last executing test programs: 2.945468783s ago: executing program 1 (id=3051): bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000600)={0x8, 0x3, &(0x7f0000001600)=ANY=[@ANYBLOB="7a0a00ff0000000071106a0000000000950000000000000091dbe2142a6e5c8e4d0863ca21c717ef681753f9c42ff332419265edfffcb91a101e421852b47a11c74a9d79b9b5fdd4dba906f4fce4ca43d1fc53d4859110386e746ab3de1692cf1daa3374eefb3841a0f12e86c65406738f95f5b6b3dd4e56f1130db733f1eb5553223feffd951f04492ff6318ae5391f6f"], &(0x7f0000000480)='syzkaller\x00'}, 0x80) bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0xf, 0xc, &(0x7f0000000240)=ANY=[@ANYBLOB="1800000000000000000000000000000018000000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000003000000850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, '\x00', 0x0, @fallback=0x33, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000240)=ANY=[], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x7, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="19000000040000000800000008"], 0x50) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000001b518110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x10000, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/syz1\x00', 0x1ff) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000780)={0xffffffffffffffff, 0x58, &(0x7f0000000680)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0xb) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', r4}, 0x94) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000001240)={0x7ff, 0x0}, 0x8) r6 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000001280)={0xffffffffffffffff, 0xb2, 0x28}, 0xc) bpf$PROG_LOAD(0x5, &(0x7f0000001380)={0x4, 0x14, &(0x7f0000001080)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x1}, {{0x18, 0x1, 0x1, 0x0, r1}}, {}, [@ldst={0x1, 0x0, 0x2, 0x3, 0x2, 0x18}, @ringbuf_query={{0x18, 0x1, 0x1, 0x0, r1}}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000001140)='GPL\x00', 0xe8, 0x68, &(0x7f0000001180)=""/104, 0x41100, 0x18, '\x00', r4, @fallback=0x61, r1, 0x8, 0x0, 0x0, 0x10, &(0x7f0000001200)={0x0, 0x1, 0x5, 0x9}, 0x10, r5, r2, 0x7, &(0x7f00000012c0)=[r1, r6, r1, r1, r1, r1, r1], &(0x7f0000001300)=[{0x3, 0x5, 0x6, 0x6}, {0x4, 0x5, 0x6, 0x6}, {0x1, 0x5, 0x3, 0x1}, {0x2, 0x5, 0xf}, {0x4, 0x2, 0x1, 0x8}, {0x1, 0x1, 0x8, 0xa}, {0x4, 0x5, 0x9, 0x9}], 0x10, 0x5}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000003c0)={&(0x7f0000000300)='qdisc_dequeue\x00', r3}, 0x10) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000640)=ANY=[@ANYBLOB="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"/2566], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r7, 0x18000000000002a0, 0xe40, 0x0, &(0x7f0000000100)="b9ff03076844268cb89e14f005dd1be0ffff00fe3a21632f77fbac14141de007031762079f4b4d2f87e5feca6aab845013f2325f1a3901050b038da1880b25181aa59d943be3f4aed50ea5a6b8686731cb89ef77123c899b699eeaa8eaa0073461119663906400f30c0600000000000059b6d3296e8ca31bce1d8392078b72f24996ae17dffc2e43c8174b54b620636894aaacf28ff62616363c70a440aec4014caf28c0adc043084617d7ecf41e9d134589d46e5dfc4ca5780d38cae870b9a1df48b238190da450296b0ac01496ace23eefc9d4246dd14afbf79a2283a0bb7e1d235f3df126c3acc240d75a058f6efa6d1f5f7ff4000000000000000000", 0x0, 0x8, 0x60000000}, 0x1e) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kmem_cache_free\x00', r0}, 0x10) bpf$PROG_LOAD(0x5, 0x0, 0x0) r8 = bpf$MAP_CREATE(0x1900000000000000, &(0x7f0000000040)=@base={0x1b, 0x0, 0x0, 0x2000}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r8}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r9 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000500)={&(0x7f0000000080)='task_rename\x00', r9}, 0x10) r10 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000001440)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x1, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000500)={&(0x7f0000000380)='task_rename\x00', r10}, 0x18) r11 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x10, 0x4, 0x4, 0x2, 0x0, 0x1}, 0x50) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000180)={r11, &(0x7f00000006c0), &(0x7f0000000000), 0x2}, 0x20) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000140)) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xe, 0x6, &(0x7f0000000000)=ANY=[@ANYBLOB="050000000000000071114900000000008510000002000000850000000500000095000000000000009500a50500000000"], &(0x7f0000000080)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @sk_skb, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0, 0x0, r5}, 0x94) r12 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000580)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000540)={@cgroup=r12, 0x13, 0x1, 0x2, &(0x7f0000000380)=[0x0], 0x1, 0x0, &(0x7f0000000400)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000004c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000500)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, 0x40) 2.815544744s ago: executing program 1 (id=3052): bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000002000000b704000000000000850000005700000095"], 0x0}, 0x90) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="17000000000000000400000003"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r0], 0x0}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r1}, 0x10) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffe, 0x0, 0x2, @perf_bp={0x0}, 0x40, 0x5, 0x0, 0x0, 0x0, 0xfffffffe, 0x0, 0x0, 0xffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 2.72818221s ago: executing program 1 (id=3057): r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="02000000040000000800000001"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000700)={0x0, 0x10, &(0x7f0000000580)=ANY=[@ANYBLOB="0000000000000000b704000001000000850000007800000095", @ANYRES32=r0, @ANYRES16=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffe7e, 0x0, 0x0, 0x0}, 0x94) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x18, 0x4, 0x0, &(0x7f00000001c0)='GPL\x00', 0x4, 0x93, &(0x7f00000003c0)=""/147}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000080)='sched_switch\x00', r3}, 0x10) r4 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000a00)=ANY=[], 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000007c0)={r3, 0xe0, &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, &(0x7f00000003c0)=[0x0], 0x0, 0x0, 0x86, &(0x7f0000000080)=[{}, {}, {}], 0x18, 0x0, 0x0, &(0x7f00000005c0), 0x8, 0xe2, 0x8, 0x8, &(0x7f0000000600)}}, 0x10) r7 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000880)=ANY=[@ANYBLOB="9feb010018000000000000003000000030000000020000000000000001000004000000000000000002000000000000000000000000000003000000000300000001000000000000000000e1432cbd4802d2366cf2c03d75a3c01b5ac168e5e9895bda4d508fca73e78ad4060c521aac39f82dab2e8b4f84b4b49b8aab693d1d0c9ac8014e81f5b7f20fae4b4cff715b58688354d506e80c6b39960cc967c2481f7a410eb98a585ec9dc286bbf5e21c6038cf841334e03c5f671f461130fd2ba8d56"], 0x0, 0x4a}, 0x28) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000c00)=ANY=[@ANYBLOB="1b00000000000000000000000100000000000000", @ANYRES32=r4, @ANYBLOB="0600000000000000060100ca6e0004000000e3007b9af7d1b082dc51f251b851fb7811e596ea03515528c49bd1b681eefaaee78f5db65901d92ee8674d33b264f3b669a13649aed6bfc7adab79ae3a1b26ed7fe02cdf0b76c6e2337bd276ea30972b22d87e86670a832cbce267163ab4554d50b8", @ANYRES32=r6, @ANYRES32=r7, @ANYBLOB="02000000030000000500"/28], 0x50) r8 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x11, 0x10, &(0x7f0000000980)=ANY=[@ANYBLOB="61f1ce4bf20077145973016517019e8d6e8fe62f8f2c8ea7d8d590683855363dc0468337", @ANYRES16=r1, @ANYRES16=r3, @ANYRES16=r7, @ANYRES8=r0, @ANYRES32=r5, @ANYRES16=r4, @ANYBLOB="009d548a8de1f64216c78bca374bde18f701863c5f08cfc2ff5d5fc9175608ee43324610a4bab2b386d7e81baeabef50d61007718953114ab2fc86cded39af5caa625968158607b5864b6e57a7e3e608491581a053c0e0e2f690860aa906aa0c43593a913453efa0e3b8ca80c640935e18aad1d09ccc3e6af82ee4afb6808bbb9b8f5321b7215f6aaaa7cd1981e570ca3c55aaf7383b8b04a356e5d579ac6015adeca7a5fe11bd4d5d32a4edd22548bdc5e418452fc2e1afb046ca4d4e496fec4c2e2e04a73c3bbd7cda4cc36615d973b6490f745e490322e20fb49781d377d329a2", @ANYRES8, @ANYRESOCT=r2], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', r6, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000006c0)={&(0x7f0000000700)='kmem_cache_free\x00', r8}, 0x10) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext, 0x10cac4, 0xc0, 0x3, 0x2, 0x6, 0x0, 0x2, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x1) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff}) recvmsg$unix(r9, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x8000000000000000, 0x8000}, 0x4105, 0x0, 0x3}, 0x0, 0xfeffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_BIND_MAP(0xa, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000840)=ANY=[@ANYBLOB="010000000500000002000000ffff000005000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="000000000100"/28], 0x48) 2.473731061s ago: executing program 2 (id=3059): bpf$MAP_CREATE(0x0, 0x0, 0x48) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x9}, 0x50) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x18, 0x7, &(0x7f0000000080)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b702000001000000850000008600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1a, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)=ANY=[@ANYBLOB="010000000a0000000500000007"], 0x48) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000300), &(0x7f0000000100), 0x3f, r3}, 0x38) bpf$MAP_GET_NEXT_KEY(0x4, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f00000001c0)='sched_switch\x00', r1}, 0x10) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_bp={0x0, 0x2}, 0x800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) openat$cgroup_procs(r4, &(0x7f0000000840)='cgroup.procs\x00', 0x2, 0x0) r5 = bpf$PROG_LOAD(0x5, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)) perf_event_open(&(0x7f0000000380)={0x3, 0x80, 0x0, 0x0, 0x0, 0x5, 0x0, 0x4, 0x22090, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xe}, 0xa000, 0xc8, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x95ad}, 0x0, 0x101, 0xffffffffffffffff, 0x1) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r7) recvmsg$unix(r6, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) r8 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0xb, &(0x7f0000000240)=ANY=[@ANYRES32=r2], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000ac0)='kmem_cache_free\x00', r8}, 0x10) bpf$BPF_PROG_TEST_RUN_LIVE(0xa, &(0x7f00000008c0)={r5, 0x0, 0x71, 0x0, &(0x7f0000000680)="a8bf38f367fa179bf4174d0e959303fb4a2c6959687a02da24cb39327e693b868160ee12cbd1e3f261fcb512cd2aa006927f461a6f0ac0a075510d38b6beb79ef79f111c40337724ff4ce871356ac380261a7e428854e9455aa31a03451b525e0edbd3bf11ed9d4eb0c827b3e99ca78f5e", 0x0, 0xc, 0x0, 0x0, 0x0, &(0x7f0000000740), 0x0, 0x2, 0x0, 0x7f}, 0x50) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f00000002c0)={0x2, 0x80, 0x7d, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7c, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_bp={0x0}, 0x8100, 0x0, 0x0, 0x0, 0x0, 0xd531}, 0x0, 0x0, 0xffffffffffffffff, 0x2) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000080)='mem\x00\x10\x00\x00\x00\x00\x00\x00I\xa2l') r9 = syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000080)) ioctl$TUNGETFEATURES(0xffffffffffffffff, 0x800454cf, &(0x7f0000000280)) write$cgroup_subtree(r9, 0x0, 0x4) syz_clone(0x22023500, 0x0, 0x0, 0x0, 0x0, 0x0) 2.053667405s ago: executing program 2 (id=3061): bpf$MAP_CREATE(0x0, 0x0, 0x48) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000500)=ANY=[@ANYBLOB="1b00000000000000000000000080000000000000cdf534219515bd1b0e828e127b3d0d353079f9128585d7ee1b3cd208ce677fc86b365e935e0781b394821469b7c0a0992b94df290a662265c0ad13f73924a0dfbf2d57ac7a5fc25cc8372034bd605b484e2bf5670bd025b436d5e9aafe055f33cbf4481ee5973a61218f12e5e87443840c15bc42d6d6e1a1bf9a816690b80373d107b7731a93467ce8cdb7ae838f725a47fe94cd75dccb7e06e62394f754", @ANYRES32, @ANYBLOB='\t\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x50) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x18, 0x7, &(0x7f0000000080)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b702000001000000850000008600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1a, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)=ANY=[@ANYBLOB="010000000a0000000500000007"], 0x48) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000300), &(0x7f0000000100), 0x3f, r3}, 0x38) bpf$MAP_GET_NEXT_KEY(0x4, 0x0, 0x0) r4 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f00000001c0)='sched_switch\x00', r1}, 0x10) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000004, 0x0, @perf_bp={0x0, 0x2}, 0x800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) openat$cgroup_procs(r5, &(0x7f0000000840)='cgroup.procs\x00', 0x2, 0x0) r6 = bpf$PROG_LOAD(0x5, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)) perf_event_open(&(0x7f0000000380)={0x3, 0x80, 0x0, 0x0, 0x0, 0x5, 0x0, 0x4, 0x22090, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xe}, 0xa000, 0xc8, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x95ad}, 0x0, 0x101, 0xffffffffffffffff, 0x1) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r8) recvmsg$unix(r7, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) r10 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0xb, &(0x7f0000000240)=ANY=[@ANYRES32=r2], &(0x7f0000000040)='GPL\x00', 0x7f, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r9, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000ac0)='kmem_cache_free\x00', r10}, 0x10) bpf$BPF_PROG_TEST_RUN_LIVE(0xa, &(0x7f00000008c0)={r6, 0x0, 0x71, 0x0, &(0x7f0000000680)="a8bf38f367fa179bf4174d0e959303fb4a2c6959687a02da24cb39327e693b868160ee12cbd1e3f261fcb512cd2aa006927f461a6f0ac0a075510d38b6beb79ef79f111c40337724ff4ce871356ac380261a7e428854e9455aa31a03451b525e0edbd3bf11ed9d4eb0c827b3e99ca78f5e", 0x0, 0xc, 0x0, 0x0, 0x0, &(0x7f0000000740), 0x0, 0x2, 0x0, 0x7f}, 0x50) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f00000002c0)={0x2, 0x80, 0x7d, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7c, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_bp={0x0}, 0x8100, 0x0, 0x0, 0x0, 0x0, 0xd531}, 0x0, 0x20000000000000, r4, 0x2) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000080)='mem\x00\x10\x00\x00\x00\x00\x00\x00I\xa2l') r11 = syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000080)) ioctl$TUNGETFEATURES(0xffffffffffffffff, 0x800454cf, &(0x7f0000000280)) write$cgroup_subtree(r11, 0x0, 0x4) syz_clone(0x22023500, 0x0, 0x0, 0x0, 0x0, 0x0) 2.025793997s ago: executing program 3 (id=3063): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000640)=ANY=[@ANYBLOB="18060000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000003000000b703000000000000850000007300000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000080)='sched_switch\x00', r0}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000006c0)={0x6, 0xe, &(0x7f00000008c0)=ANY=[@ANYBLOB="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"/686], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @xdp, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x3a, 0x10, &(0x7f0000000340), 0xd58495bc, 0x0, 0xffffffffffffffff, 0xffffffffffffff5b}, 0x42) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000c80)={r1, 0x2000012, 0xeaa, 0x7ffe, &(0x7f00000003c0)="63eced8e46dc3f2ddf33c9e9b986", 0x0, 0x7ffe, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, 0x0}, 0x0) r2 = openat$cgroup_devices(0xffffffffffffffff, &(0x7f0000000040)='devices.allow\x00', 0x2, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000480)={0x11, 0x10, &(0x7f0000000a40)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x8000}, {}, {}, [@call={0x85, 0x0, 0x0, 0x7d}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000ac0)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x8, '\x00', 0x0, @fallback=0x33, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000002c0)={r3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000003f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x20}, 0x15) write$cgroup_devices(r2, &(0x7f0000000440)=ANY=[@ANYBLOB], 0x9) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, 0x0, &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x12, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d0000001801000020696c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000000085000000700000"], 0x0, 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback=0x30, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x801}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d0000001801000020696c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000000000008500000071"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000070000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb70200000800"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x19, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d0000001801000020696c2500000000002020097b1af8ff00000000bfa100000000000007010000b8ffffffb702000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, '\x00', 0x0, @fallback=0x29, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r4 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240)={0x2, 0x4, 0x8, 0x1, 0x80, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) r5 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000007c0)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000840)={0x10, 0x1c, &(0x7f0000000040)=@ringbuf={{0x18, 0x8}, {{0x18, 0x1, 0x1, 0x0, r5}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1c}, {}, {0x85, 0x0, 0x0, 0x5}, {0x4, 0x1, 0xb, 0x9, 0xa}}, {{0x5, 0x0, 0x3}}, [@snprintf={{0x7, 0x0, 0xb, 0x2, 0x0, 0x1800, 0x4}, {0x3, 0x0, 0x3, 0xa, 0x2}, {0x5, 0x0, 0xb, 0x9}, {0x3, 0x0, 0x6, 0xa, 0xa, 0xfff8, 0xf1}, {0x7, 0x1, 0xb, 0x6, 0x8}, {0x7, 0x0, 0x0, 0x8}, {}, {}, {0x4, 0x0, 0xc}, {0x18, 0x2, 0x2, 0x0, r4}, {}, {0x46, 0x8, 0xfff0, 0x76}}], {{0x7, 0x1, 0xb, 0x8}, {0x6, 0x0, 0x5, 0x8}, {0x85, 0x0, 0x0, 0x7}}}, &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sk_msg, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_CREATE(0x0, &(0x7f0000000380)=ANY=[], 0x48) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r6, 0x8914, &(0x7f0000000000)={'veth0_vlan\x00', @remote}) 1.876304399s ago: executing program 3 (id=3065): syz_open_procfs$namespace(0x0, 0xfffffffffffffffe) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000001000000b703000000000000850000002d00000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='kmem_cache_free\x00', r0}, 0x10) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x1c1341, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000000c0)={'syzkaller0\x00', 0x84aebfbd6349b7f2}) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'syzkaller0\x00', 0xca58c30f81b6079f}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x3, &(0x7f0000000740)=ANY=[@ANYBLOB="18000000000000000000d107000000009500000000000000"], &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f0000000080)='sched_switch\x00', r3}, 0x18) bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="1000000004000000040000000200000000000000", @ANYRES32=0x1, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="fdffffff044a19000000000000000000000000000000000000000000bba46fcc79ab92b024bc2c7e953af7432fd55dc9ca92b31fbef99cea639b47a477920fd8a3699a15f0607d573ffc34c9ceb02aa23c83d95143a1786ae042f02acf57c6931d3a92e390befd7624fa10ddfc5aa3f8a36cfcb84e7005e7295a9351a3abbbc6061b4a99c5693134b0b7904438d5fe0b71ec91"], 0x50) bpf$ENABLE_STATS(0x20, 0x0, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x16, 0xc, &(0x7f0000000000)=ANY=[@ANYBLOB="180000000000000000000000000000008500000008000000180100002020732500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007000000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x40e00, 0x0, '\x00', 0x0, @flow_dissector, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000240)={r4, 0x0, 0x10, 0x10, &(0x7f00000002c0)="0000ffffffffa000", &(0x7f0000000300)=""/8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x4c) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f0000000080)) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000480)=ANY=[@ANYBLOB="8fb4edcb050000000200009d3ba92f0000"], 0xfdef) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x204, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x100000001}, 0x0, 0xb4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000b80)=ANY=[@ANYBLOB="9feb01005ffc"], 0x0, 0xfc5f}, 0x28) r5 = bpf$PROG_LOAD(0x5, 0x0, 0x0) mkdir(&(0x7f0000000380)='./file0/file0\x00', 0x107) r6 = openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) socketpair$tipc(0x1e, 0x7, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) r8 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000280)=@o_path={&(0x7f0000000240)='./file0\x00', 0x0, 0xc000, r5}, 0x18) setsockopt$sock_attach_bpf(r7, 0x1, 0x32, &(0x7f0000000340)=r8, 0x4) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f00000003c0)='kfree\x00', r0, 0x0, 0x3}, 0x18) r9 = bpf$PROG_LOAD(0x5, 0x0, 0x0) syz_clone(0x42a00180, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={@map, 0x24, 0x0, 0x8, &(0x7f0000000000)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x8, 0x0, &(0x7f0000000040)=[0x0], &(0x7f00000000c0)=[0x0], &(0x7f0000000100)=[0x0, 0x0, 0x0], 0x0}, 0x40) r11 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f00000001c0)=0xffffffffffffffff, 0x4) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000180)={@cgroup=r6, r5, 0x25, 0x2000, r9, @value=r11, @void, @void, @void, r10}, 0x20) 1.832984143s ago: executing program 1 (id=3067): bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x0, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x1, 0xe, &(0x7f0000001880)=ANY=[@ANYBLOB="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"], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0xfffffffffffffd00}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000edff0000000000000000850000000f00000018010000646c012500000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000800000850000000600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x1d, &(0x7f00000001c0), 0x4) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1b, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000016"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000300)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00', r1}, 0x10) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa021, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0xc8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0xd) sendmsg$inet(0xffffffffffffffff, &(0x7f0000000940)={0x0, 0x0, 0x0}, 0x80) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB], 0x48) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[], 0x48) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) recvmsg$unix(0xffffffffffffffff, 0x0, 0x0) 1.74854169s ago: executing program 2 (id=3068): socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) syz_clone(0x40000000, 0x0, 0x0, 0x0, 0x0, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=@framed={{0x18, 0x0, 0x0, 0x0, 0xfff}, [@printk={@p, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x83000000}, {0x85, 0x0, 0x0, 0x71}}]}, &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='cpuacct.usage_all\x00', 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000500)={0xffffffffffffffff, 0xe0, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, &(0x7f0000000300)=[0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x2, 0x3, &(0x7f0000000340)=[0x0, 0x0], &(0x7f0000000380)=[0x0, 0x0, 0x0], 0x0, 0x23, &(0x7f00000003c0)=[{}], 0x8, 0x10, &(0x7f0000000440), &(0x7f0000000480), 0x8, 0x84, 0x8, 0x8, &(0x7f00000004c0)}}, 0x10) r5 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000680)=0xffffffffffffffff, 0x4) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0xb, 0x8, 0x4, 0x6, 0x1, 0xffffffffffffffff, 0xfffffffe}, 0x48) socketpair(0x25, 0x800, 0x6, &(0x7f0000000000)) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000000c0), &(0x7f0000000140), 0x5, r6}, 0x38) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={r6}, 0x20) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000580)={0xffffffffffffffff, 0xe0, &(0x7f0000000680)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, &(0x7f00000001c0)=[0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x8, 0x2, &(0x7f0000000340)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000003c0)=[0x0, 0x0], 0x0, 0xc6, &(0x7f0000000400)=[{}, {}], 0x10, 0x10, &(0x7f00000004c0), &(0x7f0000000500), 0x8, 0xc6, 0x8, 0x8, &(0x7f0000000540)}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1801000000000000000000000000000100120000", @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000f6000000850000004300"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r7, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000800)={0x15, 0x17, &(0x7f0000000980)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x57, 0x0, 0x0, 0x0, 0xa}, {{0x18, 0x1, 0x1, 0x0, r3}}, {}, [@btf_id={0x18, 0x5, 0x3, 0x0, 0x2}, @map_idx={0x18, 