last executing test programs: 2.907526683s ago: executing program 2 (id=4955): r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='blkio.bfq.io_service_time\x00', 0x26e1, 0x0) close(r0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b7030000e8ffff7f850000000400000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={&(0x7f0000000000)='mm_lru_insertion\x00', r0}, 0x10) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16, 0x0, 0x4, 0xff, 0x0, 0x1}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085"], 0x0}, 0x90) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000100)='mm_lru_insertion\x00', r2}, 0x10) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='rdma.current\x00', 0x275a, 0x0) write$cgroup_int(r3, &(0x7f0000000100), 0x1001) ioctl$SIOCSIFHWADDR(r3, 0x4030582b, &(0x7f0000000280)={'lo\x00', @link_local={0x1, 0x80, 0xc2, 0xc}}) 2.861160667s ago: executing program 2 (id=4960): bpf$BPF_PROG_DETACH(0x9, &(0x7f0000006280)={@ifindex, 0xffffffffffffffff, 0x7, 0x0, 0x0, @link_id}, 0x20) 2.815535881s ago: executing program 2 (id=4965): perf_event_open(&(0x7f0000000480)={0x1, 0xa4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 2.814994271s ago: executing program 2 (id=4969): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x15, 0x10, 0x2}, 0x48) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x8, 0xf, &(0x7f0000000180)=@ringbuf={{}, {{0x18, 0x1, 0x1, 0x0, r0}, {}, {0x7, 0x0, 0xb, 0x2}, {0x85, 0x0, 0x0, 0x51}}, {}, [], {{}, {}, {0x85, 0x0, 0x0, 0x5}}}, &(0x7f0000000000)='GPL\x00'}, 0x90) bpf$BPF_PROG_TEST_RUN(0x1c, &(0x7f0000000500)={r1, 0x0, 0x2, 0x0, &(0x7f0000000600)="a8ed", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) 2.782275614s ago: executing program 2 (id=4972): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x17, 0x0, 0x4, 0xff, 0x0, 0x1}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0}, 0x90) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000840)=@base={0xb, 0x5, 0x2, 0x4, 0x5}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x0, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x2}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000080)={r0, &(0x7f0000000280)="d0ff140f4189ae3dd7665564a5febde4bd2b592a47c253ae923270f6f5324f5d70a04de3a27bf81713067d527bf814816248ab114785d3b48b12fa2631c29158ee682350025f1aca89532d53c32a80169a7825c818f33cac44d21f5945f905daffb00d178b2b19cb428ab41ebdb27f8ce3707c0b138f9e9a49bf5b0dba2e0a7c9aa283d3c613cbd7e1547045c98f987d7cbf9a82973eb475d7e8f9dd3d2043871a3652d82c5280584ee2716f3f78b451a26e866f9122655c802312215cbd95eb9bba4f16bba5b43e4a4d4048112230b468a5aea21fc3cab8e231113b54d4270b4d4a750968979a4437b61b387ddcab2d5ec6d3"}, 0x20) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xffffffffffffff80}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x42042, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x100, 0x0) perf_event_open$cgroup(&(0x7f00000000c0)={0x0, 0x80, 0x9, 0xa5, 0x20, 0x4, 0x0, 0x8, 0x84000, 0x4, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x5, 0x0, @perf_bp={&(0x7f0000000040), 0x2}, 0x801, 0x4, 0x1, 0x4, 0x0, 0x81, 0x1f, 0x0, 0x0, 0x0, 0x40}, 0xffffffffffffffff, 0xa, 0xffffffffffffffff, 0x3) perf_event_open(&(0x7f00000003c0)={0x0, 0x80, 0x96, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x80, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x1}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000240)) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000080)) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000000)={0x0, 0x0, 0x0, &(0x7f0000010040)}, 0x38) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='blkio.bfq.sectors\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x100003}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r2) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) ioctl$SIOCSIFHWADDR(r2, 0x8b34, &(0x7f0000000000)={'wlan1\x00', @random='\\\x00\x00 \x00'}) bpf$ENABLE_STATS(0x20, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000480)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x80000000}, 