last executing test programs: 5.575217966s ago: executing program 1 (id=1904): bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0e000000040000000400000004"], 0x48) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2101, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x7, 0xffffffffffffffff}, 0x828, 0x0, 0x0, 0x0, 0x9, 0x800000, 0x0, 0x0, 0x0, 0x0, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x9, 0x3, 0x8000, 0x1}, 0x50) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8914, 0x0) r0 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)={0xffffffffffffffff}, 0x4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000540)={r0, 0xe0, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000180)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x5, &(0x7f00000001c0)=[0x0], &(0x7f00000002c0)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0xdd75, &(0x7f0000000300)=[{}], 0x8, 0x10, &(0x7f0000000380), &(0x7f00000003c0), 0x8, 0x7a, 0x8, 0x8, &(0x7f0000000400)}}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x4}, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x16, 0x0, 0x0, 0xffff, 0x0, 0x1}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x10, 0xe, &(0x7f0000001540)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sk_msg, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x200000, 0x10, &(0x7f0000000000), 0x143}, 0x48) 4.5691868s ago: executing program 1 (id=1919): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1b, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c}, 0x94) syz_clone(0x640c7000, 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 80) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={&(0x7f0000000180)='workqueue_activate_work\x00', r1}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000003"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x6, 0x4, 0xfff, 0x7}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000a40)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={&(0x7f0000000180)='workqueue_activate_work\x00', r3}, 0x10) 4.11680669s ago: executing program 0 (id=1922): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000200), 0x20702, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0900000004000000ff0f000003"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000006c0)={0x1d, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @lsm=0x2b, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000280)='sched_switch\x00', r2, 0x0, 0xf}, 0x18) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000080)={'pim6reg1\x00', 0xe511}) ioctl$TUNSETQUEUE(r0, 0x400454d9, &(0x7f0000000100)={'veth0_to_bridge\x00', 0x400}) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000000)={r3, &(0x7f0000000200)="51fb"}, 0x20) ioctl$TUNGETDEVNETNS(r0, 0x54e3, 0x0) close(0x3) openat$tun(0xffffffffffffff9c, &(0x7f0000000200), 0x20702, 0x0) (async) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0900000004000000ff0f000003"], 0x48) (async) bpf$PROG_LOAD(0x5, &(0x7f00000006c0)={0x1d, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @lsm=0x2b, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000280)='sched_switch\x00', r2, 0x0, 0xf}, 0x18) (async) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000080)={'pim6reg1\x00', 0xe511}) (async) ioctl$TUNSETQUEUE(r0, 0x400454d9, &(0x7f0000000100)={'veth0_to_bridge\x00', 0x400}) (async) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) (async) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000000)={r3, &(0x7f0000000200)="51fb"}, 0x20) (async) ioctl$TUNGETDEVNETNS(r0, 0x54e3, 0x0) (async) close(0x3) (async) 4.099797351s ago: executing program 1 (id=1923): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="0a00000004000000ff0f000006"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000008c0)={0x6, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @xdp, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={&(0x7f0000000180)='workqueue_activate_work\x00', r1}, 0x10) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0a00000004000000ff0f000007"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x15, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb7030000080000002d010000000000008500000001000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x3, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x23, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={&(0x7f0000000180)='workqueue_activate_work\x00', r3}, 0x10) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000300)={0xffffffffffffffff}) setsockopt$sock_attach_bpf(r4, 0x1, 0x1d, &(0x7f00000001c0), 0x4) 4.037199753s ago: executing program 4 (id=1925): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f0000000300)='sched_switch\x00'}, 0x10) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000840)=ANY=[@ANYBLOB="0b0000000500000002000000638fbff805"], 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x11, 0xf, &(0x7f0000000540)=ANY=[@ANYBLOB="8c980c0008000000180100002020692500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000bbf700008500000006000000182b0000", @ANYRES32=r0, @ANYBLOB="00000000000004001830000005000007000000000000000018280000", @ANYRES32=0x1, @ANYBLOB="00000000ffffffff"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000500)='mm_lru_activate\x00', r1}, 0x10) write$cgroup_int(r0, &(0x7f00000002c0), 0x12) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) close(0xffffffffffffffff) close(0xffffffffffffffff) write$cgroup_int(r2, &(0x7f0000000200), 0x43451) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x7, 0xf, &(0x7f0000000240)=ANY=[@ANYBLOB="1800000000001000000000000000000018110000", @ANYRES32, @ANYBLOB="00000000000000000000008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000000000008500000084000000b70000000000000095000000"], &(0x7f0000000200)='GPL\x00', 0xffffffff, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xaf}, 0x94) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400), 0x1e1383, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f00000000c0)={'syzkaller0\x00', 0x84aebfbd6349b7f2}) ioctl$TUNSETTXFILTER(r4, 0x400454d1, &(0x7f0000000000)=ANY=[@ANYBLOB="00000600bbbbbbbbbbbbaaaaaaaaaaaaaaaaaaaaaaaa365b62c6b87dae2ed69ed5e4478c4744ac2cc5b23190d5713c35fd833842e235ffffffffffff"]) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f00000006c0)='sched_switch\x00', r3}, 0x10) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000100)=ANY=[@ANYBLOB="180000000900000000000000213f0000c50000000e800000850000000e00000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) r6 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='mmap_lock_acquire_returned\x00', r5}, 0x10) bpf$ITER_CREATE(0xb, &(0x7f0000000100)={r6}, 0x8) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) r7 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="170000000000000004000000ff"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000300)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r7, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0}, 0x94) perf_event_open(0x0, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000180)) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002200)={0x18, 0x5, &(0x7f0000000680)=ANY=[@ANYBLOB="18020000000000200000000000000000850000009e000000c300000d00000000"], &(0x7f0000000100)='GPL\x00'}, 0x94) 4.033222634s ago: executing program 1 (id=1926): syz_clone(0x810c0000, &(0x7f00000001c0)="6a3ef319044b3575290e9f927fa68acf310430ec53dbac9811266e9292ce8592e77ce32ca4b721a757fc5a736a0026856298b968eb1e9915a9f4d439b62e61f1b1c8e79b1ae0fe87468bd367c46b1de71e391be26258af60fb9b6efe419008f488055bebee82564389ca138ea4af4347c25449aef419c8c2bd076dfccfc8692b0dd1d59a082aa1d829aef265dcfa7447290c5f9529584f519e27221ee086debd8ae635c2f28cdef349b8104fd3fa382201b0dc621d3d58609b72663c282f308cbc454827f6b3c343", 0xc8, 0x0, 0x0, 0x0) r0 = syz_clone(0x40000000, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={r0, 0xffffffffffffffff, 0x0, 0x12, &(0x7f0000000000)='4dxv.n\xce\xc0\xdf\xbf3%5\xd3\xc71\xf2\r'}, 0x30) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) 3.953664078s ago: executing program 2 (id=1928): perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x50) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="0a00000004000000ff0f000006"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000180)={{r0}, &(0x7f0000000000), &(0x7f0000000080)=r1}, 0x20) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000008c0)={0x6, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @xdp, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r3, &(0x7f0000001b00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001d80)=ANY=[@ANYBLOB], 0x128}, 0x0) recvmsg$unix(r2, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0), 0x100}, 0x0) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0a00000004000000ff0f000007"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x15, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb7030000080000002d01000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x3, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000400)={{r4}, &(0x7f0000000040), &(0x7f00000003c0)}, 0x20) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x23, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={&(0x7f0000000180)='workqueue_activate_work\x00', r5}, 0x10) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000300)={0xffffffffffffffff}) setsockopt$sock_attach_bpf(r6, 0x1, 0x1d, &(0x7f00000001c0), 0x4) 3.952098358s ago: executing program 1 (id=1929): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x30}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x11, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r2 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f00000001c0)='tasks\x00', 0x2, 0x0) r3 = syz_clone(0x201100, &(0x7f0000000280)="b113690b334a8370b7d4a0eb24f5455c040c21250f73e6b7087445a14aaaa541b4fc8b32be659c16a1c451bb60a980631454aeebf9a9ef8d8f581341d984", 0x3e, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000800)="17ae7822cc0b81a509fa2b0b82db7fcb8037b78b03d11eae7a4a5396992d45e7394d91f2fd90c6d6757c16ca16320ed906f3bd399c9313f492689124e46875fb894b188510b85cdaac8a9ff61c7b9b65e0941650cb7a40d8181af7c39a7213a2652f1c2bf29a802f6e563cb60ab39e68570f170857c30c76fabd791e052f1a423cf7941e17ef075794ab6127c5ef1f6a2a51df6407db03cb2c51257b27f524a6d02f3225bd1e8bcd5cf177a6d606b00dce5f304db6eaea905020fe42eeed46239426afbbda1f8edfa288fdd18c7d70a9ef1a30137533f78c70ac186edbcd485da2bb4ffe894b") write$cgroup_pid(r2, &(0x7f0000000500)=r3, 0x12) bpf$ENABLE_STATS(0x20, 0x0, 0x0) bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000002c0), 0x4) bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x0, 0xc, &(0x7f0000000000)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d0000001801000020696c2500000000142020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000e02800850000007000000095", @ANYRESHEX], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x28, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000007c0)=ANY=[@ANYBLOB="0500000004000000990000000b"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000900)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r4, @ANYBLOB="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"], 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000000)='workqueue_queue_work\x00', 0xffffffffffffffff, 0x0, 0x1}, 0x18) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1f, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x1a, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) perf_event_open(&(0x7f0000000340)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x21, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000180), 0x40001) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) syz_clone(0x40020000, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$PROG_BIND_MAP(0xa, &(0x7f00000004c0)={r5}, 0xc) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000080)='percpu_create_chunk\x00', r1}, 0x18) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000004c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000540)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000180)='percpu_create_chunk\x00', r6}, 0x18) recvmsg$unix(0xffffffffffffffff, &(0x7f0000001ac0)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r7, &(0x7f00000004c0)=ANY=[@ANYBLOB="8fedcb7907001175f37538e486dd63f580fc02082c00db5b6861589bcfe8875a060300000023000000000000000000000000ac1414aa"], 0xfdef) write$cgroup_subtree(r7, &(0x7f00000004c0)=ANY=[], 0xfdef) r8 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000c00)={0xffffffffffffffff, 0x2, 0x14}, 0xc) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000cc0)={0x6, 0x11, &(0x7f0000000d80)=ANY=[@ANYBLOB="18010000202078250000000000200a207b1af8ff00000000bf0500000000000007010000f8ffffffb702000008008bd0040d82090000b703000002000000850000000600000018010000786c6c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000040000008500000006000000d938f8ff01000000"], &(0x7f0000000780)='syzkaller\x00', 0x4, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, 0x25, r7, 0x8, &(0x7f0000000bc0)={0x5, 0x5}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x2, &(0x7f0000000c40)=[r8, r4], &(0x7f0000000c80)=[{0x3, 0x2, 0x7, 0xc}, {0x0, 0x2, 0xf, 0x9}], 0x10, 0x400}, 0x94) bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0xa, 0x101, 0x7fff, 0xcc, 0xa003, 0xffffffffffffffff, 0xfffffffd, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @value=r7}, 0x50) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000100)={{r0}, &(0x7f0000000000), &(0x7f00000000c0)=r1}, 0x20) 3.951069347s ago: executing program 0 (id=1930): bpf$BPF_PROG_DETACH(0x8, 0x0, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018010000", @ANYRES32, @ANYBLOB="0000000000000000b70800000000396f7b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000002400000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000001b80)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000005c0)={&(0x7f0000000580)='kmem_cache_free\x00', r0}, 0x10) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xc8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (fail_nth: 2) 3.864872911s ago: executing program 4 (id=1931): bpf$MAP_CREATE(0x0, &(0x7f0000000300)=ANY=[@ANYBLOB="1600000000000000040000000100000000000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x50) (async) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000300)=ANY=[@ANYBLOB="1600000000000000040000000100000000000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x50) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0}, 0x90) (async) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000002ec0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000001900007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="0b00000007000000020001000900000001"], 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0xc, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000680)={&(0x7f00000008c0)='rpc_clnt_clone_err\x00', r2, 0x0, 0x4}, 0x18) (async) r4 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000680)={&(0x7f00000008c0)='rpc_clnt_clone_err\x00', r2, 0x0, 0x4}, 0x18) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000001300)={&(0x7f0000000c00)='net_dev_start_xmit\x00', r5}, 0x10) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x18000000000002a0, 0xe2c, 0x60000000, &(0x7f0000000100)="b9ff03316844268cb89e14f0080047e0ffff00124000632f77fbac14fe16e000030a07080403fe80000020006558845013f2325f1a3901050b038da1880b25181aa59d943be3f4aed50ea5a6b8686731cb89ef77123c899b699eeaa8eaa0073461119663906400f30c0600000000000059b6d3296e8ca31bce1d8392078b72f24996ae17dffc2e43c8174b54b620636894aaacf28ff62616363c70a440aec4014caf28c0adc043084617d7ecf41e9d134589d46e5dfc4ca5780d38cae870b9a1df48b238190da450296b0ac01496ace23eefc9d4246dd14afbf79a2283a0bb7e1d235f3df126c3acc240d75a058f6efa6d1f5f7ff4000000000000000000", 0x0, 0x24, 0x60000000}, 0x2c) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000580)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='rxrpc_skb\x00', r6}, 0x18) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r7, &(0x7f0000001ac0)={0x0, 0x0, 0x0}, 0x0) close(r7) sendmsg$inet(r8, &(0x7f0000000b40)={0x0, 0x0, 0x0}, 0x0) perf_event_open(&(0x7f00000004c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x4}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) (async) perf_event_open(&(0x7f00000004c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x4}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="07000000040000001800000042a0000000000000", @ANYRES32, @ANYBLOB="0104000000000000000000000000000000000000683a7e081942fbd2304e0ac85ea84f100e58961c06b910159645d47b87f4284d7500339aa520aab2a296dd6974d90105986da1a8c287fa7f4766a6c219671bf03aca7c071cd4844f6d3347ea3db7b22efd7646ffed2fe3163a002c15dc6c6ffef6d385f68592cfaae25df12a0260ee61da2d7c6adcdb927277493071d026e9091d591ad0a38a815e7670ca0fa9c298a30dd7387d59f537cb02d8c2466250d84a8b97cec39ec699a3d7953f92b6bc3d0def4ffd5414098794a3ef9a7adeb260b4c4ddd5d7c2fb9f5dff", @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) r9 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_CREATE(0x0, &(0x7f0000000740)=ANY=[@ANYBLOB="0b00000005000000000400000900000001"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000900)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRESHEX=r7], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) r10 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000900)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRESHEX=r7], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) r11 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000006c0)={&(0x7f0000000700)='ext4_remove_blocks\x00', r11, 0x0, 0x39}, 0x18) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000006c0)={&(0x7f0000000700)='ext4_remove_blocks\x00', r11, 0x0, 0x39}, 0x18) openat$tun(0xffffffffffffff9c, &(0x7f0000000200), 0x20702, 0x0) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000740)) (async) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r12, 0x8912, &(0x7f0000000080)) r13 = bpf$MAP_CREATE(0x0, &(0x7f0000000940)=ANY=[@ANYRES8=r1, @ANYRESHEX=r7, @ANYBLOB='\x00'/20, @ANYRES8=r9, @ANYRES32=r10, @ANYBLOB="0400000005000000050000000300"/24, @ANYRES32=r9, @ANYRES8=r5], 0x50) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000005c0)={0x6, 0xd, &(0x7f0000000380)=ANY=[@ANYBLOB="1800000005000036cab11a00100000009558f0ff010000001863000005000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b70200000000000085000000860000001800000010260000000000000400000085100000ffffffff9500000000000000"], &(0x7f0000000040)='syzkaller\x00', 0x40001a, 0x29, &(0x7f0000000180)=""/41, 0x41000, 0x3, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000540)={0x1, 0x5}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)=[r0, r0, r0, r0, r0, r0, r0, r13, r0], 0x0, 0x10, 0x10001}, 0x94) bpf$MAP_CREATE(0x0, &(0x7f0000000400)=ANY=[@ANYRES32=r4], 0x48) 3.450603739s ago: executing program 4 (id=1933): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1b, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c}, 0x94) syz_clone(0x640c7000, 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 81) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={&(0x7f0000000180)='workqueue_activate_work\x00', r1}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000003"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x6, 0x4, 0xfff, 0x7}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000a40)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={&(0x7f0000000180)='workqueue_activate_work\x00', r3}, 0x10) 3.094711825s ago: executing program 0 (id=1936): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="0a00000004000000ff0f000006"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000008c0)={0x6, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @xdp, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={&(0x7f0000000180)='workqueue_activate_work\x00', r1}, 0x10) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0a00000004000000ff0f000007"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x15, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb7030000080000002d010000000000008500000001000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x3, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x23, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={&(0x7f0000000180)='workqueue_activate_work\x00', r3}, 0x10) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000300)={0xffffffffffffffff}) setsockopt$sock_attach_bpf(r4, 0x1, 0x1d, &(0x7f00000001c0), 0x4) 3.084996675s ago: executing program 2 (id=1937): bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[], 0x48) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1f, 0x7, 0x0, &(0x7f00000004c0)='GPL\x00', 0x1, 0x0, 0x0, 0x0, 0x9, '\x00', 0x0, @fallback=0x14, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000340)={0x0, r0}, 0x18) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000840)=@base={0xb, 0x8, 0x2, 0x4, 0x5}, 0x48) (async) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000840)=@base={0xb, 0x8, 0x2, 0x4, 0x5}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000380)={{r2, 0xffffffffffffffff}, &(0x7f0000000b00), &(0x7f0000000300)}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="00000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000030000009500000000000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) perf_event_open(0x0, 0x0, 0xb000000000000002, 0xffffffffffffffff, 0x0) ioctl$TUNDETACHFILTER(r1, 0x401054d6, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000180)='sched_switch\x00', r4}, 0x10) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000180)='sched_switch\x00', r4}, 0x10) perf_event_open(0x0, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0) (async) perf_event_open(0x0, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000e80)={0xf, 0xc, &(0x7f0000000240)=ANY=[@ANYBLOB="1800000000000000000000000000000018000000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000003000000850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, '\x00', 0x0, @fallback=0x21, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) bpf$PROG_LOAD(0x5, &(0x7f0000000e80)={0xf, 0xc, &(0x7f0000000240)=ANY=[@ANYBLOB="1800000000000000000000000000000018000000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000003000000850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, '\x00', 0x0, @fallback=0x21, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000240)=ANY=[], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x7, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000240)=ANY=[], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x7, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kmem_cache_free\x00', r5}, 0x18) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) close(r6) (async) close(r6) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000300)) (async) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$unix(r7, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="14000000000000000100000001000000", @ANYRES32=r8], 0x18}, 0x24048814) sendmsg$unix(r6, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB="14000000000000000100000001000000", @ANYRES32=r8], 0x18}, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)) (async) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) close(r8) close(r9) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000580)=ANY=[@ANYBLOB="0200000004000000080000000100000080000000", @ANYRES32=0x0, @ANYBLOB="0000000000000000000003000000000000000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB='\x00'/28], 0x50) close(0xffffffffffffffff) 3.000612299s ago: executing program 0 (id=1938): bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000600)={0x14, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018000000", @ANYRES32=0x0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000f66f63bb850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0xae, '\x00', 0x0, @fallback=0x35, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff}, 0x94) r0 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x11, 0xf, &(0x7f0000000340)=@ringbuf={{}, {{0x18, 0x1, 0x1, 0x0, r0}}, {}, [], {{}, {}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000004c0)={&(0x7f0000000300)='fib6_table_lookup\x00', r1}, 0x10) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={0xffffffffffffffff, 0x18000000000002a0, 0x0, 0x0, &(0x7f0000000100), 0x0, 0xfe, 0x60000000}, 0x50) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040), 0x1, 0x0) ioctl$TUNSETOFFLOAD(r2, 0x4004743d, 0x110e22fff6) socketpair(0x1, 0x1, 0x0, 0x0) perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb89, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000, 0x4, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x80000000, 0x0, 0x10000}, 0x0, 0x100, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback=0x15, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="19000000040000000800000008"], 0x48) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b70800000d0000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000000740)=ANY=[@ANYBLOB="0b00000005000000000400000900000001"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000900)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b708000008"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @cgroup_skb, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f00000004c0)={r6, &(0x7f0000000340), &(0x7f00000005c0)=""/155}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xc, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r6], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r7}, 