8a}, {&(0x7f0000000200)=""/191, 0xbf}], 0x2) 13:21:19 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x4004556e, &(0x7f0000000100)={0x0, 0x0, {0x0, 0x0, 0x0, {0xff00}, {}, @rumble}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) [ 724.330709][T20531] RAX: ffffffffffffffda RBX: 00007fd557596c90 RCX: 000000000045a679 [ 724.330717][T20531] RDX: 000000000000003c RSI: 0000000020000040 RDI: 405a020000000000 [ 724.330724][T20531] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 724.330731][T20531] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fd5575976d4 [ 724.330740][T20531] R13: 00000000004c0c65 R14: 00000000004d4750 R15: 0000000000000003 13:21:19 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x4004556d, &(0x7f0000000100)={0x0, 0x0, {0x0, 0x300, 0x0, {}, {}, @rumble}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) 13:21:19 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x4004556e, &(0x7f0000000100)={0x0, 0x0, {0x0, 0x0, 0x0, {}, {}, @rumble}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) 13:21:19 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x40045564, &(0x7f0000000100)={0x0, 0x0, {0x0, 0x0, 0x2, {}, {}, @rumble}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) 13:21:19 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x4004556d, &(0x7f0000000100)={0x0, 0x0, {0x0, 0x500, 0x0, {}, {}, @rumble}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) 13:21:19 executing program 4 (fault-call:0 fault-nth:19): bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x7880, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000, 0x0, 0x0, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x13]}, 0x3c) 13:21:20 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x4004556e, &(0x7f0000000100)={0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x2}, {}, @rumble}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) 13:21:20 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x40045564, &(0x7f0000000100)={0x0, 0x0, {0x0, 0x0, 0x3, {}, {}, @rumble}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) [ 724.850922][T20564] FAULT_INJECTION: forcing a failure. [ 724.850922][T20564] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 724.907240][T20564] CPU: 0 PID: 20564 Comm: syz-executor.4 Not tainted 5.4.0-syzkaller #0 [ 724.915639][T20564] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 724.926246][T20564] Call Trace: [ 724.929576][T20564] dump_stack+0x197/0x210 [ 724.934053][T20564] should_fail.cold+0xa/0x15 [ 724.938778][T20564] ? fault_create_debugfs_attr+0x180/0x180 [ 724.944906][T20564] ? ___might_sleep+0x163/0x2c0 [ 724.949815][T20564] should_fail_alloc_page+0x50/0x60 [ 724.955430][T20564] __alloc_pages_nodemask+0x1a1/0x910 [ 724.961459][T20564] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 724.967746][T20564] ? __alloc_pages_slowpath+0x2920/0x2920 [ 724.973509][T20564] ? kasan_unpoison_shadow+0x35/0x50 [ 724.978947][T20564] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 724.985752][T20564] alloc_pages_current+0x107/0x210 [ 724.990907][T20564] ? ___might_sleep+0x163/0x2c0 [ 724.995783][T20564] __vmalloc_node_range+0x4f8/0x810 [ 724.995810][T20564] ? bpf_map_area_alloc+0x20/0x30 [ 724.995825][T20564] __vmalloc_node_flags_caller+0x71/0x90 [ 724.995840][T20564] ? bpf_map_area_alloc+0x20/0x30 [ 724.995859][T20564] __bpf_map_area_alloc+0xde/0xf0 [ 724.995875][T20564] bpf_map_area_alloc+0x20/0x30 [ 724.995890][T20564] htab_map_alloc+0x8d3/0x11c0 [ 724.995915][T20564] ? htab_map_update_elem+0xca0/0xca0 [ 724.995931][T20564] __do_sys_bpf+0x478/0x37b0 [ 724.995950][T20564] ? bpf_prog_load+0x18a0/0x18a0 [ 724.995964][T20564] ? __kasan_check_write+0x14/0x20 [ 724.995980][T20564] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 724.995994][T20564] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 724.996015][T20564] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 725.012273][T20564] ? debug_smp_processor_id+0x33/0x18a [ 725.012295][T20564] ? rcu_lockdep_current_cpu_online+0xe3/0x130 [ 725.012337][T20564] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 725.022621][T20564] ? do_syscall_64+0x26/0x790 [ 725.022641][T20564] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 725.022655][T20564] ? do_syscall_64+0x26/0x790 13:21:20 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x4004556d, &(0x7f0000000100)={0x0, 0x0, {0x0, 0x600, 0x0, {}, {}, @rumble}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) 13:21:20 executing program 4 (fault-call:0 fault-nth:20): bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x7880, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000, 0x0, 0x0, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x13]}, 0x3c) [ 725.022677][T20564] __x64_sys_bpf+0x73/0xb0 [ 725.022695][T20564] do_syscall_64+0xfa/0x790 [ 725.038110][T20564] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 725.038128][T20564] RIP: 0033:0x45a679 [ 725.038144][T20564] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 725.038157][T20564] RSP: 002b:00007fd557596c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 725.048153][T20564] RAX: ffffffffffffffda RBX: 00007fd557596c90 RCX: 000000000045a679 [ 725.048162][T20564] RDX: 000000000000003c RSI: 0000000020000040 RDI: 405a020000000000 [ 725.048169][T20564] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 725.048176][T20564] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fd5575976d4 [ 725.048184][T20564] R13: 00000000004c0c65 R14: 00000000004d4750 R15: 0000000000000003 [ 725.170089][T20571] FAULT_INJECTION: forcing a failure. [ 725.170089][T20571] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 725.236847][T20571] CPU: 1 PID: 20571 Comm: syz-executor.4 Not tainted 5.4.0-syzkaller #0 [ 725.245654][T20571] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 725.256111][T20571] Call Trace: [ 725.256135][T20571] dump_stack+0x197/0x210 [ 725.256156][T20571] should_fail.cold+0xa/0x15 [ 725.256174][T20571] ? fault_create_debugfs_attr+0x180/0x180 [ 725.256189][T20571] ? ___might_sleep+0x163/0x2c0 [ 725.256213][T20571] should_fail_alloc_page+0x50/0x60 [ 725.256233][T20571] __alloc_pages_nodemask+0x1a1/0x910 [ 725.279492][T20571] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 725.290622][T20571] ? __alloc_pages_slowpath+0x2920/0x2920 [ 725.302030][T20571] ? kasan_unpoison_shadow+0x35/0x50 [ 725.307353][T20571] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 725.307373][T20571] alloc_pages_current+0x107/0x210 [ 725.307387][T20571] ? ___might_sleep+0x163/0x2c0 [ 725.307405][T20571] __vmalloc_node_range+0x4f8/0x810 [ 725.307427][T20571] ? bpf_map_area_alloc+0x20/0x30 [ 725.307446][T20571] __vmalloc_node_flags_caller+0x71/0x90 [ 725.324403][T20571] ? bpf_map_area_alloc+0x20/0x30 [ 725.335026][T20571] __bpf_map_area_alloc+0xde/0xf0 [ 725.335042][T20571] bpf_map_area_alloc+0x20/0x30 [ 725.335057][T20571] htab_map_alloc+0x8d3/0x11c0 [ 725.335085][T20571] ? htab_map_update_elem+0xca0/0xca0 [ 725.366755][T20571] __do_sys_bpf+0x478/0x37b0 [ 725.371393][T20571] ? bpf_prog_load+0x18a0/0x18a0 [ 725.376461][T20571] ? __kasan_check_write+0x14/0x20 [ 725.381883][T20571] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 725.387727][T20571] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 725.393134][T20571] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 725.399589][T20571] ? debug_smp_processor_id+0x33/0x18a [ 725.405089][T20571] ? rcu_lockdep_current_cpu_online+0xe3/0x130 [ 725.411631][T20571] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 725.417430][T20571] ? do_syscall_64+0x26/0x790 [ 725.422249][T20571] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 725.428618][T20571] ? do_syscall_64+0x26/0x790 [ 725.433338][T20571] __x64_sys_bpf+0x73/0xb0 [ 725.437793][T20571] do_syscall_64+0xfa/0x790 [ 725.442695][T20571] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 725.448912][T20571] RIP: 0033:0x45a679 [ 725.453075][T20571] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 725.475422][T20571] RSP: 002b:00007fd557596c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 725.484703][T20571] RAX: ffffffffffffffda RBX: 00007fd557596c90 RCX: 000000000045a679 [ 725.493078][T20571] RDX: 000000000000003c RSI: 0000000020000040 RDI: 405a020000000000 [ 725.502325][T20571] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 725.510857][T20571] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fd5575976d4 [ 725.518936][T20571] R13: 00000000004c0c65 R14: 00000000004d4750 R15: 0000000000000003 [ 725.528023][ C1] net_ratelimit: 2 callbacks suppressed [ 725.528034][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 725.534716][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 725.540057][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 725.545990][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 725.558345][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 725.564412][ C0] protocol 88fb is buggy, dev hsr_slave_1 13:21:20 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000780)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000040)={'nr0\x01\x00', 0x1132}) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'nr0\x01\x00', 0x7132}) close(r1) 13:21:20 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) recvmmsg(r0, &(0x7f0000003480)=[{{&(0x7f0000000080)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @broadcast}}}, 0x80, &(0x7f0000000400)=[{&(0x7f0000000200)=""/197, 0xc5}, {&(0x7f0000000100)=""/142, 0x8e}, {&(0x7f0000000000)=""/52, 0x34}, {&(0x7f0000000300)=""/196, 0xc4}], 0x4, &(0x7f0000000440)=""/106, 0x6a}, 0x5}, {{0x0, 0x0, &(0x7f0000000900)=[{&(0x7f00000004c0)=""/142, 0x8e}, {&(0x7f0000000580)=""/145, 0x91}, {&(0x7f0000000640)=""/61, 0x3d}, {&(0x7f0000000680)=""/177, 0xb1}, {&(0x7f0000000740)=""/160, 0xa0}, {&(0x7f0000000800)=""/62, 0x3e}, {&(0x7f0000000840)=""/141, 0x8d}], 0x7, &(0x7f0000000980)=""/68, 0x44}, 0x800}, {{0x0, 0x0, &(0x7f0000000c40)=[{&(0x7f0000000a00)=""/91, 0x5b}, {&(0x7f0000000a80)=""/75, 0x4b}, {&(0x7f0000000b00)=""/40, 0x28}, {&(0x7f0000000b40)=""/244, 0xf4}], 0x4, &(0x7f0000000c80)=""/183, 0xb7}, 0x1}, {{0x0, 0x0, &(0x7f0000000dc0)=[{&(0x7f0000000d40)=""/92, 0x5c}], 0x1, &(0x7f0000000e00)=""/239, 0xef}}, {{&(0x7f0000000f00)=@alg, 0x80, &(0x7f0000001180)=[{&(0x7f0000000f80)=""/159, 0x9f}, {&(0x7f0000001040)=""/193, 0xc1}, {&(0x7f0000001140)=""/56, 0x38}], 0x3}, 0x40}, {{&(0x7f00000011c0)=@ipx, 0x80, &(0x7f0000001900)=[{&(0x7f0000001240)=""/167, 0xa7}, {&(0x7f0000001300)=""/148, 0x94}, {&(0x7f00000013c0)=""/253, 0xfd}, {&(0x7f00000014c0)=""/28, 0x1c}, {&(0x7f0000001500)=""/126, 0x7e}, {&(0x7f0000001580)=""/202, 0xca}, {&(0x7f0000001680)=""/80, 0x50}, {&(0x7f0000001700)=""/163, 0xa3}, {&(0x7f00000017c0)=""/78, 0x4e}, {&(0x7f0000001840)=""/137, 0x89}], 0xa, &(0x7f0000001d80)=""/4096, 0x1000}, 0x67c0}, {{&(0x7f00000019c0)=@rc, 0x80, &(0x7f0000001c00)=[{&(0x7f0000001a40)=""/110, 0x6e}, {&(0x7f0000001ac0)=""/42, 0x2a}, {&(0x7f0000001b00)=""/196, 0xc4}], 0x3, &(0x7f0000001c40)=""/170, 0xaa}}, {{&(0x7f0000002d80)=@isdn, 0x80, &(0x7f0000003300)=[{&(0x7f0000002e00)=""/143, 0x8f}, {&(0x7f0000002ec0)=""/140, 0x8c}, {&(0x7f0000002f80)=""/228, 0xe4}, {&(0x7f0000003080)=""/167, 0xa7}, {&(0x7f0000003140)=""/100, 0x64}, {&(0x7f00000031c0)=""/100, 0x64}, {&(0x7f0000003240)=""/134, 0x86}], 0x7, &(0x7f0000003380)=""/245, 0xf5}, 0x3}], 0x8, 0x80010062, &(0x7f0000003680)) r2 = socket$inet(0xa, 0x801, 0x84) connect$inet(r2, &(0x7f0000004cc0)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r2, 0x84, 0x9, &(0x7f00000000c0)={0x0, @in={{0x2, 0x0, @rand_addr=0xac14ffbb}}}, &(0x7f0000000180)=0x98) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000003780), &(0x7f00000037c0)=0xc) r3 = getpgrp(0x0) setpriority(0x0, r3, 0x0) ptrace$peek(0x3, r3, &(0x7f0000003940)) setsockopt$SO_TIMESTAMP(r1, 0x1, 0x23, &(0x7f00000036c0)=0x6ea, 0x4) recvmmsg(r0, &(0x7f0000001d00)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}], 0x2, 0x0, 0x0) setsockopt$SO_TIMESTAMP(r0, 0x1, 0x23, &(0x7f0000000040)=0x9, 0x4) getsockopt$IP6T_SO_GET_ENTRIES(0xffffffffffffffff, 0x29, 0x41, &(0x7f0000003840)=ANY=[@ANYBLOB="66696c7465f7955cf26ef65a2f51df72000000000000000000000000000000000000000000000000000067000000047faeee2c344847d263798db19f09d32e1204c7dd0f403f0a5637992eb60131a095f3500111c33df474d39e275d2ad6cbbe807d81e177e674113a2cf197150c8f9ea23d7a1909b10d3b271c9281a0ec34a5e5d5cc35a482e400"/146], &(0x7f0000003800)=0x8b) r4 = socket$inet6(0xa, 0x80003, 0x80) ioctl$MON_IOCH_MFLUSH(0xffffffffffffffff, 0x9208, 0x7) ioctl(r4, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") 13:21:20 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x4004556e, &(0x7f0000000100)={0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x3}, {}, @rumble}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) 13:21:20 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x4004556d, &(0x7f0000000100)={0x0, 0x0, {0x0, 0x700, 0x0, {}, {}, @rumble}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) 13:21:20 executing program 4 (fault-call:0 fault-nth:21): bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x7880, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000, 0x0, 0x0, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x13]}, 0x3c) 13:21:20 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x40045564, &(0x7f0000000100)={0x0, 0x0, {0x0, 0x0, 0x4, {}, {}, @rumble}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) [ 725.792546][T20590] FAULT_INJECTION: forcing a failure. [ 725.792546][T20590] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 725.841317][T20590] CPU: 1 PID: 20590 Comm: syz-executor.4 Not tainted 5.4.0-syzkaller #0 [ 725.851523][T20590] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 725.862168][T20590] Call Trace: [ 725.862195][T20590] dump_stack+0x197/0x210 [ 725.862221][T20590] should_fail.cold+0xa/0x15 [ 725.862244][T20590] ? fault_create_debugfs_attr+0x180/0x180 [ 725.881089][T20590] ? ___might_sleep+0x163/0x2c0 [ 725.881119][T20590] should_fail_alloc_page+0x50/0x60 [ 725.881139][T20590] __alloc_pages_nodemask+0x1a1/0x910 [ 725.897820][T20590] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 725.903695][T20590] ? __alloc_pages_slowpath+0x2920/0x2920 [ 725.909863][T20590] ? kasan_unpoison_shadow+0x35/0x50 [ 725.909881][T20590] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 725.909901][T20590] alloc_pages_current+0x107/0x210 [ 725.928190][T20590] ? ___might_sleep+0x163/0x2c0 [ 725.928214][T20590] __vmalloc_node_range+0x4f8/0x810 [ 725.928238][T20590] ? bpf_map_area_alloc+0x20/0x30 [ 725.928252][T20590] __vmalloc_node_flags_caller+0x71/0x90 [ 725.928264][T20590] ? bpf_map_area_alloc+0x20/0x30 [ 725.928282][T20590] __bpf_map_area_alloc+0xde/0xf0 [ 725.938608][T20590] bpf_map_area_alloc+0x20/0x30 [ 725.938622][T20590] htab_map_alloc+0x8d3/0x11c0 [ 725.938643][T20590] ? htab_map_update_elem+0xca0/0xca0 [ 725.938657][T20590] __do_sys_bpf+0x478/0x37b0 [ 725.938676][T20590] ? bpf_prog_load+0x18a0/0x18a0 [ 725.949512][T20590] ? __kasan_check_write+0x14/0x20 [ 725.949529][T20590] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 725.949548][T20590] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 725.964874][T20590] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 725.974995][T20590] ? debug_smp_processor_id+0x33/0x18a [ 725.975014][T20590] ? rcu_lockdep_current_cpu_online+0xe3/0x130 [ 725.975046][T20590] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 725.975065][T20590] ? do_syscall_64+0x26/0x790 [ 726.031723][T20590] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe 13:21:21 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x4004556e, &(0x7f0000000100)={0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x4}, {}, @rumble}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) 13:21:21 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x4004556d, &(0x7f0000000100)={0x0, 0x0, {0x0, 0x3f00, 0x0, {}, {}, @rumble}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) 13:21:21 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x4004556e, &(0x7f0000000100)={0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x5}, {}, @rumble}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) 13:21:21 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x40045564, &(0x7f0000000100)={0x0, 0x0, {0x0, 0x0, 0x5, {}, {}, @rumble}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) [ 726.031741][T20590] ? do_syscall_64+0x26/0x790 [ 726.031768][T20590] __x64_sys_bpf+0x73/0xb0 [ 726.031788][T20590] do_syscall_64+0xfa/0x790 [ 726.052976][T20590] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 726.059104][T20590] RIP: 0033:0x45a679 [ 726.059119][T20590] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 726.059126][T20590] RSP: 002b:00007fd557596c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 726.059141][T20590] RAX: ffffffffffffffda RBX: 00007fd557596c90 RCX: 000000000045a679 [ 726.059150][T20590] RDX: 000000000000003c RSI: 0000000020000040 RDI: 405a020000000000 [ 726.059158][T20590] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 726.059166][T20590] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fd5575976d4 [ 726.059173][T20590] R13: 00000000004c0c65 R14: 00000000004d4750 R15: 0000000000000003 [ 726.059540][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 726.101953][ C1] protocol 88fb is buggy, dev hsr_slave_1 13:21:21 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x4004556d, &(0x7f0000000100)={0x0, 0x0, {0x0, 0x4000, 0x0, {}, {}, @rumble}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) 13:21:21 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x4004556e, &(0x7f0000000100)={0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x6}, {}, @rumble}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) [ 726.524289][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 726.530283][ C0] protocol 88fb is buggy, dev hsr_slave_1 13:21:21 executing program 4 (fault-call:0 fault-nth:22): bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x7880, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000, 0x0, 0x0, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x13]}, 0x3c) [ 726.657977][T20621] FAULT_INJECTION: forcing a failure. [ 726.657977][T20621] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 726.678643][T20621] CPU: 1 PID: 20621 Comm: syz-executor.4 Not tainted 5.4.0-syzkaller #0 [ 726.687281][T20621] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 726.698022][T20621] Call Trace: [ 726.701336][T20621] dump_stack+0x197/0x210 [ 726.705955][T20621] should_fail.cold+0xa/0x15 [ 726.711078][T20621] ? fault_create_debugfs_attr+0x180/0x180 [ 726.717184][T20621] ? ___might_sleep+0x163/0x2c0 [ 726.722110][T20621] should_fail_alloc_page+0x50/0x60 [ 726.727756][T20621] __alloc_pages_nodemask+0x1a1/0x910 [ 726.733299][T20621] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 726.738976][T20621] ? __alloc_pages_slowpath+0x2920/0x2920 [ 726.744702][T20621] ? kasan_unpoison_shadow+0x35/0x50 [ 726.750450][T20621] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 726.757461][T20621] alloc_pages_current+0x107/0x210 [ 726.763217][T20621] ? ___might_sleep+0x163/0x2c0 [ 726.768643][T20621] __vmalloc_node_range+0x4f8/0x810 [ 726.773946][T20621] ? bpf_map_area_alloc+0x20/0x30 [ 726.779008][T20621] __vmalloc_node_flags_caller+0x71/0x90 [ 726.785006][T20621] ? bpf_map_area_alloc+0x20/0x30 [ 726.790574][T20621] __bpf_map_area_alloc+0xde/0xf0 [ 726.795794][T20621] bpf_map_area_alloc+0x20/0x30 [ 726.801223][T20621] htab_map_alloc+0x8d3/0x11c0 [ 726.806380][T20621] ? htab_map_update_elem+0xca0/0xca0 [ 726.812201][T20621] __do_sys_bpf+0x478/0x37b0 [ 726.816837][T20621] ? bpf_prog_load+0x18a0/0x18a0 [ 726.821820][T20621] ? __kasan_check_write+0x14/0x20 [ 726.827612][T20621] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 726.833680][T20621] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 726.839393][T20621] ? wait_for_completion+0x440/0x440 [ 726.845308][T20621] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 726.851933][T20621] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 726.857591][T20621] ? do_syscall_64+0x26/0x790 [ 726.863184][T20621] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 726.869908][T20621] ? do_syscall_64+0x26/0x790 [ 726.874603][T20621] __x64_sys_bpf+0x73/0xb0 [ 726.879492][T20621] do_syscall_64+0xfa/0x790 [ 726.884430][T20621] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 726.890674][T20621] RIP: 0033:0x45a679 [ 726.894900][T20621] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 726.916440][T20621] RSP: 002b:00007fd557596c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 726.924869][T20621] RAX: ffffffffffffffda RBX: 00007fd557596c90 RCX: 000000000045a679 [ 726.933136][T20621] RDX: 000000000000003c RSI: 0000000020000040 RDI: 405a020000000000 [ 726.941433][T20621] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 726.949459][T20621] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fd5575976d4 13:21:22 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) recvmmsg(r0, &(0x7f0000001d00)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}], 0x2, 0x0, 0x0) setsockopt$SO_TIMESTAMP(r0, 0x1, 0x23, &(0x7f0000000040)=0x9, 0x4) r1 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r1, &(0x7f0000000180), 0x27a4eaa51029717, 0x0) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, &(0x7f0000000080)={0x0, @in6={{0xa, 0x4e21, 0x1, @local, 0x401}}, 0x8, 0x5, 0x80000001, 0xfffffffa, 0x20}, &(0x7f0000000000)=0x98) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r1, 0x84, 0x6f, &(0x7f0000000140)={r2, 0xd0, &(0x7f0000000200)=[@in={0x2, 0x4e22, @multicast1}, @in6={0xa, 0x4e20, 0x4, @empty, 0x1}, @in={0x2, 0x4e22, @multicast1}, @in6={0xa, 0x4e20, 0x4, @remote, 0x1}, @in6={0xa, 0x4e24, 0x0, @local, 0xa1}, @in={0x2, 0x4e23, @rand_addr=0x1}, @in={0x2, 0x4e23, @multicast1}, @in6={0xa, 0x4e23, 0x8000, @ipv4={[], [], @empty}, 0x4}, @in={0x2, 0x4e24, @dev={0xac, 0x14, 0x14, 0x11}}, @in={0x2, 0x4e23, @rand_addr=0x401}]}, &(0x7f0000000180)=0x10) r3 = socket$inet6(0xa, 0x80003, 0x80) ioctl(r3, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") 13:21:22 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x4004556e, &(0x7f0000000100)={0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x7}, {}, @rumble}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) 13:21:22 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x4004556d, &(0x7f0000000100)={0x0, 0x0, {0x0, 0xff00, 0x0, {}, {}, @rumble}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) 13:21:22 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x40045564, &(0x7f0000000100)={0x0, 0x0, {0x0, 0x0, 0x6, {}, {}, @rumble}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) 13:21:22 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) r1 = socket$inet6(0xa, 0x400000000001, 0x0) r2 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r2, &(0x7f0000000180), 0x27a4eaa51029717, 0x0) bind$inet6(r2, &(0x7f0000fa0fe4)={0xa, 0x4e20, 0x0, @loopback}, 0xff29) sendto$inet6(r1, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r3 = open(&(0x7f0000000200)='./file0\x00', 0x141042, 0x82) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f00000001c0)=0x4, 0x4) timerfd_gettime(r3, &(0x7f0000000040)) sendfile(r1, r3, &(0x7f00000000c0), 0x8000fffffffe) ioctl$TIOCGLCKTRMIOS(r3, 0x5456, &(0x7f00000000c0)={0x4, 0xfffffffe, 0x4, 0x4, 0x15, 0x7, 0x9, 0x1, 0x7, 0xffffff7f, 0xff, 0xfff}) r4 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r4, &(0x7f0000000180), 0x27a4eaa51029717, 0x0) setsockopt$inet6_icmp_ICMP_FILTER(r4, 0x1, 0x1, &(0x7f0000000100)={0x9}, 0x4) r5 = openat$tun(0xffffffffffffff9c, &(0x7f0000000780)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r5, 0x400454ca, &(0x7f0000000040)={'nr0\x01\x00', 0x1132}) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'nr0\x01\x00', 0x7132}) close(r5) r6 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r6, &(0x7f0000000180), 0x27a4eaa51029717, 0x0) setsockopt$RXRPC_SECURITY_KEYRING(r6, 0x110, 0x2, &(0x7f0000000080)='\x00', 0x1) 13:21:22 executing program 4 (fault-call:0 fault-nth:23): bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x7880, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000, 0x0, 0x0, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x13]}, 0x3c) [ 726.958406][T20621] R13: 00000000004c0c65 R14: 00000000004d4750 R15: 0000000000000003 13:21:22 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x40045564, &(0x7f0000000100)={0x0, 0x0, {0x0, 0x0, 0x7, {}, {}, @rumble}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) 13:21:22 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x4004556e, &(0x7f0000000100)={0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x8}, {}, @rumble}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) [ 727.117716][T20634] FAULT_INJECTION: forcing a failure. [ 727.117716][T20634] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 727.169337][T20634] CPU: 1 PID: 20634 Comm: syz-executor.4 Not tainted 5.4.0-syzkaller #0 [ 727.178091][T20634] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 727.188395][T20634] Call Trace: [ 727.191886][T20634] dump_stack+0x197/0x210 [ 727.196280][T20634] should_fail.cold+0xa/0x15 [ 727.201046][T20634] ? fault_create_debugfs_attr+0x180/0x180 [ 727.206977][T20634] ? ___might_sleep+0x163/0x2c0 [ 727.211962][T20634] should_fail_alloc_page+0x50/0x60 [ 727.217690][T20634] __alloc_pages_nodemask+0x1a1/0x910 [ 727.223358][T20634] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 727.229048][T20634] ? __alloc_pages_slowpath+0x2920/0x2920 [ 727.234816][T20634] ? kasan_unpoison_shadow+0x35/0x50 [ 727.240375][T20634] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 727.246696][T20634] alloc_pages_current+0x107/0x210 [ 727.252186][T20634] ? ___might_sleep+0x163/0x2c0 [ 727.257355][T20634] __vmalloc_node_range+0x4f8/0x810 [ 727.262605][T20634] ? bpf_map_area_alloc+0x20/0x30 13:21:22 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x4004556d, &(0x7f0000000100)={0x0, 0x0, {0x0, 0x0, 0x0, {}, {}, @rumble}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) [ 727.267799][T20634] __vmalloc_node_flags_caller+0x71/0x90 [ 727.267819][T20634] ? bpf_map_area_alloc+0x20/0x30 [ 727.267837][T20634] __bpf_map_area_alloc+0xde/0xf0 [ 727.267852][T20634] bpf_map_area_alloc+0x20/0x30 [ 727.267871][T20634] htab_map_alloc+0x8d3/0x11c0 [ 727.278898][T20634] ? htab_map_update_elem+0xca0/0xca0 [ 727.278914][T20634] __do_sys_bpf+0x478/0x37b0 [ 727.278933][T20634] ? bpf_prog_load+0x18a0/0x18a0 [ 727.278948][T20634] ? __kasan_check_write+0x14/0x20 [ 727.278966][T20634] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 727.278982][T20634] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 727.278997][T20634] ? wait_for_completion+0x440/0x440 [ 727.279020][T20634] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 727.289102][T20634] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 727.289122][T20634] ? do_syscall_64+0x26/0x790 [ 727.299425][T20634] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 727.299444][T20634] ? do_syscall_64+0x26/0x790 [ 727.299467][T20634] __x64_sys_bpf+0x73/0xb0 [ 727.299485][T20634] do_syscall_64+0xfa/0x790 [ 727.299507][T20634] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 727.309284][T20634] RIP: 0033:0x45a679 [ 727.309300][T20634] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 727.309309][T20634] RSP: 002b:00007fd557596c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 727.309323][T20634] RAX: ffffffffffffffda RBX: 00007fd557596c90 RCX: 000000000045a679 13:21:22 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x4004556e, &(0x7f0000000100)={0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x300}, {}, @rumble}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) [ 727.309332][T20634] RDX: 000000000000003c RSI: 0000000020000040 RDI: 405a020000000000 [ 727.309344][T20634] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 727.309352][T20634] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fd5575976d4 [ 727.309359][T20634] R13: 00000000004c0c65 R14: 00000000004d4750 R15: 0000000000000003 13:21:22 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x40045564, &(0x7f0000000100)={0x0, 0x0, {0x0, 0x0, 0x8, {}, {}, @rumble}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) 13:21:22 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x4004556d, &(0x7f0000000100)={0x0, 0x0, {0x0, 0x0, 0x2, {}, {}, @rumble}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) 13:21:22 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x4004556e, &(0x7f0000000100)={0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x500}, {}, @rumble}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) 13:21:22 executing program 4 (fault-call:0 fault-nth:24): bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x7880, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000, 0x0, 0x0, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x13]}, 0x3c) 13:21:22 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x4004556d, &(0x7f0000000100)={0x0, 0x0, {0x0, 0x0, 0x3, {}, {}, @rumble}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) 13:21:22 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) recvmmsg(r0, &(0x7f0000001d00)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}], 0x2, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/tcp6\x00') preadv(r1, &(0x7f0000000000)=[{&(0x7f00000000c0)=""/169, 0x2aa}], 0x1, 0x0) ioctl$PIO_FONTX(r1, 0x4b6c, &(0x7f0000000940)={0x1e0, 0x18, &(0x7f0000000540)="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"}) setsockopt$SO_TIMESTAMP(r0, 0x1, 0x23, &(0x7f0000000040)=0x9, 0x4) r2 = socket$inet6(0xa, 0x80003, 0x80) r3 = socket(0xa, 0x2, 0x0) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setreuid(0x0, r4) r5 = socket(0xa, 0x2, 0x0) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setreuid(0x0, r6) r7 = socket$inet(0xa, 0x801, 0x84) connect$inet(r7, &(0x7f0000004cc0)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r7, 0x84, 0x9, &(0x7f00000000c0)={0x0, @in={{0x2, 0x0, @rand_addr=0xac14ffbb}}}, &(0x7f0000000180)=0x98) write$binfmt_misc(r7, &(0x7f0000000a80)={'syz1', "69b65f76657cb3d8b4bc799dccd150821003c93c53b0392a8e6e3289a0a0c81aeefc781900c7b34104414e914c7c28a3312a2f26fcab62f54835a959a9e8e0c1b7d2e7cf35f99ef9e56a470ba7dc991d15fa0130c1940ae1ed7426a0a6644cc66b914e18be69c2419ea23454c85718b7bb90caff81bf3381edc6acc2c3d84d2609211750417f3f8e4188860a9a0f4abda053f6d0e03729728be2c1e5c633bf32c9dadd48c744a5ec8c2c5db9293cd45a1853797991d8dd68459101cfc051"}, 0xc2) setsockopt$MISDN_TIME_STAMP(r5, 0x0, 0x1, &(0x7f0000000480), 0x4) syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f0000000080)='./file0\x00', 0xfffffffffffffffb, 0x4, &(0x7f0000000400)=[{&(0x7f00000000c0)="32a2d0c5aff1b391bb9424b499211d369a68dc5e540e455d7656ab46ccd741bb92ae431e610fdca951b3f335c7533074b6080fb5dc8cfe65b5a51b87af6c", 0x3e, 0x3}, {&(0x7f0000000100)="2de282c4ae5f24ca6f9798f14eec811bbf1620880dd026e8baf909e6a0e2c89d85e515ef2f2765391e7b597dc4c6cf794b1df2c0683fa863ff3dfedf05d2967e01568853ad179b93e427fc832b796cd5f2a120ea0d2f547de20a1ba71c31f63ee89cb1fbbe5a47ca63104486905f65e3af443494d6ff0d49127bde6911479c6dbf5cce7fd2be456286495fada5b527e522bbb6c336ad641072a4008c34999c86db83f78789167e65c5fe5843dbee38b4ac8346fd243da8", 0xb7, 0x4}, {&(0x7f0000000200)="bf5a5a615be89c7b36abe5730e24f9bbe7f2577b49ee9d7cebb57819e2ecd1680cf706c619fd4c1ad3f3934d0e1ff8ba2f31106eea3e305d7fb2af8ae46d9ab2dedc880d91e8b2a8740005d5235d871dd28a3e7a0d8485a1a069f5bd1ea254dc2ea43a0bbaf82d532d5bfda032c43988fd99d6bc9c53f3c3a771acd699ba3090d653793c270b6df2f01553b3e6416e51f278c10888303488478a210e542982df59e250a3979c47fccdd2bc948946a46c661dd7e192ad67c0857bb5b174f02280e314711395521b5e5fb2f8e8f872a9bf92eb7abc6e75f3e1a7b84ec8c6b49050094abddae4198d5a651e4fe65bf0550bc7e229ea22a9", 0xf6, 0x6}, {&(0x7f0000000300)="1d5a11c07c77599aace8cbf18050629b9316280e3bb1c1d142382178d9f1c515170a5828d8e43781d9a44f1ff8485470fa6c7567f935b15865b3e8a40ab68f3fb79f3ae43a9478e108034a9cbef52c2be346e1a3b0c08813c8c6615e66af4308c62e4dccc33ed036a1a93a3ac2862c58867eb2303de9978110a4741f049db832e00858ea0d75800d4f47288afaa1218da1cae56c6251def2cd26f4a15dae2186b9bbb2081f5a43cd37905952b622b900a31504fb18f8702ba56d6ee588cbc57b29296d0aeb03edd1", 0xc8, 0x12}], 0x10, &(0x7f0000000980)=ANY=[@ANYBLOB="6e6f646f74732c647f74732c747a3d5554432c6e6f646f74732c7569643d", @ANYRESHEX=r4, @ANYBLOB=',fowner>', @ANYRESDEC=r6, @ANYBLOB="2c6d61736b3d5e4d41595f57524954452c6d61736b3d5e4d31595f52fdae9c14f8ba786d7572652c736d61636b6673666c6f6f723d2d776c732e2c00000000000000000000000000b2acec5a714457e1b2a1aa12c6862379912f616d0a48b993dcc79d25cf68adab753af89cdb0b9126780301408b2ff99e17b177d7c51461f38e9059c7b0552913d7008899ed48e712a5d3527982e11e71e7e70024977270ee7b"]) ioctl(r2, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") [ 727.921749][T20667] FAULT_INJECTION: forcing a failure. [ 727.921749][T20667] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 727.947997][T20667] CPU: 1 PID: 20667 Comm: syz-executor.4 Not tainted 5.4.0-syzkaller #0 [ 727.956478][T20667] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 727.956485][T20667] Call Trace: [ 727.956510][T20667] dump_stack+0x197/0x210 [ 727.956535][T20667] should_fail.cold+0xa/0x15 [ 727.974730][T20667] ? fault_create_debugfs_attr+0x180/0x180 [ 727.974748][T20667] ? ___might_sleep+0x163/0x2c0 [ 727.974774][T20667] should_fail_alloc_page+0x50/0x60 [ 727.974788][T20667] __alloc_pages_nodemask+0x1a1/0x910 [ 727.974803][T20667] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 727.974820][T20667] ? __alloc_pages_slowpath+0x2920/0x2920 [ 727.974843][T20667] ? kasan_unpoison_shadow+0x35/0x50 [ 727.990128][T20667] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 728.001674][T20667] alloc_pages_current+0x107/0x210 [ 728.001689][T20667] ? ___might_sleep+0x163/0x2c0 [ 728.001708][T20667] __vmalloc_node_range+0x4f8/0x810 [ 728.001734][T20667] ? bpf_map_area_alloc+0x20/0x30 [ 728.013522][T20667] __vmalloc_node_flags_caller+0x71/0x90 [ 728.013540][T20667] ? bpf_map_area_alloc+0x20/0x30 [ 728.013556][T20667] __bpf_map_area_alloc+0xde/0xf0 [ 728.013574][T20667] bpf_map_area_alloc+0x20/0x30 [ 728.027133][T20667] htab_map_alloc+0x8d3/0x11c0 [ 728.027163][T20667] ? htab_map_update_elem+0xca0/0xca0 [ 728.027181][T20667] __do_sys_bpf+0x478/0x37b0 [ 728.027205][T20667] ? bpf_prog_load+0x18a0/0x18a0 [ 728.027223][T20667] ? __kasan_check_write+0x14/0x20 [ 728.059194][T20667] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 728.080460][T20667] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 728.080481][T20667] ? wait_for_completion+0x440/0x440 [ 728.080513][T20667] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 728.106418][T20667] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 728.106434][T20667] ? do_syscall_64+0x26/0x790 [ 728.106452][T20667] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 728.106472][T20667] ? do_syscall_64+0x26/0x790 [ 728.118014][T20667] __x64_sys_bpf+0x73/0xb0 [ 728.118033][T20667] do_syscall_64+0xfa/0x790 [ 728.118056][T20667] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 728.118067][T20667] RIP: 0033:0x45a679 [ 728.118082][T20667] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 728.118095][T20667] RSP: 002b:00007fd557596c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 728.186898][T20667] RAX: ffffffffffffffda RBX: 00007fd557596c90 RCX: 000000000045a679 [ 728.194895][T20667] RDX: 000000000000003c RSI: 0000000020000040 RDI: 405a020000000000 [ 728.203226][T20667] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 728.211333][T20667] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fd5575976d4 [ 728.219561][T20667] R13: 00000000004c0c65 R14: 00000000004d4750 R15: 0000000000000003 13:21:23 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000780)='\x05\x002\x00', 0x8000, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'nr0\x01\x00', 0x7132}) close(r1) 13:21:23 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x40045564, &(0x7f0000000100)={0x0, 0x0, {0x0, 0x0, 0x300, {}, {}, @rumble}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) 13:21:23 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x4004556e, &(0x7f0000000100)={0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x600}, {}, @rumble}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) 13:21:23 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x4004556d, &(0x7f0000000100)={0x0, 0x0, {0x0, 0x0, 0x4, {}, {}, @rumble}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) 13:21:23 executing program 4 (fault-call:0 fault-nth:25): bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x7880, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000, 0x0, 0x0, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x13]}, 0x3c) 13:21:23 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) r1 = socket$bt_cmtp(0x1f, 0x3, 0x5) recvmmsg(r1, &(0x7f0000001d00)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}], 0x2, 0x0, 0x0) setsockopt$SO_TIMESTAMP(r0, 0x1, 0x23, &(0x7f0000000040)=0x9, 0x4) r2 = socket$inet6(0xa, 0x80003, 0x80) r3 = socket$inet(0xa, 0x801, 0x84) connect$inet(r3, &(0x7f0000004cc0)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) r4 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r4, &(0x7f0000000180), 0x27a4eaa51029717, 0x0) getsockopt$TIPC_GROUP_JOIN(r4, 0x10f, 0x87, &(0x7f0000000200), &(0x7f0000000240)=0x4) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r3, 0x84, 0x9, &(0x7f00000000c0)={0x0, @in={{0x2, 0x0, @rand_addr=0xac14ffbb}}}, &(0x7f0000000180)=0x98) fsetxattr(r3, &(0x7f0000000000)=@known='system.advise\x00', &(0x7f0000000080)='posix_acl_access\x00', 0x11, 0x1) ioctl(r2, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") 13:21:23 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x4004556e, &(0x7f0000000100)={0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x700}, {}, @rumble}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) 13:21:23 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x4004556d, &(0x7f0000000100)={0x0, 0x0, {0x0, 0x0, 0x5, {}, {}, @rumble}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) [ 728.416220][T20685] FAULT_INJECTION: forcing a failure. [ 728.416220][T20685] name fail_page_alloc, interval 1, probability 0, space 0, times 0 13:21:23 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x40045564, &(0x7f0000000100)={0x0, 0x0, {0x0, 0x0, 0x500, {}, {}, @rumble}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) [ 728.490441][T20685] CPU: 1 PID: 20685 Comm: syz-executor.4 Not tainted 5.4.0-syzkaller #0 [ 728.499180][T20685] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 728.509386][T20685] Call Trace: [ 728.509415][T20685] dump_stack+0x197/0x210 [ 728.509440][T20685] should_fail.cold+0xa/0x15 [ 728.509465][T20685] ? fault_create_debugfs_attr+0x180/0x180 [ 728.527826][T20685] ? ___might_sleep+0x163/0x2c0 [ 728.533412][T20685] should_fail_alloc_page+0x50/0x60 [ 728.533434][T20685] __alloc_pages_nodemask+0x1a1/0x910 [ 728.533457][T20685] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 728.550209][T20685] ? __alloc_pages_slowpath+0x2920/0x2920 [ 728.556147][T20685] ? kasan_unpoison_shadow+0x35/0x50 [ 728.561502][T20685] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 728.567793][T20685] alloc_pages_current+0x107/0x210 [ 728.572935][T20685] ? ___might_sleep+0x163/0x2c0 [ 728.577832][T20685] __vmalloc_node_range+0x4f8/0x810 [ 728.583081][T20685] ? bpf_map_area_alloc+0x20/0x30 [ 728.588156][T20685] __vmalloc_node_flags_caller+0x71/0x90 [ 728.588180][T20685] ? bpf_map_area_alloc+0x20/0x30 [ 728.588199][T20685] __bpf_map_area_alloc+0xde/0xf0 [ 728.599185][T20685] bpf_map_area_alloc+0x20/0x30 [ 728.609069][T20685] htab_map_alloc+0x8d3/0x11c0 [ 728.613879][T20685] ? htab_map_update_elem+0xca0/0xca0 [ 728.619618][T20685] __do_sys_bpf+0x478/0x37b0 [ 728.624258][T20685] ? bpf_prog_load+0x18a0/0x18a0 [ 728.629363][T20685] ? __kasan_check_write+0x14/0x20 [ 728.629380][T20685] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 728.629394][T20685] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 728.629412][T20685] ? wait_for_completion+0x440/0x440 [ 728.640187][T20685] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 728.640219][T20685] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 728.650965][T20685] ? do_syscall_64+0x26/0x790 [ 728.650984][T20685] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 728.650999][T20685] ? do_syscall_64+0x26/0x790 [ 728.651018][T20685] __x64_sys_bpf+0x73/0xb0 [ 728.651037][T20685] do_syscall_64+0xfa/0x790 [ 728.663077][T20685] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 728.673945][T20685] RIP: 0033:0x45a679 [ 728.673960][T20685] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 728.673972][T20685] RSP: 002b:00007fd557596c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 728.683203][T20685] RAX: ffffffffffffffda RBX: 00007fd557596c90 RCX: 000000000045a679 [ 728.683212][T20685] RDX: 000000000000003c RSI: 0000000020000040 RDI: 405a020000000000 [ 728.683220][T20685] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 728.683228][T20685] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fd5575976d4 [ 728.683236][T20685] R13: 00000000004c0c65 R14: 00000000004d4750 R15: 0000000000000003 13:21:24 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x4004556e, &(0x7f0000000100)={0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x4000}, {}, @rumble}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) 13:21:24 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) recvmmsg(r0, &(0x7f0000001d00)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}], 0x2, 0x0, 0x0) setsockopt$SO_TIMESTAMP(r0, 0x1, 0x40, &(0x7f0000000040)=0x9, 0xffffffffffffff4f) r1 = socket$inet6(0xa, 0x80003, 0x80) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") 13:21:24 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x4004556d, &(0x7f0000000100)={0x0, 0x0, {0x0, 0x0, 0x6, {}, {}, @rumble}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) 13:21:24 executing program 4 (fault-call:0 fault-nth:26): bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x7880, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000, 0x0, 0x0, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x13]}, 0x3c) 13:21:24 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x40045564, &(0x7f0000000100)={0x0, 0x0, {0x0, 0x0, 0x600, {}, {}, @rumble}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) 13:21:24 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x4004556e, &(0x7f0000000100)={0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0xff00}, {}, @rumble}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) 13:21:24 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x4004556d, &(0x7f0000000100)={0x0, 0x0, {0x0, 0x0, 0x7, {}, {}, @rumble}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) 13:21:24 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000780)='/dev/net/tun\x00', 0x0, 0x0) r2 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/autofs\x00', 0x2deb688bd8ad7fef, 0x0) r3 = socket$inet6_sctp(0xa, 0x4000000000000001, 0x84) r4 = socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r4, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r3, 0x84, 0x10, &(0x7f0000000000)=@sack_info={r5}, &(0x7f0000000040)=0xc) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f0000000180)={r5, @in6={{0xa, 0x4e21, 0x1, @loopback, 0x4d}}, [0x81, 0x7fff, 0xef1, 0x80000001, 0x2, 0x401, 0x2, 0x5, 0x80000001, 0xa6e7, 0x6a, 0x101, 0x3, 0x5, 0xa5a]}, &(0x7f00000000c0)=0x100) r7 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000300)='/dev/dlm-monitor\x00', 0x22500, 0x0) setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(r7, 0x10e, 0x2, &(0x7f0000000340)=0xc, 0x4) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r2, 0x84, 0x6f, &(0x7f0000000280)={r6, 0x10, &(0x7f0000000100)=[@in={0x2, 0x4e24, @local}]}, &(0x7f00000002c0)=0x10) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000040)={'nr0\x01\x00', 0x1132}) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'nr0\x01\x00', 0x7132}) close(r1) 13:21:24 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x4004556e, &(0x7f0000000100)={0x0, 0x0, {0x0, 0x0, 0x0, {}, {}, @rumble}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) [ 729.461808][T20718] FAULT_INJECTION: forcing a failure. [ 729.461808][T20718] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 729.504447][T20718] CPU: 1 PID: 20718 Comm: syz-executor.4 Not tainted 5.4.0-syzkaller #0 [ 729.513280][T20718] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 729.513288][T20718] Call Trace: [ 729.513316][T20718] dump_stack+0x197/0x210 [ 729.513338][T20718] should_fail.cold+0xa/0x15 [ 729.513366][T20718] ? fault_create_debugfs_attr+0x180/0x180 [ 729.542028][T20718] ? ___might_sleep+0x163/0x2c0 [ 729.546920][T20718] should_fail_alloc_page+0x50/0x60 [ 729.552316][T20718] __alloc_pages_nodemask+0x1a1/0x910 [ 729.557820][T20718] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 729.563403][T20718] ? __alloc_pages_slowpath+0x2920/0x2920 [ 729.570432][T20718] ? kasan_unpoison_shadow+0x35/0x50 [ 729.570451][T20718] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 729.570470][T20718] alloc_pages_current+0x107/0x210 [ 729.570483][T20718] ? ___might_sleep+0x163/0x2c0 [ 729.570503][T20718] __vmalloc_node_range+0x4f8/0x810 [ 729.582197][T20718] ? bpf_map_area_alloc+0x20/0x30 [ 729.582215][T20718] __vmalloc_node_flags_caller+0x71/0x90 [ 729.582229][T20718] ? bpf_map_area_alloc+0x20/0x30 [ 729.582245][T20718] __bpf_map_area_alloc+0xde/0xf0 [ 729.582258][T20718] bpf_map_area_alloc+0x20/0x30 [ 729.582277][T20718] htab_map_alloc+0x8d3/0x11c0 [ 729.603152][T20718] ? htab_map_update_elem+0xca0/0xca0 [ 729.603172][T20718] __do_sys_bpf+0x478/0x37b0 [ 729.603194][T20718] ? bpf_prog_load+0x18a0/0x18a0 [ 729.614315][T20718] ? __kasan_check_write+0x14/0x20 13:21:24 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x40045564, &(0x7f0000000100)={0x0, 0x0, {0x0, 0x0, 0x700, {}, {}, @rumble}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) [ 729.614332][T20718] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 729.614349][T20718] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 729.614366][T20718] ? wait_for_completion+0x440/0x440 [ 729.614388][T20718] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 729.614416][T20718] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 729.614429][T20718] ? do_syscall_64+0x26/0x790 [ 729.614449][T20718] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 729.630131][T20718] ? do_syscall_64+0x26/0x790 [ 729.630154][T20718] __x64_sys_bpf+0x73/0xb0 [ 729.630175][T20718] do_syscall_64+0xfa/0x790 13:21:24 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x4004556d, &(0x7f0000000100)={0x0, 0x0, {0x0, 0x0, 0x8, {}, {}, @rumble}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) [ 729.630199][T20718] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 729.630209][T20718] RIP: 0033:0x45a679 [ 729.630228][T20718] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 729.640298][T20718] RSP: 002b:00007fd557596c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 729.650569][T20718] RAX: ffffffffffffffda RBX: 00007fd557596c90 RCX: 000000000045a679 [ 729.661438][T20718] RDX: 000000000000003c RSI: 0000000020000040 RDI: 405a020000000000 [ 729.661446][T20718] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 729.661454][T20718] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fd5575976d4 [ 729.661462][T20718] R13: 00000000004c0c65 R14: 00000000004d4750 R15: 0000000000000003 13:21:25 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x4004556e, &(0x7f0000000100)={0x0, 0x0, {0x0, 0x0, 0x0, {}, {0x2}, @rumble}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) 13:21:25 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) recvmmsg(r0, &(0x7f0000001d00)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}], 0x2, 0x0, 0x0) setsockopt$SO_TIMESTAMP(r0, 0x1, 0x23, &(0x7f0000000040)=0x9, 0x4) lsetxattr$trusted_overlay_origin(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='trusted.overlay.origin\x00', &(0x7f0000000140)='y\x00', 0x2, 0x2) r1 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcsu\x00', 0x40000, 0x0) ioctl$PPPIOCGFLAGS(r1, 0x8004745a, &(0x7f0000000080)) r2 = socket$inet6(0xa, 0x80003, 0x80) ioctl(r2, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") 13:21:25 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x4004556d, &(0x7f0000000100)={0x0, 0x0, {0x0, 0x0, 0x300, {}, {}, @rumble}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) 13:21:25 executing program 4 (fault-call:0 fault-nth:27): bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x7880, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000, 0x0, 0x0, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x13]}, 0x3c) 13:21:25 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x4004556e, &(0x7f0000000100)={0x0, 0x0, {0x0, 0x0, 0x0, {}, {0x3}, @rumble}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) 13:21:25 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x40045564, &(0x7f0000000100)={0x0, 0x0, {0x0, 0x0, 0x3f00, {}, {}, @rumble}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) [ 730.040979][T20742] FAULT_INJECTION: forcing a failure. [ 730.040979][T20742] name