0x0, 0xfffffffffffffffb, 0xffffffffffffffff, 0x0) 1.903644445s ago: executing program 4 (id=4991): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x9, 0x3, 0x2, 0x85}, 0x48) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000300)={0xffffffffffffffff, 0x0, &(0x7f00000000c0)="460230832d2ae7c6ec68703536203066c677ba7c618c7c58b5c1e5a03854a809b3307b6619261d02f45ce5956d982cd75d135bf0bc4e275e947bc4cfe43f5a5334e859565ac53a5770da0efb7b015dab7069374fadd718362f6870b19ef215f793cada12", &(0x7f0000000240), 0x802, r0}, 0x38) bpf$MAP_UPDATE_BATCH(0x1b, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0), 0x0, 0x24, r0}, 0x38) 1.867435798s ago: executing program 4 (id=4994): perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x7f, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000001180)='cpuset.sched_relax_domain_level\x00', 0x2, 0x0) write$cgroup_int(r1, &(0x7f0000000a40), 0x12) 1.744263008s ago: executing program 4 (id=4999): r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x10, 0x16, &(0x7f0000000340)=ANY=[@ANYBLOB="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"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x90) perf_event_open(&(0x7f0000000480)={0x2, 0x80, 0xd7, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0xe085, 0x0, 0xfffffffc, 0x0, 0xd}, 0x0, 0xfffffffffffffffd, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40086602, &(0x7f0000000180)) perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000140)={0x10, 0x4, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x7c, '\x00', 0x0, 0xd, r0}, 0x90) bpf$PROG_LOAD(0x5, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r4 = openat$cgroup_ro(r3, &(0x7f0000000300)='blkio.bfq.io_serviced\x00', 0x275a, 0x0) write$cgroup_int(r4, &(0x7f0000000200)=0x403, 0xfffffffffffffe68) r5 = gettid() write$cgroup_pid(r1, &(0x7f0000000740)=r5, 0x12) setsockopt$sock_attach_bpf(r2, 0x1, 0x32, &(0x7f00000002c0)=r2, 0x4) perf_event_open(0x0, r5, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000500)=ANY=[@ANYBLOB="1800000000000000000000000000000018010000786c6c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000002d00000095"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r7 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r6}, 0x10) socketpair(0x18, 0x0, 0x0, &(0x7f0000000700)) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYRES16=r7, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb70300000800"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) 1.743262438s ago: executing program 4 (id=5001): bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x11, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000000000000000000120000002400000008000000850000000500000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) r1 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f00000001c0)='rss_stat\x00', r0}, 0x10) r2 = bpf$ITER_CREATE(0xb, &(0x7f0000000100)={r1}, 0x8) write$cgroup_int(r2, &(0x7f00000001c0), 0xfffffdef) setsockopt$sock_attach_bpf(r2, 0x1, 0x32, &(0x7f0000000000), 0x4) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x5, 0x4, 0x749c, 0x5}, 0x48) r3 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000440)={r3, 0x58, &(0x7f0000000680)}, 0x10) write$cgroup_int(r2, &(0x7f0000000300)=0xfffffffffffffffc, 0x12) 1.612306939s ago: executing program 1 (id=5008): openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8943, 0x0) close(0xffffffffffffffff) perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0xa3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x26, 0x0, 0xfffffffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0xe, 0x0, &(0x7f0000000b80)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8}, 0x90) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f0000000400)="f6", 0x1}], 0x1}, 0x841) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) recvmsg(r1, &(0x7f0000000500)={0x0, 0x0, 0x0}, 0x2061) 1.324453922s ago: executing program 1 (id=5011): r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x10, 