0x10) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x9}, 0x810, 0xc8, 0x0, 0x3, 0x4, 0x1, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x1, 0xffffffffffffffff, 0x0) close(r5) recvmsg$unix(r4, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r8, &(0x7f0000000300)=ANY=[@ANYBLOB="8fedcb7910009875f37538e486dd6317ce8102032900fefd000e40000200875a65969ff57b00000000000000000000000000ac1414aa"], 0xfdef) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x15, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000107b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000925e850000000500000095"], 0x0, 0x2, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @sk_reuseport, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000700)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) 2.879699174s ago: executing program 2 (id=1939): openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) (async) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) syz_clone(0x11, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x0, 0x9, &(0x7f0000000800)=ANY=[@ANYBLOB="180000000000000000000000000000001811", @ANYRES64=0x0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_CREATE(0x0, &(0x7f0000000480)=ANY=[@ANYBLOB="0b00000007000000010001000800000001000000", @ANYRES32, @ANYBLOB="0000000000000000000000000000400000007d13a995cc5ea655eb80b6d368c83a0000", @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) (async) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000480)=ANY=[@ANYBLOB="0b00000007000000010001000800000001000000", @ANYRES32, @ANYBLOB="0000000000000000000000000000400000007d13a995cc5ea655eb80b6d368c83a0000", @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x862a1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xd}, 0x144a8}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x100002, 0x0) write$cgroup_pid(r1, &(0x7f0000000980), 0x20000992) (async) write$cgroup_pid(r1, &(0x7f0000000980), 0x20000992) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000740)=ANY=[@ANYBLOB="0500000026b700000080000001"], 0x50) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000001c0)={{r2}, &(0x7f00000002c0), &(0x7f0000000280)}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000003c0)={r2, &(0x7f0000000600), 0x0}, 0x20) bpf$PROG_LOAD(0x5, 0x0, 0x0) (async) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xfffffffffffffffb, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa2000000000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f00000001c0)=0xffffffffffffffff, 0x4) (async) r3 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f00000001c0)=0xffffffffffffffff, 0x4) bpf$ITER_CREATE(0x21, &(0x7f0000000200)={r3}, 0x8) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000300)=@base={0x16, 0x0, 0x4, 0x1}, 0x50) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0}, 0x90) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000580)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r5}, 0x10) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r5}, 0x10) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000058"], 0x0}, 0x90) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x2, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r6}, 0x10) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0xc004743e, 0x110e22fff6) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x6, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x8}, 0x10000, 0xc8, 0xfff, 0x0, 0x0, 0x0, 0x7}, 0xffffffffffffffff, 0x8, 0xffffffffffffffff, 0xa) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) close(r8) recvmsg$unix(r7, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) (async) recvmsg$unix(r7, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) (async) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) 2.873166115s ago: executing program 0 (id=1940): r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000280)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0xffff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x4, 0x4}, 0x50) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f00000003c0)={{0x1, 0xffffffffffffffff}, &(0x7f0000000340), &(0x7f0000000380)='%pS \x00'}, 0x20) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000480)={0x22, 0x1b, &(0x7f0000000000)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x7ff, 0x0, 0x0, 0x0, 0x400}, {}, {}, [@kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @ldst={0x0, 0x0, 0x689dd444e2ac37f2, 0xb, 0x1, 0xffffffffffffffff, 0xffffffffffffffff}, @printk={@llu, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0xa110}}, @generic={0x1, 0x0, 0x7, 0x95a0, 0x6}, @ldst={0x1, 0x2, 0x3, 0x9, 0x8, 0xffffffffffffffe0}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000100)='GPL\x00', 0x9, 0xaf, &(0x7f0000000140)=""/175, 0x41100, 0x3, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000200)={0x6, 0x1}, 0x8, 0x10, &(0x7f0000000240)={0x4, 0x1, 0x7ff, 0xe}, 0x10, 0x0, 0x0, 0x3, &(0x7f0000000400)=[r0, r1, r2, 0xffffffffffffffff], &(0x7f0000000440)=[{0x1, 0x4, 0xf, 0x4}, {0x0, 0x4, 0xb, 0xb}, {0x0, 0x2, 0xc, 0xa}], 0x10, 0x7}, 0x94) bpf$MAP_DELETE_BATCH(0x1b, &(0x7f0000001700)={&(0x7f0000000540)="b4d1f86771bc", &(0x7f0000000580)=""/178, &(0x7f0000000640)="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", &(0x7f0000001640)="4ed6c456dffaed0f8746d06f0e6dea00489ebac202adaa3ab4ea899f0a9f957a6aae5f807acd65f993cecf0809f925543b6a8aaf57319718376001fe4f37d2272db9dacc1828f64eb73bbebce126e5a6f0dd73d8e926de18c282dcd657250290aa84a8a2bd42d4fe9a646bd069b481030f2761200b784784205f1ece8c3a2690c7fd", 0x4, r1}, 0x38) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000001a80)={r3, 0x0, 0x84, 0xfa, &(0x7f0000001740)="a3764b49e76e9c7a5eeba2e60e1d838f39dd4c611e8ead3e3eb83af523dab7f5718af90227349dc053746a5dccfbddc3c3043588e88f7132e3b781c2530075a06c077a3ef3aa7e90443a11dc2f01ef4ced108b8247c70c29bfa7751e9bd66baf6c6b5f838db67e1a9d7a3b4ebc7e1977b7090c03724d06ca19a92f6a4d0d6de836141445", &(0x7f0000001800)=""/250, 0x0, 0x0, 0xc0, 0xc0, &(0x7f0000001900)="e68b2777ca17b721157f2c3bc79c72b455c6b40814be9e8bc103234effc0abb3f6c14c7b7c6099458454795bc85fcafb67ec019c96cd0b8652c874e837ec1fe6d127f554d61cbb1e59bc1b7497b11985bc1e0d94c967c4364b780cacc9772c882ce25aed63f7d01568d1fd01f1c5b1709cc3e97b7247461fbcaf096d06eb920d39a14e88259572a7f1cde9681a0147f7eb5954d5089595cb15d30fb294fba23f31033fc3de789055b90d1873f7b2f3f1f6bda01d6597d9d2a0cb91bb76221c84", &(0x7f00000019c0)="c7ae12b2bddcf9f769442df319b24d3eb756abebe1672a3021e1f9832b86d0bfa1213835679498b97580c5c80461051923e711c40114efa197228d5686d74f31026eebaa7b6697d551d848760ba75c3dd7bdf143570fbcbe712825d776e9ec4bf4229fa6b0bfdd3cdfee074cedcab0a266fff6f52dc7d22a3db1a85ab80bee33d20ba53bf5869a662faa399aca2185117ef4e0bb5098c36a7bf4127e7f7e4feddc9cd361ea8b87e2975c21a9c3a063425cecb32ea23c958bd8ce09eda8bf54fe", 0x2, 0x0, 0x100}, 0x50) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000001b00)='./cgroup/syz1\x00', 0x200002, 0x0) r5 = openat$cgroup_subtree(r4, &(0x7f0000001b40), 0x2, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000001b80)) r6 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000001c00)={&(0x7f0000001bc0)='kvm_ioapic_set_irq\x00', r3, 0x0, 0x6d}, 0x18) syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000001c40)='ns/net\x00') socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000001c80)) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000001dc0)={@map=r1, 0x16, 0x1, 0x2, &(0x7f0000001cc0)=[0x0, 0x0, 0x0], 0x3, 0x0, &(0x7f0000001d00)=[0x0, 0x0], &(0x7f0000001d40)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000001d80)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0}, 0x40) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000001e00)={@cgroup=r4, r1, 0x16, 0x8, r3, @void, @value=r1, @void, @void, r8}, 0x20) r9 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000001fc0)='cgroup.controllers\x00', 0x0, 0x0) r10 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001f80)={&(0x7f0000001e40)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xb3, 0xb3, 0x5, [@decl_tag={0xa, 0x0, 0x0, 0x11, 0x3, 0x6}, @decl_tag={0x1, 0x0, 0x0, 0x11, 0x3, 0xa}, @volatile={0xa, 0x0, 0x0, 0x9, 0x3}, @datasec={0x6, 0x2, 0x0, 0xf, 0x3, [{0x2, 0xfffffffd, 0xffffffff}, {0x1, 0xffff, 0x3d1}], "a0cb1f"}, @struct={0x0, 0x7, 0x0, 0x4, 0x0, 0x6, [{0xa, 0x4, 0x4}, {0x5, 0x4, 0x5cc}, {0x9, 0x1, 0x2}, {0x0, 0x5, 0x7}, {0x6, 0x3}, {0x0, 0x4, 0x7}, {0x3, 0x3}]}]}, {0x0, [0x3e, 0x2e, 0x61]}}, &(0x7f0000001f40)=""/17, 0xd1, 0x11, 0x1, 0xe, 0x10000, @value=r9}, 0x28) syz_clone(0x5060000, &(0x7f0000002000)="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", 0xfc, &(0x7f0000002100), &(0x7f0000002140), &(0x7f0000002180)="86864065872ff0dcd53bf8d8cee66cc395e80fa9287bf2b9ac43e2f254ca35bb3149b7e3cd38b07136fb72a368f4e90a88b67b86414e41392ae8d1e2be9dce4952111f0b88cbdec5722ac92158f5d133e1ec43d815e3d24cff56ea472d882d407a6c28956612ae250074672ae7069b8abc5db7ca061988ee6ab30317039430cd8ca95a0b13959fdab461794f0639fbb39869c7a91240147afe4a3420d581bf8d068a7034aad1cf5f77617f2dcf7c6c63b601de4fe3b4d614a3666c02af02470c3da793db723e7bf3390d636bb4bb4506ea00cf820ed0bea4a8a435d135f0d9dbd646eafd911e4d41de233a4e31e0b41d5774d8c5ac96") r11 = bpf$MAP_CREATE(0x0, &(0x7f0000002280)=@base={0x5, 0x4, 0xffff, 0x2, 0x28040, r9, 0x40, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x2, 0x0, @value=r9}, 0x50) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000025c0)={r9, 0x58, &(0x7f0000002540)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000002640)=@bpf_ext={0x1c, 0x22, &(0x7f0000002300)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000}, [@map_idx={0x18, 0x0, 0x5, 0x0, 0x5}, @map_fd={0x18, 0x7, 0x1, 0x0, r7}, @map_idx_val={0x18, 0x9, 0x6, 0x0, 0xc, 0x0, 0x0, 0x0, 0x2}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, r9}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0xfffff97e}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x1}}, @call={0x85, 0x0, 0x0, 0x82}, @ringbuf_query={{0x18, 0x1, 0x1, 0x0, r9}}, @map_fd={0x18, 0x1, 0x1, 0x0, r11}, @exit, @printk={@lx, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0xff87}}]}, &(0x7f0000002440)='syzkaller\x00', 0x2, 0xa5, &(0x7f0000002480)=""/165, 0x41000, 0x10, '\x00', r12, 0x0, r9, 0x8, &(0x7f0000002600)={0x0, 0x4}, 0x8, 0x10, 0x0, 0x0, 0xef7c, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x2}, 0x94) close(r5) ioctl$TUNSETTXFILTER(r9, 0x400454d1, &(0x7f0000002700)={0x0, 0xa, [@multicast, @broadcast, @remote, @broadcast, @empty, @dev={'\xaa\xaa\xaa\xaa\xaa', 0x1f}, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x14d91122c17deac3}, @local, @remote, @multicast]}) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000002a40)={r9, 0xffffffffffffffff}, 0x4) bpf$MAP_DELETE_BATCH(0x1b, &(0x7f0000002a80)={&(0x7f0000002740)="e05c7a2dd7cebff3903f2e75b6304a4a3447ebe9b47aa18303139af1e9cf66b0e9375b6c5b2f6aee211c97e93320c6351c3bcbd1b448987bf130fcc27ee6de8fd7d2980cf8b15b84615b68b2e530ffddbe5e60b9945472b4cb59ee329bb8d6a3db0534be160c68e85082997d4366edec07476027350c0150bd46988485d6afa18a7ccfc8514e3a7700d2258e9c45cfa237f0e24306ec5c4038deb5d5cc3254ed5cfd9c10524ff204c7d0278025988197215ad431498d9ee24098f035", &(0x7f0000002800)=""/79, &(0x7f0000002880)="53df8aa4d558ff045c6002c7d8d3c45b95d429ccadcb24cac8d48389ccbb9c559ea0118ef2cf5bc7dd843834a991bc27774c010f77aaa42478f8fcb189b10c7cda41212eae5cbc7ed40a84c4fad031f3766c36564964b46fd6e15769b96ec62181a72d0684314c68971676a07d9d30603a043ea36748bf5f0f2f3af8f0f331fa5578c509401c8ca8dbd74cf399b3dcc42ff9a355dc8904b1112395057d3f2d1d567da34e516cc5cdd80995359e7acd79d4bacdfa19efdf5f0159c9", &(0x7f0000002940)="bc24633ff807ebf23905c6342ef5d80079096df6b4a104c50f5340f40e4d34b0968ecf35d76ad4025757d607406d5e56d90ed600e5602c372251da800aa6ea0cb242a5df63183c13bc207622aeff5cdb1512365a2e041289304dc27ef556cde902e9090e58a458f494364661e3564666bd856a7dcd7d9e808ab3c3c221d719a7a6f5d8a0d18330ba92e5651c7eedd61d2fa093289e410aeafb3ea8ee75e6d217f8dbc2c0a7f7b8914125c1a28facbfab862c18441beedfd0105606457bcc3be9717d208fc030f728f26d6375f253de1915fe0b5112fd374e846fab8409c0af790f57f106c763496cc93226c853e04f", 0x0, r13}, 0x38) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000002ac0)={0x1b, 0x0, 0x0, 0x6, 0x0, 0xffffffffffffffff, 0x1, '\x00', r12, 0xffffffffffffffff, 0x2, 0x3, 0x4}, 0x50) ioctl$TUNGETFEATURES(r10, 0x800454cf, &(0x7f0000002b40)) r14 = perf_event_open$cgroup(&(0x7f0000002b80)={0x0, 0x80, 0x6, 0x10, 0x3, 0x5, 0x0, 0x3, 0x1420, 0x8, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1ff, 0x1, @perf_config_ext={0x8000000000000000, 0x5}, 0x1184, 0x4, 0x3, 0x2, 0x3, 0x8, 0x1, 0x0, 0x4, 0x0, 0x2}, r4, 0x4, r6, 0x5) ioctl$PERF_EVENT_IOC_SET_FILTER(r14, 0x40082406, &(0x7f0000002c00)='@{{F\x00') bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000002d40)={r0, &(0x7f0000002c40)="019d3f0994097cee55ca797316fe9199d60b83988f9ed213b75817317e308316d4e72ed0b96508d31c04f1635b3dfbef7b7b54d57216706d31842f36442cf5281a8de542079860b2d1d062499f25f08e28a7fb11d60ccedcf364b47bd8c765a3e17680302c052b849f4e1350036cc26ef8d7ea8487db0da34e996f1381721c1063902beb2b7c2867c96677b15f854a193621350334e78247f0a364dd7636c59e2634660008e89785189ef25820330f9a58fc8810a1ae8c97be74771da11fb40016de1428807629705b28d7dffa23440a9e84cece7f140bb60b0a4144f09b46acb25af972b50b47e551089599add120fc3d"}, 0x20) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002fc0)={0x11, 0x1, &(0x7f0000002d80)=@raw=[@jmp={0x5, 0x0, 0xd, 0x1, 0x9, 0xfffffffffffffff8, 0x8}], &(0x7f0000002dc0)='GPL\x00', 0x7, 0x1a, &(0x7f0000002e00)=""/26, 0x41000, 0x4, '\x00', 0x0, 0x0, r10, 0x8, &(0x7f0000002e40)={0x0, 0x1}, 0x8, 0x10, &(0x7f0000002e80)={0x1, 0x6, 0x8, 0x1}, 0x10, 0x0, 0x0, 0x3, &(0x7f0000002f40)=[0xffffffffffffffff], &(0x7f0000002f80)=[{0x2, 0x4, 0xb, 0x9}, {0x0, 0x1, 0x4, 0x9}, {0x0, 0x5, 0x5, 0x6}], 0x10, 0x3}, 0x94) 2.787019598s ago: executing program 4 (id=1941): r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="0200000004000000080000000100000080"], 0x48) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000480)={r0}, 0x4) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000300)={0x11, 0x10, &(0x7f00000003c0)=ANY=[@ANYBLOB="18000000510700140000000000000001b7080000000000007b8af8ff00000000b7080000fcffffff7b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r0, @ANYBLOB="0000000000000000b70500000800000085000000a500000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000940)={&(0x7f0000000640)='console\x00', r1}, 0x18) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000140)={'pim6reg1\x00', 0x1}) bpf$MAP_UPDATE_CONST_STR(0x2, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x50) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x48) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, 0x0}, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='kmem_cache_free\x00'}, 0x10) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000001000)={0xffffffffffffffff}) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="170000000000000004000000ff0000000000", @ANYBLOB='\x00'/12, @ANYRES32=0x0], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0xa2}, 0x94) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000040)={0x18, 0x8, &(0x7f0000000000)=ANY=[@ANYBLOB="180800000000000000000000000000008510000003000000180000000000000000000000000000009500000000000000bfa000000000000095"], &(0x7f00000003c0)='syzkaller\x00', 0x1, 0xea, &(0x7f0000001700)=""/234, 0x40f00, 0x10}, 0x22) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) sendmsg$sock(r3, &(0x7f0000000740)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f00000002c0)="75c142029f447ce3a3e67e7746630ab41ae4acf67ff49729edad79b0711fb4cc8c3b4955769de269a9d7f65eaf7513e2c2cca5ab0fad9948aa797c3a3d79d3082b226a8538a3ad73c3c483a223669717b1928e3951e6c920e90a7f73a382f72255c3a5ae78af54292aa664baec9fa4acfc15c9c0fa980830b751fb7b967039172b49c16434f853efab098651c0f68611f6922e3d48f27b07935e40a73152560d4c9620057828c9b9e09a7ec60dc6f69bff6f09dee957fcdd42c53c673d3e92f2c2610c48f7e608d133284acee9b0a213a3f8f3", 0xd3}, {&(0x7f00000004c0)="eee415fc2161cadfa8081a92bbbab8710269f28fa5366925c591df5542d8b9a1865a75f659f79e5d6e4fdcff82479c6c74b5fe626e8c14bd5aeb05ad36d3def68ce91042c9bd9051fce887db2e7f3708400375412d3b8e5e4720d1e688ba39ba17201e38c371f68f20367cc38bdd77db8595b66caceabeecdab3f80c1d1c8dcde138835bcca54deab73933c8b5d0d09601945a776f1253bf362bda34f06b8b230962cb85c9e74f14762e6e7651bb3d4a02ded0aa91db96046a08adfca788d2dc1f191efea52e6dd29165ea57ae7a01d8d49077b2799f2d85d30aa6c66a9b03b9b56375ffa0ec", 0xe6}, {&(0x7f00000005c0)="8a6301c0d823fb69fd09ab8850e906e5389587a8f63800ebef0c48a1f22e079ea07f7948718e3a439fc3f765e3f21b1adf60dca099d78be5aebd4e0c42b763cc987479f3016db930b2bd421ba410e7fe8dfe8e35248823eea7f617952b12dd00e5015051bfd23728d97920", 0x6b}, {&(0x7f0000000680)="e3290e5f5ce1935dc318a0ee02d27c7b82390096ea7482dee68780c030b2e6a7af8a52ae0db9bb79c8971f37cfc23f1507c050753a0fbc610ab0841f02d21309579fd21edfbe34c468bfef41d427e031088cc367248a66086e8db339c2e4795d62f639fb14", 0x65}], 0x4, &(0x7f0000000700)=[@mark={{0x14}}], 0x18}, 0x8800) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f00000001c0)='inet_sk_error_report\x00', r5, 0x0, 0x794}, 0x18) openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x402000000000003, 0x8404, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x4, @perf_bp={&(0x7f0000000280), 0x8}, 0x810c, 0x0, 0xc4b, 0x9, 0x0, 0x0, 0xfffc}, 0x0, 0x0, 0xffffffffffffffff, 0xb) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x202, 0x40020, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x1}, 0x0, 0x0, 0x1, 0x0, 0x100009}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) perf_event_open(&(0x7f0000000800)={0x5, 0x80, 0x0, 0x97, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x8}, 0x0, 0x6, 0x0, 0x4, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) sendmsg$tipc(r6, &(0x7f0000003a00)={&(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x9}}, 0x10, &(0x7f0000000b40)}, 0x0) syz_clone(0xc0001480, 0x0, 0x0, 0x0, 0x0, 0x0) r7 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="0a000000050000000200000007"], 0x48) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000780)={0x0, 0x0, &(0x7f0000000640), &(0x7f0000000740), 0x75, r7}, 0x38) 2.72915146s ago: executing program 0 (id=1942): bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000500)=ANY=[@ANYBLOB="1b00000000000000000000000080000000000000", @ANYRES32, @ANYBLOB="00007fffffffffffffff0000000000000000", @ANYRES32=0x0, @ANYBLOB='\x00'/28], 0x50) r1 = bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffff8, 0x0, @perf_config_ext, 0x0, 0x4}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f00000006c0)='sched_switch\x00', r1}, 0x10) socketpair(0xf, 0x3, 0x2, &(0x7f00000001c0)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000040)={0x0, 0x0}) close(0xffffffffffffffff) r2 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000200)={0x1b, 0x0, 0x0, 0x2, 0x0, r0, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1}, 0x50) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000400)={r0, 0x58, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000580)={{r0, 0xffffffffffffffff}, &(0x7f0000000480), &(0x7f00000004c0)='%-010d \x00'}, 0x20) r5 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000600)=@generic={&(0x7f00000005c0)='./file0\x00', 0x0, 0x18}, 0x18) r6 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000640)={0x1b, 0x0, 0x0, 0x7f, 0x0, r0, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x2, 0x4}, 0x50) r7 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0x0, 0x0, 0x8}, 0xc) bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x19, 0x14, &(0x7f0000000280)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x34c8, 0x0, 0x0, 0x0, 0xc}, {{0x18, 0x1, 0x1, 0x0, r2}}, {}, [@map_val={0x18, 0x0, 0x2, 0x0, r0, 0x0, 0x0, 0x0, 0x9}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x4}, @generic={0x81, 0x9, 0x6, 0x9, 0x10000}, @ldst={0x3, 0x3, 0x2, 0x6, 0x8, 0xfffffffffffffff0, 0x359f4003dfbf3d30}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000340)='GPL\x00', 0xe93, 0x0, 0x0, 0x41000, 0x57, '\x00', r3, @cgroup_sockopt=0x16, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000440)={0x4, 0xb, 0x6, 0x9}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x6, &(0x7f00000007c0)=[r0, r4, r0, r0, r5, r6, r0, r7, r0], &(0x7f0000000800)=[{0x0, 0x5, 0x9, 0x6}, {0x3, 0x5, 0xa, 0x9}, {0x4, 0x3, 0x3, 0x7}, {0x1, 0x1, 0x0, 0x8}, {0x4, 0x3, 0xf, 0x6}, {0x2, 0x2, 0x6, 0x5}], 0x10, 0x81}, 0x94) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@bloom_filter={0x1e, 0x9, 0x3, 0x9, 0x1, 0xffffffffffffffff, 0x1, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x3, 0x4, 0xc}, 0x48) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000000)={0x0, 0x0}) close(r8) setsockopt$sock_attach_bpf(r9, 0x10f, 0x87, &(0x7f0000000180), 0x127) close(r9) syz_clone(0x638c1100, 0x0, 0x0, 0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.throttle.io_serviced_recursive\x00', 0x26e1, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) 2.727690961s ago: executing program 2 (id=1943): bpf$BPF_PROG_DETACH(0x8, 0x0, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018010000", @ANYRES32, @ANYBLOB="0000000000000000b70800000000396f7b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000002400000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000001b80)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000005c0)={&(0x7f0000000580)='kmem_cache_free\x00', r0}, 0x10) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xc8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 2.596312726s ago: executing program 2 (id=1945): r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x8, 0x6, &(0x7f0000000000)=ANY=[@ANYBLOB="b40800000000004ea8114100000000008510000002000000b700000000e89f009500c2000000dcfa9500fe1200000000"], 0x0, 0x4, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @cgroup_skb}, 0x94) bpf$BPF_GET_PROG_INFO(0x1c, &(0x7f00000003c0)={r0, 0x0, 0x0}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f00000008c0)=ANY=[@ANYBLOB="1800000000000000000000000000000018010000786c6c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000fd"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)=@base={0x7, 0x4, 0x18, 0xa042, 0x0, 0xffffffffffffffff, 0x401}, 0x50) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x5, 0x1, 0xfff, 0x7}, 0x50) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xd, &(0x7f0000000500)=ANY=[@ANYRESDEC, @ANYRES32=r2, @ANYBLOB="0000000000000000bf080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x1b, '\x00', 0x0, @fallback=0x5, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000000)='tlb_flush\x00', r3}, 0x18) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000005c0)={0x4, 0x80, 0x0, 0x0, 0xfd, 0x0, 0x0, 0x0, 0x0, 0xd, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x7fffff7fffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0xb) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000f40)={r1, 0x0, 0x0}, 0x20) bpf$PROG_LOAD(0x5, 0x0, 0x0) r4 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0xe}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000001580)={&(0x7f0000000000)='kmem_cache_free\x00', r4}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1801000000dd0000000000003b810000850000006d000000a50000005000000095"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000080)=ANY=[@ANYBLOB="9feb010018000000000000001c0000001d484d1ccf67a2fc219b83f188c982421c00000003000000010000000000000e020000000000"], &(0x7f0000000640)=""/246, 0x37, 0xf6, 0x1}, 0x28) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b7030000000000"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='kmem_cache_free\x00', r5}, 0x10) syz_clone(0x640c7000, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000240)=@bpf_lsm={0x18, 0x7, &(0x7f0000000100)=ANY=[@ANYBLOB="8510000004000000950000000000000018000000000000000000000000000000950000000000000085100000fcffffff95"], &(0x7f00000000c0)='GPL\x00'}, 0x80) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={0xffffffffffffffff, 0x18000000000002a0, 0xf7, 0x0, &(0x7f0000000100)="b9ff03076844268cb89e14f005dd1be0ffff00fe3a21632f77fbac14141de007031762079f4b4d2f87e5feca6aab845013f2325f1a3901050b038da1880b25181aa59d943be3f4aed50ea5a6b8686731cb89ef77123c899b699eeaa8eaa0073461119663906400f30c0600000000000059b6d3296e8ca31bce1d8392078b72f24996ae17dffc2e43c8174b54b620636894aaacf28ff62616363c70a440aec4014caf28c0adc043084617d7ecf41e9d134589d46e5dfc4ca5780d38cae870b9a1df48b238190da450296b0ac01496ace23eefc9d4246dd14afbf79a2283a0bb7e1d235f3df126c3acc240d75a058f6efa6d1f5f7ff40000", 0x0, 0x8, 0x60000000}, 0x50) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8924, &(0x7f0000000440)={'veth1\x00', @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}}) write$cgroup_freezer_state(r4, &(0x7f0000000040)='THAWED\x00', 0x7) bpf$LINK_GET_NEXT_ID(0x1f, &(0x7f0000000040)={0x8000, 0x0}, 0x8) bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f00000000c0)=r6, 0x4) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff}) recvmsg$unix(r7, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r8, &(0x7f00000002c0)=ANY=[@ANYBLOB="8fedcb7910009875f37538e486dd6317ce8102032900fefd000e40000200875a65969ff57b00000000000000000000000000ac1414aa"], 0xfdef) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000400)={r1, 0x58, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) ioctl$TUNSETIFINDEX(r8, 0x400454da, &(0x7f0000000580)=r9) 2.386309566s ago: executing program 3 (id=1946): bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[], 0x48) bpf$PROG_LOAD(0x5, 0x0, 