fail_page_alloc, interval 1, probability 0, space 0, times 0 13:21:25 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x4004556d, &(0x7f0000000100)={0x0, 0x0, {0x0, 0x0, 0x500, {}, {}, @rumble}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) 13:21:25 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x40045564, &(0x7f0000000100)={0x0, 0x0, {0x0, 0x0, 0x4000, {}, {}, @rumble}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) [ 730.324425][T20742] CPU: 0 PID: 20742 Comm: syz-executor.4 Not tainted 5.4.0-syzkaller #0 [ 730.333233][T20742] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 730.343502][T20742] Call Trace: [ 730.346927][T20742] dump_stack+0x197/0x210 [ 730.351305][T20742] should_fail.cold+0xa/0x15 [ 730.356463][T20742] ? fault_create_debugfs_attr+0x180/0x180 [ 730.362526][T20742] ? ___might_sleep+0x163/0x2c0 [ 730.367817][T20742] should_fail_alloc_page+0x50/0x60 [ 730.373296][T20742] __alloc_pages_nodemask+0x1a1/0x910 [ 730.378856][T20742] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 730.384451][T20742] ? __alloc_pages_slowpath+0x2920/0x2920 [ 730.390213][T20742] ? kasan_unpoison_shadow+0x35/0x50 [ 730.395645][T20742] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 730.395664][T20742] alloc_pages_current+0x107/0x210 [ 730.395677][T20742] ? ___might_sleep+0x163/0x2c0 [ 730.395694][T20742] __vmalloc_node_range+0x4f8/0x810 [ 730.395717][T20742] ? bpf_map_area_alloc+0x20/0x30 [ 730.395733][T20742] __vmalloc_node_flags_caller+0x71/0x90 [ 730.395746][T20742] ? bpf_map_area_alloc+0x20/0x30 [ 730.395762][T20742] __bpf_map_area_alloc+0xde/0xf0 [ 730.395776][T20742] bpf_map_area_alloc+0x20/0x30 [ 730.395790][T20742] htab_map_alloc+0x8d3/0x11c0 [ 730.395818][T20742] ? htab_map_update_elem+0xca0/0xca0 [ 730.395835][T20742] __do_sys_bpf+0x478/0x37b0 [ 730.395859][T20742] ? bpf_prog_load+0x18a0/0x18a0 [ 730.395874][T20742] ? __kasan_check_write+0x14/0x20 [ 730.395893][T20742] ? __mutex_unlock_slowpath+0xf0/0x6a0 13:21:25 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x4004556e, &(0x7f0000000100)={0x0, 0x0, {0x0, 0x0, 0x0, {}, {0x4}, @rumble}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) 13:21:25 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x4004556d, &(0x7f0000000100)={0x0, 0x0, {0x0, 0x0, 0x600, {}, {}, @rumble}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) [ 730.395908][T20742] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 730.395925][T20742] ? wait_for_completion+0x440/0x440 [ 730.395948][T20742] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 730.407592][T20742] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 730.407612][T20742] ? do_syscall_64+0x26/0x790 [ 730.502209][T20742] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 730.508424][T20742] ? do_syscall_64+0x26/0x790 [ 730.513230][T20742] __x64_sys_bpf+0x73/0xb0 [ 730.517995][T20742] do_syscall_64+0xfa/0x790 [ 730.522543][T20742] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 730.528632][T20742] RIP: 0033:0x45a679 [ 730.532553][T20742] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 730.552797][T20742] RSP: 002b:00007fd557596c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 730.561612][T20742] RAX: ffffffffffffffda RBX: 00007fd557596c90 RCX: 000000000045a679 13:21:25 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000780)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000040)={'nr0\x01\x00', 0x1132}) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'nr0\x01\x00', 0x7132}) close(r1) r2 = socket$inet6(0xa, 0x400000000001, 0x0) bind$inet6(r2, &(0x7f0000fa0fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r2, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r3 = open(&(0x7f0000000200)='./file0\x00', 0x141042, 0x82) setsockopt$SO_TIMESTAMPING(r2, 0x1, 0x25, &(0x7f00000001c0)=0x4, 0x4) timerfd_gettime(r3, &(0x7f0000000040)) ftruncate(r3, 0x7e) sendfile(r2, r3, &(0x7f00000000c0), 0x8000fffffffe) ioctl$KVM_GET_MP_STATE(r3, 0x8004ae98, &(0x7f00000001c0)) r4 = socket$inet(0xa, 0x801, 0x84) connect$inet(r4, &(0x7f0000004cc0)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) r5 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r5, &(0x7f0000000180), 0x27a4eaa51029717, 0x0) r6 = socket$inet6_sctp(0xa, 0x4000000000000001, 0x84) r7 = socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r7, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r6, 0x84, 0x10, &(0x7f0000000000)=@sack_info={r8}, &(0x7f0000000040)=0xc) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r5, 0x84, 0x10, &(0x7f0000000240)=@assoc_value={r8, 0x5}, &(0x7f0000000280)=0x8) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r4, 0x84, 0x9, &(0x7f00000000c0)={0x0, @in={{0x2, 0x0, @rand_addr=0xac14ffbb}}}, &(0x7f0000000180)=0x98) fsetxattr$security_evm(r4, &(0x7f0000000080)='security.evm\x00', &(0x7f00000000c0)=@v1={0x2, "3bb76ab42511ddb9f6195994658d27068b177f56"}, 0x15, 0x2) [ 730.569712][T20742] RDX: 000000000000003c RSI: 0000000020000040 RDI: 405a020000000000 [ 730.569720][T20742] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 730.569727][T20742] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fd5575976d4 [ 730.569735][T20742] R13: 00000000004c0c65 R14: 00000000004d4750 R15: 0000000000000003 13:21:25 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x4004556d, &(0x7f0000000100)={0x0, 0x0, {0x0, 0x0, 0x700, {}, {}, @rumble}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) 13:21:25 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x4004556e, &(0x7f0000000100)={0x0, 0x0, {0x0, 0x0, 0x0, {}, {0x5}, @rumble}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) [ 730.764483][ C0] net_ratelimit: 12 callbacks suppressed [ 730.764491][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 730.776233][ C0] protocol 88fb is buggy, dev hsr_slave_1 13:21:26 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) recvmmsg(r0, &(0x7f0000001d00)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}], 0x2, 0x0, 0x0) setsockopt$SO_TIMESTAMP(r0, 0x1, 0x23, &(0x7f0000000040)=0x9, 0x4) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000100)='/dev/zero\x00', 0x430382, 0x0) bind$netlink(r1, &(0x7f0000000140)={0x10, 0x0, 0x25dfdbff, 0x1000}, 0xc) r2 = socket$inet6(0xa, 0x80003, 0x80) ioctl(r2, 0x8, &(0x7f00000001c0)="0805b5055e0bcfe8474071") ioctl$RTC_IRQP_SET(r1, 0x4008700c, 0x1bee) r3 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000000)='\x11dev-vcsu\x02', 0x80, 0x0) getsockopt$IPT_SO_GET_REVISION_MATCH(r3, 0x0, 0x42, &(0x7f0000000080)={'IDLETIMER\x00'}, &(0x7f00000000c0)=0x1e) 13:21:26 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x40045564, &(0x7f0000000100)={0x0, 0x0, {0x0, 0x0, 0xff00, {}, {}, @rumble}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) 13:21:26 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x4004556d, &(0x7f0000000100)={0x0, 0x0, {0x0, 0x0, 0x3f00, {}, {}, @rumble}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) 13:21:26 executing program 4 (fault-call:0 fault-nth:28): bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x7880, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000, 0x0, 0x0, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x13]}, 0x3c) 13:21:26 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x4004556e, &(0x7f0000000100)={0x0, 0x0, {0x0, 0x0, 0x0, {}, {0x6}, @rumble}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) [ 730.982270][T20783] FAULT_INJECTION: forcing a failure. [ 730.982270][T20783] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 731.035650][T20783] CPU: 1 PID: 20783 Comm: syz-executor.4 Not tainted 5.4.0-syzkaller #0 [ 731.044494][T20783] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 731.054672][T20783] Call Trace: [ 731.057998][T20783] dump_stack+0x197/0x210 [ 731.062612][T20783] should_fail.cold+0xa/0x15 [ 731.067339][T20783] ? fault_create_debugfs_attr+0x180/0x180 [ 731.073378][T20783] ? ___might_sleep+0x163/0x2c0 [ 731.078281][T20783] should_fail_alloc_page+0x50/0x60 [ 731.083521][T20783] __alloc_pages_nodemask+0x1a1/0x910 [ 731.089147][T20783] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 731.094713][T20783] ? __alloc_pages_slowpath+0x2920/0x2920 [ 731.094733][T20783] ? kasan_unpoison_shadow+0x35/0x50 [ 731.094748][T20783] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 731.094765][T20783] alloc_pages_current+0x107/0x210 [ 731.094778][T20783] ? ___might_sleep+0x163/0x2c0 [ 731.094800][T20783] __vmalloc_node_range+0x4f8/0x810 [ 731.127954][T20783] ? bpf_map_area_alloc+0x20/0x30 [ 731.127975][T20783] __vmalloc_node_flags_caller+0x71/0x90 [ 731.127987][T20783] ? bpf_map_area_alloc+0x20/0x30 [ 731.128005][T20783] __bpf_map_area_alloc+0xde/0xf0 [ 731.139650][T20783] bpf_map_area_alloc+0x20/0x30 [ 731.139667][T20783] htab_map_alloc+0x8d3/0x11c0 [ 731.139692][T20783] ? htab_map_update_elem+0xca0/0xca0 [ 731.165706][T20783] __do_sys_bpf+0x478/0x37b0 [ 731.170627][T20783] ? bpf_prog_load+0x18a0/0x18a0 [ 731.175783][T20783] ? __kasan_check_write+0x14/0x20 [ 731.181228][T20783] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 731.187103][T20783] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 731.192427][T20783] ? wait_for_completion+0x440/0x440 [ 731.197853][T20783] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 731.204367][T20783] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 731.210029][T20783] ? do_syscall_64+0x26/0x790 [ 731.214749][T20783] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 731.223549][T20783] ? do_syscall_64+0x26/0x790 [ 731.228511][T20783] __x64_sys_bpf+0x73/0xb0 13:21:26 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x4004556e, &(0x7f0000000100)={0x0, 0x0, {0x0, 0x0, 0x0, {}, {0x7}, @rumble}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) 13:21:26 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x40045564, &(0x7f0000000100)={0x0, 0x0, {0x0, 0x0, 0x0, {}, {}, @rumble}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) 13:21:26 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x4004556d, &(0x7f0000000100)={0x0, 0x0, {0x0, 0x0, 0x4000, {}, {}, @rumble}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) [ 731.232993][T20783] do_syscall_64+0xfa/0x790 [ 731.237541][T20783] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 731.243670][T20783] RIP: 0033:0x45a679 [ 731.247623][T20783] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 731.268369][T20783] RSP: 002b:00007fd557596c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 731.268385][T20783] RAX: ffffffffffffffda RBX: 00007fd557596c90 RCX: 000000000045a679 13:21:26 executing program 4 (fault-call:0 fault-nth:29): bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x7880, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000, 0x0, 0x0, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x13]}, 0x3c) [ 731.268393][T20783] RDX: 000000000000003c RSI: 0000000020000040 RDI: 405a020000000000 [ 731.268400][T20783] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 731.268408][T20783] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fd5575976d4 [ 731.268415][T20783] R13: 00000000004c0c65 R14: 00000000004d4750 R15: 0000000000000003 [ 731.458893][T20802] FAULT_INJECTION: forcing a failure. [ 731.458893][T20802] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 731.486216][T20802] CPU: 1 PID: 20802 Comm: syz-executor.4 Not tainted 5.4.0-syzkaller #0 [ 731.494608][T20802] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 731.504931][T20802] Call Trace: [ 731.508260][T20802] dump_stack+0x197/0x210 [ 731.512633][T20802] should_fail.cold+0xa/0x15 [ 731.517271][T20802] ? fault_create_debugfs_attr+0x180/0x180 [ 731.523293][T20802] ? ___might_sleep+0x163/0x2c0 [ 731.528214][T20802] should_fail_alloc_page+0x50/0x60 [ 731.533605][T20802] __alloc_pages_nodemask+0x1a1/0x910 [ 731.539014][T20802] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 731.545010][T20802] ? __alloc_pages_slowpath+0x2920/0x2920 [ 731.551795][T20802] ? kasan_unpoison_shadow+0x35/0x50 [ 731.557104][T20802] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 731.557122][T20802] alloc_pages_current+0x107/0x210 [ 731.557135][T20802] ? ___might_sleep+0x163/0x2c0 [ 731.557152][T20802] __vmalloc_node_range+0x4f8/0x810 [ 731.557175][T20802] ? bpf_map_area_alloc+0x20/0x30 [ 731.568777][T20802] __vmalloc_node_flags_caller+0x71/0x90 [ 731.568794][T20802] ? bpf_map_area_alloc+0x20/0x30 [ 731.568815][T20802] __bpf_map_area_alloc+0xde/0xf0 [ 731.599689][T20802] bpf_map_area_alloc+0x20/0x30 [ 731.604773][T20802] htab_map_alloc+0x8d3/0x11c0 [ 731.609737][T20802] ? htab_map_update_elem+0xca0/0xca0 [ 731.615148][T20802] __do_sys_bpf+0x478/0x37b0 [ 731.620017][T20802] ? bpf_prog_load+0x18a0/0x18a0 [ 731.624990][T20802] ? __kasan_check_write+0x14/0x20 [ 731.630444][T20802] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 731.630463][T20802] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 731.630479][T20802] ? wait_for_completion+0x440/0x440 [ 731.630501][T20802] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 731.630529][T20802] ? trace_hardirqs_on_thunk+0x1a/0x1c 13:21:26 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000780)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000040)={'nr0\x01\x00', 0x1132}) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'nr0\x01\x00', 0x7132}) openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000080)='/proc/capi/capi20ncci\x00', 0x100, 0x0) close(r1) 13:21:26 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x4004556d, &(0x7f0000000100)={0x0, 0x0, {0x0, 0x0, 0xff00, {}, {}, @rumble}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) 13:21:26 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x4004556e, &(0x7f0000000100)={0x0, 0x0, {0x0, 0x0, 0x0, {}, {0x8}, @rumble}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) [ 731.641663][T20802] ? do_syscall_64+0x26/0x790 [ 731.641682][T20802] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 731.641695][T20802] ? do_syscall_64+0x26/0x790 [ 731.641721][T20802] __x64_sys_bpf+0x73/0xb0 [ 731.653688][T20802] do_syscall_64+0xfa/0x790 [ 731.653711][T20802] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 731.653723][T20802] RIP: 0033:0x45a679 [ 731.653745][T20802] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 731.664183][T20802] RSP: 002b:00007fd557596c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 731.664199][T20802] RAX: ffffffffffffffda RBX: 00007fd557596c90 RCX: 000000000045a679 [ 731.664207][T20802] RDX: 000000000000003c RSI: 0000000020000040 RDI: 405a020000000000 [ 731.664214][T20802] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 731.664221][T20802] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fd5575976d4 [ 731.664228][T20802] R13: 00000000004c0c65 R14: 00000000004d4750 R15: 0000000000000003 [ 731.725400][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 731.725445][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 731.734724][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 731.743251][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 731.804495][ C0] protocol 88fb is buggy, dev hsr_slave_0 13:21:27 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x40045564, &(0x7f0000000100)={0x0, 0x0, {0x0, 0x0, 0x0, {0x2}, {}, @rumble}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) 13:21:27 executing program 4 (fault-call:0 fault-nth:30): bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x7880, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000, 0x0, 0x0, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x13]}, 0x3c) 13:21:27 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x4004556e, &(0x7f0000000100)={0x0, 0x0, {0x0, 0x0, 0x0, {}, {0x300}, @rumble}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) 13:21:27 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) recvmmsg(r0, &(0x7f0000001d00)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}], 0x2, 0x0, 0x0) fsopen(&(0x7f0000000180)='tracefs\x00', 0x1) perf_event_open(&(0x7f0000000340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x0, 0x5c831, 0xffffffffffffffff, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x4, 0x0, 0xfffffff6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x3, 0x0, 0x0, 0x4000, 0x0, 0xfffc}, 0x0, 0x10, 0xffffffffffffffff, 0x1) prctl$PR_SET_SPECULATION_CTRL(0x35, 0x0) ioctl$DRM_IOCTL_AGP_FREE(0xffffffffffffffff, 0x40206435, 0x0) r3 = dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$sock_SIOCGPGRP(r3, 0x8904, 0x0) openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/avc/hash_stats\x00', 0x0, 0x0) socket$bt_cmtp(0x1f, 0x3, 0x5) r4 = socket(0x10, 0x0, 0x0) getsockopt$inet_sctp_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f0000000140)=@assoc_value={0x0}, &(0x7f0000000180)=0x8) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(r4, 0x84, 0x7b, &(0x7f00000001c0)={r5, 0x8000}, &(0x7f0000000240)=0x1) r6 = creat(&(0x7f0000000280)='./file0\x00', 0x28) write$binfmt_script(r6, &(0x7f00000004c0)=ANY=[@ANYBLOB="2321202e2f66696c6530202d656d3a6e2007000000ea51037365766b90cb99c2e8611e86c759c3d80b933fe29bdf006f50d2c2088f260611e08c4fa30c8ab69b1088ae75324d16b9fad59eece224a70cc55424551f30149a7e78def2a08dff097c22d2a8f4f0ee2caa95a9b7a0ebf27e8d3e627f070c4e98695c8e169ba06edb5f952e90f2406d50ac9db78a966c782e1352c5df081c8ae5f3f9ab90c5fad2a6376ba8c9465e335242c2c67809f3f31e890a5eb6c547fa4ffd2ba918b26a26875b4556aef3e3f575ca82a8c0ff0a4c3af9d4e113aca2361b3404765fa60d8903ee6326b509a4af9229489d2c25a84dbaa0fa45d36e6114a919ae15467d"], 0xa3) close(r6) r7 = socket$inet(0x2, 0x4000000805, 0x0) r8 = socket$inet_sctp(0x2, 0x0, 0x84) r9 = dup3(r7, r8, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r8, 0x84, 0x64, &(0x7f0000d6cff0)=[@in={0x2, 0x4e20, @loopback}], 0x10) sendto$inet(r9, &(0x7f0000fa3fff), 0x0, 0xef8d68f807f3089f, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) sendto$inet(r8, 0x0, 0x0, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r9, 0x84, 0x7a, &(0x7f000059aff8), &(0x7f000034f000)=0x2059b000) write$uinput_user_dev(0xffffffffffffffff, &(0x7f0000000600)={'syz\x06\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x1a\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x1b\x00', {}, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff228c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0xfffffffc], [0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, 0x10001, 0x0, 0x0, 0x0, 0xfffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x72b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000], [0x0, 0x0, 0x5d, 0x0, 0x0, 0x0, 0x8de, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x200, 0xfffffffe, 0x800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6878000000000000, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0xfffffffd, 0x0, 0x0, 0x80000, 0x0, 0x0, 0x0, 0x0, 0x0, 0xeb6, 0x2]}, 0x45c) ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) 13:21:27 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x40045564, &(0x7f0000000100)={0x0, 0x0, {0x0, 0x0, 0x0, {0x3}, {}, @rumble}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) 13:21:27 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x4004556d, &(0x7f0000000100)={0x0, 0x0, {0x0, 0x0, 0x0, {}, {}, @rumble}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) [ 731.965141][T20823] FAULT_INJECTION: forcing a failure. [ 731.965141][T20823] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 732.070305][ T25] audit: type=1400 audit(1575465687.229:135): avc: denied { map } for pid=20821 comm="syz-executor.5" path=2F616E6F6E5F6875676570616765202864656C6574656429 dev="hugetlbfs" ino=115182 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:hugetlbfs_t:s0 tclass=file permissive=1 [ 732.155190][T20823] CPU: 1 PID: 20823 Comm: syz-executor.4 Not tainted 5.4.0-syzkaller #0 [ 732.163748][T20823] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 732.173823][T20823] Call Trace: [ 732.177632][T20823] dump_stack+0x197/0x210 [ 732.182692][T20823] should_fail.cold+0xa/0x15 [ 732.188468][T20823] ? fault_create_debugfs_attr+0x180/0x180 [ 732.194805][T20823] ? ___might_sleep+0x163/0x2c0 [ 732.199909][T20823] should_fail_alloc_page+0x50/0x60 [ 732.206014][T20823] __alloc_pages_nodemask+0x1a1/0x910 [ 732.211869][T20823] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 732.217939][T20823] ? __alloc_pages_slowpath+0x2920/0x2920 [ 732.217964][T20823] ? kasan_unpoison_shadow+0x35/0x50 [ 732.217981][T20823] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 732.218001][T20823] alloc_pages_current+0x107/0x210 [ 732.231425][T20823] ? ___might_sleep+0x163/0x2c0 [ 732.231447][T20823] __vmalloc_node_range+0x4f8/0x810 13:21:27 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x40045564, &(0x7f0000000100)={0x0, 0x0, {0x0, 0x0, 0x0, {0x4}, {}, @rumble}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) [ 732.231475][T20823] ? bpf_map_area_alloc+0x20/0x30 [ 732.231488][T20823] __vmalloc_node_flags_caller+0x71/0x90 [ 732.231506][T20823] ? bpf_map_area_alloc+0x20/0x30 [ 732.273334][T20823] __bpf_map_area_alloc+0xde/0xf0 [ 732.279136][T20823] bpf_map_area_alloc+0x20/0x30 [ 732.285100][T20823] htab_map_alloc+0x8d3/0x11c0 [ 732.290380][T20823] ? htab_map_update_elem+0xca0/0xca0 [ 732.296257][T20823] __do_sys_bpf+0x478/0x37b0 [ 732.296278][T20823] ? bpf_prog_load+0x18a0/0x18a0 [ 732.296294][T20823] ? __kasan_check_write+0x14/0x20 [ 732.296338][T20823] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 732.296351][T20823] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 732.296371][T20823] ? wait_for_completion+0x440/0x440 [ 732.306430][T20823] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 732.306462][T20823] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 732.306477][T20823] ? do_syscall_64+0x26/0x790 [ 732.306495][T20823] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe 13:21:27 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x4004556e, &(0x7f0000000100)={0x0, 0x0, {0x0, 0x0, 0x0, {}, {0x500}, @rumble}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) [ 732.306508][T20823] ? do_syscall_64+0x26/0x790 [ 732.306527][T20823] __x64_sys_bpf+0x73/0xb0 [ 732.306545][T20823] do_syscall_64+0xfa/0x790 [ 732.318160][T20823] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 732.318173][T20823] RIP: 0033:0x45a679 [ 732.318188][T20823] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 732.318201][T20823] RSP: 002b:00007fd557596c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 732.330023][T20823] RAX: ffffffffffffffda RBX: 00007fd557596c90 RCX: 000000000045a679 [ 732.330033][T20823] RDX: 000000000000003c RSI: 0000000020000040 RDI: 405a020000000000 [ 732.330040][T20823] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 732.330047][T20823] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fd5575976d4 [ 732.330055][T20823] R13: 00000000004c0c65 R14: 00000000004d4750 R15: 0000000000000003 [ 732.364387][ C1] protocol 88fb is buggy, dev hsr_slave_0 13:21:27 executing program 4 (fault-call:0 fault-nth:31): bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x7880, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000, 0x0, 0x0, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x13]}, 0x3c) [ 732.378750][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 732.593888][T20847] FAULT_INJECTION: forcing a failure. [ 732.593888][T20847] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 732.615659][T20847] CPU: 0 PID: 20847 Comm: syz-executor.4 Not tainted 5.4.0-syzkaller #0 [ 732.624288][T20847] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 732.634568][T20847] Call Trace: [ 732.637899][T20847] dump_stack+0x197/0x210 [ 732.642276][T20847] should_fail.cold+0xa/0x15 [ 732.647124][T20847] ? fault_create_debugfs_attr+0x180/0x180 [ 732.653238][T20847] ? ___might_sleep+0x163/0x2c0 [ 732.658409][T20847] should_fail_alloc_page+0x50/0x60 [ 732.663664][T20847] __alloc_pages_nodemask+0x1a1/0x910 [ 732.669080][T20847] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 732.675151][T20847] ? __alloc_pages_slowpath+0x2920/0x2920 [ 732.681345][T20847] ? kasan_unpoison_shadow+0x35/0x50 [ 732.686901][T20847] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 732.693629][T20847] alloc_pages_current+0x107/0x210 [ 732.699351][T20847] ? ___might_sleep+0x163/0x2c0 [ 732.704324][T20847] __vmalloc_node_range+0x4f8/0x810 [ 732.709633][T20847] ? bpf_map_area_alloc+0x20/0x30 [ 732.715023][T20847] __vmalloc_node_flags_caller+0x71/0x90 [ 732.721106][T20847] ? bpf_map_area_alloc+0x20/0x30 [ 732.727382][T20847] __bpf_map_area_alloc+0xde/0xf0 [ 732.733217][T20847] bpf_map_area_alloc+0x20/0x30 [ 732.733234][T20847] htab_map_alloc+0x8d3/0x11c0 [ 732.733263][T20847] ? htab_map_update_elem+0xca0/0xca0 [ 732.733278][T20847] __do_sys_bpf+0x478/0x37b0 [ 732.733297][T20847] ? bpf_prog_load+0x18a0/0x18a0 [ 732.743636][T20847] ? __kasan_check_write+0x14/0x20 [ 732.743654][T20847] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 732.743672][T20847] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 732.743689][T20847] ? wait_for_completion+0x440/0x440 [ 732.743714][T20847] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 732.754350][T20847] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 732.754367][T20847] ? do_syscall_64+0x26/0x790 [ 732.754386][T20847] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 732.754398][T20847] ? do_syscall_64+0x26/0x790 [ 732.754418][T20847] __x64_sys_bpf+0x73/0xb0 [ 732.754434][T20847] do_syscall_64+0xfa/0x790 [ 732.754453][T20847] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 732.754464][T20847] RIP: 0033:0x45a679 [ 732.754479][T20847] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 732.754486][T20847] RSP: 002b:00007fd557596c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 732.754504][T20847] RAX: ffffffffffffffda RBX: 00007fd557596c90 RCX: 000000000045a679 [ 732.765416][T20847] RDX: 000000000000003c RSI: 0000000020000040 RDI: 405a020000000000 [ 732.765424][T20847] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 732.765432][T20847] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fd5575976d4 [ 732.765439][T20847] R13: 00000000004c0c65 R14: 00000000004d4750 R15: 0000000000000003 [ 732.850518][ C0] protocol 88fb is buggy, dev hsr_slave_0 13:21:28 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x4004556e, &(0x7f0000000100)={0x0, 0x0, {0x0, 0x0, 0x0, {}, {0x600}, @rumble}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) 13:21:28 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x40045564, &(0x7f0000000100)={0x0, 0x0, {0x0, 0x0, 0x0, {0x5}, {}, @rumble}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) 13:21:28 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x4004556d, &(0x7f0000000100)={0x0, 0x0, {0x0, 0x0, 0x0, {0x2}, {}, @rumble}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) 13:21:28 executing program 4 (fault-call:0 fault-nth:32): bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x7880, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000, 0x0, 0x0, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x13]}, 0x3c) 13:21:28 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) recvmmsg(r0, &(0x7f0000001d00)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}], 0x2, 0x0, 0x0) setsockopt$SO_TIMESTAMP(r0, 0x1, 0x23, &(0x7f0000000040)=0x9, 0x4) r1 = socket$inet6(0xa, 0x80003, 0x80) prctl$PR_TASK_PERF_EVENTS_ENABLE(0x20) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") 13:21:28 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000780)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000040)={'nr0\x01\x00', 0x1132}) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'nr0\x01\x00', 0x7132}) r2 = syz_open_procfs(0x0, &(0x7f00000001c0)='mounts\x00') r3 = socket$inet6(0xa, 0x400000000001, 0x0) bind$inet6(r3, &(0x7f0000fa0fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r3, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r4 = open(&(0x7f0000000200)='./file0\x00', 0x141042, 0x82) setsockopt$SO_TIMESTAMPING(r3, 0x1, 0x25, &(0x7f00000001c0)=0x4, 0x4) timerfd_gettime(r4, &(0x7f0000000040)) ftruncate(r4, 0x7e) sendfile(r3, r4, &(0x7f00000000c0), 0x8000fffffffe) ioctl$TIOCGPGRP(r4, 0x540f, &(0x7f0000000200)) sendfile(r2, r2, &(0x7f0000000180)=0x74000000, 0x5) ioctl$TIOCLINUX7(r2, 0x541c, &(0x7f00000000c0)={0x7, 0x81}) close(r1) r5 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r5, &(0x7f0000000180), 0x27a4eaa51029717, 0x0) ioctl$TIOCNOTTY(r2, 0x5422) setsockopt$netrom_NETROM_N2(r5, 0x103, 0x3, &(0x7f0000000080)=0x2, 0x4) r6 = syz_open_procfs(0x0, &(0x7f00000001c0)='mounts\x00') sendfile(r6, r6, &(0x7f0000000180)=0x74000000, 0x5) write$selinux_user(r6, &(0x7f0000000100)={'system_u:object_r:restorecond_exec_t:s0', 0x20, 'user_u\x00'}, 0x2f) 13:21:28 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x4004556e, &(0x7f0000000100)={0x0, 0x0, {0x0, 0x0, 0x0, {}, {0x700}, @rumble}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) [ 733.248744][T20865] FAULT_INJECTION: forcing a failure. [ 733.248744][T20865] name fail_page_alloc, interval 1, probability 0, space 0, times 0 13:21:28 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x40045564, &(0x7f0000000100)={0x0, 0x0, {0x0, 0x0, 0x0, {0x6}, {}, @rumble}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) [ 733.333856][T20865] CPU: 1 PID: 20865 Comm: syz-executor.4 Not tainted 5.4.0-syzkaller #0 [ 733.342523][T20865] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 733.353128][T20865] Call Trace: [ 733.356552][T20865] dump_stack+0x197/0x210 [ 733.361116][T20865] should_fail.cold+0xa/0x15 [ 733.365906][T20865] ? fault_create_debugfs_attr+0x180/0x180 [ 733.371798][T20865] ? ___might_sleep+0x163/0x2c0 [ 733.376704][T20865] should_fail_alloc_page+0x50/0x60 [ 733.382207][T20865] __alloc_pages_nodemask+0x1a1/0x910 [ 733.387719][T20865] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 733.393306][T20865] ? __alloc_pages_slowpath+0x2920/0x2920 [ 733.399940][T20865] ? kasan_unpoison_shadow+0x35/0x50 [ 733.405252][T20865] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 733.405271][T20865] alloc_pages_current+0x107/0x210 [ 733.405286][T20865] ? ___might_sleep+0x163/0x2c0 [ 733.405305][T20865] __vmalloc_node_range+0x4f8/0x810 [ 733.405327][T20865] ? bpf_map_area_alloc+0x20/0x30 [ 733.405341][T20865] __vmalloc_node_flags_caller+0x71/0x90 [ 733.405353][T20865] ? bpf_map_area_alloc+0x20/0x30 [ 733.405371][T20865] __bpf_map_area_alloc+0xde/0xf0 [ 733.416996][T20865] bpf_map_area_alloc+0x20/0x30 [ 733.417012][T20865] htab_map_alloc+0x8d3/0x11c0 [ 733.417042][T20865] ? htab_map_update_elem+0xca0/0xca0 [ 733.417057][T20865] __do_sys_bpf+0x478/0x37b0 [ 733.417075][T20865] ? bpf_prog_load+0x18a0/0x18a0 [ 733.417089][T20865] ? __kasan_check_write+0x14/0x20 13:21:28 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x4004556d, &(0x7f0000000100)={0x0, 0x0, {0x0, 0x0, 0x0, {0x3}, {}, @rumble}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) [ 733.417111][T20865] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 733.428498][T20865] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 733.428520][T20865] ? wait_for_completion+0x440/0x440 [ 733.428544][T20865] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 733.428571][T20865] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 733.439629][T20865] ? do_syscall_64+0x26/0x790 [ 733.439647][T20865] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 733.439662][T20865] ? do_syscall_64+0x26/0x790 [ 733.439684][T20865] __x64_sys_bpf+0x73/0xb0 [ 733.439706][T20865] do_syscall_64+0xfa/0x790 [ 733.449874][T20865] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 733.449888][T20865] RIP: 0033:0x45a679 [ 733.449905][T20865] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 733.449913][T20865] RSP: 002b:00007fd557596c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 733.449927][T20865] RAX: ffffffffffffffda RBX: 00007fd557596c90 RCX: 000000000045a679 13:21:28 executing program 4 (fault-call:0 fault-nth:33): bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x7880, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000, 0x0, 0x0, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x13]}, 0x3c) 13:21:28 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x40045564, &(0x7f0000000100)={0x0, 0x0, {0x0, 0x0, 0x0, {0x7}, {}, @rumble}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) [ 733.449941][T20865] RDX: 000000000000003c RSI: 0000000020000040 RDI: 405a020000000000 [ 733.460126][T20865] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 733.460135][T20865] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fd5575976d4 [ 733.460142][T20865] R13: 00000000004c0c65 R14: 00000000004d4750 R15: 0000000000000003 13:21:28 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x4004556e, &(0x7f0000000100)={0x0, 0x0, {0x0, 0x0, 0x0, {}, {0x4000}, @rumble}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) 13:21:28 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x40045564, &(0x7f0000000100)={0x0, 0x0, {0x0, 0x0, 0x0, {0x8}, {}, @rumble}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) 13:21:28 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x4004556d, &(0x7f0000000100)={0x0, 0x0, {0x0, 0x0, 0x0, {0x4}, {}, @rumble}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) [ 733.825036][T20882] FAULT_INJECTION: forcing a failure. [ 733.825036][T20882] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 733.851887][T20882] CPU: 0 PID: 20882 Comm: syz-executor.4 Not tainted 5.4.0-syzkaller #0 [ 733.861810][T20882] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 733.872561][T20882] Call Trace: [ 733.877124][T20882] dump_stack+0x197/0x210 [ 733.882154][T20882] should_fail.cold+0xa/0x15 [ 733.886934][T20882] ? fault_create_debugfs_attr+0x180/0x180 [ 733.893420][T20882] ? ___might_sleep+0x163/0x2c0 [ 733.899126][T20882] should_fail_alloc_page+0x50/0x60 [ 733.905035][T20882] __alloc_pages_nodemask+0x1a1/0x910 [ 733.910836][T20882] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 733.916745][T20882] ? __alloc_pages_slowpath+0x2920/0x2920 [ 733.922734][T20882] ? kasan_unpoison_shadow+0x35/0x50 [ 733.928573][T20882] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 733.934848][T20882] alloc_pages_current+0x107/0x210 [ 733.940243][T20882] ? ___might_sleep+0x163/0x2c0 [ 733.945277][T20882] __vmalloc_node_range+0x4f8/0x810 [ 733.950815][T20882] ? bpf_map_area_alloc+0x20/0x30 [ 733.956050][T20882] __vmalloc_node_flags_caller+0x71/0x90 [ 733.961715][T20882] ? bpf_map_area_alloc+0x20/0x30 [ 733.966783][T20882] __bpf_map_area_alloc+0xde/0xf0 [ 733.971930][T20882] bpf_map_area_alloc+0x20/0x30 [ 733.976897][T20882] htab_map_alloc+0x8d3/0x11c0 [ 733.981704][T20882] ? htab_map_update_elem+0xca0/0xca0 [ 733.987112][T20882] __do_sys_bpf+0x478/0x37b0 [ 733.992034][T20882] ? bpf_prog_load+0x18a0/0x18a0 [ 733.992051][T20882] ? __kasan_check_write+0x14/0x20 [ 733.992069][T20882] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 733.992091][T20882] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 734.002480][T20882] ? wait_for_completion+0x440/0x440 [ 734.002504][T20882] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 13:21:29 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x4004556e, &(0x7f0000000100)={0x0, 0x0, {0x0, 0x0, 0x0, {}, {0xff00}, @rumble}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) [ 734.002532][T20882] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 734.014173][T20882] ? do_syscall_64+0x26/0x790 [ 734.014193][T20882] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 734.014207][T20882] ? do_syscall_64+0x26/0x790 [ 734.014227][T20882] __x64_sys_bpf+0x73/0xb0 [ 734.014244][T20882] do_syscall_64+0xfa/0x790 [ 734.014262][T20882] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 734.014274][T20882] RIP: 0033:0x45a679 [ 734.014290][T20882] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 734.014299][T20882] RSP: 002b:00007fd557596c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 734.014312][T20882] RAX: ffffffffffffffda RBX: 00007fd557596c90 RCX: 000000000045a679 [ 734.014321][T20882] RDX: 000000000000003c RSI: 0000000020000040 RDI: 405a020000000000 [ 734.014329][T20882] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 13:21:29 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) recvmmsg(r0, &(0x7f0000001d00)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}], 0x2, 0x0, 0x0) setsockopt$SO_TIMESTAMP(r0, 0x1, 0x23, &(0x7f0000000040)=0x9, 0x4) r1 = socket$inet6(0xa, 0x80003, 0x80) ioctl(r1, 0x1000008912, &(0x7f0000000140)="08ff6ecefbd04cdd4f040000000000000071afc659") 13:21:29 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x4004556e, &(0x7f0000000100)={0x0, 0x0, {0x0, 0x0, 0x0, {}, {}, @rumble}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) [ 734.014336][T20882] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fd5575976d4 [ 734.014344][T20882] R13: 00000000004c0c65 R14: 00000000004d4750 R15: 0000000000000003 13:21:29 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x40045564, &(0x7f0000000100)={0x0, 0x0, {0x0, 0x0, 0x0, {0x300}, {}, @rumble}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) 13:21:29 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x4004556d, &(0x7f0000000100)={0x0, 0x0, {0x0, 0x0, 0x0, {0x5}, {}, @rumble}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) 13:21:29 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x4004556e, &(0x7f0000000100)={0x0, 0x0, {0x0, 0x0, 0x0, {}, {0x0, 0x2}, @rumble}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) 13:21:29 executing program 4 (fault-call:0 fault-nth:34): bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x7880, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000, 0x0, 0x0, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x13]}, 0x3c) 13:21:29 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000780)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000040)={'nr0\x01\x00', 0x1132}) r2 = socket$inet6(0xa, 0x400000000001, 0x0) bind$inet6(r2, &(0x7f0000fa0fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r2, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r3 = open(&(0x7f0000000200)='./file0\x00', 0x141042, 0x82) setsockopt$SO_TIMESTAMPING(r2, 0x1, 0x25, &(0x7f00000001c0)=0x4, 0x4) timerfd_gettime(r3, &(0x7f0000000040)) ftruncate(r3, 0x7e) sendfile(r2, r3, &(0x7f00000000c0), 0x8000fffffffe) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000080)={0xffffffffffffffff}}}, 0x20) write$RDMA_USER_CM_CMD_DISCONNECT(r3, &(0x7f0000000100)={0xa, 0x4, 0xfa00, {r4}}, 0xc) openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000280)='/dev/qat_adf_ctl\x00', 0x80000, 0x0) r5 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r5, &(0x7f0000000180), 0x27a4eaa51029717, 0x0) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r5, 0x84, 0x1e, &(0x7f0000000180), &(0x7f0000000240)=0x4) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'nr0\x01\x00', 0x7132}) close(r1) 13:21:29 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x4004556e, &(0x7f0000000100)={0x0, 0x0, {0x0, 0x0, 0x0, {}, {0x0, 0x3}, @rumble}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) [ 734.508051][T20915] FAULT_INJECTION: forcing a failure. [ 734.508051][T20915] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 734.554408][T20915] CPU: 0 PID: 20915 Comm: syz-executor.4 Not tainted 5.4.0-syzkaller #0 [ 734.562857][T20915] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 734.573017][T20915] Call Trace: [ 734.576373][T20915] dump_stack+0x197/0x210 [ 734.580742][T20915] should_fail.cold+0xa/0x15 [ 734.585458][T20915] ? fault_create_debugfs_attr+0x180/0x180 [ 734.591297][T20915] ? ___might_sleep+0x163/0x2c0 [ 734.596200][T20915] should_fail_alloc_page+0x50/0x60 [ 734.602194][T20915] __alloc_pages_nodemask+0x1a1/0x910 [ 734.607602][T20915] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 734.613172][T20915] ? __alloc_pages_slowpath+0x2920/0x2920 [ 734.613198][T20915] ? kasan_unpoison_shadow+0x35/0x50 [ 734.613218][T20915] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 734.613236][T20915] alloc_pages_current+0x107/0x210 [ 734.613256][T20915] ? ___might_sleep+0x163/0x2c0 [ 734.624523][T20915] __vmalloc_node_range+0x4f8/0x810 [ 734.624553][T20915] ? bpf_map_area_alloc+0x20/0x30 [ 734.624568][T20915] __vmalloc_node_flags_caller+0x71/0x90 [ 734.624583][T20915] ? bpf_map_area_alloc+0x20/0x30 [ 734.624600][T20915] __bpf_map_area_alloc+0xde/0xf0 [ 734.624615][T20915] bpf_map_area_alloc+0x20/0x30 [ 734.624630][T20915] htab_map_alloc+0x8d3/0x11c0 [ 734.624656][T20915] ? htab_map_update_elem+0xca0/0xca0 [ 734.624671][T20915] __do_sys_bpf+0x478/0x37b0 [ 734.624689][T20915] ? bpf_prog_load+0x18a0/0x18a0 [ 734.624702][T20915] ? __kasan_check_write+0x14/0x20 13:21:29 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x4004556d, &(0x7f0000000100)={0x0, 0x0, {0x0, 0x0, 0x0, {0x6}, {}, @rumble}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) 13:21:29 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x40045564, &(0x7f0000000100)={0x0, 0x0, {0x0, 0x0, 0x0, {0x500}, {}, @rumble}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) [ 734.624716][T20915] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 734.624737][T20915] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 734.636085][T20915] ? wait_for_completion+0x440/0x440 [ 734.636112][T20915] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 734.636143][T20915] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 734.636158][T20915] ? do_syscall_64+0x26/0x790 [ 734.636172][T20915] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 734.636186][T20915] ? do_syscall_64+0x26/0x790 [ 734.636205][T20915] __x64_sys_bpf+0x73/0xb0 [ 734.636221][T20915] do_syscall_64+0xfa/0x790 [ 734.636240][T20915] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 734.636252][T20915] RIP: 0033:0x45a679 [ 734.636267][T20915] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 734.636274][T20915] RSP: 002b:00007fd557596c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 734.636293][T20915] RAX: ffffffffffffffda RBX: 00007fd557596c90 RCX: 000000000045a679 [ 734.649187][T20915] RDX: 000000000000003c RSI: 0000000020000040 RDI: 405a020000000000 [ 734.649196][T20915] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 734.649206][T20915] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fd5575976d4 [ 734.649215][T20915] R13: 00000000004c0c65 R14: 00000000004d4750 R15: 0000000000000003 13:21:30 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x4004556e, &(0x7f0000000100)={0x0, 0x0, {0x0, 0x0, 0x0, {}, {0x0, 0x4}, @rumble}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) 13:21:30 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x4004556d, &(0x7f0000000100)={0x0, 0x0, {0x0, 0x0, 0x0, {0x7}, {}, @rumble}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) 13:21:30 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$SO_TIMESTAMP(r0, 0x1, 0x23, &(0x7f0000000040)=0x9, 0x4) r1 = socket$inet6(0xa, 0x80003, 0x80) r2 = getuid() r3 = socket$inet(0xa, 0x801, 0x84) connect$inet(r3, &(0x7f0000004cc0)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r3, 0x84, 0x9, &(0x7f00000000c0)={0x0, @in={{0x2, 0x0, @rand_addr=0xac14ffbb}}}, &(0x7f0000000180)=0x98) fstat(r3, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = socket$inet(0xa, 0x801, 0x84) connect$inet(r5, &(0x7f0000004cc0)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r5, 0x84, 0x9, &(0x7f00000000c0)={0x0, @in={{0x2, 0x0, @rand_addr=0xac14ffbb}}}, &(0x7f0000000180)=0x98) fstat(r5, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$UI_SET_ABSBIT(0xffffffffffffffff, 0x40045567, 0x4) setgroups(0x2, &(0x7f0000000100)=[r6, 0x0]) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000140)={0x0, 0x0, 0x0}, &(0x7f0000000180)=0xc) setxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='system.posix_acl_default\x00', &(0x7f0000000200)={{}, {0x1, 0x3}, [{0x2, 0x3, r2}, {0x2, 0x1, 0xee01}], {0x4, 0x2}, [{0x8, 0x1, r4}, {0x8, 0x4, r6}, {0x8, 0x1, r7}], {0x10, 0x6}, {0x20, 0x6}}, 0x4c, 0x2) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") 13:21:30 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x40045564, &(0x7f0000000100)={0x0, 0x0, {0x0, 0x0, 0x0, {0x600}, {}, @rumble}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) 13:21:30 executing program 4 (fault-call:0 fault-nth:35): bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x7880, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000, 0x0, 0x0, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x13]}, 0x3c) 13:21:30 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x4004556e, &(0x7f0000000100)={0x0, 0x0, {0x0, 0x0, 0x0, {}, {0x0, 0x5}, @rumble}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) 13:21:30 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x4004556d, &(0x7f0000000100)={0x0, 0x0, {0x0, 0x0, 0x0, {0x8}, {}, @rumble}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) [ 735.174356][T20945] FAULT_INJECTION: forcing a failure. [ 735.174356][T20945] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 735.229996][T20945] CPU: 0 PID: 20945 Comm: syz-executor.4 Not tainted 5.4.0-syzkaller #0 [ 735.238838][T20945] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 735.238844][T20945] Call Trace: [ 735.238871][T20945] dump_stack+0x197/0x210 [ 735.238895][T20945] should_fail.cold+0xa/0x15 [ 735.238917][T20945] ? fault_create_debugfs_attr+0x180/0x180 [ 735.261230][T20945] ? ___might_sleep+0x163/0x2c0 [ 735.274973][T20945] should_fail_alloc_page+0x50/0x60 [ 735.280203][T20945] __alloc_pages_nodemask+0x1a1/0x910 [ 735.287434][T20945] ? __alloc_pages_slowpath+0x2920/0x2920 [ 735.293192][T20945] ? retint_kernel+0x2b/0x2b [ 735.297831][T20945] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 735.304414][T20945] alloc_pages_current+0x107/0x210 [ 735.309767][T20945] ? ___might_sleep+0x163/0x2c0 [ 735.314649][T20945] __vmalloc_node_range+0x4f8/0x810 [ 735.314676][T20945] ? bpf_map_area_alloc+0x20/0x30 [ 735.314690][T20945] __vmalloc_node_flags_caller+0x71/0x90 [ 735.314704][T20945] ? bpf_map_area_alloc+0x20/0x30 [ 735.314718][T20945] __bpf_map_area_alloc+0xde/0xf0 [ 735.314733][T20945] bpf_map_area_alloc+0x20/0x30 [ 735.314748][T20945] htab_map_alloc+0x8d3/0x11c0 [ 735.314780][T20945] ? htab_map_update_elem+0xca0/0xca0 [ 735.330624][T20945] __do_sys_bpf+0x478/0x37b0 [ 735.330648][T20945] ? bpf_prog_load+0x18a0/0x18a0 [ 735.365262][T20945] ? __kasan_check_write+0x14/0x20 [ 735.370397][T20945] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 735.375986][T20945] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 735.381290][T20945] ? wait_for_completion+0x440/0x440 [ 735.381321][T20945] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 735.392847][T20945] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 735.398321][T20945] ? do_syscall_64+0x26/0x790 [ 735.398340][T20945] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 735.398358][T20945] ? do_syscall_64+0x26/0x790 [ 735.414086][T20945] __x64_sys_bpf+0x73/0xb0 [ 735.418558][T20945] do_syscall_64+0xfa/0x790 [ 735.423093][T20945] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 735.428998][T20945] RIP: 0033:0x45a679 [ 735.429015][T20945] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 735.429023][T20945] RSP: 002b:00007fd557596c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 735.429035][T20945] RAX: ffffffffffffffda RBX: 00007fd557596c90 RCX: 000000000045a679 [ 735.429050][T20945] RDX: 000000000000003c RSI: 0000000020000040 RDI: 405a020000000000 13:21:30 executing program 4 (fault-call:0 fault-nth:36): bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x7880, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000, 0x0, 0x0, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x13]}, 0x3c) [ 735.452540][T20945] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 735.452549][T20945] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fd5575976d4 [ 735.452557][T20945] R13: 00000000004c0c65 R14: 00000000004d4750 R15: 0000000000000003 [ 735.645486][T20959] FAULT_INJECTION: forcing a failure. [ 735.645486][T20959] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 735.722437][T20959] CPU: 1 PID: 20959 Comm: syz-executor.4 Not tainted 5.4.0-syzkaller #0 [ 735.730816][T20959] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 735.730825][T20959] Call Trace: [ 735.730849][T20959] dump_stack+0x197/0x210 [ 735.730890][T20959] should_fail.cold+0xa/0x15 [ 735.753342][T20959] ? fault_create_debugfs_attr+0x180/0x180 [ 735.759191][T20959] ? ___might_sleep+0x163/0x2c0 [ 735.764063][T20959] should_fail_alloc_page+0x50/0x60 [ 735.764087][T20959] __alloc_pages_nodemask+0x1a1/0x910 [ 735.774671][T20959] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 735.774693][T20959] ? __alloc_pages_slowpath+0x2920/0x2920 [ 735.774714][T20959] ? kasan_unpoison_shadow+0x35/0x50 [ 735.774732][T20959] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 735.774749][T20959] alloc_pages_current+0x107/0x210 [ 735.774767][T20959] ? ___might_sleep+0x163/0x2c0 [ 735.807842][T20959] __vmalloc_node_range+0x4f8/0x810 [ 735.813949][T20959] ? bpf_map_area_alloc+0x20/0x30 [ 735.818982][T20959] __vmalloc_node_flags_caller+0x71/0x90 [ 735.824622][T20959] ? bpf_map_area_alloc+0x20/0x30 [ 735.829685][T20959] __bpf_map_area_alloc+0xde/0xf0 [ 735.834891][T20959] bpf_map_area_alloc+0x20/0x30 [ 735.839744][T20959] htab_map_alloc+0x8d3/0x11c0 [ 735.844508][T20959] ? htab_map_update_elem+0xca0/0xca0 [ 735.849881][T20959] __do_sys_bpf+0x478/0x37b0 [ 735.854488][T20959] ? bpf_prog_load+0x18a0/0x18a0 [ 735.859419][T20959] ? __kasan_check_write+0x14/0x20 [ 735.864519][T20959] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 735.870603][T20959] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 735.875907][T20959] ? wait_for_completion+0x440/0x440 [ 735.881209][T20959] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 735.887450][T20959] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 735.892915][T20959] ? do_syscall_64+0x26/0x790 [ 735.897584][T20959] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 735.903814][T20959] ? do_syscall_64+0x26/0x790 [ 735.908514][T20959] __x64_sys_bpf+0x73/0xb0 [ 735.913205][T20959] do_syscall_64+0xfa/0x790 [ 735.918921][T20959] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 735.924821][T20959] RIP: 0033:0x45a679 [ 735.928833][T20959] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 735.948834][T20959] RSP: 002b:00007fd557596c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 735.957265][T20959] RAX: ffffffffffffffda RBX: 00007fd557596c90 RCX: 000000000045a679 [ 735.965689][T20959] RDX: 000000000000003c RSI: 0000000020000040 RDI: 405a020000000000 [ 735.973749][T20959] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 735.982024][T20959] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fd5575976d4 [ 735.990487][T20959] R13: 00000000004c0c65 R14: 00000000004d4750 R15: 0000000000000003 13:21:31 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x4004556d, &(0x7f0000000100)={0x0, 0x0, {0x0, 0x0, 0x0, {0x300}, {}, @rumble}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) 13:21:31 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x4004556e, &(0x7f0000000100)={0x0, 0x0, {0x0, 0x0, 0x0, {}, {0x0, 0x6}, @rumble}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) 13:21:31 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x40045564, &(0x7f0000000100)={0x0, 0x0, {0x0, 0x0, 0x0, {0x700}, {}, @rumble}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) 13:21:31 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) r1 = socket$inet6(0xa, 0x400000000001, 0x0) bind$inet6(r1, &(0x7f0000fa0fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r1, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r2 = open(&(0x7f0000000200)='./file0\x00', 0x141042, 0x82) r3 = socket$inet6_sctp(0xa, 0x4000000000000001, 0x84) bind$inet6(r3, &(0x7f00004b8fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) sendto$inet6(r3, &(0x7f0000847fff)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$SO_ATTACH_FILTER(r3, 0x1, 0x1a, &(0x7f0000159000)={0x1, &(0x7f0000a7dff8)=[{0x6, 0x0, 0x0, 0x6}]}, 0x10) write$binfmt_script(r3, &(0x7f0000000240)={'#! ', './file0'}, 0xb) r4 = socket$inet6_sctp(0xa, 0x4000000000000001, 0x84) dup3(r4, r3, 0x0) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f00000001c0)=0x4, 0x4) timerfd_gettime(r2, &(0x7f0000000040)) ftruncate(r2, 0x7e) sendfile(r1, r2, &(0x7f00000000c0), 0x8000fffffffe) ioctl$LOOP_SET_CAPACITY(r2, 0x4c07) keyctl$assume_authority(0x10, 0x0) recvmmsg(r0, &(0x7f0000001d00)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}], 0x2, 0x0, 0x0) setsockopt$SO_TIMESTAMP(r0, 0x1, 0x23, &(0x7f0000000040)=0x9, 0x4) r5 = socket$inet6(0xa, 0x80003, 0x80) ioctl(r5, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") setsockopt$EBT_SO_SET_ENTRIES(r5, 0x0, 0x80, &(0x7f0000000080)=@broute={'broute\x00', 0x20, 0x3, 0x3e2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000200], 0x0, &(0x7f0000000000), &(0x7f0000000200)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffc, 0x1, [{0x9, 0x44, 0x201, 'veth1_to_bond\x00', 'veth0_to_hsr\x00', 'bridge0\x00', 'nr0\x00', @empty, [0x0, 0x1fe], @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x1}, [0xff, 0xb3988f36bb4b68ae, 0xff, 0x858b771616656942], 0x6e, 0x19e, 0x1d6, [], [@common=@SECMARK={'SECMARK\x00', 0x108, {{0x1, 0x0, 'system_u:object_r:memory_device_t:s0\x00'}}}], @common=@mark={'mark\x00', 0x10, {{0x100000070, 0xfffffffffffffffd}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff, 0x2, [{0x9, 0x2, 0x8809, 'veth1_to_bridge\x00', 'ip6tnl0\x00', 'syz_tun\x00', 'ip6tnl0\x00', @broadcast, [0xff, 0x0, 0xff, 0x5e1a8b6d16f6b481, 0x0, 0x7f], @random="e27da02699a6", [0xff, 0xff, 0x0, 0x0, 0xff], 0xa6, 0xa6, 0xd6, [@mac={'mac\x00', 0x10, {{@random="050e90509ed8", 0x1}}}], [], @common=@CLASSIFY={'CLASSIFY\x00', 0x8, {{0x6}}}}, {0x9, 0x1, 0xe31d, 'ip6gretap0\x00', 'nr0\x00', 'nr0\x00', 'veth0_to_bond\x00', @random="aab8a781e5f7", [0x0, 0x0, 0x0, 0xd1d52d2697779c84, 0x181], @broadcast, [0x0, 0x0, 0x7f, 0xe133b61d6c4ce4c5, 0x0, 0xff], 0x6e, 0x6e, 0xa6, [], [], @common=@mark={'mark\x00', 0x10, {{0xffffffe0, 0xfffffffffffffffc}}}}]}]}, 0x45a) 13:21:31 executing program 0: acct(0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000780)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000040)={'nr0\x01\x00', 0x1132}) r2 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/avc/cache_stats\x00', 0x0, 0x0) ioctl$SOUND_MIXER_WRITE_RECSRC(r2, 0xc0044dff, &(0x7f00000000c0)=0x4) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'nr0\x01\x00', 0x7132}) 13:21:31 executing program 4 (fault-call:0 fault-nth:37): bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x7880, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000, 0x0, 0x0, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x13]}, 0x3c) [ 736.138883][T20974] FAULT_INJECTION: forcing a failure. [ 736.138883][T20974] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 736.192511][T20974] CPU: 0 PID: 20974 Comm: syz-executor.4 Not tainted 5.4.0-syzkaller #0 [ 736.200909][T20974] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 736.200916][T20974] Call Trace: [ 736.200938][T20974] dump_stack+0x197/0x210 [ 736.200962][T20974] should_fail.cold+0xa/0x15 [ 736.223485][T20974] ? fault_create_debugfs_attr+0x180/0x180 [ 736.229311][T20974] ? ___might_sleep+0x163/0x2c0 [ 736.229337][T20974] should_fail_alloc_page+0x50/0x60 [ 736.229352][T20974] __alloc_pages_nodemask+0x1a1/0x910 [ 736.229372][T20974] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 736.244867][T20974] ? __alloc_pages_slowpath+0x2920/0x2920 [ 736.244888][T20974] ? kasan_unpoison_shadow+0x35/0x50 [ 736.244906][T20974] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 736.244923][T20974] alloc_pages_current+0x107/0x210 [ 736.244942][T20974] ? ___might_sleep+0x163/0x2c0 [ 736.256456][T20974] __vmalloc_node_range+0x4f8/0x810 [ 736.268363][T20974] ? bpf_map_area_alloc+0x20/0x30 13:21:31 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x4004556e, &(0x7f0000000100)={0x0, 0x0, {0x0, 0x0, 0x0, {}, {0x0, 0x7}, @rumble}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) 13:21:31 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x4004556d, &(0x7f0000000100)={0x0, 0x0, {0x0, 0x0, 0x0, {0x500}, {}, @rumble}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) [ 736.268381][T20974] __vmalloc_node_flags_caller+0x71/0x90 [ 736.268393][T20974] ? bpf_map_area_alloc+0x20/0x30 [ 736.268409][T20974] __bpf_map_area_alloc+0xde/0xf0 [ 736.268430][T20974] bpf_map_area_alloc+0x20/0x30 [ 736.289253][T20974] htab_map_alloc+0x8d3/0x11c0 [ 736.289280][T20974] ? htab_map_update_elem+0xca0/0xca0 [ 736.289296][T20974] __do_sys_bpf+0x478/0x37b0 [ 736.289314][T20974] ? bpf_prog_load+0x18a0/0x18a0 [ 736.289329][T20974] ? __kasan_check_write+0x14/0x20 [ 736.289345][T20974] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 736.289369][T20974] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 736.305069][T20974] ? wait_for_completion+0x440/0x440 [ 736.305094][T20974] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 736.305123][T20974] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 736.305137][T20974] ? do_syscall_64+0x26/0x790 [ 736.305151][T20974] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 736.305170][T20974] ? do_syscall_64+0x26/0x790 [ 736.305189][T20974] __x64_sys_bpf+0x73/0xb0 [ 736.305205][T20974] do_syscall_64+0xfa/0x790 [ 736.305224][T20974] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 736.305244][T20974] RIP: 0033:0x45a679 [ 736.305258][T20974] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 736.305265][T20974] RSP: 002b:00007fd557596c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 736.425262][T20974] RAX: ffffffffffffffda RBX: 00007fd557596c90 RCX: 000000000045a679 [ 736.433238][T20974] RDX: 000000000000003c RSI: 0000000020000040 RDI: 405a020000000000 [ 736.441297][T20974] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 736.449515][T20974] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fd5575976d4 [ 736.457643][T20974] R13: 00000000004c0c65 R14: 00000000004d4750 R15: 0000000000000003 13:21:31 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x4004556d, &(0x7f0000000100)={0x0, 0x0, {0x0, 0x0, 0x0, {0x600}, {}, @rumble}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) [ 736.524350][ C1] net_ratelimit: 9 callbacks suppressed [ 736.524360][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 736.535878][ C1] protocol 88fb is buggy, dev hsr_slave_1 13:21:31 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x40045564, &(0x7f0000000100)={0x0, 0x0, {0x0, 0x0, 0x0, {0x3f00}, {}, @rumble}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) 13:21:31 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x4004556e, &(0x7f0000000100)={0x0, 0x0, {0x0, 0x0, 0x0, {}, {0x0, 0x8}, @rumble}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) 13:21:31 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x4004556d, &(0x7f0000000100)={0x0, 0x0, {0x0, 0x0, 0x0, {0x700}, {}, @rumble}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) 13:21:31 executing program 4 (fault-call:0 fault-nth:38): bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x7880, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000, 0x0, 0x0, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x13]}, 0x3c) 13:21:32 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x40045564, &(0x7f0000000100)={0x0, 0x0, {0x0, 0x0, 0x0, {0x4000}, {}, @rumble}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) 13:21:32 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x4004556e, &(0x7f0000000100)={0x0, 0x0, {0x0, 0x0, 0x0, {}, {0x0, 0x300}, @rumble}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) [ 736.897439][T20997] FAULT_INJECTION: forcing a failure. [ 736.897439][T20997] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 736.962283][T20997] CPU: 1 PID: 20997 Comm: syz-executor.4 Not tainted 5.4.0-syzkaller #0 [ 736.970660][T20997] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 736.970667][T20997] Call Trace: [ 736.970693][T20997] dump_stack+0x197/0x210 [ 736.970717][T20997] should_fail.cold+0xa/0x15 [ 736.970737][T20997] ? fault_create_debugfs_attr+0x180/0x180 [ 736.970757][T20997] ? ___might_sleep+0x163/0x2c0 [ 737.004221][T20997] should_fail_alloc_page+0x50/0x60 [ 737.004239][T20997] __alloc_pages_nodemask+0x1a1/0x910 [ 737.004255][T20997] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 737.004272][T20997] ? __alloc_pages_slowpath+0x2920/0x2920 [ 737.004294][T20997] ? kasan_unpoison_shadow+0x35/0x50 [ 737.004310][T20997] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 737.004329][T20997] alloc_pages_current+0x107/0x210 [ 737.014899][T20997] ? ___might_sleep+0x163/0x2c0 [ 737.014919][T20997] __vmalloc_node_range+0x4f8/0x810 [ 737.014945][T20997] ? bpf_map_area_alloc+0x20/0x30 [ 737.014960][T20997] __vmalloc_node_flags_caller+0x71/0x90 [ 737.014973][T20997] ? bpf_map_area_alloc+0x20/0x30 [ 737.014994][T20997] __bpf_map_area_alloc+0xde/0xf0 [ 737.026437][T20997] bpf_map_area_alloc+0x20/0x30 [ 737.026454][T20997] htab_map_alloc+0x8d3/0x11c0 [ 737.026486][T20997] ? htab_map_update_elem+0xca0/0xca0 [ 737.026501][T20997] __do_sys_bpf+0x478/0x37b0 [ 737.026524][T20997] ? bpf_prog_load+0x18a0/0x18a0 [ 737.038037][T20997] ? __kasan_check_write+0x14/0x20 [ 737.038054][T20997] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 737.038071][T20997] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 737.038087][T20997] ? wait_for_completion+0x440/0x440 [ 737.038109][T20997] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 737.038136][T20997] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 737.048085][T20997] ? do_syscall_64+0x26/0x790 [ 737.048102][T20997] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 737.048116][T20997] ? do_syscall_64+0x26/0x790 [ 737.048139][T20997] __x64_sys_bpf+0x73/0xb0 [ 737.048154][T20997] do_syscall_64+0xfa/0x790 [ 737.048174][T20997] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 737.083670][T20997] RIP: 0033:0x45a679 [ 737.093660][T20997] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 737.093669][T20997] RSP: 002b:00007fd557596c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 737.093685][T20997] RAX: ffffffffffffffda RBX: 00007fd557596c90 RCX: 000000000045a679 [ 737.093693][T20997] RDX: 000000000000003c RSI: 0000000020000040 RDI: 405a020000000000 13:21:32 executing program 5: recvmmsg(0xffffffffffffffff, &(0x7f0000001d00)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}], 0x2, 0x0, 0x0) setsockopt$SO_TIMESTAMP(0xffffffffffffffff, 0x1, 0x23, &(0x7f0000000040)=0x9, 0x4) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") [ 737.093707][T20997] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 737.142624][T20997] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fd5575976d4 [ 737.151709][T20997] R13: 00000000004c0c65 R14: 00000000004d4750 R15: 0000000000000003 13:21:32 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000780)='/dev/net/tun\x00', 0x0, 0x0) r2 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r2, &(0x7f0000000180), 0x27a4eaa51029717, 0x0) r3 = accept$inet6(r2, 0x0, &(0x7f0000000080)) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r3, 0x84, 0x6b, &(0x7f00000000c0)=[@in6={0xa, 0x4e22, 0xc5e4, @ipv4={[], [], @broadcast}, 0xcf0}, @in={0x2, 0x4e22, @remote}, @in6={0xa, 0x4e22, 0x80000000, @local, 0x2}], 0x48) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000040)={'nr0\x01\x00', 0x1132}) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'nr0\x01\x00', 0x7132}) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000300)={0x0, {0x2, 0x4e24, @multicast2}, {0x2, 0x4e24, @multicast1}, {0x2, 0x4e22, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x6, 0x0, 0x0, 0x0, 0x2, &(0x7f00000002c0)='gre0\x00', 0xebe, 0x4, 0x2}) r4 = syz_open_dev$mouse(&(0x7f0000000180)='/dev/input/mouse#\x00', 0x3, 0x44000) ioctl$LOOP_GET_STATUS64(r4, 0x4c05, &(0x7f00000001c0)) close(r1) 13:21:32 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x4004556d, &(0x7f0000000100)={0x0, 0x0, {0x0, 0x0, 0x0, {0x3f00}, {}, @rumble}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) 13:21:32 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x4004556e, &(0x7f0000000100)={0x0, 0x0, {0x0, 0x0, 0x0, {}, {0x0, 0x500}, @rumble}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) 13:21:32 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x40045564, &(0x7f0000000100)={0x0, 0x0, {0x0, 0x0, 0x0, {0xff00}, {}, @rumble}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) 13:21:32 executing program 4 (fault-call:0 fault-nth:39): bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x7880, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000, 0x0, 0x0, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x13]}, 0x3c) 13:21:32 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x4004556d, &(0x7f0000000100)={0x0, 0x0, {0x0, 0x0, 0x0, {0x4000}, {}, @rumble}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) 13:21:32 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) recvmmsg(r0, &(0x7f0000001d00)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}], 0x2, 0x0, 0x0) syz_init_net_socket$ax25(0x3, 0x1, 0xf0) r1 = socket$inet(0xa, 0x801, 0x84) connect$inet(r1, &(0x7f0000004cc0)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r1, 0x84, 0x9, &(0x7f00000000c0)={0x0, @in={{0x2, 0x0, @rand_addr=0xac14ffbb}}}, &(0x7f0000000180)=0x98) r2 = socket$bt_rfcomm(0x1f, 0x3, 0x3) r3 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r3, &(0x7f0000000180), 0x27a4eaa51029717, 0x0) getsockname$ax25(r3, &(0x7f0000000200)={{0x3, @bcast}, [@default, @default, @rose, @bcast, @null, @default, @netrom, @default]}, &(0x7f0000000040)=0x48) setsockopt$SO_TIMESTAMP(r2, 0x1, 0x23, &(0x7f0000000180)=0x10000, 0x4) r4 = socket$inet6(0xa, 0x80003, 0x80) r5 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcsa\x00', 0x400000, 0x0) write$sndseq(r5, &(0x7f0000000080)=[{0x40, 0x8, 0x63, 0x0, @time, {0x7, 0xfe}, {0x0, 0x20}, @raw32={[0x2, 0x7fffffff, 0x8000]}}, {0x3f, 0xf7, 0x4, 0x9, @tick=0x6, {0x9, 0x4}, {0x0, 0xff}, @addr={0x3, 0x7f}}, {0x81, 0x2, 0x6, 0x8, @time, {0x20, 0x44}, {0x5, 0x4}, @raw32={[0x40, 0x80, 0x80000001]}}], 0x90) ioctl(r4, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") ioctl$TIOCMGET(r5, 0x5415, &(0x7f0000000140)) 13:21:32 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x4004556e, &(0x7f0000000100)={0x0, 0x0, {0x0, 0x0, 0x0, {}, {0x0, 0x600}, @rumble}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) [ 737.645970][T21030] FAULT_INJECTION: forcing a failure. [ 737.645970][T21030] name fail_page_alloc, interval 1, probability 0, space 0, times 0 13:21:32 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x40045564, &(0x7f0000000100)={0x0, 0x0, {0x0, 0x0, 0x0, {}, {}, @rumble}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) [ 737.692498][T21030] CPU: 1 PID: 21030 Comm: syz-executor.4 Not tainted 5.4.0-syzkaller #0 [ 737.700894][T21030] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 737.710959][T21030] Call Trace: [ 737.710985][T21030] dump_stack+0x197/0x210 [ 737.711009][T21030] should_fail.cold+0xa/0x15 [ 737.711033][T21030] ? fault_create_debugfs_attr+0x180/0x180 [ 737.711048][T21030] ? ___might_sleep+0x163/0x2c0 [ 737.711075][T21030] should_fail_alloc_page+0x50/0x60 [ 737.739113][T21030] __alloc_pages_nodemask+0x1a1/0x910 [ 737.739133][T21030] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 737.739150][T21030] ? __alloc_pages_slowpath+0x2920/0x2920 [ 737.739172][T21030] ? kasan_unpoison_shadow+0x35/0x50 [ 737.761115][T21030] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 737.761137][T21030] alloc_pages_current+0x107/0x210 [ 737.761151][T21030] ? ___might_sleep+0x163/0x2c0 [ 737.761169][T21030] __vmalloc_node_range+0x4f8/0x810 [ 737.761192][T21030] ? bpf_map_area_alloc+0x20/0x30 [ 737.772548][T21030] __vmalloc_node_flags_caller+0x71/0x90 [ 737.787599][T21030] ? bpf_map_area_alloc+0x20/0x30 [ 737.787618][T21030] __bpf_map_area_alloc+0xde/0xf0 [ 737.787636][T21030] bpf_map_area_alloc+0x20/0x30 [ 737.787657][T21030] htab_map_alloc+0x8d3/0x11c0 [ 737.798307][T21030] ? htab_map_update_elem+0xca0/0xca0 [ 737.798325][T21030] __do_sys_bpf+0x478/0x37b0 [ 737.798344][T21030] ? bpf_prog_load+0x18a0/0x18a0 [ 737.808250][T21030] ? __kasan_check_write+0x14/0x20 [ 737.808267][T21030] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 737.808282][T21030] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 737.808300][T21030] ? wait_for_completion+0x440/0x440 [ 737.808323][T21030] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 737.808350][T21030] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 737.818460][T21030] ? do_syscall_64+0x26/0x790 [ 737.818478][T21030] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 737.818492][T21030] ? do_syscall_64+0x26/0x790 [ 737.818516][T21030] __x64_sys_bpf+0x73/0xb0 [ 737.818532][T21030] do_syscall_64+0xfa/0x790 [ 737.818553][T21030] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 737.828030][T21030] RIP: 0033:0x45a679 [ 737.828047][T21030] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 737.828054][T21030] RSP: 002b:00007fd557596c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 737.828069][T21030] RAX: ffffffffffffffda RBX: 00007fd557596c90 RCX: 000000000045a679 [ 737.828079][T21030] RDX: 000000000000003c RSI: 0000000020000040 RDI: 405a020000000000 13:21:33 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x4004556d, &(0x7f0000000100)={0x0, 0x0, {0x0, 0x0, 0x0, {0xff00}, {}, @rumble}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) [ 737.828087][T21030] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 737.828095][T21030] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fd5575976d4 [ 737.828108][T21030] R13: 00000000004c0c65 R14: 00000000004d4750 R15: 0000000000000003 13:21:33 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x40045564, &(0x7f0000000100)={0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x2}, {}, @rumble}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) 13:21:33 executing program 4 (fault-call:0 fault-nth:40): bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x7880, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000, 0x0, 0x0, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x13]}, 0x3c) [ 738.044288][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 738.050166][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 738.054320][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 738.061861][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 738.124275][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 738.130249][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 738.285421][T21048] FAULT_INJECTION: forcing a failure. [ 738.285421][T21048] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 738.307541][T21048] CPU: 0 PID: 21048 Comm: syz-executor.4 Not tainted 5.4.0-syzkaller #0 [ 738.315959][T21048] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 738.326018][T21048] Call Trace: [ 738.329371][T21048] dump_stack+0x197/0x210 [ 738.333736][T21048] should_fail.cold+0xa/0x15 [ 738.338373][T21048] ? fault_create_debugfs_attr+0x180/0x180 [ 738.344205][T21048] ? ___might_sleep+0x163/0x2c0 [ 738.349079][T21048] should_fail_alloc_page+0x50/0x60 [ 738.354305][T21048] __alloc_pages_nodemask+0x1a1/0x910 [ 738.359697][T21048] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 738.365288][T21048] ? __alloc_pages_slowpath+0x2920/0x2920 [ 738.371037][T21048] ? kasan_unpoison_shadow+0x35/0x50 [ 738.376348][T21048] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 738.382620][T21048] alloc_pages_current+0x107/0x210 [ 738.387786][T21048] ? ___might_sleep+0x163/0x2c0 [ 738.392653][T21048] __vmalloc_node_range+0x4f8/0x810 [ 738.397868][T21048] ? bpf_map_area_alloc+0x20/0x30 [ 738.403024][T21048] __vmalloc_node_flags_caller+0x71/0x90 [ 738.408748][T21048] ? bpf_map_area_alloc+0x20/0x30 [ 738.413762][T21048] __bpf_map_area_alloc+0xde/0xf0 [ 738.419099][T21048] bpf_map_area_alloc+0x20/0x30 [ 738.424122][T21048] htab_map_alloc+0x8d3/0x11c0 [ 738.428925][T21048] ? htab_map_update_elem+0xca0/0xca0 [ 738.434313][T21048] __do_sys_bpf+0x478/0x37b0 [ 738.439037][T21048] ? bpf_prog_load+0x18a0/0x18a0 [ 738.444241][T21048] ? __kasan_check_write+0x14/0x20 [ 738.449491][T21048] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 738.455155][T21048] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 738.460478][T21048] ? wait_for_completion+0x440/0x440 [ 738.465908][T21048] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 738.472811][T21048] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 738.478385][T21048] ? do_syscall_64+0x26/0x790 [ 738.483443][T21048] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 738.489606][T21048] ? do_syscall_64+0x26/0x790 [ 738.494315][T21048] __x64_sys_bpf+0x73/0xb0 [ 738.498933][T21048] do_syscall_64+0xfa/0x790 [ 738.503471][T21048] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 738.509367][T21048] RIP: 0033:0x45a679 [ 738.513251][T21048] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 738.532872][T21048] RSP: 002b:00007fd557596c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 738.541370][T21048] RAX: ffffffffffffffda RBX: 00007fd557596c90 RCX: 000000000045a679 [ 738.549343][T21048] RDX: 000000000000003c RSI: 0000000020000040 RDI: 405a020000000000 [ 738.557323][T21048] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 738.565336][T21048] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fd5575976d4 [ 738.573311][T21048] R13: 00000000004c0c65 R14: 00000000004d4750 R15: 0000000000000003 13:21:33 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000780)='/dev/net/tun\x00', 0x0, 0x0) r2 = socket$inet(0xa, 0x801, 0x84) connect$inet(r2, &(0x7f0000004cc0)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r2, 0x84, 0x9, &(0x7f00000000c0)={0x0, @in={{0x2, 0x0, @rand_addr=0xac14ffbb}}}, &(0x7f0000000180)=0x98) setsockopt$inet_msfilter(r2, 0x0, 0x29, &(0x7f0000000100)={@rand_addr=0x6, @dev={0xac, 0x14, 0x14, 0x1d}, 0x0, 0x8, [@multicast2, @rand_addr=0xfffffffa, @broadcast, @empty, @loopback, @rand_addr=0x8, @dev={0xac, 0x14, 0x14, 0x22}, @remote]}, 0x30) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000040)={'nr0\x01\x00', 0x1132}) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'nr0\x01\x00', 0x7132}) r3 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/sys/net/ipv4/vs/ignore_tunneled\x00', 0x2, 0x0) setsockopt$SO_TIMESTAMPING(r3, 0x1, 0x41, &(0x7f00000000c0)=0x84c, 0x4) close(r1) 13:21:33 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x4004556d, &(0x7f0000000100)={0x0, 0x0, {0x0, 0x0, 0x0, {}, {}, @rumble}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) 13:21:33 executing program 5: r0 = socket$inet6(0xa, 0x400000000001, 0x0) bind$inet6(r0, &(0x7f0000fa0fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r1 = open(&(0x7f0000000200)='./file0\x00', 0x141042, 0x82) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f00000001c0)=0x4, 0x4) timerfd_gettime(r1, &(0x7f0000000040)) ftruncate(r1, 0x7e) sendfile(r0, r1, &(0x7f00000000c0), 0x8000fffffffe) ioctl$VIDIOC_QUERYCAP(r1, 0x80685600, &(0x7f00000000c0)) r2 = socket$packet(0x11, 0x3, 0x300) recvmmsg(r2, &(0x7f0000001d00)=[{{0x0, 0x0, 0x0}, 0x9f}, {{0x0, 0x0, 0x0}}], 0x2, 0x0, 0x0) getsockopt$IP_VS_SO_GET_DAEMON(0xffffffffffffffff, 0x0, 0x487, &(0x7f0000000000), &(0x7f0000000080)=0x30) setsockopt$SO_TIMESTAMP(r2, 0x1, 0x23, &(0x7f0000000040)=0x9, 0x4) r3 = socket$inet6(0xa, 0x80003, 0x80) ioctl(r3, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") 13:21:33 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x4004556e, &(0x7f0000000100)={0x0, 0x0, {0x0, 0x0, 0x0, {}, {0x0, 0x700}, @rumble}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) 13:21:33 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x40045564, &(0x7f0000000100)={0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x3}, {}, @rumble}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) 13:21:33 executing program 4 (fault-call:0 fault-nth:41): bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x7880, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000, 0x0, 0x0, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x13]}, 0x3c) [ 738.720926][T21060] FAULT_INJECTION: forcing a failure. [ 738.720926][T21060] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 738.781870][T21060] CPU: 0 PID: 21060 Comm: syz-executor.4 Not tainted 5.4.0-syzkaller #0 [ 738.790426][T21060] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 738.800582][T21060] Call Trace: [ 738.803901][T21060] dump_stack+0x197/0x210 [ 738.808263][T21060] should_fail.cold+0xa/0x15 [ 738.812878][T21060] ? fault_create_debugfs_attr+0x180/0x180 [ 738.818794][T21060] ? ___might_sleep+0x163/0x2c0 [ 738.823678][T21060] should_fail_alloc_page+0x50/0x60 [ 738.828911][T21060] __alloc_pages_nodemask+0x1a1/0x910 [ 738.834323][T21060] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 738.839888][T21060] ? __alloc_pages_slowpath+0x2920/0x2920 [ 738.845645][T21060] ? kasan_unpoison_shadow+0x35/0x50 [ 738.850955][T21060] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 738.857317][T21060] alloc_pages_current+0x107/0x210 [ 738.857331][T21060] ? ___might_sleep+0x163/0x2c0 [ 738.857348][T21060] __vmalloc_node_range+0x4f8/0x810 [ 738.857371][T21060] ? bpf_map_area_alloc+0x20/0x30 [ 738.857385][T21060] __vmalloc_node_flags_caller+0x71/0x90 [ 738.857399][T21060] ? bpf_map_area_alloc+0x20/0x30 [ 738.857415][T21060] __bpf_map_area_alloc+0xde/0xf0 [ 738.857431][T21060] bpf_map_area_alloc+0x20/0x30 [ 738.857450][T21060] htab_map_alloc+0x8d3/0x11c0 [ 738.898371][T21060] ? htab_map_update_elem+0xca0/0xca0 [ 738.908616][T21060] __do_sys_bpf+0x478/0x37b0 [ 738.913241][T21060] ? bpf_prog_load+0x18a0/0x18a0 [ 738.918205][T21060] ? __kasan_check_write+0x14/0x20 [ 738.923345][T21060] ? __mutex_unlock_slowpath+0xf0/0x6a0 13:21:34 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x4004556d, &(0x7f0000000100)={0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x2}, {}, @rumble}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) 13:21:34 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x40045564, &(0x7f0000000100)={0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x4}, {}, @rumble}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) 13:21:34 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x4004556e, &(0x7f0000000100)={0x0, 0x0, {0x0, 0x0, 0x0, {}, {0x0, 0x4000}, @rumble}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) [ 738.928917][T21060] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 738.934228][T21060] ? wait_for_completion+0x440/0x440 [ 738.939549][T21060] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 738.945835][T21060] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 738.951346][T21060] ? do_syscall_64+0x26/0x790 [ 738.956045][T21060] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 738.962133][T21060] ? do_syscall_64+0x26/0x790 [ 738.966823][T21060] __x64_sys_bpf+0x73/0xb0 [ 738.966842][T21060] do_syscall_64+0xfa/0x790 [ 738.966863][T21060] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 738.966874][T21060] RIP: 0033:0x45a679 [ 738.966889][T21060] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 738.966896][T21060] RSP: 002b:00007fd557596c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 738.966909][T21060] RAX: ffffffffffffffda RBX: 00007fd557596c90 RCX: 000000000045a679 [ 738.966917][T21060] RDX: 000000000000003c RSI: 0000000020000040 RDI: 405a020000000000 13:21:34 executing program 4 (fault-call:0 fault-nth:42): bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x7880, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000, 0x0, 0x0, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x13]}, 0x3c) [ 738.966926][T21060] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 738.966935][T21060] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fd5575976d4 [ 738.966944][T21060] R13: 00000000004c0c65 R14: 00000000004d4750 R15: 0000000000000003 13:21:34 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x4004556d, &(0x7f0000000100)={0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x3}, {}, @rumble}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) 13:21:34 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x40045564, &(0x7f0000000100)={0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x5}, {}, @rumble}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) [ 739.144155][T21076] FAULT_INJECTION: forcing a failure. [ 739.144155][T21076] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 739.174306][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 739.180226][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 739.252002][T21076] CPU: 1 PID: 21076 Comm: syz-executor.4 Not tainted 5.4.0-syzkaller #0 [ 739.260496][T21076] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 739.270727][T21076] Call Trace: [ 739.270753][T21076] dump_stack+0x197/0x210 [ 739.270780][T21076] should_fail.cold+0xa/0x15 [ 739.270802][T21076] ? fault_create_debugfs_attr+0x180/0x180 [ 739.270817][T21076] ? ___might_sleep+0x163/0x2c0 [ 739.270844][T21076] should_fail_alloc_page+0x50/0x60 [ 739.270858][T21076] __alloc_pages_nodemask+0x1a1/0x910 [ 739.270887][T21076] ? __alloc_pages_slowpath+0x2920/0x2920 [ 739.300150][T21076] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 739.300167][T21076] ? rcu_read_lock_any_held.part.0+0x50/0x50 [ 739.300183][T21076] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 739.300203][T21076] alloc_pages_current+0x107/0x210 [ 739.316846][T21076] __get_free_pages+0xc/0x40 [ 739.316863][T21076] kasan_populate_vmalloc_pte+0x2f/0x1c0 [ 739.316882][T21076] apply_to_page_range+0x445/0x700 [ 739.316904][T21076] ? memset+0x40/0x40 [ 739.329371][T21076] kasan_populate_vmalloc+0x68/0x90 [ 739.329393][T21076] __vmalloc_node_range+0x47e/0x810 [ 739.329417][T21076] ? bpf_map_area_alloc+0x20/0x30 [ 739.329435][T21076] __vmalloc_node_flags_caller+0x71/0x90 [ 739.350151][T21076] ? bpf_map_area_alloc+0x20/0x30 [ 739.350170][T21076] __bpf_map_area_alloc+0xde/0xf0 [ 739.350188][T21076] bpf_map_area_alloc+0x20/0x30 [ 739.350202][T21076] htab_map_alloc+0x8d3/0x11c0 [ 739.350228][T21076] ? htab_map_update_elem+0xca0/0xca0 [ 739.359388][T21076] __do_sys_bpf+0x478/0x37b0 [ 739.359411][T21076] ? bpf_prog_load+0x18a0/0x18a0 [ 739.359427][T21076] ? __kasan_check_write+0x14/0x20 [ 739.359448][T21076] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 739.369672][T21076] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 739.369692][T21076] ? wait_for_completion+0x440/0x440 [ 739.369716][T21076] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 739.369744][T21076] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 739.380382][T21076] ? do_syscall_64+0x26/0x790 [ 739.380402][T21076] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 739.380414][T21076] ? do_syscall_64+0x26/0x790 [ 739.380434][T21076] __x64_sys_bpf+0x73/0xb0 [ 739.390487][T21076] do_syscall_64+0xfa/0x790 [ 739.390512][T21076] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 739.390524][T21076] RIP: 0033:0x45a679 [ 739.390541][T21076] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 739.496773][T21076] RSP: 002b:00007fd557596c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 739.505198][T21076] RAX: ffffffffffffffda RBX: 00007fd557596c90 RCX: 000000000045a679 [ 739.513191][T21076] RDX: 000000000000003c RSI: 0000000020000040 RDI: 405a020000000000 [ 739.521288][T21076] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 739.529280][T21076] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fd5575976d4 [ 739.538592][T21076] R13: 00000000004c0c65 R14: 00000000004d4750 R15: 0000000000000003 13:21:34 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000780)='/dev/net/tun\x00', 0x168986, 0x0) r1 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000080)='/dev/cachefiles\x00', 0x48c01, 0x0) ioctl$PERF_EVENT_IOC_RESET(r1, 0x2403, 0x3) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'nr0\x01\x00', 0x1132}) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000000)={'nr0\x01\x00', 0x7132}) close(r0) 13:21:34 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x4004556e, &(0x7f0000000100)={0x0, 0x0, {0x0, 0x0, 0x0, {}, {0x0, 0xff00}, @rumble}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) 13:21:34 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x40045564, &(0x7f0000000100)={0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x6}, {}, @rumble}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) 13:21:34 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) recvmmsg(r0, &(0x7f0000001d00)=[{{0x0, 0xffffffffffffff00, 0x0}}, {{0x0, 0x0, 0x0}}], 0x400000000000262, 0x0, 0x0) r1 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r1, &(0x7f0000000180), 0x27a4eaa51029717, 0x0) setsockopt$rose(r1, 0x104, 0x7, &(0x7f0000000000)=0x4, 0x4) setsockopt$SO_TIMESTAMP(r0, 0x1, 0x23, &(0x7f0000000040)=0x9, 0x4) r2 = creat(&(0x7f00000000c0)='./file0\x00', 0x10) ioctl$UI_SET_PHYS(r2, 0x4008556c, &(0x7f0000000100)='syz1\x00') r3 = socket$inet6(0xa, 0x80003, 0x80) ioctl(r3, 0x100000890f, &(0x7f00000001c0)="0805b5055e0bcfe8474071") openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000080)='/dev/video37\x00', 0x2, 0x0) 13:21:34 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x4004556d, &(0x7f0000000100)={0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x4}, {}, @rumble}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) 13:21:34 executing program 4 (fault-call:0 fault-nth:43): bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x7880, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000, 0x0, 0x0, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x13]}, 0x3c) [ 739.860161][T21098] FAULT_INJECTION: forcing a failure. [ 739.860161][T21098] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 739.918197][T21098] CPU: 1 PID: 21098 Comm: syz-executor.4 Not tainted 5.4.0-syzkaller #0 [ 739.926599][T21098] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 739.936674][T21098] Call Trace: [ 739.939990][T21098] dump_stack+0x197/0x210 [ 739.944349][T21098] should_fail.cold+0xa/0x15 [ 739.944371][T21098] ? fault_create_debugfs_attr+0x180/0x180 [ 739.944388][T21098] ? ___might_sleep+0x163/0x2c0 [ 739.944411][T21098] should_fail_alloc_page+0x50/0x60 [ 739.954815][T21098] __alloc_pages_nodemask+0x1a1/0x910 [ 739.954839][T21098] ? find_held_lock+0x35/0x130 [ 739.954860][T21098] ? __alloc_pages_slowpath+0x2920/0x2920 [ 739.954884][T21098] ? lock_downgrade+0x920/0x920 [ 739.954902][T21098] ? rwlock_bug.part.0+0x90/0x90 [ 739.954921][T21098] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 739.954952][T21098] alloc_pages_current+0x107/0x210 [ 739.965009][T21098] __get_free_pages+0xc/0x40 [ 739.965026][T21098] kasan_populate_vmalloc_pte+0x2f/0x1c0 [ 739.965046][T21098] apply_to_page_range+0x445/0x700 [ 739.965064][T21098] ? memset+0x40/0x40 [ 739.965086][T21098] kasan_populate_vmalloc+0x68/0x90 [ 739.965101][T21098] __vmalloc_node_range+0x47e/0x810 [ 739.965124][T21098] ? bpf_map_area_alloc+0x20/0x30 [ 739.976478][T21098] __vmalloc_node_flags_caller+0x71/0x90 [ 739.976496][T21098] ? bpf_map_area_alloc+0x20/0x30 [ 739.976514][T21098] __bpf_map_area_alloc+0xde/0xf0 [ 739.976531][T21098] bpf_map_area_alloc+0x20/0x30 [ 739.976546][T21098] htab_map_alloc+0x8d3/0x11c0 13:21:35 executing program 4 (fault-call:0 fault-nth:44): bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x7880, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000, 0x0, 0x0, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x13]}, 0x3c) 13:21:35 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x40045564, &(0x7f0000000100)={0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x7}, {}, @rumble}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) 13:21:35 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x4004556d, &(0x7f0000000100)={0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x5}, {}, @rumble}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) 13:21:35 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x4004556e, &(0x7f0000000100)={0x0, 0x0, {0x0, 0x0, 0x0, {}, {}, @rumble}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) [ 739.976574][T21098] ? htab_map_update_elem+0xca0/0xca0 [ 739.976595][T21098] __do_sys_bpf+0x478/0x37b0 [ 739.976615][T21098] ? bpf_prog_load+0x18a0/0x18a0 [ 739.987174][T21098] ? __kasan_check_write+0x14/0x20 [ 739.987192][T21098] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 739.987209][T21098] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 739.987227][T21098] ? wait_for_completion+0x440/0x440 [ 739.987249][T21098] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 739.987279][T21098] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 739.987293][T21098] ? do_syscall_64+0x26/0x790 [ 739.987305][T21098] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 739.987324][T21098] ? do_syscall_64+0x26/0x790 [ 739.998488][T21098] __x64_sys_bpf+0x73/0xb0 [ 739.998510][T21098] do_syscall_64+0xfa/0x790 [ 739.998533][T21098] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 739.998545][T21098] RIP: 0033:0x45a679 [ 739.998566][T21098] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 739.998574][T21098] RSP: 002b:00007fd557596c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 739.998593][T21098] RAX: ffffffffffffffda RBX: 00007fd557596c90 RCX: 000000000045a679 [ 740.008348][T21098] RDX: 000000000000003c RSI: 0000000020000040 RDI: 405a020000000000 [ 740.008358][T21098] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 740.008367][T21098] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fd5575976d4 [ 740.008376][T21098] R13: 00000000004c0c65 R14: 00000000004d4750 R15: 0000000000000003 [ 740.170849][T21110] FAULT_INJECTION: forcing a failure. [ 740.170849][T21110] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 740.194158][T21110] CPU: 0 PID: 21110 Comm: syz-executor.4 Not tainted 5.4.0-syzkaller #0 [ 740.211724][T21110] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 740.211732][T21110] Call Trace: [ 740.211757][T21110] dump_stack+0x197/0x210 [ 740.211783][T21110] should_fail.cold+0xa/0x15 [ 740.232933][T21110] ? fault_create_debugfs_attr+0x180/0x180 [ 740.232953][T21110] ? ___might_sleep+0x163/0x2c0 [ 740.259212][T21110] should_fail_alloc_page+0x50/0x60 [ 740.269702][T21110] __alloc_pages_nodemask+0x1a1/0x910 [ 740.269721][T21110] ? __alloc_pages_slowpath+0x2920/0x2920 [ 740.269741][T21110] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 740.269754][T21110] ? rcu_read_lock_any_held.part.0+0x50/0x50 [ 740.269769][T21110] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 740.269787][T21110] alloc_pages_current+0x107/0x210 [ 740.269804][T21110] __get_free_pages+0xc/0x40 [ 740.269818][T21110] kasan_populate_vmalloc_pte+0x2f/0x1c0 [ 740.269838][T21110] apply_to_page_range+0x445/0x700 [ 740.285277][T21110] ? memset+0x40/0x40 [ 740.285299][T21110] kasan_populate_vmalloc+0x68/0x90 [ 740.297177][T21110] __vmalloc_node_range+0x47e/0x810 [ 740.297205][T21110] ? bpf_map_area_alloc+0x20/0x30 [ 740.297219][T21110] __vmalloc_node_flags_caller+0x71/0x90 [ 740.297232][T21110] ? bpf_map_area_alloc+0x20/0x30 [ 740.297249][T21110] __bpf_map_area_alloc+0xde/0xf0 [ 740.297264][T21110] bpf_map_area_alloc+0x20/0x30 [ 740.297294][T21110] htab_map_alloc+0x8d3/0x11c0 [ 740.309590][T21110] ? htab_map_update_elem+0xca0/0xca0 [ 740.309609][T21110] __do_sys_bpf+0x478/0x37b0 [ 740.309629][T21110] ? bpf_prog_load+0x18a0/0x18a0 [ 740.309641][T21110] ? __kasan_check_write+0x14/0x20 [ 740.309658][T21110] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 740.309682][T21110] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 740.319367][T21110] ? wait_for_completion+0x440/0x440 13:21:35 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x4004556d, &(0x7f0000000100)={0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x6}, {}, @rumble}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) [ 740.319396][T21110] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 740.330125][T21110] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 740.330145][T21110] ? do_syscall_64+0x26/0x790 [ 740.339667][T21110] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 740.349945][T21110] ? do_syscall_64+0x26/0x790 [ 740.349967][T21110] __x64_sys_bpf+0x73/0xb0 [ 740.349985][T21110] do_syscall_64+0xfa/0x790 [ 740.362046][T21110] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 740.362059][T21110] RIP: 0033:0x45a679 13:21:35 executing program 4 (fault-call:0 fault-nth:45): bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x7880, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000, 0x0, 0x0, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x13]}, 0x3c) [ 740.362076][T21110] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 740.372876][T21110] RSP: 002b:00007fd557596c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 740.372891][T21110] RAX: ffffffffffffffda RBX: 00007fd557596c90 RCX: 000000000045a679 [ 740.372899][T21110] RDX: 000000000000003c RSI: 0000000020000040 RDI: 405a020000000000 [ 740.372912][T21110] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 740.383719][T21110] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fd5575976d4 [ 740.393321][T21110] R13: 00000000004c0c65 R14: 00000000004d4750 R15: 0000000000000003 [ 740.582265][T21116] FAULT_INJECTION: forcing a failure. [ 740.582265][T21116] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 740.673353][T21116] CPU: 1 PID: 21116 Comm: syz-executor.4 Not tainted 5.4.0-syzkaller #0 [ 740.681741][T21116] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 740.691815][T21116] Call Trace: [ 740.695133][T21116] dump_stack+0x197/0x210 [ 740.699668][T21116] should_fail.cold+0xa/0x15 [ 740.704305][T21116] ? fault_create_debugfs_attr+0x180/0x180 [ 740.710148][T21116] ? ___might_sleep+0x163/0x2c0 [ 740.715039][T21116] should_fail_alloc_page+0x50/0x60 [ 740.720270][T21116] __alloc_pages_nodemask+0x1a1/0x910 [ 740.725706][T21116] ? find_held_lock+0x35/0x130 [ 740.730517][T21116] ? __alloc_pages_slowpath+0x2920/0x2920 [ 740.736257][T21116] ? lock_downgrade+0x920/0x920 [ 740.736273][T21116] ? rwlock_bug.part.0+0x90/0x90 [ 740.736289][T21116] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 740.736311][T21116] alloc_pages_current+0x107/0x210 [ 740.752704][T21116] __get_free_pages+0xc/0x40 [ 740.752720][T21116] kasan_populate_vmalloc_pte+0x2f/0x1c0 [ 740.752743][T21116] apply_to_page_range+0x445/0x700 [ 740.773218][T21116] ? memset+0x40/0x40 [ 740.777246][T21116] kasan_populate_vmalloc+0x68/0x90 [ 740.777265][T21116] __vmalloc_node_range+0x47e/0x810 [ 740.777305][T21116] ? bpf_map_area_alloc+0x20/0x30 [ 740.787695][T21116] __vmalloc_node_flags_caller+0x71/0x90 [ 740.787713][T21116] ? bpf_map_area_alloc+0x20/0x30 [ 740.787729][T21116] __bpf_map_area_alloc+0xde/0xf0 [ 740.787749][T21116] bpf_map_area_alloc+0x20/0x30 [ 740.798481][T21116] htab_map_alloc+0x8d3/0x11c0 [ 740.798509][T21116] ? htab_map_update_elem+0xca0/0xca0 [ 740.798525][T21116] __do_sys_bpf+0x478/0x37b0 [ 740.798544][T21116] ? bpf_prog_load+0x18a0/0x18a0 [ 740.808549][T21116] ? __kasan_check_write+0x14/0x20 [ 740.808567][T21116] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 740.808583][T21116] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 740.808600][T21116] ? wait_for_completion+0x440/0x440 [ 740.808625][T21116] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 740.818224][T21116] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 740.818241][T21116] ? do_syscall_64+0x26/0x790 [ 740.818257][T21116] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 740.818267][T21116] ? do_syscall_64+0x26/0x790 [ 740.818288][T21116] __x64_sys_bpf+0x73/0xb0 [ 740.828225][T21116] do_syscall_64+0xfa/0x790 [ 740.828246][T21116] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 740.828257][T21116] RIP: 0033:0x45a679 [ 740.828277][T21116] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 740.838301][T21116] RSP: 002b:00007fd557596c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 740.838316][T21116] RAX: ffffffffffffffda RBX: 00007fd557596c90 RCX: 000000000045a679 [ 740.838325][T21116] RDX: 000000000000003c RSI: 0000000020000040 RDI: 405a020000000000 [ 740.838333][T21116] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 740.838340][T21116] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fd5575976d4 [ 740.838352][T21116] R13: 00000000004c0c65 R14: 00000000004d4750 R15: 0000000000000003 13:21:36 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000780)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000040)={'nr0\x01\x00', 0x1132}) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'nr0\x01\x00', 0x7132}) r2 = socket$key(0xf, 0x3, 0x2) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001800)={'irlan0\x00', 0x0}) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000001840)={'ipddp0\x00', r3}) r4 = socket$inet6(0xa, 0x400000000001, 0x0) bind$inet6(r4, &(0x7f0000fa0fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r4, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r5 = open(&(0x7f0000000200)='./file0\x00', 0x141042, 0x82) setsockopt$SO_TIMESTAMPING(r4, 0x1, 0x25, &(0x7f00000001c0)=0x4, 0x4) timerfd_gettime(r5, &(0x7f0000000040)) ftruncate(r5, 0x7e) sendfile(r4, r5, &(0x7f00000000c0), 0x8000fffffffe) ioctl$VIDIOC_QUERY_DV_TIMINGS(r5, 0x80845663, &(0x7f0000000080)) close(r1) 13:21:36 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x4004556d, &(0x7f0000000100)={0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x7}, {}, @rumble}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) 13:21:36 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x4004556e, &(0x7f0000000100)={0x0, 0x0, {0x0, 0x0, 0x0, {}, {}, @rumble={0x2}}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) 13:21:36 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x40045564, &(0x7f0000000100)={0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x8}, {}, @rumble}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) 13:21:36 executing program 4 (fault-call:0 fault-nth:46): bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x7880, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000, 0x0, 0x0, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x13]}, 0x3c) 13:21:36 executing program 5: recvmmsg(0xffffffffffffffff, &(0x7f0000001d00)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}], 0x2, 0x0, 0x0) setsockopt$SO_TIMESTAMP(0xffffffffffffffff, 0x1, 0x23, &(0x7f0000000040)=0x9, 