0x16, &(0x7f0000000340)=ANY=[@ANYBLOB="61122800000000006113140000000000bf1000000000000025000200091b00003d030000000000008701000000000000bc26000000000000bf67000000000000150300000ee600f0670200001400000015030000ffffffffbf050000000000000f650000000000006507f4ff02000400070700006b3128fe1f75000000000000bf540000000000000705000003001500ae430100000000009500000000000000050000000000000095000000000000004d9bd591d568253e9988431ec068e3a82983d58719d72183f2cb7f43dd55788be820b236dcb695dbfd737cbf719506d2d6b05fe70305863f970eac3590ac99b798f8125f1c322c2a154a8a8d"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x90) perf_event_open(&(0x7f0000000480)={0x2, 0x80, 0xd7, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0xe085, 0x0, 0xfffffffc, 0x0, 0xd}, 0x0, 0xfffffffffffffffd, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40086602, &(0x7f0000000180)) perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000140)={0x10, 0x4, &(0x7f00000005c0)=ANY=[@ANYBLOB="180000000000000000000000000095000007000000000000000000000000000012d44bbb61a270cec0b7a8aaa686c541e5b0b316e70c5b42ada466022739251e6fdc0fcc92a9fd8729e311755cad2ea7ef6c5144080aee9ac4d668ba299fc8e1bbe4c1b3fd056eb73a54de463689f1ebb7a8494b8b0e8af4d915dcad56139cdc2d96662e2d9a0c3ff6e5ac76e407914283cd54eaccca74847d0ed42b18aa0fe342054da8cf01efc942fb4f5e96dd513a54868915cc85cb2065795d4f8e0cf75ab9605b61ae2b643111cd3f6849292c799d9bf20a9475b2ee17594724cd276d694548390a74541a39845d9a9b37cb2da34e0a27f94d53511625a3a3efad11071748b60d1cc2620b767be7daaa5cbcc18d53427452d838db6d76d8e402d9b424bca920c897000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x7c, '\x00', 0x0, 0xd, r0}, 0x90) bpf$PROG_LOAD(0x5, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r4 = openat$cgroup_ro(r3, &(0x7f0000000300)='blkio.bfq.io_serviced\x00', 0x275a, 0x0) write$cgroup_int(r4, &(0x7f0000000200)=0x403, 0xfffffffffffffe68) r5 = gettid() write$cgroup_pid(r1, &(0x7f0000000740)=r5, 0x12) setsockopt$sock_attach_bpf(r2, 0x1, 0x32, &(0x7f00000002c0)=r2, 0x4) perf_event_open(0x0, r5, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000500)=ANY=[@ANYBLOB="1800000000000000000000000000000018010000786c6c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000002d00000095"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r7 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r6}, 0x10) socketpair(0x18, 0x0, 0x0, &(0x7f0000000700)) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYRES16=r7, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb70300000800"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) 1.10085786s ago: executing program 1 (id=5014): perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xc6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x11, 0x5, &(0x7f00000002c0)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x8020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000140)=ANY=[], 0x32600) mkdirat$cgroup(0xffffffffffffffff, &(0x7f00000001c0)='syz0\x00', 0x1ff) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x19, 0x4, 0x8, 0x8}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000107b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000925e850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, 0x0, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_BIND_MAP(0xa, &(0x7f0000000500)={r1}, 0xc) ioctl$TUNGETVNETBE(0xffffffffffffffff, 0x800454df, &(0x7f00000003c0)) bpf$MAP_UPDATE_BATCH(0x18, 0x0, 0x0) bpf$ITER_CREATE(0x21, 0x0, 0x0) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f00000001c0)={@cgroup, 0x24, 0x1, 0xfff, &(0x7f00000000c0)=[0x0, 0x0, 0x0], 0x3, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000180)}, 0x40) 759.336838ms ago: executing program 1 (id=5016): r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000002c0)='hugetlb.2MB.usage_in_bytes\x00', 0x26e1, 0x0) close(r0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000240)) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x5452, 0x0) perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0, 