0x0) (async) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x2, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) (async) bpf$MAP_CREATE(0x0, 0x0, 0x0) openat$cgroup_procs(0xffffffffffffffff, 0x0, 0x2, 0x0) (async) openat$cgroup_procs(0xffffffffffffffff, 0x0, 0x2, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x420, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1, 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x50) (async) r0 = bpf$MAP_CREATE(0x0, 0x0, 0x50) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="07000000040000000800000001"], 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x8, &(0x7f0000000740)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r1, @ANYBLOB="0000000000000000b703000000030000850000001b000000b70000000000000095"], &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f0000000080)='sched_switch\x00', r2}, 0x18) bpf$MAP_CREATE(0x300000000000000, 0x0, 0x48) (async) bpf$MAP_CREATE(0x300000000000000, 0x0, 0x48) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000480)={&(0x7f00000004c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x2}}, &(0x7f00000003c0)=""/147, 0x1a, 0x93, 0x1, 0x400}, 0x28) bpf$MAP_CREATE_TAIL_CALL(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback=0x2d, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r2, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback=0x2d, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r2, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000200)=@generic={&(0x7f00000001c0)='./file0\x00'}, 0x18) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002c80)={0x3, 0xc, &(0x7f0000000140)=ANY=[@ANYBLOB="180200000000000000000000000000008500000011000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000009e0000009500000000000000"], &(0x7f0000000080)='GPL\x00'}, 0x65) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000002c0)={r3, 0x0, 0xe, 0x0, &(0x7f0000000100)="e0b9547ed387dbe9abc89b6f5bec", 0x0, 0xa5bc, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) getpid() (async) getpid() bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r4 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x34120, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1b, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c}, 0x94) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1b, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18020000000000000000"], 0x0}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000200)={{r5, 0xffffffffffffffff}, &(0x7f0000000180), &(0x7f00000001c0)=r4}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r7}, 0x10) socketpair(0xf, 0x3, 0x2, &(0x7f00000001c0)) r8 = bpf$MAP_CREATE(0x0, &(0x7f0000000340)=ANY=[@ANYRES64=r0, @ANYRESDEC=r6], 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r8, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000002000000b704000000000000850000004300000095", @ANYRES64=r8], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x94) 2.080593719s ago: executing program 3 (id=1947): perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x50) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="0a00000004000000ff0f000006"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000180)={{r0}, &(0x7f0000000000), &(0x7f0000000080)=r1}, 0x20) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000008c0)={0x6, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @xdp, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r3, &(0x7f0000001b00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001d80)=ANY=[@ANYBLOB], 0x128}, 0x0) recvmsg$unix(r2, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0), 0x100}, 0x0) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0a00000004000000ff0f000007"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x15, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb7030000080000002d01000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x3, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000400)={{r4}, &(0x7f0000000040), &(0x7f00000003c0)}, 0x20) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x23, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={&(0x7f0000000180)='workqueue_activate_work\x00', r5}, 0x10) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000300)={0xffffffffffffffff}) setsockopt$sock_attach_bpf(r6, 0x1, 0x1d, &(0x7f00000001c0), 0x4) 1.233144076s ago: executing program 3 (id=1948): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="0a00000004000000ff0f000006"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000008c0)={0x6, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @xdp, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={&(0x7f0000000180)='workqueue_activate_work\x00', r1}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0a00000004000000ff0f000007"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x15, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb7030000080000002d01000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x3, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x23, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={&(0x7f0000000180)='workqueue_activate_work\x00', r2}, 0x10) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000300)={0xffffffffffffffff}) setsockopt$sock_attach_bpf(r3, 0x1, 0x1d, &(0x7f00000001c0), 0x4) 1.170344319s ago: executing program 3 (id=1949): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0b00000007000000810900000400000005000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="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"], 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r0}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0xfffffffa}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000340)={&(0x7f0000000300)='sched_switch\x00', r1}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) r2 = bpf$MAP_CREATE(0x2000000000000000, &(0x7f0000000140)=@base={0x6, 0x4, 0x6, 0x603}, 0x50) bpf$MAP_CREATE(0x0, 0x0, 0x48) close(0xffffffffffffffff) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x4, 0xffffffffffffffff, 0x2) r3 = bpf$PROG_LOAD(0x5, 0x0, 0x0) close(r3) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0xf, 0x4, 0x4, 0x12}, 0x48) r7 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000340)={0xe, 0x4, &(0x7f0000000400)=ANY=[@ANYBLOB="18020000801000000000000004000000850000002700000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x40f00}, 0x80) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r6, r7, 0x5}, 0x10) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000740)={{r6}, &(0x7f00000006c0), &(0x7f0000000700)=r5}, 0x20) sendmsg$inet(r4, &(0x7f0000000980)={0x0, 0x6000, &(0x7f0000000900)=[{&(0x7f0000000640)='U', 0xa00120}], 0x1}, 0x3) r8 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, 0x0, &(0x7f0000003ff6)='GPL\x00', 0x4, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @sk_skb, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x94) r9 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=ANY=[@ANYBLOB="0f0000000400dfff030000001200000000000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) bpf$BPF_PROG_DETACH(0x8, &(0x7f00000019c0)=ANY=[@ANYRES32=r9, @ANYRES32=r8], 0x10) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000000c0)={{r9}, &(0x7f0000000000), &(0x7f0000000080)=r3}, 0x20) r10 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000380)={0x11, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="1801000000000000000000000000ea04850000005000000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000040)='sched_switch\x00', r10}, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x201, 0x20, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x7}, 0x440, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_LOOKUP_BATCH(0x18, &(0x7f00000003c0)={0x0, 0x0, &(0x7f00000002c0), &(0x7f0000000100), 0x200df000, r2, 0x0, 0x800000000}, 0x38) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) 818.329044ms ago: executing program 4 (id=1950): socketpair$unix(0x1, 0x2, 0x0, 0x0) sendmsg$unix(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, 0x0}, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$sock(r0, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000400)="be", 0x1}], 0x1}, 0x800) (async) sendmsg$sock(r0, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000400)="be", 0x1}], 0x1}, 0x800) r1 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) (async) r2 = bpf$PROG_LOAD(0x5, 0x0, 0x0) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0xfdef) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x10020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) r3 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x10020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000380)={0xffffffffffffffff, 0x20, &(0x7f0000000340)={&(0x7f0000000280)=""/158, 0x9e, 0x0, &(0x7f0000000040)=""/70, 0x46}}, 0x10) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000780)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0ff0100000079a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b70000000000000095000000000000005ecefab8f2e85c6c1ca711fcd0cdfa146ec56147d66527da307bf731fef97861750379585e5a076d839240d29c034055b67dafe6c8dc3d5d78c07fa1f7e655ce34e4d5b3185fec0e07004e60c08dc8b8dbf11e6e94d75938321a3aa502cd2424a6736d2ef831ab7ea0c34f17e3946ef3bb622003b538dfd8e012e79578e51bc53099e90f4580d760551b5b341a29f31e3106d1ddd6152f7cbdb9bd38bdb2209c67deca8eeb9c15ab3a14817ac61e4dd11183a13477bf7e860e9f65f1328d670490be8b59fdf00fd48164be3e1fc123992cbe7bc04b82d2789cb132b8667c2147661df28d9961b63e1a9cf6c2a660a1fe3c184b751c51160fb20b1c581e7be6ba0dc001c4110555850915148ba532e6ea09c346dfebd38608b3280080005d9a9500000000000000334d83239dd27080851dcac3c12233f9a1fb9c2aec61ce63a38d2fd50117b89a9ab359b4eea0c6e95767d42b4e54861d0227dbfd2e6d7f715a7f3deadd7130856f756436303767d2e24f29e5dad9796edb697aeea0182babd18cac1bd4f4390af9a9ceafd0002cab154ad029a1090000002780870014f51c3c975d5aec84222fff0d7216fdb0d3a0ec4be3e563112f0b39501aafe234870072858dc06e7c337642d3e5a815232f5e16c1b30c3a6a71bc85018e5ff2c91018afc9ffc2cc788bee1b47683db01a469398685211dfbbae3e2ed0a50e7313bff5d4c391ddece00fc772dd6b4d4de2a41990f05ca3bdfc92c88c5b8dcd36e7487afa447c2edfae4f390a8337841cef386e22cc22ee17476d738952229682e24b92533ac2a9f5a699593f084419cae0b4532bcc97d3ae486aca54183fb01c73f979ca9857399537f5dc2acb72e7ead0509d380578673f8b6e74ce23877a6b24db0e067345560942fa629fbef2461c96a088a22e8b15c3e233db7ab22e30d46a9d24d37cef099ece729aa218f9f44a3210223fdae7ed04935c3c90d3add8eebc86ccbe1194eac69e19d73415cda2130f501150adab988dd8e12baf5cc9978fff00404d5d99f82e20ee6a8c88e18c2977aab37d9ac4cfc1c7b400000000000007ff57c39495c826b956ba859ac8e3c177b91bd7d5e41ff868f7ca1664fe2f3ced846891180604b6dd2499d16d7d9158ffffffff00000000ef069dc42749a89f854797f29d0000002d8c38a967c1bbe09315c29877a331bcc87dc3addb08141bdee5d27874b2f663ddeef0005b3d96c7aabf4df517d90bdc01e73835d5a3e1a90800c66ee2b1ad76dff9f9000071414c99d4894ee7f8249dc1e3428d2129369ee1b85af6eb2eea0d0df414b31592479ecf2392191fa83ee830548f11e1036a8debd64cbe359454a3f2239cfe35f81b7a490f167e6d5c1109000000000000000042b8ff8c21ad702ccacad5b39eef213d1ca296d2a27798c8ce2a305c0c7d35cf4b22549a4bd92052188bd1f285f653b621491dc6aaee0200e2ff08644fb94c06006eff1be2f633c1d987591ec3db58a7bb3042ec1f771f7a1338a5c3dd35e926049fe86e09c58e273cd905deb28c13c1ed1c0d9c2e846bcbfa8cce7b893e578af7dc7d5e87d44ff828de453f34c2b18660b080efc707e676e1fb4d5825c0ca177a4c7fbb4e62b445c00f576b2b5cc7f819abd0f885cc4806f40300966fcf1e54f5a2d38708194cd6f496e5dee734fe7da3770845cf442d488afdc0e170000000000000000000000000000000000000000000000000943f5205000000dc1c56d59f35d367632952a93466ae595c6a8cda690d192a070886df42b27098773b45198b4a34ac977ebd4450e121d01342703f5bf030e935878a6d169c80aa4252d4ea6b8f6216ff202b5b5a182cb5e838b307632d03a7ca6f6d0339f9953c3093c3690d10ecb65dc5b47481edbf1f000000000000004d16d29c28eb5167e9936ed327fb237a56224e49d9ea955a5f0dec1b3ccd35364600000000000000000000000000000000000000000000000000000000000026ded4dd6fe1518cc7802043ecfe69f743f1213bf8179ecd9e5a225d67521dc728eac7d80a5656ac2cbde21d3ebfbf69ff861f4394836ddf128d6d19079e64336e7c676505c78ad67548f4b192be1827fcd95cf107753cb0a6a979d3db0c407081c6281e2d8429a863903ca75f4c7df3ea8fc2018d07af1491ef060cd4403a099f32468f65bd06b4082d43e121861b5cc03f1a1561f0589e0d12969bc982ff5d8e9b986c0c6c747d9a1cc500bb892c3a16ff10feea20bdac0000000000000000ca06f256c8028e0f9b65f037b21f3289f86a6826c69fa35ba5cbc3f2db1516ffc5c6e3fa618b24a6ce16d6c7010bb37b61fa0a2d8974e69115d33394e86e4b838297ba20f96936b7e4746e92dea6c5d1d33d84d96b50fb000000ae07c65b71088dd7d5d1e1bab9000000000000000000000000b5ace293bec859c13e3229432ad71d646218b5229dd88137fc7c59aa242af3bb4efb82055a3b61227ad40f52c9f2500579aca11033ec14bb9cc16bd83a00840e31d828ec78e116ae46c4897e2795b6ff92e9a1e24b0b855c02f2b7add58ffb2594c65681c47ab56c7efbd37a54244130f339297729a7a51810134d3dfbf71f6516737be55c06d9cdcfb1e2bb10b50000eb4acff90756dba1ecf9f58afd3c19b5c4558ba9af6b7333c894a1fb29ade9ad75c9c022e8d03fe28bc358684492aa771dbfe80745fe89ad349ffaad76ff9dd643796caffdf67af5dd476c37e7e9a84e2e5da2696e285a59b53f2fb0e16d8262c080c159ce40c14089c82759106f422582b42e3e8484ea5a6ad9aa52106eafe0e0caea1ad4cb23f3c2b8a0f455ba69ea284c268d54b43158a8b1d128d02af263b3dc1cab794c9ac57a2a7332f4d8764c302ccd5aac114482b619fc575aa0dd2777e881e29a854380e2f1e49db5a1517ec40bb3fa44f9959bad67ccaba76408da35c9f1534c8bd48bbd61627a2e0a74b5e6aefb7eee403502734137ff47257f164391c673b6071b6ad0f05eed164ca63e4ea26dce0f00"/2274], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r6, 0x18000000000002a0, 0x5b8, 0x0, &(0x7f0000000100)="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", 0x0, 0x8, 0x60000000}, 0x1e) bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYRES16=r4, @ANYRES32=r4, @ANYRESDEC=r2], 0x0, 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r5, r1, 0x0, 0x0, 0x0, 0x0, 0xe8c}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000200)={{r4}, &(0x7f0000000180), &(0x7f00000001c0)=r3}, 0x20) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001c80)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18020000000000000000"], 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000140)='sched_switch\x00', r7}, 0x10) socketpair(0x18, 0x0, 0x2, 0x0) (async) socketpair(0x18, 0x0, 0x2, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x3f, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) sendmsg$tipc(0xffffffffffffffff, 0x0, 0x0) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r8, 0x8912, &(0x7f0000000080)) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="09000000060000000800000001"], 0x48) (async) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="09000000060000000800000001"], 0x48) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f00000005c0)='sys_enter\x00'}, 0x76) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f00000005c0)='sys_enter\x00'}, 0x76) syz_clone(0x11, 0x0, 0x0, 0x0, 0x0, 0x0) (async) syz_clone(0x11, 0x0, 0x0, 0x0, 0x0, 0x0) 548.546806ms ago: executing program 4 (id=1951): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1b, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c}, 0x94) syz_clone(0x640c7000, 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 82) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={&(0x7f0000000180)='workqueue_activate_work\x00', r1}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000003"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x6, 0x4, 0xfff, 0x7}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000a40)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={&(0x7f0000000180)='workqueue_activate_work\x00', r3}, 0x10) 463.44845ms ago: executing program 1 (id=1952): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x11, 0xc, 0x0, &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_CREATE(0x0, &(0x7f0000001d00)=ANY=[@ANYBLOB="0b00000005000000050000000900000001"], 0x48) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000540)=ANY=[@ANYBLOB="1b00000000000000000000000080000000000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="000000000000000000000000000000000000000000000000000000001dccaaaaca9365c335383499c139ad9ef44c45d3d8a4df012905ac086855e113c15894454b2d8a584a3d9904a65a0b508ab16312eeec2763f350737560a49bd4ae48afaf65b0885320"], 0x48) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f00000006c0)='sched_switch\x00'}, 0x10) r1 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x10020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000640)={&(0x7f0000000480)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2, [@int={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x7}]}}, &(0x7f0000000580)=""/161, 0x2a, 0xa1, 0x5}, 0x20) bpf$MAP_DELETE_BATCH(0x1b, &(0x7f0000000400)={&(0x7f0000000300)="2719a67e7ed2105d4a6f7d976cb5fae26aff34bfac331543059cf4ab15444ce7aaeda1458f442a8f194907f6559a571d404dafb0e0bb64dba8e02403189a48a861a787d622f6d14f79c383c051746c972db9e451a60a3dfb6c09ba5e1a012c1cc96869ce4fdb430b5c432c9f5fb72c4ce9eb1658245d8cdd451dca31b2d209de83edb1b7408c822b088d8976e2bedf31751f929bfc479472af4580a9b1dfba51cfdd8d1787a96b96113e6ad32188f4cf2b8142262fcb8c8de698b0af8017e2a6f9c4", &(0x7f0000000180)=""/9, &(0x7f0000000280)="55e288a83376719bb60c44dffd152006bfbe0b4262c9e1b5937423d0e763620cc285c47d7c2928fcaf13ff922c14d65efa4e4ecd8ec20292d02b94c0d3", &(0x7f0000000840)="fc37f57a2bf8c8de6ffc87d2428a5a2c9a1e6e55bafbf813a0f3e47e0f2e3d4afd97a9f22164cf4e95e1c7f38cc16835f61fc090e03c5709514205b79254a3010e541f927d0037bd44bef4def8cb5fa915970d2a42f807b2b81852cad098405a55625e83da0de18c11a728fa1c81d11acecd024677cff60fd65a40624ea817a887c8d06842cb95608d5d87943c4009989f197c271dd49b517fbdbee82f62bacc16de83042a1bb05228f657da82c02166cc29cad76426dc", 0x71a2, 0x1}, 0x38) openat$cgroup_devices(0xffffffffffffffff, 0x0, 0x2, 0x0) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000040)) mkdir(&(0x7f0000000000)='./cgroup/../file0\x00', 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r3 = openat$cgroup_ro(r2, &(0x7f0000000200)='pids.current\x00', 0x275a, 0x0) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0200000004000000020000000c"], 0x48) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xd, &(0x7f0000000040)=ANY=[@ANYBLOB="180100001700000000000000ff000000850000006d00000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000000002007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008002010b704000000000000850000000100000095"], &(0x7f00000001c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1c, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={&(0x7f0000000180)='kfree\x00', r5}, 0x10) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$unix(r6, &(0x7f00000006c0)={0x0, 0x0, 0x0}, 0x0) socketpair(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$MAP_CREATE(0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000004000000000000000000000001"], 0x48) openat$cgroup_ro(r3, &(0x7f00000004c0)='blkio.bfq.io_service_time\x00', 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000500)={r0, 0x58, &(0x7f0000000a00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r9 = bpf$PROG_LOAD(0x5, &(0x7f0000000900)={0x4, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', r8, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r9}, 0x10) socketpair(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000001c0)={0x0, r1, 0x0, 0x0, 0x0}, 0x30) ioctl$PERF_EVENT_IOC_SET_FILTER(r10, 0x89a0, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_SET_FILTER(r7, 0x89a1, &(0x7f0000000080)) 156.397473ms ago: executing program 3 (id=1953): perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x10020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x100}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=ANY=[], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b7030000000000f7850000002d00000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) sendmsg$tipc(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000180)=@name={0x1e, 0x2, 0x2, {{0x41, 0x3}, 0x1}}, 0x10, 0x0, 0x0, 0x0, 0x0, 0x22000094}, 0x24000000) bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8983, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16, 0x0, 0x4, 0x1, 0x0, 0x1}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000002000000b704000000000000850000005700000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x8, 0x6, &(0x7f0000000000)=@framed={{0xffffffb4, 0x8, 0x0, 0x0, 0x0, 0x73, 0x11, 0x39}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @call={0xb7}, @exit={0x95, 0x0, 0xc2}], {0x95, 0x0, 0x1200}}, &(0x7f0000000080)='GPL\x00', 0x4, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @cgroup_skb}, 0x70) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xa, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={r1, 0x2000000, 0xe, 0x0, &(0x7f0000000200)="63eced8e46dc3f0adf33c9f7b986", 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) perf_event_open(&(0x7f0000000380)={0x4, 0x80, 0x0, 0x0, 0x4a, 0x2, 0x0, 0x0, 0x800, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0, 0x2}, 0x802, 0xca, 0x7, 0x0, 0x2, 0xffffffff, 0x7, 0x0, 0x9, 0x0, 0x1}, 0x0, 0x1, 0xffffffffffffffff, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000b40)='neigh_create\x00', r2}, 0x10) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='blkio.bfq.io_service_time_recursive\x00', 0x0, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2f, r3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000b40)='neigh_create\x00', r4}, 0x10) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, &(0x7f00000000c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x28, 0x0, 0x7, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x8, 0x80}, 0x103100, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x7}) close(r6) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="8fedcb7907001175f37538e486dd6317ce22000000fffe80000000000000101000007f0c08000000000000000071273fa7b49301641184a907c5"], 0xfdef) recvmsg$unix(r5, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0xffffffffffffffae}, 0x0) write$cgroup_subtree(r7, &(0x7f0000000000)=ANY=[], 0xfdef) bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d0000001801000020696c2500000000142020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000e02800850000007000000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x18, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r8 = perf_event_open(&(0x7f0000000fc0)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x400, 0xf6103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x24000000, 0x0, @perf_bp={0x0, 0x8}, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) r9 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r8, 0x40042408, r9) bpf$ENABLE_STATS(0x20, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) 50.527347ms ago: executing program 3 (id=1954): perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) (async) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0xfc, 0xfc, 0x0, 0x0, 0x0, 0x8000000000000000, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x0, 0x6}, 0x6310, 0x0, 0xff7ffffa, 0x0, 0x4000, 0xc, 0x4, 0x0, 0x0, 0x0, 0xc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x50) (async) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x50) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={0x0}, 0x18) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={0x0}, 0x18) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000009c0)={r1, 0xe0, &(0x7f00000008c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000000040)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x4, 0x3, &(0x7f0000000380)=[0x0, 0x0, 0x0, 0x0], &(0x7f00000003c0)=[0x0, 0x0, 0x0], 0x0, 0x21, &(0x7f0000000400)=[{}, {}, {}, {}, {}, {}], 0x30, 0x10, &(0x7f0000000440), &(0x7f0000000480), 0x8, 0x9d, 0x8, 0x8, &(0x7f0000000880)}}, 0x10) bpf$TOKEN_CREATE(0x24, &(0x7f0000000a00)={0x0, r0}, 0x8) (async) bpf$TOKEN_CREATE(0x24, &(0x7f0000000a00)={0x0, r0}, 0x8) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', r2}, 0x94) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x1d, 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x48) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) (async) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000540)={0x11, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, 0x0, 0x8080) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffff1971a4f0ff00000000b7060000080000001e6400000000000045040400010000002004000001000a00b7040000000100006a0af2fe00000000850000001a000000b7000000000000009500000000000000455781a5feee5e1ce784909b849d5550adf200000000000000b61d69f2ffdaa10350e11cb97c8ad51bcda0c4ee6d9674c77404ceb9971e43405d621ffbc9a4fd39b0631f6dde53a9a53608c10556e5734eb84049761471ce540c772e2d9f8004e26f7fcc059c062234d5595f6dba87b81d0806fb0289ce67a66afd9ac3d09e29a9d542ca9d85a5c9c88474895d679838def0a83a733dc6a39b63a5ed69d32394c53361d7480884bd8048a967d9b912ef9f1dcc4ff8546fee53f5b2e7b91c61ced1ebad000000000000e8122a793c080a882add4e1179bd4a44f231b6d753a7be428ba953df4aece69311687f4122073a236c3ad198e3f3a532efa04137d452ff47d2638da3261c8362bb7c7824be6195a66d2e17e122040e11e3bd4a69fc6e8d9f7043e09b9e10dc7777bfae5884e4ba1e9cc4a2bbe99e30816127f46a1aae33d4d63d716c0975e1ce4a655362e7062ff6ab3934555c0184021b829472adefa06d3482c7b2711b98eabdca89b77efd13e6dba4a431ce47910000118093b6cabaa17a57727474e1785ee234835088445aa4a9b677d3d342640e328504aea02a2d727e62b7f097a02dbf8fe1d704765de7482040b2fc3000000000000000008947baeaaf954aff687deaa2f80492461d273ee26d8115cbca081a14cba24788779291745083fccdddc90d7af35c528df8000000d8d79c79ddca066da478c197d4a550470557bc99cca336bd88cd28a5ee651627e3a6fbf6ea53b95ddb64c69c7d8d2f4baddc239828760459564124bad68209d2a1d16ad085886c017679cfcda8b1e152ac1e2bcc5ede5b5687aa418abfa29acd7339e73b2cd185c9eb5fb34fccd20ffa155b16c0c309ed6f6663677df37de0ec0d0f548b273940be5d1fe0bae14d1a76bf741330dacd9cc19c0163bcc93059e8d2d1bfa928e2ba458ecd989cb3581a3f270ad48255ac0dad4923e3e36629589ff6b0ceb3438e4b432dd454c04be2d538aaf60c9f7a7281d32142f2fdbc3d37e5a072b5d7f0a349f1a75f01b5c203d4bdde6ff12de9a37f7fb9a16059ad97e2edefb5e0b0326bd25f6fd1d108efa9d30a9883815654486fe42cf2f676cdbb91f7582ab314be"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000340), 