0x4) r0 = socket$inet6(0xa, 0x80003, 0x80) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") 13:21:36 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) recvmmsg(r0, &(0x7f0000001d00)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}], 0x2, 0x0, 0x0) setsockopt$SO_TIMESTAMP(r0, 0x1, 0x23, &(0x7f0000000040)=0x9, 0x4) r1 = socket$inet6(0xa, 0x80003, 0x80) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/btrfs-control\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x72, &(0x7f0000000080)={0x0, 0x8, 0x10}, &(0x7f00000000c0)=0xc) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(r2, 0x84, 0x70, &(0x7f0000000200)={r3, @in={{0x2, 0x4e24, @multicast2}}, [0x7, 0x2, 0x733f6869, 0xffffffff, 0x7, 0x3, 0x4, 0x81, 0x5, 0x10001, 0xfffffffffffffffb, 0x5, 0x2, 0x100000000, 0x4]}, &(0x7f0000000100)=0x100) [ 741.308416][T21141] FAULT_INJECTION: forcing a failure. [ 741.308416][T21141] name fail_page_alloc, interval 1, probability 0, space 0, times 0 13:21:36 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x4004556e, &(0x7f0000000100)={0x0, 0x0, {0x0, 0x0, 0x0, {}, {}, @rumble={0x3}}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) 13:21:36 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x40045564, &(0x7f0000000100)={0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x300}, {}, @rumble}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) [ 741.351389][T21141] CPU: 0 PID: 21141 Comm: syz-executor.4 Not tainted 5.4.0-syzkaller #0 [ 741.359778][T21141] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 741.370037][T21141] Call Trace: [ 741.373368][T21141] dump_stack+0x197/0x210 [ 741.377739][T21141] should_fail.cold+0xa/0x15 [ 741.382358][T21141] ? fault_create_debugfs_attr+0x180/0x180 [ 741.388194][T21141] ? ___might_sleep+0x163/0x2c0 [ 741.393081][T21141] should_fail_alloc_page+0x50/0x60 [ 741.398914][T21141] __alloc_pages_nodemask+0x1a1/0x910 [ 741.404405][T21141] ? __alloc_pages_slowpath+0x2920/0x2920 [ 741.410185][T21141] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 741.416461][T21141] ? find_next_bit+0x107/0x130 [ 741.421269][T21141] pcpu_populate_chunk+0xf8/0x940 [ 741.426330][T21141] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 741.432143][T21141] ? find_next_bit+0x17/0x130 [ 741.438816][T21141] pcpu_alloc+0xd5b/0x1380 [ 741.443277][T21141] ? pcpu_alloc_area+0x820/0x820 [ 741.448243][T21141] ? bpf_map_area_alloc+0x20/0x30 [ 741.448359][T21141] __alloc_percpu_gfp+0x28/0x30 [ 741.458390][T21141] htab_map_alloc+0xdb9/0x11c0 [ 741.458417][T21141] ? htab_map_update_elem+0xca0/0xca0 [ 741.458435][T21141] __do_sys_bpf+0x478/0x37b0 [ 741.458453][T21141] ? bpf_prog_load+0x18a0/0x18a0 [ 741.458472][T21141] ? __kasan_check_write+0x14/0x20 [ 741.468622][T21141] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 741.468640][T21141] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 741.468655][T21141] ? wait_for_completion+0x440/0x440 13:21:36 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x4004556d, &(0x7f0000000100)={0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x8}, {}, @rumble}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) [ 741.468679][T21141] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 741.468711][T21141] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 741.468724][T21141] ? do_syscall_64+0x26/0x790 [ 741.468744][T21141] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 741.478345][T21141] ? do_syscall_64+0x26/0x790 [ 741.478370][T21141] __x64_sys_bpf+0x73/0xb0 [ 741.478387][T21141] do_syscall_64+0xfa/0x790 [ 741.478409][T21141] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 741.478421][T21141] RIP: 0033:0x45a679 [ 741.478438][T21141] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 741.478446][T21141] RSP: 002b:00007fd557596c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 741.478460][T21141] RAX: ffffffffffffffda RBX: 00007fd557596c90 RCX: 000000000045a679 [ 741.478475][T21141] RDX: 000000000000003c RSI: 0000000020000040 RDI: 405a020000000000 [ 741.478489][T21141] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 13:21:36 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x4004556e, &(0x7f0000000100)={0x0, 0x0, {0x0, 0x0, 0x0, {}, {}, @rumble={0x4}}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) [ 741.489162][T21141] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fd5575976d4 [ 741.489171][T21141] R13: 00000000004c0c65 R14: 00000000004d4750 R15: 0000000000000003 13:21:36 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x40045564, &(0x7f0000000100)={0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x500}, {}, @rumble}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) 13:21:37 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x4004556d, &(0x7f0000000100)={0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x300}, {}, @rumble}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) 13:21:37 executing program 4 (fault-call:0 fault-nth:47): bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x7880, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000, 0x0, 0x0, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x13]}, 0x3c) 13:21:37 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) recvmmsg(r0, &(0x7f0000001d00)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}], 0x2, 0x0, 0x0) setsockopt$SO_TIMESTAMP(r0, 0x1, 0x23, &(0x7f0000000700)=0x9, 0x2c0) r1 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/mls\x00', 0x0, 0x0) getpeername(r1, &(0x7f0000000080)=@in6={0xa, 0x0, 0x0, @local}, &(0x7f0000000100)=0x80) execve(&(0x7f0000000140)='./file0\x00', &(0x7f0000000440)=[&(0x7f0000000180)='\x00', &(0x7f0000000200)='/selinux/mls\x00', &(0x7f0000000240)=':\x00', &(0x7f0000000280)='/\\&\x9d[wlan1/[.em1em0\x00', &(0x7f00000002c0)='/\x00', &(0x7f0000000300)='/selinux/mls\x00', &(0x7f0000000340)='/selinux/mls\x00', &(0x7f0000000380)='^trusted\x00', &(0x7f00000003c0)='/selinux/mls\x00', &(0x7f0000000400)='/selinux/mls\x00'], &(0x7f00000006c0)=[&(0x7f00000004c0)='securityppp1\x00', &(0x7f0000000500)='\x00', &(0x7f0000000540)=']trusted\x00', &(0x7f0000000580)='\\.keyring+\'\'\x00', &(0x7f00000005c0)='/selinux/mls\x00', &(0x7f0000000600)='/selinux/mls\x00', &(0x7f0000000640)='/selinux/mls\x00', &(0x7f0000000680)='/selinux/mls\x00']) r2 = socket$inet6(0xa, 0x80003, 0x80) ioctl(r2, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") 13:21:37 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x4004556e, &(0x7f0000000100)={0x0, 0x0, {0x0, 0x0, 0x0, {}, {}, @rumble={0x5}}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) 13:21:37 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x40045564, &(0x7f0000000100)={0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x600}, {}, @rumble}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) 13:21:37 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000780)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000040)={'nr0\x01\x00', 0x1132}) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'nr0\x01\x00', 0x7132}) close(r1) r2 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r2, &(0x7f0000000180), 0x27a4eaa51029717, 0x0) sendmsg$unix(r2, &(0x7f0000000200)={&(0x7f0000000080)=@abs={0x2, 0x0, 0x4e20}, 0x6e, &(0x7f0000000100)=[{&(0x7f0000000180)="aedebd121f2ad842fa65ed5f217a29c344e9a6596abd2136f6a9fb4a105c1a7eed75d797ce0bd81f42603fac4e86e1bda3835f4e475439a898549e043de11b1b409f41c365f4fe542927e1652ba4d33d7ccbb05d25cf67de22d7ab4e0ace360c", 0x60}, {&(0x7f00000007c0)="55f2d474fd3459c321fd4646d4b630589f5a514ca82c46c04206fe0ff212e753290edddfaab0c7e336c94e7a6258e70f184aae79332d4a0d1b57b73544cb7eb9371c0f425ddfd618214de67183c635b7a0c7bff79968207cdd9526e21bb6cbdc8c4c75b1b36ec50bcb9510d2a6e5ff4b0f493fa75987161b4b097066e9473a305585e303179bce8150a0aef6880fcb5440edfa77a557596246709bd8d02ef62bb60266d493b4ef1deaf8feb51ea2ab9fe84e6e50774ba742f011f851ad96e50950689eab8dc77125ca86f9b1e154f57f176ac99fcdf6485fc067202fe02c749820c470e3c5b7ba06f68cdf28d8c409d4008b18853befddb204df4ed34a43ebeda3b5dd36d90cec4aed25ca348d2126fe2497b72126b8d3210fdaefdcf95e9a72e47fe1ad79845176ef5d15c1363263820a04957394578d99b07e2c31fa7c04097f19df5b896402e5ebb3d391f7defb7743fd7aefdf0eba54dd2df37b4beb83f8250098fa5559f2ac2d3aa3f84338a31ef7a6bc9194f84cfc36202c98fa7adfe3bcff5e5eeaee7aec519fb277cfed47a482f8af08e7e22f884b13d4054144dddde6c0cc78725fdd0a7d8d3c178c184e3bb56fab419c1ff55246af1d41488a27a7016fcf7f590ca072bb4b14adbfa53f5ea6159c9ed33c264f9d1dccc09d0191052f569d864e34c6ea76c948c01742b82fa28608b1a2893f8aec555a3fd7b6821bf32b635a80a0dc3dd47f08111833ea445860d6132c8307365a493f482203f8bdcc3070d76387f8806f96bcad7f7cbde9ba38b98946ce2255b4d0783101d57326e8ff03ea9cbb38f3c455516aadc62c612f4e80be7d611050f0b9eadfafc413506a1871772338d2dc522474c8327c442252774c41279c1a34b32c49950b2a8ccd2dd58567415cdb82c6849b8ef1e289f82d6a79928b35fc954308d4f6424da77ec1923b0ce7befa50d5328457cc76fb7da4a6b866e192dcbaa0a36f57cd58f5da872b205fb0622ac0e85681c32648d637f1411629067027eb7c2bb1fdf5f9d594e48a19b439a1bd77ef4c1454cf6956d2f329ce42dda7970d5b12a219ef0e6d6f31095b9b6591a62a82eb0a79e283566b6a627cdba628e3cd4fcdd0b6a8fd3d3aacf70c63da9da8d2bd54fb209d1782102896cf3dcdace6b9e790c69dd9f414dead2b1b7e4001d519e193f951f50aa974b101853fd97a6e3dd312299bae98b4d0160c855acb69abfd75baed7701d5c238e821399830f75ae2b741016d26ccee28a23424c6c578120991c8ed80c86ead96d2c3481abecff58c01f2b5960af5eb08110dc503f78d1ae7481799ccd53dc5eb7c3b811b1ba213d87dc9aed0434f6f217d3da10dbfd33f0af5439cb3907176ec8144bcb557fc5e60e114ee7c3d062b92364f9f0117805c798a2fa380eb3c9e578d939200966929098ac4525698ad463d92c0a240a2bbb2149b972a2f323d4923dedd4bf7ba5ae4ecda9f2c5304092a58da39e2d6e7469b9e19637a905be85ce3504995dfa001ed46f0891499222e1db266c51c1e7294965d823050dee09224b765b6dcbe07808bc16e3cd3d10878269da0155b05dfb6b742bcdb2441cf98dd0c31ed1fb2ddd2a00547b402107afa928f6958f89d1f2877ca7874ef81eae4b5a9615bbe6b94e8cec7da0af9ef563c949695d6ade4d6f6c3b9e2525d635d37571a5792cb436407dd0aa032f74890e98e2f03edb3a554ed7e65fcf191e04c8871c199ca7ec9a9d908f2363ed9a7de1c3ea4c106abfe11337f25e47da3e05ec7fe58fdb0e12a361416a0815f25e5cd93bb60e9c9a07abf91b9ff3b0f1c1ecd942aebe44b2683d27e7653b70aeff7872718d14efe3cfb59e51bcd435b62539bda401c99f063e9460f3117c9ca61708a317c406d69fdcf805d78dd9205dee302790111db3508fac609a1f170254a3fec4e0156c1c0514150aeab0ead78b5b6545ee390001cf0012ec284070f8c91cc3f0cd289033d51fa5086a55e5a43d59f27fd0abb253896c54906e15f5a3e11c976ffc363d47ddafe6c6901b05ad45beff900b046971b15875f443396cc0bee0bfc11086e27dded96ad0f0452c58eaaf81d532276503d85e39daed035a7fe5fb8ad3bb114f5be904442bce39aba23bfa1168bb311670a216acd06c080189a13aed54ad01066c3b3d8b751fb5eb81b2cfb22927e379b6be5bb1cd26937c8eae0606d3cb6a8288658e65612886b9654be7f68fe1499160bb494f8b846fde232d7a05ac66d776b38f17a69a388bc466c4b4cad28890ad4ff6a9438aa6603a1e45b779048b794d17d75aab5781d3d899a547c7d3671df340cb80c9c349b85addacbb9c07fb7bdcae3f2d847ca619d6a8a1dedb49cef22d3991df1fb3dcc96e86edcf7ce45af71804256085ae063648fab1cf15b9ab62819b13be27ff82b70ec2ea56368209e515bf221f53d1786ef71f04dbea3d91e3a5b468fcb694e154c07c79e24f2b0e28bcf49dba50c147848a9977f499d63e51270b329252d1083bea4b41215ddab2249e714eff76090c0a2d375fd70e52c6428a3310717df955c9c91b064bde4b1c282254f1139a99b3865295aca2ce8dffd4f73a64f02c05f04bfaa6ffc9c9ca7a2d6a0c209c5c877dd2b7a85123667591f6a284d63288f7f430a1c6c5218df688973d4747a2925f2aaa213be03280cbb339bdff80148292ccbd5487892dca39607c0de710712f2b701dee1102e6794019b50ae2ecc38e779e22a68ccfaa71e31dc5d8bd0699d4f731b5f9bc651de71cf568aa6883d1c12fcd2d48ad9eb093f5df177e96bf28b902b06d9e8a2e5fac24bb19e6d4cf44fb7c21e967c03bc8cca75632277ad41df510fac6f8fdc67c622fd6b08c3650f25abee74d387bb60f54961c6ba8f4ab2968f2ec0de9200a30c158ef1b964fc9b4e3b94278cadc280f982ee9b8c0590c8b427e4e8212b3ba88110062713c0ab32aee879d0e063881378679af3f30e03eb92bfa3f9bee2691112284fb809e0c12cd7cc88f7f5c58e33e7803769852edc261b798adefc26496875ab5ea025deb93096fc8e29728cf31e7064c2645c2138df585ab197622906f8fadab7301ecb920600cb38b5e311b9b1882d02780689a0a935db70362897b318a7d0a73bb05cf564a248b577bd44f73de227286328081c32f3952f395c6ede56693fb13c2584a1788ec02cb0b4b3b45ca57979097c815f243c191860892099f17128ba9836bb959e3c1d1ea694dd6bd4360bd16feb4b1a6e69060f52037fa4adbb90ff89e06bcb2c328eba9ead0d38630b2cb3df4dac85f1d965c284997cfa8024d3a028f6d3955c32033d30efe9ca609b32f391f65c9b503fc361c27a77e3d2b0db4cad63a7372918a243629e72f57fefbe4a999f1ecfb98d688c2acb6bc2ff1914e55f0db735f406b0d52670ac8a064c266de0c574f0f3d93235f453cd571f074f6212d703713a9fb75e7041d226a295a27c8dd0e0d557ce77a963306923ef18e24d6da154ecc838b51f7a5395eaccf810591a1025d71f8994f2588a7b471f4a9e5bc443210a645b1f610581d500bbfaff47711b978cb46b46c10b91c5e11bf0a614c9b7aa4e980cb5fb43c9551a400fa2051724072432edaf397e425b2f4a4606625c157488378065d9e3dcdd6aaded188277734c5d57bd5d9593874ff2322657dd524c9aa0d5a99c8358019c39874a9a37c2a0a31475ae41afacc0cc519083999efb555c6bc0fc2d37344935d8d81b11a1063dae5acdb8476322f49e1602957daf03fd9cba1df5218f19d88decbc8208af71659e7fea1bea99f752ab550b17534d80a071a79edc52021658dce0cf87a1435520daee03fa42b01d53abe338cae55b866e920dad24576f9f29be9d0b70504bd29b7d7a0841c2941ba19cfd5f7856b07ef9ca556d1c18be65e57d99b8830d02b7e67b0062bf0db6c32f87cefb95b12f663dad9d8c7fa3fba51c4a766949f21f1b53585384747cec24db7c6dc211b7deb674196bc67ba326f6c3399912716e6a8a6532a67bccb09e3551bb34d3ed9e55a7fb15c4ec17ea0e49473cab98ac9f605ad4acbedcefc2fd0c799a8daab004326d7e35425093cce8448a2ba1879c54088a466fcad5c70b7f3bb4eee394691b9b827208db8c5c73e610302d02212e495cfdaf838d9383b7a62996d30d10902230a644fbfab2ed581b89e01c0cf13e0ae544dd3cc1e6623d157d8e3bae90aad44ea7fd580306a63ea44e8f492bd2f6147efba43d4c9a16b0823a0aecbeb72055b0598ad07180b917e904c82ba24a85e63776f2e9be2fa0510c11323c9ca008e620d9ba57b69f191e7ef896552a639d123f004613056b0328072b0f3f3a8e4b9660c06f40208b3993f73fbac54965d36ad1eedb4b39f55b6dfcb0710a58e3b0cd32adab6f96029b2eb6200b52762ed33510703e88c92f33d9f5a00e28589b3ec16918042244ca92eb05c66294db9d4db61c5674a36830ffcc4b2a9fb976e78efeb11efecfa64b3ba0ef5c191e9cd0aceb930eced05f99eaf1076d5f236028790c9ca997505836300610a7c5cf5a58aac7e5d04a5870a8f39d05dc5531ac8f8adc053ba049fdbe1399725eb36614caa24cdb8c555726bc4d096099eda64bc050a6187c975e5b41bca6c95ac7f6a840bfcfc715f70aba8d6b520e3bb01d36b99ed367d8e899889a82a36865ed130b24424b3c40b4a95bb0e2ca3bd2a47a8ef448f998ae9354c129c372c730eaac4baadf9769fb3ee948624eceaf98dcb825c1bc84e9cbb831b9550e19d2e12e0ac2dcf0b2841928abd1561052f1e5a7d94d0ce0039b4e1ddb1448d32f7e12eb8592a18e5ddcbc7057a7b9477e10e142cf56ec542b6c9070e06ae3d426c20e6338cce756f8881650a54b73fcdad641184df2896f02938f2493bc7783f83b4eaa0bbb0cc8da667156562c48f82d138942537a0b5ddd3564068da90375dce18f07f7b949e493664caa6b1fc4ca93d5264c96fa7de53ece4d9431e4822f341a91c7efc87a09ada4c7ff25f2def862cf602dd5073963f0760c10f2bca8e687dbef58bd0f75c384184414aa80ead89720f6a09ba4b6f890f23999b7af02ee8719cb1bcf4d8509c6f43cebdfeed7d945add21ca9636b008ff1f4ccaf6a017938d378c37f02aaa7f3fbdcb4776059a71b2a051dcbabcac2108b3f70de4aeb748e4a883bd13ceb1e1f03e26223471871db5b8d512513de38ee1e4bfd91e3e14d3ebecaa78c352a57261948dbaad6c550d0d73419bc1c7cb589a53486e7a7e6a1b2fae1938f7cc6bf8072d117edc2ef5078984a7602a6facd31f36b949b21bf33fef3751d1df1c7c17934a9076ebda8d0c10681497ddf474796b1641c51b65a64b9f0ef45e867a769794c9d1df4cace7436a17ab427174187a6573c17585c22e508099530882eb20049c0c164819bb045eb633121044d9a51c9bfb98e126893844af6d35db5664602d31d4891bf73fd0b4f200671668f9d2c22438c9b4720aa7da3a075c8c5ea233bc7a5e8fe873dd55388748496fa38a17e0fcbe3763d11e2fc1080171829efed16fe513fe8cc8f2db5af60ef02cac685e5b6cd9736234c0b8a380b453a9dd0f376a2ea5c3545f331affcd69a82cc4df1ae40f1d2799400e4df23b1053edb990c2e3aa2cedf573db8399398a1bae19b5cc95acf90ad2b36961ecf8a83cf08a43558aaee63c23b54683e43e03645740a45f22d09a58a725192cf92cf6aba1565353fd0ac020967c5b3343afa083c3872d6a9fc087130da6b4dc7b0844c856f34e01bed17ad92", 0x1000}], 0x2, 0x0, 0x0, 0x404}, 0x40000) r3 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/tcp6\x00') preadv(r3, &(0x7f0000000000)=[{&(0x7f00000000c0)=""/169, 0x2aa}], 0x1, 0x0) ioctl$USBDEVFS_DISCONNECT_CLAIM(r3, 0x8108551b, &(0x7f0000000240)={0x10001, 0x0, "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"}) r4 = syz_open_dev$media(&(0x7f0000000380)='/dev/media#\x00', 0x282b000000000, 0x2) ioctl$USBDEVFS_CONTROL(r4, 0xc0185500, &(0x7f0000000400)={0x80, 0x1d, 0x5d, 0x6, 0x1c, 0x0, &(0x7f00000003c0)="c09bdf81296f1655fdb859d3be0ebf339438f89e297e965420270dad"}) [ 742.416493][T21177] FAULT_INJECTION: forcing a failure. [ 742.416493][T21177] name fail_page_alloc, interval 1, probability 0, space 0, times 0 13:21:37 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x4004556d, &(0x7f0000000100)={0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x500}, {}, @rumble}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) 13:21:37 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x40045564, &(0x7f0000000100)={0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x700}, {}, @rumble}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) [ 742.471297][T21177] CPU: 0 PID: 21177 Comm: syz-executor.4 Not tainted 5.4.0-syzkaller #0 [ 742.479684][T21177] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 742.489757][T21177] Call Trace: [ 742.493069][T21177] dump_stack+0x197/0x210 [ 742.497431][T21177] should_fail.cold+0xa/0x15 [ 742.502054][T21177] ? fault_create_debugfs_attr+0x180/0x180 [ 742.507868][T21177] ? ___might_sleep+0x163/0x2c0 [ 742.512742][T21177] should_fail_alloc_page+0x50/0x60 [ 742.517965][T21177] __alloc_pages_nodemask+0x1a1/0x910 [ 742.523490][T21177] ? __alloc_pages_slowpath+0x2920/0x2920 [ 742.529230][T21177] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 742.535625][T21177] ? find_next_bit+0x107/0x130 [ 742.540614][T21177] pcpu_populate_chunk+0xf8/0x940 [ 742.545660][T21177] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 742.551390][T21177] ? find_next_bit+0x17/0x130 [ 742.551416][T21177] pcpu_alloc+0xd5b/0x1380 [ 742.551445][T21177] ? pcpu_alloc_area+0x820/0x820 [ 742.565471][T21177] ? bpf_map_area_alloc+0x20/0x30 [ 742.570527][T21177] __alloc_percpu_gfp+0x28/0x30 [ 742.575402][T21177] htab_map_alloc+0xdb9/0x11c0 [ 742.580207][T21177] ? htab_map_update_elem+0xca0/0xca0 [ 742.585598][T21177] __do_sys_bpf+0x478/0x37b0 [ 742.590213][T21177] ? bpf_prog_load+0x18a0/0x18a0 [ 742.595168][T21177] ? __kasan_check_write+0x14/0x20 [ 742.600292][T21177] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 742.600311][T21177] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 742.600326][T21177] ? wait_for_completion+0x440/0x440 [ 742.600349][T21177] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 742.622700][T21177] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 742.628184][T21177] ? do_syscall_64+0x26/0x790 [ 742.632894][T21177] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 742.639137][T21177] ? do_syscall_64+0x26/0x790 [ 742.643842][T21177] __x64_sys_bpf+0x73/0xb0 [ 742.648280][T21177] do_syscall_64+0xfa/0x790 [ 742.652791][T21177] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 742.658688][T21177] RIP: 0033:0x45a679 [ 742.662687][T21177] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 742.682296][T21177] RSP: 002b:00007fd557596c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 742.682311][T21177] RAX: ffffffffffffffda RBX: 00007fd557596c90 RCX: 000000000045a679 [ 742.682319][T21177] RDX: 000000000000003c RSI: 0000000020000040 RDI: 405a020000000000 [ 742.682327][T21177] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 13:21:37 executing program 4 (fault-call:0 fault-nth:48): bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x7880, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000, 0x0, 0x0, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x13]}, 0x3c) 13:21:37 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x4004556e, &(0x7f0000000100)={0x0, 0x0, {0x0, 0x0, 0x0, {}, {}, @rumble={0x6}}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) [ 742.682336][T21177] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fd5575976d4 [ 742.682344][T21177] R13: 00000000004c0c65 R14: 00000000004d4750 R15: 0000000000000003 13:21:38 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x4004556e, &(0x7f0000000100)={0x0, 0x0, {0x0, 0x0, 0x0, {}, {}, @rumble={0x7}}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) 13:21:38 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x4004556d, &(0x7f0000000100)={0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x600}, {}, @rumble}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) 13:21:38 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) recvmmsg(r0, &(0x7f0000001d00)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}], 0x2, 0x0, 0x0) setsockopt$SO_TIMESTAMP(r0, 0x1, 0x23, &(0x7f0000000040)=0x9, 0x4) socket$can_j1939(0x1d, 0x2, 0x7) r1 = socket$inet6(0xa, 0x80003, 0x80) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") [ 742.903285][T21197] FAULT_INJECTION: forcing a failure. [ 742.903285][T21197] name fail_page_alloc, interval 1, probability 0, space 0, times 0 13:21:38 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x4004556d, &(0x7f0000000100)={0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x700}, {}, @rumble}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) [ 742.976986][T21197] CPU: 0 PID: 21197 Comm: syz-executor.4 Not tainted 5.4.0-syzkaller #0 [ 742.985508][T21197] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 742.995591][T21197] Call Trace: [ 742.998922][T21197] dump_stack+0x197/0x210 [ 743.003286][T21197] should_fail.cold+0xa/0x15 [ 743.007923][T21197] ? fault_create_debugfs_attr+0x180/0x180 [ 743.013759][T21197] ? ___might_sleep+0x163/0x2c0 [ 743.018643][T21197] should_fail_alloc_page+0x50/0x60 [ 743.023872][T21197] __alloc_pages_nodemask+0x1a1/0x910 [ 743.029292][T21197] ? __alloc_pages_slowpath+0x2920/0x2920 [ 743.035048][T21197] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 743.041316][T21197] ? find_next_bit+0x107/0x130 [ 743.046114][T21197] pcpu_populate_chunk+0xf8/0x940 [ 743.051162][T21197] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 743.056919][T21197] ? find_next_bit+0x17/0x130 [ 743.061631][T21197] pcpu_alloc+0xd5b/0x1380 [ 743.066078][T21197] ? pcpu_alloc_area+0x820/0x820 [ 743.071033][T21197] ? bpf_map_area_alloc+0x20/0x30 [ 743.076119][T21197] __alloc_percpu_gfp+0x28/0x30 [ 743.081015][T21197] htab_map_alloc+0xdb9/0x11c0 [ 743.085963][T21197] ? htab_map_update_elem+0xca0/0xca0 [ 743.091368][T21197] __do_sys_bpf+0x478/0x37b0 [ 743.095988][T21197] ? bpf_prog_load+0x18a0/0x18a0 [ 743.100934][T21197] ? __kasan_check_write+0x14/0x20 [ 743.100951][T21197] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 743.100966][T21197] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 743.100984][T21197] ? wait_for_completion+0x440/0x440 13:21:38 executing program 0: socketpair(0xb, 0x800, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_inet_tcp_SIOCATMARK(r0, 0x8905, &(0x7f0000000180)) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000780)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000040)={'nr0\x01\x00', 0x1132}) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'nr0\x01\x00', 0x7132}) r3 = socket$inet6(0xa, 0x400000000001, 0x0) bind$inet6(r3, &(0x7f0000fa0fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r3, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r4 = open(&(0x7f0000000200)='./file0\x00', 0x141042, 0x82) setsockopt$SO_TIMESTAMPING(r3, 0x1, 0x25, &(0x7f00000001c0)=0x4, 0x4) timerfd_gettime(r4, &(0x7f0000000040)) ftruncate(r4, 0x7e) sendfile(r3, r4, &(0x7f00000000c0), 0x8000fffffffe) ioctl$SNDCTL_DSP_SPEED(r4, 0xc0045002, &(0x7f0000000080)=0x1) close(r2) [ 743.117008][T21197] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 743.117036][T21197] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 743.128645][T21197] ? do_syscall_64+0x26/0x790 [ 743.128664][T21197] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 743.128677][T21197] ? do_syscall_64+0x26/0x790 [ 743.128696][T21197] __x64_sys_bpf+0x73/0xb0 [ 743.128714][T21197] do_syscall_64+0xfa/0x790 [ 743.128732][T21197] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 743.128744][T21197] RIP: 0033:0x45a679 [ 743.128759][T21197] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 743.128766][T21197] RSP: 002b:00007fd557596c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 743.138879][T21197] RAX: ffffffffffffffda RBX: 00007fd557596c90 RCX: 000000000045a679 [ 743.138888][T21197] RDX: 000000000000003c RSI: 0000000020000040 RDI: 405a020000000000 [ 743.138897][T21197] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 13:21:38 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x40045564, &(0x7f0000000100)={0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x3f00}, {}, @rumble}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) [ 743.138905][T21197] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fd5575976d4 [ 743.138917][T21197] R13: 00000000004c0c65 R14: 00000000004d4750 R15: 0000000000000003 13:21:38 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x40045564, &(0x7f0000000100)={0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x4000}, {}, @rumble}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) 13:21:38 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x4004556e, &(0x7f0000000100)={0x0, 0x0, {0x0, 0x0, 0x0, {}, {}, @rumble={0x8}}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) [ 743.334308][ C0] net_ratelimit: 8 callbacks suppressed [ 743.334315][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 743.345849][ C0] protocol 88fb is buggy, dev hsr_slave_1 13:21:38 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x4004556d, &(0x7f0000000100)={0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x3f00}, {}, @rumble}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) 13:21:38 executing program 4 (fault-call:0 fault-nth:49): bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x7880, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000, 0x0, 0x0, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x13]}, 0x3c) 13:21:38 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x40045564, &(0x7f0000000100)={0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0xff00}, {}, @rumble}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) 13:21:38 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x4004556e, &(0x7f0000000100)={0x0, 0x0, {0x0, 0x0, 0x0, {}, {}, @rumble={0x300}}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) 13:21:38 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x4004556d, &(0x7f0000000100)={0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x4000}, {}, @rumble}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) [ 743.604718][T21228] FAULT_INJECTION: forcing a failure. [ 743.604718][T21228] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 743.651999][T21228] CPU: 0 PID: 21228 Comm: syz-executor.4 Not tainted 5.4.0-syzkaller #0 [ 743.660386][T21228] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 743.670496][T21228] Call Trace: [ 743.673808][T21228] dump_stack+0x197/0x210 [ 743.678173][T21228] should_fail.cold+0xa/0x15 [ 743.682792][T21228] ? fault_create_debugfs_attr+0x180/0x180 [ 743.688621][T21228] ? ___might_sleep+0x163/0x2c0 [ 743.693507][T21228] should_fail_alloc_page+0x50/0x60 [ 743.698739][T21228] __alloc_pages_nodemask+0x1a1/0x910 [ 743.704231][T21228] ? __alloc_pages_slowpath+0x2920/0x2920 [ 743.709986][T21228] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 743.716279][T21228] ? find_next_bit+0x107/0x130 [ 743.721075][T21228] pcpu_populate_chunk+0xf8/0x940 [ 743.726144][T21228] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 743.731920][T21228] ? find_next_bit+0x17/0x130 [ 743.736627][T21228] pcpu_alloc+0xd5b/0x1380 [ 743.736655][T21228] ? pcpu_alloc_area+0x820/0x820 [ 743.736670][T21228] ? bpf_map_area_alloc+0x20/0x30 [ 743.736694][T21228] __alloc_percpu_gfp+0x28/0x30 [ 743.736709][T21228] htab_map_alloc+0xdb9/0x11c0 [ 743.736738][T21228] ? htab_map_update_elem+0xca0/0xca0 [ 743.736753][T21228] __do_sys_bpf+0x478/0x37b0 [ 743.736771][T21228] ? bpf_prog_load+0x18a0/0x18a0 [ 743.736790][T21228] ? __kasan_check_write+0x14/0x20 [ 743.746144][T21228] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 743.746160][T21228] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 743.746176][T21228] ? wait_for_completion+0x440/0x440 [ 743.746202][T21228] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 743.746230][T21228] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 743.746246][T21228] ? do_syscall_64+0x26/0x790 [ 743.746262][T21228] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 743.746274][T21228] ? do_syscall_64+0x26/0x790 [ 743.746300][T21228] __x64_sys_bpf+0x73/0xb0 [ 743.766357][T21228] do_syscall_64+0xfa/0x790 [ 743.766381][T21228] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 743.766396][T21228] RIP: 0033:0x45a679 [ 743.766411][T21228] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 743.766418][T21228] RSP: 002b:00007fd557596c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 743.766431][T21228] RAX: ffffffffffffffda RBX: 00007fd557596c90 RCX: 000000000045a679 [ 743.766440][T21228] RDX: 000000000000003c RSI: 0000000020000040 RDI: 405a020000000000 [ 743.766449][T21228] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 13:21:39 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x4004556e, &(0x7f0000000100)={0x0, 0x0, {0x0, 0x0, 0x0, {}, {}, @rumble={0x500}}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) [ 743.766457][T21228] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fd5575976d4 [ 743.766464][T21228] R13: 00000000004c0c65 R14: 00000000004d4750 R15: 0000000000000003 13:21:39 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x40045564, &(0x7f0000000100)={0x0, 0x0, {0x0, 0x0, 0x0, {}, {}, @rumble}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) 13:21:39 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x4004556d, &(0x7f0000000100)={0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0xff00}, {}, @rumble}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) 13:21:39 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x100, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000780)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000040)={'nr0\x01\x00', 0x1132}) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'nr0\x01\x00', 0x7132}) close(r1) 13:21:39 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x4004556e, &(0x7f0000000100)={0x0, 0x0, {0x0, 0x0, 0x0, {}, {}, @rumble={0x600}}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) 13:21:39 executing program 4 (fault-call:0 fault-nth:50): bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x7880, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000, 0x0, 0x0, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x13]}, 0x3c) 13:21:39 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000000)={0xfffc, 0x7, 0x1000}, 0x4) recvmmsg(r0, &(0x7f0000001d00)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}, 0xfffffffc}], 0x2, 0x0, 0x0) setsockopt$SO_TIMESTAMP(r0, 0x1, 0x23, &(0x7f0000000040)=0x9, 0x4) r1 = socket$inet6(0xa, 0x3, 0x80) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") 13:21:39 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x4004556d, &(0x7f0000000100)={0x0, 0x0, {0x0, 0x0, 0x0, {}, {}, @rumble}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) 13:21:39 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x40045564, &(0x7f0000000100)={0x0, 0x0, {0x0, 0x0, 0x0, {}, {0x2}, @rumble}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) [ 744.476757][T21257] FAULT_INJECTION: forcing a failure. [ 744.476757][T21257] name fail_page_alloc, interval 1, probability 0, space 0, times 0 13:21:39 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x40045564, &(0x7f0000000100)={0x0, 0x0, {0x0, 0x0, 0x0, {}, {0x3}, @rumble}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) 13:21:39 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x4004556e, &(0x7f0000000100)={0x0, 0x0, {0x0, 0x0, 0x0, {}, {}, @rumble={0x700}}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) 13:21:39 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x4004556d, &(0x7f0000000100)={0x0, 0x0, {0x0, 0x0, 0x0, {}, {0x2}, @rumble}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) [ 744.524320][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 744.530217][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 744.574684][T21257] CPU: 1 PID: 21257 Comm: syz-executor.4 Not tainted 5.4.0-syzkaller #0 [ 744.583077][T21257] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 744.593184][T21257] Call Trace: [ 744.596508][T21257] dump_stack+0x197/0x210 [ 744.600873][T21257] should_fail.cold+0xa/0x15 [ 744.605496][T21257] ? fault_create_debugfs_attr+0x180/0x180 [ 744.611332][T21257] ? ___might_sleep+0x163/0x2c0 [ 744.611359][T21257] should_fail_alloc_page+0x50/0x60 [ 744.611376][T21257] __alloc_pages_nodemask+0x1a1/0x910 [ 744.611398][T21257] ? __alloc_pages_slowpath+0x2920/0x2920 [ 744.611423][T21257] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 744.611443][T21257] ? find_next_bit+0x107/0x130 [ 744.621504][T21257] pcpu_populate_chunk+0xf8/0x940 [ 744.621521][T21257] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 744.621538][T21257] ? find_next_bit+0x17/0x130 [ 744.621562][T21257] pcpu_alloc+0xd5b/0x1380 [ 744.621587][T21257] ? pcpu_alloc_area+0x820/0x820 [ 744.632760][T21257] ? bpf_map_area_alloc+0x20/0x30 [ 744.632791][T21257] __alloc_percpu_gfp+0x28/0x30 [ 744.632808][T21257] htab_map_alloc+0xdb9/0x11c0 [ 744.632842][T21257] ? htab_map_update_elem+0xca0/0xca0 [ 744.643849][T21257] __do_sys_bpf+0x478/0x37b0 [ 744.643872][T21257] ? bpf_prog_load+0x18a0/0x18a0 [ 744.643888][T21257] ? __kasan_check_write+0x14/0x20 [ 744.643907][T21257] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 744.643923][T21257] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 744.643944][T21257] ? wait_for_completion+0x440/0x440 [ 744.654736][T21257] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 744.654770][T21257] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 744.654786][T21257] ? do_syscall_64+0x26/0x790 [ 744.654803][T21257] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 744.654816][T21257] ? do_syscall_64+0x26/0x790 [ 744.654838][T21257] __x64_sys_bpf+0x73/0xb0 [ 744.654852][T21257] do_syscall_64+0xfa/0x790 [ 744.654872][T21257] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 744.663958][T21257] RIP: 0033:0x45a679 13:21:40 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x40045564, &(0x7f0000000100)={0x0, 0x0, {0x0, 0x0, 0x0, {}, {0x4}, @rumble}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) [ 744.663974][T21257] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 744.663982][T21257] RSP: 002b:00007fd557596c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 744.663997][T21257] RAX: ffffffffffffffda RBX: 00007fd557596c90 RCX: 000000000045a679 [ 744.664007][T21257] RDX: 000000000000003c RSI: 0000000020000040 RDI: 405a020000000000 [ 744.664016][T21257] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 744.664025][T21257] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fd5575976d4 [ 744.664034][T21257] R13: 00000000004c0c65 R14: 00000000004d4750 R15: 0000000000000003 13:21:40 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x4004556d, &(0x7f0000000100)={0x0, 0x0, {0x0, 0x0, 0x0, {}, {0x3}, @rumble}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) 13:21:40 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x40045564, &(0x7f0000000100)={0x0, 0x0, {0x0, 0x0, 0x0, {}, {0x5}, @rumble}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) [ 745.004339][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 745.010219][ C1] protocol 88fb is buggy, dev hsr_slave_1 13:21:40 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000780)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000040)={'nr0\x01\x00', 0x1132}) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'nr0\x01\x00', 0x1000}) close(r1) 13:21:40 executing program 4 (fault-call:0 fault-nth:51): bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x7880, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000, 0x0, 0x0, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x13]}, 0x3c) 13:21:40 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x4004556d, &(0x7f0000000100)={0x0, 0x0, {0x0, 0x0, 0x0, {}, {0x4}, @rumble}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) 13:21:40 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x4004556e, &(0x7f0000000100)={0x0, 0x0, {0x0, 0x0, 0x0, {}, {}, @rumble={0x4000}}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) 13:21:40 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x40045564, &(0x7f0000000100)={0x0, 0x0, {0x0, 0x0, 0x0, {}, {0x6}, @rumble}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) 13:21:40 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) r1 = socket$inet(0xa, 0x801, 0x84) connect$inet(r1, &(0x7f0000004cc0)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) setsockopt$inet_MCAST_MSFILTER(r0, 0x0, 0x30, &(0x7f0000000200)=ANY=[@ANYBLOB="030000000006000000004e23ac1414bb000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000020000000400000002004e21ffffffff00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002004e21ac1e090100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002004e24e000000100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002004e2400"/656], 0x290) r2 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r2, &(0x7f0000000180), 0x27a4eaa51029717, 0x0) r3 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r3, &(0x7f0000000180), 0x0, 0xc000) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(r3, 0x84, 0x7c, &(0x7f0000000000)={0x0, 0x8, 0x7}, &(0x7f0000000080)=0x8) getsockopt$inet_sctp6_SCTP_ASSOCINFO(r2, 0x84, 0x1, &(0x7f00000004c0)={r4, 0x0, 0x0, 0x3, 0x6, 0x5}, &(0x7f0000000500)=0x14) r5 = socket$inet(0xa, 0x801, 0x84) connect$inet(r5, &(0x7f0000004cc0)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r5, 0x84, 0x9, &(0x7f00000000c0)={0x0, @in={{0x2, 0x0, @rand_addr=0xac14ffbb}}}, &(0x7f0000000180)=0x98) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r5, 0x84, 0x9, &(0x7f00000000c0)={0x0, @in={{0x2, 0x0, @rand_addr=0xac14ffbb}}}, &(0x7f0000000180)=0x98) recvmmsg(r1, &(0x7f0000001d00)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x150}}, {{0x0, 0xffffff83, 0x0}, 0xfffffffe}], 0x2, 0x0, 0x0) setsockopt$SO_TIMESTAMP(r0, 0x1, 0x23, &(0x7f0000000040)=0x9, 0x4) r6 = socket$inet6(0xa, 0x400000000001, 0x0) bind$inet6(r6, &(0x7f0000fa0fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r6, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r7 = open(&(0x7f0000000200)='./file0\x00', 0x141042, 0x82) setsockopt$SO_TIMESTAMPING(r6, 0x1, 0x25, &(0x7f00000001c0)=0x4, 0x4) timerfd_gettime(r7, &(0x7f0000000040)) ftruncate(r7, 0x7e) sendfile(r6, r7, &(0x7f00000000c0), 0x8000fffffffe) ioctl$SNDRV_PCM_IOCTL_STATUS(r7, 0x80984120, &(0x7f0000000540)) r8 = socket$inet6(0xa, 0x80003, 0x80) ioctl(r8, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") [ 745.636359][T21300] FAULT_INJECTION: forcing a failure. [ 745.636359][T21300] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 745.688943][T21300] CPU: 0 PID: 21300 Comm: syz-executor.4 Not tainted 5.4.0-syzkaller #0 [ 745.697447][T21300] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 745.707517][T21300] Call Trace: [ 745.707549][T21300] dump_stack+0x197/0x210 [ 745.707576][T21300] should_fail.cold+0xa/0x15 [ 745.707598][T21300] ? fault_create_debugfs_attr+0x180/0x180 [ 745.707615][T21300] ? ___might_sleep+0x163/0x2c0 [ 745.707640][T21300] should_fail_alloc_page+0x50/0x60 [ 745.707654][T21300] __alloc_pages_nodemask+0x1a1/0x910 [ 745.707676][T21300] ? __alloc_pages_slowpath+0x2920/0x2920 [ 745.719993][T21300] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 745.735888][T21300] ? find_next_bit+0x107/0x130 [ 745.735912][T21300] pcpu_populate_chunk+0xf8/0x940 [ 745.735928][T21300] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 745.735942][T21300] ? find_next_bit+0x17/0x130 [ 745.735967][T21300] pcpu_alloc+0xd5b/0x1380 [ 745.735990][T21300] ? pcpu_alloc_area+0x820/0x820 [ 745.736010][T21300] ? bpf_map_area_alloc+0x20/0x30 [ 745.747271][T21300] __alloc_percpu_gfp+0x28/0x30 [ 745.747291][T21300] htab_map_alloc+0xdb9/0x11c0 [ 745.747324][T21300] ? htab_map_update_elem+0xca0/0xca0 [ 745.758369][T21300] __do_sys_bpf+0x478/0x37b0 [ 745.758390][T21300] ? bpf_prog_load+0x18a0/0x18a0 [ 745.758404][T21300] ? __kasan_check_write+0x14/0x20 [ 745.758419][T21300] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 745.758435][T21300] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 745.758451][T21300] ? wait_for_completion+0x440/0x440 13:21:41 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x4004556e, &(0x7f0000000100)={0x0, 0x0, {0x0, 0x0, 0x0, {}, {}, @rumble={0xff00}}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) 13:21:41 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x40045564, &(0x7f0000000100)={0x0, 0x0, {0x0, 0x0, 0x0, {}, {0x7}, @rumble}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) [ 745.758475][T21300] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 745.758504][T21300] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 745.758518][T21300] ? do_syscall_64+0x26/0x790 [ 745.758531][T21300] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 745.758550][T21300] ? do_syscall_64+0x26/0x790 [ 745.769352][T21300] __x64_sys_bpf+0x73/0xb0 [ 745.769375][T21300] do_syscall_64+0xfa/0x790 [ 745.769402][T21300] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 745.769421][T21300] RIP: 0033:0x45a679 13:21:41 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x4004556d, &(0x7f0000000100)={0x0, 0x0, {0x0, 0x0, 0x0, {}, {0x5}, @rumble}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) [ 745.818729][T21300] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 745.829574][T21300] RSP: 002b:00007fd557596c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 745.851441][T21300] RAX: ffffffffffffffda RBX: 00007fd557596c90 RCX: 000000000045a679 [ 745.851451][T21300] RDX: 000000000000003c RSI: 0000000020000040 RDI: 405a020000000000 [ 745.851459][T21300] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 745.851467][T21300] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fd5575976d4 [ 745.851476][T21300] R13: 00000000004c0c65 R14: 00000000004d4750 R15: 0000000000000003 13:21:41 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x4004556d, &(0x7f0000000100)={0x0, 0x0, {0x0, 0x0, 0x0, {}, {0x6}, @rumble}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) 13:21:41 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x4004556e, &(0x7f0000000100)={0x0, 0x0, {0x0, 0x0, 0x0, {}, {}, @rumble}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) 13:21:41 executing program 4 (fault-call:0 fault-nth:52): bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x7880, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000, 0x0, 0x0, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x13]}, 0x3c) [ 746.257956][T21324] FAULT_INJECTION: forcing a failure. [ 746.257956][T21324] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 746.275958][T21324] CPU: 1 PID: 21324 Comm: syz-executor.4 Not tainted 5.4.0-syzkaller #0 [ 746.284327][T21324] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 746.294395][T21324] Call Trace: [ 746.294422][T21324] dump_stack+0x197/0x210 [ 746.294449][T21324] should_fail.cold+0xa/0x15 [ 746.294469][T21324] ? fault_create_debugfs_attr+0x180/0x180 [ 746.294486][T21324] ? ___might_sleep+0x163/0x2c0 [ 746.294512][T21324] should_fail_alloc_page+0x50/0x60 [ 746.294530][T21324] __alloc_pages_nodemask+0x1a1/0x910 [ 746.294555][T21324] ? __alloc_pages_slowpath+0x2920/0x2920 [ 746.294582][T21324] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 746.294598][T21324] ? find_next_bit+0x107/0x130 [ 746.294617][T21324] pcpu_populate_chunk+0xf8/0x940 [ 746.294636][T21324] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 746.312690][T21324] ? find_next_bit+0x17/0x130 [ 746.312717][T21324] pcpu_alloc+0xd5b/0x1380 [ 746.312740][T21324] ? pcpu_alloc_area+0x820/0x820 [ 746.333978][T21324] ? bpf_map_area_alloc+0x20/0x30 [ 746.334007][T21324] __alloc_percpu_gfp+0x28/0x30 [ 746.334026][T21324] htab_map_alloc+0xdb9/0x11c0 [ 746.360496][T21324] ? htab_map_update_elem+0xca0/0xca0 [ 746.360514][T21324] __do_sys_bpf+0x478/0x37b0 [ 746.360534][T21324] ? bpf_prog_load+0x18a0/0x18a0 [ 746.389865][T21324] ? __kasan_check_write+0x14/0x20 [ 746.389885][T21324] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 746.389899][T21324] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 746.389917][T21324] ? wait_for_completion+0x440/0x440 [ 746.420641][T21324] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 746.426926][T21324] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 746.432396][T21324] ? do_syscall_64+0x26/0x790 [ 746.437089][T21324] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 746.443167][T21324] ? do_syscall_64+0x26/0x790 [ 746.447873][T21324] __x64_sys_bpf+0x73/0xb0 [ 746.452306][T21324] do_syscall_64+0xfa/0x790 [ 746.456830][T21324] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 746.456842][T21324] RIP: 0033:0x45a679 [ 746.456857][T21324] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 746.456864][T21324] RSP: 002b:00007fd557596c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 746.456878][T21324] RAX: ffffffffffffffda RBX: 00007fd557596c90 RCX: 000000000045a679 13:21:41 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000780)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000040)={'nr0\x01\x00', 0x1132}) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'nr0\x01\x00', 0x7132}) close(r1) r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x81fd) write$P9_RXATTRCREATE(r2, &(0x7f0000000080)={0x7, 0x21, 0x2}, 0x7) 13:21:41 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x40045564, &(0x7f0000000100)={0x0, 0x0, {0x0, 0x0, 0x0, {}, {0x8}, @rumble}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) 13:21:41 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x4004556d, &(0x7f0000000100)={0x0, 0x0, {0x0, 0x0, 0x0, {}, {0x7}, @rumble}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) 13:21:41 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x4004556e, &(0x7f0000000100)={0x0, 0x0, {0x0, 0x0, 0x0, {}, {}, @rumble={0x0, 0x2}}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) 13:21:41 executing program 4 (fault-call:0 fault-nth:53): bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x7880, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000, 0x0, 0x0, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x13]}, 0x3c) [ 746.456886][T21324] RDX: 000000000000003c RSI: 0000000020000040 RDI: 405a020000000000 [ 746.456894][T21324] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 746.456901][T21324] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fd5575976d4 [ 746.456910][T21324] R13: 00000000004c0c65 R14: 00000000004d4750 R15: 0000000000000003 13:21:41 executing program 5: recvmmsg(0xffffffffffffffff, &(0x7f0000001d00)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0, 0x0, 0x0, 0x3df}}], 0x2, 0x0, 0x0) setsockopt$SO_TIMESTAMP(0xffffffffffffffff, 0x1, 0x23, &(0x7f0000000040)=0x9, 0x4) r0 = socket$inet6(0xa, 0x80003, 0x80) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") r1 = socket(0x10, 0x80002, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000600)={{{@in=@multicast1, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6}, 0x0, @in6=@mcast1}}, &(0x7f0000000700)=0xe8) r3 = socket(0xa, 0x2, 0x0) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setreuid(0x0, r4) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000740)={{{@in=@multicast2, @in6=@ipv4, 0x4e20, 0x0, 0x4e20, 0x3f, 0x0, 0x20, 0x20, 0x62, r2, r4}, {0x4, 0x4, 0x1ff, 0x1, 0x304a, 0x8, 0x7ff, 0x5}, {0x66, 0x1ff, 0x7bf, 0x9c5d}, 0x3f, 0x6e6bba, 0x0, 0x0, 0x3, 0x1}, {{@in6=@local, 0x4d2, 0x6c}, 0xa, @in=@remote, 0x3500, 0x2, 0x2, 0x6, 0x24000, 0x20, 0xffffffff}}, 0xe8) 13:21:41 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x4004556d, &(0x7f0000000100)={0x0, 0x0, {0x0, 0x0, 0x0, {}, {0x8}, @rumble}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) 13:21:41 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x40045564, &(0x7f0000000100)={0x0, 0x0, {0x0, 0x0, 0x0, {}, {0x300}, @rumble}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) 13:21:41 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x4004556e, &(0x7f0000000100)={0x0, 0x0, {0x0, 0x0, 0x0, {}, {}, @rumble={0x0, 0x3}}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) [ 746.725121][T21341] FAULT_INJECTION: forcing a failure. [ 746.725121][T21341] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 746.788653][T21341] CPU: 1 PID: 21341 Comm: syz-executor.4 Not tainted 5.4.0-syzkaller #0 [ 746.797055][T21341] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 746.807645][T21341] Call Trace: [ 746.810958][T21341] dump_stack+0x197/0x210 [ 746.815401][T21341] should_fail.cold+0xa/0x15 [ 746.820025][T21341] ? fault_create_debugfs_attr+0x180/0x180 [ 746.826050][T21341] ? ___might_sleep+0x163/0x2c0 [ 746.830930][T21341] should_fail_alloc_page+0x50/0x60 13:21:42 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) r1 = syz_open_dev$audion(&(0x7f0000000080)='/dev/audio#\x00', 0x40, 