0x1}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffc}, @ldst={0x1, 0x3, 0x3, 0xb, 0x2, 0x50, 0xfffffffffffffff0}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x4}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x3}], {{}, {}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000040)='GPL\x00', 0x802, 0x0, 0x0, 0x41000, 0x50, '\x00', r4, @sk_reuseport=0x27, r5, 0x8, &(0x7f00000006c0)={0x1, 0x4}, 0x8, 0x10, &(0x7f0000000700)={0x3, 0x6, 0x6, 0xa}, 0x10, r7, r3, 0x0, 0x0, 0x0, 0x10, 0x3}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000080)='sched_switch\x00', r2}, 0x10) close(r1) recvmsg$unix(r0, &(0x7f0000000400)={0x0, 0x0, 0x0}, 0x0) 1.533966827s ago: executing program 2 (id=3070): r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="02000000040000000800000001"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000700)={0x0, 0x10, &(0x7f0000000580)=ANY=[@ANYBLOB="0000000000000000b704000001000000850000007800000095", @ANYRES32=r0, @ANYRES16=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffe7e, 0x0, 0x0, 0x0}, 0x94) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x18, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB], &(0x7f00000001c0)='GPL\x00', 0x4, 0x93, &(0x7f00000003c0)=""/147}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000080)='sched_switch\x00', r3}, 0x10) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000007c0)={r3, 0xe0, &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, &(0x7f00000003c0)=[0x0], 0x0, 0x0, 0x86, &(0x7f0000000080)=[{}, {}, {}], 0x18, 0x0, 0x0, &(0x7f00000005c0), 0x8, 0xe2, 0x8, 0x8, &(0x7f0000000600)}}, 0x10) r6 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000880)=ANY=[@ANYBLOB="9feb010018000000000000003000000030000000020000000000000001000004000000000000000002000000000000000000000000000003000000000300000001000000000000000000e1432cbd4802d2366cf2c03d75a3c01b5ac168e5e9895bda4d508fca73e78ad4060c521aac39f82dab2e8b4f84b4b49b8aab693d1d0c9ac8014e81f5b7f20fae4b4cff715b58688354d506e80c6b39960cc967c2481f7a410eb98a585ec9dc286bbf5e21c6038cf841334e03c5f671f461130fd2ba8d56"], 0x0, 0x4a}, 0x28) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000c00)=ANY=[@ANYBLOB="1b00000000000000000000000100000000000000", @ANYRES32, @ANYBLOB="0600000000000000060100ca6e0004000000e3007b9af7d1b082dc51f251b851fb7811e596ea03515528c49bd1b681eefaaee78f5db65901d92ee8674d33b264f3b669a13649aed6bfc7adab79ae3a1b26ed7fe02cdf0b76c6e2337bd276ea30972b22d87e86670a832cbce267163ab4554d50b8", @ANYRES32=r5, @ANYRES32=r6, @ANYBLOB="02000000030000000500"/28], 0x50) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x11, 0x10, &(0x7f0000000980)=ANY=[@ANYBLOB="61f1ce4bf20077145973016517019e8d6e8fe62f8f2c8ea7d8d590683855363dc0468337", @ANYRES16=r1, @ANYRES16=r3, @ANYRES16=r6, @ANYRES8=r0, @ANYRES32=r4, @ANYRES16, @ANYBLOB="009d548a8de1f64216c78bca374bde18f701863c5f08cfc2ff5d5fc9175608ee43324610a4bab2b386d7e81baeabef50d61007718953114ab2fc86cded39af5caa625968158607b5864b6e57a7e3e608491581a053c0e0e2f690860aa906aa0c43593a913453efa0e3b8ca80c640935e18aad1d09ccc3e6af82ee4afb6808bbb9b8f5321b7215f6aaaa7cd1981e570ca3c55aaf7383b8b04a356e5d579ac6015adeca7a5fe11bd4d5d32a4edd22548bdc5e418452fc2e1afb046ca4d4e496fec4c2e2e04a73c3bbd7cda4cc36615d973b6490f745e490322e20fb49781d377d329a2", @ANYRES8, @ANYRESOCT=r2], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', r5, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000006c0)={&(0x7f0000000700)='kmem_cache_free\x00', r7}, 0x10) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext, 0x10cac4, 0xc0, 0x3, 0x2, 0x6, 0x0, 0x2, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x1) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r9) recvmsg$unix(r8, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x8000000000000000, 0x8000}, 0x4105, 0x0, 0x3}, 0x0, 0xfeffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_BIND_MAP(0xa, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000840)=ANY=[@ANYBLOB="010000000500000002000000ffff000005000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="000000000100"/28], 0x48) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f00000000c0)='sched_switch\x00'}, 0x10) r10 = bpf$PROG_LOAD(0x5, &(0x7f0000000b40)={0xb, 0x8, &(0x7f00000017c0)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x4, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={0x0, r10}, 0x18) r11 = openat$tun(0xffffffffffffff9c, &(0x7f0000000180), 0x214801, 0x0) ioctl$TUNGETVNETHDRSZ(r11, 0x800454d7, 0x0) 1.325902324s ago: executing program 0 (id=3071): bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x17, 0xc, &(0x7f0000000440)=@framed={{0x18, 0x2, 0x0, 0x0, 0xffffffff}, [@printk={@ld}, @call={0x85, 0x0, 0x0, 0x7d}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0), 0x1c1842, 0x0) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, 0x0}, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB="16000000000000000400"], 0x50) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b7040000000000008500000057"], 0x0}, 0x94) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r3}, 0x10) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000058"], 0x0}, 0x90) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0xb, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000300)='qdisc_create\x00', r4}, 0x10) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r5, 0x8914, &(0x7f0000002280)={'syzkaller0\x00', @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x1}}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000040)='task_newtask\x00', r0}, 0x10) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000040)='task_newtask\x00', r6}, 0x10) syz_clone(0x400, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="0100000040000400060000000800000001000000", @ANYRES32, @ANYRESDEC], 0x48) 1.325659354s ago: executing program 3 (id=3072): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0200000004000000040000000c0000000010"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0xd, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000000100000000000000850000006d00000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000010b704000000000000850000000100000095"], &(0x7f00000001c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={&(0x7f0000000280)='tlb_flush\x00', r1}, 0x18) 1.303238985s ago: executing program 4 (id=3073): bpf$MAP_CREATE(0x0, 0x0, 0x48) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000500)=ANY=[@ANYBLOB="1b00000000000000000000000080000000000000590a3cdbd7bb0c2da8db8ecec35f9a26469527f11ef826e38f98f6d0c3c70a31a0a954c600627b900000000000000001b425e2086512038c5cf3925d688ffa6afe04569559d63be091d8b854f61da92464a8541495e38d94aa71687291b1a7e995eec9bdbe2ab66b89573838e8bf4d23b3ac144dcf22de9be644e9e87d", @ANYRES32, @ANYBLOB='\t\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x50) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x18, 0x7, &(0x7f0000000080)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b702000001000000850000008600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1a, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)=ANY=[@ANYBLOB="010000000a0000000500000007"], 0x48) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000300), &(0x7f0000000100), 0x3f, r3}, 0x38) r4 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f00000001c0)='sched_switch\x00', r1}, 0x10) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x1, @perf_bp={0x0, 0x2}, 0x800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) openat$cgroup_procs(r5, &(0x7f0000000840)='cgroup.procs\x00', 0x2, 0x0) r6 = bpf$PROG_LOAD(0x5, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)) perf_event_open(&(0x7f0000000380)={0x3, 0x80, 0x0, 0x0, 0x0, 0x5, 0x0, 0x4, 0x22090, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000, 0x0, @perf_config_ext={0x1, 0x4}, 0xa000, 0xc8, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x95ad}, 0x0, 0x101, 0xffffffffffffffff, 0x1) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r8) recvmsg$unix(r7, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) r9 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0xb, &(0x7f0000000240)=ANY=[@ANYRES32=r2], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000ac0)='kmem_cache_free\x00', r9}, 0x10) bpf$BPF_PROG_TEST_RUN_LIVE(0xa, &(0x7f00000008c0)={r6, 0x0, 0x71, 0x0, &(0x7f0000000680)="a8bf38f367fa179bf4174d0e959303fb4a2c6959687a02da24cb39327e693b868160ee12cbd1e3f261fcb512cd2aa006927f461a6f0ac0a075510d38b6beb79ef79f111c40337724ff4ce871356ac380261a7e428854e9455aa31a03451b525e0edbd3bf11ed9d4eb0c827b3e99ca78f5e", 0x0, 0xc, 0x0, 0x0, 0x0, &(0x7f0000000740), 0x0, 0x2, 0x0, 0x7f}, 0x50) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f00000002c0)={0x2, 0x80, 0x7d, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x2, r4, 0x0) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7c, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_bp={0x0}, 0x8100, 0x0, 0x0, 0x0, 0x0, 0xd531}, 0x0, 0x0, 0xffffffffffffffff, 0x2) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000080)='mem\x00\x10\x00\x00\x00\x00\x00\x00I\xa2l') socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000002d40)) r10 = syz_open_procfs$namespace(0x0, &(0x7f0000000600)='ns/pid\x00') ioctl$TUNGETFEATURES(0xffffffffffffffff, 0x800454cf, &(0x7f0000000280)) write$cgroup_subtree(r10, 0x0, 0x4) syz_clone(0x22023500, 0x0, 0x0, 0x0, 0x0, 0x0) 1.268934748s ago: executing program 0 (id=3074): r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x10020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1c, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18020000000000000000"], 0x0}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000200)={{r1}, &(0x7f0000000180), &(0x7f00000001c0)=r0}, 0x20) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$ITER_CREATE(0x21, &(0x7f0000000040), 0x8) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000180)='sched_switch\x00', r2}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000300)=ANY=[@ANYBLOB="0290da00040000000400000001000000840800008e00d05153dc07ef0007dfa753c171e43dd86f9bd42df3d13040672f944c656ca06c8ee04e0aa55705a8ec7d944b37bc4ece1561cbed9b2e99454a991acd7c509f3987942178d7b6b2dcaf63a30c8bdf84641eaf35458a42096c0ceb07a1ba45739c8f91dc5d5f9d27d8c709c102d86969fb7ed7be4d1831187677da72c01329e95abf6cca4f1392e1ce7e6205efa9346cb4abe2140cb56ae853182fcf", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x50) bpf$PROG_LOAD(0x5, 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r3, 0x8914, &(0x7f0000000000)={'veth0_vlan\x00', @remote}) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB], 0x48) bpf$MAP_CREATE(0x0, 0x0, 0x50) r4 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f00000009c0)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000083850000007100000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000000)='kfree\x00', r5}, 0x10) syz_clone(0x630c1100, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$TUNSETOFFLOAD(r4, 0xc004743e, 0x110e22fff6) close(r4) bpf$OBJ_GET_PROG(0x7, 0x0, 0x0) close(0xffffffffffffffff) perf_event_open(&(0x7f0000000500)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x2000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r6, 0x8914, &(0x7f0000000000)={'veth0_vlan\x00', @random="0106002010ff"}) 1.263494009s ago: executing program 3 (id=3075): bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={0x0}, 0x18) perf_event_open(0x0, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r0, 0x8914, &(0x7f0000000000)={'sit0\x00', @local}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={0x0}, 0x18) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002200)={0x18, 0x5, &(0x7f0000000680)=ANY=[@ANYBLOB="18020000000000200000000000000000850000009e000000c300000d0000000095"], &(0x7f0000000100)='GPL\x00'}, 0x2d) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000e00)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r1, 0x8914, &(0x7f0000000040)={'sit0\x00', @random="4f33e363a4b1"}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x20, 0x13, &(0x7f0000000080)=@framed={{0x18, 0x8, 0x0, 0x0, 0xffd0}, [@func={0x85, 0x0, 0x1, 0x0, 0x6}, @map_fd={0x18, 0x0, 0x0}, @generic={0x66, 0x8}, @initr0, @exit, @alu={0x6, 0x0, 0x3, 0xa, 0x0, 0x2}, @printk={@x, {}, {}, {}, {}, {0x5, 0x0, 0xb, 0xa}}]}, &(0x7f0000000000)='GPL\x00', 0x2, 0xff5c, &(0x7f0000000340)=""/222, 0x0, 0x8}, 0x78) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000340), 0x9) r2 = bpf$ITER_CREATE(0x21, &(0x7f0000000380), 0x8) ioctl$TUNSETOFFLOAD(r2, 0x400454d0, 0x10) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000500)={&(0x7f00000002c0)=ANY=[@ANYBLOB="9feb010018000000000000000c0800000cb04db95f6d61ede73c5df9000000000000000000000007e5b543000006040000"], 0x0, 0x26}, 0x20) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000000c0)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup.net/syz1\x00', 0x1ff) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x11, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1801000021000000000000004bc311ec8500000075000000850000000800000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='signal_deliver\x00', r3}, 0x10) syz_open_procfs$namespace(0x0, 0xfffffffffffffffe) 1.156359087s ago: executing program 2 (id=3076): r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x10020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$MAP_CREATE(0x0, &(0x7f00000008c0)=ANY=[@ANYBLOB, @ANYRES32, @ANYRES32, @ANYBLOB="0000000000000000000000000000000000000000000000000000000057c32a33d659defdfe09b6d9a0d79cde2dfafdca0524c42f18ed85ce6adacbfaff7063774f3c1ee4146db42004a681800a129ef33fd510"], 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, 0x0) close(0xffffffffffffffff) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000880)={0xffffffffffffffff, 0xe0, &(0x7f0000000780)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0xa, 0x6, &(0x7f0000000600)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000440)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0xe1, &(0x7f0000000680)=[{}], 0x8, 0x10, &(0x7f00000006c0), &(0x7f0000000700), 0x8, 0xc0, 0x8, 0x8, &(0x7f0000000740)}}, 0x10) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x1b, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x11, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r4, 0x0, 0x36, 0x0, 0x0, 0x0, 0xe8c}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000e80)={0x0, 0x4, &(0x7f0000000a00)=ANY=[@ANYBLOB="180210000013d249a14d1c69b3e1fb6d1c360fa3c42c855b544a398733c2c21cefaa53c786f60785c8bbfbe4de487f521e74ce8506459a17f9a5be8a87a0a1629f526f469f2bd3457e21815cc06bb000"], 0x0, 0x10000000, 0x0, 0x0, 0x41000, 0x54}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000200)={{r2}, &(0x7f0000000180), &(0x7f00000001c0)=r1}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f0000000dc0)={0x13, 0x10, &(0x7f0000000b00)=ANY=[@ANYBLOB="1800000006000000000000000004000018110000", @ANYRES32, @ANYBLOB="0000000000000000b702000014000000b7030000839c05ab69fc77ac090f442608d64221000000008500000083000000bf09000000000000550901000000006ec891009500000000000000058a010000dd0000bf91000000000000b7020000020000008500000085000000b7000000000000009500000000"], &(0x7f00000002c0)='syzkaller\x00', 0x3, 0x69, &(0x7f0000000a80)=""/105, 0x40f00, 0x0, '\x00', r3, @fallback=0x4, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000bc0)={0x5, 0x2, 0x8, 0x800}, 0x10, r4, r5, 0x9, 0x0, &(0x7f0000000d00)=[{0x5, 0x5, 0xa, 0xc}, {0x2, 0x3, 0x9, 0x3}, {0x1, 0x1, 0x6, 0x9}, {0x1, 0x5, 0xd, 0x5}, {0x3, 0x5, 0x7, 0xa}, {0x0, 0x4, 0xe, 0xa}, {0x4, 0x4, 0xd, 0x5}, {0x5, 0x2, 0x1, 0xc}, {0x5, 0x4, 0x2, 0x9}]}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) ioctl$TUNSETOFFLOAD(r0, 0xc004743e, 0x110e22fff6) r6 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x1, 0x0) ioctl$TUNSETOFFLOAD(r6, 0x4004743d, 0x110e22fff6) close(r6) 901.378168ms ago: executing program 1 (id=3077): r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="02000000040000000800000001"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000700)={0x0, 0x10, &(0x7f0000000580)=ANY=[@ANYBLOB="0000000000000000b704000001000000850000007800000095", @ANYRES32=r0, @ANYRES16=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffe7e, 0x0, 0x0, 0x0}, 0x94) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x18, 0x4, &(0x7f0000000000)=ANY=[], &(0x7f00000001c0)='GPL\x00', 0x4, 0x93, &(0x7f00000003c0)=""/147}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000080)='sched_switch\x00', r3}, 0x10) r4 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000a00)=ANY=[], 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000007c0)={r3, 0xe0, &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, &(0x7f00000003c0)=[0x0], 0x0, 0x0, 0x86, &(0x7f0000000080)=[{}, {}, {}], 0x18, 0x0, 0x0, &(0x7f00000005c0), 0x8, 0xe2, 0x8, 0x8, &(0x7f0000000600)}}, 0x10) r7 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000880)=ANY=[@ANYBLOB="9feb010018000000000000003000000030000000020000000000000001000004000000000000000002000000000000000000000000000003000000000300000001000000000000000000e1432cbd4802d2366cf2c03d75a3c01b5ac168e5e9895bda4d508fca73e78ad4060c521aac39f82dab2e8b4f84b4b49b8aab693d1d0c9ac8014e81f5b7f20fae4b4cff715b58688354d506e80c6b39960cc967c2481f7a410eb98a585ec9dc286bbf5e21c6038cf841334e03c5f671f461130fd2ba8d56"], 0x0, 0x4a}, 0x28) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000c00)=ANY=[@ANYBLOB="1b00000000000000000000000100000000000000", @ANYRES32=r4, @ANYBLOB="0600000000000000060100ca6e0004000000e3007b9af7d1b082dc51f251b851fb7811e596ea03515528c49bd1b681eefaaee78f5db65901d92ee8674d33b264f3b669a13649aed6bfc7adab79ae3a1b26ed7fe02cdf0b76c6e2337bd276ea30972b22d87e86670a832cbce267163ab4554d50b8", @ANYRES32=r6, @ANYRES32=r7, @ANYBLOB="02000000030000000500"/28], 0x50) r8 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x11, 0x10, &(0x7f0000000980)=ANY=[@ANYBLOB="61f1ce4bf20077145973016517019e8d6e8fe62f8f2c8ea7d8d590683855363dc0468337", @ANYRES16=r1, @ANYRES16=r3, @ANYRES16=r7, @ANYRES8=r0, @ANYRES32=r5, @ANYRES16=r4, @ANYBLOB="009d548a8de1f64216c78bca374bde18f701863c5f08cfc2ff5d5fc9175608ee43324610a4bab2b386d7e81baeabef50d61007718953114ab2fc86cded39af5caa625968158607b5864b6e57a7e3e608491581a053c0e0e2f690860aa906aa0c43593a913453efa0e3b8ca80c640935e18aad1d09ccc3e6af82ee4afb6808bbb9b8f5321b7215f6aaaa7cd1981e570ca3c55aaf7383b8b04a356e5d579ac6015adeca7a5fe11bd4d5d32a4edd22548bdc5e418452fc2e1afb046ca4d4e496fec4c2e2e04a73c3bbd7cda4cc36615d973b6490f745e490322e20fb49781d377d329a2", @ANYRES8, @ANYRESOCT=r2], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', r6, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000006c0)={&(0x7f0000000700)='kmem_cache_free\x00', r8}, 0x10) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext, 0x10cac4, 0xc0, 0x3, 0x2, 0x6, 0x0, 0x2, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x1) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff}) recvmsg$unix(r9, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x8000000000000000, 0x8000}, 0x4105, 0x0, 0x3}, 0x0, 0xfeffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_BIND_MAP(0xa, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000840)=ANY=[@ANYBLOB="010000000500000002000000ffff000005000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="000000000100"/28], 0x48) 832.244724ms ago: executing program 4 (id=3078): r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="02000000040000000800000001"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000700)={0x0, 0x10, &(0x7f0000000580)=ANY=[@ANYBLOB="0000000000000000b704000001000000850000007800000095", @ANYRES32=r0, @ANYRES16=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffe7e, 0x0, 0x0, 0x0}, 0x94) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x18, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="18010000200180000000000000000000850000007b000000"], &(0x7f00000001c0)='GPL\x00', 0x4, 0x93, &(0x7f00000003c0)=""/147}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000080)='sched_switch\x00', r1}, 0x10) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000a00)=ANY=[], 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000007c0)={r1, 0xe0, &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0), 0x0, 0x0, 0x86, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe2, 0x8, 0x0, 0x0}}, 0x10) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) bpf$MAP_CREATE_RINGBUF(0x0, 0x0, 0x50) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x1) socketpair$unix(0x1, 0x5, 0x0, 0x0) close(0xffffffffffffffff) recvmsg$unix(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x8000000000000000, 0x8000}, 0x4105, 0x0, 0x3}, 0x0, 0xfeffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_BIND_MAP(0xa, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000840)=ANY=[@ANYBLOB="010000000500000002000000ffff000005000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="000000000100"/28], 0x48) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f00000000c0)='sched_switch\x00'}, 0x10) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000b40)={0xb, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x4, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={0x0, r2}, 0x18) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000180), 0x214801, 0x0) ioctl$TUNGETVNETHDRSZ(r3, 0x800454d7, 0x0) 721.462752ms ago: executing program 2 (id=3079): bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @cgroup_skb, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x5, 0x400, 0x9, 0x1}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f00000004c0)={r0, &(0x7f0000000340), &(0x7f00000005c0)=""/155}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x10}}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000040)={0x5, 0x5, &(0x7f00000001c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x300}, [@ldst={0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1a7fbb}, @ldst={0x6, 0x0, 0x6, 0x0, 0x0, 0xfffffffffffffffe, 0xa000000}], {0x95, 0x0, 0x300}}, &(0x7f0000000000)='syzkaller\x00', 0x5, 0xf4240, &(0x7f0000000100)=""/147}, 0x80) 510.305699ms ago: executing program 4 (id=3080): r0 = perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x34120, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) socketpair(0x2c, 0x3, 0x0, &(0x7f0000000040)) (async) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="1b00000000000000000000000080000000000000", @ANYRES32, @ANYBLOB="0000000000000000000000000400000000000000", @ANYRES32=0x0, @ANYRES32, @ANYBLOB], 0x48) (async) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000100)='kmem_cache_free\x00', r2}, 0x18) (async) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'bond_slave_1\x00'}) perf_event_open(&(0x7f0000000280)={0x6, 0x80, 0x40, 0x10, 0x20, 0x4, 0x7602, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080), 0x1}, 0x0, 0x8000000000000, 0x0, 0x5, 0x0, 0x4, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1b, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c}, 0x94) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18020000000000000000"], 0x0}, 0x94) (async) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000200)={{r1}, &(0x7f0000000180), &(0x7f00000001c0)=r0}, 0x20) (async) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r3}, 0x10) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) bpf$PROG_LOAD(0x5, 0x0, 0x0) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) (async) socketpair(0x11, 0xa, 0x9, &(0x7f00000001c0)) (async) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, 0x0, &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r4 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r4, 0x2401, 0x3) (async) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000080)={0x1a, 0x4, &(0x7f0000000040)=@framed={{}, [@call={0x85, 0x0, 0x0, 0x19}]}, &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x19, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x2000}, 0x80) (async) bpf$MAP_CREATE_RINGBUF(0x0, 0x0, 0x0) syz_clone(0xe50c1700, 0x0, 0x0, 0x0, 0x0, 0x0) (async) socketpair$tipc(0x1e, 0x1, 0x0, 0x0) 458.624443ms ago: executing program 0 (id=3081): openat$tun(0xffffffffffffff9c, 0x0, 0x10840, 0x0) bpf$MAP_CREATE(0x100000000000000, 0x0, 0x0) syz_open_procfs$namespace(0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, 0x0, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000180)={{r0}, &(0x7f0000000040), &(0x7f0000000080)}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000004018110000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8000, 0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x4, 0xe, &(0x7f0000000200)=ANY=[@ANYBLOB="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"], &(0x7f00000001c0)='GPL\x00', 0x8000000, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0xffffffffffffff97, 0x10, &(0x7f00000000c0), 0xffffffffffffffc2}, 0x48) 376.02262ms ago: executing program 0 (id=3082): r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000000000000000000000000000850000002a00000095"], &(0x7f0000000440)='GPL\x00', 0x4, 0x99, &(0x7f0000000480)=""/153}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='kmem_cache_free\x00', r0}, 