0x1}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f0000000940)=ANY=[@ANYBLOB="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"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x1dd}, 0x48) write$cgroup_subtree(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="0000001e5d636c73200406557207000000f71183d08aa84bd39d5cb839bfd6851ad87865b85de6410b261b944f06b407193b26ffaf7f5136c98ec151dfeb8be780d856c5abb5441ef2452570e05b3ce545bdd5f62e7aa289fca563a1161ac7db306373f741cc39c50f553b988b87e1d2d33cf7049342e3e9b1b39ac09b44f0fb813561b2df384be8968edaa8da41ef2c4f6df160e27da6762c206e10139d10ae4cce9d"], 0x9) perf_event_open(&(0x7f00000001c0)={0x2, 0x80, 0x19, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d34, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000840)=ANY=[@ANYRESOCT, @ANYRESOCT], 0xfe28) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x4, 0x16, &(0x7f0000000280)=ANY=[@ANYBLOB], &(0x7f0000000100)='GPL\x00'}, 0x90) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x5452, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a07, 0x1700) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000000040), 0x8) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0xf, 0x4, 0x4, 0x2}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000180)={{r2, 0xffffffffffffffff}, &(0x7f0000000040), &(0x7f0000000140)=r1}, 0x20) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000400)={0x11, 0xc, &(0x7f0000000100)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r3}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, &(0x7f0000000180)='syzkaller\x00', 0xa, 0xff8, &(0x7f0000001e00)=""/4088}, 0x90) bpf$MAP_LOOKUP_BATCH(0x18, 0x0, 0x0) r4 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5, 0xfffffffffffffffd}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x5452, &(0x7f00000006c0)='\x02;\xe5\b\x00\x1c\x9c\x00\x00\x00\x00\x00\x00\x91\xecB\xdcZ\xe5\xbd$\x05\x90\xa9\xf3\xc7\xcb\xb7\xf0\xa1;#\x989\xe9\x12\xdf^6T\xdf\xcd\x02\xc5\xb0\xba\x12\'QXp\t\xfc\xf3\x01\x02\xbc\xbf\xc0\xf0\x10\xee\xd3\\yy\xa4\xf9\xe8\x00\xdd\xe97 0_\xe4]W\xf7~\xacVK\xc9t\x9e+:\x85\xef\x94\x0e\x19\x9cV[N.\xeb\x9fJ>\xd9\x99\x88\xd8\xdd\xb8Y\xc3$\xc6\x93\v\x04REY\xf4\xea\xf2\xcd\xcd.\x16\x861\xa1\v\x8d\x8e\x84R\xa6\x83\x84\xc0\x01e\xc3\xc8\xcc?\xc8?\x19\xb2\xa2\xe1\xac<\xe9f\x11\xff3\xc7\x19\x9e\x19\xf5-\xfe\xbd\xae\xbbR\x82\x16\xf9\x15S\x03U\xe0\xd8t\xe3%96') bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000600)={0x11, 0xb, &(0x7f0000000040)=@framed={{}, [@printk={@lx={0x18, 0x1, 0x3}, {}, {0x5, 0x1, 0xb, 0x1, 0x2}}]}, &(0x7f0000000280)='GPL\x00', 0x6, 0x24, &(0x7f0000000000)=""/36}, 0x90) write$cgroup_pressure(0xffffffffffffffff, 0x0, 0x0) ioctl$SIOCSIFHWADDR(r0, 0x8b26, &(0x7f0000000000)={'wlan1\x00', @link_local}) 750.748689ms ago: executing program 4 (id=5018): perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xca}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r1) recvmsg$unix(r0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x2, &(0x7f0000000200)=ANY=[@ANYBLOB="85000000c8"], 0x0}, 0x90) r3 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) write$cgroup_subtree(r2, &(0x7f0000000200)=ANY=[@ANYRES8=r1, @ANYRES8=r3], 0x12) bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0xe, 0xe, &(0x7f0000000200)=ANY=[@ANYBLOB="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"], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0xffffffffffffff97, 0x10, &(0x7f00000000c0), 0xffffffffffffffc2}, 0x48) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x98, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TUNGETFILTER(r5, 0xc0189436, &(0x7f00000020c0)=""/4109) r6 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x3, 0x3, &(0x7f0000001fd8)=ANY=[], 0x0}, 0x90) gettid() bpf$PROG_LOAD_XDP(0x5, &(0x7f00000001c0)={0x10, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0xe}, 0x90) perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x19, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_BIND_MAP(0x23, &(0x7f0000000300)={r6, r4}, 