0xfffffffffffffe19}, 0x42) (async) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000340), 0xfffffffffffffe19}, 0x42) 0s ago: executing program 2 (id=1955): r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000001480)={'syzkaller0\x00', 0x7101}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r1, 0x8914, &(0x7f0000002280)={'syzkaller0\x00', @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}}) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x18, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000001000000b703000000000000850000002d00000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='kmem_cache_free\x00', r2}, 0x10) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x1c1341, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f00000000c0)={'syzkaller0\x00', 0x84aebfbd6349b7f2}) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={0xffffffffffffffff, 0x2e0, 0xe, 0x0, &(0x7f0000000100)="b9ff03076044238cb89e0cf086dd", 0x0, 0xfe, 0x60000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x50) close(r4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000029c0)) ioctl$SIOCSIFHWADDR(r4, 0x8914, &(0x7f0000002280)={'syzkaller0\x00', @link_local}) write$cgroup_subtree(r3, &(0x7f0000000100)=ANY=[], 0x30) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="0700000004000000080000000100000000000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00s'], 0x48) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x8, &(0x7f0000000740)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r5, @ANYBLOB="0000000000000000b703000000e00000850000001b000000b700000000fa000095"], &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000001580)={&(0x7f0000000180)='kmem_cache_free\x00', r6}, 0x18) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r7 = bpf$MAP_CREATE(0x0, &(0x7f0000000500)=ANY=[@ANYBLOB="0a000000050000000200000007"], 0x48) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000780)={0x0, 0x0, &(0x7f0000000640), &(0x7f0000000740), 0x75, r7}, 0x38) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000900000018110000", @ANYRES32=r7, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x8, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000500)='percpu_free_percpu\x00', r8}, 0x10) bpf$MAP_CREATE(0x2000000000000000, &(0x7f0000000140)=ANY=[@ANYBLOB="0600000004000000ff0100005c00000000000000", @ANYRES32, @ANYBLOB="0000000000000000000000000000170000000000", @ANYRES32=0x0, @ANYRES32, @ANYBLOB="00000000feffffff000000000000000000"], 0x48) close(0x3) kernel console output (not intermixed with test programs): 00 audit(1763680844.322:160): avc: denied { create } for pid=4934 comm="syz.0.1381" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 126.108090][ T4974] device macsec0 left promiscuous mode [ 126.116872][ T4978] FAULT_INJECTION: forcing a failure. [ 126.116872][ T4978] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 126.161199][ T4978] CPU: 0 PID: 4978 Comm: syz.0.1393 Tainted: G W syzkaller #0 [ 126.170023][ T4978] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 126.180189][ T4978] Call Trace: [ 126.183484][ T4978] [ 126.186428][ T4978] __dump_stack+0x21/0x30 [ 126.190866][ T4978] dump_stack_lvl+0xee/0x150 [ 126.195474][ T4978] ? show_regs_print_info+0x20/0x20 [ 126.201141][ T4978] ? prep_new_page+0x1c/0x110 [ 126.205920][ T4978] dump_stack+0x15/0x20 [ 126.210093][ T4978] should_fail+0x3c1/0x510 [ 126.214529][ T4978] should_fail_alloc_page+0x55/0x80 [ 126.219742][ T4978] prepare_alloc_pages+0x156/0x600 [ 126.224870][ T4978] ? __alloc_pages_bulk+0xab0/0xab0 [ 126.230086][ T4978] ? __alloc_pages+0x440/0x440 [ 126.234869][ T4978] __alloc_pages+0x10a/0x440 [ 126.239482][ T4978] ? prep_new_page+0x110/0x110 [ 126.244255][ T4978] ? __kasan_check_write+0x14/0x20 [ 126.249366][ T4978] ? _raw_spin_lock+0x8e/0xe0 [ 126.254128][ T4978] pte_alloc_one+0x70/0x180 [ 126.258634][ T4978] ? pfn_modify_allowed+0x2f0/0x2f0 [ 126.263923][ T4978] ? __mod_lruvec_page_state+0x15d/0x1c0 [ 126.269555][ T4978] ? _raw_spin_unlock+0x4d/0x70 [ 126.274405][ T4978] ? __pmd_alloc+0x3ef/0x4a0 [ 126.279252][ T4978] ? __kasan_check_write+0x14/0x20 [ 126.284358][ T4978] __pte_alloc+0x75/0x290 [ 126.288680][ T4978] ? __pud_alloc+0x1a0/0x1a0 [ 126.293353][ T4978] ? __kasan_slab_alloc+0xcf/0xf0 [ 126.298369][ T4978] ? free_pgtables+0x280/0x280 [ 126.303125][ T4978] ? _raw_spin_unlock+0x4d/0x70 [ 126.307974][ T4978] copy_page_range+0x2348/0x2890 [ 126.312910][ T4978] ? pfn_valid+0x1d0/0x1d0 [ 126.317326][ T4978] copy_mm+0xbe2/0x13a0 [ 126.321477][ T4978] ? copy_signal+0x600/0x600 [ 126.326058][ T4978] ? __init_rwsem+0xfc/0x1d0 [ 126.330646][ T4978] ? copy_signal+0x4cb/0x600 [ 126.335228][ T4978] copy_process+0x115c/0x3210 [ 126.339906][ T4978] ? __kasan_check_write+0x14/0x20 [ 126.345017][ T4978] ? __pidfd_prepare+0x150/0x150 [ 126.350062][ T4978] ? security_file_permission+0x83/0xa0 [ 126.355608][ T4978] kernel_clone+0x23f/0x940 [ 126.360108][ T4978] ? create_io_thread+0x130/0x130 [ 126.365134][ T4978] ? __kasan_check_write+0x14/0x20 [ 126.370241][ T4978] ? mutex_unlock+0x89/0x220 [ 126.374831][ T4978] __x64_sys_clone+0x176/0x1d0 [ 126.379597][ T4978] ? __kasan_check_write+0x14/0x20 [ 126.384704][ T4978] ? __ia32_sys_vfork+0xf0/0xf0 [ 126.389568][ T4978] ? fpregs_assert_state_consistent+0xb1/0xe0 [ 126.395676][ T4978] x64_sys_call+0x41f/0x9a0 [ 126.400176][ T4978] do_syscall_64+0x4c/0xa0 [ 126.404588][ T4978] ? clear_bhb_loop+0x50/0xa0 [ 126.409257][ T4978] ? clear_bhb_loop+0x50/0xa0 [ 126.413932][ T4978] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 126.419827][ T4978] RIP: 0033:0x7fb65282f749 [ 126.424266][ T4978] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 126.443975][ T4978] RSP: 002b:00007fb651296fe8 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 126.452401][ T4978] RAX: ffffffffffffffda RBX: 00007fb652a85fa0 RCX: 00007fb65282f749 [ 126.460371][ T4978] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00000000640c7000 [ 126.468449][ T4978] RBP: 00007fb651297090 R08: 0000000000000000 R09: 0000000000000000 [ 126.476418][ T4978] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000002 [ 126.484382][ T4978] R13: 00007fb652a86038 R14: 00007fb652a85fa0 R15: 00007ffcc21d8aa8 [ 126.492361][ T4978] [ 127.220728][ T5016] FAULT_INJECTION: forcing a failure. [ 127.220728][ T5016] name failslab, interval 1, probability 0, space 0, times 0 [ 127.262685][ T5016] CPU: 1 PID: 5016 Comm: syz.4.1405 Tainted: G W syzkaller #0 [ 127.271496][ T5016] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 127.281566][ T5016] Call Trace: [ 127.284952][ T5016] [ 127.287889][ T5016] __dump_stack+0x21/0x30 [ 127.292237][ T5016] dump_stack_lvl+0xee/0x150 [ 127.296926][ T5016] ? show_regs_print_info+0x20/0x20 [ 127.302142][ T5016] dump_stack+0x15/0x20 [ 127.306421][ T5016] should_fail+0x3c1/0x510 [ 127.310853][ T5016] __should_failslab+0xa4/0xe0 [ 127.315630][ T5016] should_failslab+0x9/0x20 [ 127.320146][ T5016] slab_pre_alloc_hook+0x3b/0xe0 [ 127.325115][ T5016] ? vm_area_dup+0x26/0x210 [ 127.329714][ T5016] kmem_cache_alloc+0x44/0x260 [ 127.334491][ T5016] vm_area_dup+0x26/0x210 [ 127.338855][ T5016] copy_mm+0x93a/0x13a0 [ 127.343019][ T5016] ? copy_signal+0x600/0x600 [ 127.347717][ T5016] ? __init_rwsem+0xfc/0x1d0 [ 127.352333][ T5016] ? copy_signal+0x4cb/0x600 [ 127.357032][ T5016] copy_process+0x115c/0x3210 [ 127.361760][ T5016] ? __kasan_check_write+0x14/0x20 [ 127.366967][ T5016] ? __pidfd_prepare+0x150/0x150 [ 127.371904][ T5016] ? security_file_permission+0x83/0xa0 [ 127.377450][ T5016] kernel_clone+0x23f/0x940 [ 127.381951][ T5016] ? create_io_thread+0x130/0x130 [ 127.386975][ T5016] ? __kasan_check_write+0x14/0x20 [ 127.392084][ T5016] ? mutex_unlock+0x89/0x220 [ 127.396686][ T5016] __x64_sys_clone+0x176/0x1d0 [ 127.401535][ T5016] ? __kasan_check_write+0x14/0x20 [ 127.406682][ T5016] ? __ia32_sys_vfork+0xf0/0xf0 [ 127.411530][ T5016] ? fpregs_assert_state_consistent+0xb1/0xe0 [ 127.417614][ T5016] x64_sys_call+0x41f/0x9a0 [ 127.422117][ T5016] do_syscall_64+0x4c/0xa0 [ 127.426535][ T5016] ? clear_bhb_loop+0x50/0xa0 [ 127.431205][ T5016] ? clear_bhb_loop+0x50/0xa0 [ 127.436001][ T5016] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 127.441899][ T5016] RIP: 0033:0x7fafd04c0749 [ 127.446313][ T5016] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 127.466175][ T5016] RSP: 002b:00007fafcef27fe8 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 127.474584][ T5016] RAX: ffffffffffffffda RBX: 00007fafd0716fa0 RCX: 00007fafd04c0749 [ 127.482655][ T5016] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00000000640c7000 [ 127.490708][ T5016] RBP: 00007fafcef28090 R08: 0000000000000000 R09: 0000000000000000 [ 127.498764][ T5016] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000002 [ 127.506849][ T5016] R13: 00007fafd0717038 R14: 00007fafd0716fa0 R15: 00007ffde0606de8 [ 127.514821][ T5016] [ 127.556770][ T5034] device sit0 entered promiscuous mode [ 127.630588][ T30] audit: type=1400 audit(1763680846.192:161): avc: denied { create } for pid=5033 comm="syz.2.1411" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=atmpvc_socket permissive=1 [ 127.720746][ T5045] device syzkaller0 entered promiscuous mode [ 127.966303][ T5071] FAULT_INJECTION: forcing a failure. [ 127.966303][ T5071] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 127.985623][ T5071] CPU: 0 PID: 5071 Comm: syz.1.1423 Tainted: G W syzkaller #0 [ 127.994511][ T5071] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 128.004682][ T5071] Call Trace: [ 128.007972][ T5071] [ 128.010988][ T5071] __dump_stack+0x21/0x30 [ 128.015328][ T5071] dump_stack_lvl+0xee/0x150 [ 128.019920][ T5071] ? show_regs_print_info+0x20/0x20 [ 128.025116][ T5071] ? prep_new_page+0x1c/0x110 [ 128.029796][ T5071] dump_stack+0x15/0x20 [ 128.033952][ T5071] should_fail+0x3c1/0x510 [ 128.038364][ T5071] should_fail_alloc_page+0x55/0x80 [ 128.043558][ T5071] prepare_alloc_pages+0x156/0x600 [ 128.048757][ T5071] ? __alloc_pages_bulk+0xab0/0xab0 [ 128.053954][ T5071] __alloc_pages+0x10a/0x440 [ 128.058546][ T5071] ? prep_new_page+0x110/0x110 [ 128.063307][ T5071] ? unwind_get_return_address+0x4d/0x90 [ 128.068937][ T5071] ? stack_trace_save+0xe0/0xe0 [ 128.074007][ T5071] ? arch_stack_walk+0xee/0x140 [ 128.078870][ T5071] pte_alloc_one+0x70/0x180 [ 128.083407][ T5071] ? pfn_modify_allowed+0x2f0/0x2f0 [ 128.088615][ T5071] ? stack_trace_save+0x98/0xe0 [ 128.093488][ T5071] __pte_alloc+0x75/0x290 [ 128.097900][ T5071] ? __kasan_check_write+0x14/0x20 [ 128.103284][ T5071] ? _raw_spin_lock+0x8e/0xe0 [ 128.108153][ T5071] ? free_pgtables+0x280/0x280 [ 128.112914][ T5071] ? __kasan_check_write+0x14/0x20 [ 128.118031][ T5071] ? add_mm_rss_vec+0x209/0x220 [ 128.122876][ T5071] copy_page_range+0x2348/0x2890 [ 128.127819][ T5071] ? pfn_valid+0x1d0/0x1d0 [ 128.132534][ T5071] copy_mm+0xbe2/0x13a0 [ 128.136695][ T5071] ? copy_signal+0x600/0x600 [ 128.141278][ T5071] ? __init_rwsem+0xfc/0x1d0 [ 128.145864][ T5071] ? copy_signal+0x4cb/0x600 [ 128.150446][ T5071] copy_process+0x115c/0x3210 [ 128.155125][ T5071] ? __kasan_check_write+0x14/0x20 [ 128.160230][ T5071] ? __pidfd_prepare+0x150/0x150 [ 128.165168][ T5071] ? security_file_permission+0x83/0xa0 [ 128.170823][ T5071] kernel_clone+0x23f/0x940 [ 128.175328][ T5071] ? create_io_thread+0x130/0x130 [ 128.180347][ T5071] ? __kasan_check_write+0x14/0x20 [ 128.185453][ T5071] ? mutex_unlock+0x89/0x220 [ 128.190044][ T5071] __x64_sys_clone+0x176/0x1d0 [ 128.194835][ T5071] ? __kasan_check_write+0x14/0x20 [ 128.199941][ T5071] ? __ia32_sys_vfork+0xf0/0xf0 [ 128.204801][ T5071] ? fpregs_assert_state_consistent+0xb1/0xe0 [ 128.210865][ T5071] x64_sys_call+0x41f/0x9a0 [ 128.215370][ T5071] do_syscall_64+0x4c/0xa0 [ 128.219868][ T5071] ? clear_bhb_loop+0x50/0xa0 [ 128.224542][ T5071] ? clear_bhb_loop+0x50/0xa0 [ 128.229303][ T5071] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 128.235221][ T5071] RIP: 0033:0x7f7bd15e3749 [ 128.239644][ T5071] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 128.259510][ T5071] RSP: 002b:00007f7bd004afe8 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 128.267940][ T5071] RAX: ffffffffffffffda RBX: 00007f7bd1839fa0 RCX: 00007f7bd15e3749 [ 128.275921][ T5071] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00000000640c7000 [ 128.283982][ T5071] RBP: 00007f7bd004b090 R08: 0000000000000000 R09: 0000000000000000 [ 128.291953][ T5071] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000002 [ 128.299921][ T5071] R13: 00007f7bd183a038 R14: 00007f7bd1839fa0 R15: 00007ffdcefb39a8 [ 128.307899][ T5071] [ 128.636138][ T5089] device syzkaller0 entered promiscuous mode [ 129.110471][ T5124] FAULT_INJECTION: forcing a failure. [ 129.110471][ T5124] name failslab, interval 1, probability 0, space 0, times 0 [ 129.123676][ T5124] CPU: 1 PID: 5124 Comm: syz.4.1438 Tainted: G W syzkaller #0 [ 129.132462][ T5124] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 129.142537][ T5124] Call Trace: [ 129.145831][ T5124] [ 129.148775][ T5124] __dump_stack+0x21/0x30 [ 129.153126][ T5124] dump_stack_lvl+0xee/0x150 [ 129.157738][ T5124] ? show_regs_print_info+0x20/0x20 [ 129.162958][ T5124] dump_stack+0x15/0x20 [ 129.167135][ T5124] should_fail+0x3c1/0x510 [ 129.171568][ T5124] __should_failslab+0xa4/0xe0 [ 129.176404][ T5124] should_failslab+0x9/0x20 [ 129.180922][ T5124] slab_pre_alloc_hook+0x3b/0xe0 [ 129.185878][ T5124] ? vm_area_dup+0x26/0x210 [ 129.190494][ T5124] kmem_cache_alloc+0x44/0x260 [ 129.195630][ T5124] vm_area_dup+0x26/0x210 [ 129.199994][ T5124] copy_mm+0x93a/0x13a0 [ 129.204266][ T5124] ? copy_signal+0x600/0x600 [ 129.209140][ T5124] ? __init_rwsem+0xfc/0x1d0 [ 129.213937][ T5124] ? copy_signal+0x4cb/0x600 [ 129.218552][ T5124] copy_process+0x115c/0x3210 [ 129.223272][ T5124] ? __pidfd_prepare+0x150/0x150 [ 129.228327][ T5124] ? native_apic_msr_write+0x39/0x50 [ 129.233775][ T5124] ? x2apic_send_IPI_self+0x5e/0x70 [ 129.239013][ T5124] kernel_clone+0x23f/0x940 [ 129.243640][ T5124] ? irq_work_queue+0xc1/0x150 [ 129.248429][ T5124] ? create_io_thread+0x130/0x130 [ 129.253486][ T5124] ? __kasan_check_write+0x14/0x20 [ 129.258626][ T5124] ? mutex_unlock+0x89/0x220 [ 129.263259][ T5124] __x64_sys_clone+0x176/0x1d0 [ 129.268055][ T5124] ? __ia32_sys_vfork+0xf0/0xf0 [ 129.272946][ T5124] ? fpregs_assert_state_consistent+0xb1/0xe0 [ 129.279477][ T5124] x64_sys_call+0x41f/0x9a0 [ 129.284012][ T5124] do_syscall_64+0x4c/0xa0 [ 129.288444][ T5124] ? clear_bhb_loop+0x50/0xa0 [ 129.293137][ T5124] ? clear_bhb_loop+0x50/0xa0 [ 129.297828][ T5124] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 129.303759][ T5124] RIP: 0033:0x7fafd04c0749 [ 129.308224][ T5124] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 129.328037][ T5124] RSP: 002b:00007fafcef27fe8 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 129.336452][ T5124] RAX: ffffffffffffffda RBX: 00007fafd0716fa0 RCX: 00007fafd04c0749 [ 129.344422][ T5124] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00000000640c7000 [ 129.352475][ T5124] RBP: 00007fafcef28090 R08: 0000000000000000 R09: 0000000000000000 [ 129.360531][ T5124] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000002 [ 129.368671][ T5124] R13: 00007fafd0717038 R14: 00007fafd0716fa0 R15: 00007ffde0606de8 [ 129.376646][ T5124] [ 129.628342][ T5140] device syzkaller0 entered promiscuous mode [ 130.191549][ T30] audit: type=1400 audit(1763680848.752:162): avc: denied { create } for pid=5159 comm="syz.0.1447" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=ieee802154_socket permissive=1 [ 130.192041][ T5160] syz.0.1447[5160] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 130.231821][ T5160] syz.0.1447[5160] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 130.311031][ T5138] device syzkaller0 entered promiscuous mode [ 130.440479][ T5171] device wg2 entered promiscuous mode [ 130.494441][ T5176] bond_slave_1: mtu less than device minimum [ 130.723106][ T5189] FAULT_INJECTION: forcing a failure. [ 130.723106][ T5189] name failslab, interval 1, probability 0, space 0, times 0 [ 130.787033][ T5189] CPU: 1 PID: 5189 Comm: syz.3.1454 Tainted: G W syzkaller #0 [ 130.795936][ T5189] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 130.806101][ T5189] Call Trace: [ 130.809584][ T5189] [ 130.812549][ T5189] __dump_stack+0x21/0x30 [ 130.817445][ T5189] dump_stack_lvl+0xee/0x150 [ 130.822308][ T5189] ? show_regs_print_info+0x20/0x20 [ 130.827534][ T5189] dump_stack+0x15/0x20 [ 130.832108][ T5189] should_fail+0x3c1/0x510 [ 130.836575][ T5189] __should_failslab+0xa4/0xe0 [ 130.841448][ T5189] should_failslab+0x9/0x20 [ 130.845974][ T5189] slab_pre_alloc_hook+0x3b/0xe0 [ 130.850924][ T5189] ? anon_vma_fork+0xf2/0x510 [ 130.855652][ T5189] kmem_cache_alloc+0x44/0x260 [ 130.860424][ T5189] anon_vma_fork+0xf2/0x510 [ 130.864939][ T5189] copy_mm+0x9d1/0x13a0 [ 130.869547][ T5189] ? copy_signal+0x600/0x600 [ 130.874147][ T5189] ? __init_rwsem+0xfc/0x1d0 [ 130.878919][ T5189] ? copy_signal+0x4cb/0x600 [ 130.883507][ T5189] copy_process+0x115c/0x3210 [ 130.888288][ T5189] ? __kasan_check_write+0x14/0x20 [ 130.893534][ T5189] ? __pidfd_prepare+0x150/0x150 [ 130.898617][ T5189] ? security_file_permission+0x83/0xa0 [ 130.904162][ T5189] kernel_clone+0x23f/0x940 [ 130.908796][ T5189] ? create_io_thread+0x130/0x130 [ 130.913929][ T5189] ? __kasan_check_write+0x14/0x20 [ 130.919037][ T5189] ? mutex_unlock+0x89/0x220 [ 130.923645][ T5189] __x64_sys_clone+0x176/0x1d0 [ 130.928404][ T5189] ? __kasan_check_write+0x14/0x20 [ 130.933510][ T5189] ? __ia32_sys_vfork+0xf0/0xf0 [ 130.938460][ T5189] ? fpregs_assert_state_consistent+0xb1/0xe0 [ 130.944681][ T5189] x64_sys_call+0x41f/0x9a0 [ 130.949185][ T5189] do_syscall_64+0x4c/0xa0 [ 130.953595][ T5189] ? clear_bhb_loop+0x50/0xa0 [ 130.958268][ T5189] ? clear_bhb_loop+0x50/0xa0 [ 130.962942][ T5189] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 130.968942][ T5189] RIP: 0033:0x7fdfa1f0c749 [ 130.973367][ T5189] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 130.992968][ T5189] RSP: 002b:00007fdfa0973fe8 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 131.001383][ T5189] RAX: ffffffffffffffda RBX: 00007fdfa2162fa0 RCX: 00007fdfa1f0c749 [ 131.009442][ T5189] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00000000640c7000 [ 131.017673][ T5189] RBP: 00007fdfa0974090 R08: 0000000000000000 R09: 0000000000000000 [ 131.025846][ T5189] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000002 [ 131.033815][ T5189] R13: 00007fdfa2163038 R14: 00007fdfa2162fa0 R15: 00007ffc9621ce88 [ 131.041790][ T5189] [ 131.258202][ T5191] device pim6reg1 entered promiscuous mode [ 131.648024][ T5233] FAULT_INJECTION: forcing a failure. [ 131.648024][ T5233] name failslab, interval 1, probability 0, space 0, times 0 [ 131.708173][ T5233] CPU: 0 PID: 5233 Comm: syz.3.1469 Tainted: G W syzkaller #0 [ 131.717004][ T5233] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 131.727073][ T5233] Call Trace: [ 131.730361][ T5233] [ 131.733319][ T5233] __dump_stack+0x21/0x30 [ 131.737679][ T5233] dump_stack_lvl+0xee/0x150 [ 131.742595][ T5233] ? show_regs_print_info+0x20/0x20 [ 131.748006][ T5233] dump_stack+0x15/0x20 [ 131.752175][ T5233] should_fail+0x3c1/0x510 [ 131.756614][ T5233] __should_failslab+0xa4/0xe0 [ 131.761487][ T5233] should_failslab+0x9/0x20 [ 131.766000][ T5233] slab_pre_alloc_hook+0x3b/0xe0 [ 131.771130][ T5233] ? anon_vma_fork+0xf2/0x510 [ 131.775921][ T5233] kmem_cache_alloc+0x44/0x260 [ 131.780720][ T5233] anon_vma_fork+0xf2/0x510 [ 131.785237][ T5233] copy_mm+0x9d1/0x13a0 [ 131.789405][ T5233] ? copy_signal+0x600/0x600 [ 131.794002][ T5233] ? __init_rwsem+0xfc/0x1d0 [ 131.798686][ T5233] ? copy_signal+0x4cb/0x600 [ 131.803286][ T5233] copy_process+0x115c/0x3210 [ 131.807980][ T5233] ? __kasan_check_write+0x14/0x20 [ 131.813100][ T5233] ? __pidfd_prepare+0x150/0x150 [ 131.818051][ T5233] ? security_file_permission+0x83/0xa0 [ 131.823621][ T5233] kernel_clone+0x23f/0x940 [ 131.828131][ T5233] ? create_io_thread+0x130/0x130 [ 131.833164][ T5233] ? __kasan_check_write+0x14/0x20 [ 131.838465][ T5233] ? mutex_unlock+0x89/0x220 [ 131.843102][ T5233] __x64_sys_clone+0x176/0x1d0 [ 131.847880][ T5233] ? __kasan_check_write+0x14/0x20 [ 131.852999][ T5233] ? __ia32_sys_vfork+0xf0/0xf0 [ 131.857870][ T5233] ? fpregs_assert_state_consistent+0xb1/0xe0 [ 131.863944][ T5233] x64_sys_call+0x41f/0x9a0 [ 131.868642][ T5233] do_syscall_64+0x4c/0xa0 [ 131.873067][ T5233] ? clear_bhb_loop+0x50/0xa0 [ 131.877751][ T5233] ? clear_bhb_loop+0x50/0xa0 [ 131.882443][ T5233] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 131.888591][ T5233] RIP: 0033:0x7fdfa1f0c749 [ 131.893016][ T5233] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 131.912888][ T5233] RSP: 002b:00007fdfa0973fe8 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 131.921324][ T5233] RAX: ffffffffffffffda RBX: 00007fdfa2162fa0 RCX: 00007fdfa1f0c749 [ 131.929834][ T5233] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00000000640c7000 [ 131.937900][ T5233] RBP: 00007fdfa0974090 R08: 0000000000000000 R09: 0000000000000000 [ 131.946137][ T5233] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000002 [ 131.954115][ T5233] R13: 00007fdfa2163038 R14: 00007fdfa2162fa0 R15: 00007ffc9621ce88 [ 131.962193][ T5233] [ 132.766441][ T5271] FAULT_INJECTION: forcing a failure. [ 132.766441][ T5271] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 132.780424][ T5271] CPU: 1 PID: 5271 Comm: syz.0.1480 Tainted: G W syzkaller #0 [ 132.789320][ T5271] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 132.799396][ T5271] Call Trace: [ 132.802864][ T5271] [ 132.805806][ T5271] __dump_stack+0x21/0x30 [ 132.810168][ T5271] dump_stack_lvl+0xee/0x150 [ 132.814767][ T5271] ? show_regs_print_info+0x20/0x20 [ 132.819976][ T5271] ? bpf_perf_event_read+0x146/0x1e0 [ 132.825269][ T5271] ? bpf_seq_printf_btf+0x1a0/0x1a0 [ 132.830496][ T5271] dump_stack+0x15/0x20 [ 132.834661][ T5271] should_fail+0x3c1/0x510 [ 132.839190][ T5271] should_fail_alloc_page+0x55/0x80 [ 132.844474][ T5271] prepare_alloc_pages+0x156/0x600 [ 132.849671][ T5271] ? __alloc_pages_bulk+0xab0/0xab0 [ 132.854909][ T5271] ? perf_sched_cb_inc+0x240/0x240 [ 132.860032][ T5271] __alloc_pages+0x10a/0x440 [ 132.864899][ T5271] ? prep_new_page+0x110/0x110 [ 132.869668][ T5271] ? __mod_node_page_state+0x9e/0xd0 [ 132.875137][ T5271] ? __mod_lruvec_page_state+0x15d/0x1c0 [ 132.880770][ T5271] pte_alloc_one+0x70/0x180 [ 132.885284][ T5271] ? pfn_modify_allowed+0x2f0/0x2f0 [ 132.890915][ T5271] ? preempt_schedule_common+0xbe/0xf0 [ 132.896372][ T5271] ? preempt_schedule+0xa7/0xb0 [ 132.901218][ T5271] __pte_alloc+0x75/0x290 [ 132.905551][ T5271] ? __kasan_check_write+0x14/0x20 [ 132.910663][ T5271] ? _raw_spin_lock+0x8e/0xe0 [ 132.915336][ T5271] ? free_pgtables+0x280/0x280 [ 132.920098][ T5271] ? __kasan_check_write+0x14/0x20 [ 132.925297][ T5271] ? add_mm_rss_vec+0x209/0x220 [ 132.930232][ T5271] copy_page_range+0x2348/0x2890 [ 132.935173][ T5271] ? pfn_valid+0x1d0/0x1d0 [ 132.939604][ T5271] copy_mm+0xbe2/0x13a0 [ 132.943773][ T5271] ? copy_signal+0x600/0x600 [ 132.948358][ T5271] ? __init_rwsem+0xfc/0x1d0 [ 132.952946][ T5271] ? copy_signal+0x4cb/0x600 [ 132.957619][ T5271] copy_process+0x115c/0x3210 [ 132.962474][ T5271] ? __kasan_check_write+0x14/0x20 [ 132.967663][ T5271] ? __pidfd_prepare+0x150/0x150 [ 132.972628][ T5271] ? security_file_permission+0x83/0xa0 [ 132.978261][ T5271] kernel_clone+0x23f/0x940 [ 132.983109][ T5271] ? create_io_thread+0x130/0x130 [ 132.988144][ T5271] ? __kasan_check_write+0x14/0x20 [ 132.993368][ T5271] ? mutex_unlock+0x89/0x220 [ 132.997974][ T5271] __x64_sys_clone+0x176/0x1d0 [ 133.002739][ T5271] ? __kasan_check_write+0x14/0x20 [ 133.007940][ T5271] ? __ia32_sys_vfork+0xf0/0xf0 [ 133.012797][ T5271] ? fpregs_assert_state_consistent+0xb1/0xe0 [ 133.018981][ T5271] x64_sys_call+0x41f/0x9a0 [ 133.023485][ T5271] do_syscall_64+0x4c/0xa0 [ 133.028092][ T5271] ? clear_bhb_loop+0x50/0xa0 [ 133.032782][ T5271] ? clear_bhb_loop+0x50/0xa0 [ 133.037477][ T5271] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 133.043469][ T5271] RIP: 0033:0x7fb65282f749 [ 133.048060][ T5271] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 133.067871][ T5271] RSP: 002b:00007fb651296fe8 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 133.076289][ T5271] RAX: ffffffffffffffda RBX: 00007fb652a85fa0 RCX: 00007fb65282f749 [ 133.084608][ T5271] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00000000640c7000 [ 133.092760][ T5271] RBP: 00007fb651297090 R08: 0000000000000000 R09: 0000000000000000 [ 133.100817][ T5271] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000002 [ 133.109068][ T5271] R13: 00007fb652a86038 R14: 00007fb652a85fa0 R15: 00007ffcc21d8aa8 [ 133.117138][ T5271] [ 133.445169][ T5292] device sit0 left promiscuous mode [ 133.512316][ T5292] device sit0 entered promiscuous mode [ 133.810258][ T5308] FAULT_INJECTION: forcing a failure. [ 133.810258][ T5308] name failslab, interval 1, probability 0, space 0, times 0 [ 133.859138][ T5308] CPU: 0 PID: 5308 Comm: syz.2.1491 Tainted: G W syzkaller #0 [ 133.868128][ T5308] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 