0x10) perf_event_open(&(0x7f0000000380)={0x3, 0x80, 0x0, 0x0, 0x0, 0x5, 0x0, 0x4, 0x22090, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xe}, 0xa000, 0xc8, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x95ad}, 0x0, 0x101, 0xffffffffffffffff, 0x1) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r2) recvmsg$unix(r1, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r3, &(0x7f0000000300)=ANY=[@ANYBLOB="8fedcb7910009875f37538e486dd6317ce8102033300fe08000e40000200875a65969ff57b00ff0000000000000000000000ac1414aa"], 0xfdef) 375.53574ms ago: executing program 0 (id=3083): r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x10020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000008c0)=ANY=[@ANYBLOB="0b00000007000000010001004900000001000000", @ANYRES32, @ANYBLOB="0000000000000000000000000000000000000000000000000000000057c32a33d659defdfe09b6d9a0d79cde2dfafdca0524c42f18ed85ce6adacbfaff7063774f3c1ee4146db42004a681800a129ef33fd510"], 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000000)={{r1}, &(0x7f0000000580), &(0x7f00000005c0)}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000070000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000a5df850000002d00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000002ec0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000001300)={&(0x7f0000000c00)='net_dev_start_xmit\x00', r3}, 0x10) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r2, 0x18000000000002a0, 0xe2c, 0x60000000, &(0x7f0000000100)="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", 0x0, 0x24, 0x60000000, 0x0, 0x0, &(0x7f0000000000), &(0x7f0000000000), 0x0, 0x0, 0xf000000}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x11, 0xd, &(0x7f00000002c0)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000880)={0xffffffffffffffff, 0xe0, &(0x7f0000000780)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000340)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0xa, 0x6, &(0x7f0000000600)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000440)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0xe1, &(0x7f0000000680)=[{}], 0x8, 0x10, &(0x7f00000006c0), &(0x7f0000000700), 0x8, 0xc0, 0x8, 0x8, &(0x7f0000000740)}}, 0x10) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x1b, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x11, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r6, 0x0, 0x36, 0x0, 0x0, 0x0, 0xe8c}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000e80)={0x0, 0x4, &(0x7f0000000a00)=ANY=[@ANYBLOB="180210000013d249a14d1c69b3e1fb6d1c360fa3c42c855b544a398733c2c21cefaa53c786f60785c8bbfbe4de487f521e74ce8506459a17f9a5be8a87a0a1629f526f469f2bd3457e21815cc06bb000"], 0x0, 0x10000000, 0x0, 0x0, 0x41000, 0x54}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000dc0)={0x13, 0x10, &(0x7f0000000b00)=ANY=[@ANYBLOB="1800000006000000000000000004000018110000", @ANYRES32, @ANYBLOB="0000000000000000b702000014000000b7030000839c05ab69fc77ac090f442608d64221000000008500000083000000bf09000000000000550901000000006ec891009500000000000000058a010000dd0000bf91000000000000b7020000020000008500000085000000b7000000000000009500000000"], &(0x7f00000002c0)='syzkaller\x00', 0x3, 0x69, &(0x7f0000000a80)=""/105, 0x40f00, 0x0, '\x00', r5, @fallback=0x4, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000bc0)={0x5, 0x2, 0x8, 0x800}, 0x10, r6, r7, 0x9, 0x0, &(0x7f0000000d00)=[{0x5, 0x5, 0xa, 0xc}, {0x2, 0x3, 0x9, 0x3}, {0x1, 0x1, 0x6, 0x9}, {0x1, 0x5, 0xd, 0x5}, {0x3, 0x5, 0x7, 0xa}, {0x0, 0x4, 0xe, 0xa}, {0x4, 0x4, 0xd, 0x5}, {0x5, 0x2, 0x1, 0xc}, {0x5, 0x4, 0x2, 0x9}]}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) ioctl$TUNSETOFFLOAD(r0, 0xc004743e, 0x110e22fff6) r8 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x1, 0x0) ioctl$TUNSETOFFLOAD(r8, 0x4004743d, 0x110e22fff6) close(r8) 157.259228ms ago: executing program 4 (id=3084): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000740)=ANY=[@ANYBLOB="1600000000ff0000000000000000000000000000de8581175eda66548c567d556937280d44d3806bad80ba4bce9be20aa333f44bd577f0dcf3f4b61778c419ddedd15efa689827af50e627a571803859b1338f840b86f6a03c7acc44755cf5ea7efaa9111b66fd", @ANYRES32=0x1, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) r1 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x10}, 0x94) (async) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[], 0x48) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000000c0), &(0x7f0000000140), 0x5, r2}, 0x38) (async, rerun: 64) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000bc0)=ANY=[@ANYRES16, @ANYBLOB="1f45a2c4b7e5c4870c6a6eb424d09369562577634d508c619d0f73c6d7aa56cf0ebf6f2629be419481ba5e3cbfa7eccd6eda67ab311d0845b5601cf99ddbcfa6c52b5a29742f1a48a1cc6ed30c398e940ce605607f69226a8f9ff01d885bd00cddf103a033f4fd075cc84b5da9f27f73f4b30c53c3227c6e307f39e567def0f9be0b5f372589a73678", @ANYRESHEX=r2], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async, rerun: 64) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x94) r5 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000700)='signal_generate\x00', r4}, 0x10) (async) syz_open_procfs$namespace(0x0, 0xfffffffffffffffe) (async) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000003c0)={{r0, 0xffffffffffffffff}, 0x0, &(0x7f0000000040)}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f00000006c0)=ANY=[@ANYRES16=r5, @ANYRESDEC=r0, @ANYRES16=0x0, @ANYRES8=r6], &(0x7f0000000500)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x17, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) r7 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r3, 0x0, 0x4000}, 0x18) (async, rerun: 32) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000a00)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f00000004c0)='cgroup\x00'}, 0x30) (async, rerun: 32) unlink(&(0x7f0000000340)='./file0\x00') (async, rerun: 32) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000300)=@o_path={&(0x7f0000000180)='./file0\x00', r3, 0x4000, r4}, 0x18) (async, rerun: 32) r8 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r9 = openat$cgroup_int(r8, &(0x7f0000000e80)='hugetlb.1GB.rsvd.limit_in_bytes\x00', 0x2, 0x0) write$cgroup_subtree(r9, &(0x7f0000000100)=ANY=[@ANYBLOB='-0'], 0x9) (async) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) ioctl$TUNSETIFF(r7, 0x400454ca, &(0x7f0000000380)={'dvmrp0\x00', 0xca58c30f81b6079f}) (async) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r10, 0x8914, &(0x7f0000000080)) (async) r11 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x80002, 0x0) close(r11) (async, rerun: 64) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) (rerun: 64) recvmsg$unix(0xffffffffffffffff, 0x0, 0x0) r13 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ec0)={0x18, 0x5, &(0x7f00000009c0)=ANY=[@ANYRES64=r1], &(0x7f0000000280)='GPL\x00', 0x1b1a, 0x0, 0x0, 0x0, 0x8, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0xfffffffa}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000480)={&(0x7f0000000580)='kmem_cache_free\x00', r13}, 0x10) ioctl$SIOCSIFHWADDR(r11, 0x8943, &(0x7f0000000100)={'syzkaller0\x00'}) (async, rerun: 64) syz_clone(0x4805000, 0x0, 0x0, &(0x7f0000000400), 0x0, 0x0) (async, rerun: 64) sendmsg$unix(r12, &(0x7f0000000540)={&(0x7f00000005c0)=@abs={0x1, 0x0, 0x4e22}, 0x6e, &(0x7f0000000d40)=[{&(0x7f0000000640)="0bef3bf7cc5e945ccbf1839650d00039e9fa6eee2453617e53b17517a9e32ae7fb2be37d2a85a289119fe969a36c090d992b19f8cbb804267752f3a0ec143417e8209e475bf69db5738000207275c2f5ae53e63b7d891d3646a97809696aecfe4966337079d88bc111ecafb7f2e30489af22de872400e699730520", 0x7b}, {&(0x7f00000008c0)="0e7c1f30e608d6d3864b014150f57642941ea2e6caddc7b5851f4352a684a51f90e59bd053cef5094c68b88a50e511ceb83133ff5f3c5184db431dbb82c6075db03832404348d7ed97618f78e3d813208d737f0cdf07b9848a0fe4df631c52ff746a8ed395eb60ae00452a8d33564d70b916a4790bb266b05a8c3b5a56fe07748f3cf1a61e31fd163a83cb61cc4c61d8bd1b341345929fe72bc483a780cdebce0292cea52046d79028f574db3a73c4fcd0ebabcf1caa348c29d0edd7ff7d815e8e5e36c02c8075c5b68568ae8d3ab730ce4e8d30f6f7", 0xd6}, {&(0x7f0000000800)="addcbd9e7d1ae019ae955ac3b838d0e2b176b5d0e3caa313844d8ba0bfcaacf20a2eb4e66123d7dfc71170204e18a5326b4461f4ec2aaed9a571f3b6f367", 0x3e}, {&(0x7f0000000840)="3224baf019ecc0c85aacd8775bb50ee320c6256428a24cfa4cadcb0355a70255ef67296ad021eb5ada2ac0c7f1b0997890102d714a0ecede8874dd3cccd5861eb6a0439054e4133e6789df1c1f00"/87, 0x57}, {&(0x7f0000000b00)="297bcc9f1fdfe95fe386969c502912f185a2cfac6520b6ef8b7925fbd6731b77e4cca61e1c58f641bc8078555e21226b40ec086e19909c20b65b17fc1a8e97e0ec83ed73ab570685d2d757d27d2aad82f14d3d9cd691224eda49248cb84be02c5d4c53d6428589c43056ccc3a3905dbe8504d2480b0b87bee5a618ed312eef49ce4822f09623d550a222710fc893430536e6aeef86b3140000000000000000", 0x9f}, {&(0x7f0000000c80)="3c2c80209ff719f57081a3addef9678242214704570f34501df1447a6927e53217955f5dd1f58fcc2547d1d3c7a6d667203bd6e51a3bfa275f8cafa671679cfe9f6a9ec4ca8c93903474fc110b4ee26794b3fc9a8e04d1e1b15d7f18b3808409b11f39a22d78c98233a088f391e320b2b629066dc763f4c1ea45f5cdfc3b52efc731b9d0f4ce9d0cc48b7084c5", 0x8d}], 0x6, 0x0, 0x0, 0x4000}, 0x20004896) 130.19085ms ago: executing program 3 (id=3085): bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x17, 0xc, &(0x7f0000000440)=@framed={{0x18, 0x2, 0x0, 0x0, 0xffffffff}, [@printk={@ld}, @call={0x85, 0x0, 0x0, 0x7d}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0), 0x1c1842, 0x0) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, 0x0}, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB="160000000000000004000000"], 0x50) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b7040000000000008500000057"], 0x0}, 0x94) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r3}, 0x10) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000058"], 0x0}, 0x90) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0xb, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000300)='qdisc_create\x00', r4}, 0x10) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r5, 0x8914, &(0x7f0000002280)={'syzkaller0\x00', @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x1}}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000040)='task_newtask\x00', r0}, 0x10) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000040)='task_newtask\x00', r6}, 0x10) syz_clone(0x400, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="0100000040000400060000000800000001000000", @ANYRES32, @ANYRESDEC], 0x48) 85.189373ms ago: executing program 1 (id=3086): r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="02000000040000000800000001"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000700)={0x0, 0x10, &(0x7f0000000580)=ANY=[@ANYBLOB="0000000000000000b704000001000000850000007800000095", @ANYRES32=r0, @ANYRES16=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffe7e, 0x0, 0x0, 0x0}, 0x94) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x18, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="180100002001800000000000"], &(0x7f00000001c0)='GPL\x00', 0x4, 0x93, &(0x7f00000003c0)=""/147}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000080)='sched_switch\x00', r3}, 0x10) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000007c0)={r3, 0xe0, &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, &(0x7f00000003c0)=[0x0], 0x0, 0x0, 0x86, &(0x7f0000000080)=[{}, {}, {}], 0x18, 0x0, 0x0, &(0x7f00000005c0), 0x8, 0xe2, 0x8, 0x8, &(0x7f0000000600)}}, 0x10) r6 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000880)=ANY=[@ANYBLOB="9feb010018000000000000003000000030000000020000000000000001000004000000000000000002000000000000000000000000000003000000000300000001000000000000000000e1432cbd4802d2366cf2c03d75a3c01b5ac168e5e9895bda4d508fca73e78ad4060c521aac39f82dab2e8b4f84b4b49b8aab693d1d0c9ac8014e81f5b7f20fae4b4cff715b58688354d506e80c6b39960cc967c2481f7a410eb98a585ec9dc286bbf5e21c6038cf841334e03c5f671f461130fd2ba8d56"], 0x0, 0x4a}, 0x28) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000c00)=ANY=[@ANYBLOB="1b00000000000000000000000100000000000000", @ANYRES32, @ANYBLOB="0600000000000000060100ca6e0004000000e3007b9af7d1b082dc51f251b851fb7811e596ea03515528c49bd1b681eefaaee78f5db65901d92ee8674d33b264f3b669a13649aed6bfc7adab79ae3a1b26ed7fe02cdf0b76c6e2337bd276ea30972b22d87e86670a832cbce267163ab4554d50b8", @ANYRES32=r5, @ANYRES32=r6, @ANYBLOB="02000000030000000500"/28], 0x50) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x11, 0x10, &(0x7f0000000980)=ANY=[@ANYBLOB="61f1ce4bf20077145973016517019e8d6e8fe62f8f2c8ea7d8d590683855363dc0468337", @ANYRES16=r1, @ANYRES16=r3, @ANYRES16=r6, @ANYRES8=r0, @ANYRES32=r4, @ANYRES16, @ANYBLOB="009d548a8de1f64216c78bca374bde18f701863c5f08cfc2ff5d5fc9175608ee43324610a4bab2b386d7e81baeabef50d61007718953114ab2fc86cded39af5caa625968158607b5864b6e57a7e3e608491581a053c0e0e2f690860aa906aa0c43593a913453efa0e3b8ca80c640935e18aad1d09ccc3e6af82ee4afb6808bbb9b8f5321b7215f6aaaa7cd1981e570ca3c55aaf7383b8b04a356e5d579ac6015adeca7a5fe11bd4d5d32a4edd22548bdc5e418452fc2e1afb046ca4d4e496fec4c2e2e04a73c3bbd7cda4cc36615d973b6490f745e490322e20fb49781d377d329a2", @ANYRES8, @ANYRESOCT=r2], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', r5, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000006c0)={&(0x7f0000000700)='kmem_cache_free\x00', r7}, 0x10) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext, 0x10cac4, 0xc0, 0x3, 0x2, 0x6, 0x0, 0x2, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x1) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r9) recvmsg$unix(r8, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x8000000000000000, 0x8000}, 0x4105, 0x0, 0x3}, 0x0, 0xfeffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_BIND_MAP(0xa, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000840)=ANY=[@ANYBLOB="010000000500000002000000ffff000005000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="000000000100"/28], 0x48) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f00000000c0)='sched_switch\x00'}, 0x10) r10 = bpf$PROG_LOAD(0x5, &(0x7f0000000b40)={0xb, 0x8, &(0x7f00000017c0)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x4, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={0x0, r10}, 0x18) r11 = openat$tun(0xffffffffffffff9c, &(0x7f0000000180), 0x214801, 0x0) ioctl$TUNGETVNETHDRSZ(r11, 0x800454d7, 0x0) 32.830068ms ago: executing program 4 (id=3087): r0 = bpf$PROG_LOAD(0x5, &(0x7f0000caefb8)={0x8, 0x3, &(0x7f0000000080)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x61, 0x54, 0x0, 0x0, 0xf100}}, &(0x7f0000281ffc)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @cgroup_skb}, 0x48) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000180), 0x9) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x17, 0x0, 0x4, 0xff, 0x0, 0x1}, 0x50) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000180)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000200)={r0, 0x0, 0xe40, 0x0, &(0x7f00000000c0)="5cdd3086ddffff6633c9bbac88a8862608dffd00139fb7a884bdfc14f4870800", 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) 18.428129ms ago: executing program 4 (id=3088): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000002400000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x13, &(0x7f0000001140)=ANY=[@ANYBLOB="180000000000edff0000000000000000850000000f00000018010000646c012500000000000000007b1a"], 0x0, 0xfffffffc, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0xb, 0x0, 0x0, 0x0, 0x3}, 0x94) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x19, 0x4, 0x8, 0x2, 0x0, 0x1}, 0x48) r1 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r0}, 0x10) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x202, 0x40020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f0000000a40)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x6}, 0x70) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='kmem_cache_free\x00', r3}, 0xb) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x20f42, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f0000000140)={'\x00', 0x6132}) write$cgroup_subtree(r4, &(0x7f0000000000)=ANY=[], 0xfe3a) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000740)={0x3, 0x4, 0x4, 0xa, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) perf_event_open(&(0x7f00000007c0)={0x2, 0x80, 0x65, 0x1, 0x0, 0x0, 0x0, 0x3, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x6, 0x104800}, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x1}, 0x0, 0xffffffbfffffffff, 0xffffffffffffffff, 0x2) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x18, 0x0, 0x0, 0x0}, 0x94) close(r2) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) sendmsg$tipc(0xffffffffffffffff, 0x0, 0x0) ioctl$TUNGETFEATURES(0xffffffffffffffff, 0x800454cf, &(0x7f0000001000)) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001380)={r0, 0xe0, &(0x7f0000001280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, &(0x7f0000000180)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x4, 0x2, &(0x7f0000000fc0)=[0x0, 0x0, 0x0, 0x0], &(0x7f0000001100)=[0x0, 0x0], 0x0, 0xd8, 0x0, 0x0, 0x10, &(0x7f00000011c0), 0x0, 0x0, 0xb6, 0x8, 0x8, &(0x7f0000001240)}}, 0x10) r8 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000014c0)={&(0x7f00000015c0)=ANY=[@ANYBLOB="9feb01001800000000000000540000005400000004000000010000000000000a0100000004000000000000020400000000000000008c1903000000000300000002000000000000001000000000000010040000000a0000000000001205000000020000000000008501000000002e2e00033bfa9b1e5bddf3db6b3ade6a5f04bf33a53c12dd3f163ec8f31e54f3e72f103cc9ee150dbe0c84cde431caaf36419dd9fc8cc4795ea6165ace59b9a7cfbeefa164e9da9dc233c400f3f439454acd0b014f6da497e378cf06ce2dcddeec2e20f002604063ea6596a6e7c81bc4ee6ac1fdc59631c1e8e47c4e450102581beea91d64a72af83f87e0f427b3878b966a05a36481828927"], 0x0, 0x70, 0x0, 0x1, 0x4}, 0x28) r9 = bpf$TOKEN_CREATE(0x24, &(0x7f0000001580)={0x0, r5}, 0x8) bpf$MAP_CREATE(0x0, &(0x7f0000001500)=@base={0x16, 0xcebe, 0x80, 0x5, 0x50128, r6, 0x9, '\x00', r7, r8, 0x3, 0x2, 0x1, 0x0, @void, @value, @value=r9}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000001040)={0x18, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0xfffffffd}, 0x8}, 0x94) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800"/16, @ANYBLOB], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0xffffffff}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) ioctl$TUNSETOFFLOAD(r1, 0x400454d0, 0x10) r10 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="170000000000000004000000ff"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r10, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0}, 0x90) 9.54177ms ago: executing program 0 (id=3089): r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x10020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$MAP_CREATE(0x0, &(0x7f00000008c0)=ANY=[@ANYBLOB, @ANYRES32, @ANYRES32, @ANYBLOB="0000000000000000000000000000000000000000000000000000000057c32a33d659defdfe09b6d9a0d79cde2dfafdca0524c42f18ed85ce6adacbfaff7063774f3c1ee4146db42004a681800a129ef33fd510"], 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, 0x0) close(0xffffffffffffffff) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000880)={0xffffffffffffffff, 0xe0, &(0x7f0000000780)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0xa, 0x6, &(0x7f0000000600)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000440)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0xe1, &(0x7f0000000680)=[{}], 0x8, 0x10, &(0x7f00000006c0), &(0x7f0000000700), 0x8, 0xc0, 0x8, 0x8, &(0x7f0000000740)}}, 0x10) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x1b, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x11, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r4, 0x0, 0x36, 0x0, 0x0, 0x0, 0xe8c}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000e80)={0x0, 0x4, &(0x7f0000000a00)=ANY=[@ANYBLOB="180210000013d249a14d1c69b3e1fb6d1c360fa3c42c855b544a398733c2c21cefaa53c786f60785c8bbfbe4de487f521e74ce8506459a17f9a5be8a87a0a1629f526f469f2bd3457e21815cc06bb000"], 0x0, 0x10000000, 0x0, 0x0, 0x41000, 0x54}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000200)={{r2}, &(0x7f0000000180), &(0x7f00000001c0)=r1}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f0000000dc0)={0x13, 0x10, &(0x7f0000000b00)=ANY=[@ANYBLOB="1800000006000000000000000004000018110000", @ANYRES32, @ANYBLOB="0000000000000000b702000014000000b7030000839c05ab69fc77ac090f442608d64221000000008500000083000000bf09000000000000550901000000006ec891009500000000000000058a010000dd0000bf91000000000000b7020000020000008500000085000000b7000000000000009500000000"], &(0x7f00000002c0)='syzkaller\x00', 0x3, 0x69, &(0x7f0000000a80)=""/105, 0x40f00, 0x0, '\x00', r3, @fallback=0x4, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000bc0)={0x5, 0x2, 0x8, 0x800}, 0x10, r4, r5, 0x9, 0x0, &(0x7f0000000d00)=[{0x5, 0x5, 0xa, 0xc}, {0x2, 0x3, 0x9, 0x3}, {0x1, 0x1, 0x6, 0x9}, {0x1, 0x5, 0xd, 0x5}, {0x3, 0x5, 0x7, 0xa}, {0x0, 0x4, 0xe, 0xa}, {0x4, 0x4, 0xd, 0x5}, {0x5, 0x2, 0x1, 0xc}, {0x5, 0x4, 0x2, 0x9}]}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) ioctl$TUNSETOFFLOAD(r0, 0xc004743e, 0x110e22fff6) r6 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x1, 0x0) ioctl$TUNSETOFFLOAD(r6, 0x4004743d, 0x110e22fff6) close(r6) 0s ago: executing program 3 (id=3090): bpf$MAP_CREATE(0x0, 0x0, 0x48) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x9}, 0x50) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x18, 0x7, &(0x7f0000000080)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b702000001000000850000008600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1a, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)=ANY=[@ANYBLOB="010000000a0000000500000007"], 0x48) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000300), &(0x7f0000000100), 0x3f, r3}, 0x38) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f00000001c0)={r3, &(0x7f0000000340), 0x0}, 0x20) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f00000001c0)='sched_switch\x00', r1}, 0x10) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_bp={0x0, 0x2}, 0x800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) openat$cgroup_procs(r4, &(0x7f0000000840)='cgroup.procs\x00', 0x2, 0x0) (fail_nth: 7) r5 = bpf$PROG_LOAD(0x5, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)) perf_event_open(&(0x7f0000000380)={0x3, 0x80, 0x0, 0x0, 0x0, 0x5, 0x0, 0x4, 0x22090, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xe}, 0xa000, 0xc8, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x95ad}, 0x0, 0x101, 0xffffffffffffffff, 0x1) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r7) recvmsg$unix(r6, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) r8 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0xb, &(0x7f0000000240)=ANY=[@ANYRES32=r2], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000ac0)='kmem_cache_free\x00', r8}, 0x10) bpf$BPF_PROG_TEST_RUN_LIVE(0xa, &(0x7f00000008c0)={r5, 0x0, 0x71, 0x0, &(0x7f0000000680)="a8bf38f367fa179bf4174d0e959303fb4a2c6959687a02da24cb39327e693b868160ee12cbd1e3f261fcb512cd2aa006927f461a6f0ac0a075510d38b6beb79ef79f111c40337724ff4ce871356ac380261a7e428854e9455aa31a03451b525e0edbd3bf11ed9d4eb0c827b3e99ca78f5e", 0x0, 0xc, 0x0, 0x0, 0x0, &(0x7f0000000740), 0x0, 0x2, 0x0, 0x7f}, 0x50) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f00000002c0)={0x2, 0x80, 0x7d, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7c, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_bp={0x0}, 0x8100, 0x0, 0x0, 0x0, 0x0, 0xd531}, 0x0, 0x0, 0xffffffffffffffff, 0x2) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000080)='mem\x00\x10\x00\x00\x00\x00\x00\x00I\xa2l') r9 = syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000080)) ioctl$TUNGETFEATURES(0xffffffffffffffff, 0x800454cf, &(0x7f0000000280)) write$cgroup_subtree(r9, 0x0, 0x4) syz_clone(0x22023500, 0x0, 0x0, 0x0, 0x0, 0x0) kernel console output (not intermixed with test programs): 119.432841][ T3404] bridge0: port 2(bridge_slave_1) entered disabled state [ 119.440133][ T3404] bridge0: port 1(bridge_slave_0) entered disabled state [ 120.758754][ T3450] device veth0_vlan left promiscuous mode [ 120.771903][ T3450] device veth0_vlan entered promiscuous mode [ 121.957101][ T30] audit: type=1400 audit(1755737125.217:137): avc: denied { create } for pid=3498 comm="syz.4.1105" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=isdn_socket permissive=1 [ 122.069118][ T3505] device pim6reg1 entered promiscuous mode [ 123.035196][ T3534] device veth0_vlan left promiscuous mode [ 123.048227][ T3534] device veth0_vlan entered promiscuous mode [ 123.095081][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 123.105829][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 123.122606][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 124.459945][ T3570] FAULT_INJECTION: forcing a failure. [ 124.459945][ T3570] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 124.529686][ T3570] CPU: 0 PID: 3570 Comm: syz.1.1127 Not tainted 5.15.189-syzkaller-android13-5.15.189_r00 #0 [ 124.539906][ T3570] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 124.549985][ T3570] Call Trace: [ 124.553282][ T3570] [ 124.556226][ T3570] __dump_stack+0x21/0x30 [ 