0xc) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={0x0}, 0x10) perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open$cgroup(&(0x7f0000000180)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 684.457535ms ago: executing program 0 (id=5019): bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000b80)={@ifindex, 0xffffffffffffffff, 0x0, 0x2001}, 0x20) 683.905475ms ago: executing program 0 (id=5021): bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000200)=@generic={0x0, 0xffffffffffffffff, 0x300}, 0x18) 683.593335ms ago: executing program 3 (id=5022): perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0xa2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x20, &(0x7f0000000000)='/proc/net/\x00\x00t4/c+\x0fG\xf9aK\fX\a0\x04\x00\x00\x82q\xee'}, 0x30) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) mkdirat$cgroup(r0, &(0x7f0000000200)='syz0\x00', 0x1ff) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002c80)={0x0, 0xc, 0x0, 0x0}, 0x90) bpf$MAP_CREATE(0x0, &(0x7f0000000040)=@base={0x6, 0x4, 0x40, 0x5}, 0x48) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xaffffff7ffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x5452, &(0x7f0000000780)='\x02;\xe5\b\x00\x1c\x9c\x00\x00\x00\x00\x00\x00\x91\xecB\xdcZ\xe5\xbd$\x05\x90\xa9\xf3\xc7\xcb\xb7\xf0\xa1;#\x989\xe9\x12\xdf^6\xfc\xf3\x01\x02\xbc\xbf\xc0\xf0\x10\xee\xd3\\yy\xa4\xf9\xe8\x00\xdd\xe97 0_\xe4]W\xf7~\xacVK\xc9t\x9e+:\x85\xef\x94\x0e\x19\x9cV[N.\xeb\x9fJ>\xd9\x99\x88\xd8\xdd\xb8Y\xc3$\xc6\x93\v\x04REY\xf4\xea\xf2\xcd\xcd.\x16\x861\xa1\v\x8d\x8e\x84R\xa6\x83\x84\xc0\x01e\xc3\xc8\xcc?\xc8?\x19\xb2\xa2\xe1\xac<\xe9f\x11\xff3\xc7S\x03U\xe0\xd8t\xe3%96\x00'/168) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40082404, &(0x7f0000000200)=0x7fff) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xd, 0x0, 0x0, &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x27, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) socketpair$nbd(0x1, 0x1, 0x0, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$TUNSETLINK(0xffffffffffffffff, 0x400454cd, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000600)={0x3, 0x3, &(0x7f0000000000)=@framed={{0x7a, 0xa, 0x0, 0xff00, 0x0, 0x71, 0x10, 0x36}}, &(0x7f0000000480)='syzkaller\x00'}, 0x80) perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x19, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE_CONST_STR(0x0, 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r3 = openat$cgroup_pressure(r2, &(0x7f0000000040)='memory.pressure\x00', 0x2, 0x0) write$cgroup_pressure(r3, &(0x7f0000000080)={'some', 0x20, 0x2000000005, 0x20, 0x10000000fffff}, 0x2f) close(r3) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) bpf$MAP_CREATE_RINGBUF(0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) 683.200875ms ago: executing program 0 (id=5023): perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x19, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200), 0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7fffffffffffffff, 0x7fff}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) socketpair(0x0, 0x0, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x2e, &(0x7f00000001c0)=@framed={{}, [@func, @ringbuf_output, @ringbuf_query, @jmp, @cb_func, @generic, @printk, @ringbuf_output, @printk={@s}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) ioctl$TUNSETCARRIER(0xffffffffffffffff, 0x400454e2, &(0x7f0000000000)=0x4b) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r1, 0x8946, &(0x7f0000000900)={'wlan1\x00', @random='\x00\x00\x00 \x00'}) perf_event_open(&(0x7f00000003c0)={0x0, 0x80, 0xa3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) r2 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) syz_clone(0x100000, &(0x7f0000000140)="bc69f54e1697cd9430134e68ece3545ee791", 0x12, &(0x7f0000000240), &(0x7f0000000280), &(0x7f00000002c0)="90c28e74ea1f77cb393a4136cda8f7925dee3738d2d1225c4dab217cdd15eb99fcd41162f6a06e6722e07200bcf7c8d73262fa08f637cc7d70699d29cf6fbe3dc582bd4edbeb677979de51a4584b76480d6e346d6ab0af376f8c685ed2da4430d822fcd05c946301dc82ee1349dcd1be045882b9c8") write$cgroup_pid(r2, &(0x7f00000005c0), 