0x28020) getpeername$unix(r1, &(0x7f00000000c0)=@abs, &(0x7f0000000140)=0x6e) recvmmsg(r0, &(0x7f0000001d00)=[{{0x0, 0xffffffffffffffbc, 0x0}}, {{0x0, 0x0, 0x0}}], 0x2, 0x0, 0x0) setsockopt$SO_TIMESTAMP(r0, 0x1, 0x23, &(0x7f0000000040)=0x9, 0x4) ioctl$sock_SIOCADDDLCI(0xffffffffffffffff, 0x8980, &(0x7f0000000000)={'veth1_to_team\x00', 0x9a0}) r2 = socket$inet6(0xa, 0x80003, 0x80) ioctl(r2, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") [ 746.837908][T21341] __alloc_pages_nodemask+0x1a1/0x910 [ 746.843529][T21341] ? __alloc_pages_slowpath+0x2920/0x2920 [ 746.849280][T21341] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 746.855557][T21341] ? find_next_bit+0x107/0x130 [ 746.860353][T21341] pcpu_populate_chunk+0xf8/0x940 [ 746.865400][T21341] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 746.871148][T21341] ? find_next_bit+0x17/0x130 [ 746.875857][T21341] pcpu_alloc+0xd5b/0x1380 [ 746.880298][T21341] ? pcpu_alloc_area+0x820/0x820 [ 746.885253][T21341] ? bpf_map_area_alloc+0x20/0x30 [ 746.890338][T21341] __alloc_percpu_gfp+0x28/0x30 [ 746.895295][T21341] htab_map_alloc+0xdb9/0x11c0 [ 746.900165][T21341] ? htab_map_update_elem+0xca0/0xca0 [ 746.905560][T21341] __do_sys_bpf+0x478/0x37b0 [ 746.910178][T21341] ? bpf_prog_load+0x18a0/0x18a0 [ 746.919723][T21341] ? __kasan_check_write+0x14/0x20 [ 746.924870][T21341] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 746.930459][T21341] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 746.935791][T21341] ? wait_for_completion+0x440/0x440 [ 746.941107][T21341] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 746.947390][T21341] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 746.952880][T21341] ? do_syscall_64+0x26/0x790 [ 746.952899][T21341] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 746.952916][T21341] ? do_syscall_64+0x26/0x790 [ 746.968419][T21341] __x64_sys_bpf+0x73/0xb0 [ 746.972904][T21341] do_syscall_64+0xfa/0x790 [ 746.977432][T21341] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 746.983339][T21341] RIP: 0033:0x45a679 [ 746.983355][T21341] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 746.983368][T21341] RSP: 002b:00007fd557596c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 747.006938][T21341] RAX: ffffffffffffffda RBX: 00007fd557596c90 RCX: 000000000045a679 [ 747.006947][T21341] RDX: 000000000000003c RSI: 0000000020000040 RDI: 405a020000000000 [ 747.006956][T21341] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 13:21:42 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x4004556e, &(0x7f0000000100)={0x0, 0x0, {0x0, 0x0, 0x0, {}, {}, @rumble={0x0, 0x4}}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) [ 747.006964][T21341] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fd5575976d4 [ 747.006973][T21341] R13: 00000000004c0c65 R14: 00000000004d4750 R15: 0000000000000003 13:21:42 executing program 4 (fault-call:0 fault-nth:54): bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x7880, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000, 0x0, 0x0, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x13]}, 0x3c) [ 747.218813][T21359] FAULT_INJECTION: forcing a failure. [ 747.218813][T21359] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 747.246117][T21359] CPU: 1 PID: 21359 Comm: syz-executor.4 Not tainted 5.4.0-syzkaller #0 [ 747.254493][T21359] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 747.254500][T21359] Call Trace: [ 747.254527][T21359] dump_stack+0x197/0x210 [ 747.254552][T21359] should_fail.cold+0xa/0x15 [ 747.254573][T21359] ? fault_create_debugfs_attr+0x180/0x180 [ 747.254591][T21359] ? ___might_sleep+0x163/0x2c0 [ 747.254615][T21359] should_fail_alloc_page+0x50/0x60 [ 747.254633][T21359] __alloc_pages_nodemask+0x1a1/0x910 [ 747.254662][T21359] ? __alloc_pages_slowpath+0x2920/0x2920 [ 747.254687][T21359] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 747.254706][T21359] ? find_next_bit+0x107/0x130 [ 747.254730][T21359] pcpu_populate_chunk+0xf8/0x940 [ 747.254745][T21359] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 747.254765][T21359] ? find_next_bit+0x17/0x130 [ 747.268124][T21359] pcpu_alloc+0xd5b/0x1380 [ 747.268150][T21359] ? pcpu_alloc_area+0x820/0x820 [ 747.277037][T21359] ? bpf_map_area_alloc+0x20/0x30 [ 747.277063][T21359] __alloc_percpu_gfp+0x28/0x30 [ 747.277077][T21359] htab_map_alloc+0xdb9/0x11c0 [ 747.277110][T21359] ? htab_map_update_elem+0xca0/0xca0 [ 747.277125][T21359] __do_sys_bpf+0x478/0x37b0 [ 747.277143][T21359] ? bpf_prog_load+0x18a0/0x18a0 [ 747.277156][T21359] ? __kasan_check_write+0x14/0x20 [ 747.277170][T21359] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 747.277189][T21359] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 747.335293][T21359] ? wait_for_completion+0x440/0x440 [ 747.335319][T21359] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 747.335351][T21359] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 747.335364][T21359] ? do_syscall_64+0x26/0x790 [ 747.335380][T21359] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 747.335392][T21359] ? do_syscall_64+0x26/0x790 [ 747.335412][T21359] __x64_sys_bpf+0x73/0xb0 [ 747.375160][T21359] do_syscall_64+0xfa/0x790 [ 747.375185][T21359] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 747.375198][T21359] RIP: 0033:0x45a679 [ 747.375214][T21359] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 747.375221][T21359] RSP: 002b:00007fd557596c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 747.375235][T21359] RAX: ffffffffffffffda RBX: 00007fd557596c90 RCX: 000000000045a679 [ 747.375243][T21359] RDX: 000000000000003c RSI: 0000000020000040 RDI: 405a020000000000 [ 747.375251][T21359] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 747.375259][T21359] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fd5575976d4 [ 747.375267][T21359] R13: 00000000004c0c65 R14: 00000000004d4750 R15: 0000000000000003 13:21:43 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x4004556d, &(0x7f0000000100)={0x0, 0x0, {0x0, 0x0, 0x0, {}, {0x300}, @rumble}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) 13:21:43 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x40045564, &(0x7f0000000100)={0x0, 0x0, {0x0, 0x0, 0x0, {}, {0x500}, @rumble}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) 13:21:43 executing program 5: r0 = syz_open_dev$vcsa(&(0x7f00000000c0)='\f,\x00\x00\xedF=\xc5>#\x00', 0x505, 0x0) setsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r0, 0x84, 0x12, &(0x7f0000000080)=0x7f, 0x4) r1 = socket$packet(0x11, 0x3, 0x300) recvmmsg(r1, &(0x7f0000001d00)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}], 0x2, 0x0, 0x0) setsockopt$SO_TIMESTAMP(r1, 0x1, 0x23, &(0x7f0000000040)=0x9, 0x4) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") 13:21:43 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x4004556e, &(0x7f0000000100)={0x0, 0x0, {0x0, 0x0, 0x0, {}, {}, @rumble={0x0, 0x5}}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) 13:21:43 executing program 4 (fault-call:0 fault-nth:55): bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x7880, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000, 0x0, 0x0, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x13]}, 0x3c) 13:21:43 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000780)='/dev/net/tun\x00', 0x24000, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000040)={'nr0\x01\x00', 0x1132}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xa}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(0xffffffffffffffff, 0xc0a85320, 0x0) sendmsg$key(0xffffffffffffffff, 0x0, 0x0) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x80000000000002, &(0x7f0000000180)=0x80, 0x4) bind$inet(r2, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$RXRPC_SECURITY_KEYRING(0xffffffffffffffff, 0x110, 0x2, 0x0, 0x0) r3 = socket$isdn_base(0x22, 0x3, 0x0) ioctl$sock_SIOCGIFVLAN_SET_VLAN_INGRESS_PRIORITY_CMD(r3, 0x8982, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f0000000040)='bbr\x00', 0x4) sendto$inet(r2, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r2, 0x1, 0x8, &(0x7f00000003c0), 0x4) prctl$PR_SET_FPEXC(0xc, 0x0) syz_open_dev$media(0x0, 0xc559, 0x400) socket$packet(0x11, 0x0, 0x300) write$binfmt_elf64(r2, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0x2bcf) shutdown(r2, 0x1) recvmsg(r2, &(0x7f0000001440)={0x0, 0xa, &(0x7f00000015c0)=[{&(0x7f0000001600)=""/4096, 0xf99e}], 0x1, 0x0, 0xff96ce4aaaa47475, 0xd909}, 0x100) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'nr0\x01\x00', 0x7132}) ioctl$TUNSETCARRIER(r1, 0x400454e2, &(0x7f0000000080)=0x1) r4 = socket$inet(0xa, 0x801, 0x84) connect$inet(r4, &(0x7f0000004cc0)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r4, 0x84, 0x9, &(0x7f00000000c0)={0x0, @in={{0x2, 0x0, @rand_addr=0xac14ffbb}}}, &(0x7f0000000180)=0x98) r5 = socket$inet(0xa, 0x801, 0x84) connect$inet(r5, &(0x7f0000004cc0)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r5, 0x84, 0x9, &(0x7f00000000c0)={0x0, @in6={{0xa, 0x4e24, 0x0, @rand_addr="db640c8998553a4d6f752ed34fd6c087", 0x8}}}, &(0x7f0000000180)=0x98) close(r5) 13:21:43 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x4004556d, &(0x7f0000000100)={0x0, 0x0, {0x0, 0x0, 0x0, {}, {0x500}, @rumble}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) 13:21:43 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x40045564, &(0x7f0000000100)={0x0, 0x0, {0x0, 0x0, 0x0, {}, {0x600}, @rumble}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) [ 747.953010][T21381] FAULT_INJECTION: forcing a failure. [ 747.953010][T21381] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 748.043707][T21381] CPU: 0 PID: 21381 Comm: syz-executor.4 Not tainted 5.4.0-syzkaller #0 [ 748.052195][T21381] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 748.063103][T21381] Call Trace: [ 748.066517][T21381] dump_stack+0x197/0x210 [ 748.070986][T21381] should_fail.cold+0xa/0x15 [ 748.077608][T21381] ? fault_create_debugfs_attr+0x180/0x180 [ 748.083442][T21381] ? ___might_sleep+0x163/0x2c0 [ 748.088416][T21381] should_fail_alloc_page+0x50/0x60 [ 748.094024][T21381] __alloc_pages_nodemask+0x1a1/0x910 [ 748.099487][T21381] ? __alloc_pages_slowpath+0x2920/0x2920 [ 748.105240][T21381] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 748.111506][T21381] ? find_next_bit+0x107/0x130 [ 748.116345][T21381] pcpu_populate_chunk+0xf8/0x940 [ 748.116361][T21381] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 748.116374][T21381] ? find_next_bit+0x17/0x130 [ 748.116393][T21381] pcpu_alloc+0xd5b/0x1380 [ 748.116415][T21381] ? pcpu_alloc_area+0x820/0x820 [ 748.116430][T21381] ? bpf_map_area_alloc+0x20/0x30 [ 748.116454][T21381] __alloc_percpu_gfp+0x28/0x30 [ 748.116470][T21381] htab_map_alloc+0xdb9/0x11c0 [ 748.116498][T21381] ? htab_map_update_elem+0xca0/0xca0 [ 748.127461][T21381] __do_sys_bpf+0x478/0x37b0 [ 748.127486][T21381] ? bpf_prog_load+0x18a0/0x18a0 [ 748.127501][T21381] ? __kasan_check_write+0x14/0x20 [ 748.127518][T21381] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 748.127532][T21381] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 748.127547][T21381] ? wait_for_completion+0x440/0x440 [ 748.127570][T21381] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 748.127597][T21381] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 748.127612][T21381] ? do_syscall_64+0x26/0x790 [ 748.127628][T21381] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 748.127639][T21381] ? do_syscall_64+0x26/0x790 [ 748.127658][T21381] __x64_sys_bpf+0x73/0xb0 [ 748.209455][T21381] do_syscall_64+0xfa/0x790 [ 748.209482][T21381] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 748.209498][T21381] RIP: 0033:0x45a679 13:21:43 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x4004556e, &(0x7f0000000100)={0x0, 0x0, {0x0, 0x0, 0x0, {}, {}, @rumble={0x0, 0x6}}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) [ 748.209516][T21381] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 748.258605][T21381] RSP: 002b:00007fd557596c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 748.258619][T21381] RAX: ffffffffffffffda RBX: 00007fd557596c90 RCX: 000000000045a679 [ 748.258627][T21381] RDX: 000000000000003c RSI: 0000000020000040 RDI: 405a020000000000 [ 748.258635][T21381] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 748.258643][T21381] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fd5575976d4 [ 748.258650][T21381] R13: 00000000004c0c65 R14: 00000000004d4750 R15: 0000000000000003 13:21:43 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x4004556e, &(0x7f0000000100)={0x0, 0x0, {0x0, 0x0, 0x0, {}, {}, @rumble={0x0, 0x7}}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) 13:21:43 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x4004556d, &(0x7f0000000100)={0x0, 0x0, {0x0, 0x0, 0x0, {}, {0x600}, @rumble}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) 13:21:43 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x4004556d, &(0x7f0000000100)={0x0, 0x0, {0x0, 0x0, 0x0, {}, {0x700}, @rumble}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) [ 748.444287][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 748.450122][ C0] protocol 88fb is buggy, dev hsr_slave_1 13:21:43 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x4004556d, &(0x7f0000000100)={0x0, 0x0, {0x0, 0x0, 0x0, {}, {0x3f00}, @rumble}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) 13:21:43 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x40045564, &(0x7f0000000100)={0x0, 0x0, {0x0, 0x0, 0x0, {}, {0x700}, @rumble}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) [ 748.524276][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 748.531030][ C1] protocol 88fb is buggy, dev hsr_slave_1 13:21:43 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) recvmmsg(r0, &(0x7f0000001d00)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}], 0x2, 0x0, 0x0) setsockopt$SO_TIMESTAMP(r0, 0x1, 0x23, &(0x7f0000000040)=0x9, 0x4) getcwd(&(0x7f0000000000)=""/47, 0x2f) r1 = socket$inet6(0xa, 0x80003, 0x80) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") r2 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) ioctl$SIOCX25GFACILITIES(r2, 0x89e2, &(0x7f0000000100)) r3 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/avc/hash_stats\x00', 0x0, 0x0) getsockopt$IPT_SO_GET_ENTRIES(r3, 0x0, 0x41, &(0x7f00000002c0)=ANY=[@ANYBLOB="6e6174000000000000000000000000000000000000000000000000000000000030000000942f9b321016bd308caab31cfce9ce24d3b0048634990719f353af81cb9c3a522e49524e075dadfa0d4a4d644158e2199bb84cc6171233d203a24c4e06b285a43827bf71845c50da42e56732557ac989e4383f5e500edb25f8d4302354479b8c69b9960a5b2488aa2e128ed3b549eac119e64f58e5435e765691f625eff8fce160503bd6a0b406dfcbac137f4db016849f91fb15430557704018b0e3a2b9064d49a6f75d98a7d1bc69d096bad408afc756182292aabdd5f7348518d5dc42fb56b6549f2a339e50578e16d16100aaf5f4251d106493fc29ad7e1a62f16056c1cc8311f327d5a8d4ab79353f70bb612a052c12d02c6a623736944fcb2f3d8e0d16d85fe0c62555257c29b9e0a4322cb4916e24c45fb868cfb4f1e3a3f92fdb5f048a700202ffcc19a613d99901e3c7aec0cc53a2bab65419e2242b6e2f530408cbb4fbf2d8e6cdf8f76b9f84df2d1b5175f88dd5cf44878e34ca9ba284bf6fef81a4bc5f78e4045fdc6694e2fb068255a57962661fe2f12c7d6b5fbc2852c47882513fa7c556a6a0ca2be2c5aaa269c655f29f9b9e66b7136e4e6a3f500e14668adeff12ee6cc7e559ac07f1885eab745e0a57"], &(0x7f0000000140)=0x54) 13:21:43 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x4004556d, &(0x7f0000000100)={0x0, 0x0, {0x0, 0x0, 0x0, {}, {0x4000}, @rumble}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) 13:21:43 executing program 4 (fault-call:0 fault-nth:56): bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x7880, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000, 0x0, 0x0, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x13]}, 0x3c) [ 748.952995][T21420] FAULT_INJECTION: forcing a failure. [ 748.952995][T21420] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 748.966970][T21420] CPU: 1 PID: 21420 Comm: syz-executor.4 Not tainted 5.4.0-syzkaller #0 [ 748.975314][T21420] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 748.986404][T21420] Call Trace: [ 748.986433][T21420] dump_stack+0x197/0x210 [ 748.986454][T21420] should_fail.cold+0xa/0x15 [ 748.986471][T21420] ? fault_create_debugfs_attr+0x180/0x180 [ 748.986487][T21420] ? ___might_sleep+0x163/0x2c0 [ 748.986515][T21420] should_fail_alloc_page+0x50/0x60 [ 748.986529][T21420] __alloc_pages_nodemask+0x1a1/0x910 [ 748.986550][T21420] ? __alloc_pages_slowpath+0x2920/0x2920 [ 749.026824][T21420] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 749.033082][T21420] ? find_next_bit+0x107/0x130 [ 749.038004][T21420] pcpu_populate_chunk+0xf8/0x940 [ 749.043234][T21420] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 749.049069][T21420] ? find_next_bit+0x17/0x130 [ 749.053856][T21420] pcpu_alloc+0xd5b/0x1380 [ 749.058651][T21420] ? pcpu_alloc_area+0x820/0x820 [ 749.063784][T21420] ? bpf_map_area_alloc+0x20/0x30 [ 749.068918][T21420] __alloc_percpu_gfp+0x28/0x30 [ 749.073772][T21420] htab_map_alloc+0xdb9/0x11c0 [ 749.078561][T21420] ? htab_map_update_elem+0xca0/0xca0 [ 749.083965][T21420] __do_sys_bpf+0x478/0x37b0 [ 749.092734][T21420] ? bpf_prog_load+0x18a0/0x18a0 [ 749.097694][T21420] ? __kasan_check_write+0x14/0x20 [ 749.102928][T21420] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 749.109791][T21420] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 749.115160][T21420] ? wait_for_completion+0x440/0x440 [ 749.120444][T21420] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 749.126684][T21420] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 749.132666][T21420] ? do_syscall_64+0x26/0x790 [ 749.137342][T21420] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 749.143391][T21420] ? do_syscall_64+0x26/0x790 [ 749.148079][T21420] __x64_sys_bpf+0x73/0xb0 [ 749.153454][T21420] do_syscall_64+0xfa/0x790 [ 749.157960][T21420] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 749.163835][T21420] RIP: 0033:0x45a679 [ 749.167730][T21420] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 749.188591][T21420] RSP: 002b:00007fd557596c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 749.197485][T21420] RAX: ffffffffffffffda RBX: 00007fd557596c90 RCX: 000000000045a679 [ 749.205477][T21420] RDX: 000000000000003c RSI: 0000000020000040 RDI: 405a020000000000 [ 749.213776][T21420] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 749.221758][T21420] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fd5575976d4 [ 749.229725][T21420] R13: 00000000004c0c65 R14: 00000000004d4750 R15: 0000000000000003 [ 749.238450][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 749.244564][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 749.564384][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 749.570313][ C0] protocol 88fb is buggy, dev hsr_slave_1 13:21:44 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x40045564, &(0x7f0000000100)={0x0, 0x0, {0x0, 0x0, 0x0, {}, {0x3f00}, @rumble}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) 13:21:44 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x4004556e, &(0x7f0000000100)={0x0, 0x0, {0x0, 0x0, 0x0, {}, {}, @rumble={0x0, 0x8}}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) 13:21:44 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x4004556d, &(0x7f0000000100)={0x0, 0x0, {0x0, 0x0, 0x0, {}, {0xff00}, @rumble}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) 13:21:44 executing program 4 (fault-call:0 fault-nth:57): bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x7880, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000, 0x0, 0x0, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x13]}, 0x3c) 13:21:44 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/devnet/tun\x00', 0x0, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000780)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000040)={'nr0\x01\x00', 0x1132}) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'nr0\x01@\x00', 0x7132}) lsetxattr$security_selinux(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='security.selinux\x00', &(0x7f0000000100)='system_u:object_r:inetd_child_exec_t:s0\x00', 0x28, 0x3) r2 = socket$inet(0xa, 0x801, 0x84) connect$inet(r2, &(0x7f0000004cc0)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r2, 0x84, 0x9, &(0x7f00000000c0)={0x0, @in={{0x2, 0x0, @rand_addr=0xac14ffbb}}}, &(0x7f0000000180)=0x98) setsockopt$IP_VS_SO_SET_STOPDAEMON(r2, 0x0, 0x48c, &(0x7f0000000180)={0x2, 'ip6gretap0\x00', 0x1}, 0x18) close(r1) 13:21:44 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x4004556e, &(0x7f0000000100)={0x0, 0x0, {0x0, 0x0, 0x0, {}, {}, @rumble={0x0, 0x300}}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) [ 749.740120][T21431] FAULT_INJECTION: forcing a failure. [ 749.740120][T21431] name fail_page_alloc, interval 1, probability 0, space 0, times 0 13:21:44 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x4004556d, &(0x7f0000000100)={0x0, 0x0, {0x0, 0x0, 0x0, {}, {}, @rumble}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) 13:21:44 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) recvmmsg(r0, &(0x7f0000001d00)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffe16}}], 0x2, 0x0, 0x0) setsockopt$SO_TIMESTAMP(r0, 0x1, 0x23, &(0x7f0000000040)=0x9, 0x4) r1 = socket$inet6(0xa, 0x80003, 0x80) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") [ 749.792593][T21431] CPU: 1 PID: 21431 Comm: syz-executor.4 Not tainted 5.4.0-syzkaller #0 [ 749.802062][T21431] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 749.812124][T21431] Call Trace: [ 749.812147][T21431] dump_stack+0x197/0x210 [ 749.812169][T21431] should_fail.cold+0xa/0x15 [ 749.812186][T21431] ? fault_create_debugfs_attr+0x180/0x180 [ 749.812200][T21431] ? ___might_sleep+0x163/0x2c0 [ 749.812223][T21431] should_fail_alloc_page+0x50/0x60 [ 749.812239][T21431] __alloc_pages_nodemask+0x1a1/0x910 [ 749.812261][T21431] ? __alloc_pages_slowpath+0x2920/0x2920 [ 749.812286][T21431] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 749.812302][T21431] ? find_next_bit+0x107/0x130 [ 749.812325][T21431] pcpu_populate_chunk+0xf8/0x940 [ 749.867623][T21431] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 749.867642][T21431] ? find_next_bit+0x17/0x130 [ 749.867664][T21431] pcpu_alloc+0xd5b/0x1380 [ 749.867687][T21431] ? pcpu_alloc_area+0x820/0x820 [ 749.867703][T21431] ? bpf_map_area_alloc+0x20/0x30 [ 749.867728][T21431] __alloc_percpu_gfp+0x28/0x30 [ 749.867745][T21431] htab_map_alloc+0xdb9/0x11c0 [ 749.867772][T21431] ? htab_map_update_elem+0xca0/0xca0 [ 749.867791][T21431] __do_sys_bpf+0x478/0x37b0 [ 749.907580][T21431] ? bpf_prog_load+0x18a0/0x18a0 [ 749.907600][T21431] ? __kasan_check_write+0x14/0x20 [ 749.922220][T21431] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 749.922236][T21431] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 749.922255][T21431] ? wait_for_completion+0x440/0x440 [ 749.938492][T21431] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 749.944894][T21431] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 749.950437][T21431] ? do_syscall_64+0x26/0x790 [ 749.950459][T21431] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 749.950472][T21431] ? do_syscall_64+0x26/0x790 [ 749.950497][T21431] __x64_sys_bpf+0x73/0xb0 [ 749.970358][T21431] do_syscall_64+0xfa/0x790 [ 749.974885][T21431] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 749.974899][T21431] RIP: 0033:0x45a679 [ 749.974913][T21431] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 749.974920][T21431] RSP: 002b:00007fd557596c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 749.974933][T21431] RAX: ffffffffffffffda RBX: 00007fd557596c90 RCX: 000000000045a679 [ 749.974941][T21431] RDX: 000000000000003c RSI: 0000000020000040 RDI: 405a020000000000 [ 749.974949][T21431] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 13:21:45 executing program 4 (fault-call:0 fault-nth:58): bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x7880, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000, 0x0, 0x0, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x13]}, 0x3c) 13:21:45 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x40045564, &(0x7f0000000100)={0x0, 0x0, {0x0, 0x0, 0x0, {}, {0x4000}, @rumble}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) [ 749.974956][T21431] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fd5575976d4 [ 749.974964][T21431] R13: 00000000004c0c65 R14: 00000000004d4750 R15: 0000000000000003 13:21:45 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x4004556d, &(0x7f0000000100)={0x0, 0x0, {0x0, 0x0, 0x0, {}, {0x0, 0x2}, @rumble}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) 13:21:45 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x4004556e, &(0x7f0000000100)={0x0, 0x0, {0x0, 0x0, 0x0, {}, {}, @rumble={0x0, 0x500}}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) 13:21:45 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) r1 = accept4$netrom(0xffffffffffffffff, &(0x7f0000000340)={{0x3, @netrom}, [@netrom, @remote, @bcast, @netrom, @bcast, @remote, @netrom, @null]}, &(0x7f00000003c0)=0x48, 0x80000) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000000440)={0x5, &(0x7f0000000400)=[{0x6, 0xdf, 0x8, 0xfff}, {0xfff8, 0x1c, 0x80, 0xc6}, {0x400, 0x2, 0x50}, {0x7ff, 0x7f, 0x2b, 0x5}, {0x800, 0x96, 0x2a, 0x62}]}, 0x10) r2 = socket$inet(0xa, 0x801, 0x84) connect$inet(r2, &(0x7f0000004cc0)={0x2, 0x0, @local}, 0x10) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r2, 0x84, 0x9, &(0x7f00000000c0)={0x0, @in={{0x2, 0x0, @rand_addr=0xac14ffbb}}}, &(0x7f0000000180)=0x98) recvmmsg(r2, &(0x7f0000001d00)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffe6e}}], 0x2, 0x0, 0x0) r3 = socket$inet6(0xa, 0x400000000001, 0x0) r4 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) ftruncate(r4, 0x81fd) ioctl$EVIOCGABS2F(r4, 0x8018456f, &(0x7f0000000240)=""/233) bind$inet6(r3, &(0x7f0000fa0fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r3, 0x0, 0xfffffffffffffd3a, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e21, 0x0, @loopback}, 0x1c) r5 = open(&(0x7f0000000200)='./bus\x00', 0x14b1c2, 0x82) setsockopt$SO_TIMESTAMPING(r3, 0x1, 0x25, &(0x7f00000001c0)=0x4, 0x4) timerfd_gettime(r5, &(0x7f0000000040)) ftruncate(r5, 0x7e) sendfile(r3, r5, &(0x7f00000000c0), 0x8000fffffffe) r6 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$VT_DISALLOCATE(r6, 0x5608) ioctl$CAPI_GET_SERIAL(r5, 0xc0044308, &(0x7f0000000100)=0x16) setsockopt$SO_TIMESTAMP(r0, 0x1, 0x23, &(0x7f0000000040)=0x9, 0x4) getrlimit(0xd, &(0x7f0000000000)) r7 = socket$inet6(0xa, 0x80003, 0x80) r8 = getpgrp(0x0) setpriority(0x0, r8, 0x0) r9 = socket$inet(0xa, 0x801, 0x84) connect$inet(r9, &(0x7f0000004cc0)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r9, 0x84, 0x9, &(0x7f00000000c0)={0x0, @in={{0x2, 0x0, @rand_addr=0xac14ffbb}}}, &(0x7f0000000180)=0x98) ioctl$sock_FIOGETOWN(r9, 0x8903, &(0x7f0000000700)=0x0) r11 = syz_open_procfs(r10, &(0x7f0000000600)='uid_map\x00') sendfile(r11, r11, &(0x7f0000000180)=0x74000000, 0x5) ioctl$VIDIOC_S_TUNER(r11, 0x4054561e, &(0x7f0000000140)={0x100, "f6bd78d5f8823bcf81776d734b4985e4080de8cee1e1e393fa5801eb12d2d289", 0x3, 0x8, 0x8, 0x200, 0x8, 0x4, 0x5, 0x368}) r12 = syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x200000) ioctl$BLKIOMIN(r12, 0x1278, &(0x7f00000000c0)) ioctl(r7, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") 13:21:45 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x40045564, &(0x7f0000000100)={0x0, 0x0, {0x0, 0x0, 0x0, {}, {0xff00}, @rumble}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) 13:21:45 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x4004556d, &(0x7f0000000100)={0x0, 0x0, {0x0, 0x0, 0x0, {}, {0x0, 0x3}, @rumble}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) [ 750.341156][T21456] FAULT_INJECTION: forcing a failure. [ 750.341156][T21456] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 750.440103][T21456] CPU: 0 PID: 21456 Comm: syz-executor.4 Not tainted 5.4.0-syzkaller #0 [ 750.449499][T21456] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 750.460014][T21456] Call Trace: [ 750.463338][T21456] dump_stack+0x197/0x210 [ 750.467699][T21456] should_fail.cold+0xa/0x15 [ 750.472354][T21456] ? fault_create_debugfs_attr+0x180/0x180 [ 750.478309][T21456] ? ___might_sleep+0x163/0x2c0 [ 750.483455][T21456] should_fail_alloc_page+0x50/0x60 [ 750.488766][T21456] __alloc_pages_nodemask+0x1a1/0x910 [ 750.494166][T21456] ? __alloc_pages_slowpath+0x2920/0x2920 [ 750.499933][T21456] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 750.499952][T21456] ? find_next_bit+0x107/0x130 [ 750.499973][T21456] pcpu_populate_chunk+0xf8/0x940 [ 750.510963][T21456] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 750.510983][T21456] ? find_next_bit+0x17/0x130 [ 750.511008][T21456] pcpu_alloc+0xd5b/0x1380 [ 750.521822][T21456] ? pcpu_alloc_area+0x820/0x820 [ 750.530846][T21456] ? bpf_map_area_alloc+0x20/0x30 [ 750.530879][T21456] __alloc_percpu_gfp+0x28/0x30 [ 750.530897][T21456] htab_map_alloc+0xdb9/0x11c0 [ 750.540879][T21456] ? htab_map_update_elem+0xca0/0xca0 [ 750.540896][T21456] __do_sys_bpf+0x478/0x37b0 [ 750.540915][T21456] ? bpf_prog_load+0x18a0/0x18a0 [ 750.550514][T21456] ? __kasan_check_write+0x14/0x20 [ 750.550533][T21456] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 750.550548][T21456] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 750.550565][T21456] ? wait_for_completion+0x440/0x440 [ 750.586744][T21456] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 750.593113][T21456] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 750.598861][T21456] ? do_syscall_64+0x26/0x790 [ 750.604268][T21456] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 750.610367][T21456] ? do_syscall_64+0x26/0x790 [ 750.610389][T21456] __x64_sys_bpf+0x73/0xb0 [ 750.610408][T21456] do_syscall_64+0xfa/0x790 [ 750.620028][T21456] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 750.620045][T21456] RIP: 0033:0x45a679 [ 750.630597][T21456] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 750.630606][T21456] RSP: 002b:00007fd557596c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 750.630619][T21456] RAX: ffffffffffffffda RBX: 00007fd557596c90 RCX: 000000000045a679 [ 750.630632][T21456] RDX: 000000000000003c RSI: 0000000020000040 RDI: 405a020000000000 [ 750.654479][T21456] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 13:21:45 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x40045564, &(0x7f0000000100)={0x0, 0x0, {0x0, 0x0, 0x0, {}, {}, @rumble}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) 13:21:45 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000780)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000080)={'nr0\x01\x00', 0x1000}) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'nr0\x01\x00', 0x7132}) close(r1) 13:21:45 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x4004556e, &(0x7f0000000100)={0x0, 0x0, {0x0, 0x0, 0x0, {}, {}, @rumble={0x0, 0x600}}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) [ 750.654488][T21456] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fd5575976d4 [ 750.654496][T21456] R13: 00000000004c0c65 R14: 00000000004d4750 R15: 0000000000000003 13:21:45 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x4004556d, &(0x7f0000000100)={0x0, 0x0, {0x0, 0x0, 0x0, {}, {0x0, 0x4}, @rumble}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) 13:21:45 executing program 4 (fault-call:0 fault-nth:59): bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x7880, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000, 0x0, 0x0, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x13]}, 0x3c) 13:21:46 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x4004556e, &(0x7f0000000100)={0x0, 0x0, {0x0, 0x0, 0x0, {}, {}, @rumble={0x0, 0x700}}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) [ 750.764329][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 750.770175][ C0] protocol 88fb is buggy, dev hsr_slave_1 13:21:46 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x40045564, &(0x7f0000000100)={0x0, 0x0, {0x0, 0x0, 0x0, {}, {0x0, 0x2}, @rumble}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) 13:21:46 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x4004556d, &(0x7f0000000100)={0x0, 0x0, {0x0, 0x0, 0x0, {}, {0x0, 0x5}, @rumble}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) [ 750.972407][T21478] FAULT_INJECTION: forcing a failure. [ 750.972407][T21478] name fail_page_alloc, interval 1, probability 0, space 0, times 0 13:21:46 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) recvmmsg(r0, &(0x7f0000001d00)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}], 0x2, 0x0, 0x0) setsockopt$SO_TIMESTAMP(r0, 0x1, 0x23, &(0x7f0000000040)=0x9, 0x4) r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/tcp6\x00') preadv(r1, &(0x7f0000000000)=[{&(0x7f00000000c0)=""/169, 0x2aa}], 0x1, 0x0) ioctl$ION_IOC_HEAP_QUERY(r1, 0xc0184908, &(0x7f00000000c0)={0x34, 0x0, &(0x7f0000000080)}) r2 = socket$inet6(0xa, 0x80003, 0x80) ioctl(r2, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") ioctl$SNDCTL_DSP_SETFMT(0xffffffffffffffff, 0xc0045005, &(0x7f0000000000)=0x9) 13:21:46 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x4004556e, &(0x7f0000000100)={0x0, 0x0, {0x0, 0x0, 0x0, {}, {}, @rumble={0x0, 0x4000}}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) 13:21:46 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x40045564, &(0x7f0000000100)={0x0, 0x0, {0x0, 0x0, 0x0, {}, {0x0, 0x3}, @rumble}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) [ 751.164403][T21478] CPU: 1 PID: 21478 Comm: syz-executor.4 Not tainted 5.4.0-syzkaller #0 [ 751.173145][T21478] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 751.188132][T21478] Call Trace: [ 751.191453][T21478] dump_stack+0x197/0x210 [ 751.195810][T21478] should_fail.cold+0xa/0x15 [ 751.200877][T21478] ? fault_create_debugfs_attr+0x180/0x180 [ 751.206876][T21478] ? ___might_sleep+0x163/0x2c0 [ 751.206901][T21478] should_fail_alloc_page+0x50/0x60 [ 751.206916][T21478] __alloc_pages_nodemask+0x1a1/0x910 [ 751.206933][T21478] ? __alloc_pages_slowpath+0x2920/0x2920 [ 751.206955][T21478] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 751.206971][T21478] ? find_next_bit+0x107/0x130 [ 751.206991][T21478] pcpu_populate_chunk+0xf8/0x940 [ 751.207003][T21478] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 751.207018][T21478] ? find_next_bit+0x17/0x130 [ 751.207041][T21478] pcpu_alloc+0xd5b/0x1380 13:21:46 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000780)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000040)={'nr0\x01\x00', 0x1132}) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'nr0\x01\x00', 0x7132}) openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0xa0000, 0x0) socket$inet(0x2, 0x4, 0x7) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f00000000c0)={'nlmon0\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="4000000004000000fbffffffb7000000d53f6e400511a26af2d5a1ab1cac9d09cfe294d38a7182cf3043f0ecc72d7a439a35f20fed3837a71678e51a640a84d81ebd34234487ae5d8d1395c57e1dc678cc5d697e39b38753cc9fcdd0cca9245e0227fd9307fd7d3d1609881b6403503d75a5cab5a674385f4ed7da0de7c26114ef7f56a1948a016f25fe9b7153c016ba472d84e14305f0614af52cff9949490cd8907627b8b22b989f67fe9f4251fb97d739cb0a42f3c380685d9a30891236d2100755a061f300"]}) close(r1) [ 751.207064][T21478] ? pcpu_alloc_area+0x820/0x820 [ 751.207078][T21478] ? bpf_map_area_alloc+0x20/0x30 [ 751.207100][T21478] __alloc_percpu_gfp+0x28/0x30 [ 751.207115][T21478] htab_map_alloc+0xdb9/0x11c0 [ 751.207144][T21478] ? htab_map_update_elem+0xca0/0xca0 [ 751.207165][T21478] __do_sys_bpf+0x478/0x37b0 [ 751.207184][T21478] ? bpf_prog_load+0x18a0/0x18a0 [ 751.295564][T21478] ? __kasan_check_write+0x14/0x20 [ 751.300701][T21478] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 751.306274][T21478] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 751.311694][T21478] ? wait_for_completion+0x440/0x440 [ 751.317017][T21478] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 751.323383][T21478] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 751.328875][T21478] ? do_syscall_64+0x26/0x790 [ 751.333960][T21478] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 751.340126][T21478] ? do_syscall_64+0x26/0x790 [ 751.344938][T21478] __x64_sys_bpf+0x73/0xb0 [ 751.349461][T21478] do_syscall_64+0xfa/0x790 [ 751.354042][T21478] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 751.359951][T21478] RIP: 0033:0x45a679 [ 751.363863][T21478] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 751.383945][T21478] RSP: 002b:00007fd557596c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 751.392389][T21478] RAX: ffffffffffffffda RBX: 00007fd557596c90 RCX: 000000000045a679 [ 751.400641][T21478] RDX: 000000000000003c RSI: 0000000020000040 RDI: 405a020000000000 [ 751.408632][T21478] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 751.416694][T21478] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fd5575976d4 [ 751.424743][T21478] R13: 00000000004c0c65 R14: 00000000004d4750 R15: 0000000000000003 13:21:46 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x4004556d, &(0x7f0000000100)={0x0, 0x0, {0x0, 0x0, 0x0, {}, {0x0, 0x6}, @rumble}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) 13:21:46 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x4004556e, &(0x7f0000000100)={0x0, 0x0, {0x0, 0x0, 0x0, {}, {}, @rumble={0x0, 0xff00}}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) 13:21:46 executing program 4 (fault-call:0 fault-nth:60): bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x7880, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000, 0x0, 0x0, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x13]}, 0x3c) 13:21:46 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x40045564, &(0x7f0000000100)={0x0, 0x0, {0x0, 0x0, 0x0, {}, {0x0, 0x4}, @rumble}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) 13:21:46 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x4004556e, &(0x7f0000000100)={0x0, 0x0, {0x0, 0x0, 0x0, {}, {}, @rumble}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) 13:21:46 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x4004556d, &(0x7f0000000100)={0x0, 0x0, {0x0, 0x0, 0x0, {}, {0x0, 0x7}, @rumble}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) 13:21:47 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x40045564, &(0x7f0000000100)={0x0, 0x0, {0x0, 0x0, 0x0, {}, {0x0, 0x5}, @rumble}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) [ 751.817827][T21520] FAULT_INJECTION: forcing a failure. [ 751.817827][T21520] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 751.875800][T21520] CPU: 0 PID: 21520 Comm: syz-executor.4 Not tainted 5.4.0-syzkaller #0 [ 751.884534][T21520] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 751.894862][T21520] Call Trace: [ 751.894890][T21520] dump_stack+0x197/0x210 [ 751.894916][T21520] should_fail.cold+0xa/0x15 [ 751.894938][T21520] ? fault_create_debugfs_attr+0x180/0x180 [ 751.910798][T21520] ? ___might_sleep+0x163/0x2c0 [ 751.910827][T21520] should_fail_alloc_page+0x50/0x60 [ 751.910847][T21520] __alloc_pages_nodemask+0x1a1/0x910 [ 751.934074][T21520] ? __alloc_pages_slowpath+0x2920/0x2920 [ 751.940177][T21520] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 751.946448][T21520] ? find_next_bit+0x107/0x130 [ 751.951243][T21520] pcpu_populate_chunk+0xf8/0x940 [ 751.957164][T21520] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 751.963214][T21520] ? find_next_bit+0x17/0x130 [ 751.963239][T21520] pcpu_alloc+0xd5b/0x1380 [ 751.963265][T21520] ? pcpu_alloc_area+0x820/0x820 [ 751.963280][T21520] ? bpf_map_area_alloc+0x20/0x30 [ 751.963304][T21520] __alloc_percpu_gfp+0x28/0x30 [ 751.988206][T21520] htab_map_alloc+0xdb9/0x11c0 [ 751.993189][T21520] ? htab_map_update_elem+0xca0/0xca0 [ 751.998682][T21520] __do_sys_bpf+0x478/0x37b0 [ 752.003476][T21520] ? bpf_prog_load+0x18a0/0x18a0 [ 752.008619][T21520] ? __kasan_check_write+0x14/0x20 [ 752.013742][T21520] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 752.013762][T21520] ? rcu_read_lock_bh_held+0xb0/0xb0 13:21:47 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x4004556e, &(0x7f0000000100)={0x0, 0x0, {0x0, 0x0, 0x0, {}, {}, @rumble}, {0x2, 0x0, 0x0, {}, {}, @rumble}}) [ 752.013784][T21520] ? wait_for_completion+0x440/0x440 [ 752.030250][T21520] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 752.036538][T21520] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 752.042118][T21520] ? do_syscall_64+0x26/0x790 [ 752.048365][T21520] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 752.048380][T21520] ? do_syscall_64+0x26/0x790 [ 752.048404][T21520] __x64_sys_bpf+0x73/0xb0 [ 752.048421][T21520] do_syscall_64+0xfa/0x790 [ 752.048440][T21520] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 752.048451][T21520] RIP: 0033:0x45a679 [ 752.048465][T21520] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 752.048477][T21520] RSP: 002b:00007fd557596c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 752.060107][T21520] RAX: ffffffffffffffda RBX: 00007fd557596c90 RCX: 000000000045a679 [ 752.060117][T21520] RDX: 000000000000003c RSI: 0000000020000040 RDI: 405a020000000000 [ 752.060124][T21520] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 752.060132][T21520] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fd5575976d4 [ 752.060139][T21520] R13: 00000000004c0c65 R14: 00000000004d4750 R15: 0000000000000003 13:21:47 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) recvmmsg(r0, &(0x7f0000001d00)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}], 0x2, 0x0, 0x0) setsockopt$SO_TIMESTAMP(r0, 0x1, 0x5f, &(0x7f0000000040)=0x9, 0xfffffe1b) r1 = socket$inet6(0xa, 0x80003, 0x80) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") getsockopt$EBT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x81, &(0x7f0000000200)={'filter\x00', 0x0, 0x3, 0x4f, [], 0x5, &(0x7f0000000080)=[{}, {}, {}, {}, {}], &(0x7f0000000100)=""/79}, &(0x7f0000000000)=0x78) r2 = syz_open_dev$media(&(0x7f0000000180)='/dev/media#\x00', 0xa442, 0x600400) getsockopt$inet6_dccp_int(r2, 0x21, 0x3, &(0x7f0000000280), &(0x7f00000002c0)=0x4) 13:21:47 executing program 4 (fault-call:0 fault-nth:61): bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x7880, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000, 0x0, 0x0, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x13]}, 0x3c) 13:21:47 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x40045564, &(0x7f0000000100)={0x0, 0x0, {0x0, 0x0, 0x0, {}, {0x0, 0x6}, @rumble}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) 13:21:47 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000780)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000040)={'nr0\x01\x00', 0x1132}) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'nr0\x01\x00', 0x7132}) close(r1) r2 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r2, &(0x7f0000000180), 0x27a4eaa51029717, 0x0) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') sendmsg$TIPC_NL_PEER_REMOVE(r2, &(0x7f0000000300)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000100)={&(0x7f0000000180)=ANY=[@ANYBLOB, @ANYRES16=r3, @ANYBLOB="000826bd7000fedbdf25140000001c0001001800010069623a76657468305f746f5f6272696467650000f000050008000100696200003c0002000800010004000000080001001d00000008000300ff0000000800030002000000080004003900000008000400f30700000800040007000000080001006574680006000200080001000d0000000c00020008000400cb00000054000200080001000000000008000400080000000800040001000000080004009201ffff080001002000000008000300000000e008000300090000000800030020000000080002000101000008000400010000002c000200080001000c00000008000300020000000800020009000000080004000800000008000300060000000800010069620000480001000c00010069623a6c6f00000038000400200001000a004e2300000004fe8000000000000000000000000000aaa30300001400020002004e22e000000100000000000000001400020008000200fbffffff0400040004000400"], 0x17c}, 0x1, 0x0, 0x0, 0x20000001}, 0x800) 13:21:47 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x4004556e, &(0x7f0000000100)={0x0, 0x0, {0x0, 0x0, 0x0, {}, {}, @rumble}, {0x3, 0x0, 0x0, {}, {}, @rumble}}) 13:21:47 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x4004556d, &(0x7f0000000100)={0x0, 0x0, {0x0, 0x0, 0x0, {}, {0x0, 0x8}, @rumble}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) 13:21:47 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x40045564, &(0x7f0000000100)={0x0, 0x0, {0x0, 0x0, 0x0, {}, {0x0, 0x7}, @rumble}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) [ 752.501026][T21546] FAULT_INJECTION: forcing a failure. [ 752.501026][T21546] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 752.603847][T21546] CPU: 1 PID: 21546 Comm: syz-executor.4 Not tainted 5.4.0-syzkaller #0 [ 752.612704][T21546] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 752.623400][T21546] Call Trace: [ 752.627416][T21546] dump_stack+0x197/0x210 [ 752.632783][T21546] should_fail.cold+0xa/0x15 [ 752.637496][T21546] ? fault_create_debugfs_attr+0x180/0x180 [ 752.643373][T21546] ? ___might_sleep+0x163/0x2c0 [ 752.643400][T21546] should_fail_alloc_page+0x50/0x60 [ 752.654123][T21546] __alloc_pages_nodemask+0x1a1/0x910 [ 752.654147][T21546] ? __alloc_pages_slowpath+0x2920/0x2920 [ 752.654172][T21546] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 752.654188][T21546] ? find_next_bit+0x107/0x130 [ 752.654210][T21546] pcpu_populate_chunk+0xf8/0x940 [ 752.654221][T21546] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 752.654236][T21546] ? find_next_bit+0x17/0x130 [ 752.654257][T21546] pcpu_alloc+0xd5b/0x1380 [ 752.654283][T21546] ? pcpu_alloc_area+0x820/0x820 [ 752.654299][T21546] ? bpf_map_area_alloc+0x20/0x30 [ 752.654324][T21546] __alloc_percpu_gfp+0x28/0x30 [ 752.671675][T21546] htab_map_alloc+0xdb9/0x11c0 [ 752.671705][T21546] ? htab_map_update_elem+0xca0/0xca0 [ 752.671724][T21546] __do_sys_bpf+0x478/0x37b0 [ 752.727313][T21546] ? bpf_prog_load+0x18a0/0x18a0 [ 752.732390][T21546] ? __kasan_check_write+0x14/0x20 [ 752.737529][T21546] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 752.743275][T21546] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 752.748598][T21546] ? wait_for_completion+0x440/0x440 13:21:47 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x4004556d, &(0x7f0000000100)={0x0, 0x0, {0x0, 0x0, 0x0, {}, {0x0, 0x300}, @rumble}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) 13:21:47 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x4004556e, &(0x7f0000000100)={0x0, 0x0, {0x0, 0x0, 0x0, {}, {}, @rumble}, {0x4, 0x0, 0x0, {}, {}, @rumble}}) 13:21:47 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x40045564, &(0x7f0000000100)={0x0, 0x0, {0x0, 0x0, 0x0, {}, {0x0, 0x8}, @rumble}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) 13:21:47 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) recvmmsg(r0, &(0x7f0000001d00)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}], 0x2, 0x0, 0x0) setsockopt$SO_TIMESTAMP(r0, 0x1, 0x23, &(0x7f0000000040)=0x9, 0x4) openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/status\x00', 0x0, 0x0) r1 = socket$inet6(0xa, 0x800, 0xa9) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") [ 752.753915][T21546] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 752.760176][T21546] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 752.765634][T21546] ? do_syscall_64+0x26/0x790 [ 752.765651][T21546] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 752.765664][T21546] ? do_syscall_64+0x26/0x790 [ 752.765685][T21546] __x64_sys_bpf+0x73/0xb0 [ 752.765700][T21546] do_syscall_64+0xfa/0x790 [ 752.765718][T21546] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 752.765729][T21546] RIP: 0033:0x45a679 13:21:48 executing program 4 (fault-call:0 fault-nth:62): bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x7880, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000, 0x0, 0x0, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x13]}, 0x3c) [ 752.765746][T21546] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 752.765754][T21546] RSP: 002b:00007fd557596c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 752.765768][T21546] RAX: ffffffffffffffda RBX: 00007fd557596c90 RCX: 000000000045a679 [ 752.765777][T21546] RDX: 000000000000003c RSI: 0000000020000040 RDI: 405a020000000000 [ 752.765783][T21546] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 752.765792][T21546] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fd5575976d4 [ 752.765801][T21546] R13: 00000000004c0c65 R14: 00000000004d4750 R15: 0000000000000003 [ 752.997417][T21566] selinux_nlmsg_perm: 20 callbacks suppressed [ 752.997436][T21566] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=48422 sclass=netlink_route_socket pig=21566 comm=syz-executor.0 [ 753.042571][T21570] FAULT_INJECTION: forcing a failure. [ 753.042571][T21570] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 753.067543][T21570] CPU: 0 PID: 21570 Comm: syz-executor.4 Not tainted 5.4.0-syzkaller #0 [ 753.077576][T21570] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 753.088335][T21570] Call Trace: 13:21:48 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x40045564, &(0x7f0000000100)={0x0, 0x0, {0x0, 0x0, 0x0, {}, {0x0, 0x300}, @rumble}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) [ 753.091655][T21570] dump_stack+0x197/0x210 [ 753.096965][T21570] should_fail.cold+0xa/0x15 [ 753.101587][T21570] ? fault_create_debugfs_attr+0x180/0x180 [ 753.107492][T21570] ? ___might_sleep+0x163/0x2c0 [ 753.107522][T21570] should_fail_alloc_page+0x50/0x60 [ 753.107538][T21570] __alloc_pages_nodemask+0x1a1/0x910 [ 753.107558][T21570] ? __alloc_pages_slowpath+0x2920/0x2920 [ 753.107582][T21570] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 753.107597][T21570] ? find_next_bit+0x107/0x130 [ 753.107617][T21570] pcpu_populate_chunk+0xf8/0x940 [ 753.128921][T21570] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 753.128941][T21570] ? find_next_bit+0x17/0x130 [ 753.128964][T21570] pcpu_alloc+0xd5b/0x1380 [ 753.128988][T21570] ? pcpu_alloc_area+0x820/0x820 [ 753.156117][T21570] ? bpf_map_area_alloc+0x20/0x30 [ 753.156146][T21570] __alloc_percpu_gfp+0x28/0x30 [ 753.156164][T21570] htab_map_alloc+0xdb9/0x11c0 [ 753.156190][T21570] ? htab_map_update_elem+0xca0/0xca0 [ 753.156206][T21570] __do_sys_bpf+0x478/0x37b0 13:21:48 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x4004556d, &(0x7f0000000100)={0x0, 0x0, {0x0, 0x0, 0x0, {}, {0x0, 0x500}, @rumble}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) [ 753.156224][T21570] ? bpf_prog_load+0x18a0/0x18a0 [ 753.156256][T21570] ? __kasan_check_write+0x14/0x20 [ 753.203608][T21570] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 753.209214][T21570] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 753.214691][T21570] ? wait_for_completion+0x440/0x440 [ 753.214725][T21570] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 753.214759][T21570] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 753.214773][T21570] ? do_syscall_64+0x26/0x790 [ 753.214793][T21570] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 753.226307][T21570] ? do_syscall_64+0x26/0x790 [ 753.226334][T21570] __x64_sys_bpf+0x73/0xb0 [ 753.226350][T21570] do_syscall_64+0xfa/0x790 [ 753.226372][T21570] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 753.226384][T21570] RIP: 0033:0x45a679 [ 753.226399][T21570] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 13:21:48 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x4004556e, &(0x7f0000000100)={0x0, 0x0, {0x0, 0x0, 0x0, {}, {}, @rumble}, {0x5, 0x0, 0x0, {}, {}, @rumble}}) [ 753.226405][T21570] RSP: 002b:00007fd557596c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 753.226432][T21570] RAX: ffffffffffffffda RBX: 00007fd557596c90 RCX: 000000000045a679 [ 753.243029][T21570] RDX: 000000000000003c RSI: 0000000020000040 RDI: 405a020000000000 [ 753.243038][T21570] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 753.243045][T21570] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fd5575976d4 [ 753.243052][T21570] R13: 00000000004c0c65 R14: 00000000004d4750 R15: 0000000000000003 [ 753.484313][ C1] net_ratelimit: 2 callbacks suppressed [ 753.484322][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 753.500811][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 753.555863][T21586] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=48422 sclass=netlink_route_socket pig=21586 comm=syz-executor.0 [ 753.724368][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 753.730348][ C0] protocol 88fb is buggy, dev hsr_slave_1 13:21:49 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$VIDIOC_ENCODER_CMD(0xffffffffffffffff, 0xc028564d, &(0x7f0000000080)={0x2, 0x1, [0xfffffffe, 0x6, 0x7, 0x81, 0xd2f, 0x9, 0x5, 0x1f]}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000780)='/dev/net/tun\x00', 0x0, 0x0) ioctl$VIDIOC_DBG_S_REGISTER(0xffffffffffffffff, 0x4038564f, &(0x7f00000000c0)={{0x4ec4bb46b1ad48d5, @name="df6c2e4715109dd4983b9e6c48328cf8a1a50747e0737ebaf377739ab01d58e0"}, 0x8, 0x6, 0xfffffffffffffff7}) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000040)={'nr0\x01\x00', 0x1132}) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'nr0\x01\x00', 0x7132}) close(r1) 13:21:49 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x4004556e, &(0x7f0000000100)={0x0, 0x0, {0x0, 0x0, 0x0, {}, {}, @rumble}, {0x6, 0x0, 0x0, {}, {}, @rumble}}) 13:21:49 executing program 4 (fault-call:0 fault-nth:63): bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x7880, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000, 0x0, 0x0, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x13]}, 0x3c) 13:21:49 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x4004556d, &(0x7f0000000100)={0x0, 0x0, {0x0, 0x0, 0x0, {}, {0x0, 0x600}, @rumble}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) 13:21:49 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x40045564, &(0x7f0000000100)={0x0, 0x0, {0x0, 0x0, 0x0, {}, {0x0, 0x500}, @rumble}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) 13:21:49 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x4004556e, &(0x7f0000000100)={0x0, 0x0, {0x0, 0x0, 0x0, {}, {}, @rumble}, {0x7, 0x0, 0x0, {}, {}, @rumble}}) 13:21:49 executing program 5: r0 = socket$packet(0x11, 0x2, 0x300) recvmmsg(r0, &(0x7f0000001d00)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}], 0x2, 0x0, 0x0) setsockopt$SO_TIMESTAMP(r0, 0x1, 0x23, &(0x7f0000000040)=0x9, 0x4) socket$inet6(0xa, 0x80003, 0x80) ioctl(r0, 0x1000008912, &(0x7f00000001c0)) [ 753.921072][T21599] FAULT_INJECTION: forcing a failure. [ 753.921072][T21599] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 754.005298][T21599] CPU: 1 PID: 21599 Comm: syz-executor.4 Not tainted 5.4.0-syzkaller #0 [ 754.014174][T21599] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 754.024289][T21599] Call Trace: [ 754.027606][T21599] dump_stack+0x197/0x210 [ 754.032146][T21599] should_fail.cold+0xa/0x15 [ 754.036954][T21599] ? fault_create_debugfs_attr+0x180/0x180 [ 754.042959][T21599] ? ___might_sleep+0x163/0x2c0 [ 754.048112][T21599] should_fail_alloc_page+0x50/0x60 [ 754.053338][T21599] __alloc_pages_nodemask+0x1a1/0x910 [ 754.060127][T21599] ? __alloc_pages_slowpath+0x2920/0x2920 [ 754.066146][T21599] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 754.072757][T21599] ? find_next_bit+0x107/0x130 [ 754.077556][T21599] pcpu_populate_chunk+0xf8/0x940 [ 754.082921][T21599] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 754.089022][T21599] ? find_next_bit+0x17/0x130 [ 754.094252][T21599] pcpu_alloc+0xd5b/0x1380 [ 754.098878][T21599] ? pcpu_alloc_area+0x820/0x820 [ 754.103833][T21599] ? bpf_map_area_alloc+0x20/0x30 [ 754.103860][T21599] __alloc_percpu_gfp+0x28/0x30 [ 754.103878][T21599] htab_map_alloc+0xdb9/0x11c0 [ 754.103904][T21599] ? htab_map_update_elem+0xca0/0xca0 [ 754.103923][T21599] __do_sys_bpf+0x478/0x37b0 [ 754.113807][T21599] ? bpf_prog_load+0x18a0/0x18a0 [ 754.113825][T21599] ? __kasan_check_write+0x14/0x20 [ 754.113843][T21599] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 754.113859][T21599] ? rcu_read_lock_bh_held+0xb0/0xb0 13:21:49 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x40045564, &(0x7f0000000100)={0x0, 0x0, {0x0, 0x0, 0x0, {}, {0x0, 0x600}, @rumble}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) 13:21:49 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x4004556d, &(0x7f0000000100)={0x0, 0x0, {0x0, 0x0, 0x0, {}, {0x0, 0x700}, @rumble}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) [ 754.113874][T21599] ? wait_for_completion+0x440/0x440 [ 754.113898][T21599] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 754.126207][T21599] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 754.126223][T21599] ? do_syscall_64+0x26/0x790 [ 754.126242][T21599] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 754.126255][T21599] ? do_syscall_64+0x26/0x790 [ 754.126276][T21599] __x64_sys_bpf+0x73/0xb0 [ 754.126293][T21599] do_syscall_64+0xfa/0x790 [ 754.126311][T21599] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 754.126323][T21599] RIP: 0033:0x45a679 [ 754.126338][T21599] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 754.126345][T21599] RSP: 002b:00007fd557596c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 754.126365][T21599] RAX: ffffffffffffffda RBX: 00007fd557596c90 RCX: 000000000045a679 [ 754.141155][T21599] RDX: 000000000000003c RSI: 0000000020000040 RDI: 405a020000000000 13:21:49 executing program 4 (fault-call:0 fault-nth:64): bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x7880, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000, 0x0, 0x0, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x13]}, 0x3c) [ 754.141164][T21599] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 754.141172][T21599] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fd5575976d4 [ 754.141181][T21599] R13: 00000000004c0c65 R14: 00000000004d4750 R15: 0000000000000003 13:21:49 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x4004556d, &(0x7f0000000100)={0x0, 0x0, {0x0, 0x0, 0x0, {}, {0x0, 0x3f00}, @rumble}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) 13:21:49 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x4004556e, &(0x7f0000000100)={0x0, 0x0, {0x0, 0x0, 0x0, {}, {}, @rumble}, {0x8, 0x0, 0x0, {}, {}, @rumble}}) [ 754.422322][T21620] FAULT_INJECTION: forcing a failure. [ 754.422322][T21620] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 754.439627][T21620] CPU: 0 PID: 21620 Comm: syz-executor.4 Not tainted 5.4.0-syzkaller #0 [ 754.449302][T21620] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 754.459756][T21620] Call Trace: [ 754.463120][T21620] dump_stack+0x197/0x210 [ 754.467678][T21620] should_fail.cold+0xa/0x15 [ 754.472572][T21620] ? fault_create_debugfs_attr+0x180/0x180 [ 754.478503][T21620] ? ___might_sleep+0x163/0x2c0 [ 754.483407][T21620] should_fail_alloc_page+0x50/0x60 [ 754.489330][T21620] __alloc_pages_nodemask+0x1a1/0x910 [ 754.495027][T21620] ? __alloc_pages_slowpath+0x2920/0x2920 [ 754.500793][T21620] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 754.507329][T21620] ? find_next_bit+0x107/0x130 [ 754.512415][T21620] pcpu_populate_chunk+0xf8/0x940 [ 754.512437][T21620] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 754.512453][T21620] ? find_next_bit+0x17/0x130 [ 754.512477][T21620] pcpu_alloc+0xd5b/0x1380 [ 754.533676][T21620] ? pcpu_alloc_area+0x820/0x820 [ 754.538827][T21620] ? bpf_map_area_alloc+0x20/0x30 [ 754.543983][T21620] __alloc_percpu_gfp+0x28/0x30 [ 754.549466][T21620] htab_map_alloc+0xdb9/0x11c0 [ 754.554568][T21620] ? htab_map_update_elem+0xca0/0xca0 [ 754.560321][T21620] __do_sys_bpf+0x478/0x37b0 [ 754.565114][T21620] ? bpf_prog_load+0x18a0/0x18a0 [ 754.570204][T21620] ? __kasan_check_write+0x14/0x20 [ 754.575437][T21620] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 754.575522][T21620] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 754.575538][T21620] ? wait_for_completion+0x440/0x440 [ 754.575560][T21620] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 754.575591][T21620] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 754.575608][T21620] ? do_syscall_64+0x26/0x790 [ 754.575623][T21620] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 754.575635][T21620] ? do_syscall_64+0x26/0x790 [ 754.575654][T21620] __x64_sys_bpf+0x73/0xb0 [ 754.575674][T21620] do_syscall_64+0xfa/0x790 [ 754.601003][T21620] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 754.601017][T21620] RIP: 0033:0x45a679 [ 754.601030][T21620] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 754.601045][T21620] RSP: 002b:00007fd557596c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 754.617995][T21620] RAX: ffffffffffffffda RBX: 00007fd557596c90 RCX: 000000000045a679 [ 754.618006][T21620] RDX: 000000000000003c RSI: 0000000020000040 RDI: 405a020000000000 [ 754.618014][T21620] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 754.618022][T21620] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fd5575976d4 [ 754.618036][T21620] R13: 00000000004c0c65 R14: 00000000004d4750 R15: 0000000000000003 13:21:50 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x40045564, &(0x7f0000000100)={0x0, 0x0, {0x0, 0x0, 0x0, {}, {0x0, 0x700}, @rumble}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) 13:21:50 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) recvmmsg(r0, &(0x7f0000001d00)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}], 0x2, 0x0, 0x0) setsockopt$SO_TIMESTAMP(r0, 0x1, 0x23, &(0x7f0000000040)=0x9, 0x4) r1 = socket$inet6(0xa, 0x80003, 0x80) r2 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r2, &(0x7f0000000180), 0x27a4eaa51029717, 0x0) setsockopt$packet_int(r2, 0x107, 0xb, &(0x7f0000000000)=0x5, 0x4) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") 13:21:50 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x4004556d, &(0x7f0000000100)={0x0, 0x0, {0x0, 0x0, 0x0, {}, {0x0, 0x4000}, @rumble}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) 13:21:50 executing program 4 (fault-call:0 fault-nth:65): bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x7880, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000, 0x0, 0x0, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x13]}, 0x3c) 13:21:50 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x4004556e, &(0x7f0000000100)={0x0, 0x0, {0x0, 0x0, 0x0, {}, {}, @rumble}, {0x300, 0x0, 0x0, {}, {}, @rumble}}) 13:21:50 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000780)='/dev/net/tun\x00', 0x0, 0x0) r2 = socket$inet6(0xa, 0x400000000001, 0x0) bind$inet6(r2, &(0x7f0000fa0fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r2, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r3 = open(&(0x7f0000000200)='./file0\x00', 0x141042, 0x82) setsockopt$SO_TIMESTAMPING(r2, 0x1, 0x25, &(0x7f00000001c0)=0x4, 0x4) timerfd_gettime(r3, &(0x7f0000000040)) ftruncate(r3, 0x7e) sendfile(r2, r3, &(0x7f00000000c0), 0x8000fffffffe) ioctl$TUNSETFILTEREBPF(r1, 0x800454e1, &(0x7f00000000c0)=r3) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000040)={'nr0\x01\x00', 0x1132}) r4 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r4, &(0x7f0000000180), 0x27a4eaa51029717, 0x0) setsockopt$bt_BT_RCVMTU(r4, 0x112, 0xd, &(0x7f0000000080), 0x2) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'nr0\x01\x00', 0x7132}) close(r1) 13:21:50 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x4004556e, &(0x7f0000000100)={0x0, 0x0, {0x0, 0x0, 0x0, {}, {}, @rumble}, {0x500, 0x0, 0x0, {}, {}, @rumble}}) 13:21:50 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x40045564, &(0x7f0000000100)={0x0, 0x0, {0x0, 0x0, 0x0, {}, {0x0, 0x3f00}, @rumble}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) [ 755.244040][T21640] FAULT_INJECTION: forcing a failure. [ 755.244040][T21640] name fail_page_alloc, interval 1, probability 0, space 0, times 0 13:21:50 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x4004556d, &(0x7f0000000100)={0x0, 0x0, {0x0, 0x0, 0x0, {}, {0x0, 0xff00}, @rumble}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) [ 755.314378][T21640] CPU: 0 PID: 21640 Comm: syz-executor.4 Not tainted 5.4.0-syzkaller #0 [ 755.322777][T21640] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 755.333152][T21640] Call Trace: [ 755.336613][T21640] dump_stack+0x197/0x210 [ 755.341068][T21640] should_fail.cold+0xa/0x15 [ 755.345781][T21640] ? fault_create_debugfs_attr+0x180/0x180 [ 755.351608][T21640] ? ___might_sleep+0x163/0x2c0 [ 755.356678][T21640] should_fail_alloc_page+0x50/0x60 [ 755.362078][T21640] __alloc_pages_nodemask+0x1a1/0x910 [ 755.362103][T21640] ? __alloc_pages_slowpath+0x2920/0x2920 [ 755.362132][T21640] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 755.379497][T21640] ? find_next_bit+0x107/0x130 [ 755.384356][T21640] pcpu_populate_chunk+0xf8/0x940 [ 755.389490][T21640] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 755.395243][T21640] ? find_next_bit+0x17/0x130 [ 755.395271][T21640] pcpu_alloc+0xd5b/0x1380 [ 755.395293][T21640] ? pcpu_alloc_area+0x820/0x820 [ 755.395308][T21640] ? bpf_map_area_alloc+0x20/0x30 [ 755.395331][T21640] __alloc_percpu_gfp+0x28/0x30 [ 755.395347][T21640] htab_map_alloc+0xdb9/0x11c0 [ 755.395374][T21640] ? htab_map_update_elem+0xca0/0xca0 [ 755.395390][T21640] __do_sys_bpf+0x478/0x37b0 [ 755.395408][T21640] ? bpf_prog_load+0x18a0/0x18a0 [ 755.395426][T21640] ? __kasan_check_write+0x14/0x20 [ 755.409449][T21640] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 755.409468][T21640] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 755.409490][T21640] ? wait_for_completion+0x440/0x440 [ 755.419547][T21640] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 755.419579][T21640] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 755.419598][T21640] ? do_syscall_64+0x26/0x790 [ 755.434402][T21640] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 755.434420][T21640] ? do_syscall_64+0x26/0x790 [ 755.434441][T21640] __x64_sys_bpf+0x73/0xb0 [ 755.434458][T21640] do_syscall_64+0xfa/0x790 [ 755.434477][T21640] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 755.434489][T21640] RIP: 0033:0x45a679 [ 755.434503][T21640] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 755.434511][T21640] RSP: 002b:00007fd557596c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 755.434529][T21640] RAX: ffffffffffffffda RBX: 00007fd557596c90 RCX: 000000000045a679 [ 755.444666][T21640] RDX: 000000000000003c RSI: 0000000020000040 RDI: 405a020000000000 [ 755.444676][T21640] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 13:21:50 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0xe264e1d361d7219a, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000780)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000040)={'nr0\x01\x00', 0x1132}) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'nr0\x01\x00', 0x7132}) close(r1) [ 755.444683][T21640] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fd5575976d4 [ 755.444692][T21640] R13: 00000000004c0c65 R14: 00000000004d4750 R15: 0000000000000003 [ 755.564356][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 755.585441][ C1] protocol 88fb is buggy, dev hsr_slave_1 13:21:50 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x4004556d, &(0x7f0000000100)={0x0, 0x0, {0x0, 0x0, 0x0, {}, {}, @rumble}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) 13:21:50 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x40045564, &(0x7f0000000100)={0x0, 0x0, {0x0, 0x0, 0x0, {}, {0x0, 0x4000}, @rumble}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) 13:21:50 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x40045564, &(0x7f0000000100)={0x0, 0x0, {0x0, 0x0, 0x0, {}, {0x0, 0xff00}, @rumble}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) [ 755.804341][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 755.810531][ C0] protocol 88fb is buggy, dev hsr_slave_1 13:21:51 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) recvmmsg(r0, &(0x7f0000001d00)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}], 0x2, 0x0, 0x0) setsockopt$SO_TIMESTAMP(r0, 0x1, 0x23, &(0x7f0000000040)=0x9, 0x4) r1 = socket$inet6(0xa, 0x80003, 0x80) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") r2 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r3 = socket$inet6(0xa, 0x400000000001, 0x0) bind$inet6(r3, &(0x7f0000fa0fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r3, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r4 = open(&(0x7f0000000200)='./file0\x00', 0x141042, 0x82) setsockopt$SO_TIMESTAMPING(r3, 0x1, 0x25, &(0x7f00000001c0)=0x4, 0x4) timerfd_gettime(r4, &(0x7f0000000040)) connect$inet6(r2, &(0x7f0000000080)={0xa, 0x4e23, 0x81c, @remote, 0x7e888d29}, 0x1c) ftruncate(r4, 0x7e) sendfile(r3, r4, &(0x7f00000000c0), 0x8000fffffffe) r5 = openat$cachefiles(0xffffffffffffff9c, &(0x7f00000014c0)='/dev/cachefiles\x00', 0x0, 0x0) getsockopt$TIPC_SRC_DROPPABLE(r5, 0x10f, 0x80, &(0x7f0000001500), &(0x7f0000001540)=0x4) ioctl$VHOST_RESET_OWNER(r4, 0xaf02, 0x0) ioctl$BLKROTATIONAL(r2, 0x127e, &(0x7f0000000000)) 13:21:51 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x4004556e, &(0x7f0000000100)={0x0, 0x0, {0x0, 0x0, 0x0, {}, {}, @rumble}, {0x600, 0x0, 0x0, {}, {}, @rumble}}) 13:21:51 executing program 4 (fault-call:0 fault-nth:66): bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x7880, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000, 0x0, 0x0, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x13]}, 0x3c) 13:21:51 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x4004556d, &(0x7f0000000100)={0x0, 0x0, {0x0, 0x0, 0x0, {}, {}, @rumble={0x2}}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) 13:21:51 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x40045564, &(0x7f0000000100)={0x0, 0x0, {0x0, 0x0, 0x0, {}, {}, @rumble}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) 13:21:51 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x4004556e, &(0x7f0000000100)={0x0, 0x0, {0x0, 0x0, 0x0, {}, {}, @rumble}, {0x700, 0x0, 0x0, {}, {}, @rumble}}) [ 756.185805][T21678] FAULT_INJECTION: forcing a failure. [ 756.185805][T21678] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 756.214447][T21678] CPU: 1 PID: 21678 Comm: syz-executor.4 Not tainted 5.4.0-syzkaller #0 [ 756.222934][T21678] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 756.233013][T21678] Call Trace: [ 756.236351][T21678] dump_stack+0x197/0x210 [ 756.241145][T21678] should_fail.cold+0xa/0x15 [ 756.246326][T21678] ? fault_create_debugfs_attr+0x180/0x180 [ 756.252163][T21678] ? ___might_sleep+0x163/0x2c0 [ 756.257160][T21678] should_fail_alloc_page+0x50/0x60 [ 756.262391][T21678] __alloc_pages_nodemask+0x1a1/0x910 [ 756.268112][T21678] ? __alloc_pages_slowpath+0x2920/0x2920 [ 756.274069][T21678] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 756.280519][T21678] ? find_next_bit+0x107/0x130 [ 756.280543][T21678] pcpu_populate_chunk+0xf8/0x940 [ 756.280559][T21678] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 756.280581][T21678] ? find_next_bit+0x17/0x130 [ 756.291419][T21678] pcpu_alloc+0xd5b/0x1380 [ 756.291447][T21678] ? pcpu_alloc_area+0x820/0x820 [ 756.291465][T21678] ? bpf_map_area_alloc+0x20/0x30 [ 756.301863][T21678] __alloc_percpu_gfp+0x28/0x30 [ 756.301885][T21678] htab_map_alloc+0xdb9/0x11c0 [ 756.301911][T21678] ? htab_map_update_elem+0xca0/0xca0 [ 756.311256][T21678] __do_sys_bpf+0x478/0x37b0 [ 756.311277][T21678] ? bpf_prog_load+0x18a0/0x18a0 [ 756.311296][T21678] ? __kasan_check_write+0x14/0x20 [ 756.321174][T21678] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 756.321192][T21678] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 756.321207][T21678] ? wait_for_completion+0x440/0x440 [ 756.321230][T21678] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 756.334340][T21678] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 756.334356][T21678] ? do_syscall_64+0x26/0x790 [ 756.334374][T21678] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 756.334387][T21678] ? do_syscall_64+0x26/0x790 [ 756.334407][T21678] __x64_sys_bpf+0x73/0xb0 [ 756.334424][T21678] do_syscall_64+0xfa/0x790 [ 756.334442][T21678] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 756.334452][T21678] RIP: 0033:0x45a679 [ 756.334472][T21678] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 13:21:51 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x4004556e, &(0x7f0000000100)={0x0, 0x0, {0x0, 0x0, 0x0, {}, {}, @rumble}, {0x4000, 0x0, 0x0, {}, {}, @rumble}}) 13:21:51 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x40045564, &(0x7f0000000100)={0x0, 0x0, {0x0, 0x0, 0x0, {}, {}, @rumble={0x2}}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) 13:21:51 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x4004556d, &(0x7f0000000100)={0x0, 0x0, {0x0, 0x0, 0x0, {}, {}, @rumble={0x3}}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) 13:21:51 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000780)='/dev/net/tun\x00', 0x1, 0x0) r2 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/mls\x00', 0x0, 0x0) ioctl$KVM_GET_NR_MMU_PAGES(r2, 0xae45, 0x6) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000040)={'nr0\x01\x00', 0x1132}) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'nr0\x01\x00', 0x7132}) ioctl$KVM_ASSIGN_SET_MSIX_ENTRY(r1, 0x4010ae74, &(0x7f00000000c0)={0xa520, 0x1, 0x8}) close(r1) [ 756.412133][T21678] RSP: 002b:00007fd557596c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 756.412149][T21678] RAX: ffffffffffffffda RBX: 00007fd557596c90 RCX: 000000000045a679 [ 756.412159][T21678] RDX: 000000000000003c RSI: 0000000020000040 RDI: 405a020000000000 [ 756.412168][T21678] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 756.412177][T21678] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fd5575976d4 [ 756.412185][T21678] R13: 00000000004c0c65 R14: 00000000004d4750 R15: 0000000000000003 [ 756.520830][ T25] audit: type=1800 audit(1575465711.689:136): pid=21680 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed comm="syz-executor.5" name="file0" dev="sda1" ino=17535 res=0 13:21:51 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) recvmmsg(r0, &(0x7f0000001d00)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}], 0x2, 0x0, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vsock\x00', 0x0, 0x0) setsockopt$bt_hci_HCI_DATA_DIR(r0, 0x0, 0x1, &(0x7f0000000000)=0x7fffffff, 0x4) setsockopt$SO_TIMESTAMP(r0, 0x1, 0x23, &(0x7f0000000040)=0x9, 0x4) r1 = socket$inet6(0xa, 0x80003, 0x80) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") 13:21:51 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x4004556d, &(0x7f0000000100)={0x0, 0x0, {0x0, 0x0, 0x0, {}, {}, @rumble={0x4}}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) 13:21:51 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x40045564, &(0x7f0000000100)={0x0, 0x0, {0x0, 0x0, 0x0, {}, {}, @rumble={0x3}}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) 13:21:51 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x4004556e, &(0x7f0000000100)={0x0, 0x0, {0x0, 0x0, 0x0, {}, {}, @rumble}, {0xff00, 0x0, 0x0, {}, {}, @rumble}}) [ 756.844338][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 756.850255][ C0] protocol 88fb is buggy, dev hsr_slave_1 13:21:52 executing program 4 (fault-call:0 fault-nth:67): bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x7880, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000, 0x0, 0x0, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x13]}, 0x3c) 13:21:52 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x4004556d, &(0x7f0000000100)={0x0, 0x0, {0x0, 0x0, 0x0, {}, {}, @rumble={0x5}}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) 13:21:52 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x40045564, &(0x7f0000000100)={0x0, 0x0, {0x0, 0x0, 0x0, {}, {}, @rumble={0x4}}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) 13:21:52 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x4004556e, &(0x7f0000000100)={0x0, 0x0, {0x0, 0x0, 0x0, {}, {}, @rumble}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) 13:21:52 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) recvmmsg(r0, &(0x7f0000001d00)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}], 0x2, 0x0, 0x0) setsockopt$SO_TIMESTAMP(r0, 0x1, 0x23, &(0x7f0000000040)=0x9, 0x4) r1 = socket$inet6(0xa, 0x80003, 0x80) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0xffffffffffff70d3, 0x2000) 13:21:52 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x4004556d, &(0x7f0000000100)={0x0, 0x0, {0x0, 0x0, 0x0, {}, {}, @rumble={0x6}}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) 13:21:52 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x4004556e, &(0x7f0000000100)={0x0, 0x0, {0x0, 0x0, 0x0, {}, {}, @rumble}, {0x0, 0x2, 0x0, {}, {}, @rumble}}) 13:21:52 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$SNDRV_PCM_IOCTL_READI_FRAMES(0xffffffffffffffff, 0x80184151, &(0x7f0000000280)={0x0, &(0x7f0000000180)="f5826a20fbc3210fc4c9ff54770eae88dd1daa7d8d6d700ef94cf8968e20c56492f9a278e95ad20ff6a172ec43040a39f9aedefcfd25cf0c2baf3319445339cc4bb19a5275d7a78b15ea7873af8ad1a467677d32fbd4b60c4e08784344774733d932ff4a8630958556b69a944db21ffa2650fe3b448e7fe6c34877f8dd353f5d8a7d3ca08dda392e7e356333ca4c49955bb57624fd7c24177768d89cfa2a48736987d150a19375883922701d252598d8f0f02429361da9440facfd4292bc70dbc85b8279bc6ad3ab89ee799b1744d8e58f3cd7c0ae9116d280efde341d230d8b8b79", 0xe2}) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000100)={'bridge0\x00', 0x100}) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/autofs\x00', 0x2200, 0x0) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(r1, 0x6, 0x15, &(0x7f0000000300)=0x4, 0x4) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000780)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000040)={'nr0\x01\x00', 0x1132}) close(r2) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000080)='/dev/loop-control\x00', 0x200, 0x0) get_mempolicy(&(0x7f0000000000), &(0x7f00000000c0), 0x55c7, &(0x7f0000ffb000/0x4000)=nil, 0x4) fcntl$setpipe(r3, 0x407, 0xfffffffffffffffe) 13:21:52 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x40045564, &(0x7f0000000100)={0x0, 0x0, {0x0, 0x0, 0x0, {}, {}, @rumble={0x5}}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) [ 757.243455][T21725] FAULT_INJECTION: forcing a failure. [ 757.243455][T21725] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 757.343950][T21725] CPU: 0 PID: 21725 Comm: syz-executor.4 Not tainted 5.4.0-syzkaller #0 [ 757.352371][T21725] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 757.363489][T21725] Call Trace: [ 757.366805][T21725] dump_stack+0x197/0x210 [ 757.371197][T21725] should_fail.cold+0xa/0x15 [ 757.375813][T21725] ? fault_create_debugfs_attr+0x180/0x180 [ 757.381998][T21725] ? ___might_sleep+0x163/0x2c0 [ 757.382026][T21725] should_fail_alloc_page+0x50/0x60 [ 757.382046][T21725] __alloc_pages_nodemask+0x1a1/0x910 [ 757.397461][T21725] ? __alloc_pages_slowpath+0x2920/0x2920 [ 757.403218][T21725] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 757.410437][T21725] ? find_next_bit+0x107/0x130 [ 757.415931][T21725] pcpu_populate_chunk+0xf8/0x940 [ 757.415948][T21725] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 757.415964][T21725] ? find_next_bit+0x17/0x130 [ 757.415985][T21725] pcpu_alloc+0xd5b/0x1380 [ 757.416007][T21725] ? pcpu_alloc_area+0x820/0x820 [ 757.416022][T21725] ? bpf_map_area_alloc+0x20/0x30 [ 757.416045][T21725] __alloc_percpu_gfp+0x28/0x30 [ 757.416065][T21725] htab_map_alloc+0xdb9/0x11c0 [ 757.426811][T21725] ? htab_map_update_elem+0xca0/0xca0 [ 757.426828][T21725] __do_sys_bpf+0x478/0x37b0 [ 757.426847][T21725] ? bpf_prog_load+0x18a0/0x18a0 [ 757.426862][T21725] ? __kasan_check_write+0x14/0x20 [ 757.426879][T21725] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 757.426892][T21725] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 757.426906][T21725] ? wait_for_completion+0x440/0x440 [ 757.426926][T21725] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 757.426954][T21725] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 757.426973][T21725] ? do_syscall_64+0x26/0x790 [ 757.446069][T21725] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 757.446088][T21725] ? do_syscall_64+0x26/0x790 [ 757.446109][T21725] __x64_sys_bpf+0x73/0xb0 [ 757.446125][T21725] do_syscall_64+0xfa/0x790 [ 757.446144][T21725] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 757.446160][T21725] RIP: 0033:0x45a679 13:21:52 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) getrandom(&(0x7f00000000c0)=""/118, 0x76, 0x1) recvmmsg(r0, &(0x7f0000001d00)=[{{0x0, 0x52, 0x0, 0x0, 0x0, 0x2cd}}, {{0x0, 0xffffffffffffff14, 0x0}}], 0x0, 0x0, 0x0) setsockopt$SO_TIMESTAMP(r0, 0x1, 0x23, &(0x7f0000000040)=0x9, 0x4) getpid() r1 = socket$inet6(0xa, 0x80003, 0x80) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r1, 0x84, 0x1e, &(0x7f0000000180), &(0x7f0000000200)=0x4) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") ioctl$sock_SIOCGIFVLAN_SET_VLAN_NAME_TYPE_CMD(r0, 0x8982, &(0x7f0000000240)={0x6, 'team0\x00', {0x8}, 0xab8}) r2 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r2, &(0x7f0000000180), 0x27a4eaa51029717, 0x0) r3 = socket$inet6_sctp(0xa, 0x4000000000000001, 0x84) r4 = socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r4, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r3, 0x84, 0x10, &(0x7f0000000000)=@sack_info={r5}, &(0x7f0000000040)=0xc) setsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r2, 0x84, 0x6, &(0x7f00000002c0)={r5, @in={{0x2, 0x4e20, @initdev={0xac, 0x1e, 0x1, 0x0}}}}, 0x84) [ 757.446175][T21725] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 757.446183][T21725] RSP: 002b:00007fd557596c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 757.446202][T21725] RAX: ffffffffffffffda RBX: 00007fd557596c90 RCX: 000000000045a679 [ 757.456217][T21725] RDX: 000000000000003c RSI: 0000000020000040 RDI: 405a020000000000 [ 757.456226][T21725] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 13:21:52 executing program 4 (fault-call:0 fault-nth:68): bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x7880, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000, 0x0, 0x0, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x13]}, 0x3c) [ 757.456235][T21725] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fd5575976d4 [ 757.456242][T21725] R13: 00000000004c0c65 R14: 00000000004d4750 R15: 0000000000000003 13:21:52 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x40045564, &(0x7f0000000100)={0x0, 0x0, {0x0, 0x0, 0x0, {}, {}, @rumble={0x6}}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) 13:21:52 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x4004556e, &(0x7f0000000100)={0x0, 0x0, {0x0, 0x0, 0x0, {}, {}, @rumble}, {0x0, 0x3, 0x0, {}, {}, @rumble}}) 13:21:52 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x4004556d, &(0x7f0000000100)={0x0, 0x0, {0x0, 0x0, 0x0, {}, {}, @rumble={0x7}}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) 13:21:52 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) recvmmsg(r0, &(0x7f0000001d00)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}], 0x2, 0x0, 0x0) setsockopt$SO_TIMESTAMP(r0, 0x1, 0x23, &(0x7f0000000040)=0x9, 0x4) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0xa000, 0x40) getpeername$packet(r0, &(0x7f0000000300)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000340)=0x14) ioctl$sock_inet6_SIOCSIFADDR(r1, 0x8916, &(0x7f0000000380)={@loopback, 0x4c, r2}) r3 = socket$inet6(0xa, 0x80003, 0x80) ioctl(r3, 0x100000890f, &(0x7f00000001c0)="17f7b8765e0bcfe8474071") r4 = socket$inet(0xa, 0x801, 0x84) connect$inet(r4, &(0x7f0000004cc0)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r4, 0x84, 0x9, &(0x7f00000000c0)={0x0, @in={{0x2, 0x0, @rand_addr=0xac14ffbb}}}, &(0x7f0000000180)=0x98) r5 = socket$inet(0xa, 0x801, 0x84) connect$inet(r5, &(0x7f0000004cc0)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r5, 0x84, 0x9, &(0x7f00000000c0)={0x0, @in={{0x2, 0x0, @rand_addr=0xac14ffbb}}}, &(0x7f0000000180)=0x98) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r5, 0x84, 0x1d, &(0x7f0000000240)=ANY=[@ANYBLOB="58090000000000fc4874", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0], &(0x7f0000000080)=0x20) setsockopt$inet_sctp6_SCTP_RESET_STREAMS(r3, 0x84, 0x77, &(0x7f0000000200)={r6, 0x20, 0x1, [0x9d]}, 0xa) ioctl$EXT4_IOC_MIGRATE(r4, 0x6609) [ 757.815570][T21746] FAULT_INJECTION: forcing a failure. [ 757.815570][T21746] name fail_page_alloc, interval 1, probability 0, space 0, times 0 13:21:53 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x40045564, &(0x7f0000000100)={0x0, 0x0, {0x0, 0x0, 0x0, {}, {}, @rumble={0x7}}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) [ 757.917834][T21746] CPU: 0 PID: 21746 Comm: syz-executor.4 Not tainted 5.4.0-syzkaller #0 [ 757.926267][T21746] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 757.936345][T21746] Call Trace: [ 757.939664][T21746] dump_stack+0x197/0x210 [ 757.944026][T21746] should_fail.cold+0xa/0x15 [ 757.948640][T21746] ? fault_create_debugfs_attr+0x180/0x180 [ 757.954457][T21746] ? ___might_sleep+0x163/0x2c0 [ 757.959337][T21746] should_fail_alloc_page+0x50/0x60 [ 757.964547][T21746] __alloc_pages_nodemask+0x1a1/0x910 [ 757.969934][T21746] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 757.975501][T21746] ? __alloc_pages_slowpath+0x2920/0x2920 [ 757.981252][T21746] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 757.987518][T21746] alloc_pages_current+0x107/0x210 [ 757.992646][T21746] ? ___might_sleep+0x163/0x2c0 [ 757.997558][T21746] __vmalloc_node_range+0x4f8/0x810 [ 758.002786][T21746] __vmalloc+0x44/0x50 [ 758.006876][T21746] ? pcpu_mem_zalloc+0x8a/0xf0 [ 758.011658][T21746] pcpu_mem_zalloc+0x8a/0xf0 [ 758.016272][T21746] pcpu_create_chunk+0xe0/0x7f0 [ 758.021150][T21746] pcpu_alloc+0x10f3/0x1380 [ 758.025685][T21746] ? pcpu_alloc_area+0x820/0x820 [ 758.030657][T21746] __alloc_percpu_gfp+0x28/0x30 [ 758.035533][T21746] htab_map_alloc+0xdb9/0x11c0 [ 758.040355][T21746] ? htab_map_update_elem+0xca0/0xca0 [ 758.045820][T21746] __do_sys_bpf+0x478/0x37b0 [ 758.045842][T21746] ? bpf_prog_load+0x18a0/0x18a0 [ 758.045858][T21746] ? __kasan_check_write+0x14/0x20 [ 758.045875][T21746] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 758.045893][T21746] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 758.045909][T21746] ? wait_for_completion+0x440/0x440 [ 758.045930][T21746] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 758.045958][T21746] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 758.045974][T21746] ? do_syscall_64+0x26/0x790 [ 758.045990][T21746] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 758.046003][T21746] ? do_syscall_64+0x26/0x790 [ 758.046021][T21746] __x64_sys_bpf+0x73/0xb0 [ 758.046039][T21746] do_syscall_64+0xfa/0x790 13:21:53 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x4004556e, &(0x7f0000000100)={0x0, 0x0, {0x0, 0x0, 0x0, {}, {}, @rumble}, {0x0, 0x4, 0x0, {}, {}, @rumble}}) [ 758.056516][T21746] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 758.056528][T21746] RIP: 0033:0x45a679 [ 758.056543][T21746] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 758.056551][T21746] RSP: 002b:00007fd557596c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 758.056566][T21746] RAX: ffffffffffffffda RBX: 00007fd557596c90 RCX: 000000000045a679 [ 758.056575][T21746] RDX: 000000000000003c RSI: 0000000020000040 RDI: 405a020000000000 [ 758.056584][T21746] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 758.056598][T21746] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fd5575976d4 [ 758.056607][T21746] R13: 00000000004c0c65 R14: 00000000004d4750 R15: 0000000000000003 13:21:53 executing program 4 (fault-call:0 fault-nth:69): bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x7880, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000, 0x0, 0x0, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x13]}, 0x3c) 13:21:53 executing program 5: openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x800000, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) recvmmsg(r0, &(0x7f0000001d00)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}], 0x2, 0x0, 0x0) setsockopt$SO_TIMESTAMP(r0, 0x1, 0x23, &(0x7f0000000040)=0x9, 0x4) r1 = socket$inet6(0xa, 0x80003, 0x80) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") [ 758.443030][T21774] FAULT_INJECTION: forcing a failure. [ 758.443030][T21774] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 758.475398][T21774] CPU: 0 PID: 21774 Comm: syz-executor.4 Not tainted 5.4.0-syzkaller #0 [ 758.483873][T21774] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 758.494196][T21774] Call Trace: [ 758.494220][T21774] dump_stack+0x197/0x210 [ 758.494241][T21774] should_fail.cold+0xa/0x15 [ 758.494261][T21774] ? fault_create_debugfs_attr+0x180/0x180 [ 758.494277][T21774] ? ___might_sleep+0x163/0x2c0 [ 758.494305][T21774] should_fail_alloc_page+0x50/0x60 [ 758.494319][T21774] __alloc_pages_nodemask+0x1a1/0x910 [ 758.494335][T21774] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 758.494351][T21774] ? __alloc_pages_slowpath+0x2920/0x2920 13:21:53 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) openat$vhci(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vhci\x00', 0x52000) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000780)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000040)={'nr0\x01\x00', 0x1132}) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'nr0\x01\x00', 0x7132}) close(r1) 13:21:53 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x4004556e, &(0x7f0000000100)={0x0, 0x0, {0x0, 0x0, 0x0, {}, {}, @rumble}, {0x0, 0x5, 0x0, {}, {}, @rumble}}) 13:21:53 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x4004556d, &(0x7f0000000100)={0x0, 0x0, {0x0, 0x0, 0x0, {}, {}, @rumble={0x8}}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) 13:21:53 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x40045564, &(0x7f0000000100)={0x0, 0x0, {0x0, 0x0, 0x0, {}, {}, @rumble={0x8}}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) [ 758.494377][T21774] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 758.494397][T21774] alloc_pages_current+0x107/0x210 [ 758.506669][T21774] ? ___might_sleep+0x163/0x2c0 [ 758.506689][T21774] __vmalloc_node_range+0x4f8/0x810 [ 758.506714][T21774] __vmalloc+0x44/0x50 [ 758.506731][T21774] ? pcpu_mem_zalloc+0x8a/0xf0 [ 758.506747][T21774] pcpu_mem_zalloc+0x8a/0xf0 [ 758.506764][T21774] pcpu_create_chunk+0x12d/0x7f0 [ 758.506780][T21774] pcpu_alloc+0x10f3/0x1380 [ 758.506803][T21774] ? pcpu_alloc_area+0x820/0x820 [ 758.506818][T21774] ? bpf_map_area_alloc+0x20/0x30 [ 758.506843][T21774] __alloc_percpu_gfp+0x28/0x30 [ 758.517623][T21774] htab_map_alloc+0xdb9/0x11c0 [ 758.517659][T21774] ? htab_map_update_elem+0xca0/0xca0 [ 758.517677][T21774] __do_sys_bpf+0x478/0x37b0 [ 758.517695][T21774] ? bpf_prog_load+0x18a0/0x18a0 [ 758.517710][T21774] ? __kasan_check_write+0x14/0x20 [ 758.517724][T21774] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 758.517741][T21774] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 758.517757][T21774] ? wait_for_completion+0x440/0x440 [ 758.517781][T21774] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 758.517810][T21774] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 758.517824][T21774] ? do_syscall_64+0x26/0x790 [ 758.517841][T21774] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 758.517854][T21774] ? do_syscall_64+0x26/0x790 [ 758.517874][T21774] __x64_sys_bpf+0x73/0xb0 [ 758.626249][T21774] do_syscall_64+0xfa/0x790 [ 758.626274][T21774] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 758.626285][T21774] RIP: 0033:0x45a679 [ 758.626300][T21774] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 758.626308][T21774] RSP: 002b:00007fd557596c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 758.626321][T21774] RAX: ffffffffffffffda RBX: 00007fd557596c90 RCX: 000000000045a679 [ 758.626330][T21774] RDX: 000000000000003c RSI: 0000000020000040 RDI: 405a020000000000 [ 758.626339][T21774] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 758.626346][T21774] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fd5575976d4 [ 758.626360][T21774] R13: 00000000004c0c65 R14: 00000000004d4750 R15: 0000000000000003 13:21:53 executing program 4 (fault-call:0 fault-nth:70): bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x7880, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000, 0x0, 0x0, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x13]}, 0x3c) 13:21:54 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x4004556d, &(0x7f0000000100)={0x0, 0x0, {0x0, 0x0, 0x0, {}, {}, @rumble={0x300}}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) 13:21:54 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x40045564, &(0x7f0000000100)={0x0, 0x0, {0x0, 0x0, 0x0, {}, {}, @rumble={0x300}}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) 13:21:54 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x4004556d, &(0x7f0000000100)={0x0, 0x0, {0x0, 0x0, 0x0, {}, {}, @rumble={0x500}}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) [ 758.924275][ C0] net_ratelimit: 6 callbacks suppressed [ 758.924284][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 758.929934][ C0] protocol 88fb is buggy, dev hsr_slave_1 13:21:54 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x4004556e, &(0x7f0000000100)={0x0, 0x0, {0x0, 0x0, 0x0, {}, {}, @rumble}, {0x0, 0x6, 0x0, {}, {}, @rumble}}) [ 759.004315][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 759.010175][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 759.026782][T21795] FAULT_INJECTION: forcing a failure. [ 759.026782][T21795] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 759.092869][T21795] CPU: 1 PID: 21795 Comm: syz-executor.4 Not tainted 5.4.0-syzkaller #0 [ 759.101860][T21795] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 759.111920][T21795] Call Trace: [ 759.115227][T21795] dump_stack+0x197/0x210 [ 759.115248][T21795] should_fail.cold+0xa/0x15 [ 759.115265][T21795] ? fault_create_debugfs_attr+0x180/0x180 [ 759.115280][T21795] ? ___might_sleep+0x163/0x2c0 [ 759.115302][T21795] should_fail_alloc_page+0x50/0x60 [ 759.115321][T21795] __alloc_pages_nodemask+0x1a1/0x910 [ 759.135088][T21795] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 759.135111][T21795] ? __alloc_pages_slowpath+0x2920/0x2920 [ 759.135138][T21795] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 759.135157][T21795] alloc_pages_current+0x107/0x210 [ 759.145715][T21795] ? ___might_sleep+0x163/0x2c0 [ 759.163299][T21795] __vmalloc_node_range+0x4f8/0x810 [ 759.163329][T21795] __vmalloc+0x44/0x50 [ 759.178483][T21795] ? pcpu_mem_zalloc+0x8a/0xf0 [ 759.178499][T21795] pcpu_mem_zalloc+0x8a/0xf0 [ 759.178516][T21795] pcpu_create_chunk+0x12d/0x7f0 [ 759.187325][T21795] pcpu_alloc+0x10f3/0x1380 [ 759.187352][T21795] ? pcpu_alloc_area+0x820/0x820 [ 759.187366][T21795] ? bpf_map_area_alloc+0x20/0x30 [ 759.187390][T21795] __alloc_percpu_gfp+0x28/0x30 [ 759.187404][T21795] htab_map_alloc+0xdb9/0x11c0 [ 759.187432][T21795] ? htab_map_update_elem+0xca0/0xca0 [ 759.196924][T21795] __do_sys_bpf+0x478/0x37b0 [ 759.196944][T21795] ? bpf_prog_load+0x18a0/0x18a0 [ 759.206392][T21795] ? __kasan_check_write+0x14/0x20 13:21:54 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) recvmmsg(r0, &(0x7f0000001d00)=[{{0x0, 0x0, 0x0}}, {{0x0, 0xfffffe0e, 0x0, 0x2fe, 0x0, 0xfffffffffffffcf2}, 0x5}], 0x2, 0x0, 0x0) setsockopt$SO_TIMESTAMP(r0, 0x1, 0x23, &(0x7f0000000040)=0x9, 0x4) r1 = socket$inet6(0xa, 0x80003, 0x80) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") [ 759.206411][T21795] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 759.206427][T21795] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 759.206443][T21795] ? wait_for_completion+0x440/0x440 [ 759.206466][T21795] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 759.206496][T21795] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 759.216357][T21795] ? do_syscall_64+0x26/0x790 [ 759.216376][T21795] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 759.216389][T21795] ? do_syscall_64+0x26/0x790 [ 759.216410][T21795] __x64_sys_bpf+0x73/0xb0 [ 759.216426][T21795] do_syscall_64+0xfa/0x790 [ 759.216442][T21795] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 759.216457][T21795] RIP: 0033:0x45a679 [ 759.226581][T21795] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 759.226590][T21795] RSP: 002b:00007fd557596c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 759.226604][T21795] RAX: ffffffffffffffda RBX: 00007fd557596c90 RCX: 000000000045a679 13:21:54 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x40045564, &(0x7f0000000100)={0x0, 0x0, {0x0, 0x0, 0x0, {}, {}, @rumble={0x500}}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) 13:21:54 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x4004556d, &(0x7f0000000100)={0x0, 0x0, {0x0, 0x0, 0x0, {}, {}, @rumble={0x600}}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) [ 759.226613][T21795] RDX: 000000000000003c RSI: 0000000020000040 RDI: 405a020000000000 [ 759.226622][T21795] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 759.226630][T21795] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fd5575976d4 [ 759.226638][T21795] R13: 00000000004c0c65 R14: 00000000004d4750 R15: 0000000000000003 13:21:54 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x40045564, &(0x7f0000000100)={0x0, 0x0, {0x0, 0x0, 0x0, {}, {}, @rumble={0x600}}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) 13:21:54 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x4004556e, &(0x7f0000000100)={0x0, 0x0, {0x0, 0x0, 0x0, {}, {}, @rumble}, {0x0, 0x7, 0x0, {}, {}, @rumble}}) 13:21:54 executing program 4 (fault-call:0 fault-nth:71): bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x7880, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000, 0x0, 0x0, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x13]}, 0x3c) 13:21:54 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x4004556d, &(0x7f0000000100)={0x0, 0x0, {0x0, 0x0, 0x0, {}, {}, @rumble={0x700}}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) [ 759.724312][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 759.730469][ C1] protocol 88fb is buggy, dev hsr_slave_1 13:21:55 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) r1 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ubi_ctrl\x00', 0x1f1180, 0x0) ioctl$LOOP_SET_STATUS(r1, 0x4c02, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x2, 0xa, 0xd, 0x1, "b67db6a324d1509f8562dff36e455bca4fc3d461925e8f6e998778dff0bcc5bd46996684ceae8550ee1b8381b420f7f6e84cfa61f7e3315df80ece8eb107d110", "20996925e14d69649bffb07155302772150606d7d85b4f4e5f5d858e06f59c89", [0x1, 