124.560575][ T3570] dump_stack_lvl+0xee/0x150 [ 124.565177][ T3570] ? show_regs_print_info+0x20/0x20 [ 124.570394][ T3570] ? stack_trace_save+0x98/0xe0 [ 124.575269][ T3570] dump_stack+0x15/0x20 [ 124.579459][ T3570] should_fail+0x3c1/0x510 [ 124.583896][ T3570] should_fail_alloc_page+0x55/0x80 [ 124.589723][ T3570] prepare_alloc_pages+0x156/0x600 [ 124.594851][ T3570] ? __alloc_pages_bulk+0xab0/0xab0 [ 124.600232][ T3570] ? x64_sys_call+0x4b9/0x9a0 [ 124.604922][ T3570] ? entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 124.611002][ T3570] __alloc_pages+0x10a/0x440 [ 124.615602][ T3570] ? prep_new_page+0x110/0x110 [ 124.620377][ T3570] ? __kasan_check_write+0x14/0x20 [ 124.625505][ T3570] __get_free_pages+0x10/0x30 [ 124.630188][ T3570] kasan_populate_vmalloc_pte+0x29/0x120 [ 124.635830][ T3570] __apply_to_page_range+0x8b0/0xbf0 [ 124.641210][ T3570] ? kasan_populate_vmalloc+0x70/0x70 [ 124.646926][ T3570] ? kasan_populate_vmalloc+0x70/0x70 [ 124.652399][ T3570] apply_to_page_range+0x3b/0x50 [ 124.657534][ T3570] kasan_populate_vmalloc+0x60/0x70 [ 124.662849][ T3570] alloc_vmap_area+0x185c/0x1990 [ 124.667902][ T3570] ? vm_map_ram+0xa60/0xa60 [ 124.672610][ T3570] ? kmem_cache_alloc_trace+0x119/0x270 [ 124.678177][ T3570] __get_vm_area_node+0x14e/0x350 [ 124.683221][ T3570] __vmalloc_node_range+0xdf/0xaf0 [ 124.688350][ T3570] ? dev_map_create_hash+0x26/0x1c0 [ 124.693574][ T3570] bpf_map_area_alloc+0xd5/0xe0 [ 124.698451][ T3570] ? dev_map_create_hash+0x26/0x1c0 [ 124.703759][ T3570] dev_map_create_hash+0x26/0x1c0 [ 124.708885][ T3570] dev_map_alloc+0x2d4/0x560 [ 124.713500][ T3570] map_create+0x455/0x21b0 [ 124.717934][ T3570] __sys_bpf+0x2cf/0x730 [ 124.722198][ T3570] ? bpf_link_show_fdinfo+0x310/0x310 [ 124.727810][ T3570] ? debug_smp_processor_id+0x17/0x20 [ 124.733202][ T3570] __x64_sys_bpf+0x7c/0x90 [ 124.737771][ T3570] x64_sys_call+0x4b9/0x9a0 [ 124.742287][ T3570] do_syscall_64+0x4c/0xa0 [ 124.746753][ T3570] ? clear_bhb_loop+0x50/0xa0 [ 124.751623][ T3570] ? clear_bhb_loop+0x50/0xa0 [ 124.756410][ T3570] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 124.762324][ T3570] RIP: 0033:0x7f85d9c17be9 [ 124.766749][ T3570] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 124.786377][ T3570] RSP: 002b:00007f85d8680038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 124.794814][ T3570] RAX: ffffffffffffffda RBX: 00007f85d9e3efa0 RCX: 00007f85d9c17be9 [ 124.802820][ T3570] RDX: 0000000000000048 RSI: 0000200000000580 RDI: 0000000000000000 [ 124.810898][ T3570] RBP: 00007f85d8680090 R08: 0000000000000000 R09: 0000000000000000 [ 124.818974][ T3570] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 124.826971][ T3570] R13: 00007f85d9e3f038 R14: 00007f85d9e3efa0 R15: 00007ffe19abf3d8 [ 124.835086][ T3570] [ 124.950117][ T3574] device veth0_vlan left promiscuous mode [ 124.966488][ T3574] device veth0_vlan entered promiscuous mode [ 125.023941][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 125.040066][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 125.082952][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 125.849801][ T30] audit: type=1400 audit(1755737129.107:138): avc: denied { append } for pid=3612 comm="syz.1.1142" name="ppp" dev="devtmpfs" ino=154 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ppp_device_t tclass=chr_file permissive=1 [ 126.976620][ T3639] device veth0_vlan left promiscuous mode [ 127.000113][ T3639] device veth0_vlan entered promiscuous mode [ 127.091126][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 127.138132][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 127.195051][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 128.233490][ T3670] FAULT_INJECTION: forcing a failure. [ 128.233490][ T3670] name failslab, interval 1, probability 0, space 0, times 0 [ 128.246401][ T3670] CPU: 0 PID: 3670 Comm: syz.2.1160 Not tainted 5.15.189-syzkaller-android13-5.15.189_r00 #0 [ 128.256586][ T3670] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 128.267891][ T3670] Call Trace: [ 128.271210][ T3670] [ 128.274240][ T3670] __dump_stack+0x21/0x30 [ 128.278733][ T3670] dump_stack_lvl+0xee/0x150 [ 128.283338][ T3670] ? show_regs_print_info+0x20/0x20 [ 128.288640][ T3670] ? kfree_skb+0xc1/0x2f0 [ 128.293118][ T3670] ? dev_hard_start_xmit+0x244/0x670 [ 128.298517][ T3670] ? __dev_queue_xmit+0x17bd/0x2d80 [ 128.303742][ T3670] ? dev_queue_xmit+0x17/0x20 [ 128.308870][ T3670] ? bpf_clone_redirect+0x242/0x380 [ 128.314090][ T3670] dump_stack+0x15/0x20 [ 128.318362][ T3670] should_fail+0x3c1/0x510 [ 128.323019][ T3670] __should_failslab+0xa4/0xe0 [ 128.327906][ T3670] should_failslab+0x9/0x20 [ 128.332433][ T3670] slab_pre_alloc_hook+0x3b/0xe0 [ 128.337486][ T3670] ? dst_alloc+0x15c/0x1d0 [ 128.341932][ T3670] kmem_cache_alloc+0x44/0x260 [ 128.346722][ T3670] dst_alloc+0x15c/0x1d0 [ 128.350992][ T3670] ip_route_output_key_hash_rcu+0x11db/0x2060 [ 128.357081][ T3670] ip_route_output_key_hash+0x123/0x1c0 [ 128.362656][ T3670] ? ip_route_input_rcu+0x24b0/0x24b0 [ 128.368055][ T3670] vti6_tnl_xmit+0xd83/0x1870 [ 128.372749][ T3670] ? __kernel_text_address+0xa0/0x100 [ 128.378370][ T3670] ? skb_network_protocol+0x501/0x740 [ 128.383769][ T3670] ? vti6_dev_uninit+0x340/0x340 [ 128.388810][ T3670] ? stack_trace_save+0x98/0xe0 [ 128.393679][ T3670] ? netif_skb_features+0x831/0xb90 [ 128.398979][ T3670] dev_hard_start_xmit+0x244/0x670 [ 128.404109][ T3670] __dev_queue_xmit+0x17bd/0x2d80 [ 128.409179][ T3670] ? dev_queue_xmit+0x20/0x20 [ 128.413880][ T3670] ? __kasan_check_write+0x14/0x20 [ 128.419001][ T3670] ? skb_release_data+0x1c6/0xa10 [ 128.424127][ T3670] ? __kasan_check_write+0x14/0x20 [ 128.429449][ T3670] ? pskb_expand_head+0xbe6/0x11d0 [ 128.434658][ T3670] dev_queue_xmit+0x17/0x20 [ 128.439170][ T3670] __bpf_redirect+0x68a/0xe60 [ 128.444128][ T3670] bpf_clone_redirect+0x242/0x380 [ 128.449173][ T3670] bpf_prog_6893982b85ceadf7+0x56/0x2dc [ 128.454835][ T3670] ? __kasan_slab_alloc+0xcf/0xf0 [ 128.460136][ T3670] ? __kasan_slab_alloc+0xbd/0xf0 [ 128.465272][ T3670] ? slab_post_alloc_hook+0x4f/0x2b0 [ 128.470755][ T3670] ? kmem_cache_alloc+0xf7/0x260 [ 128.475964][ T3670] ? __build_skb+0x2d/0x310 [ 128.480570][ T3670] ? build_skb+0x24/0x200 [ 128.484914][ T3670] ? bpf_prog_test_run_skb+0x279/0x1150 [ 128.490478][ T3670] ? bpf_prog_test_run+0x3d5/0x620 [ 128.495614][ T3670] ? __sys_bpf+0x52c/0x730 [ 128.500128][ T3670] ? __x64_sys_bpf+0x7c/0x90 [ 128.504846][ T3670] ? x64_sys_call+0x4b9/0x9a0 [ 128.509549][ T3670] ? do_syscall_64+0x4c/0xa0 [ 128.514164][ T3670] ? entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 128.520255][ T3670] ? __kasan_check_read+0x11/0x20 [ 128.525431][ T3670] ? bpf_test_timer_continue+0x146/0x4a0 [ 128.531112][ T3670] bpf_test_run+0x33d/0x8d0 [ 128.535734][ T3670] ? convert___skb_to_skb+0x4f0/0x4f0 [ 128.541125][ T3670] ? eth_get_headlen+0x1f0/0x1f0 [ 128.546162][ T3670] ? convert___skb_to_skb+0x41/0x4f0 [ 128.551464][ T3670] bpf_prog_test_run_skb+0x9ec/0x1150 [ 128.556855][ T3670] ? __bpf_prog_test_run_raw_tp+0x2b0/0x2b0 [ 128.562861][ T3670] bpf_prog_test_run+0x3d5/0x620 [ 128.567922][ T3670] ? bpf_prog_query+0x230/0x230 [ 128.574531][ T3670] ? selinux_bpf+0xce/0xf0 [ 128.579450][ T3670] ? security_bpf+0x82/0xa0 [ 128.584518][ T3670] __sys_bpf+0x52c/0x730 [ 128.588782][ T3670] ? bpf_link_show_fdinfo+0x310/0x310 [ 128.594689][ T3670] ? debug_smp_processor_id+0x17/0x20 [ 128.600425][ T3670] __x64_sys_bpf+0x7c/0x90 [ 128.605292][ T3670] x64_sys_call+0x4b9/0x9a0 [ 128.609989][ T3670] do_syscall_64+0x4c/0xa0 [ 128.614405][ T3670] ? clear_bhb_loop+0x50/0xa0 [ 128.619078][ T3670] ? clear_bhb_loop+0x50/0xa0 [ 128.623790][ T3670] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 128.629767][ T3670] RIP: 0033:0x7f4c4f0a7be9 [ 128.634280][ T3670] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 128.654163][ T3670] RSP: 002b:00007f4c4db10038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 128.662581][ T3670] RAX: ffffffffffffffda RBX: 00007f4c4f2cefa0 RCX: 00007f4c4f0a7be9 [ 128.670736][ T3670] RDX: 000000000000002c RSI: 0000200000000080 RDI: 000000000000000a [ 128.678789][ T3670] RBP: 00007f4c4db10090 R08: 0000000000000000 R09: 0000000000000000 [ 128.686929][ T3670] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 128.694894][ T3670] R13: 00007f4c4f2cf038 R14: 00007f4c4f2cefa0 R15: 00007ffe6e0f9d98 [ 128.702866][ T3670] [ 129.190069][ T3693] FAULT_INJECTION: forcing a failure. [ 129.190069][ T3693] name failslab, interval 1, probability 0, space 0, times 0 [ 129.237521][ T3693] CPU: 1 PID: 3693 Comm: syz.2.1172 Not tainted 5.15.189-syzkaller-android13-5.15.189_r00 #0 [ 129.247739][ T3693] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 129.257976][ T3693] Call Trace: [ 129.261295][ T3693] [ 129.264422][ T3693] __dump_stack+0x21/0x30 [ 129.268954][ T3693] dump_stack_lvl+0xee/0x150 [ 129.273555][ T3693] ? show_regs_print_info+0x20/0x20 [ 129.278764][ T3693] ? memset+0x35/0x40 [ 129.282757][ T3693] ? __bpf_get_stack+0x3b2/0x4f0 [ 129.287697][ T3693] ? slab_free_freelist_hook+0xc2/0x190 [ 129.293247][ T3693] dump_stack+0x15/0x20 [ 129.297418][ T3693] should_fail+0x3c1/0x510 [ 129.301847][ T3693] __should_failslab+0xa4/0xe0 [ 129.306653][ T3693] should_failslab+0x9/0x20 [ 129.311193][ T3693] slab_pre_alloc_hook+0x3b/0xe0 [ 129.316207][ T3693] __kmalloc+0x6d/0x2c0 [ 129.320381][ T3693] ? bpf_test_init+0x100/0x1c0 [ 129.325349][ T3693] bpf_test_init+0x100/0x1c0 [ 129.329975][ T3693] bpf_prog_test_run_skb+0x193/0x1150 [ 129.335370][ T3693] ? __kasan_check_write+0x14/0x20 [ 129.340508][ T3693] ? fput_many+0x15a/0x1a0 [ 129.344962][ T3693] ? __bpf_prog_test_run_raw_tp+0x2b0/0x2b0 [ 129.350874][ T3693] bpf_prog_test_run+0x3d5/0x620 [ 129.355820][ T3693] ? bpf_prog_query+0x230/0x230 [ 129.360794][ T3693] ? selinux_bpf+0xce/0xf0 [ 129.365253][ T3693] ? security_bpf+0x82/0xa0 [ 129.369774][ T3693] __sys_bpf+0x52c/0x730 [ 129.374132][ T3693] ? bpf_link_show_fdinfo+0x310/0x310 [ 129.379605][ T3693] ? debug_smp_processor_id+0x17/0x20 [ 129.384999][ T3693] __x64_sys_bpf+0x7c/0x90 [ 129.389529][ T3693] x64_sys_call+0x4b9/0x9a0 [ 129.394187][ T3693] do_syscall_64+0x4c/0xa0 [ 129.398636][ T3693] ? clear_bhb_loop+0x50/0xa0 [ 129.404557][ T3693] ? clear_bhb_loop+0x50/0xa0 [ 129.409457][ T3693] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 129.415583][ T3693] RIP: 0033:0x7f4c4f0a7be9 [ 129.420264][ T3693] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 129.439971][ T3693] RSP: 002b:00007f4c4db10038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 129.448492][ T3693] RAX: ffffffffffffffda RBX: 00007f4c4f2cefa0 RCX: 00007f4c4f0a7be9 [ 129.456845][ T3693] RDX: 000000000000002c RSI: 0000200000000080 RDI: 000000000000000a [ 129.464936][ T3693] RBP: 00007f4c4db10090 R08: 0000000000000000 R09: 0000000000000000 [ 129.472936][ T3693] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 129.481058][ T3693] R13: 00007f4c4f2cf038 R14: 00007f4c4f2cefa0 R15: 00007ffe6e0f9d98 [ 129.489047][ T3693] [ 129.916422][ T3709] device veth0_vlan left promiscuous mode [ 129.924193][ T3709] device veth0_vlan entered promiscuous mode [ 129.968324][ T401] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 129.977341][ T401] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 129.996681][ T401] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 131.887807][ T3788] device veth0_vlan left promiscuous mode [ 131.908079][ T3788] device veth0_vlan entered promiscuous mode [ 131.956873][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 131.969186][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 131.999556][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 132.953178][ T3813] bond_slave_1: mtu less than device minimum [ 133.415036][ T3830] device veth0_vlan left promiscuous mode [ 133.428600][ T3830] device veth0_vlan entered promiscuous mode [ 133.576886][ T3834] device veth0_vlan left promiscuous mode [ 133.585919][ T3834] device veth0_vlan entered promiscuous mode [ 135.243490][ T3874] device veth0_vlan left promiscuous mode [ 135.260368][ T3874] device veth0_vlan entered promiscuous mode [ 135.479155][ T3885] device veth0_vlan left promiscuous mode [ 135.520985][ T3885] device veth0_vlan entered promiscuous mode [ 136.917672][ T3924] device veth0_vlan left promiscuous mode [ 136.950668][ T3924] device veth0_vlan entered promiscuous mode [ 138.669147][ T3985] device veth0_vlan left promiscuous mode [ 138.807343][ T3985] device veth0_vlan entered promiscuous mode [ 140.801302][ T4048] device veth0_vlan left promiscuous mode [ 140.833606][ T4048] device veth0_vlan entered promiscuous mode [ 140.862340][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 140.874930][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 140.884960][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 142.515420][ T4096] device wg2 left promiscuous mode [ 142.791022][ T4099] device veth0_vlan left promiscuous mode [ 142.806514][ T4099] device veth0_vlan entered promiscuous mode [ 143.678401][ T4133] device syzkaller0 entered promiscuous mode [ 145.199298][ T4180] device syzkaller0 entered promiscuous mode [ 146.449115][ T4229] device syzkaller0 entered promiscuous mode [ 146.966519][ T4249] device veth0_vlan left promiscuous mode [ 146.985553][ T4249] device veth0_vlan entered promiscuous mode [ 147.763957][ T4272] device syzkaller0 entered promiscuous mode [ 148.557667][ T4304] device veth0_vlan left promiscuous mode [ 148.571911][ T4304] device veth0_vlan entered promiscuous mode [ 149.123677][ T4327] device syzkaller0 entered promiscuous mode [ 150.249112][ T4357] device veth0_vlan left promiscuous mode [ 150.276858][ T4357] device veth0_vlan entered promiscuous mode [ 150.664068][ T4370] device syzkaller0 entered promiscuous mode [ 151.394218][ T4405] device veth0_vlan left promiscuous mode [ 151.413891][ T4405] device veth0_vlan entered promiscuous mode [ 152.008270][ T4433] device syzkaller0 entered promiscuous mode [ 152.502124][ T4454] device veth0_vlan left promiscuous mode [ 152.508811][ T4454] device veth0_vlan entered promiscuous mode [ 154.460514][ T4521] device veth0_vlan left promiscuous mode [ 154.467453][ T4521] device veth0_vlan entered promiscuous mode [ 156.415637][ T4586] device veth0_vlan left promiscuous mode [ 156.465516][ T4586] device veth0_vlan entered promiscuous mode [ 158.058340][ T4644] GPL: port 1(erspan0) entered blocking state [ 158.064459][ T4644] GPL: port 1(erspan0) entered disabled state [ 158.075255][ T4644] device erspan0 entered promiscuous mode [ 159.416702][ T4685] device sit0 left promiscuous mode [ 159.444384][ T4685] device sit0 entered promiscuous mode [ 160.218039][ T4699] device sit0 left promiscuous mode [ 160.288911][ T4699] device sit0 entered promiscuous mode [ 162.173361][ T4751] ªªªªªª: renamed from vlan0 [ 165.914551][ T4876] ÿ: renamed from bond_slave_0 [ 166.410388][ T4904] FAULT_INJECTION: forcing a failure. [ 166.410388][ T4904] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 166.447379][ T4904] CPU: 1 PID: 4904 Comm: syz.4.1597 Not tainted 5.15.189-syzkaller-android13-5.15.189_r00 #0 [ 166.457769][ T4904] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 166.467841][ T4904] Call Trace: [ 166.471221][ T4904] [ 166.474253][ T4904] __dump_stack+0x21/0x30 [ 166.478588][ T4904] dump_stack_lvl+0xee/0x150 [ 166.483174][ T4904] ? show_regs_print_info+0x20/0x20 [ 166.488459][ T4904] ? get_page_from_freelist+0x2cc5/0x2d50 [ 166.494176][ T4904] dump_stack+0x15/0x20 [ 166.498335][ T4904] should_fail+0x3c1/0x510 [ 166.502766][ T4904] should_fail_alloc_page+0x55/0x80 [ 166.508002][ T4904] prepare_alloc_pages+0x156/0x600 [ 166.513168][ T4904] ? __alloc_pages_bulk+0xab0/0xab0 [ 166.518366][ T4904] ? pcpu_chunk_refresh_hint+0x7e5/0x930 [ 166.524104][ T4904] __alloc_pages+0x10a/0x440 [ 166.528722][ T4904] ? prep_new_page+0x110/0x110 [ 166.533493][ T4904] pcpu_populate_chunk+0x184/0xcb0 [ 166.538610][ T4904] ? _find_next_bit+0x1b5/0x200 [ 166.543473][ T4904] pcpu_alloc+0xc4d/0x1660 [ 166.547911][ T4904] __alloc_percpu_gfp+0x25/0x30 [ 166.552780][ T4904] bpf_map_alloc_percpu+0xc5/0x150 [ 166.557977][ T4904] htab_map_alloc+0xc1b/0x14f0 [ 166.562836][ T4904] map_create+0x455/0x21b0 [ 166.567341][ T4904] __sys_bpf+0x2cf/0x730 [ 166.571578][ T4904] ? bpf_link_show_fdinfo+0x310/0x310 [ 166.576970][ T4904] ? debug_smp_processor_id+0x17/0x20 [ 166.582354][ T4904] __x64_sys_bpf+0x7c/0x90 [ 166.586853][ T4904] x64_sys_call+0x4b9/0x9a0 [ 166.591359][ T4904] do_syscall_64+0x4c/0xa0 [ 166.595777][ T4904] ? clear_bhb_loop+0x50/0xa0 [ 166.600449][ T4904] ? clear_bhb_loop+0x50/0xa0 [ 166.605126][ T4904] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 166.611118][ T4904] RIP: 0033:0x7f6542b2dbe9 [ 166.615539][ T4904] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 166.635618][ T4904] RSP: 002b:00007f6541596038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 166.644140][ T4904] RAX: ffffffffffffffda RBX: 00007f6542d54fa0 RCX: 00007f6542b2dbe9 [ 166.652116][ T4904] RDX: 0000000000000050 RSI: 0000200000000380 RDI: 0000000000000000 [ 166.660152][ T4904] RBP: 00007f6541596090 R08: 0000000000000000 R09: 0000000000000000 [ 166.668197][ T4904] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 166.676179][ T4904] R13: 00007f6542d55038 R14: 00007f6542d54fa0 R15: 00007fff2c368e28 [ 166.684160][ T4904] [ 167.907210][ T4964] FAULT_INJECTION: forcing a failure. [ 167.907210][ T4964] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 167.934785][ T4964] CPU: 0 PID: 4964 Comm: syz.1.1618 Not tainted 5.15.189-syzkaller-android13-5.15.189_r00 #0 [ 167.945160][ T4964] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 167.955238][ T4964] Call Trace: [ 167.958637][ T4964] [ 167.961660][ T4964] __dump_stack+0x21/0x30 [ 167.966095][ T4964] dump_stack_lvl+0xee/0x150 [ 167.970701][ T4964] ? show_regs_print_info+0x20/0x20 [ 167.975942][ T4964] ? get_page_from_freelist+0x2cc5/0x2d50 [ 167.981763][ T4964] dump_stack+0x15/0x20 [ 167.986289][ T4964] should_fail+0x3c1/0x510 [ 167.990718][ T4964] should_fail_alloc_page+0x55/0x80 [ 167.995927][ T4964] prepare_alloc_pages+0x156/0x600 [ 168.001137][ T4964] ? __alloc_pages_bulk+0xab0/0xab0 [ 168.006348][ T4964] ? pcpu_chunk_refresh_hint+0x7e5/0x930 [ 168.012216][ T4964] __alloc_pages+0x10a/0x440 [ 168.016828][ T4964] ? prep_new_page+0x110/0x110 [ 168.021612][ T4964] pcpu_populate_chunk+0x184/0xcb0 [ 168.026822][ T4964] ? _find_next_bit+0x1b5/0x200 [ 168.031894][ T4964] pcpu_alloc+0xc4d/0x1660 [ 168.036321][ T4964] __alloc_percpu_gfp+0x25/0x30 [ 168.041184][ T4964] bpf_map_alloc_percpu+0xc5/0x150 [ 168.046314][ T4964] htab_map_alloc+0xc1b/0x14f0 [ 168.051088][ T4964] map_create+0x455/0x21b0 [ 168.055530][ T4964] __sys_bpf+0x2cf/0x730 [ 168.059865][ T4964] ? bpf_link_show_fdinfo+0x310/0x310 [ 168.065353][ T4964] ? debug_smp_processor_id+0x17/0x20 [ 168.070736][ T4964] __x64_sys_bpf+0x7c/0x90 [ 168.075161][ T4964] x64_sys_call+0x4b9/0x9a0 [ 168.079762][ T4964] do_syscall_64+0x4c/0xa0 [ 168.084197][ T4964] ? clear_bhb_loop+0x50/0xa0 [ 168.088892][ T4964] ? clear_bhb_loop+0x50/0xa0 [ 168.093716][ T4964] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 168.099622][ T4964] RIP: 0033:0x7f85d9c17be9 [ 168.104046][ T4964] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 168.123846][ T4964] RSP: 002b:00007f85d8680038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 168.132459][ T4964] RAX: ffffffffffffffda RBX: 00007f85d9e3efa0 RCX: 00007f85d9c17be9 [ 168.140652][ T4964] RDX: 0000000000000048 RSI: 0000200000000840 RDI: 0000000000000000 [ 168.148640][ T4964] RBP: 00007f85d8680090 R08: 0000000000000000 R09: 0000000000000000 [ 168.156808][ T4964] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 168.164785][ T4964] R13: 00007f85d9e3f038 R14: 00007f85d9e3efa0 R15: 00007ffe19abf3d8 [ 168.172946][ T4964] [ 168.226166][ T4966] FAULT_INJECTION: forcing a failure. [ 168.226166][ T4966] name failslab, interval 1, probability 0, space 0, times 0 [ 168.311037][ T4966] CPU: 0 PID: 4966 Comm: syz.2.1614 Not tainted 5.15.189-syzkaller-android13-5.15.189_r00 #0 [ 168.321260][ T4966] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 168.331599][ T4966] Call Trace: [ 168.334891][ T4966] [ 168.337989][ T4966] __dump_stack+0x21/0x30 [ 168.342332][ T4966] dump_stack_lvl+0xee/0x150 [ 168.346935][ T4966] ? show_regs_print_info+0x20/0x20 [ 168.352152][ T4966] dump_stack+0x15/0x20 [ 168.356398][ T4966] should_fail+0x3c1/0x510 [ 168.360822][ T4966] __should_failslab+0xa4/0xe0 [ 168.365603][ T4966] should_failslab+0x9/0x20 [ 168.370101][ T4966] slab_pre_alloc_hook+0x3b/0xe0 [ 168.375015][ T4966] kmem_cache_alloc_trace+0x48/0x270 [ 168.380410][ T4966] ? __get_vm_area_node+0x11d/0x350 [ 168.385617][ T4966] __get_vm_area_node+0x11d/0x350 [ 168.390620][ T4966] __vmalloc_node_range+0xdf/0xaf0 [ 168.395706][ T4966] ? bpf_prog_alloc_no_stats+0x3e/0x2d0 [ 168.401311][ T4966] ? selinux_capset+0xf0/0xf0 [ 168.405959][ T4966] ? bpf_prog_alloc_no_stats+0x3e/0x2d0 [ 168.411475][ T4966] __vmalloc+0x79/0x90 [ 168.415515][ T4966] ? bpf_prog_alloc_no_stats+0x3e/0x2d0 [ 168.421036][ T4966] bpf_prog_alloc_no_stats+0x3e/0x2d0 [ 168.426389][ T4966] bpf_prog_alloc+0x1f/0x1e0 [ 168.430954][ T4966] bpf_prog_load+0x7c3/0x1550 [ 168.435605][ T4966] ? map_freeze+0x360/0x360 [ 168.440094][ T4966] ? selinux_bpf+0xc7/0xf0 [ 168.444499][ T4966] ? security_bpf+0x82/0xa0 [ 168.448975][ T4966] __sys_bpf+0x4c3/0x730 [ 168.453197][ T4966] ? bpf_link_show_fdinfo+0x310/0x310 [ 168.458630][ T4966] __x64_sys_bpf+0x7c/0x90 [ 168.463027][ T4966] x64_sys_call+0x4b9/0x9a0 [ 168.467630][ T4966] do_syscall_64+0x4c/0xa0 [ 168.472221][ T4966] ? clear_bhb_loop+0x50/0xa0 [ 168.476873][ T4966] ? clear_bhb_loop+0x50/0xa0 [ 168.481540][ T4966] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 168.487505][ T4966] RIP: 0033:0x7f4c4f0a7be9 [ 168.492020][ T4966] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 168.511651][ T4966] RSP: 002b:00007f4c4db10038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 168.520092][ T4966] RAX: ffffffffffffffda RBX: 00007f4c4f2cefa0 RCX: 00007f4c4f0a7be9 [ 168.528072][ T4966] RDX: 0000000000000080 RSI: 0000200000003480 RDI: 0000000000000005 [ 168.536048][ T4966] RBP: 00007f4c4db10090 R08: 0000000000000000 R09: 0000000000000000 [ 168.544018][ T4966] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 168.552082][ T4966] R13: 00007f4c4f2cf038 R14: 00007f4c4f2cefa0 R15: 00007ffe6e0f9d98 [ 168.560055][ T4966] [ 168.599058][ T4966] syz.2.1614: vmalloc error: size 4096, vm_struct allocation failed, mode:0x500dc0(GFP_USER|__GFP_ZERO|__GFP_ACCOUNT), nodemask=(null),cpuset=syz2,mems_allowed=0 [ 168.617717][ T4966] CPU: 0 PID: 4966 Comm: syz.2.1614 Not tainted 5.15.189-syzkaller-android13-5.15.189_r00 #0 [ 168.628085][ T4966] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 168.638179][ T4966] Call Trace: [ 168.641497][ T4966] [ 168.644458][ T4966] __dump_stack+0x21/0x30 [ 168.648810][ T4966] dump_stack_lvl+0xee/0x150 [ 168.653554][ T4966] ? show_regs_print_info+0x20/0x20 [ 168.658780][ T4966] ? pr_cont_kernfs_name+0xe3/0xf0 [ 168.663928][ T4966] dump_stack+0x15/0x20 [ 168.668112][ T4966] warn_alloc+0x1b0/0x1d0 [ 168.672477][ T4966] ? __should_failslab+0xa4/0xe0 [ 168.677432][ T4966] ? zone_watermark_ok_safe+0x270/0x270 [ 168.682990][ T4966] ? __get_vm_area_node+0x11d/0x350 [ 168.688206][ T4966] ? __get_vm_area_node+0x33e/0x350 [ 168.693418][ T4966] __vmalloc_node_range+0x152/0xaf0 [ 168.698646][ T4966] ? selinux_capset+0xf0/0xf0 [ 168.703322][ T4966] ? bpf_prog_alloc_no_stats+0x3e/0x2d0 [ 168.708861][ T4966] __vmalloc+0x79/0x90 [ 168.712925][ T4966] ? bpf_prog_alloc_no_stats+0x3e/0x2d0 [ 168.718552][ T4966] bpf_prog_alloc_no_stats+0x3e/0x2d0 [ 168.724006][ T4966] bpf_prog_alloc+0x1f/0x1e0 [ 168.728596][ T4966] bpf_prog_load+0x7c3/0x1550 [ 168.733270][ T4966] ? map_freeze+0x360/0x360 [ 168.737776][ T4966] ? selinux_bpf+0xc7/0xf0 [ 168.742193][ T4966] ? security_bpf+0x82/0xa0 [ 168.746697][ T4966] __sys_bpf+0x4c3/0x730 [ 168.750982][ T4966] ? bpf_link_show_fdinfo+0x310/0x310 [ 168.756448][ T4966] __x64_sys_bpf+0x7c/0x90 [ 168.760861][ T4966] x64_sys_call+0x4b9/0x9a0 [ 168.765634][ T4966] do_syscall_64+0x4c/0xa0 [ 168.770074][ T4966] ? clear_bhb_loop+0x50/0xa0 [ 168.774768][ T4966] ? clear_bhb_loop+0x50/0xa0 [ 168.779446][ T4966] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 168.785337][ T4966] RIP: 0033:0x7f4c4f0a7be9 [ 168.789846][ T4966] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 168.809453][ T4966] RSP: 002b:00007f4c4db10038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 168.817958][ T4966] RAX: ffffffffffffffda RBX: 00007f4c4f2cefa0 RCX: 00007f4c4f0a7be9 [ 168.825960][ T4966] RDX: 0000000000000080 RSI: 0000200000003480 RDI: 0000000000000005 [ 168.833936][ T4966] RBP: 00007f4c4db10090 R08: 0000000000000000 R09: 0000000000000000 [ 168.841908][ T4966] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 168.849877][ T4966] R13: 00007f4c4f2cf038 R14: 00007f4c4f2cefa0 R15: 00007ffe6e0f9d98 [ 168.858024][ T4966] [ 