0x12) r3 = perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xc8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r5) recvmsg$unix(r4, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r6, &(0x7f0000001cc0)=ANY=[@ANYBLOB="8fedcb7910031175f37538e486dd630080fc00082c00db5b686158bbcfe8875a060300001123000000000000000000000000ac1414aa2b200007"], 0xfdef) bpf$OBJ_GET_MAP(0x7, &(0x7f00000006c0)=@generic={&(0x7f0000000680)='./file0\x00'}, 0x18) perf_event_open(0x0, 0x0, 0x0, r3, 0x0) r7 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x2, 0x4, 0x8, 0x8, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0xffffffff}, 0x48) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000640)={0xffffffffffffffff, 0x20, &(0x7f0000000600)={&(0x7f0000000500)=""/169, 0xa9, 0x0, &(0x7f00000005c0)}}, 0x10) r9 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000a40)={0x1b, 0x0, 0x0, 0x50d9, 0x0, r7, 0x3, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x2}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000001400)={0xa, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41000, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000400)={0xa, 0x1}, 0x8, 0x10, &(0x7f0000000440)={0x1, 0x4, 0x7, 0x2}, 0x10, r8, r9, 0x1, &(0x7f0000000ac0)=[0xffffffffffffffff, r0, r0, r0, r0, r0], &(0x7f0000000b00)=[{0x4, 0x9, 0xd, 0x9}]}, 0x90) 661.675887ms ago: executing program 3 (id=5024): r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x10, 0x16, &(0x7f0000000340)=ANY=[@ANYBLOB="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"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x90) perf_event_open(&(0x7f0000000480)={0x2, 0x80, 0xd7, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0xe085, 0x0, 0xfffffffc, 0x0, 0xd}, 0x0, 0xfffffffffffffffd, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40086602, &(0x7f0000000180)) perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000140)={0x10, 0x4, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x7c, '\x00', 0x0, 0xd, r0}, 0x90) bpf$PROG_LOAD(0x5, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r4 = openat$cgroup_ro(r3, &(0x7f0000000300)='blkio.bfq.io_serviced\x00', 0x275a, 0x0) write$cgroup_int(r4, &(0x7f0000000200)=0x403, 0xfffffffffffffe68) r5 = gettid() write$cgroup_pid(r1, &(0x7f0000000740)=r5, 0x12) setsockopt$sock_attach_bpf(r2, 0x1, 0x32, &(0x7f00000002c0)=r2, 0x4) perf_event_open(0x0, r5, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000500)=ANY=[@ANYBLOB="1800000000000000000000000000000018010000786c6c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000002d00000095"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r7 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r6}, 0x10) socketpair(0x18, 0x0, 0x0, &(0x7f0000000700)) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYRES16=r7, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb70300000800"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) 407.494047ms ago: executing program 0 (id=5025): r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000240)='blkio.throttle.io_service_bytes_recursive\x00', 0x26e1, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)) mkdir(&(0x7f0000000000)='./cgroup/../file0/file0\x00', 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) bpf$ENABLE_STATS(0x20, 0x0, 0x0) openat$cgroup_procs(r1, &(0x7f0000000380)='cgroup.procs\x00', 0x2, 0x0) r2 = bpf$ITER_CREATE(0x21, &(0x7f0000000140)={r0}, 0x8) write$cgroup_freezer_state(r2, &(0x7f00000001c0)='FROZEN\x00', 0x7) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, &(0x7f0000000180)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x90) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="8fedcb7538e475dd6317cebb03c23c00fe80000000000000875a65969ff57b00000400000000000000040000ac"], 0xfe1b) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000740)={0x0, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB, @ANYRES32, @ANYBLOB="0000000000000000950000000000000045"], 