133.878200][ T5308] Call Trace: [ 133.881488][ T5308] [ 133.884425][ T5308] __dump_stack+0x21/0x30 [ 133.888858][ T5308] dump_stack_lvl+0xee/0x150 [ 133.893581][ T5308] ? show_regs_print_info+0x20/0x20 [ 133.898802][ T5308] dump_stack+0x15/0x20 [ 133.902992][ T5308] should_fail+0x3c1/0x510 [ 133.907592][ T5308] __should_failslab+0xa4/0xe0 [ 133.912395][ T5308] should_failslab+0x9/0x20 [ 133.916903][ T5308] slab_pre_alloc_hook+0x3b/0xe0 [ 133.922018][ T5308] ? vm_area_dup+0x26/0x210 [ 133.926546][ T5308] kmem_cache_alloc+0x44/0x260 [ 133.931340][ T5308] vm_area_dup+0x26/0x210 [ 133.935699][ T5308] copy_mm+0x93a/0x13a0 [ 133.939869][ T5308] ? copy_signal+0x600/0x600 [ 133.944473][ T5308] ? __init_rwsem+0xfc/0x1d0 [ 133.949076][ T5308] ? copy_signal+0x4cb/0x600 [ 133.953764][ T5308] copy_process+0x115c/0x3210 [ 133.958562][ T5308] ? __kasan_check_write+0x14/0x20 [ 133.963694][ T5308] ? __pidfd_prepare+0x150/0x150 [ 133.968643][ T5308] ? security_file_permission+0x83/0xa0 [ 133.974298][ T5308] kernel_clone+0x23f/0x940 [ 133.978908][ T5308] ? create_io_thread+0x130/0x130 [ 133.983940][ T5308] ? __kasan_check_write+0x14/0x20 [ 133.989060][ T5308] ? mutex_unlock+0x89/0x220 [ 133.994099][ T5308] __x64_sys_clone+0x176/0x1d0 [ 133.998967][ T5308] ? __kasan_check_write+0x14/0x20 [ 134.004272][ T5308] ? __ia32_sys_vfork+0xf0/0xf0 [ 134.009134][ T5308] ? fpregs_assert_state_consistent+0xb1/0xe0 [ 134.015643][ T5308] x64_sys_call+0x41f/0x9a0 [ 134.020156][ T5308] do_syscall_64+0x4c/0xa0 [ 134.024587][ T5308] ? clear_bhb_loop+0x50/0xa0 [ 134.029462][ T5308] ? clear_bhb_loop+0x50/0xa0 [ 134.034578][ T5308] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 134.040480][ T5308] RIP: 0033:0x7f704b487749 [ 134.044904][ T5308] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 134.064609][ T5308] RSP: 002b:00007f7049eeefe8 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 134.073475][ T5308] RAX: ffffffffffffffda RBX: 00007f704b6ddfa0 RCX: 00007f704b487749 [ 134.081565][ T5308] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00000000640c7000 [ 134.089646][ T5308] RBP: 00007f7049eef090 R08: 0000000000000000 R09: 0000000000000000 [ 134.097632][ T5308] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000002 [ 134.105794][ T5308] R13: 00007f704b6de038 R14: 00007f704b6ddfa0 R15: 00007ffdb08e0f28 [ 134.113879][ T5308] [ 134.999783][ T5348] FAULT_INJECTION: forcing a failure. [ 134.999783][ T5348] name failslab, interval 1, probability 0, space 0, times 0 [ 135.050305][ T5348] CPU: 0 PID: 5348 Comm: syz.2.1505 Tainted: G W syzkaller #0 [ 135.059228][ T5348] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 135.069464][ T5348] Call Trace: [ 135.072749][ T5348] [ 135.075681][ T5348] __dump_stack+0x21/0x30 [ 135.080044][ T5348] dump_stack_lvl+0xee/0x150 [ 135.084641][ T5348] ? show_regs_print_info+0x20/0x20 [ 135.089847][ T5348] dump_stack+0x15/0x20 [ 135.094016][ T5348] should_fail+0x3c1/0x510 [ 135.098446][ T5348] __should_failslab+0xa4/0xe0 [ 135.103246][ T5348] should_failslab+0x9/0x20 [ 135.107774][ T5348] slab_pre_alloc_hook+0x3b/0xe0 [ 135.112965][ T5348] ? anon_vma_clone+0xc0/0x500 [ 135.118008][ T5348] kmem_cache_alloc+0x44/0x260 [ 135.122778][ T5348] anon_vma_clone+0xc0/0x500 [ 135.127376][ T5348] anon_vma_fork+0x8c/0x510 [ 135.131895][ T5348] copy_mm+0x9d1/0x13a0 [ 135.136055][ T5348] ? copy_signal+0x600/0x600 [ 135.140668][ T5348] ? __init_rwsem+0xfc/0x1d0 [ 135.145261][ T5348] ? copy_signal+0x4cb/0x600 [ 135.149852][ T5348] copy_process+0x115c/0x3210 [ 135.154540][ T5348] ? __kasan_check_write+0x14/0x20 [ 135.159832][ T5348] ? __pidfd_prepare+0x150/0x150 [ 135.164778][ T5348] ? security_file_permission+0x83/0xa0 [ 135.170343][ T5348] kernel_clone+0x23f/0x940 [ 135.174853][ T5348] ? create_io_thread+0x130/0x130 [ 135.179881][ T5348] ? __kasan_check_write+0x14/0x20 [ 135.184998][ T5348] ? mutex_unlock+0x89/0x220 [ 135.189593][ T5348] __x64_sys_clone+0x176/0x1d0 [ 135.194362][ T5348] ? __kasan_check_write+0x14/0x20 [ 135.199566][ T5348] ? __ia32_sys_vfork+0xf0/0xf0 [ 135.204423][ T5348] ? fpregs_assert_state_consistent+0xb1/0xe0 [ 135.210495][ T5348] x64_sys_call+0x41f/0x9a0 [ 135.215005][ T5348] do_syscall_64+0x4c/0xa0 [ 135.219427][ T5348] ? clear_bhb_loop+0x50/0xa0 [ 135.224104][ T5348] ? clear_bhb_loop+0x50/0xa0 [ 135.228781][ T5348] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 135.234690][ T5348] RIP: 0033:0x7f704b487749 [ 135.239117][ T5348] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 135.258815][ T5348] RSP: 002b:00007f7049eeefe8 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 135.267343][ T5348] RAX: ffffffffffffffda RBX: 00007f704b6ddfa0 RCX: 00007f704b487749 [ 135.275534][ T5348] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00000000640c7000 [ 135.283692][ T5348] RBP: 00007f7049eef090 R08: 0000000000000000 R09: 0000000000000000 [ 135.291672][ T5348] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000002 [ 135.299650][ T5348] R13: 00007f704b6de038 R14: 00007f704b6ddfa0 R15: 00007ffdb08e0f28 [ 135.307638][ T5348] [ 135.631760][ T333] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 135.995242][ T30] audit: type=1400 audit(1763680854.542:163): avc: denied { create } for pid=5379 comm="syz.2.1515" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_fib_lookup_socket permissive=1 [ 136.310778][ T5405] FAULT_INJECTION: forcing a failure. [ 136.310778][ T5405] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 136.404254][ T5405] CPU: 1 PID: 5405 Comm: syz.1.1520 Tainted: G W syzkaller #0 [ 136.413247][ T5405] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 136.423511][ T5405] Call Trace: [ 136.426810][ T5405] [ 136.429834][ T5405] __dump_stack+0x21/0x30 [ 136.434268][ T5405] dump_stack_lvl+0xee/0x150 [ 136.438858][ T5405] ? show_regs_print_info+0x20/0x20 [ 136.444057][ T5405] dump_stack+0x15/0x20 [ 136.448217][ T5405] should_fail+0x3c1/0x510 [ 136.452651][ T5405] should_fail_alloc_page+0x55/0x80 [ 136.458484][ T5405] prepare_alloc_pages+0x156/0x600 [ 136.463796][ T5405] ? __alloc_pages_bulk+0xab0/0xab0 [ 136.468998][ T5405] ? perf_sched_cb_inc+0x240/0x240 [ 136.474292][ T5405] __alloc_pages+0x10a/0x440 [ 136.478997][ T5405] ? prep_new_page+0x110/0x110 [ 136.483867][ T5405] ? __schedule+0xb76/0x14c0 [ 136.488555][ T5405] ? release_firmware_map_entry+0x190/0x190 [ 136.494481][ T5405] pte_alloc_one+0x70/0x180 [ 136.499004][ T5405] ? pfn_modify_allowed+0x2f0/0x2f0 [ 136.504461][ T5405] ? __kasan_check_read+0x11/0x20 [ 136.509659][ T5405] ? preempt_schedule_common+0xbe/0xf0 [ 136.515207][ T5405] ? preempt_schedule+0xa7/0xb0 [ 136.520227][ T5405] __pte_alloc+0x75/0x290 [ 136.524555][ T5405] ? __kasan_check_write+0x14/0x20 [ 136.529701][ T5405] ? _raw_spin_lock+0x8e/0xe0 [ 136.534383][ T5405] ? free_pgtables+0x280/0x280 [ 136.539144][ T5405] ? __kasan_check_write+0x14/0x20 [ 136.544257][ T5405] ? add_mm_rss_vec+0x209/0x220 [ 136.549103][ T5405] copy_page_range+0x2348/0x2890 [ 136.554042][ T5405] ? pfn_valid+0x1d0/0x1d0 [ 136.558454][ T5405] copy_mm+0xbe2/0x13a0 [ 136.562607][ T5405] ? copy_signal+0x600/0x600 [ 136.567191][ T5405] ? __init_rwsem+0xfc/0x1d0 [ 136.571775][ T5405] ? copy_signal+0x4cb/0x600 [ 136.576362][ T5405] copy_process+0x115c/0x3210 [ 136.581062][ T5405] ? __kasan_check_write+0x14/0x20 [ 136.586342][ T5405] ? __pidfd_prepare+0x150/0x150 [ 136.591276][ T5405] ? security_file_permission+0x83/0xa0 [ 136.596822][ T5405] kernel_clone+0x23f/0x940 [ 136.601502][ T5405] ? create_io_thread+0x130/0x130 [ 136.606526][ T5405] ? __kasan_check_write+0x14/0x20 [ 136.611633][ T5405] ? mutex_unlock+0x89/0x220 [ 136.616219][ T5405] __x64_sys_clone+0x176/0x1d0 [ 136.620980][ T5405] ? __kasan_check_write+0x14/0x20 [ 136.626433][ T5405] ? __ia32_sys_vfork+0xf0/0xf0 [ 136.631297][ T5405] ? fpregs_assert_state_consistent+0xb1/0xe0 [ 136.637365][ T5405] x64_sys_call+0x41f/0x9a0 [ 136.641879][ T5405] do_syscall_64+0x4c/0xa0 [ 136.646388][ T5405] ? clear_bhb_loop+0x50/0xa0 [ 136.651059][ T5405] ? clear_bhb_loop+0x50/0xa0 [ 136.655849][ T5405] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 136.661925][ T5405] RIP: 0033:0x7f7bd15e3749 [ 136.666598][ T5405] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 136.686377][ T5405] RSP: 002b:00007f7bd004afe8 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 136.694792][ T5405] RAX: ffffffffffffffda RBX: 00007f7bd1839fa0 RCX: 00007f7bd15e3749 [ 136.702864][ T5405] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00000000640c7000 [ 136.710851][ T5405] RBP: 00007f7bd004b090 R08: 0000000000000000 R09: 0000000000000000 [ 136.718906][ T5405] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000002 [ 136.726878][ T5405] R13: 00007f7bd183a038 R14: 00007f7bd1839fa0 R15: 00007ffdcefb39a8 [ 136.735370][ T5405] [ 136.837534][ T5419] syz.1.1527[5419] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 136.837665][ T5419] syz.1.1527[5419] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 137.006937][ T5426] syz.1.1528[5426] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 137.473656][ T5456] FAULT_INJECTION: forcing a failure. [ 137.473656][ T5456] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 137.517695][ T5456] CPU: 0 PID: 5456 Comm: syz.1.1537 Tainted: G W syzkaller #0 [ 137.526520][ T5456] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 137.536858][ T5456] Call Trace: [ 137.540138][ T5456] [ 137.543067][ T5456] __dump_stack+0x21/0x30 [ 137.547406][ T5456] dump_stack_lvl+0xee/0x150 [ 137.552042][ T5456] ? show_regs_print_info+0x20/0x20 [ 137.557424][ T5456] dump_stack+0x15/0x20 [ 137.561755][ T5456] should_fail+0x3c1/0x510 [ 137.566262][ T5456] should_fail_alloc_page+0x55/0x80 [ 137.571464][ T5456] prepare_alloc_pages+0x156/0x600 [ 137.576622][ T5456] ? __alloc_pages_bulk+0xab0/0xab0 [ 137.581826][ T5456] __alloc_pages+0x10a/0x440 [ 137.586416][ T5456] ? prep_new_page+0x110/0x110 [ 137.591349][ T5456] ? __mod_node_page_state+0x9e/0xd0 [ 137.596719][ T5456] ? __mod_lruvec_page_state+0x15d/0x1c0 [ 137.602356][ T5456] pte_alloc_one+0x70/0x180 [ 137.606857][ T5456] ? pfn_modify_allowed+0x2f0/0x2f0 [ 137.612049][ T5456] ? stack_trace_save+0x98/0xe0 [ 137.616898][ T5456] __pte_alloc+0x75/0x290 [ 137.621314][ T5456] ? __kasan_check_write+0x14/0x20 [ 137.626431][ T5456] ? _raw_spin_lock+0x8e/0xe0 [ 137.631190][ T5456] ? free_pgtables+0x280/0x280 [ 137.635948][ T5456] ? __kasan_check_write+0x14/0x20 [ 137.641140][ T5456] ? add_mm_rss_vec+0x209/0x220 [ 137.646003][ T5456] copy_page_range+0x2348/0x2890 [ 137.650963][ T5456] ? pfn_valid+0x1d0/0x1d0 [ 137.655384][ T5456] copy_mm+0xbe2/0x13a0 [ 137.659548][ T5456] ? copy_signal+0x600/0x600 [ 137.664221][ T5456] ? __init_rwsem+0xfc/0x1d0 [ 137.668818][ T5456] ? copy_signal+0x4cb/0x600 [ 137.673400][ T5456] copy_process+0x115c/0x3210 [ 137.678078][ T5456] ? __kasan_check_write+0x14/0x20 [ 137.684143][ T5456] ? __pidfd_prepare+0x150/0x150 [ 137.689259][ T5456] ? security_file_permission+0x83/0xa0 [ 137.694810][ T5456] kernel_clone+0x23f/0x940 [ 137.699316][ T5456] ? create_io_thread+0x130/0x130 [ 137.704339][ T5456] ? __kasan_check_write+0x14/0x20 [ 137.709455][ T5456] ? mutex_unlock+0x89/0x220 [ 137.714039][ T5456] __x64_sys_clone+0x176/0x1d0 [ 137.718803][ T5456] ? __kasan_check_write+0x14/0x20 [ 137.723910][ T5456] ? __ia32_sys_vfork+0xf0/0xf0 [ 137.728782][ T5456] ? fpregs_assert_state_consistent+0xb1/0xe0 [ 137.734859][ T5456] x64_sys_call+0x41f/0x9a0 [ 137.739357][ T5456] do_syscall_64+0x4c/0xa0 [ 137.743773][ T5456] ? clear_bhb_loop+0x50/0xa0 [ 137.748462][ T5456] ? clear_bhb_loop+0x50/0xa0 [ 137.753131][ T5456] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 137.759045][ T5456] RIP: 0033:0x7f7bd15e3749 [ 137.763472][ T5456] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 137.783084][ T5456] RSP: 002b:00007f7bd004afe8 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 137.792025][ T5456] RAX: ffffffffffffffda RBX: 00007f7bd1839fa0 RCX: 00007f7bd15e3749 [ 137.800098][ T5456] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00000000640c7000 [ 137.808284][ T5456] RBP: 00007f7bd004b090 R08: 0000000000000000 R09: 0000000000000000 [ 137.816377][ T5456] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000002 [ 137.824345][ T5456] R13: 00007f7bd183a038 R14: 00007f7bd1839fa0 R15: 00007ffdcefb39a8 [ 137.832330][ T5456] [ 138.139125][ T5491] device pim6reg1 entered promiscuous mode [ 138.300393][ T5505] FAULT_INJECTION: forcing a failure. [ 138.300393][ T5505] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 138.452437][ T5505] CPU: 1 PID: 5505 Comm: syz.3.1551 Tainted: G W syzkaller #0 [ 138.461273][ T5505] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 138.471533][ T5505] Call Trace: [ 138.474944][ T5505] [ 138.477871][ T5505] __dump_stack+0x21/0x30 [ 138.482205][ T5505] dump_stack_lvl+0xee/0x150 [ 138.486858][ T5505] ? show_regs_print_info+0x20/0x20 [ 138.492080][ T5505] ? kvm_sched_clock_read+0x18/0x40 [ 138.497459][ T5505] dump_stack+0x15/0x20 [ 138.501609][ T5505] should_fail+0x3c1/0x510 [ 138.506025][ T5505] should_fail_alloc_page+0x55/0x80 [ 138.511318][ T5505] prepare_alloc_pages+0x156/0x600 [ 138.516437][ T5505] ? __alloc_pages_bulk+0xab0/0xab0 [ 138.521635][ T5505] __alloc_pages+0x10a/0x440 [ 138.526307][ T5505] ? prep_new_page+0x110/0x110 [ 138.531257][ T5505] ? __mod_node_page_state+0x9e/0xd0 [ 138.536802][ T5505] ? __mod_lruvec_page_state+0x15d/0x1c0 [ 138.542431][ T5505] pte_alloc_one+0x70/0x180 [ 138.546930][ T5505] ? pfn_modify_allowed+0x2f0/0x2f0 [ 138.552387][ T5505] ? stack_trace_save+0x98/0xe0 [ 138.557240][ T5505] __pte_alloc+0x75/0x290 [ 138.561565][ T5505] ? __kasan_check_write+0x14/0x20 [ 138.566683][ T5505] ? _raw_spin_lock+0x8e/0xe0 [ 138.571443][ T5505] ? free_pgtables+0x280/0x280 [ 138.576309][ T5505] ? __kasan_check_write+0x14/0x20 [ 138.581417][ T5505] ? add_mm_rss_vec+0x209/0x220 [ 138.586263][ T5505] copy_page_range+0x2348/0x2890 [ 138.591203][ T5505] ? pfn_valid+0x1d0/0x1d0 [ 138.595756][ T5505] ? rwsem_write_trylock+0x130/0x300 [ 138.601067][ T5505] ? kfree_sensitive+0x40/0x80 [ 138.605843][ T5505] copy_mm+0xbe2/0x13a0 [ 138.610008][ T5505] ? copy_signal+0x600/0x600 [ 138.614598][ T5505] ? __init_rwsem+0xfc/0x1d0 [ 138.619451][ T5505] ? copy_signal+0x4cb/0x600 [ 138.624039][ T5505] copy_process+0x115c/0x3210 [ 138.628717][ T5505] ? __kasan_check_write+0x14/0x20 [ 138.633920][ T5505] ? __pidfd_prepare+0x150/0x150 [ 138.638962][ T5505] ? security_file_permission+0x83/0xa0 [ 138.644509][ T5505] kernel_clone+0x23f/0x940 [ 138.649098][ T5505] ? create_io_thread+0x130/0x130 [ 138.654215][ T5505] ? __kasan_check_write+0x14/0x20 [ 138.659319][ T5505] ? mutex_unlock+0x89/0x220 [ 138.663909][ T5505] __x64_sys_clone+0x176/0x1d0 [ 138.668672][ T5505] ? __kasan_check_write+0x14/0x20 [ 138.673777][ T5505] ? __ia32_sys_vfork+0xf0/0xf0 [ 138.678802][ T5505] ? fpregs_assert_state_consistent+0xb1/0xe0 [ 138.684864][ T5505] x64_sys_call+0x41f/0x9a0 [ 138.689460][ T5505] do_syscall_64+0x4c/0xa0 [ 138.693962][ T5505] ? clear_bhb_loop+0x50/0xa0 [ 138.698636][ T5505] ? clear_bhb_loop+0x50/0xa0 [ 138.703306][ T5505] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 138.709204][ T5505] RIP: 0033:0x7fdfa1f0c749 [ 138.713614][ T5505] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 138.733614][ T5505] RSP: 002b:00007fdfa0973fe8 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 138.742036][ T5505] RAX: ffffffffffffffda RBX: 00007fdfa2162fa0 RCX: 00007fdfa1f0c749 [ 138.750109][ T5505] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00000000640c7000 [ 138.758076][ T5505] RBP: 00007fdfa0974090 R08: 0000000000000000 R09: 0000000000000000 [ 138.766239][ T5505] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000002 [ 138.774222][ T5505] R13: 00007fdfa2163038 R14: 00007fdfa2162fa0 R15: 00007ffc9621ce88 [ 138.782421][ T5505] [ 139.179803][ T5528] device wg2 left promiscuous mode [ 139.288233][ T5544] device syzkaller0 entered promiscuous mode [ 139.498433][ T5560] syz.1.1568[5560] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 139.499056][ T5560] syz.1.1568[5560] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 139.526177][ T5564] FAULT_INJECTION: forcing a failure. [ 139.526177][ T5564] name failslab, interval 1, probability 0, space 0, times 0 [ 139.551560][ T5564] CPU: 1 PID: 5564 Comm: syz.2.1570 Tainted: G W syzkaller #0 [ 139.560540][ T5564] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 139.570773][ T5564] Call Trace: [ 139.574073][ T5564] [ 139.577020][ T5564] __dump_stack+0x21/0x30 [ 139.581542][ T5564] dump_stack_lvl+0xee/0x150 [ 139.586163][ T5564] ? show_regs_print_info+0x20/0x20 [ 139.591381][ T5564] dump_stack+0x15/0x20 [ 139.595557][ T5564] should_fail+0x3c1/0x510 [ 139.600077][ T5564] __should_failslab+0xa4/0xe0 [ 139.604962][ T5564] should_failslab+0x9/0x20 [ 139.609640][ T5564] slab_pre_alloc_hook+0x3b/0xe0 [ 139.614599][ T5564] ? vm_area_dup+0x26/0x210 [ 139.619112][ T5564] kmem_cache_alloc+0x44/0x260 [ 139.623895][ T5564] vm_area_dup+0x26/0x210 [ 139.628238][ T5564] copy_mm+0x93a/0x13a0 [ 139.632403][ T5564] ? copy_signal+0x600/0x600 [ 139.637001][ T5564] ? __init_rwsem+0xfc/0x1d0 [ 139.641767][ T5564] ? copy_signal+0x4cb/0x600 [ 139.646564][ T5564] copy_process+0x115c/0x3210 [ 139.651265][ T5564] ? __kasan_check_write+0x14/0x20 [ 139.656483][ T5564] ? __pidfd_prepare+0x150/0x150 [ 139.661466][ T5564] ? security_file_permission+0x83/0xa0 [ 139.667038][ T5564] kernel_clone+0x23f/0x940 [ 139.671793][ T5564] ? create_io_thread+0x130/0x130 [ 139.677017][ T5564] ? __kasan_check_write+0x14/0x20 [ 139.682161][ T5564] ? mutex_unlock+0x89/0x220 [ 139.686771][ T5564] __x64_sys_clone+0x176/0x1d0 [ 139.691549][ T5564] ? __kasan_check_write+0x14/0x20 [ 139.696691][ T5564] ? __ia32_sys_vfork+0xf0/0xf0 [ 139.701699][ T5564] ? fpregs_assert_state_consistent+0xb1/0xe0 [ 139.707778][ T5564] x64_sys_call+0x41f/0x9a0 [ 139.712386][ T5564] do_syscall_64+0x4c/0xa0 [ 139.716816][ T5564] ? clear_bhb_loop+0x50/0xa0 [ 139.721502][ T5564] ? clear_bhb_loop+0x50/0xa0 [ 139.726197][ T5564] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 139.732101][ T5564] RIP: 0033:0x7f704b487749 [ 139.736654][ T5564] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 139.756361][ T5564] RSP: 002b:00007f7049eeefe8 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 139.765016][ T5564] RAX: ffffffffffffffda RBX: 00007f704b6ddfa0 RCX: 00007f704b487749 [ 139.773087][ T5564] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00000000640c7000 [ 139.781069][ T5564] RBP: 00007f7049eef090 R08: 0000000000000000 R09: 0000000000000000 [ 139.789138][ T5564] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000002 [ 139.797202][ T5564] R13: 00007f704b6de038 R14: 00007f704b6ddfa0 R15: 00007ffdb08e0f28 [ 139.805275][ T5564] [ 139.922729][ T5578] device syzkaller0 entered promiscuous mode [ 140.358601][ T5597] device sit0 left promiscuous mode [ 140.496060][ T5601] device sit0 entered promiscuous mode [ 140.688513][ T5608] FAULT_INJECTION: forcing a failure. [ 140.688513][ T5608] name failslab, interval 1, probability 0, space 0, times 0 [ 140.702216][ T5608] CPU: 0 PID: 5608 Comm: syz.2.1584 Tainted: G W syzkaller #0 [ 140.711004][ T5608] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 140.721239][ T5608] Call Trace: [ 140.724517][ T5608] [ 140.727445][ T5608] __dump_stack+0x21/0x30 [ 140.731781][ T5608] dump_stack_lvl+0xee/0x150 [ 140.736371][ T5608] ? show_regs_print_info+0x20/0x20 [ 140.741582][ T5608] dump_stack+0x15/0x20 [ 140.745735][ T5608] should_fail+0x3c1/0x510 [ 140.750153][ T5608] __should_failslab+0xa4/0xe0 [ 140.755006][ T5608] should_failslab+0x9/0x20 [ 140.759504][ T5608] slab_pre_alloc_hook+0x3b/0xe0 [ 140.764439][ T5608] ? vm_area_dup+0x26/0x210 [ 140.768946][ T5608] kmem_cache_alloc+0x44/0x260 [ 140.773709][ T5608] vm_area_dup+0x26/0x210 [ 140.778037][ T5608] copy_mm+0x93a/0x13a0 [ 140.782195][ T5608] ? copy_signal+0x600/0x600 [ 140.786781][ T5608] ? __init_rwsem+0xfc/0x1d0 [ 140.791375][ T5608] ? copy_signal+0x4cb/0x600 [ 140.795973][ T5608] copy_process+0x115c/0x3210 [ 140.800690][ T5608] ? __kasan_check_write+0x14/0x20 [ 140.805829][ T5608] ? __pidfd_prepare+0x150/0x150 [ 140.810776][ T5608] ? security_file_permission+0x83/0xa0 [ 140.816326][ T5608] kernel_clone+0x23f/0x940 [ 140.820833][ T5608] ? create_io_thread+0x130/0x130 [ 140.825857][ T5608] ? __kasan_check_write+0x14/0x20 [ 140.830971][ T5608] ? mutex_unlock+0x89/0x220 [ 140.835560][ T5608] __x64_sys_clone+0x176/0x1d0 [ 140.840321][ T5608] ? __kasan_check_write+0x14/0x20 [ 140.845525][ T5608] ? __ia32_sys_vfork+0xf0/0xf0 [ 140.850377][ T5608] ? fpregs_assert_state_consistent+0xb1/0xe0 [ 140.856624][ T5608] x64_sys_call+0x41f/0x9a0 [ 140.861127][ T5608] do_syscall_64+0x4c/0xa0 [ 140.865568][ T5608] ? clear_bhb_loop+0x50/0xa0 [ 140.870264][ T5608] ? clear_bhb_loop+0x50/0xa0 [ 140.874945][ T5608] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 140.880945][ T5608] RIP: 0033:0x7f704b487749 [ 140.885369][ T5608] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 140.905496][ T5608] RSP: 002b:00007f7049eeefe8 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 140.913943][ T5608] RAX: ffffffffffffffda RBX: 00007f704b6ddfa0 RCX: 00007f704b487749 [ 140.921912][ T5608] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00000000640c7000 [ 140.930146][ T5608] RBP: 00007f7049eef090 R08: 0000000000000000 R09: 0000000000000000 [ 140.938109][ T5608] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000002 [ 140.946079][ T5608] R13: 00007f704b6de038 R14: 00007f704b6ddfa0 R15: 00007ffdb08e0f28 [ 140.954053][ T5608] [ 141.177956][ T5639] FAULT_INJECTION: forcing a failure. [ 141.177956][ T5639] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 141.192410][ T5639] CPU: 1 PID: 5639 Comm: syz.3.1593 Tainted: G W syzkaller #0 [ 141.201201][ T5639] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 141.211263][ T5639] Call Trace: [ 141.214540][ T5639] [ 141.217483][ T5639] __dump_stack+0x21/0x30 [ 141.221820][ T5639] dump_stack_lvl+0xee/0x150 [ 141.226404][ T5639] ? show_regs_print_info+0x20/0x20 [ 141.231605][ T5639] ? stack_trace_save+0x98/0xe0 [ 141.236451][ T5639] dump_stack+0x15/0x20 [ 141.240627][ T5639] should_fail+0x3c1/0x510 [ 141.245065][ T5639] should_fail_alloc_page+0x55/0x80 [ 141.250361][ T5639] prepare_alloc_pages+0x156/0x600 [ 141.255469][ T5639] ? __alloc_pages_bulk+0xab0/0xab0 [ 141.260669][ T5639] __alloc_pages+0x10a/0x440 [ 141.265280][ T5639] ? prep_new_page+0x110/0x110 [ 141.270088][ T5639] kmalloc_order+0x4c/0x160 [ 141.274593][ T5639] ? alloc_skb_with_frags+0xa8/0x620 [ 141.279893][ T5639] kmalloc_order_trace+0x18/0xb0 [ 141.285007][ T5639] __kmalloc_track_caller+0x198/0x2c0 [ 141.290471][ T5639] ? kmem_cache_alloc+0xf7/0x260 [ 141.295497][ T5639] ? alloc_skb_with_frags+0xa8/0x620 [ 141.300781][ T5639] __alloc_skb+0x21a/0x740 [ 141.305196][ T5639] alloc_skb_with_frags+0xa8/0x620 [ 141.310305][ T5639] sock_alloc_send_pskb+0x853/0x980 [ 141.315598][ T5639] ? is_bpf_text_address+0x177/0x190 [ 141.320883][ T5639] ? __kernel_text_address+0xa0/0x100 [ 141.326250][ T5639] ? sock_kzfree_s+0x60/0x60 [ 141.330840][ T5639] ? stack_trace_save+0x98/0xe0 [ 141.335727][ T5639] tun_get_user+0x4e6/0x33c0 [ 141.340499][ T5639] ? __kasan_poison_slab+0x70/0x70 [ 141.345615][ T5639] ? kmem_cache_free+0x100/0x320 [ 141.350636][ T5639] ? __x64_sys_openat+0x136/0x160 [ 141.355658][ T5639] ? x64_sys_call+0x219/0x9a0 [ 141.360336][ T5639] ? tun_do_read+0x1c40/0x1c40 [ 141.365099][ T5639] ? kstrtouint_from_user+0x1a0/0x200 [ 141.370472][ T5639] ? kstrtol_from_user+0x260/0x260 [ 141.375584][ T5639] ? avc_policy_seqno+0x1b/0x70 [ 141.380431][ T5639] ? selinux_file_permission+0x2aa/0x510 [ 141.386066][ T5639] tun_chr_write_iter+0x1eb/0x2e0 [ 141.391091][ T5639] vfs_write+0x802/0xf70 [ 141.395332][ T5639] ? file_end_write+0x1b0/0x1b0 [ 141.400439][ T5639] ? __fget_files+0x2c4/0x320 [ 141.405120][ T5639] ? __fdget_pos+0x1f7/0x380 [ 141.409793][ T5639] ? ksys_write+0x71/0x240 [ 141.414206][ T5639] ksys_write+0x140/0x240 [ 141.418528][ T5639] ? __ia32_sys_read+0x90/0x90 [ 141.423298][ T5639] ? debug_smp_processor_id+0x17/0x20 [ 141.428665][ T5639] __x64_sys_write+0x7b/0x90 [ 141.433250][ T5639] x64_sys_call+0x8ef/0x9a0 [ 141.437764][ T5639] do_syscall_64+0x4c/0xa0 [ 141.442265][ T5639] ? clear_bhb_loop+0x50/0xa0 [ 141.446936][ T5639] ? clear_bhb_loop+0x50/0xa0 [ 141.451609][ T5639] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 141.457502][ T5639] RIP: 0033:0x7fdfa1f0c749 [ 141.461925][ T5639] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 141.481654][ T5639] RSP: 002b:00007fdfa0974038 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 141.490073][ T5639] RAX: ffffffffffffffda RBX: 00007fdfa2162fa0 RCX: 00007fdfa1f0c749 [ 141.498131][ T5639] RDX: 000000000000fdef RSI: 0000200000000000 RDI: 00000000000000c8 [ 141.506984][ T5639] RBP: 00007fdfa0974090 R08: 0000000000000000 R09: 0000000000000000 [ 141.515009][ T5639] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 141.522976][ T5639] R13: 00007fdfa2163038 R14: 00007fdfa2162fa0 R15: 00007ffc9621ce88 [ 141.530950][ T5639] [ 141.777254][ T5657] FAULT_INJECTION: forcing a failure. [ 141.777254][ T5657] name failslab, interval 1, probability 0, space 0, times 0 [ 141.790002][ T5657] CPU: 0 PID: 5657 Comm: syz.3.1599 Tainted: G W syzkaller #0 [ 141.799046][ T5657] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 141.809368][ T5657] Call Trace: [ 141.812656][ T5657] [ 141.815602][ T5657] __dump_stack+0x21/0x30 [ 141.819961][ T5657] dump_stack_lvl+0xee/0x150 [ 