169.173940][ T4966] Mem-Info: [ 169.177325][ T4966] active_anon:35 inactive_anon:4995 isolated_anon:0 [ 169.177325][ T4966] active_file:22430 inactive_file:5924 isolated_file:0 [ 169.177325][ T4966] unevictable:0 dirty:137 writeback:0 [ 169.177325][ T4966] slab_reclaimable:7554 slab_unreclaimable:78443 [ 169.177325][ T4966] mapped:29655 shmem:227 pagetables:618 bounce:0 [ 169.177325][ T4966] kernel_misc_reclaimable:0 [ 169.177325][ T4966] free:1535843 free_pcp:24343 free_cma:0 [ 169.295756][ T4966] Node 0 active_anon:140kB inactive_anon:19680kB active_file:89720kB inactive_file:23696kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:118520kB dirty:548kB writeback:0kB shmem:708kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 0kB writeback_tmp:0kB kernel_stack:5308kB pagetables:2472kB all_unreclaimable? no [ 169.295886][ T4994] device syzkaller0 entered promiscuous mode [ 169.327010][ T4966] DMA32 free:2978772kB min:62612kB low:78264kB high:93916kB reserved_highatomic:0KB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:3145324kB managed:2982964kB mlocked:0kB bounce:0kB free_pcp:4192kB local_pcp:0kB free_cma:0kB [ 169.361392][ T4966] lowmem_reserve[]: 0 3941 3941 [ 169.386448][ T4966] Normal free:3160516kB min:84840kB low:106048kB high:127256kB reserved_highatomic:0KB active_anon:140kB inactive_anon:19680kB active_file:89720kB inactive_file:23696kB unevictable:0kB writepending:548kB present:5242880kB managed:4036096kB mlocked:0kB bounce:0kB free_pcp:92272kB local_pcp:52252kB free_cma:0kB [ 169.459380][ T4966] lowmem_reserve[]: 0 0 0 [ 169.470634][ T4966] DMA32: 3*4kB (M) 1*8kB (M) 2*16kB (M) 3*32kB (M) 3*64kB (M) 3*128kB (M) 3*256kB (M) 3*512kB (M) 4*1024kB (UM) 3*2048kB (UM) 724*4096kB (M) = 2978772kB [ 169.499760][ T4966] Normal: 2584*4kB (UME) 1036*8kB (UME) 500*16kB (UME) 331*32kB (UME) 110*64kB (UME) 32*128kB (UME) 198*256kB (UM) 74*512kB (UME) 8*1024kB (UE) 4*2048kB (UME) 735*4096kB (UM) = 3163872kB [ 169.536561][ T4966] 28531 total pagecache pages [ 169.592165][ T4966] 0 pages in swap cache [ 169.614611][ T4966] Swap cache stats: add 0, delete 0, find 0/0 [ 169.668570][ T4966] Free swap = 124996kB [ 169.696608][ T4966] Total swap = 124996kB [ 169.734766][ T4966] 2097051 pages RAM [ 169.773202][ T4966] 0 pages HighMem/MovableOnly [ 169.799214][ T5008] device veth0_vlan left promiscuous mode [ 169.806630][ T4966] 342286 pages reserved [ 169.810822][ T4966] 0 pages cma reserved [ 169.879099][ T5008] device veth0_vlan entered promiscuous mode [ 170.076709][ T5025] FAULT_INJECTION: forcing a failure. [ 170.076709][ T5025] name failslab, interval 1, probability 0, space 0, times 0 [ 170.090946][ T5025] CPU: 1 PID: 5025 Comm: syz.4.1642 Not tainted 5.15.189-syzkaller-android13-5.15.189_r00 #0 [ 170.101132][ T5025] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 170.111208][ T5025] Call Trace: [ 170.114590][ T5025] [ 170.117532][ T5025] __dump_stack+0x21/0x30 [ 170.121874][ T5025] dump_stack_lvl+0xee/0x150 [ 170.126579][ T5025] ? show_regs_print_info+0x20/0x20 [ 170.131875][ T5025] ? dev_queue_xmit+0x20/0x20 [ 170.136552][ T5025] dump_stack+0x15/0x20 [ 170.140709][ T5025] should_fail+0x3c1/0x510 [ 170.145506][ T5025] __should_failslab+0xa4/0xe0 [ 170.150360][ T5025] should_failslab+0x9/0x20 [ 170.154948][ T5025] slab_pre_alloc_hook+0x3b/0xe0 [ 170.159898][ T5025] ? skb_clone+0x1cf/0x360 [ 170.164299][ T5025] kmem_cache_alloc+0x44/0x260 [ 170.169047][ T5025] skb_clone+0x1cf/0x360 [ 170.173280][ T5025] bpf_clone_redirect+0xa7/0x380 [ 170.178200][ T5025] bpf_prog_b36a1f39e2fdd4f4+0x56/0x694 [ 170.183744][ T5025] ? __kasan_slab_alloc+0xcf/0xf0 [ 170.188873][ T5025] ? __kasan_slab_alloc+0xbd/0xf0 [ 170.193891][ T5025] ? slab_post_alloc_hook+0x4f/0x2b0 [ 170.199258][ T5025] ? kmem_cache_alloc+0xf7/0x260 [ 170.204178][ T5025] ? __build_skb+0x2d/0x310 [ 170.208799][ T5025] ? build_skb+0x24/0x200 [ 170.213145][ T5025] ? bpf_prog_test_run_skb+0x279/0x1150 [ 170.218709][ T5025] ? bpf_prog_test_run+0x3d5/0x620 [ 170.223913][ T5025] ? __sys_bpf+0x52c/0x730 [ 170.228316][ T5025] ? __x64_sys_bpf+0x7c/0x90 [ 170.232888][ T5025] ? x64_sys_call+0x4b9/0x9a0 [ 170.237542][ T5025] ? do_syscall_64+0x4c/0xa0 [ 170.242223][ T5025] ? entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 170.248403][ T5025] ? __kasan_check_read+0x11/0x20 [ 170.253416][ T5025] ? bpf_test_timer_continue+0x146/0x4a0 [ 170.259089][ T5025] bpf_test_run+0x33d/0x8d0 [ 170.263588][ T5025] ? convert___skb_to_skb+0x4f0/0x4f0 [ 170.268937][ T5025] ? eth_get_headlen+0x1f0/0x1f0 [ 170.273849][ T5025] ? convert___skb_to_skb+0x41/0x4f0 [ 170.280906][ T5025] bpf_prog_test_run_skb+0x9ec/0x1150 [ 170.286322][ T5025] ? __bpf_prog_test_run_raw_tp+0x2b0/0x2b0 [ 170.292240][ T5025] bpf_prog_test_run+0x3d5/0x620 [ 170.297191][ T5025] ? bpf_prog_query+0x230/0x230 [ 170.302072][ T5025] ? selinux_bpf+0xce/0xf0 [ 170.306620][ T5025] ? security_bpf+0x82/0xa0 [ 170.311145][ T5025] __sys_bpf+0x52c/0x730 [ 170.315395][ T5025] ? bpf_link_show_fdinfo+0x310/0x310 [ 170.320780][ T5025] ? debug_smp_processor_id+0x17/0x20 [ 170.326292][ T5025] __x64_sys_bpf+0x7c/0x90 [ 170.330895][ T5025] x64_sys_call+0x4b9/0x9a0 [ 170.335413][ T5025] do_syscall_64+0x4c/0xa0 [ 170.339850][ T5025] ? clear_bhb_loop+0x50/0xa0 [ 170.344581][ T5025] ? clear_bhb_loop+0x50/0xa0 [ 170.349267][ T5025] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 170.355171][ T5025] RIP: 0033:0x7f6542b2dbe9 [ 170.359595][ T5025] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 170.379209][ T5025] RSP: 002b:00007f6541596038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 170.387638][ T5025] RAX: ffffffffffffffda RBX: 00007f6542d54fa0 RCX: 00007f6542b2dbe9 [ 170.395620][ T5025] RDX: 0000000000000048 RSI: 0000200000000040 RDI: 000000000000000a [ 170.403596][ T5025] RBP: 00007f6541596090 R08: 0000000000000000 R09: 0000000000000000 [ 170.411573][ T5025] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 170.419564][ T5025] R13: 00007f6542d55038 R14: 00007f6542d54fa0 R15: 00007fff2c368e28 [ 170.427724][ T5025] [ 170.944660][ T5063] FAULT_INJECTION: forcing a failure. [ 170.944660][ T5063] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 170.959175][ T5063] CPU: 0 PID: 5063 Comm: syz.2.1654 Not tainted 5.15.189-syzkaller-android13-5.15.189_r00 #0 [ 170.969681][ T5063] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 170.979725][ T5063] Call Trace: [ 170.983161][ T5063] [ 170.986089][ T5063] __dump_stack+0x21/0x30 [ 170.990495][ T5063] dump_stack_lvl+0xee/0x150 [ 170.995079][ T5063] ? show_regs_print_info+0x20/0x20 [ 171.000269][ T5063] dump_stack+0x15/0x20 [ 171.004404][ T5063] should_fail+0x3c1/0x510 [ 171.008799][ T5063] should_fail_alloc_page+0x55/0x80 [ 171.013988][ T5063] prepare_alloc_pages+0x156/0x600 [ 171.019134][ T5063] ? __alloc_pages_bulk+0xab0/0xab0 [ 171.024532][ T5063] __alloc_pages+0x10a/0x440 [ 171.029317][ T5063] ? prep_new_page+0x110/0x110 [ 171.034107][ T5063] ? arch_stack_walk+0xee/0x140 [ 171.039051][ T5063] pte_alloc_one+0x70/0x180 [ 171.043560][ T5063] ? pfn_modify_allowed+0x2f0/0x2f0 [ 171.048750][ T5063] ? stack_trace_save+0x98/0xe0 [ 171.053605][ T5063] ? __stack_depot_save+0x34/0x480 [ 171.058718][ T5063] ? copy_mm+0x9d1/0x1390 [ 171.063041][ T5063] ? copy_process+0x115c/0x3210 [ 171.067890][ T5063] ? kernel_clone+0x23f/0x940 [ 171.072580][ T5063] __pte_alloc+0x75/0x290 [ 171.077026][ T5063] ? __kasan_slab_alloc+0xcf/0xf0 [ 171.082070][ T5063] ? free_pgtables+0x280/0x280 [ 171.086832][ T5063] ? anon_vma_fork+0x200/0x510 [ 171.091593][ T5063] ? copy_mm+0x9d1/0x1390 [ 171.095920][ T5063] ? copy_process+0x115c/0x3210 [ 171.100767][ T5063] ? kernel_clone+0x23f/0x940 [ 171.105438][ T5063] ? __x64_sys_clone+0x176/0x1d0 [ 171.110458][ T5063] ? do_syscall_64+0x4c/0xa0 [ 171.115044][ T5063] copy_page_range+0x2348/0x2890 [ 171.119986][ T5063] ? pfn_valid+0x1d0/0x1d0 [ 171.124422][ T5063] copy_mm+0xbdc/0x1390 [ 171.128593][ T5063] ? copy_signal+0x600/0x600 [ 171.133197][ T5063] ? __init_rwsem+0xfc/0x1d0 [ 171.137787][ T5063] ? copy_signal+0x4cb/0x600 [ 171.142373][ T5063] copy_process+0x115c/0x3210 [ 171.147085][ T5063] ? __kasan_check_write+0x14/0x20 [ 171.152309][ T5063] ? __pidfd_prepare+0x150/0x150 [ 171.157446][ T5063] ? security_file_permission+0x83/0xa0 [ 171.162994][ T5063] kernel_clone+0x23f/0x940 [ 171.167518][ T5063] ? create_io_thread+0x130/0x130 [ 171.172562][ T5063] ? __kasan_check_write+0x14/0x20 [ 171.177672][ T5063] ? mutex_unlock+0x89/0x220 [ 171.182261][ T5063] __x64_sys_clone+0x176/0x1d0 [ 171.187637][ T5063] ? __kasan_check_write+0x14/0x20 [ 171.192749][ T5063] ? __ia32_sys_vfork+0xf0/0xf0 [ 171.197781][ T5063] ? fpregs_assert_state_consistent+0xb1/0xe0 [ 171.203970][ T5063] x64_sys_call+0x41f/0x9a0 [ 171.208492][ T5063] do_syscall_64+0x4c/0xa0 [ 171.212925][ T5063] ? clear_bhb_loop+0x50/0xa0 [ 171.217619][ T5063] ? clear_bhb_loop+0x50/0xa0 [ 171.222321][ T5063] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 171.228317][ T5063] RIP: 0033:0x7f4c4f0a7be9 [ 171.232895][ T5063] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 171.252503][ T5063] RSP: 002b:00007f4c4db0ffe8 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 171.261010][ T5063] RAX: ffffffffffffffda RBX: 00007f4c4f2cefa0 RCX: 00007f4c4f0a7be9 [ 171.269164][ T5063] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000400 [ 171.277151][ T5063] RBP: 00007f4c4db10090 R08: 0000000000000000 R09: 0000000000000000 [ 171.285147][ T5063] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000002 [ 171.293127][ T5063] R13: 00007f4c4f2cf038 R14: 00007f4c4f2cefa0 R15: 00007ffe6e0f9d98 [ 171.301379][ T5063] [ 173.896168][ T5085] FAULT_INJECTION: forcing a failure. [ 173.896168][ T5085] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 173.911950][ T5085] CPU: 0 PID: 5085 Comm: syz.4.1664 Not tainted 5.15.189-syzkaller-android13-5.15.189_r00 #0 [ 173.922223][ T5085] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 173.932408][ T5085] Call Trace: [ 173.935700][ T5085] [ 173.938641][ T5085] __dump_stack+0x21/0x30 [ 173.943001][ T5085] dump_stack_lvl+0xee/0x150 [ 173.947685][ T5085] ? show_regs_print_info+0x20/0x20 [ 173.952907][ T5085] ? get_page_from_freelist+0x2cc5/0x2d50 [ 173.958758][ T5085] dump_stack+0x15/0x20 [ 173.962917][ T5085] should_fail+0x3c1/0x510 [ 173.967332][ T5085] should_fail_alloc_page+0x55/0x80 [ 173.972528][ T5085] prepare_alloc_pages+0x156/0x600 [ 173.977640][ T5085] ? __alloc_pages_bulk+0xab0/0xab0 [ 173.982832][ T5085] ? pcpu_chunk_refresh_hint+0x7e5/0x930 [ 173.988464][ T5085] __alloc_pages+0x10a/0x440 [ 173.993138][ T5085] ? prep_new_page+0x110/0x110 [ 173.997903][ T5085] pcpu_populate_chunk+0x184/0xcb0 [ 174.003023][ T5085] ? _find_next_bit+0x1b5/0x200 [ 174.007991][ T5085] pcpu_alloc+0xc4d/0x1660 [ 174.012462][ T5085] __alloc_percpu_gfp+0x25/0x30 [ 174.017403][ T5085] bpf_map_alloc_percpu+0xc5/0x150 [ 174.022515][ T5085] htab_map_alloc+0xc1b/0x14f0 [ 174.027278][ T5085] map_create+0x455/0x21b0 [ 174.031698][ T5085] __sys_bpf+0x2cf/0x730 [ 174.036045][ T5085] ? bpf_link_show_fdinfo+0x310/0x310 [ 174.041441][ T5085] ? debug_smp_processor_id+0x17/0x20 [ 174.046813][ T5085] __x64_sys_bpf+0x7c/0x90 [ 174.051487][ T5085] x64_sys_call+0x4b9/0x9a0 [ 174.056096][ T5085] do_syscall_64+0x4c/0xa0 [ 174.060624][ T5085] ? clear_bhb_loop+0x50/0xa0 [ 174.065316][ T5085] ? clear_bhb_loop+0x50/0xa0 [ 174.070003][ T5085] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 174.075899][ T5085] RIP: 0033:0x7f6542b2dbe9 [ 174.080314][ T5085] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 174.099949][ T5085] RSP: 002b:00007f6541596038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 174.108475][ T5085] RAX: ffffffffffffffda RBX: 00007f6542d54fa0 RCX: 00007f6542b2dbe9 [ 174.116534][ T5085] RDX: 0000000000000050 RSI: 0000200000000180 RDI: 0000000000000000 [ 174.124707][ T5085] RBP: 00007f6541596090 R08: 0000000000000000 R09: 0000000000000000 [ 174.132782][ T5085] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 174.141885][ T5085] R13: 00007f6542d55038 R14: 00007f6542d54fa0 R15: 00007fff2c368e28 [ 174.149861][ T5085] [ 178.482363][ T5155] device sit0 left promiscuous mode [ 178.773408][ T5171] device sit0 left promiscuous mode [ 179.795181][ T5202] device sit0 left promiscuous mode [ 180.378540][ T5222] device sit0 left promiscuous mode [ 192.132649][ T5415] device sit0 left promiscuous mode [ 214.863630][ T6246] FAULT_INJECTION: forcing a failure. [ 214.863630][ T6246] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 214.890168][ T6246] CPU: 1 PID: 6246 Comm: syz.2.2080 Not tainted 5.15.189-syzkaller-android13-5.15.189_r00 #0 [ 214.900419][ T6246] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 214.910542][ T6246] Call Trace: [ 214.913901][ T6246] [ 214.916818][ T6246] __dump_stack+0x21/0x30 [ 214.921130][ T6246] dump_stack_lvl+0xee/0x150 [ 214.925696][ T6246] ? show_regs_print_info+0x20/0x20 [ 214.930869][ T6246] ? get_page_from_freelist+0x2cc5/0x2d50 [ 214.936568][ T6246] dump_stack+0x15/0x20 [ 214.940700][ T6246] should_fail+0x3c1/0x510 [ 214.945190][ T6246] should_fail_alloc_page+0x55/0x80 [ 214.950365][ T6246] prepare_alloc_pages+0x156/0x600 [ 214.955456][ T6246] ? __alloc_pages_bulk+0xab0/0xab0 [ 214.960633][ T6246] ? pcpu_chunk_refresh_hint+0x7e5/0x930 [ 214.966252][ T6246] __alloc_pages+0x10a/0x440 [ 214.970923][ T6246] ? prep_new_page+0x110/0x110 [ 214.975665][ T6246] pcpu_populate_chunk+0x184/0xcb0 [ 214.980773][ T6246] ? _find_next_bit+0x1b5/0x200 [ 214.985701][ T6246] pcpu_alloc+0xc4d/0x1660 [ 214.990272][ T6246] __alloc_percpu_gfp+0x25/0x30 [ 214.995105][ T6246] bpf_map_alloc_percpu+0xc5/0x150 [ 215.000198][ T6246] htab_map_alloc+0xc1b/0x14f0 [ 215.004945][ T6246] map_create+0x455/0x21b0 [ 215.009343][ T6246] __sys_bpf+0x2cf/0x730 [ 215.013579][ T6246] ? bpf_link_show_fdinfo+0x310/0x310 [ 215.018947][ T6246] ? debug_smp_processor_id+0x17/0x20 [ 215.024542][ T6246] __x64_sys_bpf+0x7c/0x90 [ 215.029126][ T6246] x64_sys_call+0x4b9/0x9a0 [ 215.033608][ T6246] do_syscall_64+0x4c/0xa0 [ 215.038001][ T6246] ? clear_bhb_loop+0x50/0xa0 [ 215.042659][ T6246] ? clear_bhb_loop+0x50/0xa0 [ 215.047317][ T6246] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 215.053276][ T6246] RIP: 0033:0x7f4c4f0a7be9 [ 215.057670][ T6246] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 215.077371][ T6246] RSP: 002b:00007f4c4db10038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 215.085769][ T6246] RAX: ffffffffffffffda RBX: 00007f4c4f2cefa0 RCX: 00007f4c4f0a7be9 [ 215.093732][ T6246] RDX: 0000000000000050 RSI: 0000200000000840 RDI: 0000000000000000 [ 215.101798][ T6246] RBP: 00007f4c4db10090 R08: 0000000000000000 R09: 0000000000000000 [ 215.109984][ T6246] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 215.118065][ T6246] R13: 00007f4c4f2cf038 R14: 00007f4c4f2cefa0 R15: 00007ffe6e0f9d98 [ 215.126309][ T6246] [ 215.996363][ T6286] device sit0 entered promiscuous mode [ 216.083196][ T6288] device sit0 entered promiscuous mode [ 216.101459][ T6290] device veth1_macvtap left promiscuous mode [ 216.107839][ T6290] device macsec0 entered promiscuous mode [ 217.397040][ T6336] FAULT_INJECTION: forcing a failure. [ 217.397040][ T6336] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 217.474773][ T6336] CPU: 1 PID: 6336 Comm: syz.0.2115 Not tainted 5.15.189-syzkaller-android13-5.15.189_r00 #0 [ 217.485025][ T6336] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 217.495176][ T6336] Call Trace: [ 217.498453][ T6336] [ 217.501389][ T6336] __dump_stack+0x21/0x30 [ 217.505734][ T6336] dump_stack_lvl+0xee/0x150 [ 217.510367][ T6336] ? show_regs_print_info+0x20/0x20 [ 217.515564][ T6336] ? exc_page_fault+0x5e/0xb0 [ 217.520242][ T6336] dump_stack+0x15/0x20 [ 217.524401][ T6336] should_fail+0x3c1/0x510 [ 217.528834][ T6336] should_fail_usercopy+0x1a/0x20 [ 217.533856][ T6336] copy_page_from_iter+0x2f6/0x680 [ 217.538968][ T6336] pipe_write+0x914/0x18d0 [ 217.543386][ T6336] ? pipe_write+0x191/0x18d0 [ 217.547973][ T6336] ? pipe_read+0xfe0/0xfe0 [ 217.552383][ T6336] ? selinux_file_permission+0x3f4/0x510 [ 217.558022][ T6336] ? memset+0x35/0x40 [ 217.562048][ T6336] ? iov_iter_init+0xbc/0x180 [ 217.566733][ T6336] vfs_write+0x802/0xf70 [ 217.571016][ T6336] ? file_end_write+0x1b0/0x1b0 [ 217.575978][ T6336] ? __fget_files+0x2c4/0x320 [ 217.580769][ T6336] ? __fdget_pos+0x1f7/0x380 [ 217.585535][ T6336] ? ksys_write+0x71/0x240 [ 217.589951][ T6336] ksys_write+0x140/0x240 [ 217.595132][ T6336] ? __ia32_sys_read+0x90/0x90 [ 217.599933][ T6336] ? debug_smp_processor_id+0x17/0x20 [ 217.605568][ T6336] __x64_sys_write+0x7b/0x90 [ 217.610182][ T6336] x64_sys_call+0x8ef/0x9a0 [ 217.614732][ T6336] do_syscall_64+0x4c/0xa0 [ 217.619239][ T6336] ? clear_bhb_loop+0x50/0xa0 [ 217.623925][ T6336] ? clear_bhb_loop+0x50/0xa0 [ 217.628611][ T6336] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 217.634890][ T6336] RIP: 0033:0x7f6c3ca6fbe9 [ 217.639317][ T6336] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 217.659105][ T6336] RSP: 002b:00007f6c3b4d8038 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 217.667702][ T6336] RAX: ffffffffffffffda RBX: 00007f6c3cc96fa0 RCX: 00007f6c3ca6fbe9 [ 217.675763][ T6336] RDX: 00000000fffffdef RSI: 00002000000001c0 RDI: 0000000000000000 [ 217.683905][ T6336] RBP: 00007f6c3b4d8090 R08: 0000000000000000 R09: 0000000000000000 [ 217.691873][ T6336] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 217.699849][ T6336] R13: 00007f6c3cc97038 R14: 00007f6c3cc96fa0 R15: 00007ffe3578e738 [ 217.707827][ T6336] [ 219.621653][ T6412] device sit0 entered promiscuous mode [ 221.152323][ T6471] FAULT_INJECTION: forcing a failure. [ 221.152323][ T6471] name failslab, interval 1, probability 0, space 0, times 0 [ 221.166312][ T6471] CPU: 1 PID: 6471 Comm: syz.4.2162 Not tainted 5.15.189-syzkaller-android13-5.15.189_r00 #0 [ 221.176505][ T6471] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 221.186574][ T6471] Call Trace: [ 221.189871][ T6471] [ 221.192813][ T6471] __dump_stack+0x21/0x30 [ 221.197155][ T6471] dump_stack_lvl+0xee/0x150 [ 221.201833][ T6471] ? show_regs_print_info+0x20/0x20 [ 221.207040][ T6471] dump_stack+0x15/0x20 [ 221.211336][ T6471] should_fail+0x3c1/0x510 [ 221.215770][ T6471] __should_failslab+0xa4/0xe0 [ 221.220628][ T6471] should_failslab+0x9/0x20 [ 221.225142][ T6471] slab_pre_alloc_hook+0x3b/0xe0 [ 221.230092][ T6471] ? seq_open+0x61/0x130 [ 221.234416][ T6471] kmem_cache_alloc+0x44/0x260 [ 221.239179][ T6471] seq_open+0x61/0x130 [ 221.243332][ T6471] kernfs_fop_open+0x4da/0xb30 [ 221.248093][ T6471] ? kernfs_fop_mmap+0x400/0x400 [ 221.253032][ T6471] do_dentry_open+0x834/0x1010 [ 221.257804][ T6471] vfs_open+0x73/0x80 [ 221.261784][ T6471] path_openat+0x2646/0x2f10 [ 221.266370][ T6471] ? slab_post_alloc_hook+0x4f/0x2b0 [ 221.271658][ T6471] ? kmem_cache_alloc+0xf7/0x260 [ 221.276618][ T6471] ? do_syscall_64+0x4c/0xa0 [ 221.281223][ T6471] ? entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 221.287294][ T6471] ? do_filp_open+0x3e0/0x3e0 [ 221.291969][ T6471] do_filp_open+0x1b3/0x3e0 [ 221.296467][ T6471] ? vfs_tmpfile+0x2d0/0x2d0 [ 221.301107][ T6471] do_sys_openat2+0x14c/0x7b0 [ 221.305822][ T6471] ? __kasan_check_write+0x14/0x20 [ 221.311023][ T6471] ? do_sys_open+0xe0/0xe0 [ 221.315441][ T6471] ? sysvec_apic_timer_interrupt+0x64/0xc0 [ 221.321268][ T6471] __x64_sys_openat+0x136/0x160 [ 221.326127][ T6471] x64_sys_call+0x219/0x9a0 [ 221.330737][ T6471] do_syscall_64+0x4c/0xa0 [ 221.335239][ T6471] ? clear_bhb_loop+0x50/0xa0 [ 221.340003][ T6471] ? clear_bhb_loop+0x50/0xa0 [ 221.344677][ T6471] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 221.350708][ T6471] RIP: 0033:0x7f6542b2dbe9 [ 221.355300][ T6471] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 221.374931][ T6471] RSP: 002b:00007f6541596038 EFLAGS: 00000246 ORIG_RAX: 0000000000000101 [ 221.383373][ T6471] RAX: ffffffffffffffda RBX: 00007f6542d54fa0 RCX: 00007f6542b2dbe9 [ 221.391603][ T6471] RDX: 0000000000000002 RSI: 0000200000000840 RDI: 0000000000000007 [ 221.399597][ T6471] RBP: 00007f6541596090 R08: 0000000000000000 R09: 0000000000000000 [ 221.407568][ T6471] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 221.415745][ T6471] R13: 00007f6542d55038 R14: 00007f6542d54fa0 R15: 00007fff2c368e28 [ 221.423723][ T6471] [ 222.629708][ T6531] FAULT_INJECTION: forcing a failure. [ 222.629708][ T6531] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 222.644020][ T6531] CPU: 1 PID: 6531 Comm: syz.1.2183 Not tainted 5.15.189-syzkaller-android13-5.15.189_r00 #0 [ 222.654173][ T6531] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 222.664238][ T6531] Call Trace: [ 222.667524][ T6531] [ 222.670451][ T6531] __dump_stack+0x21/0x30 [ 222.674787][ T6531] dump_stack_lvl+0xee/0x150 [ 222.679380][ T6531] ? show_regs_print_info+0x20/0x20 [ 222.684589][ T6531] ? 0xffffffffa0028000 [ 222.688813][ T6531] dump_stack+0x15/0x20 [ 222.693160][ T6531] should_fail+0x3c1/0x510 [ 222.697677][ T6531] should_fail_alloc_page+0x55/0x80 [ 222.702878][ T6531] prepare_alloc_pages+0x156/0x600 [ 222.707996][ T6531] ? __alloc_pages_bulk+0xab0/0xab0 [ 222.713194][ T6531] ? pcpu_chunk_refresh_hint+0x7e5/0x930 [ 222.718825][ T6531] __alloc_pages+0x10a/0x440 [ 222.723412][ T6531] ? prep_new_page+0x110/0x110 [ 222.728179][ T6531] pcpu_populate_chunk+0x184/0xcb0 [ 222.733288][ T6531] ? _find_next_bit+0x1b5/0x200 [ 222.738147][ T6531] pcpu_alloc+0xc4d/0x1660 [ 222.742581][ T6531] __alloc_percpu_gfp+0x25/0x30 [ 222.747441][ T6531] bpf_map_alloc_percpu+0xc5/0x150 [ 222.752553][ T6531] array_map_alloc+0x39a/0x6d0 [ 222.757320][ T6531] map_create+0x455/0x21b0 [ 222.761734][ T6531] __sys_bpf+0x2cf/0x730 [ 222.765973][ T6531] ? bpf_link_show_fdinfo+0x310/0x310 [ 222.771454][ T6531] ? debug_smp_processor_id+0x17/0x20 [ 222.776920][ T6531] __x64_sys_bpf+0x7c/0x90 [ 222.781334][ T6531] x64_sys_call+0x4b9/0x9a0 [ 222.785867][ T6531] do_syscall_64+0x4c/0xa0 [ 222.790287][ T6531] ? clear_bhb_loop+0x50/0xa0 [ 222.795049][ T6531] ? clear_bhb_loop+0x50/0xa0 [ 222.799796][ T6531] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 222.805870][ T6531] RIP: 0033:0x7f85d9c17be9 [ 222.810460][ T6531] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 222.830151][ T6531] RSP: 002b:00007f85d8680038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 222.838650][ T6531] RAX: ffffffffffffffda RBX: 00007f85d9e3efa0 RCX: 00007f85d9c17be9 [ 222.846713][ T6531] RDX: 0000000000000048 RSI: 0000200000002680 RDI: 2000000000000000 [ 222.854687][ T6531] RBP: 00007f85d8680090 R08: 0000000000000000 R09: 0000000000000000 [ 222.862779][ T6531] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 222.870769][ T6531] R13: 00007f85d9e3f038 R14: 00007f85d9e3efa0 R15: 00007ffe19abf3d8 [ 222.878809][ T6531] [ 223.054184][ T6537] device pim6reg1 entered promiscuous mode [ 224.559298][ T6608] FAULT_INJECTION: forcing a failure. [ 224.559298][ T6608] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 224.634825][ T6608] CPU: 1 PID: 6608 Comm: syz.1.2210 Not tainted 5.15.189-syzkaller-android13-5.15.189_r00 #0 [ 224.645043][ T6608] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 224.655345][ T6608] Call Trace: [ 224.658646][ T6608] [ 224.661589][ T6608] __dump_stack+0x21/0x30 [ 224.666030][ T6608] dump_stack_lvl+0xee/0x150 [ 224.670630][ T6608] ? show_regs_print_info+0x20/0x20 [ 224.675875][ T6608] dump_stack+0x15/0x20 [ 224.680086][ T6608] should_fail+0x3c1/0x510 [ 224.684517][ T6608] should_fail_usercopy+0x1a/0x20 [ 224.689557][ T6608] _copy_to_user+0x20/0x90 [ 224.694070][ T6608] simple_read_from_buffer+0xe9/0x160 [ 224.699448][ T6608] proc_fail_nth_read+0x19a/0x210 [ 224.704485][ T6608] ? proc_fault_inject_write+0x2f0/0x2f0 [ 224.710138][ T6608] ? security_file_permission+0x83/0xa0 [ 224.715697][ T6608] ? proc_fault_inject_write+0x2f0/0x2f0 [ 224.721524][ T6608] vfs_read+0x282/0xbe0 [ 224.725688][ T6608] ? kernel_read+0x1f0/0x1f0 [ 224.730287][ T6608] ? __kasan_check_write+0x14/0x20 [ 224.735407][ T6608] ? mutex_lock+0x95/0x1a0 [ 224.739829][ T6608] ? wait_for_completion_killable_timeout+0x10/0x10 [ 224.746441][ T6608] ? __fget_files+0x2c4/0x320 [ 224.751246][ T6608] ? __fdget_pos+0x2d2/0x380 [ 224.755851][ T6608] ? ksys_read+0x71/0x240 [ 224.760304][ T6608] ksys_read+0x140/0x240 [ 224.764577][ T6608] ? vfs_write+0xf70/0xf70 [ 224.769117][ T6608] ? debug_smp_processor_id+0x17/0x20 [ 224.774592][ T6608] __x64_sys_read+0x7b/0x90 [ 224.779099][ T6608] x64_sys_call+0x96d/0x9a0 [ 224.783636][ T6608] do_syscall_64+0x4c/0xa0 [ 224.788062][ T6608] ? clear_bhb_loop+0x50/0xa0 [ 224.792744][ T6608] ? clear_bhb_loop+0x50/0xa0 [ 224.797431][ T6608] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 224.803331][ T6608] RIP: 0033:0x7f85d9c165fc [ 224.807757][ T6608] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 93 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 ef 93 02 00 48 [ 224.827459][ T6608] RSP: 002b:00007f85d8680030 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 224.835918][ T6608] RAX: ffffffffffffffda RBX: 00007f85d9e3efa0 