0x7]}) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x2400, 0x0) r3 = shmget$private(0x0, 0x1000, 0x8, &(0x7f0000a4f000/0x1000)=nil) shmctl$SHM_UNLOCK(r3, 0xc) shmctl$SHM_INFO(r3, 0xe, &(0x7f0000000280)=""/4096) r4 = syz_open_dev$mice(&(0x7f0000000080)='/dev/input/mice\x00', 0x0, 0x108100) ioctl$VT_GETSTATE(r4, 0x5603, &(0x7f00000000c0)={0xf78e, 0x658c, 0x6}) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000040)={'nr0\x01\x00', 0x1132}) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'nr0\x01\x00', 0x7132}) close(r2) 13:21:55 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x4004556e, &(0x7f0000000100)={0x0, 0x0, {0x0, 0x0, 0x0, {}, {}, @rumble}, {0x0, 0x8, 0x0, {}, {}, @rumble}}) [ 759.792922][T21823] FAULT_INJECTION: forcing a failure. [ 759.792922][T21823] name fail_page_alloc, interval 1, probability 0, space 0, times 0 13:21:55 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x40045564, &(0x7f0000000100)={0x0, 0x0, {0x0, 0x0, 0x0, {}, {}, @rumble={0x700}}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) [ 759.840551][T21823] CPU: 0 PID: 21823 Comm: syz-executor.4 Not tainted 5.4.0-syzkaller #0 [ 759.849294][T21823] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 759.859373][T21823] Call Trace: [ 759.862686][T21823] dump_stack+0x197/0x210 [ 759.867052][T21823] should_fail.cold+0xa/0x15 [ 759.871769][T21823] ? fault_create_debugfs_attr+0x180/0x180 [ 759.877614][T21823] ? ___might_sleep+0x163/0x2c0 [ 759.877640][T21823] should_fail_alloc_page+0x50/0x60 [ 759.877655][T21823] __alloc_pages_nodemask+0x1a1/0x910 [ 759.877674][T21823] ? __alloc_pages_slowpath+0x2920/0x2920 [ 759.877696][T21823] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 759.877708][T21823] ? rcu_read_lock_any_held.part.0+0x50/0x50 [ 759.877729][T21823] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 759.893243][T21823] alloc_pages_current+0x107/0x210 [ 759.893266][T21823] __get_free_pages+0xc/0x40 [ 759.926762][T21823] kasan_populate_vmalloc_pte+0x2f/0x1c0 [ 759.932429][T21823] apply_to_page_range+0x445/0x700 [ 759.937573][T21823] ? memset+0x40/0x40 [ 759.941626][T21823] kasan_populate_vmalloc+0x68/0x90 [ 759.946875][T21823] __vmalloc_node_range+0x47e/0x810 [ 759.952348][T21823] __vmalloc+0x44/0x50 [ 759.952366][T21823] ? pcpu_mem_zalloc+0x8a/0xf0 [ 759.952379][T21823] pcpu_mem_zalloc+0x8a/0xf0 [ 759.952392][T21823] pcpu_create_chunk+0x12d/0x7f0 [ 759.952416][T21823] pcpu_alloc+0x10f3/0x1380 [ 759.971012][T21823] ? pcpu_alloc_area+0x820/0x820 [ 759.980478][T21823] ? bpf_map_area_alloc+0x20/0x30 [ 759.980508][T21823] __alloc_percpu_gfp+0x28/0x30 [ 759.980523][T21823] htab_map_alloc+0xdb9/0x11c0 [ 759.980550][T21823] ? htab_map_update_elem+0xca0/0xca0 [ 759.990434][T21823] __do_sys_bpf+0x478/0x37b0 [ 759.990457][T21823] ? bpf_prog_load+0x18a0/0x18a0 [ 759.990472][T21823] ? __kasan_check_write+0x14/0x20 [ 759.990496][T21823] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 760.000892][T21823] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 760.000912][T21823] ? wait_for_completion+0x440/0x440 [ 760.000935][T21823] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 13:21:55 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x40045564, &(0x7f0000000100)={0x0, 0x0, {0x0, 0x0, 0x0, {}, {}, @rumble={0x3f00}}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) [ 760.000969][T21823] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 760.010480][T21823] ? do_syscall_64+0x26/0x790 [ 760.010498][T21823] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 760.010512][T21823] ? do_syscall_64+0x26/0x790 [ 760.010536][T21823] __x64_sys_bpf+0x73/0xb0 [ 760.031745][T21823] do_syscall_64+0xfa/0x790 [ 760.048120][T21823] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 760.073656][T21823] RIP: 0033:0x45a679 [ 760.077573][T21823] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 760.097198][T21823] RSP: 002b:00007fd557596c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 760.105655][T21823] RAX: ffffffffffffffda RBX: 00007fd557596c90 RCX: 000000000045a679 [ 760.105665][T21823] RDX: 000000000000003c RSI: 0000000020000040 RDI: 405a020000000000 [ 760.105672][T21823] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 760.105680][T21823] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fd5575976d4 13:21:55 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x4004556d, &(0x7f0000000100)={0x0, 0x0, {0x0, 0x0, 0x0, {}, {}, @rumble={0x3f00}}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) [ 760.105687][T21823] R13: 00000000004c0c65 R14: 00000000004d4750 R15: 0000000000000003 [ 760.106160][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 760.131095][ C0] protocol 88fb is buggy, dev hsr_slave_1 13:21:55 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x4004556d, &(0x7f0000000100)={0x0, 0x0, {0x0, 0x0, 0x0, {}, {}, @rumble={0x4000}}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) 13:21:55 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x4004556e, &(0x7f0000000100)={0x0, 0x0, {0x0, 0x0, 0x0, {}, {}, @rumble}, {0x0, 0x300, 0x0, {}, {}, @rumble}}) 13:21:55 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x40045564, &(0x7f0000000100)={0x0, 0x0, {0x0, 0x0, 0x0, {}, {}, @rumble={0x4000}}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) 13:21:55 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) r1 = socket$inet(0xa, 0x801, 0x84) connect$inet(r1, &(0x7f0000004cc0)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r1, 0x84, 0x9, &(0x7f00000000c0)={0x0, @in={{0x2, 0x0, @rand_addr=0xac14ffbb}}}, &(0x7f0000000180)=0x98) r2 = socket(0xa, 0x2, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setreuid(0x0, r3) r4 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r4, &(0x7f0000000180), 0x27a4eaa51029717, 0x0) setsockopt$packet_fanout(r4, 0x107, 0x12, &(0x7f0000000000)={0x4, 0x7, 0x2000}, 0x4) fstat(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fchown(r1, r3, r5) recvmmsg(r0, &(0x7f0000001d00)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}], 0x2, 0x0, 0x0) setsockopt$SO_TIMESTAMP(r0, 0x1, 0x23, &(0x7f0000000040)=0x9, 0x4) r6 = socket$inet6(0xa, 0x80002, 0x80) ioctl(r6, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") 13:21:55 executing program 4 (fault-call:0 fault-nth:72): bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x7880, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000, 0x0, 0x0, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x13]}, 0x3c) 13:21:55 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x4004556d, &(0x7f0000000100)={0x0, 0x0, {0x0, 0x0, 0x0, {}, {}, @rumble={0xff00}}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) [ 760.556605][T21854] FAULT_INJECTION: forcing a failure. [ 760.556605][T21854] name fail_page_alloc, interval 1, probability 0, space 0, times 0 13:21:55 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x4004556e, &(0x7f0000000100)={0x0, 0x0, {0x0, 0x0, 0x0, {}, {}, @rumble}, {0x0, 0x500, 0x0, {}, {}, @rumble}}) [ 760.625761][T21854] CPU: 0 PID: 21854 Comm: syz-executor.4 Not tainted 5.4.0-syzkaller #0 [ 760.634163][T21854] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 760.644259][T21854] Call Trace: [ 760.647665][T21854] dump_stack+0x197/0x210 [ 760.652026][T21854] should_fail.cold+0xa/0x15 [ 760.656661][T21854] ? fault_create_debugfs_attr+0x180/0x180 [ 760.662482][T21854] ? ___might_sleep+0x163/0x2c0 [ 760.667368][T21854] should_fail_alloc_page+0x50/0x60 [ 760.672590][T21854] __alloc_pages_nodemask+0x1a1/0x910 [ 760.677989][T21854] ? find_held_lock+0x35/0x130 [ 760.682773][T21854] ? __alloc_pages_slowpath+0x2920/0x2920 [ 760.688526][T21854] ? lock_downgrade+0x920/0x920 [ 760.693494][T21854] ? rwlock_bug.part.0+0x90/0x90 [ 760.698452][T21854] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 760.704724][T21854] alloc_pages_current+0x107/0x210 [ 760.709860][T21854] __get_free_pages+0xc/0x40 [ 760.714472][T21854] kasan_populate_vmalloc_pte+0x2f/0x1c0 [ 760.720126][T21854] apply_to_page_range+0x445/0x700 [ 760.725263][T21854] ? memset+0x40/0x40 [ 760.729277][T21854] kasan_populate_vmalloc+0x68/0x90 [ 760.734505][T21854] __vmalloc_node_range+0x47e/0x810 [ 760.739743][T21854] __vmalloc+0x44/0x50 [ 760.743839][T21854] ? pcpu_mem_zalloc+0x8a/0xf0 [ 760.748629][T21854] pcpu_mem_zalloc+0x8a/0xf0 [ 760.753235][T21854] pcpu_create_chunk+0x12d/0x7f0 [ 760.758179][T21854] pcpu_alloc+0x10f3/0x1380 [ 760.758202][T21854] ? pcpu_alloc_area+0x820/0x820 [ 760.758217][T21854] ? bpf_map_area_alloc+0x20/0x30 [ 760.758240][T21854] __alloc_percpu_gfp+0x28/0x30 [ 760.758255][T21854] htab_map_alloc+0xdb9/0x11c0 [ 760.758281][T21854] ? htab_map_update_elem+0xca0/0xca0 [ 760.758298][T21854] __do_sys_bpf+0x478/0x37b0 [ 760.758315][T21854] ? bpf_prog_load+0x18a0/0x18a0 [ 760.758330][T21854] ? __kasan_check_write+0x14/0x20 [ 760.758344][T21854] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 760.758363][T21854] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 760.808004][T21854] ? wait_for_completion+0x440/0x440 [ 760.808031][T21854] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 760.808058][T21854] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 760.808072][T21854] ? do_syscall_64+0x26/0x790 [ 760.808086][T21854] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 760.808099][T21854] ? do_syscall_64+0x26/0x790 [ 760.808121][T21854] __x64_sys_bpf+0x73/0xb0 [ 760.808138][T21854] do_syscall_64+0xfa/0x790 [ 760.808158][T21854] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 760.808170][T21854] RIP: 0033:0x45a679 [ 760.808184][T21854] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 760.808191][T21854] RSP: 002b:00007fd557596c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 760.808204][T21854] RAX: ffffffffffffffda RBX: 00007fd557596c90 RCX: 000000000045a679 [ 760.808220][T21854] RDX: 000000000000003c RSI: 0000000020000040 RDI: 405a020000000000 [ 760.830692][T21854] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 760.830702][T21854] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fd5575976d4 [ 760.830711][T21854] R13: 00000000004c0c65 R14: 00000000004d4750 R15: 0000000000000003 [ 761.004283][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 761.010134][ C0] protocol 88fb is buggy, dev hsr_slave_1 13:21:56 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000780)='/dev/net/tun\x00', 0x0, 0x0) r2 = socket$inet(0xa, 0x801, 0x84) connect$inet(r2, &(0x7f0000004cc0)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r2, 0x84, 0x9, &(0x7f00000000c0)={0x0, @in={{0x2, 0x0, @rand_addr=0xac14ffbb}}}, &(0x7f0000000180)=0x98) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r2, 0x400c6615, &(0x7f0000000080)) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000040)={'nr0\x01\x00', 0x1132}) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'nr0\x01\x00', 0x7132}) close(r1) 13:21:56 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x40045564, &(0x7f0000000100)={0x0, 0x0, {0x0, 0x0, 0x0, {}, {}, @rumble={0xff00}}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) 13:21:56 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x4004556d, &(0x7f0000000100)={0x0, 0x0, {0x0, 0x0, 0x0, {}, {}, @rumble}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) 13:21:56 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x4004556e, &(0x7f0000000100)={0x0, 0x0, {0x0, 0x0, 0x0, {}, {}, @rumble}, {0x0, 0x600, 0x0, {}, {}, @rumble}}) 13:21:56 executing program 4 (fault-call:0 fault-nth:73): bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x7880, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000, 0x0, 0x0, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x13]}, 0x3c) 13:21:56 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x4004556d, &(0x7f0000000100)={0x0, 0x0, {0x0, 0x0, 0x0, {}, {}, @rumble={0x0, 0x2}}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) 13:21:56 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x4004556e, &(0x7f0000000100)={0x0, 0x0, {0x0, 0x0, 0x0, {}, {}, @rumble}, {0x0, 0x700, 0x0, {}, {}, @rumble}}) [ 761.161894][T21876] FAULT_INJECTION: forcing a failure. [ 761.161894][T21876] name failslab, interval 1, probability 0, space 0, times 0 [ 761.234466][T21876] CPU: 0 PID: 21876 Comm: syz-executor.4 Not tainted 5.4.0-syzkaller #0 [ 761.242893][T21876] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 761.252970][T21876] Call Trace: [ 761.256284][T21876] dump_stack+0x197/0x210 [ 761.260646][T21876] should_fail.cold+0xa/0x15 [ 761.265356][T21876] ? fault_create_debugfs_attr+0x180/0x180 [ 761.271224][T21876] ? ___might_sleep+0x163/0x2c0 [ 761.276113][T21876] __should_failslab+0x121/0x190 13:21:56 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x40045564, &(0x7f0000000100)={0x0, 0x0, {0x0, 0x0, 0x0, {}, {}, @rumble}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) 13:21:56 executing program 5: r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f00000001c0)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000080)=0xf) ioctl$KDADDIO(r1, 0x800455ca, 0x0) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$snapshot(0xffffffffffffff9c, 0x0, 0x0, 0x0) r3 = open(0x0, 0x0, 0x0) ioctl$CAPI_GET_FLAGS(r3, 0x80044323, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_open_dev$sndctrl(0x0, 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(r4, 0xc4c85512, &(0x7f0000001640)={{0x5, 0x5, 0x8, 0x1, 'syz1\x00', 0xffffffff}, 0x0, [0x3ff, 0x3, 0x1ff, 0xffffffff, 0x2, 0x8df7, 0x8d5, 0x5, 0x100000001, 0x200, 0x1000, 0xff, 0x8, 0x64ab, 0x2, 0xff, 0x0, 0x2, 0x7fff, 0xfffffffffffffffe, 0x5, 0xffffffff, 0x1, 0x0, 0x1, 0x7a50, 0x6, 0xb6a9, 0x17, 0x84, 0x9, 0x4, 0x101, 0x20, 0x9, 0x6, 0x8001, 0x6, 0x10000, 0x3, 0x40, 0x6, 0x0, 0x7, 0x1e03, 0x6, 0x2, 0x8, 0x5, 0x1, 0x401, 0x0, 0xffffffffffffffff, 0x30, 0x4, 0x7fffffff, 0x7, 0x0, 0x9, 0x4b94, 0x3, 0x8, 0x9, 0x7, 0x3, 0x3f, 0x4, 0x0, 0x6047, 0x4, 0x3ff, 0x401, 0x7, 0xc00000000, 0x4, 0x0, 0x14d5, 0x7ff, 0x0, 0x1, 0x80000000, 0x7, 0x0, 0x4, 0x1, 0x7f, 0x81, 0x401, 0x3, 0x5, 0xb1, 0x0, 0x2, 0x7, 0x0, 0x9, 0x3bee, 0x20, 0x0, 0x8, 0x4, 0xb348, 0xffff, 0x5, 0x3, 0x1ff, 0x1f, 0x5, 0x2, 0x6, 0x0, 0x0, 0x0, 0x0, 0x30, 0x3ff, 0x8, 0x5, 0x0, 0xa6fa, 0x1ff, 0x4, 0x2, 0x6, 0x0, 0x8, 0xfffffffffffff001], {0x77359400}}) syz_genetlink_get_family_id$tipc(&(0x7f0000000140)='TIPC\x00') sendmsg$TIPC_CMD_SET_NODE_ADDR(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000003c0)={0x0}}, 0x0) eventfd(0x7) read$FUSE(0xffffffffffffffff, &(0x7f0000000640), 0x10000011b) write$P9_RWRITE(r2, 0x0, 0xfe5a) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) r6 = fcntl$dupfd(r5, 0x0, r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) ioctl$sock_inet_SIOCADDRT(r6, 0x890b, &(0x7f00000000c0)={0x0, {0x2, 0x4e23, @rand_addr=0x2}, {0x2, 0x4e20, @empty}, {0x2, 0x4e24, @multicast2}, 0x100, 0x0, 0x0, 0x0, 0x400, &(0x7f0000000080)='vxcan1\x00', 0x0, 0xffffffffffff2f7f, 0x8000}) ioctl$sock_inet6_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000040)) close(r2) r7 = socket$packet(0x11, 0x3, 0x300) recvmmsg(r7, &(0x7f0000001d00)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}], 0x2, 0x0, 0x0) setsockopt$SO_TIMESTAMP(r7, 0x1, 0x23, &(0x7f0000000040)=0x9, 0x4) r8 = socket$inet6(0xa, 0x80003, 0x80) ioctl(r8, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") [ 761.281080][T21876] should_failslab+0x9/0x14 [ 761.285631][T21876] kmem_cache_alloc_node_trace+0x274/0x750 [ 761.291574][T21876] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 761.297322][T21876] ? apply_to_page_range+0x562/0x700 [ 761.302644][T21876] __get_vm_area_node+0x12b/0x4f0 [ 761.307705][T21876] __vmalloc_node_range+0xd4/0x810 [ 761.312844][T21876] ? pcpu_mem_zalloc+0x8a/0xf0 [ 761.317654][T21876] __vmalloc+0x44/0x50 [ 761.321746][T21876] ? pcpu_mem_zalloc+0x8a/0xf0 [ 761.326544][T21876] pcpu_mem_zalloc+0x8a/0xf0 [ 761.331162][T21876] pcpu_create_chunk+0x196/0x7f0 [ 761.336135][T21876] pcpu_alloc+0x10f3/0x1380 [ 761.340682][T21876] ? pcpu_alloc_area+0x820/0x820 [ 761.345730][T21876] ? bpf_map_area_alloc+0x20/0x30 [ 761.350874][T21876] __alloc_percpu_gfp+0x28/0x30 [ 761.350899][T21876] htab_map_alloc+0xdb9/0x11c0 [ 761.350927][T21876] ? htab_map_update_elem+0xca0/0xca0 [ 761.365915][T21876] __do_sys_bpf+0x478/0x37b0 [ 761.370531][T21876] ? bpf_prog_load+0x18a0/0x18a0 [ 761.375488][T21876] ? __kasan_check_write+0x14/0x20 [ 761.380638][T21876] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 761.386215][T21876] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 761.391526][T21876] ? wait_for_completion+0x440/0x440 [ 761.396885][T21876] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 761.396918][T21876] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 761.396938][T21876] ? do_syscall_64+0x26/0x790 [ 761.413393][T21876] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 761.419478][T21876] ? do_syscall_64+0x26/0x790 [ 761.419504][T21876] __x64_sys_bpf+0x73/0xb0 [ 761.419523][T21876] do_syscall_64+0xfa/0x790 [ 761.419544][T21876] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 761.419560][T21876] RIP: 0033:0x45a679 [ 761.428673][T21876] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 761.428681][T21876] RSP: 002b:00007fd557596c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 761.428697][T21876] RAX: ffffffffffffffda RBX: 00007fd557596c90 RCX: 000000000045a679 [ 761.428707][T21876] RDX: 000000000000003c RSI: 0000000020000040 RDI: 405a020000000000 [ 761.428716][T21876] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 761.428725][T21876] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fd5575976d4 [ 761.428734][T21876] R13: 00000000004c0c65 R14: 00000000004d4750 R15: 0000000000000003 13:21:56 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x4004556d, &(0x7f0000000100)={0x0, 0x0, {0x0, 0x0, 0x0, {}, {}, @rumble={0x0, 0x3}}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) 13:21:56 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x40045564, &(0x7f0000000100)={0x0, 0x0, {0x0, 0x0, 0x0, {}, {}, @rumble={0x0, 0x2}}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) 13:21:56 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x4004556e, &(0x7f0000000100)={0x0, 0x0, {0x0, 0x0, 0x0, {}, {}, @rumble}, {0x0, 0x4000, 0x0, {}, {}, @rumble}}) 13:21:57 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000780)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000040)={'nr0\x01\x00', 0x1132}) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000000)=0x1) r2 = syz_open_procfs(0x0, &(0x7f00000001c0)='mounts\x00') syz_open_dev$tty20(0xc, 0x4, 0x0) sendfile(r2, r2, &(0x7f0000000180)=0x74000000, 0x5) r3 = syz_open_procfs(0x0, &(0x7f00000001c0)='mounts\x00') sendfile(r3, r3, &(0x7f0000000180)=0x74000000, 0x5) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000100)={'syzkaller0\x00', 0x2}) close(r1) 13:21:57 executing program 4 (fault-call:0 fault-nth:74): bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x7880, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000, 0x0, 0x0, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x13]}, 0x3c) 13:21:57 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x40045564, &(0x7f0000000100)={0x0, 0x0, {0x0, 0x0, 0x0, {}, {}, @rumble={0x0, 0x3}}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) 13:21:57 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x4004556e, &(0x7f0000000100)={0x0, 0x0, {0x0, 0x0, 0x0, {}, {}, @rumble}, {0x0, 0xff00, 0x0, {}, {}, @rumble}}) 13:21:57 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x4004556d, &(0x7f0000000100)={0x0, 0x0, {0x0, 0x0, 0x0, {}, {}, @rumble={0x0, 0x4}}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) 13:21:57 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x4004556e, &(0x7f0000000100)={0x0, 0x0, {0x0, 0x0, 0x0, {}, {}, @rumble}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) [ 762.204955][T21920] FAULT_INJECTION: forcing a failure. [ 762.204955][T21920] name failslab, interval 1, probability 0, space 0, times 0 [ 762.270503][T21920] CPU: 0 PID: 21920 Comm: syz-executor.4 Not tainted 5.4.0-syzkaller #0 [ 762.278896][T21920] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 762.289134][T21920] Call Trace: [ 762.292741][T21920] dump_stack+0x197/0x210 [ 762.297688][T21920] should_fail.cold+0xa/0x15 [ 762.302369][T21920] ? fault_create_debugfs_attr+0x180/0x180 [ 762.308862][T21920] ? ___might_sleep+0x163/0x2c0 [ 762.314496][T21920] __should_failslab+0x121/0x190 [ 762.319731][T21920] should_failslab+0x9/0x14 [ 762.324511][T21920] kmem_cache_alloc_node+0x268/0x740 [ 762.330150][T21920] ? ___might_sleep+0x163/0x2c0 [ 762.335088][T21920] alloc_vmap_area+0x147/0x2030 [ 762.339926][T21920] ? __get_vm_area_node+0x12b/0x4f0 [ 762.345198][T21920] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 762.350737][T21920] ? purge_vmap_area_lazy+0x40/0x40 [ 762.356884][T21920] ? apply_to_page_range+0x562/0x700 [ 762.362636][T21920] __get_vm_area_node+0x179/0x4f0 [ 762.367700][T21920] __vmalloc_node_range+0xd4/0x810 [ 762.373435][T21920] ? pcpu_mem_zalloc+0x8a/0xf0 [ 762.378217][T21920] __vmalloc+0x44/0x50 [ 762.382272][T21920] ? pcpu_mem_zalloc+0x8a/0xf0 [ 762.387734][T21920] pcpu_mem_zalloc+0x8a/0xf0 [ 762.392324][T21920] pcpu_create_chunk+0x196/0x7f0 [ 762.397252][T21920] pcpu_alloc+0x10f3/0x1380 [ 762.401839][T21920] ? pcpu_alloc_area+0x820/0x820 [ 762.407372][T21920] ? bpf_map_area_alloc+0x20/0x30 [ 762.412479][T21920] __alloc_percpu_gfp+0x28/0x30 [ 762.417335][T21920] htab_map_alloc+0xdb9/0x11c0 [ 762.422098][T21920] ? htab_map_update_elem+0xca0/0xca0 [ 762.427479][T21920] __do_sys_bpf+0x478/0x37b0 [ 762.432152][T21920] ? bpf_prog_load+0x18a0/0x18a0 [ 762.437183][T21920] ? __kasan_check_write+0x14/0x20 [ 762.442381][T21920] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 762.448197][T21920] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 762.453478][T21920] ? wait_for_completion+0x440/0x440 [ 762.458872][T21920] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 762.465567][T21920] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 762.473531][T21920] ? do_syscall_64+0x26/0x790 [ 762.478724][T21920] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 762.485238][T21920] ? do_syscall_64+0x26/0x790 [ 762.490020][T21920] __x64_sys_bpf+0x73/0xb0 [ 762.494437][T21920] do_syscall_64+0xfa/0x790 [ 762.498934][T21920] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 762.504905][T21920] RIP: 0033:0x45a679 [ 762.508787][T21920] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 762.528555][T21920] RSP: 002b:00007fd557596c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 762.537391][T21920] RAX: ffffffffffffffda RBX: 00007fd557596c90 RCX: 000000000045a679 [ 762.545964][T21920] RDX: 000000000000003c RSI: 0000000020000040 RDI: 405a020000000000 [ 762.554289][T21920] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 762.562499][T21920] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fd5575976d4 13:21:57 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x4004556d, &(0x7f0000000100)={0x0, 0x0, {0x0, 0x0, 0x0, {}, {}, @rumble={0x0, 0x5}}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) 13:21:57 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x40045564, &(0x7f0000000100)={0x0, 0x0, {0x0, 0x0, 0x0, {}, {}, @rumble={0x0, 0x4}}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) [ 762.571200][T21920] R13: 00000000004c0c65 R14: 00000000004d4750 R15: 0000000000000003 13:21:58 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x4004556e, &(0x7f0000000100)={0x0, 0x0, {0x0, 0x0, 0x0, {}, {}, @rumble}, {0x0, 0x0, 0x2, {}, {}, @rumble}}) 13:21:58 executing program 4 (fault-call:0 fault-nth:75): bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x7880, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000, 0x0, 0x0, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x13]}, 0x3c) 13:21:58 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x4004556d, &(0x7f0000000100)={0x0, 0x0, {0x0, 0x0, 0x0, {}, {}, @rumble={0x0, 0x6}}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) 13:21:58 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x40045564, &(0x7f0000000100)={0x0, 0x0, {0x0, 0x0, 0x0, {}, {}, @rumble={0x0, 0x5}}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) 13:21:58 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000780)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000040)={'nr0\x01\x00', 0x1132}) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'nr0\x01\x00', 0x7132}) close(r1) prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000080)) 13:21:58 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) recvmmsg(r0, &(0x7f0000001d00)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}], 0x2, 0x0, 0x0) setsockopt$SO_TIMESTAMP(r0, 0x1, 0x23, &(0x7f0000000040)=0x9, 0x4) r1 = socket$inet6(0xa, 0x80003, 0x80) r2 = socket$inet(0xa, 0x801, 0x84) connect$inet(r2, &(0x7f0000004cc0)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r2, 0x84, 0x9, &(0x7f00000000c0)={0x0, @in={{0x2, 0x0, @rand_addr=0xac14ffbb}}}, &(0x7f0000000180)=0x98) r3 = socket$inet(0xa, 0x801, 0x84) connect$inet(r3, &(0x7f0000004cc0)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r3, 0x84, 0x9, &(0x7f00000000c0)={0x0, @in={{0x2, 0x0, @rand_addr=0xac14ffbb}}}, &(0x7f0000000180)=0x98) io_uring_register$IORING_REGISTER_FILES_UPDATE(0xffffffffffffffff, 0x6, &(0x7f0000000080)={0x6, &(0x7f0000000000)=[r1, r2, r3]}, 0xe2eb73783fec3f82) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") 13:21:58 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x4004556d, &(0x7f0000000100)={0x0, 0x0, {0x0, 0x0, 0x0, {}, {}, @rumble={0x0, 0x7}}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) [ 762.997444][T21943] FAULT_INJECTION: forcing a failure. [ 762.997444][T21943] name failslab, interval 1, probability 0, space 0, times 0 [ 763.064773][T21943] CPU: 1 PID: 21943 Comm: syz-executor.4 Not tainted 5.4.0-syzkaller #0 [ 763.073504][T21943] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 763.083737][T21943] Call Trace: [ 763.087048][T21943] dump_stack+0x197/0x210 [ 763.091471][T21943] should_fail.cold+0xa/0x15 [ 763.096090][T21943] ? fault_create_debugfs_attr+0x180/0x180 [ 763.106710][T21943] ? ___might_sleep+0x163/0x2c0 [ 763.111622][T21943] __should_failslab+0x121/0x190 [ 763.116830][T21943] should_failslab+0x9/0x14 [ 763.116849][T21943] kmem_cache_alloc_node_trace+0x274/0x750 [ 763.116868][T21943] ? do_raw_spin_unlock+0x178/0x270 [ 763.116890][T21943] __kmalloc_node+0x3d/0x70 [ 763.116909][T21943] __vmalloc_node_range+0x1db/0x810 [ 763.116936][T21943] __vmalloc+0x44/0x50 [ 763.146227][T21943] ? pcpu_mem_zalloc+0x8a/0xf0 [ 763.151103][T21943] pcpu_mem_zalloc+0x8a/0xf0 [ 763.155712][T21943] pcpu_create_chunk+0x196/0x7f0 [ 763.161806][T21943] pcpu_alloc+0x10f3/0x1380 [ 763.166523][T21943] ? pcpu_alloc_area+0x820/0x820 [ 763.171638][T21943] ? bpf_map_area_alloc+0x20/0x30 [ 763.176875][T21943] __alloc_percpu_gfp+0x28/0x30 [ 763.181848][T21943] htab_map_alloc+0xdb9/0x11c0 [ 763.186827][T21943] ? htab_map_update_elem+0xca0/0xca0 [ 763.192495][T21943] __do_sys_bpf+0x478/0x37b0 [ 763.197363][T21943] ? bpf_prog_load+0x18a0/0x18a0 [ 763.197377][T21943] ? __kasan_check_write+0x14/0x20 [ 763.197393][T21943] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 763.197406][T21943] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 763.197424][T21943] ? wait_for_completion+0x440/0x440 [ 763.207937][T21943] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 763.207974][T21943] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 763.230384][T21943] ? do_syscall_64+0x26/0x790 [ 763.230404][T21943] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 763.230416][T21943] ? do_syscall_64+0x26/0x790 [ 763.230437][T21943] __x64_sys_bpf+0x73/0xb0 [ 763.256469][T21943] do_syscall_64+0xfa/0x790 13:21:58 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x40045564, &(0x7f0000000100)={0x0, 0x0, {0x0, 0x0, 0x0, {}, {}, @rumble={0x0, 0x6}}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) [ 763.260999][T21943] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 763.266906][T21943] RIP: 0033:0x45a679 [ 763.266923][T21943] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 763.266931][T21943] RSP: 002b:00007fd557596c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 763.266946][T21943] RAX: ffffffffffffffda RBX: 00007fd557596c90 RCX: 000000000045a679 13:21:58 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x4004556e, &(0x7f0000000100)={0x0, 0x0, {0x0, 0x0, 0x0, {}, {}, @rumble}, {0x0, 0x0, 0x3, {}, {}, @rumble}}) [ 763.266953][T21943] RDX: 000000000000003c RSI: 0000000020000040 RDI: 405a020000000000 [ 763.266961][T21943] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 763.266969][T21943] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fd5575976d4 [ 763.266977][T21943] R13: 00000000004c0c65 R14: 00000000004d4750 R15: 0000000000000003 13:21:58 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x40045564, &(0x7f0000000100)={0x0, 0x0, {0x0, 0x0, 0x0, {}, {}, @rumble={0x0, 0x7}}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) 13:21:58 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) recvmmsg(r0, &(0x7f0000001d00)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}], 0x2, 0x0, 0x0) r1 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$setperm(0x5, r1, 0x202002) keyctl$chown(0x4, r1, 0x0, 0x0) r2 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$setperm(0x5, r2, 0x202002) keyctl$chown(0x4, r2, 0x0, 0x0) keyctl$link(0x8, r1, 0x0) setsockopt$SO_TIMESTAMP(r0, 0x1, 0x23, &(0x7f0000000040)=0x9, 0x4) r3 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000140)='/proc/capi/capi20ncci\x00', 0xe1ea7210b028a908, 0x0) write$P9_RCLUNK(r3, &(0x7f0000000200)={0x7, 0x79, 0x2}, 0x7) r4 = openat$ocfs2_control(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ocfs2_control\x00', 0x40000, 0x0) ioctl$RTC_PLL_GET(r4, 0x80207011, &(0x7f0000000100)) r5 = socket$inet6(0xa, 0x80003, 0x80) ioctl(r5, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") 13:21:58 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x4004556e, &(0x7f0000000100)={0x0, 0x0, {0x0, 0x0, 0x0, {}, {}, @rumble}, {0x0, 0x0, 0x4, {}, {}, @rumble}}) 13:21:58 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x4004556d, &(0x7f0000000100)={0x0, 0x0, {0x0, 0x0, 0x0, {}, {}, @rumble={0x0, 0x8}}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) 13:21:58 executing program 4 (fault-call:0 fault-nth:76): bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x7880, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000, 0x0, 0x0, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x13]}, 0x3c) 13:21:58 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x40045564, &(0x7f0000000100)={0x0, 0x0, {0x0, 0x0, 0x0, {}, {}, @rumble={0x0, 0x8}}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) [ 763.738685][T21980] FAULT_INJECTION: forcing a failure. [ 763.738685][T21980] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 763.779271][T21980] CPU: 1 PID: 21980 Comm: syz-executor.4 Not tainted 5.4.0-syzkaller #0 [ 763.787646][T21980] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 763.787656][T21980] Call Trace: [ 763.787677][T21980] dump_stack+0x197/0x210 [ 763.787705][T21980] should_fail.cold+0xa/0x15 [ 763.787729][T21980] ? fault_create_debugfs_attr+0x180/0x180 [ 763.787744][T21980] ? ___might_sleep+0x163/0x2c0 [ 763.787772][T21980] should_fail_alloc_page+0x50/0x60 [ 763.787788][T21980] __alloc_pages_nodemask+0x1a1/0x910 [ 763.787803][T21980] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 763.787825][T21980] ? __alloc_pages_slowpath+0x2920/0x2920 [ 763.805649][T21980] ? kasan_unpoison_shadow+0x35/0x50 [ 763.805670][T21980] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 763.805690][T21980] alloc_pages_current+0x107/0x210 [ 763.805715][T21980] __vmalloc_node_range+0x4f8/0x810 [ 763.821486][T21980] __vmalloc+0x44/0x50 [ 763.832036][T21980] ? pcpu_mem_zalloc+0x8a/0xf0 [ 763.832052][T21980] pcpu_mem_zalloc+0x8a/0xf0 [ 763.832069][T21980] pcpu_create_chunk+0x196/0x7f0 [ 763.832087][T21980] pcpu_alloc+0x10f3/0x1380 [ 763.832112][T21980] ? pcpu_alloc_area+0x820/0x820 [ 763.843373][T21980] ? bpf_map_area_alloc+0x20/0x30 [ 763.843402][T21980] __alloc_percpu_gfp+0x28/0x30 [ 763.843418][T21980] htab_map_alloc+0xdb9/0x11c0 [ 763.843444][T21980] ? htab_map_update_elem+0xca0/0xca0 [ 763.913883][T21980] __do_sys_bpf+0x478/0x37b0 [ 763.918477][T21980] ? bpf_prog_load+0x18a0/0x18a0 [ 763.918491][T21980] ? __kasan_check_write+0x14/0x20 [ 763.918506][T21980] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 763.918521][T21980] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 763.918542][T21980] ? wait_for_completion+0x440/0x440 [ 763.945333][T21980] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 763.951613][T21980] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 763.957097][T21980] ? do_syscall_64+0x26/0x790 [ 763.961804][T21980] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 763.967902][T21980] ? do_syscall_64+0x26/0x790 [ 763.972608][T21980] __x64_sys_bpf+0x73/0xb0 [ 763.977051][T21980] do_syscall_64+0xfa/0x790 [ 763.981581][T21980] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 763.987487][T21980] RIP: 0033:0x45a679 [ 763.987505][T21980] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 763.987514][T21980] RSP: 002b:00007fd557596c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 763.987529][T21980] RAX: ffffffffffffffda RBX: 00007fd557596c90 RCX: 000000000045a679 13:21:59 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x4004556d, &(0x7f0000000100)={0x0, 0x0, {0x0, 0x0, 0x0, {}, {}, @rumble={0x0, 0x300}}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) [ 763.987538][T21980] RDX: 000000000000003c RSI: 0000000020000040 RDI: 405a020000000000 [ 763.987546][T21980] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 763.987554][T21980] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fd5575976d4 [ 763.987567][T21980] R13: 00000000004c0c65 R14: 00000000004d4750 R15: 0000000000000003 [ 764.011788][ C1] net_ratelimit: 4 callbacks suppressed [ 764.011796][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 764.029151][ C1] protocol 88fb is buggy, dev hsr_slave_1 13:21:59 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000780)='/dev/net/tun\x00', 0x0, 0x0) r2 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r2, &(0x7f0000006b00)=[{0x0, 0x0, &(0x7f0000000400)=[{&(0x7f0000000180)="49169fa476d7c51ca8a459ae89556d62fb0f5c6d565bdff85103cf26c12ed7029d936e051af3dbb097d4a31e64739f53bce6b7a3d00eda4580b57dcb4397218333", 0x41}, {&(0x7f0000000200)="44298bef3a05b0d843ffae57a3f573986226856f3eb78dc6002ec1fbefaddf11b15a562a3e5ded30318b725b64c9d9b028823a7372f5d4daa0adf5cb872f5ff3ab78b1a63b30608563cee56b377b1cdcc94cabebe55c2f2634415930bbaec04012f2fb6fc4ec71ebc961da0c0a419002cf9c65f87b52b6f344d4601d65e936bb2e20", 0x82}, {&(0x7f0000000100)="32f54efd71e1f66fad8007dfc4173434bebf44f6561467eedc462ecba67e17ee7a984d7be5ca516c5667bf9ef9", 0x2d}, {&(0x7f00000002c0)="19f7627274560701dbc659fab5c03747b5ff397e5d74831807a513d6d960f9103e487538a5e854bab4998d09a646a8e91765398ee19383d0d442dd36df16e876b2e7948ca6e87896fd90d21faae8117fec1592fdcedc57164d8d1e109ece629e992f977a2d065b12de01574185d39d987e8e4ccc", 0x74}, {&(0x7f0000000340)="21657fc97788ceb769b2d0d4897f83fc0c930baaaa6690a2b728744b4e9be20de2c80a84bb037a4854b4a091a02f62173ccfb9b89842823495f58977ac22531762b963f6d7cc372636984f37f6a815353ad138959d9113bd56b033122368c5282dbe71b84cb6b00786af45bf1e87d42444700ebaa16b4ff225d05f21a9f75446520823cf72fc8d68c9f46c13c97077c5823589ce8b04e644caa4", 0x9a}], 0x5, &(0x7f0000000480)=[@iv={0x58, 0x117, 0x2, 0x3e, "3103d8d482cd7417be5048c2a9261cc9f80e9c36164544ce22e2ac7f8d236c7a05125e46eb573936e0c37be25702b7bde034452df269c4c427d92a7fb27f"}, @op={0x18, 0x117, 0x3, 0x1}, @iv={0x38, 0x117, 0x2, 0x1f, "d7bef798ab1dc1010f256db5f104f5d6bb7707f747b8ece790026b6e4b57b3"}, @assoc={0x18, 0x117, 0x4, 0x1ff}], 0xc0, 0x4000}, {0x0, 0x0, &(0x7f0000000600)=[{&(0x7f0000000540)="5338658c0cd1344829d340e2c337dcb984ab105834f4b7e3701e16b9d44b4fad47f3b44e048de3914f86060cb0681cdf1db2c1ec23bb89a66e1e42c442ca14512df6768423c881c369047aff13826117d80486b32b8bd4bf19334c588db11d31fe5deb37e734a98d03f30ba0604dd8074d57354f55f6936202270ff4124836c16d6b52543adf3674a47c82071238596af1fc6297809894d5dc8e1b2767be06f4174aa149b49e46348a1d8c7779167cfb2d79788ce127a3d6a28a5a564c", 0xbd}], 0x1, &(0x7f0000000640)=[@assoc={0x18, 0x117, 0x4, 0x9}, @assoc={0x18}, @op={0x18, 0x117, 0x3, 0x2}], 0x48, 0x8008}, {0x0, 0x0, &(0x7f0000000900)=[{&(0x7f00000006c0)="85272d13c8c7dd56d0ccb5506c805ed53c4bb704fb54fef9c8673c06a132310e288300706ea179d43baf1873a15dda31a1693e739556", 0x36}, {&(0x7f00000007c0)="2bfd6dc7f286c0c7356346f25cee7caa914e7d9b071197ab99e40e08a9a1b2bb4a3f7a708739340840a8440b429c1fe5602954f852004765100d0bbd2dc7a77bbcae2777d96fa126161562116d21ab46b1a0d779d5d9f01a30db5a19e51b8982ec2ad8cca3b6b6198ac958082002f994a1eaa472d6df8adab65440a7d5eb7eae5313cb93bbfd9a05bcd999200abda41ed1508f73bcce", 0x96}, {&(0x7f0000000700)="fc8533b7e74b209f49eb02d09a2be8dc627a1cb32579d2381c1d8cda6740e7d5599d177fe80d2f40dd2e1fb80ea947b867cbe2f4690bc4156fbcb97a5096ff7e36ca4adf0d2124f2af62cffaa3ca4f415d154ae7ac372fa82ab7e9f935e8cc08b8", 0x61}, {&(0x7f0000000880)="0a3d98628843f254dd3d48e982e05582765e5f8ec4a88a88f396e635eb554ae733aaf4b189963688efa29a16073066bbc91fd75cb3e3caeb2bec6036d013dec895d585716cfa89407bd38748d345e876b173b7d3f0a3df5a4a8eb8dfea61b1be", 0x60}], 0x4, &(0x7f0000000940), 0x1098, 0x53e278b5b0d39a85}, {0x0, 0x0, &(0x7f0000002f00)=[{&(0x7f0000001a00)="97e02726ed7dd53bdf238cb06a4da0ad836d77528984298c219c815c8e9edb3f5c24af6fe6a8f96a11821581e45df7f4aec745ae63157a01adfc", 0x3a}, {&(0x7f0000001a40)="03b683921b5acb307bbe27a8b3261ae4a384d76989fe9cc97becf4e85fd64de878ec4d7e540fa8ea9c96629d2e5c6106614d6db638fe798a1aad5dacb3571f0e219810c0cc0633b017fc1cbd2e46a702992a328df3d09ef33d1e0ca1f160cd3826ad0d70b2692e216dc190e5f05b3d5b2629d52f51aa4b60675640df012cc47406988bd90bf56850ed4938a4e14d8f8e1b6de1a112ba96934f0eda0f3d1690967b77a7d7b0ae1f9a8579182b9c4e6a4c088d12b669ded307cfdd4722419dd6678c554f7826aa23d32d89f1d32f21f64c41974446d22d9531a22d67996236d930b91e33098f069d70d1fdae8ffec95a811a0cb6498d35bb435632ebaae9256ac166f70c7b79ffc42f5f2c8c4844ca87accb197ca33f8f52d1df1a904d89be1978aef74107eaf69d2cbc669d24b74ad6bf1a416b967574c590e33f5eafebcccdebe71afd32a3b6edd00e07ee4f08dd9ce11ca493b636280b6279ac4342aea7ae51675f6b88d973bf8be0ea5b63a7f5bb5297dd44090f149835c0cc44aed1e4f9834e5196f33bd1a3cd3bbe32471f67a19f1e884e6eee3d2a910fbd7328a66231eee09f077b38121995835e7eb6ff164a387d67d45744243668ec7fc83081d178a4a091e10786cde5d1d46eff63c79576bd4ddc96819bfdff1fd1f4f36e7835944c372b87f1f1ff508683e056d440f118e966c13e7a8eab87682c3d77e48de5999a3cfc3a4a7c49aa125118562093dad2eaf0f219ee3fca35bd704ece4142e3032b5d06b05cca667cd0a61bf9b3d93a2967195c7baf7e3d802155488839a613d8759a5a9e9045e55b6e894e51e1c46db12ae2dbc9c5785119034a10b5ebfb4c3da097a036ae1102598721a154f669c98b51d63ec9f586763c3b78d4d2bb39f5dd343ee55c9819b7ff35cb236a720a33eb5bd0bb08cff2b45cbe7a986ae59e3e76c3372e491a7422ed428e2b7ba16f4d65cb18132dfb4bd60656b390007017cc4e70e58ad886c17346a3297d64b88cbf2c9fce76c133b2d12d4d28154e00908b097c56d9b5a277034ded680a98d5bc08c4b0b918cc9aab88939f945eef93ebd08794600d98ee28ae450ce145691333f731a2284eb3a4284f517aef983b97be69415e3f406a4098629e62466122fd62382f44c2a14c828a5f971efd0eb45ce9b36be3854c660bb61cad511f04d886030094f38250a32bc50128b1a074f83a072e2e1722ef5743c43d81792fd659f9b582f909b91443763e63d339a1b1eedeb583413a491845b4eb24a2f9a115f8890510b5f876aa7bd20dde47e27429d2553fd81ed276ceeeac85e0856bc569e773c33b1f9367cae57f43808467eed16d29491d9fcc2a849c066e0b61e6400ff3a865d31ee64e2994e89b5aa806706d2b359d85427af1656afc05559f690b5b5c6e68322a2705a448a4e0a2955daadc333f38edf6a450c19404acc51d17fe1315eea9360905fc3565dc125f17328baa75eae5ab9cd2340a5539710e2126e9eefc022c35268f3ad5c1063e978170573acf9b33f784666f4a933e82dae61bfe53e2f54d029dd1a4c3c7f4b63d85da8e97e8656b9c9bd1efbc9b1f75701379caf6958b14d9181e0a3bdd960df9faf1c7fd189bddb8ad561069700eddba337a549b64c819dfea5a96c5c7c4f16b46f742294f9e9dde865052143ac1b7684cd130c50b97c3f00301ae3f9366fe9fe3cf7b7b55e3c001dbb7349e79f6829c07a50843c8d7f2d56f760bf479227cab46d9ba13ca2d9e43085dcbabc2ad9f9a8f742adbe0366888e01336fa345cb161141a027640faacdff561564ebebcc6cde42488257ea28d9db90fb77dbce0dbb31bd1a7fe842dbaf8a6ee90d5bc2750580240aff06301aa114b6a48f53d070b9f5c4a3b37ef8d8d36b17d69f07838098c85ea7bef108ba3f7a83d7f3ce43ec715797b7aeee7cdc6d596fedf3cb2f0a3fc4a6620f8ab1b5d9d3fc31fa360c46fc7eb0212058e54f55537585e757c75f9ac5c4053e9fb7bd30dfd70f85decfa6e74d9318809f74e7b84c26fa7fcd07ee19fbd65fb1ab0539f32d108a0f54000c2e01aed4629ff12c5f10825f0058257a37f1812a6d5750a65b90b94cc7815b85a56d5a857f7227e5a340fb98e51a865471ea4e8efb39dcf3e533b7e07467dcf8ce77c039efc311f0f875a56e124a6ba3c36ccd983eaea0335cc725d2c3bce013c4b35d3f6f64fc7c02c6ae39354842beb3d995ce09ba7e901d9def51825bd5781f85f73aedb250087ed8c3cd0b2f2435daa0868a597a557bfb75eb621b19458db9fe930c6ae2f48799a9cf8ff14409104e52c788f8fdc9104cfda93344419c44fba2ed61196e290c7f96f73cd75dcd2d291edd4f10f08ba891be5722e207bba0d7b1db37b23852f7358736cba8b9b6ed55490d8856bfe4551195567336ef187bb667a4cfce47f1bf03b03c0c43c15b671d559e5e4dbb514ebde0f1261cd9b90519e71e010bf7152c313101bfe3c86f2738ed12a44bbbf3b5d448fa57f56159ad08d16e6123f513aadc4a38e9341083438d9b9adc9a994f40f12880896758ba45a1f064855d9cdaa051184a7fba632509d44f13e17bfcd419c30a375d80d7601d632175470abc9452d0936aaa0dbd35df2116d894e8e128e886800c236040fa3a471c40bdee5915236b519b405df6d5b26bfc471554451bce632a95476bbf41c441fb6d47713bd978aaabd6b68f06c6a1c52fbdec674988da11264b8690b7ce7712fdb280ce09c95f13b994e62a6598546936598a38cae28261b95f3a89fca63834fd00ac66c39c51be81734a4e55f958406cd9b44a700dcb82fff23632500847d5cd86ceb7230aa6a22366e87dd43943daedfc4ca0b3a455fc0830978ea37f4674cbf5a343b0a3bbf20b436a250d4f73a8ef31200c292f16d7ecc4483d342ca1453c6ffd6c9bb59e51738790d19cc2e247232ad1dcae3326410a6501f115f8ca673ed4835393d2776abea31c68073be1f7b1b06070d7b079868873df01daa5f456f150b8680ae2115e3bee2e6dcbe4bda714b48f5c8e9c71fa91246f0d3e0aaa65b93ba68a50c12e950163da8fae7e059dd7c976f1efdbe7168a0d6902648ed637bc6a9baec751f7a2d4e346a5b4eda927a9780bfb2385c4d4ff1bafff6fe34242fc32b47d2d428c2c3149507e930ce48b0c75f9aa2fe3d94f57b4b79bda9ae4fb3dcde312737c7d628a2cd9840f8d3156a31ca7bf32db9c64f94658e0297510f5b625ae74f3bae9dd32c3e9514590c49f72444c533815b541487e7a594d8905db5daf0f780de822c703f91809889b3a06e39aadb8bdda638f52a9947a9aa1ecc9553426c8e1da745742ba48da503d21b779d3104f5749b6c05516988dc1b444c36612d46584828cb3bf61a7ff952e339fe1cdeb41a74bd339dec55577181186be0b9a021c273eed8a3500eed23247eef979aaa7936e6a8438cc6ee4b1ffbbd137031ec4238632ac7a71341b163833affd0051538cc7afe877bf085387afff34b5685756651046f116703f7996d5125f3e8a11970988fbb5b6c178b51fb0574eefe843e72573a88e85261e33ce528c6004a91a253cab4d9da3ae00bd815286a02f1923eab17881ef45f9df70be788dde475f405e6967862ca33c6d5dd5f78dc5c1901ebb0fff89d436c492bcd04295c962a501e98f75c97b12b94a3b7801d071079db241d0b3547c96f63b1768a3de8ccab591d4ea6d37c67c97ea48fc4996a1fdad1d16d0e3133bb203bf4b95cd356d23f4862f0d849b5a7987f7aeec1c3673700fdf3a770745ad56c17fa6f24a0a58b9d8ed76b05f5d7fe7ef46f1f4cb0cbf1dcdfd0e3b65d5c542dbd8d6fbedd1b382e7738fabd3ffb924fe5035f5cc2c8aa14db8c95e6ed8fe1465dd762f7c6da64979e7b3e4f19241824adf4ca7a18f88187a309be7caa780c71a9c08538dc5f526b96f45d6f16abf18928f10984d38b42c7f44b8ec8e92f07286f4b6727efbae4997152f0e473d56de6199ded0a1bac0da7a13bd8bbbf3b25dec8cebe0e2ec08d23789c8daf3c8c92beb8c3e977b2780f72098145d0bf32bf54f82ce4b0543371414456174ac4fc975ed4f2b40edc4d432e06416d89557150940713b9e8d1e361431e9704ee6986484208e18891ed300bac303fe2ce5b7626e72a0013787564d670abd97f8517ac4fff055ea319426d3adee0fa6688ac3a4c2a238115221fcb438f0de4c65752ca62a59645698a022a519a5cbd9142e60b37896a65fdb140fcc6c6f290a609a4212dce9cb548e31031bb1e38bf3db13ef2c869329b17eff9078f1b311c3fa525ee04d260f4df81f6efcf8457d82cc09ade5204cada548dbfd25b48dc2c1709c671aaf8aea8c5671a3b116a0fd7a3f553853c71ddb30b3f2f0f95aec011d467771aa73d6a19cac4831dbf1262ebf3c73725def4a2f4a9113db3c3a1155c4cfaa9996d9f60d1420d1a56240480f06ea068b95b3455e0d93cecc0c23834edd8e5eb1fa4176ae57331c42efc632ecf96fc8badf2926ed5e5b1ee835b5bcbc8373e650da1ba8be281317f85deb195c8e4b5cde01cb3b17be9e1020f1994fc2ea13a051404caceb246af8d3ea514617af2f78b0dea9d9a50a23de0d46a9afc4c96dbf78ea4b7035927c01977fcc4ba9a011b637a8d44c80bd9e9889bcf49f6a3c432893c71bcd851e8c7baebe36feb14d39d02791bc260cfb2bd9d2e1d46bd52966cbc2c2d38082936175569e737d471130599a8b808cf109f8b417fd2afe54d27bd196ba9ea65a82e2337b09639b87e8e7fe0838c50fdef51a623d5885506bf5b097228ae07e5ac787d9c807ab7eda424352ab1c2dcebc8f831c8feef965670d4e276d59f74d243eaf4e9f96863730da8972111fd6ce529f3a1f1525275ffbc7ed3891e6caa55584c982afdf665dd1198f67124619ae76f92d564f1c72207ac12a9b1643ff1a5658ac52f463d1fd669b7f6ab55a90bde879a1892ef82c4ac65695c7dd350f27e22e28f6dec819adade1af1511e75ceb717d29c25efe8a79d392018c7b37992a26c251b56c37aaf435d2b716dd567943eee740792fd7af053b16c2568641fb208c95ab4e7eec979044e947d77f4b6989d05db77131c30d9c77a7bb827c67654bd18f3b0bcfc9e0a6f22fe65afe2d4db867c97272bc7ccc755f824b36de456ec45dd714895f359e02e3280f5e8c52c78e139393750f8c856e405adeba7d5a97084b02f136cd969ff6dfa662767b2477d27dd831a047fa8297547751fb2c84e6786afed76bfb164b461f384b5f867120f9eff698a4cee9f0cc1290b428fdec4c26b297dac2b89f54712764d7b620c9995d17ea27686f17e720dae4fa315506c13f151b95f468e52b1934262f5096f66bfc864d4d013c9474c62111d7ffef3d901b03848512203a07d6f82eeedf9e4662a0e8c4d282a705877dde498308571a03547859d01453712dc6b46a8f7335201b903aa063b895289c5c69a2a8c0b1cabbaf2c4c5f4ee0fe0ea74c995df32b40b3f6096017c4c8b4595ad335588a2209ead2d6e4451130e37b7dc2996262c88a7b6bcf89b0e76b33a1732c49e3d2216fd34a218508fa1372f9cc8f80a46935fdd7880233c71933f894e4c95b78092119dac255601bacb9ab860a803c655a33e194c57d755114c47066a74bcfdf7dea66ff8bb177c060bc7a68cb0e65f35f351baaf8b645b45ab1b1f4cb8e658c35102806cd8bc738b6fee55f27fb54570b413bc513ce4f3abb19904526d1216ec14761abc1714fcffce0a2e255dfa078fa4608ec07142", 0x1000}, {&(0x7f0000002a40)="e925a829822ba05239d50b9098517c6e68902ee195da43852e7d7fbde19e2ff0c8fcbe41d4a226cb834580dce53a74270aec64a4e08c7caa81ea63d1c461ebe4d7b77e", 0x43}, {&(0x7f0000002ac0)="5d92ab47aeab85b2583fc63b88f2d9a5c25e09b4dd9ba276d64f8eff8b69484efe8a4b3aaf8017ad82fd402d3e65c6411631d8ae9b397e9064abd111f71743b0310d09b49b9074d4f96d3149f8714bfa666267ed2329bd7e2c8297620d59ccb6333af92b5e29c91feb05a627359df5b2e5bc0a1f5131f54fcdfed41e8a915ed1060b9dc23e5fba77c71f141a8d461e0dc0769880a8495bd6780a1718ca39f5d5f739037b42002a5bb25c164d6545f2c80e532685b8bb809f49ed6d16f04e693c976d6823faeaeeef39363831381e77fd8eaceccea68a320ed76eeddb9ddd3038ef", 0xe1}, {&(0x7f0000002bc0)="6ed17641e5be43798f01a4c9ac9531420de5b0b64e3e6f564f75c25f8b7083829b9c191683ee855426001382db42f9d6563af9aeddc8983e186d8b092a34ff3ffb", 0xfffffffffffffeb7}, {&(0x7f0000002c40)="bc0e616a6ad1124082518c053e5a865236d58605f3d990524d32dc92a160ff737e738bbc85c0ad22e2e61849143292f02085b3c7f72cc7d39d8601151a926d0f913bba4f3e37eff2e2bce1b0e756c4d7969e3fbd5af93b32d5fbba3fc2698284f0042d71e6839ca46466e81542629b2b0b07a8636722fd9ea0d11344a5ff4b16a212c278c0cd004a7836524fd21a563ca7fa6281c22242e9a6b5c31f40d03887aa1093", 0xa3}, {&(0x7f0000002d00)="ae9e30e82817ae5e45339a555585e91e773a4e912d58a763febd7ec6c3df5b5222a1ed0350437e53c422f27ec295e7a21790dd22b0ed5922e1af85586d94b44a7d5103ecfe44f3deaac6596d142d7ea92bb3d514170567ee8b761c4659c61fad48ce8f58b17efcdd016894840a20ac3e74380b05960de12495fb7a41c1eaaad3660cfdce1d406365c1ea57562a0ae019a20bb48e2ec6f49ae4eb30e7c03bbad1d18931a63bdeb0bd08435e1f3a45b88786ee7c2ef79030ff0347d4d6cb7e23203b5263adaa557840fae630c21525882933cdb16e1a84", 0xd6}, {&(0x7f0000002e00)="94993d51a1d5b21d640007be376d637d77993a75d0d18c8334847261b1799c3a42414d21981eb7d427a6b0d41450361f05857f2e1e8b", 0x36}, {&(0x7f0000002e40)="aacdaa667769d60d53ae6fe3cb072c37b0e711d6a2023a76c896de8d1950281adaf07e9344a8ae777e09cc27dad96a26e404a768a9dac12b9cf36f5de31d8714be6c0ff82ee1cde3fc929f4c4cf5a6ba60c1e2be8f99fd63e40a21f6a350e63762819a1f4f731ee727d8fd9a22500820ce3d48a3f291dae339ea9810606d33f17d8051b9dc7d7b45d9dcaa510af39c7d4dae658400ee48c1b4c925d8a945dbfcbd30e63742ea61c452c089a517cbc8083f093335", 0xb4}], 0x9, 0x0, 0x0, 0xc020}, {0x0, 0x0, &(0x7f0000003240)=[{&(0x7f0000002fc0)="b3795abc7e9be5364c16b4cab82fb639a8571a4c0448cd9c85bbeb011cd9c9db720eb35389b407c17f66f0652349083e73d1e0810b7b925aeaa92360ef977ed3bb100ab3f015a127ca0d1b92e3edc91394e114fb11d606c9a6cc09c42bb6d5ed19dc898b0e9f5b1a9ba1512d3f51ad9be45671e18a8f4a1d", 0x78}, {&(0x7f0000003040)="a723e839e1626c3b30ed363392bcb7fde683bd57741567385217886bc32ff54b8d1a89218e577c2aa8e97c49c6f1d43bb3c4187214951165ea6ee43c3ae1e5437e2aa1c5d441603ba67f4c5adebe37dd7bc544978643d5b3ed0a28fa36a7719264b3cc738c6465070d8f4486f1146a556fafe2154452f5485de035e38c03d30dd516145980b3cc7bde468793bec07058a380a4b077630bcf85c65eb5884101a5e290acc99a24d83eda88be199f26b76126e0cd97d11ed12ded99423c8daffc94e7f654480b8548a8ac002e9cceac4d57cdb668d778baebd220d878", 0xdb}, {&(0x7f0000003140)="7c7c35178aa400a72e1e669ce789232da6d4c8fc991a5265b316ff5be02cde4e1f13b2deb9ede8dd26a49379a8461e4569c1b0bc741e58e7e7eb6a4e795cdc476685a84dfa272d826815a835e39098fbe0dc5c64bd8c5b052012093603cd71e1ccc4b94609c1218c141a321148bda760c6e9eae7d37c87ffdd54ab046369e2f27da4ec74f326646a4068523a571da1f007337423436671ef496f290333946d2977ecef8eff56332b7ace46f70386ebacd210557808a63463edb613efa6f4c7af3df1a95c5d222cbd3ce879d6d05251058eaf0a67919b115cd8a163b23103f49be4e8475e22b7f8967191b792b10d0495ee05c81ce1", 