141.824587][ T5657] ? show_regs_print_info+0x20/0x20 [ 141.829807][ T5657] dump_stack+0x15/0x20 [ 141.834077][ T5657] should_fail+0x3c1/0x510 [ 141.838505][ T5657] __should_failslab+0xa4/0xe0 [ 141.843378][ T5657] should_failslab+0x9/0x20 [ 141.847906][ T5657] slab_pre_alloc_hook+0x3b/0xe0 [ 141.852858][ T5657] ? vm_area_dup+0x26/0x210 [ 141.857468][ T5657] kmem_cache_alloc+0x44/0x260 [ 141.862249][ T5657] vm_area_dup+0x26/0x210 [ 141.866599][ T5657] copy_mm+0x93a/0x13a0 [ 141.870885][ T5657] ? copy_signal+0x600/0x600 [ 141.875492][ T5657] ? __init_rwsem+0xfc/0x1d0 [ 141.880096][ T5657] ? copy_signal+0x4cb/0x600 [ 141.884916][ T5657] copy_process+0x115c/0x3210 [ 141.889608][ T5657] ? __kasan_check_write+0x14/0x20 [ 141.894930][ T5657] ? __pidfd_prepare+0x150/0x150 [ 141.899967][ T5657] ? security_file_permission+0x83/0xa0 [ 141.905531][ T5657] kernel_clone+0x23f/0x940 [ 141.910060][ T5657] ? create_io_thread+0x130/0x130 [ 141.915186][ T5657] ? __kasan_check_write+0x14/0x20 [ 141.920315][ T5657] ? mutex_unlock+0x89/0x220 [ 141.924914][ T5657] __x64_sys_clone+0x176/0x1d0 [ 141.929688][ T5657] ? __kasan_check_write+0x14/0x20 [ 141.934915][ T5657] ? __ia32_sys_vfork+0xf0/0xf0 [ 141.939782][ T5657] ? fpregs_assert_state_consistent+0xb1/0xe0 [ 141.945862][ T5657] x64_sys_call+0x41f/0x9a0 [ 141.950375][ T5657] do_syscall_64+0x4c/0xa0 [ 141.954822][ T5657] ? clear_bhb_loop+0x50/0xa0 [ 141.959509][ T5657] ? clear_bhb_loop+0x50/0xa0 [ 141.964196][ T5657] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 141.970103][ T5657] RIP: 0033:0x7fdfa1f0c749 [ 141.974525][ T5657] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 141.994149][ T5657] RSP: 002b:00007fdfa0973fe8 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 142.002593][ T5657] RAX: ffffffffffffffda RBX: 00007fdfa2162fa0 RCX: 00007fdfa1f0c749 [ 142.010753][ T5657] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00000000640c7000 [ 142.018845][ T5657] RBP: 00007fdfa0974090 R08: 0000000000000000 R09: 0000000000000000 [ 142.026840][ T5657] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000002 [ 142.034827][ T5657] R13: 00007fdfa2163038 R14: 00007fdfa2162fa0 R15: 00007ffc9621ce88 [ 142.042811][ T5657] [ 142.560348][ T5694] FAULT_INJECTION: forcing a failure. [ 142.560348][ T5694] name fail_usercopy, interval 1, probability 0, space 0, times 1 [ 142.600469][ T5694] CPU: 1 PID: 5694 Comm: syz.0.1609 Tainted: G W syzkaller #0 [ 142.609289][ T5694] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 142.619350][ T5694] Call Trace: [ 142.622633][ T5694] [ 142.625569][ T5694] __dump_stack+0x21/0x30 [ 142.629905][ T5694] dump_stack_lvl+0xee/0x150 [ 142.634492][ T5694] ? show_regs_print_info+0x20/0x20 [ 142.639713][ T5694] dump_stack+0x15/0x20 [ 142.643873][ T5694] should_fail+0x3c1/0x510 [ 142.648305][ T5694] should_fail_usercopy+0x1a/0x20 [ 142.653427][ T5694] _copy_from_iter+0x21a/0x1050 [ 142.658304][ T5694] ? __kasan_check_write+0x14/0x20 [ 142.663411][ T5694] ? skb_set_owner_w+0x24d/0x370 [ 142.668432][ T5694] ? copy_mc_pipe_to_iter+0x770/0x770 [ 142.673800][ T5694] ? __kernel_text_address+0xa0/0x100 [ 142.679189][ T5694] ? check_stack_object+0x81/0x140 [ 142.684297][ T5694] ? __kasan_check_read+0x11/0x20 [ 142.689324][ T5694] ? __check_object_size+0x2f4/0x3c0 [ 142.694778][ T5694] skb_copy_datagram_from_iter+0xfa/0x6b0 [ 142.700588][ T5694] ? skb_put+0x10e/0x1f0 [ 142.705266][ T5694] tun_get_user+0xc3c/0x33c0 [ 142.709853][ T5694] ? __kasan_poison_slab+0x70/0x70 [ 142.714959][ T5694] ? kmem_cache_free+0x100/0x320 [ 142.719894][ T5694] ? __x64_sys_openat+0x136/0x160 [ 142.724925][ T5694] ? x64_sys_call+0x219/0x9a0 [ 142.729598][ T5694] ? tun_do_read+0x1c40/0x1c40 [ 142.734378][ T5694] ? kstrtouint_from_user+0x1a0/0x200 [ 142.739746][ T5694] ? kstrtol_from_user+0x260/0x260 [ 142.744868][ T5694] ? avc_policy_seqno+0x1b/0x70 [ 142.749722][ T5694] ? selinux_file_permission+0x2aa/0x510 [ 142.755443][ T5694] tun_chr_write_iter+0x1eb/0x2e0 [ 142.760468][ T5694] vfs_write+0x802/0xf70 [ 142.764813][ T5694] ? file_end_write+0x1b0/0x1b0 [ 142.769659][ T5694] ? __fget_files+0x2c4/0x320 [ 142.774335][ T5694] ? __fdget_pos+0x1f7/0x380 [ 142.778926][ T5694] ? ksys_write+0x71/0x240 [ 142.783344][ T5694] ksys_write+0x140/0x240 [ 142.787667][ T5694] ? __ia32_sys_read+0x90/0x90 [ 142.792426][ T5694] ? debug_smp_processor_id+0x17/0x20 [ 142.797792][ T5694] __x64_sys_write+0x7b/0x90 [ 142.802379][ T5694] x64_sys_call+0x8ef/0x9a0 [ 142.806880][ T5694] do_syscall_64+0x4c/0xa0 [ 142.811292][ T5694] ? clear_bhb_loop+0x50/0xa0 [ 142.815966][ T5694] ? clear_bhb_loop+0x50/0xa0 [ 142.820637][ T5694] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 142.826529][ T5694] RIP: 0033:0x7fb65282f749 [ 142.830944][ T5694] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 142.850555][ T5694] RSP: 002b:00007fb651297038 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 142.859078][ T5694] RAX: ffffffffffffffda RBX: 00007fb652a85fa0 RCX: 00007fb65282f749 [ 142.867050][ T5694] RDX: 000000000000fdef RSI: 0000200000000000 RDI: 00000000000000c8 [ 142.875020][ T5694] RBP: 00007fb651297090 R08: 0000000000000000 R09: 0000000000000000 [ 142.882988][ T5694] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 142.891391][ T5694] R13: 00007fb652a86038 R14: 00007fb652a85fa0 R15: 00007ffcc21d8aa8 [ 142.899453][ T5694] [ 142.920691][ T5701] FAULT_INJECTION: forcing a failure. [ 142.920691][ T5701] name failslab, interval 1, probability 0, space 0, times 0 [ 143.004066][ T5698] device pim6reg1 entered promiscuous mode [ 143.010484][ T5701] CPU: 0 PID: 5701 Comm: syz.4.1611 Tainted: G W syzkaller #0 [ 143.019276][ T5701] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 143.029426][ T5701] Call Trace: [ 143.032720][ T5701] [ 143.035838][ T5701] __dump_stack+0x21/0x30 [ 143.040188][ T5701] dump_stack_lvl+0xee/0x150 [ 143.045065][ T5701] ? show_regs_print_info+0x20/0x20 [ 143.050280][ T5701] dump_stack+0x15/0x20 [ 143.054459][ T5701] should_fail+0x3c1/0x510 [ 143.058889][ T5701] __should_failslab+0xa4/0xe0 [ 143.063692][ T5701] should_failslab+0x9/0x20 [ 143.068207][ T5701] slab_pre_alloc_hook+0x3b/0xe0 [ 143.073152][ T5701] ? vm_area_dup+0x26/0x210 [ 143.077693][ T5701] kmem_cache_alloc+0x44/0x260 [ 143.082985][ T5701] vm_area_dup+0x26/0x210 [ 143.087339][ T5701] copy_mm+0x93a/0x13a0 [ 143.091538][ T5701] ? copy_signal+0x600/0x600 [ 143.096218][ T5701] ? __init_rwsem+0xfc/0x1d0 [ 143.100826][ T5701] ? copy_signal+0x4cb/0x600 [ 143.105449][ T5701] copy_process+0x115c/0x3210 [ 143.110159][ T5701] ? __kasan_check_write+0x14/0x20 [ 143.115286][ T5701] ? __pidfd_prepare+0x150/0x150 [ 143.120249][ T5701] ? security_file_permission+0x83/0xa0 [ 143.125808][ T5701] kernel_clone+0x23f/0x940 [ 143.130427][ T5701] ? create_io_thread+0x130/0x130 [ 143.135465][ T5701] ? __kasan_check_write+0x14/0x20 [ 143.140585][ T5701] ? mutex_unlock+0x89/0x220 [ 143.145182][ T5701] __x64_sys_clone+0x176/0x1d0 [ 143.149958][ T5701] ? __kasan_check_write+0x14/0x20 [ 143.155360][ T5701] ? __ia32_sys_vfork+0xf0/0xf0 [ 143.160235][ T5701] ? fpregs_assert_state_consistent+0xb1/0xe0 [ 143.166402][ T5701] x64_sys_call+0x41f/0x9a0 [ 143.171184][ T5701] do_syscall_64+0x4c/0xa0 [ 143.175611][ T5701] ? clear_bhb_loop+0x50/0xa0 [ 143.180410][ T5701] ? clear_bhb_loop+0x50/0xa0 [ 143.185094][ T5701] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 143.191005][ T5701] RIP: 0033:0x7fafd04c0749 [ 143.195429][ T5701] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 143.215146][ T5701] RSP: 002b:00007fafcef27fe8 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 143.223581][ T5701] RAX: ffffffffffffffda RBX: 00007fafd0716fa0 RCX: 00007fafd04c0749 [ 143.231572][ T5701] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00000000640c7000 [ 143.239551][ T5701] RBP: 00007fafcef28090 R08: 0000000000000000 R09: 0000000000000000 [ 143.247617][ T5701] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000002 [ 143.256026][ T5701] R13: 00007fafd0717038 R14: 00007fafd0716fa0 R15: 00007ffde0606de8 [ 143.264008][ T5701] [ 143.369363][ T5719] device GPL left promiscuous mode [ 143.376051][ T30] audit: type=1400 audit(1763680861.932:164): avc: denied { create } for pid=5718 comm="syz.2.1617" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rose_socket permissive=1 [ 143.746637][ T5745] device veth0_vlan left promiscuous mode [ 143.757380][ T5745] device veth0_vlan entered promiscuous mode [ 143.766961][ T5750] FAULT_INJECTION: forcing a failure. [ 143.766961][ T5750] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 143.776600][ T333] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 143.788792][ T5750] CPU: 1 PID: 5750 Comm: syz.4.1626 Tainted: G W syzkaller #0 [ 143.789623][ T333] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 143.797573][ T5750] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 143.805187][ T333] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 143.814935][ T5750] Call Trace: [ 143.814942][ T5750] [ 143.814949][ T5750] __dump_stack+0x21/0x30 [ 143.832846][ T5750] dump_stack_lvl+0xee/0x150 [ 143.837472][ T5750] ? show_regs_print_info+0x20/0x20 [ 143.842669][ T5750] ? prep_new_page+0x1c/0x110 [ 143.847348][ T5750] dump_stack+0x15/0x20 [ 143.851499][ T5750] should_fail+0x3c1/0x510 [ 143.855919][ T5750] should_fail_alloc_page+0x55/0x80 [ 143.861208][ T5750] prepare_alloc_pages+0x156/0x600 [ 143.866417][ T5750] ? __alloc_pages_bulk+0xab0/0xab0 [ 143.871640][ T5750] __alloc_pages+0x10a/0x440 [ 143.876241][ T5750] ? prep_new_page+0x110/0x110 [ 143.881013][ T5750] ? unwind_get_return_address+0x4d/0x90 [ 143.886650][ T5750] ? stack_trace_save+0xe0/0xe0 [ 143.891508][ T5750] ? arch_stack_walk+0xee/0x140 [ 143.896361][ T5750] pte_alloc_one+0x70/0x180 [ 143.900870][ T5750] ? pfn_modify_allowed+0x2f0/0x2f0 [ 143.906152][ T5750] ? stack_trace_save+0x98/0xe0 [ 143.911008][ T5750] __pte_alloc+0x75/0x290 [ 143.915338][ T5750] ? __kasan_check_write+0x14/0x20 [ 143.920451][ T5750] ? _raw_spin_lock+0x8e/0xe0 [ 143.925138][ T5750] ? free_pgtables+0x280/0x280 [ 143.929895][ T5750] ? __kasan_check_write+0x14/0x20 [ 143.935010][ T5750] ? add_mm_rss_vec+0x209/0x220 [ 143.940028][ T5750] copy_page_range+0x2348/0x2890 [ 143.944967][ T5750] ? pfn_valid+0x1d0/0x1d0 [ 143.949382][ T5750] copy_mm+0xbe2/0x13a0 [ 143.953538][ T5750] ? copy_signal+0x600/0x600 [ 143.958121][ T5750] ? __init_rwsem+0xfc/0x1d0 [ 143.962715][ T5750] ? copy_signal+0x4cb/0x600 [ 143.967301][ T5750] copy_process+0x115c/0x3210 [ 143.971983][ T5750] ? __kasan_check_write+0x14/0x20 [ 143.977093][ T5750] ? __pidfd_prepare+0x150/0x150 [ 143.982028][ T5750] ? security_file_permission+0x83/0xa0 [ 143.987680][ T5750] kernel_clone+0x23f/0x940 [ 143.992362][ T5750] ? create_io_thread+0x130/0x130 [ 143.997408][ T5750] ? __kasan_check_write+0x14/0x20 [ 144.002530][ T5750] ? mutex_unlock+0x89/0x220 [ 144.007128][ T5750] __x64_sys_clone+0x176/0x1d0 [ 144.012006][ T5750] ? __kasan_check_write+0x14/0x20 [ 144.017141][ T5750] ? __ia32_sys_vfork+0xf0/0xf0 [ 144.022020][ T5750] ? fpregs_assert_state_consistent+0xb1/0xe0 [ 144.028088][ T5750] x64_sys_call+0x41f/0x9a0 [ 144.032589][ T5750] do_syscall_64+0x4c/0xa0 [ 144.037024][ T5750] ? clear_bhb_loop+0x50/0xa0 [ 144.041712][ T5750] ? clear_bhb_loop+0x50/0xa0 [ 144.046484][ T5750] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 144.052556][ T5750] RIP: 0033:0x7fafd04c0749 [ 144.057150][ T5750] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 144.076857][ T5750] RSP: 002b:00007fafcef27fe8 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 144.085552][ T5750] RAX: ffffffffffffffda RBX: 00007fafd0716fa0 RCX: 00007fafd04c0749 [ 144.093544][ T5750] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00000000640c7000 [ 144.101513][ T5750] RBP: 00007fafcef28090 R08: 0000000000000000 R09: 0000000000000000 [ 144.109482][ T5750] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000002 [ 144.117449][ T5750] R13: 00007fafd0717038 R14: 00007fafd0716fa0 R15: 00007ffde0606de8 [ 144.125420][ T5750] [ 144.181372][ T5755] FAULT_INJECTION: forcing a failure. [ 144.181372][ T5755] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 144.194746][ T5755] CPU: 0 PID: 5755 Comm: syz.3.1628 Tainted: G W syzkaller #0 [ 144.203539][ T5755] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 144.213696][ T5755] Call Trace: [ 144.216980][ T5755] [ 144.219906][ T5755] __dump_stack+0x21/0x30 [ 144.224243][ T5755] dump_stack_lvl+0xee/0x150 [ 144.229006][ T5755] ? show_regs_print_info+0x20/0x20 [ 144.234205][ T5755] dump_stack+0x15/0x20 [ 144.238358][ T5755] should_fail+0x3c1/0x510 [ 144.242797][ T5755] should_fail_usercopy+0x1a/0x20 [ 144.247910][ T5755] _copy_to_user+0x20/0x90 [ 144.252331][ T5755] simple_read_from_buffer+0xe9/0x160 [ 144.257702][ T5755] proc_fail_nth_read+0x19a/0x210 [ 144.262721][ T5755] ? proc_fault_inject_write+0x2f0/0x2f0 [ 144.268348][ T5755] ? security_file_permission+0x83/0xa0 [ 144.274064][ T5755] ? proc_fault_inject_write+0x2f0/0x2f0 [ 144.279722][ T5755] vfs_read+0x282/0xbe0 [ 144.284137][ T5755] ? kernel_read+0x1f0/0x1f0 [ 144.288808][ T5755] ? __kasan_check_write+0x14/0x20 [ 144.293916][ T5755] ? mutex_lock+0x95/0x1a0 [ 144.298328][ T5755] ? wait_for_completion_killable_timeout+0x10/0x10 [ 144.304921][ T5755] ? __fget_files+0x2c4/0x320 [ 144.309604][ T5755] ? __fdget_pos+0x2d2/0x380 [ 144.314280][ T5755] ? ksys_read+0x71/0x240 [ 144.318731][ T5755] ksys_read+0x140/0x240 [ 144.322968][ T5755] ? vfs_write+0xf70/0xf70 [ 144.327382][ T5755] ? __kasan_check_write+0x14/0x20 [ 144.332494][ T5755] ? switch_fpu_return+0x15d/0x2c0 [ 144.337607][ T5755] __x64_sys_read+0x7b/0x90 [ 144.342108][ T5755] x64_sys_call+0x96d/0x9a0 [ 144.346610][ T5755] do_syscall_64+0x4c/0xa0 [ 144.351028][ T5755] ? clear_bhb_loop+0x50/0xa0 [ 144.355761][ T5755] ? clear_bhb_loop+0x50/0xa0 [ 144.360456][ T5755] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 144.366449][ T5755] RIP: 0033:0x7fdfa1f0b15c [ 144.370865][ T5755] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 93 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 ef 93 02 00 48 [ 144.390469][ T5755] RSP: 002b:00007fdfa0974030 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 144.398883][ T5755] RAX: ffffffffffffffda RBX: 00007fdfa2162fa0 RCX: 00007fdfa1f0b15c [ 144.406852][ T5755] RDX: 000000000000000f RSI: 00007fdfa09740a0 RDI: 0000000000000009 [ 144.414819][ T5755] RBP: 00007fdfa0974090 R08: 0000000000000000 R09: 0000000000000000 [ 144.422798][ T5755] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 144.430782][ T5755] R13: 00007fdfa2163038 R14: 00007fdfa2162fa0 R15: 00007ffc9621ce88 [ 144.438781][ T5755] [ 146.381491][ T5799] FAULT_INJECTION: forcing a failure. [ 146.381491][ T5799] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 146.551977][ T5799] CPU: 1 PID: 5799 Comm: syz.2.1639 Tainted: G W syzkaller #0 [ 146.560800][ T5799] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 146.570862][ T5799] Call Trace: [ 146.574152][ T5799] [ 146.577187][ T5799] __dump_stack+0x21/0x30 [ 146.581539][ T5799] dump_stack_lvl+0xee/0x150 [ 146.586143][ T5799] ? show_regs_print_info+0x20/0x20 [ 146.591353][ T5799] ? prep_new_page+0x1c/0x110 [ 146.596040][ T5799] dump_stack+0x15/0x20 [ 146.600206][ T5799] should_fail+0x3c1/0x510 [ 146.604810][ T5799] should_fail_alloc_page+0x55/0x80 [ 146.610020][ T5799] prepare_alloc_pages+0x156/0x600 [ 146.615234][ T5799] ? __alloc_pages_bulk+0xab0/0xab0 [ 146.620542][ T5799] __alloc_pages+0x10a/0x440 [ 146.625147][ T5799] ? prep_new_page+0x110/0x110 [ 146.630189][ T5799] ? __mod_node_page_state+0x9e/0xd0 [ 146.635489][ T5799] ? __mod_lruvec_page_state+0x15d/0x1c0 [ 146.641142][ T5799] pte_alloc_one+0x70/0x180 [ 146.645750][ T5799] ? pfn_modify_allowed+0x2f0/0x2f0 [ 146.651136][ T5799] ? stack_trace_save+0x98/0xe0 [ 146.655995][ T5799] __pte_alloc+0x75/0x290 [ 146.660336][ T5799] ? __kasan_check_write+0x14/0x20 [ 146.665459][ T5799] ? _raw_spin_lock+0x8e/0xe0 [ 146.670149][ T5799] ? free_pgtables+0x280/0x280 [ 146.675008][ T5799] ? __kasan_check_write+0x14/0x20 [ 146.680134][ T5799] ? add_mm_rss_vec+0x209/0x220 [ 146.684999][ T5799] copy_page_range+0x2348/0x2890 [ 146.689955][ T5799] ? pfn_valid+0x1d0/0x1d0 [ 146.694388][ T5799] copy_mm+0xbe2/0x13a0 [ 146.698562][ T5799] ? copy_signal+0x600/0x600 [ 146.703162][ T5799] ? __init_rwsem+0xfc/0x1d0 [ 146.707763][ T5799] ? copy_signal+0x4cb/0x600 [ 146.712363][ T5799] copy_process+0x115c/0x3210 [ 146.717062][ T5799] ? __kasan_check_write+0x14/0x20 [ 146.722187][ T5799] ? __pidfd_prepare+0x150/0x150 [ 146.727250][ T5799] ? security_file_permission+0x83/0xa0 [ 146.732809][ T5799] kernel_clone+0x23f/0x940 [ 146.737415][ T5799] ? create_io_thread+0x130/0x130 [ 146.742454][ T5799] ? __kasan_check_write+0x14/0x20 [ 146.747589][ T5799] ? mutex_unlock+0x89/0x220 [ 146.752295][ T5799] __x64_sys_clone+0x176/0x1d0 [ 146.757078][ T5799] ? __kasan_check_write+0x14/0x20 [ 146.762212][ T5799] ? __ia32_sys_vfork+0xf0/0xf0 [ 146.767086][ T5799] ? fpregs_assert_state_consistent+0xb1/0xe0 [ 146.773174][ T5799] x64_sys_call+0x41f/0x9a0 [ 146.777950][ T5799] do_syscall_64+0x4c/0xa0 [ 146.782671][ T5799] ? clear_bhb_loop+0x50/0xa0 [ 146.787450][ T5799] ? clear_bhb_loop+0x50/0xa0 [ 146.792142][ T5799] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 146.798050][ T5799] RIP: 0033:0x7f704b487749 [ 146.802575][ T5799] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 146.822517][ T5799] RSP: 002b:00007f7049eeefe8 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 146.831238][ T5799] RAX: ffffffffffffffda RBX: 00007f704b6ddfa0 RCX: 00007f704b487749 [ 146.839219][ T5799] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00000000640c7000 [ 146.847291][ T5799] RBP: 00007f7049eef090 R08: 0000000000000000 R09: 0000000000000000 [ 146.855312][ T5799] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000002 [ 146.863295][ T5799] R13: 00007f704b6de038 R14: 00007f704b6ddfa0 R15: 00007ffdb08e0f28 [ 146.871281][ T5799] [ 147.698152][ T5854] FAULT_INJECTION: forcing a failure. [ 147.698152][ T5854] name failslab, interval 1, probability 0, space 0, times 0 [ 147.715760][ T5854] CPU: 1 PID: 5854 Comm: syz.2.1655 Tainted: G W syzkaller #0 [ 147.724656][ T5854] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 147.734733][ T5854] Call Trace: [ 147.738035][ T5854] [ 147.741001][ T5854] __dump_stack+0x21/0x30 [ 147.745580][ T5854] dump_stack_lvl+0xee/0x150 [ 147.750197][ T5854] ? show_regs_print_info+0x20/0x20 [ 147.755427][ T5854] dump_stack+0x15/0x20 [ 147.759803][ T5854] should_fail+0x3c1/0x510 [ 147.764247][ T5854] __should_failslab+0xa4/0xe0 [ 147.769043][ T5854] should_failslab+0x9/0x20 [ 147.773588][ T5854] slab_pre_alloc_hook+0x3b/0xe0 [ 147.778639][ T5854] ? vm_area_dup+0x26/0x210 [ 147.783168][ T5854] kmem_cache_alloc+0x44/0x260 [ 147.787953][ T5854] vm_area_dup+0x26/0x210 [ 147.792376][ T5854] copy_mm+0x93a/0x13a0 [ 147.796530][ T5854] ? copy_signal+0x600/0x600 [ 147.801109][ T5854] ? __init_rwsem+0xfc/0x1d0 [ 147.805690][ T5854] ? copy_signal+0x4cb/0x600 [ 147.810270][ T5854] copy_process+0x115c/0x3210 [ 147.815037][ T5854] ? __kasan_check_write+0x14/0x20 [ 147.820140][ T5854] ? __pidfd_prepare+0x150/0x150 [ 147.825075][ T5854] ? security_file_permission+0x83/0xa0 [ 147.830706][ T5854] kernel_clone+0x23f/0x940 [ 147.835225][ T5854] ? create_io_thread+0x130/0x130 [ 147.840369][ T5854] ? __kasan_check_write+0x14/0x20 [ 147.845513][ T5854] ? mutex_unlock+0x89/0x220 [ 147.850229][ T5854] __x64_sys_clone+0x176/0x1d0 [ 147.855011][ T5854] ? __kasan_check_write+0x14/0x20 [ 147.860421][ T5854] ? __ia32_sys_vfork+0xf0/0xf0 [ 147.865297][ T5854] ? fpregs_assert_state_consistent+0xb1/0xe0 [ 147.871383][ T5854] x64_sys_call+0x41f/0x9a0 [ 147.876129][ T5854] do_syscall_64+0x4c/0xa0 [ 147.880702][ T5854] ? clear_bhb_loop+0x50/0xa0 [ 147.885391][ T5854] ? clear_bhb_loop+0x50/0xa0 [ 147.890190][ T5854] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 147.896099][ T5854] RIP: 0033:0x7f704b487749 [ 147.900528][ T5854] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 147.920154][ T5854] RSP: 002b:00007f7049eeefe8 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 147.928587][ T5854] RAX: ffffffffffffffda RBX: 00007f704b6ddfa0 RCX: 00007f704b487749 [ 147.936561][ T5854] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00000000640c7000 [ 147.944620][ T5854] RBP: 00007f7049eef090 R08: 0000000000000000 R09: 0000000000000000 [ 147.952588][ T5854] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000002 [ 147.960647][ T5854] R13: 00007f704b6de038 R14: 00007f704b6ddfa0 R15: 00007ffdb08e0f28 [ 147.968623][ T5854] [ 147.996031][ T5861] device ip6_vti0 entered promiscuous mode [ 148.226180][ T5885] syz.2.1665[5885] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 148.226252][ T5885] syz.2.1665[5885] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 148.314683][ T5894] FAULT_INJECTION: forcing a failure. [ 148.314683][ T5894] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 148.316202][ T5891] device veth0_vlan left promiscuous mode [ 148.326183][ T5894] CPU: 1 PID: 5894 Comm: syz.2.1669 Tainted: G W syzkaller #0 [ 148.326208][ T5894] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 148.326219][ T5894] Call Trace: [ 148.326226][ T5894] [ 148.370468][ T5894] __dump_stack+0x21/0x30 [ 148.374911][ T5894] dump_stack_lvl+0xee/0x150 [ 148.379521][ T5894] ? show_regs_print_info+0x20/0x20 [ 148.384732][ T5894] dump_stack+0x15/0x20 [ 148.388897][ T5894] should_fail+0x3c1/0x510 [ 148.393401][ T5894] should_fail_alloc_page+0x55/0x80 [ 148.398777][ T5894] prepare_alloc_pages+0x156/0x600 [ 148.404323][ T5894] ? __alloc_pages_bulk+0xab0/0xab0 [ 148.409521][ T5894] __alloc_pages+0x10a/0x440 [ 148.414109][ T5894] ? prep_new_page+0x110/0x110 [ 148.419133][ T5894] ? __mod_node_page_state+0x9e/0xd0 [ 148.424415][ T5894] ? __mod_lruvec_page_state+0x15d/0x1c0 [ 148.430226][ T5894] pte_alloc_one+0x70/0x180 [ 148.434900][ T5894] ? pfn_modify_allowed+0x2f0/0x2f0 [ 148.440111][ T5894] ? stack_trace_save+0x98/0xe0 [ 148.445059][ T5894] __pte_alloc+0x75/0x290 [ 148.449474][ T5894] ? __kasan_check_write+0x14/0x20 [ 148.454672][ T5894] ? _raw_spin_lock+0x8e/0xe0 [ 148.459348][ T5894] ? free_pgtables+0x280/0x280 [ 148.464109][ T5894] ? __kasan_check_write+0x14/0x20 [ 148.469219][ T5894] ? add_mm_rss_vec+0x209/0x220 [ 148.474349][ T5894] copy_page_range+0x2348/0x2890 [ 148.479379][ T5894] ? pfn_valid+0x1d0/0x1d0 [ 148.483883][ T5894] copy_mm+0xbe2/0x13a0 [ 148.488253][ T5894] ? copy_signal+0x600/0x600 [ 148.492947][ T5894] ? __init_rwsem+0xfc/0x1d0 [ 148.497707][ T5894] ? copy_signal+0x4cb/0x600 [ 148.502306][ T5894] copy_process+0x115c/0x3210 [ 148.507091][ T5894] ? __kasan_check_write+0x14/0x20 [ 148.512201][ T5894] ? __pidfd_prepare+0x150/0x150 [ 148.517224][ T5894] ? security_file_permission+0x83/0xa0 [ 148.522772][ T5894] kernel_clone+0x23f/0x940 [ 148.527283][ T5894] ? create_io_thread+0x130/0x130 [ 148.532391][ T5894] ? __kasan_check_write+0x14/0x20 [ 148.537499][ T5894] ? mutex_unlock+0x89/0x220 [ 148.542086][ T5894] __x64_sys_clone+0x176/0x1d0 [ 148.546848][ T5894] ? __kasan_check_write+0x14/0x20 [ 148.552042][ T5894] ? __ia32_sys_vfork+0xf0/0xf0 [ 148.556902][ T5894] ? fpregs_assert_state_consistent+0xb1/0xe0 [ 148.562966][ T5894] x64_sys_call+0x41f/0x9a0 [ 148.567466][ T5894] do_syscall_64+0x4c/0xa0 [ 148.571890][ T5894] ? clear_bhb_loop+0x50/0xa0 [ 148.576738][ T5894] ? clear_bhb_loop+0x50/0xa0 [ 148.581412][ T5894] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 148.587330][ T5894] RIP: 0033:0x7f704b487749 [ 148.591844][ T5894] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 148.611826][ T5894] RSP: 002b:00007f7049eeefe8 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 148.620254][ T5894] RAX: ffffffffffffffda RBX: 00007f704b6ddfa0 RCX: 00007f704b487749 [ 148.628233][ T5894] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00000000640c7000 [ 148.636201][ T5894] RBP: 00007f7049eef090 R08: 0000000000000000 R09: 0000000000000000 [ 148.644169][ T5894] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000002 [ 148.652222][ T5894] R13: 00007f704b6de038 R14: 00007f704b6ddfa0 R15: 00007ffdb08e0f28 [ 148.660370][ T5894] [ 148.680825][ T5891] device veth0_vlan entered promiscuous mode [ 148.704876][ T470] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 148.714342][ T470] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 148.727233][ T470] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 148.952313][ T5938] FAULT_INJECTION: forcing a failure. [ 148.952313][ T5938] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 149.044995][ T5938] CPU: 0 PID: 5938 Comm: syz.2.1681 Tainted: G W syzkaller #0 [ 149.053815][ T5938] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 149.063895][ T5938] Call Trace: [ 149.067190][ T5938] [ 149.070135][ T5938] __dump_stack+0x21/0x30 [ 149.074506][ T5938] dump_stack_lvl+0xee/0x150 [ 149.079763][ T5938] ? show_regs_print_info+0x20/0x20 [ 149.084978][ T5938] ? __mod_node_page_state+0x9e/0xd0 [ 149.090285][ T5938] ? __mod_lruvec_page_state+0x15d/0x1c0 [ 149.096038][ T5938] dump_stack+0x15/0x20 [ 149.100386][ T5938] should_fail+0x3c1/0x510 [ 149.104823][ T5938] should_fail_alloc_page+0x55/0x80 [ 149.110036][ T5938] prepare_alloc_pages+0x156/0x600 [ 149.115166][ T5938] ? __alloc_pages_bulk+0xab0/0xab0 [ 149.120399][ T5938] ? __kasan_check_write+0x14/0x20 [ 149.125642][ T5938] ? add_mm_rss_vec+0x209/0x220 [ 149.130517][ T5938] __alloc_pages+0x10a/0x440 [ 149.135222][ T5938] ? prep_new_page+0x110/0x110 [ 149.140009][ T5938] new_slab+0xa1/0x4d0 [ 149.144186][ T5938] ___slab_alloc+0x381/0x810 [ 149.148890][ T5938] ? vm_area_dup+0x26/0x210 [ 149.153442][ T5938] ? vm_area_dup+0x26/0x210 [ 149.158064][ T5938] __slab_alloc+0x49/0x90 [ 149.162523][ T5938] ? vm_area_dup+0x26/0x210 [ 149.167041][ T5938] kmem_cache_alloc+0x138/0x260 [ 149.171917][ T5938] vm_area_dup+0x26/0x210 [ 149.176261][ T5938] copy_mm+0x93a/0x13a0 [ 149.180421][ T5938] ? copy_signal+0x600/0x600 [ 149.185015][ T5938] ? __init_rwsem+0xfc/0x1d0 [ 149.189603][ T5938] ? copy_signal+0x4cb/0x600 [ 149.194278][ T5938] copy_process+0x115c/0x3210 [ 149.198969][ T5938] ? __kasan_check_write+0x14/0x20 [ 149.204214][ T5938] ? __pidfd_prepare+0x150/0x150 [ 149.209507][ T5938] ? security_file_permission+0x83/0xa0 [ 149.215058][ T5938] kernel_clone+0x23f/0x940 [ 149.219567][ T5938] ? create_io_thread+0x130/0x130 [ 149.224691][ T5938] ? __kasan_check_write+0x14/0x20 [ 149.229802][ T5938] ? mutex_unlock+0x89/0x220 [ 149.234392][ T5938] __x64_sys_clone+0x176/0x1d0 [ 149.239164][ T5938] ? __kasan_check_write+0x14/0x20 [ 149.244273][ T5938] ? __ia32_sys_vfork+0xf0/0xf0 [ 149.249128][ T5938] ? fpregs_assert_state_consistent+0xb1/0xe0 [ 149.255193][ T5938] x64_sys_call+0x41f/0x9a0 [ 149.259791][ T5938] do_syscall_64+0x4c/0xa0 [ 149.264298][ T5938] ? clear_bhb_loop+0x50/0xa0 [ 149.268972][ T5938] ? clear_bhb_loop+0x50/0xa0 [ 149.273758][ T5938] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 149.279692][ T5938] RIP: 0033:0x7f704b487749 [ 149.284199][ T5938] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 149.303974][ T5938] RSP: 002b:00007f7049eeefe8 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 149.312390][ T5938] RAX: ffffffffffffffda RBX: 00007f704b6ddfa0 RCX: 00007f704b487749 [ 149.320375][ T5938] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00000000640c7000 [ 149.328342][ T5938] RBP: 00007f7049eef090 R08: 0000000000000000 R09: 0000000000000000 [ 149.336313][ T5938] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000002 [ 149.344366][ T5938] R13: 00007f704b6de038 R14: 00007f704b6ddfa0 R15: 00007ffdb08e0f28 [ 149.352436][ T5938] [ 149.899117][ T5984] device veth1_macvtap entered promiscuous mode [ 149.924325][ T5984] device macsec0 entered promiscuous mode [ 149.978911][ T470] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 150.330089][ T5996] FAULT_INJECTION: forcing a failure. [ 150.330089][ T5996] name failslab, interval 1, probability 0, space 0, times 0 [ 150.352138][ T5996] CPU: 1 PID: 5996 Comm: syz.3.1699 Tainted: G W syzkaller #0 [ 150.360948][ T5996] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 150.371021][ T5996] Call Trace: [ 150.374316][ T5996] [ 150.377251][ T5996] __dump_stack+0x21/0x30 [ 150.381595][ T5996] dump_stack_lvl+0xee/0x150 [ 150.386195][ T5996] ? show_regs_print_info+0x20/0x20 [ 150.391405][ T5996] dump_stack+0x15/0x20 [ 150.395571][ T5996] should_fail+0x3c1/0x510 [ 150.400002][ T5996] __should_failslab+0xa4/0xe0 [ 150.404778][ T5996] should_failslab+0x9/0x20 [ 150.409291][ T5996] slab_pre_alloc_hook+0x3b/0xe0 [ 150.414244][ T5996] ? vm_area_dup+0x26/0x210 [ 150.418765][ T5996] kmem_cache_alloc+0x44/0x260 [ 150.423545][ T5996] vm_area_dup+0x26/0x210 [ 150.427890][ T5996] copy_mm+0x93a/0x13a0 [ 150.432056][ T5996] ? copy_signal+0x600/0x600 [ 150.436659][ T5996] ? __init_rwsem+0xfc/0x1d0 [ 150.441274][ T5996] ? copy_signal+0x4cb/0x600 [ 150.445875][ T5996] copy_process+0x115c/0x3210 [ 150.450570][ T5996] ? __kasan_check_write+0x14/0x20 [ 150.455698][ T5996] ? __pidfd_prepare+0x150/0x150 [ 150.460656][ T5996] ? security_file_permission+0x83/0xa0 [ 150.466223][ T5996] kernel_clone+0x23f/0x940 [ 150.470744][ T5996] ? create_io_thread+0x130/0x130 [ 150.475783][ T5996] ? __kasan_check_write+0x14/0x20 [ 150.480906][ T5996] ? mutex_unlock+0x89/0x220 [ 150.485521][ T5996] __x64_sys_clone+0x176/0x1d0 [ 150.490295][ T5996] ? __kasan_check_write+0x14/0x20 [ 150.495423][ T5996] ? __ia32_sys_vfork+0xf0/0xf0 [ 150.500297][ T5996] ? fpregs_assert_state_consistent+0xb1/0xe0 [ 150.506389][ T5996] x64_sys_call+0x41f/0x9a0 [ 150.510918][ T5996] do_syscall_64+0x4c/0xa0 [ 150.515347][ T5996] ? clear_bhb_loop+0x50/0xa0 [ 150.520045][ T5996] ? clear_bhb_loop+0x50/0xa0 [ 150.524739][ T5996] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 150.530651][ T5996] RIP: 0033:0x7fdfa1f0c749 [ 150.535083][ T5996] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 150.554920][ T5996] RSP: 002b:00007fdfa0973fe8 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 150.563451][ T5996] RAX: ffffffffffffffda RBX: 00007fdfa2162fa0 RCX: 00007fdfa1f0c749 [ 150.571533][ T5996] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00000000640c7000 [ 150.579735][ T5996] RBP: 00007fdfa0974090 R08: 0000000000000000 R09: 0000000000000000 [ 150.587726][ T5996] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000002 [ 150.595720][ T5996] R13: 00007fdfa2163038 R14: 00007fdfa2162fa0 R15: 00007ffc9621ce88 [ 150.603719][ T5996] [ 150.853116][ T6010] device sit0 left promiscuous mode [ 150.997270][ T6014] device veth1_vlan entered promiscuous mode [ 151.023661][ T6026] device pim6reg1 entered promiscuous mode [ 151.280778][ T6047] FAULT_INJECTION: forcing a failure. [ 151.280778][ T6047] name failslab, interval 1, probability 0, space 0, times 0 [ 151.424890][ T6047] CPU: 0 PID: 6047 Comm: syz.2.1715 Tainted: G W syzkaller #0 [ 151.433987][ T6047] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 151.444153][ T6047] Call Trace: [ 151.447449][ T6047] [ 151.450398][ T6047] __dump_stack+0x21/0x30 [ 151.454845][ T6047] dump_stack_lvl+0xee/0x150 [ 151.459696][ T6047] ? show_regs_print_info+0x20/0x20 [ 151.464999][ T6047] dump_stack+0x15/0x20 [ 151.469171][ T6047] should_fail+0x3c1/0x510 [ 151.473783][ T6047] __should_failslab+0xa4/0xe0 [ 151.478740][ T6047] should_failslab+0x9/0x20 [ 151.483349][ T6047] slab_pre_alloc_hook+0x3b/0xe0 [ 151.488395][ T6047] ? vm_area_dup+0x26/0x210 [ 151.492953][ T6047] kmem_cache_alloc+0x44/0x260 [ 151.497743][ T6047] vm_area_dup+0x26/0x210 [ 151.502179][ T6047] copy_mm+0x93a/0x13a0 [ 151.506351][ T6047] ? copy_signal+0x600/0x600 [ 151.510953][ T6047] ? __init_rwsem+0xfc/0x1d0 [ 151.515641][ T6047] ? copy_signal+0x4cb/0x600 [ 151.520246][ T6047] copy_process+0x115c/0x3210 [ 151.524986][ T6047] ? __kasan_check_write+0x14/0x20 [ 151.530119][ T6047] ? __pidfd_prepare+0x150/0x150 [ 151.535261][ T6047] ? security_file_permission+0x83/0xa0 [ 151.540825][ T6047] kernel_clone+0x23f/0x940 [ 151.545525][ T6047] ? create_io_thread+0x130/0x130 [ 151.550647][ T6047] ? __kasan_check_write+0x14/0x20 [ 151.555864][ T6047] ? mutex_unlock+0x89/0x220 [ 151.560664][ T6047] __x64_sys_clone+0x176/0x1d0 [ 151.565528][ T6047] ? __kasan_check_write+0x14/0x20 [ 151.570752][ T6047] ? __ia32_sys_vfork+0xf0/0xf0 [ 151.575625][ T6047] ? fpregs_assert_state_consistent+0xb1/0xe0 [ 151.581720][ T6047] x64_sys_call+0x41f/0x9a0 [ 151.586245][ T6047] do_syscall_64+0x4c/0xa0 [ 151.590678][ T6047] ? clear_bhb_loop+0x50/0xa0 [ 151.595364][ T6047] ? clear_bhb_loop+0x50/0xa0 [ 151.600060][ T6047] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 151.606229][ T6047] RIP: 0033:0x7f704b487749 [ 151.610757][ T6047] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 151.630793][ T6047] RSP: 002b:00007f7049eeefe8 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 151.639317][ T6047] RAX: ffffffffffffffda RBX: 00007f704b6ddfa0 RCX: 00007f704b487749 [ 151.647397][ T6047] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00000000640c7000 [ 151.655572][ T6047] RBP: 00007f7049eef090 R08: 0000000000000000 R09: 0000000000000000 [ 151.663560][ T6047] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000002 [ 151.671547][ T6047] R13: 00007f704b6de038 R14: 00007f704b6ddfa0 R15: 00007ffdb08e0f28 [ 151.679585][ T6047] [ 152.062777][ T6073] device syzkaller0 entered promiscuous mode [ 152.074797][ T6073] PF_CAN: dropped non conform CAN FD skbuff: dev type 65534, len 65487 [ 152.389679][ T6097] FAULT_INJECTION: forcing a failure. [ 152.389679][ T6097] name failslab, interval 1, probability 0, space 0, times 0 [ 152.405337][ T6097] CPU: 1 PID: 6097 Comm: syz.3.1728 Tainted: G W syzkaller #0 [ 152.414147][ T6097] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 152.424423][ T6097] Call Trace: [ 152.427719][ T6097] [ 152.430663][ T6097] __dump_stack+0x21/0x30 [ 152.435017][ T6097] dump_stack_lvl+0xee/0x150 [ 152.439622][ T6097] ? show_regs_print_info+0x20/0x20 [ 152.444925][ T6097] dump_stack+0x15/0x20 [ 152.449105][ T6097] should_fail+0x3c1/0x510 [ 152.453532][ T6097] __should_failslab+0xa4/0xe0 [ 152.458350][ T6097] should_failslab+0x9/0x20 [ 152.462866][ T6097] slab_pre_alloc_hook+0x3b/0xe0 [ 152.467938][ T6097] ? anon_vma_clone+0xc0/0x500 [ 152.472801][ T6097] kmem_cache_alloc+0x44/0x260 [ 152.477578][ T6097] anon_vma_clone+0xc0/0x500 [ 152.482178][ T6097] ? debug_smp_processor_id+0x17/0x20 [ 152.487577][ T6097] anon_vma_fork+0x8c/0x510 [ 152.492092][ T6097] copy_mm+0x9d1/0x13a0 [ 152.496258][ T6097] ? copy_signal+0x600/0x600 [ 152.500855][ T6097] ? __init_rwsem+0xfc/0x1d0 [ 152.505513][ T6097] ? copy_signal+0x4cb/0x600 [ 152.510116][ T6097] copy_process+0x115c/0x3210 [ 152.514807][ T6097] ? __kasan_check_write+0x14/0x20 [ 152.519935][ T6097] ? __pidfd_prepare+0x150/0x150 [ 152.525008][ T6097] ? security_file_permission+0x83/0xa0 [ 152.530566][ T6097] kernel_clone+0x23f/0x940 [ 152.535080][ T6097] ? create_io_thread+0x130/0x130 [ 152.540118][ T6097] ? __kasan_check_write+0x14/0x20 [ 152.545255][ T6097] ? mutex_unlock+0x89/0x220 [ 152.549954][ T6097] __x64_sys_clone+0x176/0x1d0 [ 152.554824][ T6097] ? __kasan_check_write+0x14/0x20 [ 152.559950][ T6097] ? __ia32_sys_vfork+0xf0/0xf0 [ 152.564907][ T6097] ? fpregs_assert_state_consistent+0xb1/0xe0 [ 152.570998][ T6097] x64_sys_call+0x41f/0x9a0 [ 152.575519][ T6097] do_syscall_64+0x4c/0xa0 [ 152.580149][ T6097] ? clear_bhb_loop+0x50/0xa0 [ 152.585010][ T6097] ? clear_bhb_loop+0x50/0xa0 [ 152.589789][ T6097] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 152.595696][ T6097] RIP: 0033:0x7fdfa1f0c749 [ 152.600223][ T6097] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 152.619857][ T6097] RSP: 002b:00007fdfa0973fe8 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 152.628491][ T6097] RAX: ffffffffffffffda RBX: 00007fdfa2162fa0 RCX: 00007fdfa1f0c749 [ 152.636593][ T6097] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00000000640c7000 [ 152.644625][ T6097] RBP: 00007fdfa0974090 R08: 0000000000000000 R09: 0000000000000000 [ 152.652604][ T6097] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000002 [ 152.660577][ T6097] R13: 00007fdfa2163038 R14: 00007fdfa2162fa0 R15: 00007ffc9621ce88 [ 152.668560][ T6097] [ 152.748002][ T30] audit: type=1400 audit(1763680871.302:165): avc: denied { create } for pid=6110 comm="syz.1.1732" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_nflog_socket permissive=1 [ 152.784422][ T6111] syz.1.1732[6111] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 152.796005][ T6111] syz.1.1732[6111] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 152.913749][ T6113] device pim6reg1 entered promiscuous mode [ 153.104208][ T6128] device pim6reg1 entered promiscuous mode [ 153.157134][ T6126] device sit0 left promiscuous mode [ 153.255602][ T6137] device veth1_to_team entered promiscuous mode [ 153.354596][ T6151] FAULT_INJECTION: forcing a failure. [ 153.354596][ T6151] name failslab, interval 1, probability 0, space 0, times 0 [ 153.367681][ T30] audit: type=1400 audit(1763680871.932:166): avc: denied { create } for pid=6157 comm="syz.2.1746" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rxrpc_socket permissive=1 [ 153.387540][ T6151] CPU: 0 PID: 6151 Comm: syz.4.1744 Tainted: G W syzkaller #0 [ 153.396337][ T6151] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 153.406580][ T6151] Call Trace: [ 153.409875][ T6151] [ 153.412822][ T6151] __dump_stack+0x21/0x30 [ 153.417164][ T6151] dump_stack_lvl+0xee/0x150 [ 153.421767][ T6151] ? show_regs_print_info+0x20/0x20 [ 153.427003][ T6151] dump_stack+0x15/0x20 [ 153.431170][ T6151] should_fail+0x3c1/0x510 [ 153.435610][ T6151] __should_failslab+0xa4/0xe0 [ 153.440506][ T6151] should_failslab+0x9/0x20 [ 153.445109][ T6151] slab_pre_alloc_hook+0x3b/0xe0 [ 153.450081][ T6151] ? vm_area_dup+0x26/0x210 [ 153.454594][ T6151] kmem_cache_alloc+0x44/0x260 [ 153.459452][ T6151] vm_area_dup+0x26/0x210 [ 153.463790][ T6151] copy_mm+0x93a/0x13a0 [ 153.468088][ T6151] ? copy_signal+0x600/0x600 [ 153.472699][ T6151] ? __init_rwsem+0xfc/0x1d0 [ 153.477298][ T6151] ? copy_signal+0x4cb/0x600 [ 153.481898][ T6151] copy_process+0x115c/0x3210 [ 153.486610][ T6151] ? __kasan_check_write+0x14/0x20 [ 153.491749][ T6151] ? __pidfd_prepare+0x150/0x150 [ 153.496711][ T6151] ? security_file_permission+0x83/0xa0 [ 153.502276][ T6151] kernel_clone+0x23f/0x940 [ 153.506879][ T6151] ? create_io_thread+0x130/0x130 [ 153.511919][ T6151] ? __kasan_check_write+0x14/0x20 [ 153.517148][ T6151] ? mutex_unlock+0x89/0x220 [ 153.521748][ T6151] __x64_sys_clone+0x176/0x1d0 [ 153.526639][ T6151] ? __kasan_check_write+0x14/0x20 [ 153.531877][ T6151] ? __ia32_sys_vfork+0xf0/0xf0 [ 153.536829][ T6151] ? fpregs_assert_state_consistent+0xb1/0xe0 [ 153.542910][ T6151] x64_sys_call+0x41f/0x9a0 [ 153.547425][ T6151] do_syscall_64+0x4c/0xa0 [ 153.551938][ T6151] ? clear_bhb_loop+0x50/0xa0 [ 153.556626][ T6151] ? clear_bhb_loop+0x50/0xa0 [ 153.561410][ T6151] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 153.567312][ T6151] RIP: 0033:0x7fafd04c0749 [ 153.571742][ T6151] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 153.591777][ T6151] RSP: 002b:00007fafcef27fe8 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 153.600296][ T6151] RAX: ffffffffffffffda RBX: 00007fafd0716fa0 RCX: 00007fafd04c0749 [ 153.608438][ T6151] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00000000640c7000 [ 153.616589][ T6151] RBP: 00007fafcef28090 R08: 0000000000000000 R09: 0000000000000000 [ 153.624661][ T6151] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000002 [ 153.632657][ T6151] R13: 00007fafd0717038 R14: 00007fafd0716fa0 R15: 00007ffde0606de8 [ 153.640655][ T6151] [ 154.242417][ T6206] FAULT_INJECTION: forcing a failure. [ 154.242417][ T6206] name failslab, interval 1, probability 0, space 0, times 0 [ 154.329126][ T6206] CPU: 0 PID: 6206 Comm: syz.2.1760 Tainted: G W syzkaller #0 [ 154.338040][ T6206] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 154.348299][ T6206] Call Trace: [ 154.351687][ T6206] [ 154.354715][ T6206] __dump_stack+0x21/0x30 [ 154.359073][ T6206] dump_stack_lvl+0xee/0x150 [ 154.363676][ T6206] ? show_regs_print_info+0x20/0x20 [ 154.368888][ T6206] dump_stack+0x15/0x20 [ 154.373169][ T6206] should_fail+0x3c1/0x510 [ 154.377608][ T6206] __should_failslab+0xa4/0xe0 [ 154.382471][ T6206] should_failslab+0x9/0x20 [ 154.386992][ T6206] slab_pre_alloc_hook+0x3b/0xe0 [ 154.391945][ T6206] ? vm_area_dup+0x26/0x210 [ 154.396464][ T6206] kmem_cache_alloc+0x44/0x260 [ 154.401240][ T6206] vm_area_dup+0x26/0x210 [ 154.405586][ T6206] copy_mm+0x93a/0x13a0 [ 154.409774][ T6206] ? copy_signal+0x600/0x600 [ 154.414558][ T6206] ? __init_rwsem+0xfc/0x1d0 [ 154.419363][ T6206] ? copy_signal+0x4cb/0x600 [ 154.424043][ T6206] copy_process+0x115c/0x3210 [ 154.428753][ T6206] ? __kasan_check_write+0x14/0x20 [ 154.433973][ T6206] ? __pidfd_prepare+0x150/0x150 [ 154.439030][ T6206] ? _raw_spin_lock_irqsave+0xb0/0x110 [ 154.444808][ T6206] ? _raw_spin_lock+0xe0/0xe0 [ 154.449591][ T6206] kernel_clone+0x23f/0x940 [ 154.454230][ T6206] ? _raw_spin_unlock_irqrestore+0x5b/0x80 [ 154.460224][ T6206] ? create_io_thread+0x130/0x130 [ 154.465265][ T6206] ? __kasan_check_write+0x14/0x20 [ 154.470563][ T6206] ? mutex_unlock+0x89/0x220 [ 154.475261][ T6206] __x64_sys_clone+0x176/0x1d0 [ 154.480055][ T6206] ? __ia32_sys_vfork+0xf0/0xf0 [ 154.484942][ T6206] ? __bpf_trace_sys_enter+0x62/0x70 [ 154.490374][ T6206] ? trace_sys_enter+0x3d/0x50 [ 154.495216][ T6206] x64_sys_call+0x41f/0x9a0 [ 154.499825][ T6206] do_syscall_64+0x4c/0xa0 [ 154.504258][ T6206] ? clear_bhb_loop+0x50/0xa0 [ 154.508952][ T6206] ? clear_bhb_loop+0x50/0xa0 [ 154.513643][ T6206] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 154.519810][ T6206] RIP: 0033:0x7f704b487749 [ 154.524241][ T6206] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 154.544151][ T6206] RSP: 002b:00007f7049eeefe8 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 154.553291][ T6206] RAX: ffffffffffffffda RBX: 00007f704b6ddfa0 RCX: 00007f704b487749 [ 154.561458][ T6206] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00000000640c7000 [ 154.569627][ T6206] RBP: 00007f7049eef090 R08: 0000000000000000 R09: 0000000000000000 [ 154.577624][ T6206] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000002 [ 154.585786][ T6206] R13: 00007f704b6de038 R14: 00007f704b6ddfa0 R15: 00007ffdb08e0f28 [ 154.594305][ T6206] [ 154.641280][ T6213] device wg2 entered promiscuous mode [ 154.720957][ T6216] device sit0 entered promiscuous mode [ 155.117549][ T6237] syz.0.1770[6237] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 155.117627][ T6237] syz.0.1770[6237] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 155.295052][ T6242] device pim6reg1 entered promiscuous mode [ 155.671592][ T6253] device bridge_slave_0 entered promiscuous mode [ 155.868303][ T6267] device veth0_vlan left promiscuous mode [ 155.888499][ T6267] device veth0_vlan entered promiscuous mode [ 155.958207][ T6283] FAULT_INJECTION: forcing a failure. [ 155.958207][ T6283] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 156.034258][ T6283] CPU: 1 PID: 6283 Comm: syz.0.1783 Tainted: G W syzkaller #0 [ 156.043110][ T6283] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 156.053178][ T6283] Call Trace: [ 156.056468][ T6283] [ 156.059409][ T6283] __dump_stack+0x21/0x30 [ 156.063763][ T6283] dump_stack_lvl+0xee/0x150 [ 156.068473][ T6283] ? show_regs_print_info+0x20/0x20 [ 156.073690][ T6283] dump_stack+0x15/0x20 [ 156.077872][ T6283] should_fail+0x3c1/0x510 [ 156.082307][ T6283] should_fail_usercopy+0x1a/0x20 [ 156.087350][ T6283] _copy_to_user+0x20/0x90 [ 156.091780][ T6283] simple_read_from_buffer+0xe9/0x160 [ 156.097171][ T6283] proc_fail_nth_read+0x19a/0x210 [ 156.102212][ T6283] ? proc_fault_inject_write+0x2f0/0x2f0 [ 156.107858][ T6283] ? security_file_permission+0x83/0xa0 [ 156.113440][ T6283] ? proc_fault_inject_write+0x2f0/0x2f0 [ 156.119100][ T6283] vfs_read+0x282/0xbe0 [ 156.123449][ T6283] ? kernel_read+0x1f0/0x1f0 [ 156.128158][ T6283] ? __kasan_check_write+0x14/0x20 [ 156.133296][ T6283] ? mutex_lock+0x95/0x1a0 [ 156.138000][ T6283] ? wait_for_completion_killable_timeout+0x10/0x10 [ 156.144700][ T6283] ? __fget_files+0x2c4/0x320 [ 156.149469][ T6283] ? __fdget_pos+0x2d2/0x380 [ 156.154087][ T6283] ? ksys_read+0x71/0x240 [ 156.158447][ T6283] ksys_read+0x140/0x240 [ 156.162730][ T6283] ? vfs_write+0xf70/0xf70 [ 156.167185][ T6283] ? debug_smp_processor_id+0x17/0x20 [ 156.172668][ T6283] __x64_sys_read+0x7b/0x90 [ 156.177290][ T6283] x64_sys_call+0x96d/0x9a0 [ 156.181817][ T6283] do_syscall_64+0x4c/0xa0 [ 156.186345][ T6283] ? clear_bhb_loop+0x50/0xa0 [ 156.191041][ T6283] ? clear_bhb_loop+0x50/0xa0 [ 156.195743][ T6283] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 156.201662][ T6283] RIP: 0033:0x7fb65282e15c [ 156.206104][ T6283] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 93 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 ef 93 02 00 48 [ 156.225753][ T6283] RSP: 002b:00007fb651276030 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 156.234205][ T6283] RAX: ffffffffffffffda RBX: 00007fb652a86090 RCX: 00007fb65282e15c [ 156.242205][ T6283] RDX: 000000000000000f RSI: 00007fb6512760a0 RDI: 0000000000000004 [ 156.250200][ T6283] RBP: 00007fb651276090 R08: 0000000000000000 R09: 0000000000000000 [ 156.258188][ T6283] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 156.266185][ T6283] R13: 00007fb652a86128 R14: 00007fb652a86090 R15: 00007ffcc21d8aa8 [ 156.274275][ T6283] [ 159.446971][ T6330] syz.1.1800[6330] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 159.447051][ T6330] syz.1.1800[6330] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 159.505378][ T6337] device wg2 entered promiscuous mode [ 159.813161][ T6369] syz.3.1812[6369] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 159.813242][ T6369] syz.3.1812[6369] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 160.273137][ T6399] syz.0.1823[6399] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 160.295052][ T6399] syz.0.1823[6399] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 160.425490][ T6405] device veth1_macvtap left promiscuous mode [ 160.478101][ T6395] device veth1_macvtap entered promiscuous mode [ 160.489631][ T6395] device macsec0 entered promiscuous mode [ 160.536190][ T333] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 160.790224][ T6431] device veth1_macvtap left promiscuous mode [ 161.045932][ T6431] device veth1_macvtap entered promiscuous mode [ 161.053065][ T6431] device macsec0 entered promiscuous mode [ 161.248622][ T6447] syz.3.1835[6447] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 161.248734][ T6447] syz.3.1835[6447] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 161.362593][ T6451] device pim6reg1 entered promiscuous mode [ 161.476170][ T6468] device veth1_macvtap entered promiscuous mode [ 161.484685][ T6468] device macsec0 entered promiscuous mode [ 161.544790][ T6468] device wg2 entered promiscuous mode [ 161.583317][ T6473] device sit0 left promiscuous mode [ 161.612625][ T6473] device sit0 entered promiscuous mode [ 161.729624][ T6483] syz.4.1846[6483] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 161.729709][ T6483] syz.4.1846[6483] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 162.753878][ T6525] syz.1.1858[6525] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 162.771362][ T6525] syz.1.1858[6525] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 163.251145][ T6554] syz.3.1870[6554] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 163.345346][ T6554] syz.3.1870[6554] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 163.392706][ T6558] device pim6reg1 entered promiscuous mode [ 163.803417][ T6586] FAULT_INJECTION: forcing a failure. [ 163.803417][ T6586] name failslab, interval 1, probability 0, space 0, times 0 [ 163.819105][ T6586] CPU: 0 PID: 6586 Comm: syz.4.1878 Tainted: G W syzkaller #0 [ 163.828014][ T6586] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 163.838270][ T6586] Call Trace: [ 163.841599][ T6586] [ 163.844552][ T6586] __dump_stack+0x21/0x30 [ 163.848904][ T6586] dump_stack_lvl+0xee/0x150 [ 163.853692][ T6586] ? show_regs_print_info+0x20/0x20 [ 163.859000][ T6586] dump_stack+0x15/0x20 [ 163.863170][ T6586] should_fail+0x3c1/0x510 [ 163.867604][ T6586] __should_failslab+0xa4/0xe0 [ 163.872392][ T6586] should_failslab+0x9/0x20 [ 163.876906][ T6586] slab_pre_alloc_hook+0x3b/0xe0 [ 163.881865][ T6586] ? vm_area_dup+0x26/0x210 [ 163.886390][ T6586] kmem_cache_alloc+0x44/0x260 [ 163.891275][ T6586] vm_area_dup+0x26/0x210 [ 163.895713][ T6586] copy_mm+0x93a/0x13a0 [ 163.899884][ T6586] ? copy_signal+0x600/0x600 [ 163.904659][ T6586] ? __init_rwsem+0xfc/0x1d0 [ 163.909265][ T6586] ? copy_signal+0x4cb/0x600 [ 163.913876][ T6586] copy_process+0x115c/0x3210 [ 163.918577][ T6586] ? __kasan_check_write+0x14/0x20 [ 163.923711][ T6586] ? __pidfd_prepare+0x150/0x150 [ 163.928672][ T6586] ? security_file_permission+0x83/0xa0 [ 163.934499][ T6586] kernel_clone+0x23f/0x940 [ 163.939056][ T6586] ? create_io_thread+0x130/0x130 [ 163.944102][ T6586] ? __kasan_check_write+0x14/0x20 [ 163.949406][ T6586] ? mutex_unlock+0x89/0x220 [ 163.954030][ T6586] __x64_sys_clone+0x176/0x1d0 [ 163.958840][ T6586] ? __kasan_check_write+0x14/0x20 [ 163.963974][ T6586] ? __ia32_sys_vfork+0xf0/0xf0 [ 163.968844][ T6586] ? fpregs_assert_state_consistent+0xb1/0xe0 [ 163.975028][ T6586] x64_sys_call+0x41f/0x9a0 [ 163.979566][ T6586] do_syscall_64+0x4c/0xa0 [ 163.984012][ T6586] ? clear_bhb_loop+0x50/0xa0 [ 163.988710][ T6586] ? clear_bhb_loop+0x50/0xa0 [ 163.993399][ T6586] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 163.999414][ T6586] RIP: 0033:0x7fafd04c0749 [ 164.003845][ T6586] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 164.023473][ T6586] RSP: 002b:00007fafcef27fe8 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 164.032020][ T6586] RAX: ffffffffffffffda RBX: 00007fafd0716fa0 RCX: 00007fafd04c0749 [ 164.040256][ T6586] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00000000640c7000 [ 164.048255][ T6586] RBP: 00007fafcef28090 R08: 0000000000000000 R09: 0000000000000000 [ 164.056597][ T6586] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000002 [ 164.064595][ T6586] R13: 00007fafd0717038 R14: 00007fafd0716fa0 R15: 00007ffde0606de8 [ 164.072595][ T6586] [ 165.210548][ T6638] FAULT_INJECTION: forcing a failure. [ 165.210548][ T6638] name failslab, interval 1, probability 0, space 0, times 0 [ 165.223568][ T6638] CPU: 0 PID: 6638 Comm: syz.3.1893 Tainted: G W syzkaller #0 [ 165.232790][ T6638] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 165.243463][ T6638] Call Trace: [ 165.246748][ T6638] [ 165.249678][ T6638] __dump_stack+0x21/0x30 [ 165.254010][ T6638] dump_stack_lvl+0xee/0x150 [ 165.258597][ T6638] ? show_regs_print_info+0x20/0x20 [ 165.263814][ T6638] ? avc_denied+0x1b0/0x1b0 [ 165.268316][ T6638] dump_stack+0x15/0x20 [ 165.272508][ T6638] should_fail+0x3c1/0x510 [ 165.276931][ T6638] __should_failslab+0xa4/0xe0 [ 165.282256][ T6638] should_failslab+0x9/0x20 [ 165.286846][ T6638] slab_pre_alloc_hook+0x3b/0xe0 [ 165.292044][ T6638] ? vm_area_dup+0x26/0x210 [ 165.296549][ T6638] kmem_cache_alloc+0x44/0x260 [ 165.301347][ T6638] vm_area_dup+0x26/0x210 [ 165.305800][ T6638] copy_mm+0x93a/0x13a0 [ 165.309993][ T6638] ? copy_signal+0x600/0x600 [ 165.314755][ T6638] ? __init_rwsem+0xfc/0x1d0 [ 165.319354][ T6638] ? copy_signal+0x4cb/0x600 [ 165.323959][ T6638] copy_process+0x115c/0x3210 [ 165.328642][ T6638] ? __kasan_check_write+0x14/0x20 [ 165.333981][ T6638] ? __pidfd_prepare+0x150/0x150 [ 165.338915][ T6638] ? security_file_permission+0x83/0xa0 [ 165.344471][ T6638] kernel_clone+0x23f/0x940 [ 165.348973][ T6638] ? create_io_thread+0x130/0x130 [ 165.353998][ T6638] ? __kasan_check_write+0x14/0x20 [ 165.359104][ T6638] ? mutex_unlock+0x89/0x220 [ 165.363694][ T6638] __x64_sys_clone+0x176/0x1d0 [ 165.368455][ T6638] ? __kasan_check_write+0x14/0x20 [ 165.373567][ T6638] ? __ia32_sys_vfork+0xf0/0xf0 [ 165.378418][ T6638] ? fpregs_assert_state_consistent+0xb1/0xe0 [ 165.384670][ T6638] x64_sys_call+0x41f/0x9a0 [ 165.389260][ T6638] do_syscall_64+0x4c/0xa0 [ 165.393686][ T6638] ? clear_bhb_loop+0x50/0xa0 [ 165.398373][ T6638] ? clear_bhb_loop+0x50/0xa0 [ 165.403045][ T6638] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 165.409048][ T6638] RIP: 0033:0x7fdfa1f0c749 [ 165.413547][ T6638] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 165.433362][ T6638] RSP: 002b:00007fdfa0973fe8 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 165.441777][ T6638] RAX: ffffffffffffffda RBX: 00007fdfa2162fa0 RCX: 00007fdfa1f0c749 [ 165.449756][ T6638] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00000000640c7000 [ 165.457723][ T6638] RBP: 00007fdfa0974090 R08: 0000000000000000 R09: 0000000000000000 [ 165.465692][ T6638] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000002 [ 165.473660][ T6638] R13: 00007fdfa2163038 R14: 00007fdfa2162fa0 R15: 00007ffc9621ce88 [ 165.481634][ T6638] [ 165.493258][ T6633] device wg2 left promiscuous mode [ 165.535555][ T6645] bpf_get_probe_write_proto: 2 callbacks suppressed [ 165.535576][ T6645] syz.4.1896[6645] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 165.552823][ T6645] syz.4.1896[6645] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 165.809357][ T6674] FAULT_INJECTION: forcing a failure. [ 165.809357][ T6674] name failslab, interval 1, probability 0, space 0, times 0 [ 165.836438][ T6674] CPU: 1 PID: 6674 Comm: syz.4.1908 Tainted: G W syzkaller #0 [ 165.845337][ T6674] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 165.855502][ T6674] Call Trace: [ 165.858797][ T6674] [ 165.861742][ T6674] __dump_stack+0x21/0x30 [ 165.866087][ T6674] dump_stack_lvl+0xee/0x150 [ 165.870695][ T6674] ? show_regs_print_info+0x20/0x20 [ 165.875910][ T6674] dump_stack+0x15/0x20 [ 165.880079][ T6674] should_fail+0x3c1/0x510 [ 165.884516][ T6674] __should_failslab+0xa4/0xe0 [ 165.889310][ T6674] should_failslab+0x9/0x20 [ 165.893838][ T6674] slab_pre_alloc_hook+0x3b/0xe0 [ 165.898798][ T6674] ? anon_vma_clone+0xc0/0x500 [ 165.903586][ T6674] kmem_cache_alloc+0x44/0x260 [ 165.908374][ T6674] anon_vma_clone+0xc0/0x500 [ 165.912991][ T6674] anon_vma_fork+0x8c/0x510 [ 165.917510][ T6674] copy_mm+0x9d1/0x13a0 [ 165.921694][ T6674] ? copy_signal+0x600/0x600 [ 165.926303][ T6674] ? __init_rwsem+0xfc/0x1d0 [ 165.930908][ T6674] ? copy_signal+0x4cb/0x600 [ 165.935686][ T6674] copy_process+0x115c/0x3210 [ 165.940384][ T6674] ? __kasan_check_write+0x14/0x20 [ 165.945605][ T6674] ? __pidfd_prepare+0x150/0x150 [ 165.950559][ T6674] ? security_file_permission+0x83/0xa0 [ 165.956125][ T6674] kernel_clone+0x23f/0x940 [ 165.960735][ T6674] ? create_io_thread+0x130/0x130 [ 165.965779][ T6674] ? __kasan_check_write+0x14/0x20 [ 165.971023][ T6674] ? mutex_unlock+0x89/0x220 [ 165.975728][ T6674] __x64_sys_clone+0x176/0x1d0 [ 165.980514][ T6674] ? __kasan_check_write+0x14/0x20 [ 165.985638][ T6674] ? __ia32_sys_vfork+0xf0/0xf0 [ 165.990507][ T6674] ? fpregs_assert_state_consistent+0xb1/0xe0 [ 165.996678][ T6674] x64_sys_call+0x41f/0x9a0 [ 166.001192][ T6674] do_syscall_64+0x4c/0xa0 [ 166.005634][ T6674] ? clear_bhb_loop+0x50/0xa0 [ 166.010338][ T6674] ? clear_bhb_loop+0x50/0xa0 [ 166.015050][ T6674] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 166.021068][ T6674] RIP: 0033:0x7fafd04c0749 [ 166.025513][ T6674] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 166.045142][ T6674] RSP: 002b:00007fafcef27fe8 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 166.053665][ T6674] RAX: ffffffffffffffda RBX: 00007fafd0716fa0 RCX: 00007fafd04c0749 [ 166.061744][ T6674] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00000000640c7000 [ 166.069731][ T6674] RBP: 00007fafcef28090 R08: 0000000000000000 R09: 0000000000000000 [ 166.077799][ T6674] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000002 [ 166.086228][ T6674] R13: 00007fafd0717038 R14: 00007fafd0716fa0 R15: 00007ffde0606de8 [ 166.094222][ T6674] [ 166.308510][ T6687] device syzkaller0 entered promiscuous mode [ 166.316550][ T1483] syzkaller0: tun_net_xmit 48 [ 166.329420][ T6688] syzkaller0: tun_net_xmit 1280 [ 166.399201][ T6695] syz.2.1914[6695] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 166.399275][ T6695] syz.2.1914[6695] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 166.415442][ T6695] FAULT_INJECTION: forcing a failure. [ 166.415442][ T6695] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 166.447436][ T6695] CPU: 1 PID: 6695 Comm: syz.2.1914 Tainted: G W syzkaller #0 [ 166.456249][ T6695] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 166.466430][ T6695] Call Trace: [ 166.469730][ T6695] [ 166.472672][ T6695] __dump_stack+0x21/0x30 [ 166.477018][ T6695] dump_stack_lvl+0xee/0x150 [ 166.481624][ T6695] ? show_regs_print_info+0x20/0x20 [ 166.486840][ T6695] ? __kasan_check_write+0x14/0x20 [ 166.492096][ T6695] ? proc_fail_nth_write+0x17a/0x1f0 [ 166.497411][ T6695] ? proc_fail_nth_read+0x210/0x210 [ 166.502648][ T6695] dump_stack+0x15/0x20 [ 166.506830][ T6695] should_fail+0x3c1/0x510 [ 166.511263][ T6695] should_fail_usercopy+0x1a/0x20 [ 166.516327][ T6695] _copy_from_user+0x20/0xd0 [ 166.521044][ T6695] perf_copy_attr+0x154/0x870 [ 166.525831][ T6695] __se_sys_perf_event_open+0xcb/0x1b80 [ 166.531474][ T6695] ? __kasan_check_write+0x14/0x20 [ 166.536602][ T6695] ? mutex_unlock+0x89/0x220 [ 166.541210][ T6695] ? __x64_sys_perf_event_open+0xd0/0xd0 [ 166.546866][ T6695] ? __ia32_sys_read+0x90/0x90 [ 166.551795][ T6695] __x64_sys_perf_event_open+0xbf/0xd0 [ 166.557463][ T6695] x64_sys_call+0x50d/0x9a0 [ 166.561994][ T6695] do_syscall_64+0x4c/0xa0 [ 166.566521][ T6695] ? clear_bhb_loop+0x50/0xa0 [ 166.571296][ T6695] ? clear_bhb_loop+0x50/0xa0 [ 166.575983][ T6695] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 166.582090][ T6695] RIP: 0033:0x7f704b487749 [ 166.586506][ T6695] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 166.606378][ T6695] RSP: 002b:00007f7049eef038 EFLAGS: 00000246 ORIG_RAX: 000000000000012a [ 166.614797][ T6695] RAX: ffffffffffffffda RBX: 00007f704b6ddfa0 RCX: 00007f704b487749 [ 166.622768][ T6695] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000200000000380 [ 166.630735][ T6695] RBP: 00007f7049eef090 R08: 0000000000000000 R09: 0000000000000000 [ 166.638876][ T6695] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000001 [ 166.646845][ T6695] R13: 00007f704b6de038 R14: 00007f704b6ddfa0 R15: 00007ffdb08e0f28 [ 166.654995][ T6695] [ 166.733715][ T6705] FAULT_INJECTION: forcing a failure. [ 166.733715][ T6705] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 166.747844][ T6705] CPU: 0 PID: 6705 Comm: syz.1.1919 Tainted: G W syzkaller #0 [ 166.756638][ T6705] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 166.766850][ T6705] Call Trace: [ 166.770158][ T6705] [ 166.773105][ T6705] __dump_stack+0x21/0x30 [ 166.777583][ T6705] dump_stack_lvl+0xee/0x150 [ 166.782206][ T6705] ? show_regs_print_info+0x20/0x20 [ 166.787518][ T6705] ? prep_new_page+0x1c/0x110 [ 166.792405][ T6705] dump_stack+0x15/0x20 [ 166.796594][ T6705] should_fail+0x3c1/0x510 [ 166.801024][ T6705] should_fail_alloc_page+0x55/0x80 [ 166.806237][ T6705] prepare_alloc_pages+0x156/0x600 [ 166.811366][ T6705] ? __alloc_pages_bulk+0xab0/0xab0 [ 166.816582][ T6705] __alloc_pages+0x10a/0x440 [ 166.821191][ T6705] ? prep_new_page+0x110/0x110 [ 166.825975][ T6705] ? __mod_node_page_state+0x9e/0xd0 [ 166.831270][ T6705] ? __mod_lruvec_page_state+0x15d/0x1c0 [ 166.836912][ T6705] pte_alloc_one+0x70/0x180 [ 166.841429][ T6705] ? pfn_modify_allowed+0x2f0/0x2f0 [ 166.846641][ T6705] ? stack_trace_save+0x98/0xe0 [ 166.851501][ T6705] __pte_alloc+0x75/0x290 [ 166.855845][ T6705] ? __kasan_check_write+0x14/0x20 [ 166.860966][ T6705] ? _raw_spin_lock+0x8e/0xe0 [ 166.865828][ T6705] ? free_pgtables+0x280/0x280 [ 166.870697][ T6705] ? __kasan_check_write+0x14/0x20 [ 166.875831][ T6705] ? add_mm_rss_vec+0x209/0x220 [ 166.880710][ T6705] copy_page_range+0x2348/0x2890 [ 166.885676][ T6705] ? pfn_valid+0x1d0/0x1d0 [ 166.890118][ T6705] copy_mm+0xbe2/0x13a0 [ 166.894294][ T6705] ? copy_signal+0x600/0x600 [ 166.898907][ T6705] ? __init_rwsem+0xfc/0x1d0 [ 166.903512][ T6705] ? copy_signal+0x4cb/0x600 [ 166.908117][ T6705] copy_process+0x115c/0x3210 [ 166.912813][ T6705] ? __kasan_check_write+0x14/0x20 [ 166.917941][ T6705] ? __pidfd_prepare+0x150/0x150 [ 166.922908][ T6705] ? security_file_permission+0x83/0xa0 [ 166.928474][ T6705] kernel_clone+0x23f/0x940 [ 166.933276][ T6705] ? create_io_thread+0x130/0x130 [ 166.938415][ T6705] ? __kasan_check_write+0x14/0x20 [ 166.943592][ T6705] ? mutex_unlock+0x89/0x220 [ 166.948294][ T6705] __x64_sys_clone+0x176/0x1d0 [ 166.953085][ T6705] ? __kasan_check_write+0x14/0x20 [ 166.958305][ T6705] ? __ia32_sys_vfork+0xf0/0xf0 [ 166.963359][ T6705] ? fpregs_assert_state_consistent+0xb1/0xe0 [ 166.969566][ T6705] x64_sys_call+0x41f/0x9a0 [ 166.974095][ T6705] do_syscall_64+0x4c/0xa0 [ 166.978611][ T6705] ? clear_bhb_loop+0x50/0xa0 [ 166.983298][ T6705] ? clear_bhb_loop+0x50/0xa0 [ 166.988086][ T6705] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 166.994168][ T6705] RIP: 0033:0x7f7bd15e3749 [ 166.998619][ T6705] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 167.018240][ T6705] RSP: 002b:00007f7bd004afe8 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 167.027043][ T6705] RAX: ffffffffffffffda RBX: 00007f7bd1839fa0 RCX: 00007f7bd15e3749 [ 167.035227][ T6705] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00000000640c7000 [ 167.043312][ T6705] RBP: 00007f7bd004b090 R08: 0000000000000000 R09: 0000000000000000 [ 167.051413][ T6705] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000002 [ 167.059401][ T6705] R13: 00007f7bd183a038 R14: 00007f7bd1839fa0 R15: 00007ffdcefb39a8 [ 167.067486][ T6705] [ 167.324488][ T6741] syz.0.1930[6741] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 167.324565][ T6741] syz.0.1930[6741] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 167.370550][ T6741] FAULT_INJECTION: forcing a failure. [ 167.370550][ T6741] name failslab, interval 1, probability 0, space 0, times 0 [ 167.457068][ T6741] CPU: 1 PID: 6741 Comm: syz.0.1930 Tainted: G W syzkaller #0 [ 167.465981][ T6741] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 167.476051][ T6741] Call Trace: [ 167.479342][ T6741] [ 167.482294][ T6741] __dump_stack+0x21/0x30 [ 167.486652][ T6741] dump_stack_lvl+0xee/0x150 [ 167.491268][ T6741] ? show_regs_print_info+0x20/0x20 [ 167.496489][ T6741] ? avc_has_perm_noaudit+0x2f4/0x460 [ 167.501880][ T6741] dump_stack+0x15/0x20 [ 167.506062][ T6741] should_fail+0x3c1/0x510 [ 167.510504][ T6741] __should_failslab+0xa4/0xe0 [ 167.515380][ T6741] should_failslab+0x9/0x20 [ 167.519917][ T6741] slab_pre_alloc_hook+0x3b/0xe0 [ 167.524890][ T6741] ? perf_event_alloc+0x116/0x1a20 [ 167.530125][ T6741] kmem_cache_alloc+0x44/0x260 [ 167.534915][ T6741] perf_event_alloc+0x116/0x1a20 [ 167.539875][ T6741] ? _raw_spin_unlock+0x4d/0x70 [ 167.544747][ T6741] ? alloc_fd+0x4ba/0x570 [ 167.549086][ T6741] __se_sys_perf_event_open+0x6c5/0x1b80 [ 167.554718][ T6741] ? __kasan_check_write+0x14/0x20 [ 167.559827][ T6741] ? mutex_unlock+0x89/0x220 [ 167.564417][ T6741] ? __x64_sys_perf_event_open+0xd0/0xd0 [ 167.570048][ T6741] ? __ia32_sys_read+0x90/0x90 [ 167.574809][ T6741] __x64_sys_perf_event_open+0xbf/0xd0 [ 167.580267][ T6741] x64_sys_call+0x50d/0x9a0 [ 167.584767][ T6741] do_syscall_64+0x4c/0xa0 [ 167.589189][ T6741] ? clear_bhb_loop+0x50/0xa0 [ 167.593860][ T6741] ? clear_bhb_loop+0x50/0xa0 [ 167.598530][ T6741] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 167.604423][ T6741] RIP: 0033:0x7fb65282f749 [ 167.608832][ T6741] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 167.628435][ T6741] RSP: 002b:00007fb651297038 EFLAGS: 00000246 ORIG_RAX: 000000000000012a [ 167.636852][ T6741] RAX: ffffffffffffffda RBX: 00007fb652a85fa0 RCX: 00007fb65282f749 [ 167.644917][ T6741] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000200000000380 [ 167.653059][ T6741] RBP: 00007fb651297090 R08: 0000000000000000 R09: 0000000000000000 [ 167.661026][ T6741] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000001 [ 167.668996][ T6741] R13: 00007fb652a86038 R14: 00007fb652a85fa0 R15: 00007ffcc21d8aa8 [ 167.676969][ T6741] [ 167.801715][ T6756] FAULT_INJECTION: forcing a failure. [ 167.801715][ T6756] name failslab, interval 1, probability 0, space 0, times 0 [ 167.827679][ T6756] CPU: 1 PID: 6756 Comm: syz.4.1933 Tainted: G W syzkaller #0 [ 167.836675][ T6756] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 167.846853][ T6756] Call Trace: [ 167.850138][ T6756] [ 167.853157][ T6756] __dump_stack+0x21/0x30 [ 167.857552][ T6756] dump_stack_lvl+0xee/0x150 [ 167.862143][ T6756] ? show_regs_print_info+0x20/0x20 [ 167.867439][ T6756] dump_stack+0x15/0x20 [ 167.871598][ T6756] should_fail+0x3c1/0x510 [ 167.876015][ T6756] __should_failslab+0xa4/0xe0 [ 167.880777][ T6756] should_failslab+0x9/0x20 [ 167.885276][ T6756] slab_pre_alloc_hook+0x3b/0xe0 [ 167.890218][ T6756] ? anon_vma_clone+0xc0/0x500 [ 167.895122][ T6756] kmem_cache_alloc+0x44/0x260 [ 167.900073][ T6756] anon_vma_clone+0xc0/0x500 [ 167.904677][ T6756] anon_vma_fork+0x8c/0x510 [ 167.909185][ T6756] copy_mm+0x9d1/0x13a0 [ 167.913709][ T6756] ? copy_signal+0x600/0x600 [ 167.918292][ T6756] ? __init_rwsem+0xfc/0x1d0 [ 167.922881][ T6756] ? copy_signal+0x4cb/0x600 [ 167.927570][ T6756] copy_process+0x115c/0x3210 [ 167.932247][ T6756] ? __kasan_check_write+0x14/0x20 [ 167.937365][ T6756] ? __pidfd_prepare+0x150/0x150 [ 167.942409][ T6756] ? security_file_permission+0x83/0xa0 [ 167.947956][ T6756] kernel_clone+0x23f/0x940 [ 167.952458][ T6756] ? create_io_thread+0x130/0x130 [ 167.957506][ T6756] ? __kasan_check_write+0x14/0x20 [ 167.962614][ T6756] ? mutex_unlock+0x89/0x220 [ 167.967420][ T6756] __x64_sys_clone+0x176/0x1d0 [ 167.972184][ T6756] ? __kasan_check_write+0x14/0x20 [ 167.977393][ T6756] ? __ia32_sys_vfork+0xf0/0xf0 [ 167.982420][ T6756] ? fpregs_assert_state_consistent+0xb1/0xe0 [ 167.988491][ T6756] x64_sys_call+0x41f/0x9a0 [ 167.993001][ T6756] do_syscall_64+0x4c/0xa0 [ 167.997441][ T6756] ? clear_bhb_loop+0x50/0xa0 [ 168.002248][ T6756] ? clear_bhb_loop+0x50/0xa0 [ 168.006933][ T6756] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 168.012932][ T6756] RIP: 0033:0x7fafd04c0749 [ 168.017366][ T6756] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 168.036984][ T6756] RSP: 002b:00007fafcef27fe8 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 168.045406][ T6756] RAX: ffffffffffffffda RBX: 00007fafd0716fa0 RCX: 00007fafd04c0749 [ 168.053381][ T6756] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00000000640c7000 [ 168.061470][ T6756] RBP: 00007fafcef28090 R08: 0000000000000000 R09: 0000000000000000 [ 168.069555][ T6756] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000002 [ 168.077557][ T6756] R13: 00007fafd0717038 R14: 00007fafd0716fa0 R15: 00007ffde0606de8 [ 168.085622][ T6756] [ 168.534038][ T6793] syz.2.1943[6793] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 168.534122][ T6793] syz.2.1943[6793] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 170.780567][ T6822] FAULT_INJECTION: forcing a failure. [ 170.780567][ T6822] name failslab, interval 1, probability 0, space 0, times 0 [ 170.818985][ T6822] CPU: 1 PID: 6822 Comm: syz.4.1951 Tainted: G W syzkaller #0 [ 170.827804][ T6822] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 170.838050][ T6822] Call Trace: [ 170.841350][ T6822] [ 170.844287][ T6822] __dump_stack+0x21/0x30 [ 170.848636][ T6822] dump_stack_lvl+0xee/0x150 [ 170.853245][ T6822] ? show_regs_print_info+0x20/0x20 [ 170.858560][ T6822] dump_stack+0x15/0x20 [ 170.862920][ T6822] should_fail+0x3c1/0x510 [ 170.867544][ T6822] __should_failslab+0xa4/0xe0 [ 170.872445][ T6822] should_failslab+0x9/0x20 [ 170.877146][ T6822] slab_pre_alloc_hook+0x3b/0xe0 [ 170.882097][ T6822] ? anon_vma_fork+0xf2/0x510 [ 170.886781][ T6822] kmem_cache_alloc+0x44/0x260 [ 170.891577][ T6822] anon_vma_fork+0xf2/0x510 [ 170.896093][ T6822] copy_mm+0x9d1/0x13a0 [ 170.900268][ T6822] ? copy_signal+0x600/0x600 [ 170.904869][ T6822] ? __init_rwsem+0xfc/0x1d0 [ 170.909470][ T6822] ? copy_signal+0x4cb/0x600 [ 170.914082][ T6822] copy_process+0x115c/0x3210 [ 170.919039][ T6822] ? __kasan_check_write+0x14/0x20 [ 170.924258][ T6822] ? __pidfd_prepare+0x150/0x150 [ 170.929327][ T6822] ? security_file_permission+0x83/0xa0 [ 170.934925][ T6822] kernel_clone+0x23f/0x940 [ 170.939524][ T6822] ? create_io_thread+0x130/0x130 [ 170.944653][ T6822] ? __kasan_check_write+0x14/0x20 [ 170.949864][ T6822] ? mutex_unlock+0x89/0x220 [ 170.954465][ T6822] __x64_sys_clone+0x176/0x1d0 [ 170.959234][ T6822] ? __kasan_check_write+0x14/0x20 [ 170.964350][ T6822] ? __ia32_sys_vfork+0xf0/0xf0 [ 170.969217][ T6822] ? fpregs_assert_state_consistent+0xb1/0xe0 [ 170.975291][ T6822] x64_sys_call+0x41f/0x9a0 [ 170.979804][ T6822] do_syscall_64+0x4c/0xa0 [ 170.984229][ T6822] ? clear_bhb_loop+0x50/0xa0 [ 170.989170][ T6822] ? clear_bhb_loop+0x50/0xa0 [ 170.993848][ T6822] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 170.999754][ T6822] RIP: 0033:0x7fafd04c0749 [ 171.004441][ T6822] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 171.024074][ T6822] RSP: 002b:00007fafcef27fe8 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 171.032599][ T6822] RAX: ffffffffffffffda RBX: 00007fafd0716fa0 RCX: 00007fafd04c0749 [ 171.040701][ T6822] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00000000640c7000 [ 171.048779][ T6822] RBP: 00007fafcef28090 R08: 0000000000000000 R09: 0000000000000000 [ 171.056849][ T6822] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000002 [ 171.064853][ T6822] R13: 00007fafd0717038 R14: 00007fafd0716fa0 R15: 00007ffde0606de8 [ 171.072923][ T6822] [ 171.296982][ T6829] general protection fault, probably for non-canonical address 0xdffffc0000000000: 0000 [#1] PREEMPT SMP KASAN [ 171.308759][ T6829] KASAN: null-ptr-deref in range [0x0000000000000000-0x0000000000000007] [ 171.317180][ T6829] CPU: 0 PID: 6829 Comm: syz.4.1951 Tainted: G W syzkaller #0 [ 171.326236][ T6829] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 171.336304][ T6829] RIP: 0010:__rb_erase_color+0x25f/0xaf0 [ 171.341982][ T6829] Code: 8b 4d c0 80 3c 01 00 74 09 48 8b 7d c8 e8 09 bf 3a ff 4d 89 66 10 4c 89 33 4c 89 e0 48 c1 e8 03 48 b9 00 00 00 00 00 fc ff df <80> 3c 08 00 74 08 4c 89 e7 e8 e3 be 3a ff 4c 89 f0 48 83 c8 01 49 [ 171.361685][ T6829] RSP: 0018:ffffc90000c4f6c0 EFLAGS: 00010246 [ 171.367769][ T6829] RAX: 0000000000000000 RBX: ffff888125772060 RCX: dffffc0000000000 [ 171.375749][ T6829] RDX: ffffffff819b06e0 RSI: 1ffff1102132629a RDI: ffff888140286d10 [ 171.383731][ T6829] RBP: ffffc90000c4f720 R08: dffffc0000000000 R09: ffffed102132629e [ 171.391718][ T6829] R10: ffffed102132629e R11: 1ffff1102132629d R12: 0000000000000000 [ 171.400137][ T6829] R13: ffff888125772058 R14: ffff888140286d10 R15: 1ffff11024aee40b [ 171.408206][ T6829] FS: 0000000000000000(0000) GS:ffff8881f7000000(0000) knlGS:0000000000000000 [ 171.417232][ T6829] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 171.423834][ T6829] CR2: 0000000000000000 CR3: 000000000660f000 CR4: 00000000003506b0 [ 171.431825][ T6829] DR0: 0000200000000280 DR1: 0000200000000300 DR2: 0000000000000000 [ 171.439906][ T6829] DR3: 0000000000000000 DR6: 00000000ffff0ff0 DR7: 0000000000000600 [ 171.447991][ T6829] Call Trace: [ 171.451284][ T6829] [ 171.454229][ T6829] ? anon_vma_interval_tree_iter_next+0x380/0x380 [ 171.460678][ T6829] vma_interval_tree_remove+0xadf/0xb00 [ 171.466250][ T6829] unlink_file_vma+0xda/0xf0 [ 171.470857][ T6829] free_pgtables+0x139/0x280 [ 171.475450][ T6829] exit_mmap+0x407/0x860 [ 171.479812][ T6829] ? vm_brk+0x30/0x30 [ 171.483890][ T6829] ? mutex_unlock+0x89/0x220 [ 171.488503][ T6829] ? uprobe_clear_state+0x2c1/0x320 [ 171.493709][ T6829] __mmput+0x93/0x320 [ 171.497691][ T6829] ? mmput+0x48/0x150 [ 171.501856][ T6829] mmput+0x50/0x150 [ 171.505668][ T6829] do_exit+0x9d2/0x27a0 [ 171.509823][ T6829] ? __anon_inode_getfd+0x355/0x3b0 [ 171.515106][ T6829] ? put_task_struct+0x90/0x90 [ 171.519876][ T6829] ? futex_exit_release+0x1d0/0x1d0 [ 171.525161][ T6829] ? cgroup_freezing+0x86/0xb0 [ 171.529918][ T6829] do_group_exit+0x141/0x310 [ 171.534502][ T6829] ? __kasan_check_write+0x14/0x20 [ 171.539614][ T6829] get_signal+0x66a/0x1480 [ 171.544028][ T6829] arch_do_signal_or_restart+0xc1/0x10f0 [ 171.549662][ T6829] ? selinux_bpf+0xc7/0xf0 [ 171.554074][ T6829] ? security_bpf+0x82/0xa0 [ 171.558833][ T6829] ? get_sigframe_size+0x10/0x10 [ 171.563864][ T6829] ? __se_sys_futex+0x139/0x310 [ 171.568720][ T6829] exit_to_user_mode_loop+0xa7/0xe0 [ 171.573918][ T6829] exit_to_user_mode_prepare+0x87/0xd0 [ 171.579464][ T6829] syscall_exit_to_user_mode+0x1a/0x30 [ 171.584922][ T6829] do_syscall_64+0x58/0xa0 [ 171.589422][ T6829] ? clear_bhb_loop+0x50/0xa0 [ 171.594095][ T6829] ? clear_bhb_loop+0x50/0xa0 [ 171.598777][ T6829] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 171.604753][ T6829] RIP: 0033:0x7fafd04c0749 [ 171.609255][ T6829] Code: Unable to access opcode bytes at RIP 0x7fafd04c071f. [ 171.616616][ T6829] RSP: 002b:00007fafcef070e8 EFLAGS: 00000246 ORIG_RAX: 00000000000000ca [ 171.625028][ T6829] RAX: 0000000000000001 RBX: 00007fafd0717098 RCX: 00007fafd04c0749 [ 171.633106][ T6829] RDX: 00000000000f4240 RSI: 0000000000000081 RDI: 00007fafd071709c [ 171.641183][ T6829] RBP: 00007fafd0717090 R08: 000f25dd4417596e R09: 0000000000000000 [ 171.649153][ T6829] R10: 0000000000000004 R11: 0000000000000246 R12: 0000000000000000 [ 171.657334][ T6829] R13: 00007fafd0717128 R14: 00007ffde0606d00 R15: 00007ffde0606de8 [ 171.665314][ T6829] [ 171.668331][ T6829] Modules linked in: [ 171.674003][ T6829] ---[ end trace 9fe3e34cf4b3389e ]--- [ 171.674001][ T30] audit: type=1400 audit(1763680890.232:167): avc: denied { read } for pid=83 comm="syslogd" name="log" dev="sda1" ino=2010 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 171.674029][ T30] audit: type=1400 audit(1763680890.232:168): avc: denied { search } for pid=83 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 171.679653][ T6829] RIP: 0010:__rb_erase_color+0x25f/0xaf0 [ 171.701823][ T30] audit: type=1400 audit(1763680890.232:169): avc: denied { write } for pid=83 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 171.749906][ T30] audit: type=1400 audit(1763680890.232:170): avc: denied { add_name } for pid=83 comm="syslogd" name="messages" scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 171.771094][ T30] audit: type=1400 audit(1763680890.232:171): avc: denied { create } for pid=83 comm="syslogd" name="messages" scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 171.792360][ T30] audit: type=1400 audit(1763680890.232:172): avc: denied { append open } for pid=83 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=5 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 171.815431][ T30] audit: type=1400 audit(1763680890.232:173): avc: denied { getattr } for pid=83 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=5 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 171.838903][ T6829] Code: 8b 4d c0 80 3c 01 00 74 09 48 8b 7d c8 e8 09 bf 3a ff 4d 89 66 10 4c 89 33 4c 89 e0 48 c1 e8 03 48 b9 00 00 00 00 00 fc ff df <80> 3c 08 00 74 08 4c 89 e7 e8 e3 be 3a ff 4c 89 f0 48 83 c8 01 49 [ 171.860586][ T6829] RSP: 0018:ffffc90000c4f6c0 EFLAGS: 00010246 [ 171.866724][ T6829] RAX: 0000000000000000 RBX: ffff888125772060 RCX: dffffc0000000000 [ 171.875094][ T6829] RDX: ffffffff819b06e0 RSI: 1ffff1102132629a RDI: ffff888140286d10 [ 171.883161][ T6829] RBP: ffffc90000c4f720 R08: dffffc0000000000 R09: ffffed102132629e [ 171.891287][ T6829] R10: ffffed102132629e R11: 1ffff1102132629d R12: 0000000000000000 [ 171.899415][ T6829] R13: ffff888125772058 R14: ffff888140286d10 R15: 1ffff11024aee40b [ 171.907431][ T6829] FS: 0000000000000000(0000) GS:ffff8881f7100000(0000) knlGS:0000000000000000 [ 171.916484][ T6829] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 171.923292][ T6829] CR2: 0000200000002280 CR3: 0000000125281000 CR4: 00000000003506a0 [ 171.931311][ T6829] DR0: 0000000000000000 DR1: 0000200000000300 DR2: 0000000000000000 [ 171.939325][ T6829] DR3: 0000000000000000 DR6: 00000000ffff0ff0 DR7: 0000000000000600 [ 171.947322][ T6829] Kernel panic - not syncing: Fatal exception [ 171.953639][ T6829] Kernel Offset: disabled [ 171.958158][ T6829] Rebooting in 86400 seconds..