RCX: 00007f85d9c165fc [ 224.843898][ T6608] RDX: 000000000000000f RSI: 00007f85d86800a0 RDI: 0000000000000008 [ 224.851879][ T6608] RBP: 00007f85d8680090 R08: 0000000000000000 R09: 0000000000000000 [ 224.859952][ T6608] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 224.868103][ T6608] R13: 00007f85d9e3f038 R14: 00007f85d9e3efa0 R15: 00007ffe19abf3d8 [ 224.876211][ T6608] [ 230.544556][ T30] audit: type=1400 audit(1755737233.797:139): avc: denied { create } for pid=6811 comm="syz.4.2279" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 232.249324][ T6868] device pim6reg1 entered promiscuous mode [ 233.296217][ T6927] FAULT_INJECTION: forcing a failure. [ 233.296217][ T6927] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 233.313641][ T6927] CPU: 1 PID: 6927 Comm: syz.0.2322 Not tainted 5.15.189-syzkaller-android13-5.15.189_r00 #0 [ 233.324003][ T6927] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 233.334178][ T6927] Call Trace: [ 233.337490][ T6927] [ 233.340559][ T6927] __dump_stack+0x21/0x30 [ 233.344919][ T6927] dump_stack_lvl+0xee/0x150 [ 233.349522][ T6927] ? show_regs_print_info+0x20/0x20 [ 233.354744][ T6927] dump_stack+0x15/0x20 [ 233.359016][ T6927] should_fail+0x3c1/0x510 [ 233.363453][ T6927] should_fail_alloc_page+0x55/0x80 [ 233.368667][ T6927] prepare_alloc_pages+0x156/0x600 [ 233.373793][ T6927] ? __alloc_pages_bulk+0xab0/0xab0 [ 233.379007][ T6927] ? slab_post_alloc_hook+0x4f/0x2b0 [ 233.384322][ T6927] ? alloc_vmap_area+0x17a/0x1990 [ 233.389366][ T6927] ? __get_vm_area_node+0x14e/0x350 [ 233.394679][ T6927] ? __vmalloc_node_range+0xdf/0xaf0 [ 233.400066][ T6927] ? dev_map_create_hash+0x26/0x1c0 [ 233.405331][ T6927] __alloc_pages+0x10a/0x440 [ 233.409986][ T6927] ? prep_new_page+0x110/0x110 [ 233.414806][ T6927] ? __kasan_check_write+0x14/0x20 [ 233.420163][ T6927] __get_free_pages+0x10/0x30 [ 233.424843][ T6927] kasan_populate_vmalloc_pte+0x29/0x120 [ 233.430467][ T6927] __apply_to_page_range+0x8b0/0xbf0 [ 233.435751][ T6927] ? kasan_populate_vmalloc+0x70/0x70 [ 233.441174][ T6927] ? kasan_populate_vmalloc+0x70/0x70 [ 233.446687][ T6927] apply_to_page_range+0x3b/0x50 [ 233.451653][ T6927] kasan_populate_vmalloc+0x60/0x70 [ 233.457053][ T6927] alloc_vmap_area+0x185c/0x1990 [ 233.462022][ T6927] ? vm_map_ram+0xa60/0xa60 [ 233.466707][ T6927] ? kmem_cache_alloc_trace+0x119/0x270 [ 233.472352][ T6927] __get_vm_area_node+0x14e/0x350 [ 233.477383][ T6927] __vmalloc_node_range+0xdf/0xaf0 [ 233.482497][ T6927] ? dev_map_create_hash+0x26/0x1c0 [ 233.487714][ T6927] bpf_map_area_alloc+0xd5/0xe0 [ 233.492574][ T6927] ? dev_map_create_hash+0x26/0x1c0 [ 233.497924][ T6927] dev_map_create_hash+0x26/0x1c0 [ 233.502964][ T6927] dev_map_alloc+0x2d4/0x560 [ 233.507668][ T6927] map_create+0x455/0x21b0 [ 233.512113][ T6927] __sys_bpf+0x2cf/0x730 [ 233.516366][ T6927] ? bpf_link_show_fdinfo+0x310/0x310 [ 233.521746][ T6927] ? debug_smp_processor_id+0x17/0x20 [ 233.527405][ T6927] __x64_sys_bpf+0x7c/0x90 [ 233.531841][ T6927] x64_sys_call+0x4b9/0x9a0 [ 233.536383][ T6927] do_syscall_64+0x4c/0xa0 [ 233.540807][ T6927] ? clear_bhb_loop+0x50/0xa0 [ 233.545492][ T6927] ? clear_bhb_loop+0x50/0xa0 [ 233.550177][ T6927] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 233.556078][ T6927] RIP: 0033:0x7f6c3ca6fbe9 [ 233.560504][ T6927] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 233.580221][ T6927] RSP: 002b:00007f6c3b4d8038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 233.588654][ T6927] RAX: ffffffffffffffda RBX: 00007f6c3cc96fa0 RCX: 00007f6c3ca6fbe9 [ 233.596763][ T6927] RDX: 0000000000000048 RSI: 0000200000000580 RDI: 0000000000000000 [ 233.604850][ T6927] RBP: 00007f6c3b4d8090 R08: 0000000000000000 R09: 0000000000000000 [ 233.612829][ T6927] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 233.621207][ T6927] R13: 00007f6c3cc97038 R14: 00007f6c3cc96fa0 R15: 00007ffe3578e738 [ 233.629312][ T6927] [ 233.947998][ T6946] device sit0 entered promiscuous mode [ 234.089239][ T6956] FAULT_INJECTION: forcing a failure. [ 234.089239][ T6956] name failslab, interval 1, probability 0, space 0, times 0 [ 234.105238][ T6956] CPU: 1 PID: 6956 Comm: syz.4.2332 Not tainted 5.15.189-syzkaller-android13-5.15.189_r00 #0 [ 234.115509][ T6956] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 234.125657][ T6956] Call Trace: [ 234.128943][ T6956] [ 234.131989][ T6956] __dump_stack+0x21/0x30 [ 234.136313][ T6956] dump_stack_lvl+0xee/0x150 [ 234.140890][ T6956] ? show_regs_print_info+0x20/0x20 [ 234.146084][ T6956] dump_stack+0x15/0x20 [ 234.150235][ T6956] should_fail+0x3c1/0x510 [ 234.154638][ T6956] ? skb_ensure_writable+0x2e7/0x460 [ 234.160018][ T6956] __should_failslab+0xa4/0xe0 [ 234.164764][ T6956] should_failslab+0x9/0x20 [ 234.169468][ T6956] slab_pre_alloc_hook+0x3b/0xe0 [ 234.174424][ T6956] ? skb_ensure_writable+0x2e7/0x460 [ 234.179695][ T6956] ? skb_ensure_writable+0x2e7/0x460 [ 234.185016][ T6956] __kmalloc_track_caller+0x6c/0x2c0 [ 234.190390][ T6956] ? skb_ensure_writable+0x2e7/0x460 [ 234.195820][ T6956] ? skb_ensure_writable+0x2e7/0x460 [ 234.201104][ T6956] pskb_expand_head+0x11b/0x11d0 [ 234.206042][ T6956] ? __copy_skb_header+0x437/0x600 [ 234.212284][ T6956] ? __kasan_check_write+0x14/0x20 [ 234.218511][ T6956] ? __skb_clone+0x47a/0x790 [ 234.223101][ T6956] skb_ensure_writable+0x2e7/0x460 [ 234.228296][ T6956] bpf_clone_redirect+0x10b/0x380 [ 234.233324][ T6956] bpf_prog_208b094576c80b22+0x56/0x554 [ 234.238867][ T6956] ? __kasan_slab_alloc+0xcf/0xf0 [ 234.243891][ T6956] ? __kasan_slab_alloc+0xbd/0xf0 [ 234.248916][ T6956] ? slab_post_alloc_hook+0x4f/0x2b0 [ 234.254207][ T6956] ? kmem_cache_alloc+0xf7/0x260 [ 234.259234][ T6956] ? __build_skb+0x2d/0x310 [ 234.263731][ T6956] ? build_skb+0x24/0x200 [ 234.268153][ T6956] ? bpf_prog_test_run_skb+0x279/0x1150 [ 234.273706][ T6956] ? bpf_prog_test_run+0x3d5/0x620 [ 234.278817][ T6956] ? __sys_bpf+0x52c/0x730 [ 234.283235][ T6956] ? __x64_sys_bpf+0x7c/0x90 [ 234.287826][ T6956] ? x64_sys_call+0x4b9/0x9a0 [ 234.292509][ T6956] ? do_syscall_64+0x4c/0xa0 [ 234.297224][ T6956] ? entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 234.303318][ T6956] ? __kasan_check_read+0x11/0x20 [ 234.308357][ T6956] ? bpf_test_timer_continue+0x146/0x4a0 [ 234.313992][ T6956] bpf_test_run+0x33d/0x8d0 [ 234.318506][ T6956] ? convert___skb_to_skb+0x4f0/0x4f0 [ 234.323884][ T6956] ? eth_get_headlen+0x1f0/0x1f0 [ 234.328845][ T6956] ? convert___skb_to_skb+0x41/0x4f0 [ 234.334142][ T6956] bpf_prog_test_run_skb+0x9ec/0x1150 [ 234.339528][ T6956] ? __bpf_prog_test_run_raw_tp+0x2b0/0x2b0 [ 234.345418][ T6956] bpf_prog_test_run+0x3d5/0x620 [ 234.350351][ T6956] ? bpf_prog_query+0x230/0x230 [ 234.355457][ T6956] ? selinux_bpf+0xce/0xf0 [ 234.359877][ T6956] ? security_bpf+0x82/0xa0 [ 234.364451][ T6956] __sys_bpf+0x52c/0x730 [ 234.368716][ T6956] ? bpf_link_show_fdinfo+0x310/0x310 [ 234.374102][ T6956] ? debug_smp_processor_id+0x17/0x20 [ 234.379500][ T6956] __x64_sys_bpf+0x7c/0x90 [ 234.383921][ T6956] x64_sys_call+0x4b9/0x9a0 [ 234.388418][ T6956] do_syscall_64+0x4c/0xa0 [ 234.392827][ T6956] ? clear_bhb_loop+0x50/0xa0 [ 234.397503][ T6956] ? clear_bhb_loop+0x50/0xa0 [ 234.402176][ T6956] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 234.408070][ T6956] RIP: 0033:0x7f6542b2dbe9 [ 234.412486][ T6956] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 234.432272][ T6956] RSP: 002b:00007f6541596038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 234.440705][ T6956] RAX: ffffffffffffffda RBX: 00007f6542d54fa0 RCX: 00007f6542b2dbe9 [ 234.448674][ T6956] RDX: 0000000000000048 RSI: 0000200000000080 RDI: 000000000000000a [ 234.456642][ T6956] RBP: 00007f6541596090 R08: 0000000000000000 R09: 0000000000000000 [ 234.464783][ T6956] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 234.472843][ T6956] R13: 00007f6542d55038 R14: 00007f6542d54fa0 R15: 00007fff2c368e28 [ 234.480948][ T6956] [ 234.746303][ T6974] device sit0 left promiscuous mode [ 234.850997][ T6974] device sit0 entered promiscuous mode [ 237.759851][ T7053] syz.4.2365 (7053) used greatest stack depth: 21424 bytes left [ 238.873274][ T7124] device veth0_vlan left promiscuous mode [ 238.886131][ T7124] device veth0_vlan entered promiscuous mode [ 238.968849][ T228] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 238.984340][ T228] IPv6: ADDRCONF(NETDEV_CHANGE): ªªªªªª: link becomes ready [ 239.015231][ T228] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 241.432121][ T7216] device pim6reg1 entered promiscuous mode [ 242.040550][ T7223] device syzkaller0 entered promiscuous mode [ 243.222407][ T7284] device syzkaller0 entered promiscuous mode [ 243.477281][ T7289] ip6_vti0: mtu greater than device maximum [ 244.387707][ T7326] device syzkaller0 entered promiscuous mode [ 244.560611][ T7332] FAULT_INJECTION: forcing a failure. [ 244.560611][ T7332] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 244.575408][ T7332] CPU: 0 PID: 7332 Comm: syz.4.2465 Not tainted 5.15.189-syzkaller-android13-5.15.189_r00 #0 [ 244.585593][ T7332] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 244.595647][ T7332] Call Trace: [ 244.599031][ T7332] [ 244.601976][ T7332] __dump_stack+0x21/0x30 [ 244.606324][ T7332] dump_stack_lvl+0xee/0x150 [ 244.610931][ T7332] ? show_regs_print_info+0x20/0x20 [ 244.616148][ T7332] ? get_page_from_freelist+0x2cc5/0x2d50 [ 244.621997][ T7332] dump_stack+0x15/0x20 [ 244.626267][ T7332] should_fail+0x3c1/0x510 [ 244.630689][ T7332] should_fail_alloc_page+0x55/0x80 [ 244.635977][ T7332] prepare_alloc_pages+0x156/0x600 [ 244.641094][ T7332] ? __alloc_pages_bulk+0xab0/0xab0 [ 244.646288][ T7332] ? pcpu_chunk_refresh_hint+0x7e5/0x930 [ 244.651920][ T7332] __alloc_pages+0x10a/0x440 [ 244.656542][ T7332] ? prep_new_page+0x110/0x110 [ 244.661603][ T7332] pcpu_populate_chunk+0x184/0xcb0 [ 244.666718][ T7332] ? _find_next_bit+0x1b5/0x200 [ 244.671916][ T7332] pcpu_alloc+0xc4d/0x1660 [ 244.676330][ T7332] __alloc_percpu_gfp+0x25/0x30 [ 244.681179][ T7332] bpf_map_alloc_percpu+0xc5/0x150 [ 244.686292][ T7332] htab_map_alloc+0xc1b/0x14f0 [ 244.691056][ T7332] map_create+0x455/0x21b0 [ 244.695467][ T7332] __sys_bpf+0x2cf/0x730 [ 244.699719][ T7332] ? bpf_link_show_fdinfo+0x310/0x310 [ 244.705176][ T7332] ? debug_smp_processor_id+0x17/0x20 [ 244.710638][ T7332] __x64_sys_bpf+0x7c/0x90 [ 244.715048][ T7332] x64_sys_call+0x4b9/0x9a0 [ 244.719550][ T7332] do_syscall_64+0x4c/0xa0 [ 244.723970][ T7332] ? clear_bhb_loop+0x50/0xa0 [ 244.728645][ T7332] ? clear_bhb_loop+0x50/0xa0 [ 244.733319][ T7332] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 244.739210][ T7332] RIP: 0033:0x7f6542b2dbe9 [ 244.743626][ T7332] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 244.763228][ T7332] RSP: 002b:00007f6541596038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 244.771644][ T7332] RAX: ffffffffffffffda RBX: 00007f6542d54fa0 RCX: 00007f6542b2dbe9 [ 244.779612][ T7332] RDX: 0000000000000050 RSI: 00002000000000c0 RDI: 0000000000000000 [ 244.787666][ T7332] RBP: 00007f6541596090 R08: 0000000000000000 R09: 0000000000000000 [ 244.795641][ T7332] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 244.803803][ T7332] R13: 00007f6542d55038 R14: 00007f6542d54fa0 R15: 00007fff2c368e28 [ 244.811888][ T7332] [ 245.336446][ T7356] syz.4.2473[7356] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 245.336553][ T7356] syz.4.2473[7356] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 245.831568][ T7373] device sit0 entered promiscuous mode [ 246.630326][ T7375] device syzkaller0 entered promiscuous mode [ 247.055136][ T7418] syz.1.2494[7418] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 247.055238][ T7418] syz.1.2494[7418] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 247.865038][ T7446] FAULT_INJECTION: forcing a failure. [ 247.865038][ T7446] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 247.896862][ T7446] CPU: 0 PID: 7446 Comm: syz.1.2505 Not tainted 5.15.189-syzkaller-android13-5.15.189_r00 #0 [ 247.907136][ T7446] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 247.917278][ T7446] Call Trace: [ 247.920562][ T7446] [ 247.923491][ T7446] __dump_stack+0x21/0x30 [ 247.927921][ T7446] dump_stack_lvl+0xee/0x150 [ 247.932507][ T7446] ? show_regs_print_info+0x20/0x20 [ 247.937703][ T7446] ? kstrtouint_from_user+0x1a0/0x200 [ 247.943073][ T7446] dump_stack+0x15/0x20 [ 247.947234][ T7446] should_fail+0x3c1/0x510 [ 247.951647][ T7446] should_fail_usercopy+0x1a/0x20 [ 247.956765][ T7446] _copy_from_user+0x20/0xd0 [ 247.961372][ T7446] ___sys_recvmsg+0x129/0x4f0 [ 247.966046][ T7446] ? proc_fail_nth_read+0x210/0x210 [ 247.971246][ T7446] ? __sys_recvmsg+0x250/0x250 [ 247.976007][ T7446] ? vfs_write+0xc17/0xf70 [ 247.980423][ T7446] ? __fdget+0x1a1/0x230 [ 247.984667][ T7446] __x64_sys_recvmsg+0x1df/0x2a0 [ 247.989603][ T7446] ? ___sys_recvmsg+0x4f0/0x4f0 [ 247.994483][ T7446] ? ksys_write+0x1eb/0x240 [ 247.998998][ T7446] ? fpregs_assert_state_consistent+0xb1/0xe0 [ 248.005070][ T7446] x64_sys_call+0x705/0x9a0 [ 248.009577][ T7446] do_syscall_64+0x4c/0xa0 [ 248.013995][ T7446] ? clear_bhb_loop+0x50/0xa0 [ 248.018667][ T7446] ? clear_bhb_loop+0x50/0xa0 [ 248.023344][ T7446] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 248.029236][ T7446] RIP: 0033:0x7f85d9c17be9 [ 248.033686][ T7446] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 248.053286][ T7446] RSP: 002b:00007f85d8680038 EFLAGS: 00000246 ORIG_RAX: 000000000000002f [ 248.061701][ T7446] RAX: ffffffffffffffda RBX: 00007f85d9e3efa0 RCX: 00007f85d9c17be9 [ 248.069670][ T7446] RDX: 0000000000000000 RSI: 0000200000000340 RDI: 0000000000000004 [ 248.077638][ T7446] RBP: 00007f85d8680090 R08: 0000000000000000 R09: 0000000000000000 [ 248.085603][ T7446] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 248.093591][ T7446] R13: 00007f85d9e3f038 R14: 00007f85d9e3efa0 R15: 00007ffe19abf3d8 [ 248.101736][ T7446] [ 248.161389][ T7446] device veth0_vlan left promiscuous mode [ 248.195496][ T7446] device veth0_vlan entered promiscuous mode [ 248.277931][ T7456] device veth0_vlan left promiscuous mode [ 248.289188][ T7456] device veth0_vlan entered promiscuous mode [ 248.333069][ T228] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 248.392495][ T228] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 248.439924][ T228] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 248.561131][ T7468] syz.2.2512[7468] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 248.561189][ T7468] syz.2.2512[7468] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 248.714622][ T7466] device veth0_vlan left promiscuous mode [ 248.743258][ T7466] device veth0_vlan entered promiscuous mode [ 250.445440][ T7528] syz.3.2535[7528] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 250.445547][ T7528] syz.3.2535[7528] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 252.133627][ T7597] syz.0.2558[7597] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 252.169111][ T7597] syz.0.2558[7597] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 253.196637][ T7638] syz.3.2574[7638] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 253.208381][ T7638] syz.3.2574[7638] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 255.697131][ T30] audit: type=1400 audit(1755737258.957:140): avc: denied { create } for pid=7748 comm="syz.2.2618" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_fib_lookup_socket permissive=1 [ 256.561692][ T7798] FAULT_INJECTION: forcing a failure. [ 256.561692][ T7798] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 256.579076][ T7798] CPU: 0 PID: 7798 Comm: syz.2.2634 Not tainted 5.15.189-syzkaller-android13-5.15.189_r00 #0 [ 256.589349][ T7798] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 256.599409][ T7798] Call Trace: [ 256.602665][ T7798] [ 256.605580][ T7798] __dump_stack+0x21/0x30 [ 256.609896][ T7798] dump_stack_lvl+0xee/0x150 [ 256.614468][ T7798] ? show_regs_print_info+0x20/0x20 [ 256.619649][ T7798] ? ktime_get_boot_fast_ns+0x1a1/0x1d0 [ 256.625181][ T7798] dump_stack+0x15/0x20 [ 256.629348][ T7798] should_fail+0x3c1/0x510 [ 256.633750][ T7798] should_fail_alloc_page+0x55/0x80 [ 256.639041][ T7798] prepare_alloc_pages+0x156/0x600 [ 256.644127][ T7798] ? __alloc_pages_bulk+0xab0/0xab0 [ 256.649310][ T7798] ? __bpf_trace_mm_page_alloc+0xc0/0xf0 [ 256.654927][ T7798] __alloc_pages+0x10a/0x440 [ 256.659525][ T7798] ? prep_new_page+0x110/0x110 [ 256.664264][ T7798] pcpu_populate_chunk+0x184/0xcb0 [ 256.669360][ T7798] ? _find_next_bit+0x1b5/0x200 [ 256.674202][ T7798] pcpu_alloc+0xc4d/0x1660 [ 256.678598][ T7798] __alloc_percpu+0x24/0x30 [ 256.683091][ T7798] perf_trace_event_init+0x6a7/0xa30 [ 256.688356][ T7798] perf_uprobe_init+0x132/0x1a0 [ 256.693187][ T7798] perf_uprobe_event_init+0xe6/0x180 [ 256.698453][ T7798] perf_try_init_event+0x14a/0x430 [ 256.703548][ T7798] perf_event_alloc+0xedd/0x1a20 [ 256.708473][ T7798] __se_sys_perf_event_open+0x6c5/0x1b80 [ 256.714081][ T7798] ? __kasan_check_write+0x14/0x20 [ 256.719180][ T7798] ? mutex_unlock+0x89/0x220 [ 256.723791][ T7798] ? __x64_sys_perf_event_open+0xd0/0xd0 [ 256.729486][ T7798] ? __ia32_sys_read+0x90/0x90 [ 256.734279][ T7798] __x64_sys_perf_event_open+0xbf/0xd0 [ 256.739779][ T7798] x64_sys_call+0x50d/0x9a0 [ 256.744290][ T7798] do_syscall_64+0x4c/0xa0 [ 256.748707][ T7798] ? clear_bhb_loop+0x50/0xa0 [ 256.753633][ T7798] ? clear_bhb_loop+0x50/0xa0 [ 256.758309][ T7798] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 256.764212][ T7798] RIP: 0033:0x7f4c4f0a7be9 [ 256.768647][ T7798] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 256.788355][ T7798] RSP: 002b:00007f4c4db10038 EFLAGS: 00000246 ORIG_RAX: 000000000000012a [ 256.796779][ T7798] RAX: ffffffffffffffda RBX: 00007f4c4f2cefa0 RCX: 00007f4c4f0a7be9 [ 256.804850][ T7798] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000200000001080 [ 256.812816][ T7798] RBP: 00007f4c4db10090 R08: 0000000000000000 R09: 0000000000000000 [ 256.820786][ T7798] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000002 [ 256.828755][ T7798] R13: 00007f4c4f2cf038 R14: 00007f4c4f2cefa0 R15: 00007ffe6e0f9d98 [ 256.836727][ T7798] [ 256.846678][ T7798] percpu: allocation failed, size=8192 align=8 atomic=0, failed to populate [ 256.855704][ T7798] CPU: 0 PID: 7798 Comm: syz.2.2634 Not tainted 5.15.189-syzkaller-android13-5.15.189_r00 #0 [ 256.865890][ T7798] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 256.876165][ T7798] Call Trace: [ 256.879426][ T7798] [ 256.882335][ T7798] __dump_stack+0x21/0x30 [ 256.886642][ T7798] dump_stack_lvl+0xee/0x150 [ 256.891213][ T7798] ? show_regs_print_info+0x20/0x20 [ 256.896406][ T7798] dump_stack+0x15/0x20 [ 256.900536][ T7798] pcpu_alloc+0x11e6/0x1660 [ 256.905025][ T7798] __alloc_percpu+0x24/0x30 [ 256.909507][ T7798] perf_trace_event_init+0x6a7/0xa30 [ 256.914958][ T7798] perf_uprobe_init+0x132/0x1a0 [ 256.919875][ T7798] perf_uprobe_event_init+0xe6/0x180 [ 256.925233][ T7798] perf_try_init_event+0x14a/0x430 [ 256.930361][ T7798] perf_event_alloc+0xedd/0x1a20 [ 256.935399][ T7798] __se_sys_perf_event_open+0x6c5/0x1b80 [ 256.941030][ T7798] ? __kasan_check_write+0x14/0x20 [ 256.946118][ T7798] ? mutex_unlock+0x89/0x220 [ 256.950698][ T7798] ? __x64_sys_perf_event_open+0xd0/0xd0 [ 256.956329][ T7798] ? __ia32_sys_read+0x90/0x90 [ 256.961164][ T7798] __x64_sys_perf_event_open+0xbf/0xd0 [ 256.966604][ T7798] x64_sys_call+0x50d/0x9a0 [ 256.971268][ T7798] do_syscall_64+0x4c/0xa0 [ 256.975848][ T7798] ? clear_bhb_loop+0x50/0xa0 [ 256.980517][ T7798] ? clear_bhb_loop+0x50/0xa0 [ 256.985285][ T7798] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 256.991261][ T7798] RIP: 0033:0x7f4c4f0a7be9 [ 256.995708][ T7798] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 257.015540][ T7798] RSP: 002b:00007f4c4db10038 EFLAGS: 00000246 ORIG_RAX: 000000000000012a [ 257.023950][ T7798] RAX: ffffffffffffffda RBX: 00007f4c4f2cefa0 RCX: 00007f4c4f0a7be9 [ 257.031923][ T7798] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000200000001080 [ 257.039958][ T7798] RBP: 00007f4c4db10090 R08: 0000000000000000 R09: 0000000000000000 [ 257.047911][ T7798] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000002 [ 257.055977][ T7798] R13: 00007f4c4f2cf038 R14: 00007f4c4f2cefa0 R15: 00007ffe6e0f9d98 [ 257.064055][ T7798] [ 259.787056][ T7912] FAULT_INJECTION: forcing a failure. [ 259.787056][ T7912] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 259.800344][ T7912] CPU: 0 PID: 7912 Comm: syz.1.2672 Not tainted 5.15.189-syzkaller-android13-5.15.189_r00 #0 [ 259.810590][ T7912] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 259.820740][ T7912] Call Trace: [ 259.824116][ T7912] [ 259.827041][ T7912] __dump_stack+0x21/0x30 [ 259.831434][ T7912] dump_stack_lvl+0xee/0x150 [ 259.836014][ T7912] ? show_regs_print_info+0x20/0x20 [ 259.841309][ T7912] dump_stack+0x15/0x20 [ 259.845450][ T7912] should_fail+0x3c1/0x510 [ 259.849970][ T7912] should_fail_usercopy+0x1a/0x20 [ 259.854979][ T7912] _copy_from_user+0x20/0xd0 [ 259.859650][ T7912] sock_do_ioctl+0x175/0x300 [ 259.864225][ T7912] ? sock_show_fdinfo+0xa0/0xa0 [ 259.869155][ T7912] ? selinux_file_ioctl+0x377/0x480 [ 259.874368][ T7912] ? ktime_get+0x12f/0x160 [ 259.878772][ T7912] ? lapic_next_event+0x5f/0x70 [ 259.883630][ T7912] sock_ioctl+0x4bc/0x6b0 [ 259.887960][ T7912] ? sock_poll+0x3d0/0x3d0 [ 259.892357][ T7912] ? __fget_files+0x2c4/0x320 [ 259.897100][ T7912] ? security_file_ioctl+0x84/0xa0 [ 259.902390][ T7912] ? sock_poll+0x3d0/0x3d0 [ 259.906884][ T7912] __se_sys_ioctl+0x121/0x1a0 [ 259.911672][ T7912] __x64_sys_ioctl+0x7b/0x90 [ 259.916360][ T7912] x64_sys_call+0x2f/0x9a0 [ 259.920821][ T7912] do_syscall_64+0x4c/0xa0 [ 259.925224][ T7912] ? clear_bhb_loop+0x50/0xa0 [ 259.929897][ T7912] ? clear_bhb_loop+0x50/0xa0 [ 259.934673][ T7912] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 259.940561][ T7912] RIP: 0033:0x7f85d9c17be9 [ 259.944968][ T7912] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 259.964571][ T7912] RSP: 002b:00007f85d8680038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 259.972991][ T7912] RAX: ffffffffffffffda RBX: 00007f85d9e3efa0 RCX: 00007f85d9c17be9 [ 259.981047][ T7912] RDX: 0000200000002280 RSI: 0000000000008943 RDI: 000000000000000a [ 259.988998][ T7912] RBP: 00007f85d8680090 R08: 0000000000000000 R09: 0000000000000000 [ 259.996952][ T7912] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 260.004903][ T7912] R13: 00007f85d9e3f038 R14: 00007f85d9e3efa0 R15: 00007ffe19abf3d8 [ 260.012882][ T7912] [ 262.841516][ T8013] FAULT_INJECTION: forcing a failure. [ 262.841516][ T8013] name failslab, interval 1, probability 0, space 0, times 0 [ 262.973872][ T8013] CPU: 1 PID: 8013 Comm: syz.4.2708 Not tainted 5.15.189-syzkaller-android13-5.15.189_r00 #0 [ 262.984178][ T8013] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 262.994245][ T8013] Call Trace: [ 262.997530][ T8013] [ 263.000463][ T8013] __dump_stack+0x21/0x30 [ 263.004808][ T8013] dump_stack_lvl+0xee/0x150 [ 263.009403][ T8013] ? show_regs_print_info+0x20/0x20 [ 263.014613][ T8013] dump_stack+0x15/0x20 [ 263.018772][ T8013] should_fail+0x3c1/0x510 [ 263.023220][ T8013] __should_failslab+0xa4/0xe0 [ 263.028078][ T8013] should_failslab+0x9/0x20 [ 263.032584][ T8013] slab_pre_alloc_hook+0x3b/0xe0 [ 263.037530][ T8013] __kmalloc+0x6d/0x2c0 [ 263.041696][ T8013] ? sk_prot_alloc+0xed/0x320 [ 263.046401][ T8013] ? check_stack_object+0x81/0x140 [ 263.051690][ T8013] sk_prot_alloc+0xed/0x320 [ 263.056224][ T8013] sk_alloc+0x38/0x430 [ 263.060295][ T8013] bpf_prog_test_run_skb+0x24b/0x1150 [ 263.065787][ T8013] ? __kasan_check_write+0x14/0x20 [ 263.070929][ T8013] ? __bpf_prog_test_run_raw_tp+0x2b0/0x2b0 [ 263.076843][ T8013] bpf_prog_test_run+0x3d5/0x620 [ 263.081794][ T8013] ? bpf_prog_query+0x230/0x230 [ 263.086648][ T8013] ? selinux_bpf+0xce/0xf0 [ 263.091078][ T8013] ? security_bpf+0x82/0xa0 [ 263.095586][ T8013] __sys_bpf+0x52c/0x730 [ 263.099834][ T8013] ? bpf_link_show_fdinfo+0x310/0x310 [ 263.105300][ T8013] ? debug_smp_processor_id+0x17/0x20 [ 263.110681][ T8013] __x64_sys_bpf+0x7c/0x90 [ 263.115132][ T8013] x64_sys_call+0x4b9/0x9a0 [ 263.119643][ T8013] do_syscall_64+0x4c/0xa0 [ 263.124066][ T8013] ? clear_bhb_loop+0x50/0xa0 [ 263.128751][ T8013] ? clear_bhb_loop+0x50/0xa0 [ 263.133440][ T8013] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 263.139514][ T8013] RIP: 0033:0x7f6542b2dbe9 [ 263.143938][ T8013] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 263.163936][ T8013] RSP: 002b:00007f6541596038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 263.172633][ T8013] RAX: ffffffffffffffda RBX: 00007f6542d54fa0 RCX: 00007f6542b2dbe9 [ 263.180626][ T8013] RDX: 000000000000002c RSI: 0000200000000080 RDI: 000000000000000a [ 263.188639][ T8013] RBP: 00007f6541596090 R08: 0000000000000000 R09: 0000000000000000 [ 263.196626][ T8013] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 263.204713][ T8013] R13: 00007f6542d55038 R14: 00007f6542d54fa0 R15: 00007fff2c368e28 [ 263.212869][ T8013] [ 