0x0}, 0x90) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000000)={0x0, 0x0, 0x0, &(0x7f0000010040)}, 0x38) perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x19, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d34, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) recvmsg$unix(0xffffffffffffffff, 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='blkio.bfq.sectors\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0xfb, 0x0, 0x2, 0x0, 0x0, 0x8cd2bb9f04693392, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x100003}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r4 = perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffdfffffffffffff, 0xffffffffffffffff, 0x0) r5 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, r4, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r5, 0x2401, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x2400, 0x0) ioctl$PERF_EVENT_IOC_RESET(r5, 0x2403, 0x0) close(r3) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) ioctl$SIOCSIFHWADDR(r3, 0x8b34, &(0x7f0000000000)={'wlan1\x00', @random='\\\x00\x00 \x00'}) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x10, 0x4, 0x0, &(0x7f0000000100)='syzkaller\x00', 0x4, 0xc5, &(0x7f0000000300)=""/197, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f00000002c0), 0x10}, 0x90) 384.954829ms ago: executing program 3 (id=5026): bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000b80)={@ifindex, 0xffffffffffffffff, 0x22, 0x2001}, 0x20) 316.445175ms ago: executing program 3 (id=5027): bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) perf_event_open(&(0x7f0000000380)={0x2, 0x80, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) r0 = openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454d9, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) close(r1) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)) ioctl$SIOCSIFHWADDR(r1, 0x8912, &(0x7f0000002280)={'syzkaller0\x00'}) 316.077385ms ago: executing program 4 (id=5028): bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x11, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000000000000000000120000002400000008000000850000000500000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) r1 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f00000001c0)='rss_stat\x00', r0}, 0x10) r2 = bpf$ITER_CREATE(0xb, &(0x7f0000000100)={r1}, 0x8) write$cgroup_int(r2, &(0x7f00000001c0), 0xfffffdef) setsockopt$sock_attach_bpf(r2, 0x1, 0x32, &(0x7f0000000000), 0x4) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x5, 0x4, 0x749c, 0x5}, 0x48) r3 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000440)={r3, 0x58, &(0x7f0000000680)}, 0x10) write$cgroup_int(r2, &(0x7f0000000300)=0xfffffffffffffffc, 0x12) 287.098697ms ago: executing program 1 (id=5029): bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x2}]}]}}, 0x0, 0x32}, 0x20) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x0, 0x4, 0xfff}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB, @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b70400000000000085000000c3000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x3b, &(0x7f0000000000)='/proc/sys/net/ipv4\x00\x00s/sync_\x00le\xf44.\xab%\xf8\xff\xff\xff\xff\xff\xff\xff=\x11\xc8\xdd\x15\xcc\xd2\xf1d\'%\x11c\x91l,'}, 0x30) r1 = bpf$ITER_CREATE(0x21, 0x0, 0x0) openat$cgroup_pressure(r1, &(0x7f00000000c0)='io.pressure\x00', 0x2, 0x0) r2 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x5452, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0xb, 0x8, 0xc, 0xffffffff, 0x1, 0x1}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000000c0), &(0x7f0000000140), 0x5, r3}, 0x38) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r3}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='percpu_alloc_percpu\x00', r4}, 0x10) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_CREATE(0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r6 = bpf$ITER_CREATE(0xb, &(0x7f0000000100), 