0xf5}], 0x3, &(0x7f0000003280)=[@iv={0xa0, 0x117, 0x2, 0x85, "6c58e11057328e98186ce08bf114a750bbbeae8beba9463465cdc34c57c27a23ae6a830fde18a8f1a1c5748c6118069fb363a1ab453e8536fce6f761b9bea7af0f0b0231c868c9b1483a47da68f19bdb7fefa026e962f96896170dbb0f9764277f3bac366504a4081339aba6388eab20a8911d681332f9040af4a4a677fdf5a5c15c6680b7"}, @iv={0x28, 0x117, 0x2, 0xd, "d320b4def43a0e41e138f52599"}], 0x10, 0x800}, {0x0, 0x0, &(0x7f0000006780)=[{&(0x7f0000003380)="7fdaa61b4d973b954efe44d1beed19f259a54dfa8641642ab1080113ec4591643c2a343d68d1f0503bf73edce7949f93365f4a84b2ff8cb9b6edf3e46501702af3a2d106fac397f362d6da1dff7664e531a73922175ff053972a73670aeedfce72ed763d10d8a3c31bdd7561be67c181ea0cff17a281afd50f3dc9e44496c0996daf7046f08c908cd7e12e68e825969c02e1", 0x92}, {&(0x7f0000003440)="c6403f88be3997935e8f06a0e1eff151a8d9267c8a45f27ca9616aa8ddacd9af7f203580191fb301c53a117454bec496a2659810f33b18b5e92efd000f085fdadc39cca1a22d8c11594e8d0601d4706c8826e5d8bdf8dc81cd1c916f4e087aabe978ed2a81f2799cc6e0a55cbb3d143c8b1e99b222d1f9eaa4e24cc8636a3e162d7498f90b8ba0d6deff22285c72bfdc52061d71baca229f0060c37685e8db9d2ebbda380e74c6dcc5e8", 0xaa}, {&(0x7f0000003500)="c92c7730a3792daa14584ea56ac2654abf73f601f60c16a53d4b0c49e68de9653ca64c8e4be0e29781a79284bc25c6767362eae2e8f93c2483a9c4ac1ed5709100c6c7df7258326c5ff5a1807f39703e02c24c7e3b9bf3687c40c4c0c7f94f33e5bda58eaf889eab76312e05f0469952eff4863fada2435e96e0381f4de6d600bfbc30e20db84eedfaaba4166d8bcd32034ab040e999fdddb6", 0x99}, {&(0x7f00000035c0)="6451ab6b93183ef2852a6e6616baee2960ee416aa380b5ab0d5de2bfb459953f74cba17a50394313b32a3565c8cce18d62bc244c5c64fd9e85872fc9308d0981080acc040fa1a31ad27dab32b631d8658920cbba7adbd20e4c0a28655e719a9df60585d2eb6993d99cc8ae59c352bb17d32a2bd08eeec5", 0x77}, {&(0x7f0000003640)="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", 0x1000}, {&(0x7f0000004640)="7afe8ef37cb9d27294546d267f06b75a9d644f7fd98caa689e1e2ba631c45a5e899a7113bd09adf21ad2b14c13f83bc138f3eef9d68db71be59fd4478a14b056b309cb64dec397d206b7172d905f68776cee366e2b9d0d17fb45f60ed3438ddf6ef559159f742f09f06e16eb0042cced3a263c4ad49089ea0ae21a82f049e846d87446df46f96785490ef49424fca0fa1a4a01038c327ff8f5f0d0cc53caaf1f0cddbdb41667798489ebe6d549f5efc3958b358d7058cbb78925f167247d9854460f85d99632f1ad88fae5a4173e61b7f2213bba3f499aeee0a3a361d3701df0b2b3916ea45abfd883a4dbb1091c9995a397c371cc9ce9c7f22beede3f576d90d57ed3a389bc960620324daf6386558cc946c3aa540d9fdf222cc2cab412a21601f3447b33d1c7a31e509adc97d402b029223277250fcb26442f88f6f083c6e456b272a7c511b7c6797c6a6bfaf4d59170fc18e1e6282bd4d2665d0f6b14aa52c134eb7be1b59680b63e005b8ac0634fe6930d828465248ba5998060899f0baa833ab9ab32ba48399d9fea345f1ee884b9ecc077d89d93a8f776e0730c656ed256837fee8e7c979257fbfbe3bdee456e663fa775074552ade7f8bbbfa50faf20a5362dbc6eeb6fe6be13384da35047e184eddf3427d90f55c57d9df4d49ebd5fc3252158d9f974f12ff6de96371a2578e08a2bf81ca93c989860e347baf317eb21bbf88ed23549135a4e371bef9ab915f919ca860b4db558e8ae3d50ba02410c0535aad50cf563e9aa1cc72009f6870ac02bceba1694e2d9b683b7b961112ccb734594a5b05bb04a60e6bd7f86eb30116ea8b184023166be932f3ebf29ed554f8ffef0949bb89abf293f8ddd16236e47b610b4c4078b1d349ee2e53120e51eedea57a7cb8c31573e5e57e59359c561439e71348f39ead52ed972e6754810749b8e85509f3b707099600ea471d374dcdbc08df2aa8b9c9392d84d09ce264acdb464c05447e9364f421cfee4bc0172fce947e280024cf8d679c8d89629968b961f55cbcc252d8e5e5963ba12c1f07598d8aac429ae8b58f26ae2ffc23160e63a32559d3e425f952ec6847f352d3ca9b7ad76564968e69decd3384bb55b9887ee00247ff360b8fdfb3d53ce53558f1bb9342d41f0e91fa7e4438d4d7d9a9026e63abd529a7314d56d657e9234c0d5faa6cf6337b761429923a3754fc4fdd6f37b058f424b3b41983886f0e1dea2467e7a1f9653a944a23b97bceceb0a41f0b9396f3bfa8ce796ce2e3b8539be7c062295480f1ccecdda57589c6ee64ed6171faab7f51118f9a1f0b04fab44dee1691da1e598a66737c766444200bd1e0f857ec69e0fac08d35f211c49d0d8a9948f8a9ab3487242d8ac0ec2f4db9d5f6d5b0d1d7f24008db3bc95327419b30cf6477f10500c1643a5c3c03756cf442e1e275f47ef5b29b2b82a22ea4966dde3801fa655a071fc124687b24316bf403fdb3cecc95ce3a412b7535684aae6719959abe06973ed03b31a39c752c1baf0c227f34d7b7d5a4f99c9e39499143a6be4b4b4b59fc6c4e94ab61c516d05c661d9efb4ede5c78b5bc58a968bac7df1ac6ab4979009751f59c85788f6f120352e3299a5888b80554028b63a052542d9b30c143877c3fa9b0ab4a27c78a8e5bf3cf21f8d32ee098ea4c27f288ba1b8822c66d4c147301860a7951a2b07af447fea0407cebf6d30e4883a03ef62266d828e9b3533f4c57daec4700f5f7d56bb2cb60ac97aae77850bef3dce0a044c204bc130b832bd50bbf15890c69d92c30ce600295506bc1a9fd55db57e15335a976574b50292043a087c4dd43e54beb5c39770ac09caec5aba60c543fc7dd6f56014a3fc414e38d5113f64a65fb029d04d827d9b30e54100be3fba29e1a99820b67bccb2b29c8c25264283fe2422d5fe7b14fc9c459beee8f464032baa4b4b18f285fb8e16986b9a5c1ed4c3ac27825ee5c9a708023c86912df512ba8054843445ee8983c1b55fbcb9c1462a485e1e49b290574e9c3b1eb1814d357dc977e9de2677f3fdc81a33025140450504184c2e170847293cc83d4dbf5aace2d7b3638ea0265e8c4a8649df03848ecddc3e871f13598dd08bef6c6400773bac07de8db9dbf4eb3210eb10f687a1d9bd182562a0bb079a9747d7dd7546cc0a5232b74ee26e50c5e19273a7a1b3453d947de55a755a5584833b8059a24ab48421345f7108869c40053b9465a0a22ca29ef00a3fcbd1fd7311584e6bb8fa11cc1762f4e29eea008f73e2aff6920cd48260eda2e0eff0fbaaebd912e47b814ff53b29470c1e6558f77dbcebf08f59f1764ab25d8f61d732c4d7cb0262c87d00318c1702ac2d45566201b4e2a5f97e31a92cf448a745ef36b0b0770e31dd16085b0f0ddcf833831e740c0252dae5766b98eb9a1ae5efa48751e3b1b500fb8dac05cf9b90c5c920c472fbc1cdd1b26c1923036bcda583c4ce58f732d211ca3544ad4407e264c9f9c765a10803b267ff0b2cdd298086737818e60abf42d919842b6459e5a3c71b23e76d6e598f07f5d5ee61257d396692615854cdb052e0d8853b804083e00bc8f8e9f0b9b62f45d7510e259480b1b62c343ca6097fe90ceaab926a71a8f5576017922e2b44159f26aa52a293b5f5b7ee85ea29e4799fc99567698a007520fc785464b0ac7dde4cecf8cf233390e7fcd0b6d5040147a946aaef1f3573c78952ef757b2e062604d87307e2a7903c41d3f9b0c2f293e6f6e36438395b8ad68d695ec1bce8634d0334571f9a077f31e2db734780bbb9a7f13acf497a964237e532d875a016687b1d4f5c1a6270b2f71eeeaa93c7cd7538475efea77fd4a458ef01ea724d521aac928fca8b7b6ff5a3262b1759501502dd27b534b43488f555125faceb6c15ae25f3452b59ca30687131d1df236a11aa3696dcc75081d039d8e0c807b8bfe59e53fa31e45c14085c7f0bff1f2285b97ba82393464f8cbb2c720e6b92211f6eb6f58fdf938c854f82970a951368b12a7602218ae6f3b4a4d44a03d7263f4accbc5721417cdba4fe07e6cf9657ced8e8eb2cd78196a17df0579302ef826cf6db4095ac49e8d792bd267d075524ece88c875491bdd284d4f90a851fdfbdfa3f36d442dd88ef39ba99482cb77c5a596ba7c275327fb5a615d630c73e0140cc3efd77a4988094c1c0c449a0c6460a0a3978e26adde6cd5d4bee88b5a34b3401f5c98158dd40dc3051acc8ec0035f12023fec929dd6fa6d3e78a7cd19b59ae35ce5c1854b70c2ba04c2022103b0204343c4fc76425efd2d85f99ccf836fbf1a39666d277074949e174853b067d648cd511b6177165c466290a58103ee3d5f9e68827c17f5b8b93517b6ae4acf981e3aa082a2ef9cfa964bef0de35255e26b9fad51f84050a1760d455d9220db195387e93187c0e38fac7b85be582e7f1978e40be929f1b72aed2a5c6117109492f23bf12005a29a197f47b4103651bd5686cb71b14d19cf3b867252767aeff3d0e64a82424b0740c72f059c3bb0f68282fd0bf091725a1c21e7784ca496618c30fb816d0404520eb4370b3f7338cd3f3b5bb8539409ee74350eeaf05dc2bca889dfbf7f389af773b4279168bdb8255565ef6ad09864ccd5e358f40da66bc5fad0ea02ef08704098e8656a6368f5707431377a44ba4cae5b4820934481291eae7e18eb9700b9e19d506f1c9b518de2b0868d6d9282b63a9012f50e198fffc366afa2e49fb8a04e834903fc7da71bff70ba56c4fbfb74f223efa032eef595067f73d4a230b80561be2d168e1a48eb102d6b84ef863326b76401d57dbc1b8648de710ba14f93a3ac3aeb9fd5f61f3847f74dc50432dc8f6ea09342379cbc39b70b1e8d01ee29116f227d9ab1bc9fbb2b1d6634daf74e07cd1b6894d9557cba2deff80fea9a7f544fc2258c0f47522dc6807467baef210d5f16ad31a02711db1932817a2a412c09430a415d5c3a90f614aa945973b2dc8cb8c002a7b34afd40839d2b0b76254ccfc7e4c13dba4160b2efb61eedbdf2c682c9d8a2248176b802f1d4e4d1eb11d2d0fa8cb81df5523d1c735351ce38482f2637c5ab23742757e04de60f989f9d7f1554119a703376c15d1978f182ffda613debbf560308ce8fd81fbfa0fdaa99f871b741111d262c8bb518763e9e1e089def85e642cb3dc67e0942f67628e5faf7ba4d03aa7466134d1f74762e0f7423bbaba954e410b79c945a07d015886586d5cc2c5936df3135801e9f9976ae3a63e6697210a87ae00f4ec0864470fe1e1c7f0efb4cc7d41a97adab294768ec0bd3b4710b6abf4fe8706e62c26972b058eaf4c3a77895e4f5c06d73986fb95cfbdb8e35d88e90b3afc2a580e9f590eedbb5fdd3dd7fff0843ff0be3c3169a36fc17a796dbe9dc498a6ee7d23f10a1905ac1f718917e0fad63f4bf75323d309d258f1bc1452f9ba31e4314e9b4fd23113d70d326a9ebed3c9c21ef7d45b3d57a6928023beb376a8e7de9e29747fa630472085ab1d6d424c06671b3f05c50e71b4254d696ccff71b461b7459a53968f1a352eb28f7cd6455f569f4450c9d983e3cb68b1224a5008b88de6130076142912af2cc40a2ee268e09e5ea893dac236da7460fbc7e00c0969be36ca868e137e28eef26948179f37269528fa6efdf1c95074514336730d123590361de679aa430a2b9f7760abf6fa8535f7b8a65a002e86f3257a63743acacd81b20a148ea6fccb4b14eced68462942704f8dd0ae502a6be629cdbaff3614d85dc0a929d3cb1674c17b7be768f175db80dc9cbe62b3786c8f7bdf563f3ebfbfd485dfc8b7c3b75ade41886edb968ce7ddbf493994595696c409fd9bf6ac93a0778962731a70bf4bafb5f7da20ac7524dfee9cc24d66d81107388b148a7908b6371e74b5d53122d23d2535d113851d67069ed3c8edb554c7626444fa451809b986ae8f9246d96213713a8e0533d4d03c2f5f333c8977a718ed106abfc984e561af2e26c8437bcfd1746cd2b31901293f9649ebe2fcbcb18c218cd1ef2e5a5a64fd03323d65641abf4b6c0b904a2d717858dd45926ca7a9c72de73b20b59017a221ca51b0866f88940dc8f196ccbb0a0c0301c0a9bdf555372f217e5efe00b10951cf0014151f4e48886528c907b71a2f6ffb6bd2614ca7124885fc875218416e4bef4f5f27d573d147843f76cec513b58041f968386120a3365c8760ed6c4a3cba8330232f2548324cb1eddb1be5a4d79f737d3589a4a7bb63475cc3b3fcf5ff93b7c0dbd2fef722d30e411c929a266caaf683b6f305ce585148f68af0bf283bba2b7888b600c68238459aeed6324495eb662bc5461c43db4b8376694cae635e1601e68b26ec7c292147c23183ee455bd3531e83193a9712265b03afb28ab58af6ebe44f898bd6e6bae40c5ec573b9b0f44163fc16f947d6280c9e45f042d5ff6e6bedcba685ca48e3f1e16a032e70b600da6e2c72bd4a0cf50990d1a2c614c832dd885ebd3c1e3429987995fe253746324c2dfe05ee6fc299db9babc629fcaa558de1e57cb456d2a1cfe6a87e4cad77660495a96f466c66f6c1e7b3a19992a5678a66781f353c6bb81349efa716beba7c3853de8349912e5c1a7cdd0120bdf2a8389d40f0a0196936df3eb5b539d876dc2066239f5b6b869ea264704b525a0ae27abf4b8aaa50ac99e9b7c2117da6f5faf3551ce21ca78a9c25d1818b79d2cc2f5dd936460567e391335d9715b1c3333cb2c433e1ff0d8351ac6c5cba8c948c6a5818f3b44c0cc4376c2c2724cff1cc19c", 0x1000}, {&(0x7f0000005640)="4de43495affde5166df3d306f73d3aac5890cc910a611d22ac08ef55ea198673", 0x20}, {&(0x7f0000005680)="7695ea1aafee8801fd43792a1a8428ece79d7cca9d2cbf5bb121ec0850b6ec84fb10b77a7f0589a24597489936210adbb2e956be5c937a24587ab105e8d167b84b9ece0ac3895fecf41b7b51c18f7ea7a3fe858a46ebb9595b73824247d746c5b8d267247f0582010798c4c78fdc192199384d374941b402dfe040b0e9da7c261ff235680de069814661b7f8e09132cb30ade2933456f17da4cebe2f7acab4d9709214a952e5bba51793b2684322a4ef44c7a00ed773051624fac8362eaedb0db3aedf711940bb156eafd8ea732e911e081a2c8fef6d0f94f72fe1f0bf982945e1d2de72cd65d0bbbf7925", 0xeb}, {&(0x7f0000005780)="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", 0x1000}], 0x9, &(0x7f0000006840)=[@assoc={0x18, 0x117, 0x4, 0x6}, @op={0x18}], 0x30}, {0x0, 0x0, &(0x7f0000006a00)=[{&(0x7f0000006880)="1095ac3eb39c269e5d2658453b3ade698cbe4760ff06efd56af65dd0fca1a542d8da99a029cd2fd74b3f7f73ac45df3a60ef7dc258", 0x35}, {&(0x7f00000068c0)="33e536930e418418ccf59b6f0c646dab60f7e2bca4cc9a194fc36fa724fb556270fb95bd7b40128b7ba83eb45e255ef2f95c20fd7187d601d49e446e737ad94248551ca946ce44f4dfb517942b7270e60de83ab10e53", 0x56}, {&(0x7f0000006940)="1a615561f08c0766cfb7a522ef503130af2ee4c83b3abcc62a8dc0e18d8955b2b60b942d687a7f1ddf9cfd9427d431f21ee51508d1dc29d363050c9c2097c2d9ce378abf2563989bb7c421749d52b00101e20a1c548e77c85194e7acbdec0ac0ec67be47c30294173f6c3bbc6b51e1584079aecc1b8161ba1d275e87a57bd81a452b420483e7e8d8dca89a5ae9e5b622028e7ba52119", 0x96}], 0x3, &(0x7f0000006a40)=[@iv={0x78, 0x117, 0x2, 0x5d, "57668ac963f1000dbc42346e64244e5dff30dbea34ec48f7c676a800e71980b8dadf5af5f6d7f831cc103d3e5770627a3772acfa28fa89cd31aa8809584e209608cbcb00f34f66086cbe8262777c6d40dc4a55f9a9486b5d50132ca670"}, @assoc={0x18, 0x117, 0x4, 0x400}, @assoc={0x18}], 0xa8, 0x8080}], 0x7, 0x0) accept$inet6(r2, &(0x7f0000000080)={0xa, 0x0, 0x0, @remote}, &(0x7f00000000c0)=0x1c) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000040)={'nr0\x01\x00', 0x1132}) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'nr0\x01\x00', 0x7132}) close(r1) 13:21:59 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x4004556e, &(0x7f0000000100)={0x0, 0x0, {0x0, 0x0, 0x0, {}, {}, @rumble}, {0x0, 0x0, 0x5, {}, {}, @rumble}}) 13:21:59 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x40045564, &(0x7f0000000100)={0x0, 0x0, {0x0, 0x0, 0x0, {}, {}, @rumble={0x0, 0x300}}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) 13:21:59 executing program 4 (fault-call:0 fault-nth:77): bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x7880, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000, 0x0, 0x0, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x13]}, 0x3c) 13:21:59 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x4004556d, &(0x7f0000000100)={0x0, 0x0, {0x0, 0x0, 0x0, {}, {}, @rumble={0x0, 0x500}}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) [ 764.284282][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 764.290144][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 764.309587][T21996] FAULT_INJECTION: forcing a failure. [ 764.309587][T21996] name failslab, interval 1, probability 0, space 0, times 0 13:21:59 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x4004556d, &(0x7f0000000100)={0x0, 0x0, {0x0, 0x0, 0x0, {}, {}, @rumble={0x0, 0x600}}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) [ 764.345349][T21996] CPU: 0 PID: 21996 Comm: syz-executor.4 Not tainted 5.4.0-syzkaller #0 [ 764.353274][T21999] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=55158 sclass=netlink_route_socket pig=21999 comm=syz-executor.0 [ 764.353720][T21996] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 764.353726][T21996] Call Trace: [ 764.353754][T21996] dump_stack+0x197/0x210 [ 764.353784][T21996] should_fail.cold+0xa/0x15 [ 764.389139][T21996] ? fault_create_debugfs_attr+0x180/0x180 [ 764.394977][T21996] ? ___might_sleep+0x163/0x2c0 [ 764.399856][T21996] __should_failslab+0x121/0x190 [ 764.404812][T21996] should_failslab+0x9/0x14 [ 764.409331][T21996] __kmalloc+0x2e0/0x770 [ 764.413592][T21996] ? memset+0x40/0x40 [ 764.417595][T21996] ? pcpu_get_vm_areas+0x3d5/0x3ec0 [ 764.422822][T21996] pcpu_get_vm_areas+0x3d5/0x3ec0 [ 764.427870][T21996] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 764.434140][T21996] ? __vmalloc_node_range+0x4d7/0x810 [ 764.439571][T21996] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 764.445836][T21996] pcpu_create_chunk+0x24e/0x7f0 [ 764.450800][T21996] pcpu_alloc+0x10f3/0x1380 [ 764.455348][T21996] ? pcpu_alloc_area+0x820/0x820 [ 764.460305][T21996] ? bpf_map_area_alloc+0x20/0x30 [ 764.465360][T21996] __alloc_percpu_gfp+0x28/0x30 [ 764.470304][T21996] htab_map_alloc+0xdb9/0x11c0 [ 764.475080][T21996] ? htab_map_update_elem+0xca0/0xca0 [ 764.475098][T21996] __do_sys_bpf+0x478/0x37b0 [ 764.475116][T21996] ? bpf_prog_load+0x18a0/0x18a0 [ 764.475131][T21996] ? __kasan_check_write+0x14/0x20 [ 764.475154][T21996] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 764.475168][T21996] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 764.475184][T21996] ? wait_for_completion+0x440/0x440 [ 764.475207][T21996] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 764.475235][T21996] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 764.506161][T21996] ? do_syscall_64+0x26/0x790 [ 764.506187][T21996] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 764.506202][T21996] ? do_syscall_64+0x26/0x790 [ 764.506224][T21996] __x64_sys_bpf+0x73/0xb0 [ 764.506239][T21996] do_syscall_64+0xfa/0x790 [ 764.506258][T21996] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 764.506269][T21996] RIP: 0033:0x45a679 [ 764.506284][T21996] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 764.506292][T21996] RSP: 002b:00007fd557596c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 764.506306][T21996] RAX: ffffffffffffffda RBX: 00007fd557596c90 RCX: 000000000045a679 13:21:59 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) recvmmsg(r0, &(0x7f0000001d00)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}], 0x2, 0x0, 0x0) setsockopt$SO_TIMESTAMP(r0, 0x1, 0x23, &(0x7f0000000040)=0x9, 0x4) r1 = socket$inet6(0xa, 0x80003, 0x80) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") clock_gettime(0x1, &(0x7f0000000000)) 13:21:59 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x4004556e, &(0x7f0000000100)={0x0, 0x0, {0x0, 0x0, 0x0, {}, {}, @rumble}, {0x0, 0x0, 0x6, {}, {}, @rumble}}) 13:21:59 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x40045564, &(0x7f0000000100)={0x0, 0x0, {0x0, 0x0, 0x0, {}, {}, @rumble={0x0, 0x500}}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) [ 764.506315][T21996] RDX: 000000000000003c RSI: 0000000020000040 RDI: 405a020000000000 [ 764.506323][T21996] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 764.506330][T21996] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fd5575976d4 [ 764.506338][T21996] R13: 00000000004c0c65 R14: 00000000004d4750 R15: 0000000000000003 13:21:59 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x4004556e, &(0x7f0000000100)={0x0, 0x0, {0x0, 0x0, 0x0, {}, {}, @rumble}, {0x0, 0x0, 0x7, {}, {}, @rumble}}) 13:21:59 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x40045564, &(0x7f0000000100)={0x0, 0x0, {0x0, 0x0, 0x0, {}, {}, @rumble={0x0, 0x600}}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) 13:22:00 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x4004556d, &(0x7f0000000100)={0x0, 0x0, {0x0, 0x0, 0x0, {}, {}, @rumble={0x0, 0x700}}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) [ 765.275571][T21999] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=55158 sclass=netlink_route_socket pig=21999 comm=syz-executor.0 13:22:00 executing program 0: openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000780)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'nr0\x01\x00', 0x1132}) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='cpuacct.usage_all\x00', 0x0, 0x0) r1 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) ftruncate(r1, 0x81fd) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'}r\x10\xfd\xff\xff\xff\xff\xff\xff\xff\xc1\x00', 0xe532}) close(r0) 13:22:00 executing program 4 (fault-call:0 fault-nth:78): bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x7880, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000, 0x0, 0x0, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x13]}, 0x3c) 13:22:00 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x4004556e, &(0x7f0000000100)={0x0, 0x0, {0x0, 0x0, 0x0, {}, {}, @rumble}, {0x0, 0x0, 0x8, {}, {}, @rumble}}) 13:22:00 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x40045564, &(0x7f0000000100)={0x0, 0x0, {0x0, 0x0, 0x0, {}, {}, @rumble={0x0, 0x700}}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) 13:22:00 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) recvmmsg(r0, &(0x7f0000001d00)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}], 0x2, 0x0, 0x0) setsockopt$SO_TIMESTAMP(r0, 0x1, 0x23, &(0x7f0000000040)=0x9, 0x4) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x80000, 0x0) r1 = socket$inet6(0xa, 0x80003, 0x80) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") 13:22:00 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x4004556d, &(0x7f0000000100)={0x0, 0x0, {0x0, 0x0, 0x0, {}, {}, @rumble={0x0, 0x3f00}}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) [ 765.531319][T22031] FAULT_INJECTION: forcing a failure. [ 765.531319][T22031] name failslab, interval 1, probability 0, space 0, times 0 [ 765.551875][T22031] CPU: 0 PID: 22031 Comm: syz-executor.4 Not tainted 5.4.0-syzkaller #0 [ 765.560256][T22031] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 765.570329][T22031] Call Trace: [ 765.573647][T22031] dump_stack+0x197/0x210 [ 765.578032][T22031] should_fail.cold+0xa/0x15 [ 765.582680][T22031] ? fault_create_debugfs_attr+0x180/0x180 [ 765.588534][T22031] ? ___might_sleep+0x163/0x2c0 [ 765.593409][T22031] __should_failslab+0x121/0x190 [ 765.598381][T22031] should_failslab+0x9/0x14 [ 765.602896][T22031] __kmalloc+0x2e0/0x770 [ 765.602912][T22031] ? memset+0x40/0x40 [ 765.602927][T22031] ? pcpu_get_vm_areas+0x3ec/0x3ec0 [ 765.602950][T22031] pcpu_get_vm_areas+0x3ec/0x3ec0 [ 765.611279][T22031] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 765.621574][T22031] ? __vmalloc_node_range+0x4d7/0x810 [ 765.621609][T22031] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 765.621628][T22031] pcpu_create_chunk+0x24e/0x7f0 [ 765.639460][T22031] pcpu_alloc+0x10f3/0x1380 [ 765.648930][T22031] ? pcpu_alloc_area+0x820/0x820 [ 765.653882][T22031] ? bpf_map_area_alloc+0x20/0x30 [ 765.653917][T22031] __alloc_percpu_gfp+0x28/0x30 [ 765.663795][T22031] htab_map_alloc+0xdb9/0x11c0 [ 765.668582][T22031] ? htab_map_update_elem+0xca0/0xca0 [ 765.668605][T22031] __do_sys_bpf+0x478/0x37b0 [ 765.678616][T22031] ? bpf_prog_load+0x18a0/0x18a0 [ 765.683567][T22031] ? __kasan_check_write+0x14/0x20 [ 765.683584][T22031] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 765.683603][T22031] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 765.694273][T22031] ? wait_for_completion+0x440/0x440 [ 765.694299][T22031] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 765.694328][T22031] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 765.694343][T22031] ? do_syscall_64+0x26/0x790 [ 765.694358][T22031] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 765.694371][T22031] ? do_syscall_64+0x26/0x790 [ 765.694393][T22031] __x64_sys_bpf+0x73/0xb0 [ 765.694410][T22031] do_syscall_64+0xfa/0x790 [ 765.694426][T22031] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 765.694437][T22031] RIP: 0033:0x45a679 [ 765.694456][T22031] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 765.704995][T22031] RSP: 002b:00007fd557596c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 13:22:01 executing program 4 (fault-call:0 fault-nth:79): bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x7880, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000, 0x0, 0x0, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x13]}, 0x3c) [ 765.705008][T22031] RAX: ffffffffffffffda RBX: 00007fd557596c90 RCX: 000000000045a679 [ 765.705016][T22031] RDX: 000000000000003c RSI: 0000000020000040 RDI: 405a020000000000 [ 765.705025][T22031] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 765.705033][T22031] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fd5575976d4 [ 765.705041][T22031] R13: 00000000004c0c65 R14: 00000000004d4750 R15: 0000000000000003 13:22:01 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x40045564, &(0x7f0000000100)={0x0, 0x0, {0x0, 0x0, 0x0, {}, {}, @rumble={0x0, 0x3f00}}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) 13:22:01 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x4004556e, &(0x7f0000000100)={0x0, 0x0, {0x0, 0x0, 0x0, {}, {}, @rumble}, {0x0, 0x0, 0x300, {}, {}, @rumble}}) 13:22:01 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) recvmmsg(r0, &(0x7f0000001d00)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}], 0x2, 0x0, 0x0) setsockopt$SO_TIMESTAMP(r0, 0x1, 0x23, &(0x7f0000000040)=0x9, 0x4) r1 = socket$inet6(0xa, 0x80003, 0x80) r2 = socket(0xa, 0x2, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setreuid(0x0, r3) r4 = socket(0xa, 0x2, 0x0) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) r6 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r6, &(0x7f0000000180), 0x27a4eaa51029717, 0x0) getsockname$inet6(r6, &(0x7f0000001a80)={0xa, 0x0, 0x0, @loopback}, &(0x7f0000001ac0)=0x1c) setreuid(0x0, r5) r7 = socket(0xa, 0x2, 0x0) getsockopt$sock_cred(r7, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setreuid(0x0, r8) r9 = socket(0xa, 0x2, 0x0) getsockopt$sock_cred(r9, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setreuid(0x0, r10) r11 = socket(0xa, 0x2, 0x0) getsockopt$sock_cred(r11, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setreuid(0x0, r12) ioctl$PPPIOCGNPMODE(0xffffffffffffffff, 0xc008744c, &(0x7f0000001a40)={0xfb, 0x2}) syz_mount_image$xfs(&(0x7f0000000200)='xfs\x00', &(0x7f0000000240)='./file0\x00', 0x100000001, 0x9, &(0x7f0000001840)=[{&(0x7f0000000280)="9c94c7e3c086eeabb5e4dbf05129d8e5ada58a1fb8e55b762958906bda4e19", 0x1f, 0x349b}, {&(0x7f00000002c0)="a77e48141ab329c95757dc2a69b5b455781bfc58598aeef6", 0x18, 0x6}, {&(0x7f0000000300)="26ae47eb676fefb8f9629835c90c5dcba3d0ef7920f316296d4e90f8ebd0a7d4a5b5df48b7f45a79cbdceb2b9d6bc8a01a64be4901987e66f826fcd3827e8eed74996c9d90e2853e4db3cb9a4118eb1c5ec2b64edfa51399d9c9e526107d31dedf20c821ff101f7861ebb2fa18f2699396372f716ee567cff9b8c42f85b8792c8c56c8ba3315c26a5ea0749a", 0x8c, 0x3}, {&(0x7f00000003c0)="1b41e470228195a5551aca2a487f0082b0b9f23864ed4af5d17277b1b7ff0cb68f8c98a72a6106e6061722c9de463183bff26c265404746ee83b47411a6044157fbe1f124dcf4805f1ecd14589d950437c4f56573bb8b829aaaaaaa7d7db55201c1de5a3031e4a5c2bab905021c575292d518aa40b71a8e6b25240bd1d596603ef2dd985a5a9b0670f72865d807bbe2a4235eb4d62fa3b76a971b91d9d3a67d2fda9941222d59bb766252cbc4cbb35d912c1423a6be27948e590176c923cae9115efc921b31367fcca4c703e2b8f2f8b559496407b838287a3bed396726ebda5bcf8d65456e1688d0f26f698a76cc439453d777e1788b1757e", 0xf9, 0x10001}, {&(0x7f00000004c0)="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", 0x1000, 0xffffffffffff0001}, {&(0x7f00000014c0)="7ee78beec4cba2dc3ef971b2ce43990b657e7207778fee1604aa75b43c2bc2c91ce44fe0c95f45008b1c88b6b0093085d04b6690997eb4ad7030eaf0b7bcf880078ff4090e07a061c2a92fc250cbaf018b6680774e96d1", 0x57, 0x6}, {&(0x7f0000001540)="44ae5f75c9b6054e50df055ac6bf28efd85ba9471077a27ccce7673c2235cf19957ce1e2c3272fe34f3dc2e91e9bf823fc30320e85206b7c37032bd11863769baaf9bf74fbc299fa8e1bed1b6fc92241c4b0955628bac0e510b2d14068b2eb6f9cde4cf0a1121df8aec2909ea7f125b5cc7a64a67aa4e5fa7f4d675f448e8c00a1a91430af6cb9d1184504411a9ef949a7d6b47d519590bb86455438b2778099275ffd1227ad39d7bb6d5ccca0d7dd5d4df638357bf34cfe29d05dbc6622736b1cc3b193ae4ab886c29d51cc6d0192c5211ac713bf6bf22657cde9fab06836", 0xdf, 0x9ed}, {&(0x7f0000001640)="9426ec0b65a423211827fbe8c0a03fff615e50db30f8d5fd0c07c41299f01db7884c009e54c9751666fd599c9190a0e54fdc34eba00784c57edcab6eff18c749638f2798576e6c2ed007136b64ce14ab64b0ede39f76d772f23863be618e9f5d3c74cd02e299c4c29aa37512d151db542c7b47d84889a9157d4a6620eea700e5e9d9c47d2bb96a56ef91ef52dbc5a099b1d909d3c7d98e531b7c3b585405e331e2f906f98adc486e859588ba1f6865d39bbb6fef179c532dd621ea6a4df093ef4c2be54e528cdb8b08c17bf5f199cb6e7a7db7aba7bfda61baa6de97e2", 0xdd, 0xe}, {&(0x7f0000001740)="e1b9a4bd426a1c57a144b6792f508b18b545be6d1950d151f538223636108c7c5a57acd19661dd8311cbb9fd0f45fbd4087ba0ffb2eaad8b421c3d5bcf03a97491e1638a79cb8a28de34bc32c2b5db808c3f334a4c3966f1d6a0706c64ea9caa380996ca433c087ecc74ba947a17501367ed355ffb1d7a6b6f756e0de0b0346a26d8fe58b9db0df7607a931bbad50ec2dd7222106c2b1820a1ba5a86420701386105bec45adec36b73e84c26fbfa4c444ee738d2551682bf14de5b9af8a4ccead6bf852a015bc3d13de75cb41169702587412ef9914a", 0xd6, 0x1}], 0x1000, &(0x7f0000001940)={[{@ikeep='ikeep'}, {@logbufs={'logbufs', 0x3d, 0x2}}, {@sunit={'sunit', 0x3d, 0x6}}, {@nodiscard='nodiscard'}, {@uquota='uquota'}], [{@defcontext={'defcontext', 0x3d, 'system_u'}}, {@euid_eq={'euid', 0x3d, r3}}, {@dont_hash='dont_hash'}, {@fowner_eq={'fowner', 0x3d, r5}}, {@context={'context', 0x3d, 'root'}}, {@uid_gt={'uid>', r8}}, {@uid_gt={'uid>', r10}}, {@uid_lt={'uid<', r12}}]}) pselect6(0x40, &(0x7f0000000000)={0xfff, 0x1ff, 0x3ff, 0x6, 0x5, 0x89, 0x70, 0x9b7}, &(0x7f0000000080)={0x10001, 0x6, 0x2, 0x7, 0x7fffffff, 0x34, 0x8000, 0x4}, &(0x7f00000000c0)={0x0, 0xffffffffffffff01, 0x2, 0x8001, 0x3f, 0x0, 0x1, 0x3ff}, &(0x7f0000000100)={0x77359400}, &(0x7f0000000180)={&(0x7f0000000140)={0x6}, 0x8}) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="1c05b50539cf0008000000") 13:22:01 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x4004556d, &(0x7f0000000100)={0x0, 0x0, {0x0, 0x0, 0x0, {}, {}, @rumble={0x0, 0x4000}}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) 13:22:01 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x4004556e, &(0x7f0000000100)={0x0, 0x0, {0x0, 0x0, 0x0, {}, {}, @rumble}, {0x0, 0x0, 0x500, {}, {}, @rumble}}) [ 766.071048][T22053] FAULT_INJECTION: forcing a failure. [ 766.071048][T22053] name failslab, interval 1, probability 0, space 0, times 0 [ 766.137864][T22053] CPU: 0 PID: 22053 Comm: syz-executor.4 Not tainted 5.4.0-syzkaller #0 [ 766.146255][T22053] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 766.156333][T22053] Call Trace: [ 766.156364][T22053] dump_stack+0x197/0x210 [ 766.156388][T22053] should_fail.cold+0xa/0x15 [ 766.156407][T22053] ? fault_create_debugfs_attr+0x180/0x180 [ 766.156425][T22053] ? ___might_sleep+0x163/0x2c0 [ 766.156445][T22053] __should_failslab+0x121/0x190 [ 766.156462][T22053] should_failslab+0x9/0x14 [ 766.156477][T22053] __kmalloc+0x2e0/0x770 [ 766.156489][T22053] ? memset+0x40/0x40 [ 766.156510][T22053] ? pcpu_get_vm_areas+0x3ec/0x3ec0 [ 766.202417][T22053] pcpu_get_vm_areas+0x3ec/0x3ec0 [ 766.207577][T22053] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 766.213841][T22053] ? __vmalloc_node_range+0x4d7/0x810 [ 766.219254][T22053] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 766.225527][T22053] pcpu_create_chunk+0x24e/0x7f0 [ 766.225544][T22053] pcpu_alloc+0x10f3/0x1380 [ 766.225566][T22053] ? pcpu_alloc_area+0x820/0x820 [ 766.225582][T22053] ? bpf_map_area_alloc+0x20/0x30 [ 766.225604][T22053] __alloc_percpu_gfp+0x28/0x30 [ 766.225619][T22053] htab_map_alloc+0xdb9/0x11c0 [ 766.225646][T22053] ? htab_map_update_elem+0xca0/0xca0 [ 766.225662][T22053] __do_sys_bpf+0x478/0x37b0 [ 766.225682][T22053] ? bpf_prog_load+0x18a0/0x18a0 [ 766.225695][T22053] ? __kasan_check_write+0x14/0x20 [ 766.225716][T22053] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 766.245485][T22053] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 766.245505][T22053] ? wait_for_completion+0x440/0x440 [ 766.245526][T22053] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 766.245553][T22053] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 766.270225][T22053] ? do_syscall_64+0x26/0x790 [ 766.270242][T22053] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 766.270259][T22053] ? do_syscall_64+0x26/0x790 [ 766.286310][T22053] __x64_sys_bpf+0x73/0xb0 [ 766.303511][T22053] do_syscall_64+0xfa/0x790 [ 766.327877][T22053] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 766.327891][T22053] RIP: 0033:0x45a679 [ 766.327912][T22053] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 766.357315][T22053] RSP: 002b:00007fd557596c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 766.357331][T22053] RAX: ffffffffffffffda RBX: 00007fd557596c90 RCX: 000000000045a679 [ 766.357339][T22053] RDX: 000000000000003c RSI: 0000000020000040 RDI: 405a020000000000 13:22:01 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000780)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000040)={'nr0\x01\x00', 0x1132}) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'nr0\x01\x00', 0x7132}) close(r1) r2 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) r3 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r3, &(0x7f0000000180), 0x27a4eaa51029717, 0x0) bind$llc(r3, &(0x7f0000000100)={0x1a, 0x207, 0x4, 0x3f, 0x5, 0x0, @remote}, 0x10) ioctl$SNDRV_CTL_IOCTL_POWER_STATE(r2, 0x800455d1, &(0x7f00000000c0)) 13:22:01 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x40045564, &(0x7f0000000100)={0x0, 0x0, {0x0, 0x0, 0x0, {}, {}, @rumble={0x0, 0x4000}}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) [ 766.357346][T22053] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 766.357358][T22053] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fd5575976d4 [ 766.357366][T22053] R13: 00000000004c0c65 R14: 00000000004d4750 R15: 0000000000000003 13:22:01 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x40045564, &(0x7f0000000100)={0x0, 0x0, {0x0, 0x0, 0x0, {}, {}, @rumble={0x0, 0xff00}}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) 13:22:01 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x4004556e, &(0x7f0000000100)={0x0, 0x0, {0x0, 0x0, 0x0, {}, {}, @rumble}, {0x0, 0x0, 0x600, {}, {}, @rumble}}) 13:22:01 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x4004556d, &(0x7f0000000100)={0x0, 0x0, {0x0, 0x0, 0x0, {}, {}, @rumble={0x0, 0xff00}}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) 13:22:01 executing program 4 (fault-call:0 fault-nth:80): bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x7880, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000, 0x0, 0x0, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x13]}, 0x3c) 13:22:01 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) recvmmsg(r0, &(0x7f0000001d00)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}], 0x2, 0x0, 0x0) syz_init_net_socket$rose(0xb, 0x5, 0x0) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000080)='/dev/hwrng\x00', 0x400, 0x0) r1 = socket$kcm(0x29, 0x5, 0x0) setsockopt$SO_TIMESTAMP(r1, 0x1, 0x3f, &(0x7f0000000000)=0x9, 0xfffffffffffffeb9) r2 = socket$inet6(0xa, 0x80003, 0x80) ioctl(r2, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") 13:22:01 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x4004556d, &(0x7f0000000100)={0x0, 0x0, {0x0, 0x0, 0x0, {}, {}, @rumble}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) 13:22:01 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x4004556e, &(0x7f0000000100)={0x0, 0x0, {0x0, 0x0, 0x0, {}, {}, @rumble}, {0x0, 0x0, 0x700, {}, {}, @rumble}}) [ 766.796272][T22085] FAULT_INJECTION: forcing a failure. [ 766.796272][T22085] name failslab, interval 1, probability 0, space 0, times 0 [ 766.851836][T22085] CPU: 1 PID: 22085 Comm: syz-executor.4 Not tainted 5.4.0-syzkaller #0 [ 766.860326][T22085] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 766.870397][T22085] Call Trace: [ 766.873730][T22085] dump_stack+0x197/0x210 [ 766.878097][T22085] should_fail.cold+0xa/0x15 [ 766.882718][T22085] ? fault_create_debugfs_attr+0x180/0x180 [ 766.882740][T22085] ? ___might_sleep+0x163/0x2c0 [ 766.882767][T22085] __should_failslab+0x121/0x190 [ 766.898358][T22085] should_failslab+0x9/0x14 [ 766.902897][T22085] kmem_cache_alloc_trace+0x2d3/0x790 [ 766.908288][T22085] ? kmem_cache_alloc+0x364/0x710 [ 766.908302][T22085] ? memset+0x40/0x40 [ 766.908321][T22085] ? pcpu_get_vm_areas+0x3ec/0x3ec0 [ 766.908337][T22085] pcpu_get_vm_areas+0x4d6/0x3ec0 [ 766.908359][T22085] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 766.917534][T22085] ? __vmalloc_node_range+0x4d7/0x810 [ 766.917568][T22085] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 766.917586][T22085] pcpu_create_chunk+0x24e/0x7f0 [ 766.917606][T22085] pcpu_alloc+0x10f3/0x1380 [ 766.917631][T22085] ? pcpu_alloc_area+0x820/0x820 [ 766.917656][T22085] __alloc_percpu_gfp+0x28/0x30 [ 766.917675][T22085] htab_map_alloc+0xdb9/0x11c0 [ 766.927926][T22085] ? htab_map_update_elem+0xca0/0xca0 [ 766.927946][T22085] __do_sys_bpf+0x478/0x37b0 [ 766.939548][T22085] ? bpf_prog_load+0x18a0/0x18a0 [ 766.939565][T22085] ? __kasan_check_write+0x14/0x20 [ 766.939582][T22085] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 766.939603][T22085] ? rcu_read_lock_bh_held+0xb0/0xb0 13:22:02 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x4004556d, &(0x7f0000000100)={0x0, 0x0, {0x0, 0x0, 0x0, {}, {}, @rumble}, {0x2, 0x0, 0x0, {}, {}, @rumble}}) [ 766.950746][T22085] ? wait_for_completion+0x440/0x440 [ 766.950773][T22085] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 766.950805][T22085] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 766.995737][T22085] ? do_syscall_64+0x26/0x790 [ 766.995756][T22085] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 766.995768][T22085] ? do_syscall_64+0x26/0x790 [ 766.995794][T22085] __x64_sys_bpf+0x73/0xb0 [ 767.018076][T22085] do_syscall_64+0xfa/0x790 [ 767.018101][T22085] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 767.018113][T22085] RIP: 0033:0x45a679 [ 767.018128][T22085] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 767.018135][T22085] RSP: 002b:00007fd557596c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 767.018148][T22085] RAX: ffffffffffffffda RBX: 00007fd557596c90 RCX: 000000000045a679 [ 767.018162][T22085] RDX: 000000000000003c RSI: 0000000020000040 RDI: 405a020000000000 13:22:02 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x40045564, &(0x7f0000000100)={0x0, 0x0, {0x0, 0x0, 0x0, {}, {}, @rumble}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) [ 767.028874][T22085] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 767.028882][T22085] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fd5575976d4 [ 767.028890][T22085] R13: 00000000004c0c65 R14: 00000000004d4750 R15: 0000000000000003 13:22:02 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x4004556d, &(0x7f0000000100)={0x0, 0x0, {0x0, 0x0, 0x0, {}, {}, @rumble}, {0x3, 0x0, 0x0, {}, {}, @rumble}}) 13:22:02 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x40045564, &(0x7f0000000100)={0x0, 0x0, {0x0, 0x0, 0x0, {}, {}, @rumble}, {0x2, 0x0, 0x0, {}, {}, @rumble}}) 13:22:02 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x4004556e, &(0x7f0000000100)={0x0, 0x0, {0x0, 0x0, 0x0, {}, {}, @rumble}, {0x0, 0x0, 0x4000, {}, {}, @rumble}}) 13:22:02 executing program 4 (fault-call:0 fault-nth:81): bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x7880, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000, 0x0, 0x0, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x13]}, 0x3c) 13:22:02 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x4004556d, &(0x7f0000000100)={0x0, 0x0, {0x0, 0x0, 0x0, {}, {}, @rumble}, {0x4, 0x0, 0x0, {}, {}, @rumble}}) 13:22:02 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='=un\x00', 0x1, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000780)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000040)={'nr0\x01\x00', 0x1132}) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'nr0\x01\x00', 0x7132}) r2 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/tcp6\x00') preadv(r2, &(0x7f0000000000)=[{&(0x7f00000000c0)=""/169, 0x2aa}], 0x1, 0x0) read$char_usb(r2, &(0x7f0000000080)=""/180, 0xb4) socket$bt_hidp(0x1f, 0x3, 0x6) r3 = syz_open_procfs(0x0, &(0x7f00000001c0)='mounts\x00') fdatasync(r3) sendfile(r3, r3, &(0x7f0000000180)=0x74000000, 0x5) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000180)=r3, 0x4) close(r1) r4 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r4, &(0x7f0000000180), 0x27a4eaa51029717, 0x0) connect$bt_rfcomm(r4, &(0x7f0000000200)={0x1f, {0x1, 0x7, 0x1, 0x0, 0xe1, 0x1f}, 0xa6}, 0xa) 13:22:02 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x4004556e, &(0x7f0000000100)={0x0, 0x0, {0x0, 0x0, 0x0, {}, {}, @rumble}, {0x0, 0x0, 0xff00, {}, {}, @rumble}}) [ 767.404299][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 767.404353][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 767.410165][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 767.421674][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 767.427502][ C0] protocol 88fb is buggy, dev hsr_slave_1 13:22:02 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) recvmmsg(r0, &(0x7f0000001d00)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}], 0x2, 0x0, 0x0) setsockopt$SO_TIMESTAMP(r0, 0x1, 0x23, &(0x7f0000000040)=0x9, 0x4) socket$inet6(0xa, 0x80003, 0x80) r1 = socket$inet(0xa, 0x801, 0x84) connect$inet(r1, &(0x7f0000004cc0)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r1, 0x84, 0x9, &(0x7f00000000c0)={0x0, @in={{0x2, 0x0, @rand_addr=0xac14ffbb}}}, &(0x7f0000000180)=0x98) ioctl(r0, 0x6, &(0x7f0000000200)="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") 13:22:02 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x40045564, &(0x7f0000000100)={0x0, 0x0, {0x0, 0x0, 0x0, {}, {}, @rumble}, {0x3, 0x0, 0x0, {}, {}, @rumble}}) 13:22:02 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x4004556d, &(0x7f0000000100)={0x0, 0x0, {0x0, 0x0, 0x0, {}, {}, @rumble}, {0x5, 0x0, 0x0, {}, {}, @rumble}}) 13:22:02 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x40045564, &(0x7f0000000100)={0x0, 0x0, {0x0, 0x0, 0x0, {}, {}, @rumble}, {0x4, 0x0, 0x0, {}, {}, @rumble}}) [ 767.724053][T22124] FAULT_INJECTION: forcing a failure. [ 767.724053][T22124] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 767.770448][T22124] CPU: 1 PID: 22124 Comm: syz-executor.4 Not tainted 5.4.0-syzkaller #0 [ 767.778963][T22124] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 767.789053][T22124] Call Trace: [ 767.792399][T22124] dump_stack+0x197/0x210 [ 767.796764][T22124] should_fail.cold+0xa/0x15 [ 767.801393][T22124] ? fault_create_debugfs_attr+0x180/0x180 [ 767.807229][T22124] ? ___might_sleep+0x163/0x2c0 [ 767.812307][T22124] should_fail_alloc_page+0x50/0x60 [ 767.817612][T22124] __alloc_pages_nodemask+0x1a1/0x910 [ 767.823098][T22124] ? __kasan_check_read+0x11/0x20 [ 767.828135][T22124] ? __alloc_pages_slowpath+0x2920/0x2920 [ 767.833858][T22124] ? perf_trace_lock_acquire+0xf5/0x530 [ 767.839409][T22124] ? __kasan_check_read+0x11/0x20 [ 767.844477][T22124] ? __lock_acquire+0x16f2/0x4a00 [ 767.849518][T22124] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 767.855757][T22124] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 767.862005][T22124] alloc_pages_current+0x107/0x210 [ 767.867126][T22124] __get_free_pages+0xc/0x40 [ 767.871723][T22124] kasan_populate_vmalloc_pte+0x2f/0x1c0 [ 767.877364][T22124] apply_to_page_range+0x445/0x700 [ 767.882480][T22124] ? memset+0x40/0x40 [ 767.886467][T22124] kasan_populate_vmalloc+0x68/0x90 [ 767.891671][T22124] pcpu_get_vm_areas+0x3c42/0x3ec0 [ 767.896855][T22124] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 767.903285][T22124] pcpu_create_chunk+0x24e/0x7f0 [ 767.908229][T22124] pcpu_alloc+0x10f3/0x1380 [ 767.912744][T22124] ? pcpu_alloc_area+0x820/0x820 [ 767.917683][T22124] ? bpf_map_area_alloc+0x20/0x30 [ 767.922717][T22124] __alloc_percpu_gfp+0x28/0x30 [ 767.927576][T22124] htab_map_alloc+0xdb9/0x11c0 [ 767.932358][T22124] ? htab_map_update_elem+0xca0/0xca0 [ 767.937743][T22124] __do_sys_bpf+0x478/0x37b0 [ 767.942340][T22124] ? bpf_prog_load+0x18a0/0x18a0 [ 767.947286][T22124] ? __kasan_check_write+0x14/0x20 [ 767.952398][T22124] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 767.957963][T22124] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 767.963267][T22124] ? wait_for_completion+0x440/0x440 [ 767.968630][T22124] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 767.975033][T22124] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 767.980512][T22124] ? do_syscall_64+0x26/0x790 [ 767.985191][T22124] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 767.991307][T22124] ? do_syscall_64+0x26/0x790 [ 767.996003][T22124] __x64_sys_bpf+0x73/0xb0 [ 768.000437][T22124] do_syscall_64+0xfa/0x790 [ 768.004957][T22124] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 768.010871][T22124] RIP: 0033:0x45a679 [ 768.014774][T22124] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 768.034691][T22124] RSP: 002b:00007fd557596c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 768.043526][T22124] RAX: ffffffffffffffda RBX: 00007fd557596c90 RCX: 000000000045a679 [ 768.051742][T22124] RDX: 000000000000003c RSI: 0000000020000040 RDI: 405a020000000000 [ 768.059845][T22124] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 13:22:03 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x4004556e, &(0x7f0000000100)={0x0, 0x0, {0x0, 0x0, 0x0, {}, {}, @rumble}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) [ 768.067913][T22124] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fd5575976d4 [ 768.076109][T22124] R13: 00000000004c0c65 R14: 00000000004d4750 R15: 0000000000000003 [ 768.112101][T22124] BUG: unable to handle page fault for address: fffff91ffff00000 [ 768.120041][T22124] #PF: supervisor read access in kernel mode [ 768.126030][T22124] #PF: error_code(0x0000) - not-present page [ 768.132016][T22124] PGD 21ffe6067 P4D 21ffe6067 PUD aa56c067 PMD aa56d067 PTE 0 [ 768.139859][T22124] Oops: 0000 [#1] PREEMPT SMP KASAN [ 768.142491][T22129] kobject: 'input1975' (00000000ade4c8dd): kobject_cleanup, parent 000000007173301a [ 768.145096][T22124] CPU: 1 PID: 22124 Comm: syz-executor.4 Not tainted 5.4.0-syzkaller #0 [ 768.145103][T22124] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 768.145124][T22124] RIP: 0010:check_memory_region+0x9c/0x1a0 [ 768.145139][T22124] Code: c9 4d 0f 49 c1 49 c1 f8 03 45 85 c0 0f 84 10 01 00 00 41 83 e8 01 4e 8d 44 c0 08 eb 0d 48 83 c0 08 4c 39 c0 0f 84 a7 00 00 00 <48> 83 38 00 74 ed 4c 8d 40 08 eb 09 48 83 c0 01 49 39 c0 74 53 80 [ 768.145145][T22124] RSP: 0018:ffffc900104c7a80 EFLAGS: 00010206 [ 768.145155][T22124] RAX: fffff91ffff00000 RBX: fffff91ffff00f10 RCX: ffffffff819de8a9 [ 768.145162][T22124] RDX: 0000000000000001 RSI: 0000000000007880 RDI: ffffe8ffff800000 [ 768.145169][T22124] RBP: ffffc900104c7a98 R08: fffff91ffff00f10 R09: 0000000000000f10 [ 768.145176][T22124] R10: fffff91ffff00f0f R11: ffffe8ffff80787f R12: fffff91ffff00000 [ 768.145189][T22124] R13: 0000000000007880 R14: 0000000000000000 R15: ffff88821fffd100 [ 768.175590][T22130] kobject: 'input1976' (00000000c913a0ac): kobject_cleanup, parent 000000007173301a [ 768.178889][T22124] FS: 00007fd557597700(0000) GS:ffff8880ae900000(0000) knlGS:0000000000000000 [ 768.178896][T22124] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 768.178905][T22124] CR2: fffff91ffff00000 CR3: 00000000a7896000 CR4: 00000000001406e0 [ 768.178915][T22124] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 768.178923][T22124] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 768.178928][T22124] Call Trace: [ 768.178948][T22124] memset+0x24/0x40 [ 768.178962][T22124] pcpu_alloc+0x589/0x1380 [ 768.178981][T22124] ? pcpu_alloc_area+0x820/0x820 [ 768.218193][T22133] kobject: 'input1977' (0000000098e7cc1c): kobject_cleanup, parent 000000007173301a [ 768.220592][T22124] ? bpf_map_area_alloc+0x20/0x30 [ 768.220615][T22124] __alloc_percpu_gfp+0x28/0x30 [ 768.220629][T22124] htab_map_alloc+0xdb9/0x11c0 [ 768.220648][T22124] ? htab_map_update_elem+0xca0/0xca0 [ 768.228840][T22129] kobject: 'input1975' (00000000ade4c8dd): calling ktype release [ 768.236951][T22124] __do_sys_bpf+0x478/0x37b0 [ 768.236968][T22124] ? bpf_prog_load+0x18a0/0x18a0 [ 768.236982][T22124] ? __kasan_check_write+0x14/0x20 [ 768.236998][T22124] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 768.237012][T22124] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 768.237023][T22124] ? wait_for_completion+0x440/0x440 [ 768.237041][T22124] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 768.237060][T22124] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 768.237081][T22124] ? do_syscall_64+0x26/0x790 [ 768.246695][T22133] kobject: 'input1977' (0000000098e7cc1c): calling ktype release [ 768.254427][T22124] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 768.254445][T22124] ? do_syscall_64+0x26/0x790 [ 768.254464][T22124] __x64_sys_bpf+0x73/0xb0 [ 768.254478][T22124] do_syscall_64+0xfa/0x790 [ 768.254493][T22124] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 768.254502][T22124] RIP: 0033:0x45a679 [ 768.254522][T22124] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 768.264110][T22130] kobject: 'input1976' (00000000c913a0ac): calling ktype release [ 768.270040][T22124] RSP: 002b:00007fd557596c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 768.270052][T22124] RAX: ffffffffffffffda RBX: 00007fd557596c90 RCX: 000000000045a679 [ 768.270059][T22124] RDX: 000000000000003c RSI: 0000000020000040 RDI: 405a020000000000 [ 768.270065][T22124] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 768.270072][T22124] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fd5575976d4 [ 768.270079][T22124] R13: 00000000004c0c65 R14: 00000000004d4750 R15: 0000000000000003 [ 768.270092][T22124] Modules linked in: [ 768.270105][T22124] CR2: fffff91ffff00000 [ 768.270121][T22124] ---[ end trace 86444d58eade2abd ]--- [ 768.270143][T22124] RIP: 0010:check_memory_region+0x9c/0x1a0 [ 768.270161][T22124] Code: c9 4d 0f 49 c1 49 c1 f8 03 45 85 c0 0f 84 10 01 00 00 41 83 e8 01 4e 8d 44 c0 08 eb 0d 48 83 c0 08 4c 39 c0 0f 84 a7 00 00 00 <48> 83 38 00 74 ed 4c 8d 40 08 eb 09 48 83 c0 01 49 39 c0 74 53 80 [ 768.278771][T22129] kobject: 'input1975': free name [ 768.286091][T22124] RSP: 0018:ffffc900104c7a80 EFLAGS: 00010206 [ 768.286104][T22124] RAX: fffff91ffff00000 RBX: fffff91ffff00f10 RCX: ffffffff819de8a9 [ 768.286111][T22124] RDX: 0000000000000001 RSI: 0000000000007880 RDI: ffffe8ffff800000 [ 768.286117][T22124] RBP: ffffc900104c7a98 R08: fffff91ffff00f10 R09: 0000000000000f10 [ 768.286123][T22124] R10: fffff91ffff00f0f R11: ffffe8ffff80787f R12: fffff91ffff00000 [ 768.286131][T22124] R13: 0000000000007880 R14: 0000000000000000 R15: ffff88821fffd100 [ 768.286141][T22124] FS: 00007fd557597700(0000) GS:ffff8880ae900000(0000) knlGS:0000000000000000 [ 768.286149][T22124] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 768.286157][T22124] CR2: fffff91ffff00000 CR3: 00000000a7896000 CR4: 00000000001406e0 [ 768.286166][T22124] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 768.286172][T22124] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 768.286180][T22124] Kernel panic - not syncing: Fatal exception [ 768.287887][T22124] Kernel Offset: disabled [ 768.651363][T22124] Rebooting in 86400 seconds..