264.378263][ T8061] device syzkaller0 entered promiscuous mode [ 265.246823][ T30] audit: type=1400 audit(1755737268.507:141): avc: denied { create } for pid=8101 comm="syz.0.2739" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 265.378838][ T8104] device veth0_vlan left promiscuous mode [ 265.390716][ T8104] device veth0_vlan entered promiscuous mode [ 265.933170][ T8109] device syzkaller0 entered promiscuous mode [ 267.909604][ T8180] device syzkaller0 entered promiscuous mode [ 269.018862][ T8223] device syzkaller0 entered promiscuous mode [ 270.850218][ T8274] device syzkaller0 entered promiscuous mode [ 271.880597][ T8316] FAULT_INJECTION: forcing a failure. [ 271.880597][ T8316] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 271.915973][ T8316] CPU: 1 PID: 8316 Comm: syz.3.2809 Not tainted 5.15.189-syzkaller-android13-5.15.189_r00 #0 [ 271.926189][ T8316] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 271.936267][ T8316] Call Trace: [ 271.939564][ T8316] [ 271.942507][ T8316] __dump_stack+0x21/0x30 [ 271.946957][ T8316] dump_stack_lvl+0xee/0x150 [ 271.951772][ T8316] ? show_regs_print_info+0x20/0x20 [ 271.956998][ T8316] dump_stack+0x15/0x20 [ 271.961174][ T8316] should_fail+0x3c1/0x510 [ 271.965657][ T8316] should_fail_alloc_page+0x55/0x80 [ 271.970890][ T8316] prepare_alloc_pages+0x156/0x600 [ 271.976055][ T8316] ? __alloc_pages_bulk+0xab0/0xab0 [ 271.981259][ T8316] ? debug_smp_processor_id+0x17/0x20 [ 271.986733][ T8316] __alloc_pages+0x10a/0x440 [ 271.991319][ T8316] ? prep_new_page+0x110/0x110 [ 271.996078][ T8316] ? __kasan_check_write+0x14/0x20 [ 272.001276][ T8316] __get_free_pages+0x10/0x30 [ 272.006042][ T8316] kasan_populate_vmalloc_pte+0x29/0x120 [ 272.011677][ T8316] __apply_to_page_range+0x8b0/0xbf0 [ 272.016960][ T8316] ? kasan_populate_vmalloc+0x70/0x70 [ 272.022337][ T8316] ? kasan_populate_vmalloc+0x70/0x70 [ 272.027716][ T8316] apply_to_page_range+0x3b/0x50 [ 272.032751][ T8316] kasan_populate_vmalloc+0x60/0x70 [ 272.038032][ T8316] alloc_vmap_area+0x185c/0x1990 [ 272.043232][ T8316] ? vm_map_ram+0xa60/0xa60 [ 272.047730][ T8316] ? kmem_cache_alloc_trace+0x119/0x270 [ 272.053359][ T8316] __get_vm_area_node+0x14e/0x350 [ 272.058381][ T8316] __vmalloc_node_range+0xdf/0xaf0 [ 272.063531][ T8316] ? dev_map_create_hash+0x26/0x1c0 [ 272.068972][ T8316] bpf_map_area_alloc+0xd5/0xe0 [ 272.074040][ T8316] ? dev_map_create_hash+0x26/0x1c0 [ 272.079330][ T8316] dev_map_create_hash+0x26/0x1c0 [ 272.084360][ T8316] dev_map_alloc+0x2d4/0x560 [ 272.089128][ T8316] map_create+0x455/0x21b0 [ 272.093544][ T8316] __sys_bpf+0x2cf/0x730 [ 272.097796][ T8316] ? bpf_link_show_fdinfo+0x310/0x310 [ 272.103255][ T8316] ? debug_smp_processor_id+0x17/0x20 [ 272.108728][ T8316] __x64_sys_bpf+0x7c/0x90 [ 272.113232][ T8316] x64_sys_call+0x4b9/0x9a0 [ 272.117763][ T8316] do_syscall_64+0x4c/0xa0 [ 272.122299][ T8316] ? clear_bhb_loop+0x50/0xa0 [ 272.127323][ T8316] ? clear_bhb_loop+0x50/0xa0 [ 272.131997][ T8316] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 272.138069][ T8316] RIP: 0033:0x7f06742cbbe9 [ 272.142481][ T8316] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 272.162353][ T8316] RSP: 002b:00007f0672d34038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 272.170947][ T8316] RAX: ffffffffffffffda RBX: 00007f06744f2fa0 RCX: 00007f06742cbbe9 [ 272.178926][ T8316] RDX: 0000000000000048 RSI: 0000200000000580 RDI: 0000000000000000 [ 272.186891][ T8316] RBP: 00007f0672d34090 R08: 0000000000000000 R09: 0000000000000000 [ 272.194856][ T8316] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 272.202824][ T8316] R13: 00007f06744f3038 R14: 00007f06744f2fa0 R15: 00007ffe92704428 [ 272.210794][ T8316] [ 273.685142][ T8377] ip6_vti0: mtu greater than device maximum [ 273.813272][ T8384] FAULT_INJECTION: forcing a failure. [ 273.813272][ T8384] name failslab, interval 1, probability 0, space 0, times 0 [ 273.826089][ T8384] CPU: 1 PID: 8384 Comm: syz.2.2835 Not tainted 5.15.189-syzkaller-android13-5.15.189_r00 #0 [ 273.836265][ T8384] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 273.846681][ T8384] Call Trace: [ 273.849958][ T8384] [ 273.852886][ T8384] __dump_stack+0x21/0x30 [ 273.857214][ T8384] dump_stack_lvl+0xee/0x150 [ 273.861803][ T8384] ? show_regs_print_info+0x20/0x20 [ 273.867000][ T8384] dump_stack+0x15/0x20 [ 273.871154][ T8384] should_fail+0x3c1/0x510 [ 273.875563][ T8384] ? skb_ensure_writable+0x2e7/0x460 [ 273.880846][ T8384] __should_failslab+0xa4/0xe0 [ 273.885605][ T8384] should_failslab+0x9/0x20 [ 273.890104][ T8384] slab_pre_alloc_hook+0x3b/0xe0 [ 273.895129][ T8384] ? skb_ensure_writable+0x2e7/0x460 [ 273.900435][ T8384] ? skb_ensure_writable+0x2e7/0x460 [ 273.905715][ T8384] __kmalloc_track_caller+0x6c/0x2c0 [ 273.911092][ T8384] ? skb_ensure_writable+0x2e7/0x460 [ 273.916371][ T8384] ? skb_ensure_writable+0x2e7/0x460 [ 273.921649][ T8384] pskb_expand_head+0x11b/0x11d0 [ 273.926585][ T8384] ? __copy_skb_header+0x437/0x600 [ 273.931696][ T8384] ? __kasan_check_write+0x14/0x20 [ 273.936805][ T8384] ? __skb_clone+0x47a/0x790 [ 273.941477][ T8384] skb_ensure_writable+0x2e7/0x460 [ 273.946581][ T8384] bpf_clone_redirect+0x10b/0x380 [ 273.951606][ T8384] bpf_prog_6893982b85ceadf7+0x56/0x454 [ 273.957145][ T8384] ? __kasan_slab_alloc+0xcf/0xf0 [ 273.962166][ T8384] ? __kasan_slab_alloc+0xbd/0xf0 [ 273.967182][ T8384] ? slab_post_alloc_hook+0x4f/0x2b0 [ 273.972462][ T8384] ? kmem_cache_alloc+0xf7/0x260 [ 273.977394][ T8384] ? __build_skb+0x2d/0x310 [ 273.981895][ T8384] ? build_skb+0x24/0x200 [ 273.986232][ T8384] ? bpf_prog_test_run_skb+0x279/0x1150 [ 273.991861][ T8384] ? bpf_prog_test_run+0x3d5/0x620 [ 273.997141][ T8384] ? __sys_bpf+0x52c/0x730 [ 274.001550][ T8384] ? __x64_sys_bpf+0x7c/0x90 [ 274.006133][ T8384] ? x64_sys_call+0x4b9/0x9a0 [ 274.010808][ T8384] ? do_syscall_64+0x4c/0xa0 [ 274.015392][ T8384] ? entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 274.021461][ T8384] ? __kasan_check_read+0x11/0x20 [ 274.026480][ T8384] ? bpf_test_timer_continue+0x146/0x4a0 [ 274.032105][ T8384] bpf_test_run+0x33d/0x8d0 [ 274.036606][ T8384] ? convert___skb_to_skb+0x4f0/0x4f0 [ 274.041995][ T8384] ? eth_get_headlen+0x1f0/0x1f0 [ 274.046929][ T8384] ? convert___skb_to_skb+0x41/0x4f0 [ 274.052212][ T8384] bpf_prog_test_run_skb+0x9ec/0x1150 [ 274.057586][ T8384] ? __bpf_prog_test_run_raw_tp+0x2b0/0x2b0 [ 274.063472][ T8384] bpf_prog_test_run+0x3d5/0x620 [ 274.068402][ T8384] ? bpf_prog_query+0x230/0x230 [ 274.073248][ T8384] ? selinux_bpf+0xce/0xf0 [ 274.077661][ T8384] ? security_bpf+0x82/0xa0 [ 274.082159][ T8384] __sys_bpf+0x52c/0x730 [ 274.086416][ T8384] ? bpf_link_show_fdinfo+0x310/0x310 [ 274.091791][ T8384] ? debug_smp_processor_id+0x17/0x20 [ 274.097166][ T8384] __x64_sys_bpf+0x7c/0x90 [ 274.101582][ T8384] x64_sys_call+0x4b9/0x9a0 [ 274.106084][ T8384] do_syscall_64+0x4c/0xa0 [ 274.110493][ T8384] ? clear_bhb_loop+0x50/0xa0 [ 274.115251][ T8384] ? clear_bhb_loop+0x50/0xa0 [ 274.119921][ T8384] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 274.125812][ T8384] RIP: 0033:0x7f4c4f0a7be9 [ 274.130323][ T8384] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 274.149939][ T8384] RSP: 002b:00007f4c4db10038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 274.158449][ T8384] RAX: ffffffffffffffda RBX: 00007f4c4f2cefa0 RCX: 00007f4c4f0a7be9 [ 274.166852][ T8384] RDX: 000000000000002c RSI: 0000200000000080 RDI: 000000000000000a [ 274.174821][ T8384] RBP: 00007f4c4db10090 R08: 0000000000000000 R09: 0000000000000000 [ 274.182797][ T8384] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 274.190907][ T8384] R13: 00007f4c4f2cf038 R14: 00007f4c4f2cefa0 R15: 00007ffe6e0f9d98 [ 274.198938][ T8384] [ 274.521218][ T8403] FAULT_INJECTION: forcing a failure. [ 274.521218][ T8403] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 274.630452][ T8403] CPU: 1 PID: 8403 Comm: syz.2.2842 Not tainted 5.15.189-syzkaller-android13-5.15.189_r00 #0 [ 274.640837][ T8403] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 274.651086][ T8403] Call Trace: [ 274.654380][ T8403] [ 274.657323][ T8403] __dump_stack+0x21/0x30 [ 274.661672][ T8403] dump_stack_lvl+0xee/0x150 [ 274.666280][ T8403] ? show_regs_print_info+0x20/0x20 [ 274.671493][ T8403] dump_stack+0x15/0x20 [ 274.675702][ T8403] should_fail+0x3c1/0x510 [ 274.680213][ T8403] should_fail_usercopy+0x1a/0x20 [ 274.685339][ T8403] _copy_from_user+0x20/0xd0 [ 274.689942][ T8403] bpf_test_init+0x13d/0x1c0 [ 274.694554][ T8403] bpf_prog_test_run_skb+0x193/0x1150 [ 274.699940][ T8403] ? __kasan_check_write+0x14/0x20 [ 274.705063][ T8403] ? fput_many+0x15a/0x1a0 [ 274.709490][ T8403] ? __bpf_prog_test_run_raw_tp+0x2b0/0x2b0 [ 274.715483][ T8403] bpf_prog_test_run+0x3d5/0x620 [ 274.720437][ T8403] ? bpf_prog_query+0x230/0x230 [ 274.725295][ T8403] ? selinux_bpf+0xce/0xf0 [ 274.729896][ T8403] ? security_bpf+0x82/0xa0 [ 274.734407][ T8403] __sys_bpf+0x52c/0x730 [ 274.738771][ T8403] ? bpf_link_show_fdinfo+0x310/0x310 [ 274.744244][ T8403] ? debug_smp_processor_id+0x17/0x20 [ 274.749663][ T8403] __x64_sys_bpf+0x7c/0x90 [ 274.754094][ T8403] x64_sys_call+0x4b9/0x9a0 [ 274.758709][ T8403] do_syscall_64+0x4c/0xa0 [ 274.763227][ T8403] ? clear_bhb_loop+0x50/0xa0 [ 274.767932][ T8403] ? clear_bhb_loop+0x50/0xa0 [ 274.772628][ T8403] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 274.778538][ T8403] RIP: 0033:0x7f4c4f0a7be9 [ 274.782965][ T8403] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 274.802769][ T8403] RSP: 002b:00007f4c4db10038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 274.811212][ T8403] RAX: ffffffffffffffda RBX: 00007f4c4f2cefa0 RCX: 00007f4c4f0a7be9 [ 274.819292][ T8403] RDX: 000000000000002c RSI: 0000200000000080 RDI: 000000000000000a [ 274.827282][ T8403] RBP: 00007f4c4db10090 R08: 0000000000000000 R09: 0000000000000000 [ 274.835369][ T8403] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 274.843357][ T8403] R13: 00007f4c4f2cf038 R14: 00007f4c4f2cefa0 R15: 00007ffe6e0f9d98 [ 274.851435][ T8403] [ 276.097015][ T8449] device veth0_vlan left promiscuous mode [ 276.109513][ T8449] device veth0_vlan entered promiscuous mode [ 276.133950][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 276.142877][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 276.157494][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 277.169221][ T8499] bond_slave_1: mtu less than device minimum [ 279.843780][ T8612] bridge0: port 1(bridge_slave_0) entered blocking state [ 279.851110][ T8612] bridge0: port 1(bridge_slave_0) entered disabled state [ 279.858604][ T8612] device bridge_slave_0 entered promiscuous mode [ 279.881852][ T8612] bridge0: port 2(bridge_slave_1) entered blocking state [ 279.889231][ T8612] bridge0: port 2(bridge_slave_1) entered disabled state [ 279.896921][ T8612] device bridge_slave_1 entered promiscuous mode [ 279.958086][ T8630] Scheduler tracepoints stat_sleep, stat_iowait, stat_blocked and stat_runtime require the kernel parameter schedstats=enable or kernel.sched_schedstats=1 [ 280.214010][ T30] audit: type=1400 audit(1755737283.467:142): avc: denied { create } for pid=8612 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 280.253000][ T30] audit: type=1400 audit(1755737283.507:143): avc: denied { write } for pid=8612 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 280.274358][ T30] audit: type=1400 audit(1755737283.507:144): avc: denied { read } for pid=8612 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 280.422243][ T228] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 280.429694][ T228] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 280.586007][ T228] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 280.595679][ T228] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 280.603928][ T228] bridge0: port 1(bridge_slave_0) entered blocking state [ 280.610955][ T228] bridge0: port 1(bridge_slave_0) entered forwarding state [ 280.618494][ T228] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 280.626748][ T228] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 280.635367][ T228] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 280.643463][ T228] bridge0: port 2(bridge_slave_1) entered blocking state [ 280.650503][ T228] bridge0: port 2(bridge_slave_1) entered forwarding state [ 280.720022][ T228] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 280.756067][ T455] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 280.833328][ T455] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 280.917053][ T455] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 280.925701][ T455] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 280.933213][ T455] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 280.941183][ T8612] device veth0_vlan entered promiscuous mode [ 281.034828][ T455] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 281.045337][ T8612] device veth1_macvtap entered promiscuous mode [ 281.130206][ T455] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 281.143470][ T455] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 281.161045][ T455] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 281.170061][ T455] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 281.266445][ T8] device bridge_slave_1 left promiscuous mode [ 281.273645][ T8] bridge0: port 2(bridge_slave_1) entered disabled state [ 281.331116][ T8] device bridge_slave_0 left promiscuous mode [ 281.376326][ T8] bridge0: port 1(bridge_slave_0) entered disabled state [ 281.411746][ T8] device veth1_macvtap left promiscuous mode [ 281.433167][ T8692] FAULT_INJECTION: forcing a failure. [ 281.433167][ T8692] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 281.488194][ T8692] CPU: 1 PID: 8692 Comm: syz.1.2947 Not tainted 5.15.189-syzkaller-android13-5.15.189_r00 #0 [ 281.498402][ T8692] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 281.508480][ T8692] Call Trace: [ 281.511782][ T8692] [ 281.514811][ T8692] __dump_stack+0x21/0x30 [ 281.519266][ T8692] dump_stack_lvl+0xee/0x150 [ 281.523881][ T8692] ? show_regs_print_info+0x20/0x20 [ 281.529092][ T8692] ? vfs_write+0xc17/0xf70 [ 281.533694][ T8692] dump_stack+0x15/0x20 [ 281.537855][ T8692] should_fail+0x3c1/0x510 [ 281.542285][ T8692] should_fail_usercopy+0x1a/0x20 [ 281.547316][ T8692] _copy_from_user+0x20/0xd0 [ 281.551917][ T8692] __sys_bpf+0x233/0x730 [ 281.556208][ T8692] ? bpf_link_show_fdinfo+0x310/0x310 [ 281.561676][ T8692] ? debug_smp_processor_id+0x17/0x20 [ 281.567060][ T8692] __x64_sys_bpf+0x7c/0x90 [ 281.571485][ T8692] x64_sys_call+0x4b9/0x9a0 [ 281.575997][ T8692] do_syscall_64+0x4c/0xa0 [ 281.580421][ T8692] ? clear_bhb_loop+0x50/0xa0 [ 281.585107][ T8692] ? clear_bhb_loop+0x50/0xa0 [ 281.589798][ T8692] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 281.595709][ T8692] RIP: 0033:0x7f85d9c17be9 [ 281.600145][ T8692] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 281.619768][ T8692] RSP: 002b:00007f85d8680038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 281.628200][ T8692] RAX: ffffffffffffffda RBX: 00007f85d9e3efa0 RCX: 00007f85d9c17be9 [ 281.636189][ T8692] RDX: 0000000000000048 RSI: 0000200000000600 RDI: 0000000000000000 [ 281.644174][ T8692] RBP: 00007f85d8680090 R08: 0000000000000000 R09: 0000000000000000 [ 281.652156][ T8692] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 281.660226][ T8692] R13: 00007f85d9e3f038 R14: 00007f85d9e3efa0 R15: 00007ffe19abf3d8 [ 281.668215][ T8692] [ 281.861736][ T8695] device sit0 left promiscuous mode [ 281.891729][ T8698] device sit0 entered promiscuous mode [ 282.872751][ T8733] bridge0: port 1(bridge_slave_0) entered blocking state [ 282.879943][ T8733] bridge0: port 1(bridge_slave_0) entered disabled state [ 282.888479][ T8733] device bridge_slave_0 entered promiscuous mode [ 282.895891][ T8733] bridge0: port 2(bridge_slave_1) entered blocking state [ 282.903061][ T8733] bridge0: port 2(bridge_slave_1) entered disabled state [ 282.932703][ T8733] device bridge_slave_1 entered promiscuous mode [ 283.134159][ T8750] device sit0 left promiscuous mode [ 283.162065][ T8733] bridge0: port 2(bridge_slave_1) entered blocking state [ 283.169178][ T8733] bridge0: port 2(bridge_slave_1) entered forwarding state [ 283.176696][ T8733] bridge0: port 1(bridge_slave_0) entered blocking state [ 283.183826][ T8733] bridge0: port 1(bridge_slave_0) entered forwarding state [ 283.192973][ T401] bridge0: port 1(bridge_slave_0) entered disabled state [ 283.201701][ T401] bridge0: port 2(bridge_slave_1) entered disabled state [ 283.210421][ T8750] device sit0 entered promiscuous mode [ 283.607720][ T401] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 283.620800][ T401] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 283.666940][ T401] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 283.691494][ T401] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 283.733002][ T401] bridge0: port 1(bridge_slave_0) entered blocking state [ 283.740346][ T401] bridge0: port 1(bridge_slave_0) entered forwarding state [ 283.813502][ T401] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 283.846226][ T401] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 283.854780][ T401] bridge0: port 2(bridge_slave_1) entered blocking state [ 283.861861][ T401] bridge0: port 2(bridge_slave_1) entered forwarding state [ 283.926693][ T401] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 283.947224][ T401] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 283.958899][ T401] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 283.967246][ T401] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 284.072290][ T401] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 284.082269][ T401] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 284.140848][ T8788] FAULT_INJECTION: forcing a failure. [ 284.140848][ T8788] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 284.162374][ T8788] CPU: 1 PID: 8788 Comm: syz.1.2984 Not tainted 5.15.189-syzkaller-android13-5.15.189_r00 #0 [ 284.172679][ T8788] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 284.182867][ T8788] Call Trace: [ 284.186158][ T8788] [ 284.189101][ T8788] __dump_stack+0x21/0x30 [ 284.193454][ T8788] dump_stack_lvl+0xee/0x150 [ 284.198066][ T8788] ? show_regs_print_info+0x20/0x20 [ 284.203307][ T8788] ? preempt_schedule+0xa7/0xb0 [ 284.208220][ T8788] ? schedule_preempt_disabled+0x20/0x20 [ 284.213862][ T8788] dump_stack+0x15/0x20 [ 284.218051][ T8788] should_fail+0x3c1/0x510 [ 284.222462][ T8788] should_fail_alloc_page+0x55/0x80 [ 284.227652][ T8788] prepare_alloc_pages+0x156/0x600 [ 284.232754][ T8788] ? __alloc_pages_bulk+0xab0/0xab0 [ 284.237938][ T8788] ? pcpu_chunk_refresh_hint+0x7e5/0x930 [ 284.243569][ T8788] __alloc_pages+0x10a/0x440 [ 284.248233][ T8788] ? prep_new_page+0x110/0x110 [ 284.253227][ T8788] pcpu_populate_chunk+0x184/0xcb0 [ 284.258331][ T8788] ? _find_next_bit+0x1b5/0x200 [ 284.263164][ T8788] pcpu_alloc+0xc4d/0x1660 [ 284.267596][ T8788] __alloc_percpu_gfp+0x25/0x30 [ 284.272477][ T8788] bpf_map_alloc_percpu+0xc5/0x150 [ 284.277716][ T8788] htab_map_alloc+0xc1b/0x14f0 [ 284.282501][ T8788] map_create+0x455/0x21b0 [ 284.287043][ T8788] __sys_bpf+0x2cf/0x730 [ 284.291267][ T8788] ? bpf_link_show_fdinfo+0x310/0x310 [ 284.296714][ T8788] ? debug_smp_processor_id+0x17/0x20 [ 284.302073][ T8788] __x64_sys_bpf+0x7c/0x90 [ 284.306492][ T8788] x64_sys_call+0x4b9/0x9a0 [ 284.311068][ T8788] do_syscall_64+0x4c/0xa0 [ 284.315463][ T8788] ? clear_bhb_loop+0x50/0xa0 [ 284.320118][ T8788] ? clear_bhb_loop+0x50/0xa0 [ 284.324782][ T8788] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 284.330671][ T8788] RIP: 0033:0x7f85d9c17be9 [ 284.335081][ T8788] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 284.354687][ T8788] RSP: 002b:00007f85d8680038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 284.363134][ T8788] RAX: ffffffffffffffda RBX: 00007f85d9e3efa0 RCX: 00007f85d9c17be9 [ 284.371212][ T8788] RDX: 0000000000000050 RSI: 0000200000000380 RDI: 0000000000000000 [ 284.379181][ T8788] RBP: 00007f85d8680090 R08: 0000000000000000 R09: 0000000000000000 [ 284.387143][ T8788] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 284.395260][ T8788] R13: 00007f85d9e3f038 R14: 00007f85d9e3efa0 R15: 00007ffe19abf3d8 [ 284.403317][ T8788] [ 284.417736][ T8733] device veth0_vlan entered promiscuous mode [ 284.432347][ T401] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 284.458140][ T401] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 284.502141][ T401] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 284.509752][ T401] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 284.561009][ T401] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 284.569764][ T401] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 284.737060][ T8733] device veth1_macvtap entered promiscuous mode [ 284.761755][ T401] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 284.779481][ T401] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 284.788544][ T401] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 284.805099][ T401] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 284.813499][ T401] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 285.530542][ T8832] syz.0.2988 uses obsolete (PF_INET,SOCK_PACKET) [ 285.643282][ T8834] bridge0: port 1(bridge_slave_0) entered blocking state [ 285.654445][ T8834] bridge0: port 1(bridge_slave_0) entered disabled state [ 285.662295][ T8834] device bridge_slave_0 entered promiscuous mode [ 285.670097][ T8] device bridge_slave_1 left promiscuous mode [ 285.677105][ T8] bridge0: port 2(bridge_slave_1) entered disabled state [ 285.686201][ T8] device bridge_slave_0 left promiscuous mode [ 285.692518][ T8] bridge0: port 1(bridge_slave_0) entered disabled state [ 285.701116][ T8] device veth1_macvtap left promiscuous mode [ 285.707343][ T8] device veth0_vlan left promiscuous mode [ 285.926450][ T8834] bridge0: port 2(bridge_slave_1) entered blocking state [ 285.933538][ T8834] bridge0: port 2(bridge_slave_1) entered disabled state [ 285.940979][ T8834] device bridge_slave_1 entered promiscuous mode [ 286.175927][ T8834] bridge0: port 2(bridge_slave_1) entered blocking state [ 286.183039][ T8834] bridge0: port 2(bridge_slave_1) entered forwarding state [ 286.190410][ T8834] bridge0: port 1(bridge_slave_0) entered blocking state [ 286.197485][ T8834] bridge0: port 1(bridge_slave_0) entered forwarding state [ 286.347351][ T455] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 286.356034][ T455] bridge0: port 1(bridge_slave_0) entered disabled state [ 286.363359][ T455] bridge0: port 2(bridge_slave_1) entered disabled state [ 286.405555][ T455] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 286.413809][ T455] bridge0: port 1(bridge_slave_0) entered blocking state [ 286.420981][ T455] bridge0: port 1(bridge_slave_0) entered forwarding state [ 286.429689][ T455] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 286.446857][ T455] bridge0: port 2(bridge_slave_1) entered blocking state [ 286.453940][ T455] bridge0: port 2(bridge_slave_1) entered forwarding state [ 286.461661][ T455] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 286.470134][ T455] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 286.518118][ T455] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 286.526848][ T455] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 286.541240][ T401] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 286.549721][ T401] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 286.564036][ T401] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 286.571848][ T401] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 286.593501][ T8834] device veth0_vlan entered promiscuous mode [ 286.627064][ T401] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 286.636176][ T401] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 286.646435][ T8834] device veth1_macvtap entered promiscuous mode [ 286.657740][ T401] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 286.666165][ T401] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 286.692636][ T401] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 286.726121][ T8896] FAULT_INJECTION: forcing a failure. [ 286.726121][ T8896] name failslab, interval 1, probability 0, space 0, times 0 [ 286.738865][ T8896] CPU: 1 PID: 8896 Comm: syz.0.3007 Not tainted 5.15.189-syzkaller-android13-5.15.189_r00 #0 [ 286.749039][ T8896] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 286.759103][ T8896] Call Trace: [ 286.762465][ T8896] [ 286.765393][ T8896] __dump_stack+0x21/0x30 [ 286.769824][ T8896] dump_stack_lvl+0xee/0x150 [ 286.774419][ T8896] ? show_regs_print_info+0x20/0x20 [ 286.779715][ T8896] dump_stack+0x15/0x20 [ 286.783871][ T8896] should_fail+0x3c1/0x510 [ 286.788282][ T8896] ? skb_ensure_writable+0x2e7/0x460 [ 286.793565][ T8896] __should_failslab+0xa4/0xe0 [ 286.798328][ T8896] should_failslab+0x9/0x20 [ 286.802831][ T8896] slab_pre_alloc_hook+0x3b/0xe0 [ 286.807766][ T8896] ? skb_ensure_writable+0x2e7/0x460 [ 286.813049][ T8896] ? skb_ensure_writable+0x2e7/0x460 [ 286.818324][ T8896] __kmalloc_track_caller+0x6c/0x2c0 [ 286.823607][ T8896] ? skb_ensure_writable+0x2e7/0x460 [ 286.828885][ T8896] ? skb_ensure_writable+0x2e7/0x460 [ 286.834174][ T8896] pskb_expand_head+0x11b/0x11d0 [ 286.839108][ T8896] ? __copy_skb_header+0x437/0x600 [ 286.844218][ T8896] ? __kasan_check_write+0x14/0x20 [ 286.849326][ T8896] ? __skb_clone+0x47a/0x790 [ 286.853937][ T8896] skb_ensure_writable+0x2e7/0x460 [ 286.859051][ T8896] bpf_clone_redirect+0x10b/0x380 [ 286.864169][ T8896] bpf_prog_b36a1f39e2fdd4f4+0x56/0x340 [ 286.869713][ T8896] ? __kasan_slab_alloc+0xcf/0xf0 [ 286.874734][ T8896] ? __kasan_slab_alloc+0xbd/0xf0 [ 286.879864][ T8896] ? slab_post_alloc_hook+0x4f/0x2b0 [ 286.885145][ T8896] ? kmem_cache_alloc+0xf7/0x260 [ 286.890081][ T8896] ? __build_skb+0x2d/0x310 [ 286.895016][ T8896] ? build_skb+0x24/0x200 [ 286.899348][ T8896] ? bpf_prog_test_run_skb+0x279/0x1150 [ 286.905060][ T8896] ? bpf_prog_test_run+0x3d5/0x620 [ 286.910253][ T8896] ? __sys_bpf+0x52c/0x730 [ 286.914663][ T8896] ? __x64_sys_bpf+0x7c/0x90 [ 286.919247][ T8896] ? x64_sys_call+0x4b9/0x9a0 [ 286.923941][ T8896] ? do_syscall_64+0x4c/0xa0 [ 286.928531][ T8896] ? entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 286.934607][ T8896] ? __kasan_check_read+0x11/0x20 [ 286.939758][ T8896] ? bpf_test_timer_continue+0x146/0x4a0 [ 286.945394][ T8896] bpf_test_run+0x33d/0x8d0 [ 286.949894][ T8896] ? convert___skb_to_skb+0x4f0/0x4f0 [ 286.955272][ T8896] ? eth_get_headlen+0x1f0/0x1f0 [ 286.960205][ T8896] ? convert___skb_to_skb+0x41/0x4f0 [ 286.965484][ T8896] bpf_prog_test_run_skb+0x9ec/0x1150 [ 286.970859][ T8896] ? __bpf_prog_test_run_raw_tp+0x2b0/0x2b0 [ 286.976758][ T8896] bpf_prog_test_run+0x3d5/0x620 [ 286.981708][ T8896] ? bpf_prog_query+0x230/0x230 [ 286.986555][ T8896] ? selinux_bpf+0xce/0xf0 [ 286.990966][ T8896] ? security_bpf+0x82/0xa0 [ 286.995466][ T8896] __sys_bpf+0x52c/0x730 [ 286.999703][ T8896] ? bpf_link_show_fdinfo+0x310/0x310 [ 287.005090][ T8896] ? debug_smp_processor_id+0x17/0x20 [ 287.010460][ T8896] __x64_sys_bpf+0x7c/0x90 [ 287.014878][ T8896] x64_sys_call+0x4b9/0x9a0 [ 287.019376][ T8896] do_syscall_64+0x4c/0xa0 [ 287.023784][ T8896] ? clear_bhb_loop+0x50/0xa0 [ 287.028462][ T8896] ? clear_bhb_loop+0x50/0xa0 [ 287.033140][ T8896] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 287.039033][ T8896] RIP: 0033:0x7f130bcf9be9 [ 287.043445][ T8896] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 287.063048][ T8896] RSP: 002b:00007f130a762038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 287.071638][ T8896] RAX: ffffffffffffffda RBX: 00007f130bf20fa0 RCX: 00007f130bcf9be9 [ 287.079609][ T8896] RDX: 0000000000000048 RSI: 0000200000000040 RDI: 000000000000000a [ 287.087618][ T8896] RBP: 00007f130a762090 R08: 0000000000000000 R09: 0000000000000000 [ 287.095587][ T8896] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 287.103567][ T8896] R13: 00007f130bf21038 R14: 00007f130bf20fa0 R15: 00007fff5f7b5e48 [ 287.111635][ T8896] [ 287.120432][ T401] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 287.135886][ T401] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 287.503411][ T8920] FAULT_INJECTION: forcing a failure. [ 287.503411][ T8920] name failslab, interval 1, probability 0, space 0, times 0 [ 287.527877][ T8920] CPU: 1 PID: 8920 Comm: syz.2.3016 Not tainted 5.15.189-syzkaller-android13-5.15.189_r00 #0 [ 287.538280][ T8920] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 287.548350][ T8920] Call Trace: [ 287.551641][ T8920] [ 287.554578][ T8920] __dump_stack+0x21/0x30 [ 287.558917][ T8920] dump_stack_lvl+0xee/0x150 [ 287.563504][ T8920] ? show_regs_print_info+0x20/0x20 [ 287.568786][ T8920] dump_stack+0x15/0x20 [ 287.572938][ T8920] should_fail+0x3c1/0x510 [ 287.577350][ T8920] __should_failslab+0xa4/0xe0 [ 287.582110][ T8920] should_failslab+0x9/0x20 [ 287.586642][ T8920] slab_pre_alloc_hook+0x3b/0xe0 [ 287.591582][ T8920] ? anon_vma_fork+0x200/0x510 [ 287.596347][ T8920] kmem_cache_alloc+0x44/0x260 [ 287.601109][ T8920] anon_vma_fork+0x200/0x510 [ 287.605722][ T8920] copy_mm+0x9d1/0x1390 [ 287.610118][ T8920] ? copy_signal+0x600/0x600 [ 287.614724][ T8920] ? __init_rwsem+0xfc/0x1d0 [ 287.619314][ T8920] ? copy_signal+0x4cb/0x600 [ 287.623901][ T8920] copy_process+0x115c/0x3210 [ 287.628754][ T8920] ? __kasan_check_write+0x14/0x20 [ 287.633863][ T8920] ? __pidfd_prepare+0x150/0x150 [ 287.638799][ T8920] ? security_file_permission+0x83/0xa0 [ 287.644344][ T8920] kernel_clone+0x23f/0x940 [ 287.648845][ T8920] ? create_io_thread+0x130/0x130 [ 287.653867][ T8920] ? __kasan_check_write+0x14/0x20 [ 287.658977][ T8920] ? mutex_unlock+0x89/0x220 [ 287.663647][ T8920] __x64_sys_clone+0x176/0x1d0 [ 287.668501][ T8920] ? __kasan_check_write+0x14/0x20 [ 287.673697][ T8920] ? __ia32_sys_vfork+0xf0/0xf0 [ 287.678577][ T8920] ? fpregs_assert_state_consistent+0xb1/0xe0 [ 287.684651][ T8920] x64_sys_call+0x41f/0x9a0 [ 287.689156][ T8920] do_syscall_64+0x4c/0xa0 [ 287.693576][ T8920] ? clear_bhb_loop+0x50/0xa0 [ 287.698251][ T8920] ? clear_bhb_loop+0x50/0xa0 [ 287.702927][ T8920] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 287.708819][ T8920] RIP: 0033:0x7fdc9ff68be9 [ 287.713233][ T8920] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 287.732935][ T8920] RSP: 002b:00007fdc9e9d0fe8 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 287.741444][ T8920] RAX: ffffffffffffffda RBX: 00007fdca018ffa0 RCX: 00007fdc9ff68be9 [ 287.749429][ T8920] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000400 [ 287.757403][ T8920] RBP: 00007fdc9e9d1090 R08: 0000000000000000 R09: 0000000000000000 [ 287.765384][ T8920] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000002 [ 287.773386][ T8920] R13: 00007fdca0190038 R14: 00007fdca018ffa0 R15: 00007ffd8ae43318 [ 287.781361][ T8920] [ 287.838370][ T8930] FAULT_INJECTION: forcing a failure. [ 287.838370][ T8930] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 287.852019][ T8930] CPU: 0 PID: 8930 Comm: syz.1.3020 Not tainted 5.15.189-syzkaller-android13-5.15.189_r00 #0 [ 287.862294][ T8930] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 287.872442][ T8930] Call Trace: [ 287.875717][ T8930] [ 287.878652][ T8930] __dump_stack+0x21/0x30 [ 287.882989][ T8930] dump_stack_lvl+0xee/0x150 [ 287.887759][ T8930] ? show_regs_print_info+0x20/0x20 [ 287.893040][ T8930] ? get_page_from_freelist+0x2cc5/0x2d50 [ 287.898844][ T8930] dump_stack+0x15/0x20 [ 287.902992][ T8930] should_fail+0x3c1/0x510 [ 287.907408][ T8930] should_fail_alloc_page+0x55/0x80 [ 287.912797][ T8930] prepare_alloc_pages+0x156/0x600 [ 287.917905][ T8930] ? __alloc_pages_bulk+0xab0/0xab0 [ 287.923097][ T8930] ? pcpu_chunk_refresh_hint+0x7e5/0x930 [ 287.928726][ T8930] __alloc_pages+0x10a/0x440 [ 287.933309][ T8930] ? prep_new_page+0x110/0x110 [ 287.938069][ T8930] ? __pcpu_chunk_move+0x275/0x310 [ 287.943178][ T8930] pcpu_populate_chunk+0x184/0xcb0 [ 287.948297][ T8930] ? _find_next_bit+0x1b5/0x200 [ 287.953149][ T8930] pcpu_alloc+0xc4d/0x1660 [ 287.957566][ T8930] __alloc_percpu_gfp+0x25/0x30 [ 287.962423][ T8930] bpf_map_alloc_percpu+0xc5/0x150 [ 287.967530][ T8930] htab_map_alloc+0xc1b/0x14f0 [ 287.972386][ T8930] map_create+0x455/0x21b0 [ 287.976807][ T8930] __sys_bpf+0x2cf/0x730 [ 287.981134][ T8930] ? bpf_link_show_fdinfo+0x310/0x310 [ 287.986500][ T8930] ? debug_smp_processor_id+0x17/0x20 [ 287.991880][ T8930] __x64_sys_bpf+0x7c/0x90 [ 287.996302][ T8930] x64_sys_call+0x4b9/0x9a0 [ 288.000800][ T8930] do_syscall_64+0x4c/0xa0 [ 288.005213][ T8930] ? clear_bhb_loop+0x50/0xa0 [ 288.009899][ T8930] ? clear_bhb_loop+0x50/0xa0 [ 288.014569][ T8930] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 288.020462][ T8930] RIP: 0033:0x7f85d9c17be9 [ 288.024886][ T8930] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 288.044489][ T8930] RSP: 002b:00007f85d8680038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 288.052914][ T8930] RAX: ffffffffffffffda RBX: 00007f85d9e3efa0 RCX: 00007f85d9c17be9 [ 288.061010][ T8930] RDX: 0000000000000050 RSI: 0000200000000180 RDI: 0000000000000000 [ 288.068976][ T8930] RBP: 00007f85d8680090 R08: 0000000000000000 R09: 0000000000000000 [ 288.076947][ T8930] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 288.084937][ T8930] R13: 00007f85d9e3f038 R14: 00007f85d9e3efa0 R15: 00007ffe19abf3d8 [ 288.092909][ T8930] [ 288.148816][ T8] device erspan0 left promiscuous mode [ 288.154417][ T8] GPL: port 1(erspan0) entered disabled state [ 288.288000][ T8933] bridge0: port 1(bridge_slave_0) entered blocking state [ 288.295257][ T8933] bridge0: port 1(bridge_slave_0) entered disabled state [ 288.303051][ T8933] device bridge_slave_0 entered promiscuous mode [ 288.317700][ T8933] bridge0: port 2(bridge_slave_1) entered blocking state [ 288.324909][ T8933] bridge0: port 2(bridge_slave_1) entered disabled state [ 288.332613][ T8933] device bridge_slave_1 entered promiscuous mode [ 288.440781][ T8] device bridge_slave_1 left promiscuous mode [ 288.449003][ T8] bridge0: port 2(bridge_slave_1) entered disabled state [ 288.479967][ T8] device bridge_slave_0 left promiscuous mode [ 288.500456][ T8] bridge0: port 1(bridge_slave_0) entered disabled state [ 288.508895][ T8] device veth1_macvtap left promiscuous mode [ 288.515117][ T8] device veth0_vlan left promiscuous mode [ 288.760666][ T455] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 288.769208][ T455] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 288.786390][ T455] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 288.796660][ T455] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 288.805411][ T455] bridge0: port 1(bridge_slave_0) entered blocking state [ 288.812484][ T455] bridge0: port 1(bridge_slave_0) entered forwarding state [ 288.820964][ T455] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 288.829658][ T455] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 288.837852][ T455] bridge0: port 2(bridge_slave_1) entered blocking state [ 288.844982][ T455] bridge0: port 2(bridge_slave_1) entered forwarding state [ 288.852347][ T455] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 288.860607][ T455] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 288.880005][ T455] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 288.889422][ T455] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 288.911579][ T8933] device veth0_vlan entered promiscuous mode [ 288.918547][ T455] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 288.927855][ T455] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 288.936719][ T455] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 288.951400][ T8933] device veth1_macvtap entered promiscuous mode [ 288.965355][ T455] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 288.989231][ T455] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 289.010130][ T455] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 289.148680][ T30] audit: type=1400 audit(1755737292.407:145): avc: denied { create } for pid=8982 comm="syz.4.3033" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 289.457339][ T9007] device sit0 entered promiscuous mode [ 289.644031][ T9015] device sit0 left promiscuous mode [ 289.776712][ T9017] FAULT_INJECTION: forcing a failure. [ 289.776712][ T9017] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 289.855105][ T9017] CPU: 1 PID: 9017 Comm: syz.0.3043 Not tainted 5.15.189-syzkaller-android13-5.15.189_r00 #0 [ 289.865311][ T9017] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 289.875459][ T9017] Call Trace: [ 289.878746][ T9017] [ 289.881682][ T9017] __dump_stack+0x21/0x30 [ 289.886114][ T9017] dump_stack_lvl+0xee/0x150 [ 289.890699][ T9017] ? show_regs_print_info+0x20/0x20 [ 289.895988][ T9017] dump_stack+0x15/0x20 [ 289.900140][ T9017] should_fail+0x3c1/0x510 [ 289.904554][ T9017] should_fail_usercopy+0x1a/0x20 [ 289.909572][ T9017] _copy_from_user+0x20/0xd0 [ 289.914160][ T9017] __sys_bpf+0x233/0x730 [ 289.918398][ T9017] ? bpf_link_show_fdinfo+0x310/0x310 [ 289.923775][ T9017] ? debug_smp_processor_id+0x17/0x20 [ 289.929248][ T9017] __x64_sys_bpf+0x7c/0x90 [ 289.933671][ T9017] x64_sys_call+0x4b9/0x9a0 [ 289.938258][ T9017] do_syscall_64+0x4c/0xa0 [ 289.942670][ T9017] ? clear_bhb_loop+0x50/0xa0 [ 289.947519][ T9017] ? clear_bhb_loop+0x50/0xa0 [ 289.952375][ T9017] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 289.958269][ T9017] RIP: 0033:0x7f130bcf9be9 [ 289.962687][ T9017] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 289.982385][ T9017] RSP: 002b:00007f130a762038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 289.990805][ T9017] RAX: ffffffffffffffda RBX: 00007f130bf20fa0 RCX: 00007f130bcf9be9 [ 289.998773][ T9017] RDX: 0000000000000078 RSI: 0000200000000440 RDI: 0000000000000005 [ 290.006835][ T9017] RBP: 00007f130a762090 R08: 0000000000000000 R09: 0000000000000000 [ 290.014817][ T9017] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 290.022959][ T9017] R13: 00007f130bf21038 R14: 00007f130bf20fa0 R15: 00007fff5f7b5e48 [ 290.031021][ T9017] [ 290.114868][ T8] device bridge_slave_1 left promiscuous mode [ 290.129279][ T8] bridge0: port 2(bridge_slave_1) entered disabled state [ 290.136968][ T8] device bridge_slave_0 left promiscuous mode [ 290.205187][ T8] bridge0: port 1(bridge_slave_0) entered disabled state [ 290.268058][ T8] device veth0_vlan left promiscuous mode [ 290.524303][ T30] audit: type=1400 audit(1755737293.777:146): avc: denied { read } for pid=9032 comm="syz.1.3048" dev="nsfs" ino=4026532286 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 290.599451][ T30] audit: type=1400 audit(1755737293.807:147): avc: denied { open } for pid=9032 comm="syz.1.3048" path="pid:[4026532286]" dev="nsfs" ino=4026532286 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 290.652887][ T9022] device veth0_vlan left promiscuous mode [ 290.659409][ T9022] device veth0_vlan entered promiscuous mode [ 291.842360][ T30] audit: type=1400 audit(1755737295.097:148): avc: denied { create } for pid=9083 comm="syz.2.3068" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=caif_socket permissive=1 [ 292.401819][ T9105] device sit0 entered promiscuous mode [ 292.734190][ T9115] device veth0_vlan left promiscuous mode [ 292.764332][ T9115] device veth0_vlan entered promiscuous mode [ 293.645249][ T9155] FAULT_INJECTION: forcing a failure. [ 293.645249][ T9155] name failslab, interval 1, probability 0, space 0, times 0 [ 293.691209][ T9155] CPU: 1 PID: 9155 Comm: syz.3.3090 Not tainted 5.15.189-syzkaller-android13-5.15.189_r00 #0 [ 293.701597][ T9155] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 293.711763][ T9155] Call Trace: [ 293.715054][ T9155] [ 293.717997][ T9155] __dump_stack+0x21/0x30 [ 293.722345][ T9155] dump_stack_lvl+0xee/0x150 [ 293.726945][ T9155] ? show_regs_print_info+0x20/0x20 [ 293.732153][ T9155] dump_stack+0x15/0x20 [ 293.736319][ T9155] should_fail+0x3c1/0x510 [ 293.740754][ T9155] __should_failslab+0xa4/0xe0 [ 293.745532][ T9155] should_failslab+0x9/0x20 [ 293.750045][ T9155] slab_pre_alloc_hook+0x3b/0xe0 [ 293.755006][ T9155] kmem_cache_alloc_trace+0x48/0x270 [ 293.760411][ T9155] ? kernfs_fop_open+0x86b/0xb30 [ 293.765460][ T9155] ? seq_open+0x9b/0x130 [ 293.769725][ T9155] kernfs_fop_open+0x86b/0xb30 [ 293.774498][ T9155] ? kernfs_fop_mmap+0x400/0x400 [ 293.779459][ T9155] do_dentry_open+0x834/0x1010 [ 293.784253][ T9155] vfs_open+0x73/0x80 [ 293.788255][ T9155] path_openat+0x2646/0x2f10 [ 293.792856][ T9155] ? hrtimer_forward+0x18f/0x2a0 [ 293.797800][ T9155] ? slab_post_alloc_hook+0x4f/0x2b0 [ 293.803139][ T9155] ? kmem_cache_alloc+0xf7/0x260 [ 293.808079][ T9155] ? do_syscall_64+0x4c/0xa0 [ 293.812764][ T9155] ? entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 293.818916][ T9155] ? do_filp_open+0x3e0/0x3e0 [ 293.823603][ T9155] do_filp_open+0x1b3/0x3e0 [ 293.828105][ T9155] ? vfs_tmpfile+0x2d0/0x2d0 [ 293.832696][ T9155] do_sys_openat2+0x14c/0x7b0 [ 293.837378][ T9155] ? __kasan_check_write+0x14/0x20 [ 293.842494][ T9155] ? do_sys_open+0xe0/0xe0 [ 293.847009][ T9155] ? fput+0x1a/0x20 [ 293.850814][ T9155] ? ksys_write+0x1eb/0x240 [ 293.855312][ T9155] ? __ia32_sys_read+0x90/0x90 [ 293.860226][ T9155] ? sched_clock_cpu+0x18/0x3c0 [ 293.865072][ T9155] __x64_sys_openat+0x136/0x160 [ 293.869923][ T9155] x64_sys_call+0x219/0x9a0 [ 293.874424][ T9155] do_syscall_64+0x4c/0xa0 [ 293.878938][ T9155] ? clear_bhb_loop+0x50/0xa0 [ 293.883620][ T9155] ? clear_bhb_loop+0x50/0xa0 [ 293.888293][ T9155] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 293.894180][ T9155] RIP: 0033:0x7f8413aebbe9 [ 293.898590][ T9155] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 293.918192][ T9155] RSP: 002b:00007f8412554038 EFLAGS: 00000246 ORIG_RAX: 0000000000000101 [ 293.926612][ T9155] RAX: ffffffffffffffda RBX: 00007f8413d12fa0 RCX: 00007f8413aebbe9 [ 293.934583][ T9155] RDX: 0000000000000002 RSI: 0000200000000840 RDI: 0000000000000007 [ 293.942554][ T9155] RBP: 00007f8412554090 R08: 0000000000000000 R09: 0000000000000000 [ 293.950525][ T9155] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 293.958492][ T9155] R13: 00007f8413d13038 R14: 00007f8413d12fa0 R15: 00007ffcf1e15058 [ 293.966462][ T9155] [ 294.047999][ T283] general protection fault, probably for non-canonical address 0xdffffc0000000000: 0000 [#1] PREEMPT SMP KASAN [ 294.059771][ T283] KASAN: null-ptr-deref in range [0x0000000000000000-0x0000000000000007] [ 294.068181][ T283] CPU: 0 PID: 283 Comm: syz-executor Not tainted 5.15.189-syzkaller-android13-5.15.189_r00 #0 [ 294.078414][ T283] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 294.088464][ T283] RIP: 0010:__rb_erase_color+0x1e6/0xaf0 [ 294.094102][ T283] Code: 00 fc ff df 48 89 4d c0 80 3c 01 00 74 08 48 89 df e8 de e2 3a ff 4c 8b 2b 4d 89 ef 49 c1 ef 03 48 b8 00 00 00 00 00 fc ff df <41> 80 3c 07 00 74 08 4c 89 ef e8 bb e2 3a ff 41 f6 45 00 01 48 89 [ 294.113793][ T283] RSP: 0018:ffffc90000a476c0 EFLAGS: 00010246 [ 294.119966][ T283] RAX: dffffc0000000000 RBX: ffff888127bc4e48 RCX: 1ffff11024f789c9 [ 294.127949][ T283] RDX: ffffffff819af460 RSI: 1ffff1102233c6fc RDI: ffff888127bc4e38 [ 294.136012][ T283] RBP: ffffc90000a47720 R08: dffffc0000000000 R09: ffffed102233c700 [ 294.144000][ T283] R10: ffffed102233c700 R11: 1ffff1102233c6ff R12: 1ffff11024f789ca [ 294.152263][ T283] R13: 0000000000000000 R14: ffff888127bc4e38 R15: 0000000000000000 [ 294.160260][ T283] FS: 0000000000000000(0000) GS:ffff8881f7000000(0000) knlGS:0000000000000000 [ 294.169277][ T283] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 294.175855][ T283] CR2: 00007fdca0160358 CR3: 0000000121fa1000 CR4: 00000000003506b0 [ 294.183825][ T283] DR0: 0000000000000000 DR1: 0000200000000300 DR2: 0000000000000000 [ 294.191791][ T283] DR3: 0000000000000000 DR6: 00000000ffff0ff1 DR7: 0000000000000600 [ 294.199761][ T283] Call Trace: [ 294.203032][ T283] [ 294.205960][ T283] ? anon_vma_interval_tree_iter_next+0x380/0x380 [ 294.212382][ T283] vma_interval_tree_remove+0xadf/0xb00 [ 294.218162][ T283] unlink_file_vma+0xd7/0xf0 [ 294.222779][ T283] free_pgtables+0x139/0x280 [ 294.227373][ T283] exit_mmap+0x407/0x860 [ 294.231623][ T283] ? vm_brk+0x30/0x30 [ 294.235610][ T283] ? mutex_unlock+0x89/0x220 [ 294.240198][ T283] ? uprobe_clear_state+0x2c1/0x320 [ 294.245400][ T283] __mmput+0x93/0x320 [ 294.249382][ T283] ? mmput+0x48/0x150 [ 294.253356][ T283] mmput+0x50/0x150 [ 294.257160][ T283] do_exit+0x9d2/0x27a0 [ 294.261487][ T283] ? put_task_struct+0x90/0x90 [ 294.266252][ T283] ? kasan_set_track+0x5b/0x70 [ 294.271013][ T283] ? kasan_set_track+0x4a/0x70 [ 294.275853][ T283] ? kasan_set_free_info+0x23/0x40 [ 294.280958][ T283] ? ____kasan_slab_free+0x125/0x160 [ 294.286258][ T283] ? __kasan_slab_free+0x11/0x20 [ 294.291193][ T283] ? slab_free_freelist_hook+0xc2/0x190 [ 294.296734][ T283] ? kmem_cache_free+0x100/0x320 [ 294.301668][ T283] ? do_unlinkat+0x62f/0x6b0 [ 294.306255][ T283] ? __x64_sys_unlink+0x49/0x50 [ 294.311191][ T283] ? x64_sys_call+0x878/0x9a0 [ 294.315869][ T283] ? __kasan_check_write+0x14/0x20 [ 294.320982][ T283] ? _raw_spin_lock_irq+0x8f/0xe0 [ 294.326005][ T283] do_group_exit+0x141/0x310 [ 294.330605][ T283] ? __kasan_check_write+0x14/0x20 [ 294.335736][ T283] get_signal+0x66a/0x1480 [ 294.340165][ T283] arch_do_signal_or_restart+0xc1/0x10f0 [ 294.345817][ T283] ? kasan_quarantine_put+0x34/0x190 [ 294.351099][ T283] ? kmem_cache_free+0x100/0x320 [ 294.356033][ T283] ? ____kasan_slab_free+0x130/0x160 [ 294.361418][ T283] ? __kasan_slab_free+0x11/0x20 [ 294.366697][ T283] ? slab_free_freelist_hook+0xc2/0x190 [ 294.372249][ T283] ? do_unlinkat+0x62f/0x6b0 [ 294.376832][ T283] ? get_sigframe_size+0x10/0x10 [ 294.381770][ T283] ? fsnotify_link_count+0x100/0x100 [ 294.387146][ T283] exit_to_user_mode_loop+0xa7/0xe0 [ 294.392459][ T283] exit_to_user_mode_prepare+0x5a/0xa0 [ 294.397936][ T283] syscall_exit_to_user_mode+0x1a/0x30 [ 294.403422][ T283] do_syscall_64+0x58/0xa0 [ 294.407846][ T283] ? clear_bhb_loop+0x50/0xa0 [ 294.412525][ T283] ? clear_bhb_loop+0x50/0xa0 [ 294.417207][ T283] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 294.423096][ T283] RIP: 0033:0x7f85d9c17197 [ 294.427507][ T283] Code: Unable to access opcode bytes at RIP 0x7f85d9c1716d. [ 294.434864][ T283] RSP: 002b:00007ffe19abe668 EFLAGS: 00000206 ORIG_RAX: 0000000000000057 [ 294.443384][ T283] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007f85d9c17197 [ 294.451436][ T283] RDX: 00007ffe19abe690 RSI: 00007ffe19abe720 RDI: 00007ffe19abe720 [ 294.459403][ T283] RBP: 00007ffe19abe720 R08: 0000000000000000 R09: 0000000000000000 [ 294.467463][ T283] R10: 0000000000000100 R11: 0000000000000206 R12: 00007ffe19abf7b0 [ 294.475429][ T283] R13: 00007f85d9c9ac05 R14: 0000000000047af3 R15: 00007ffe19abf7f0 [ 294.483399][ T283] [ 294.486410][ T283] Modules linked in: [ 294.491373][ T9125] syz.2.3079 (9125) used greatest stack depth: 21360 bytes left SYZFAIL: failed to recv rpc fd=3 want=4 recv=0 n=0 (errno 9: Bad file descriptor) [ 294.500876][ T30] audit: type=1400 audit(1755737297.757:149): avc: denied { read } for pid=83 comm="syslogd" name="log" dev="sda1" ino=2010 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 294.554532][ T30] audit: type=1400 audit(1755737297.757:150): avc: denied { search } for pid=83 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 294.576492][ T30] audit: type=1400 audit(1755737297.757:151): avc: denied { write } for pid=83 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 294.598162][ T30] audit: type=1400 audit(1755737297.757:152): avc: denied { add_name } for pid=83 comm="syslogd" name="messages" scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 294.619273][ T30] audit: type=1400 audit(1755737297.757:154): avc: denied { create } for pid=83 comm="syslogd" name="messages" scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 294.639781][ T30] audit: type=1400 audit(1755737297.757:153): avc: denied { write } for pid=274 comm="syz-executor" path="pipe:[14933]" dev="pipefs" ino=14933 scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:sshd_t tclass=fifo_file permissive=1 [ 294.663014][ T30] audit: type=1400 audit(1755737297.757:155): avc: denied { append open } for pid=83 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=5 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 294.686481][ T30] audit: type=1400 audit(1755737297.757:156): avc: denied { getattr } for pid=83 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=5 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 294.704673][ T283] ---[ end trace aa6b49bb1c5d5de7 ]--- [ 294.716762][ T283] RIP: 0010:__rb_erase_color+0x1e6/0xaf0 [ 294.722407][ T283] Code: 00 fc ff df 48 89 4d c0 80 3c 01 00 74 08 48 89 df e8 de e2 3a ff 4c 8b 2b 4d 89 ef 49 c1 ef 03 48 b8 00 00 00 00 00 fc ff df <41> 80 3c 07 00 74 08 4c 89 ef e8 bb e2 3a ff 41 f6 45 00 01 48 89 [ 294.742198][ T283] RSP: 0018:ffffc90000a476c0 EFLAGS: 00010246 [ 294.748466][ T283] RAX: dffffc0000000000 RBX: ffff888127bc4e48 RCX: 1ffff11024f789c9 [ 294.756583][ T283] RDX: ffffffff819af460 RSI: 1ffff1102233c6fc RDI: ffff888127bc4e38 [ 294.764752][ T283] RBP: ffffc90000a47720 R08: dffffc0000000000 R09: ffffed102233c700 [ 294.772929][ T283] R10: ffffed102233c700 R11: 1ffff1102233c6ff R12: 1ffff11024f789ca [ 294.780970][ T283] R13: 0000000000000000 R14: ffff888127bc4e38 R15: 0000000000000000 [ 294.789132][ T283] FS: 0000000000000000(0000) GS:ffff8881f7000000(0000) knlGS:0000000000000000 [ 294.798239][ T283] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 294.805350][ T283] CR2: 0000563e857f0b98 CR3: 000000012369b000 CR4: 00000000003506b0 [ 294.813452][ T283] DR0: 0000000000000000 DR1: 0000200000000300 DR2: 0000000000000000 [ 294.821650][ T283] DR3: 0000000000000000 DR6: 00000000ffff0ff1 DR7: 0000000000000600 [ 294.829632][ T283] Kernel panic - not syncing: Fatal exception [ 294.835924][ T283] Kernel Offset: disabled [ 294.840241][ T283] Rebooting in 86400 seconds..