0x8) ioctl$TUNSETOFFLOAD(r6, 0x541b, 0x0) bpf$PROG_BIND_MAP(0xa, &(0x7f0000000500)={r5}, 0xc) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000200)) 232.794562ms ago: executing program 0 (id=5030): bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0xa}, 0x48) perf_event_open(&(0x7f00000001c0)={0x2, 0x80, 0x19, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d34, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0xf, 0x4, 0x4, 0x12}, 0x48) r2 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000340)={0xe, 0x4, &(0x7f0000000180)=ANY=[@ANYBLOB="18020000801000000000000004000000850000002700000095"], &(0x7f0000000000)='syzkaller\x00'}, 0x90) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r1, r2, 0x5}, 0x10) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000680)={{r1, 0xffffffffffffffff}, &(0x7f0000000600), &(0x7f0000000640)=r0}, 0x20) bpf$BPF_PROG_QUERY(0x10, &(0x7f00000002c0)={@map=r3, 0x5, 0x0, 0x0, &(0x7f0000000100)=[0x0], 0x1, 0x0, 0x0, 0x0, 0x0}, 0x40) 178.432986ms ago: executing program 2 (id=4979): perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0xee, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000500)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYRES8, @ANYRES32, @ANYRES64=0x0], 0x0}, 0x90) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.bfq.io_queued\x00', 0x26e1, 0x0) close(r0) openat$ppp(0xffffffffffffff9c, &(0x7f0000000040), 0x1a1282, 0x0) ioctl$TUNSETOFFLOAD(r0, 0xc004743e, 0x20001400) write$cgroup_subtree(r0, 0x0, 0x20000889) 78.362194ms ago: executing program 3 (id=5031): perf_event_open(&(0x7f0000000380)={0x2, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0xb, &(0x7f0000000740)=ANY=[@ANYBLOB="18000000000000140000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000007000000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000880)=ANY=[@ANYBLOB="b702000007000000bfa30000000000000703000000feffff7a0af0ff0100000079a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b70000000000000095000000000000005ecefab8f2e85c6c1ca711fcd0cdfa146ec561750379585e5a076d839240d29c034055b67dafe6c8dc3d5d78c07fa1f7e655ce34e4d5b3185fec0e07004e60c08dc8b8dbf11e6e94d75938321a3aa502cd2424a66e6d2ef831ab7ea0c34f17e3946ef3bb622003b538dfd8e012e79578e51bc53099e90f4580d760551b5b341a29f31e3106d1ddd6152f7cbdb9cd38bdb2209c67deca8eeb9c15ab3a14817ac61e4dd11183a13477bf7e860e3670ef0e789f65f1328d6704902cbe7bc04b82d2789cb132b8667c2147661df28d9961b63e1a9cf6c2a660a1fe3c184b751c51160fb20b1c581e7be6ba0dc001c4110555850915148ba532e6ea09c346dfebd38608b3280080005d9a9500000000000000334d83239dd27080851dcac3c12233f9a1fb9c2aec61ce63a38d2fd50117b89a9ab359b4eea0c6e95767d42b4e54861d0227dbfd2e6d7f715a7f3deadd7130856f756436303767d2e24f29e5dad9796edb697aeea0182babd18cac1bd4f4390af9a9ceafd0002cab154ad029a1090000002780870014f51c3c975d5aec84222fd3a0ec4be3e563112f0b39501aafe234870072858dc06e7c337642d3e5a815232f5e16c1b30c3a6a71bc85018e5ff2c91018afc9ffc2cc788bee1b47683db01a469398685211dfbbae3e2ed0a50e7313bff5d4c391ddece00fc772dd6b4d4de2a41990f05ca3bdfc92c88c5b8dcd36e7487afa447e2edfae4f390a8337841cef386e22cc22ee17476d738952229682e24b92533ac2a9f5a699593f084419cae0b4532bcc97d3ae486aca54183fb01c73f979ca9857399537f5dc2a2d0e0000000000000578673f8b6e74ce23877a6b24db0e067345560942fa629fbef2461c96a088a22e8b15c3e233db7ab22e30d46a9d24d37cef099ece729aa218f9f44a3210223fdae7ed04935c3c90d3add8eebc8619d73415cda2130f5011e48455b5a8b90dfae158b94f50adab988dd8e12baf5cc9398fff00404d5d99f82e20ee6a8c88e18c2977aab37d9ac4cfc1c7b400000000000007ff57c39495c826b956ba859ac8e3c177b91bd7d5e41ff868f7ca1664fe2f3ced846891180604b6dd2499d16d7d9158ffffffff00000000ef069dc42749a89f854797f29d0000002d8c38a967c1bbe09315c29877a308bcc87dc3addb08141bdee5d27874b2f663ddeef0005b3d96c7aabf4df517d90bdc01e73835d5a3e1a90800c66ee2b1ad76dff9f9000071414c99d4894ee7f8249dc1e3428d2129369ee1b85af6eb2eea0d0df414b315f651c8412392191fa83ee830548f11e1036a8debd64cbe359454a3f2239cfe35f81b7a490f167e6d5c1109000000000000000042b8ff8c21ad702ccacad5b39eef213d1ca296d2a27798c8ce2a305c0c7d35cf4b22549a4bd92052188bd1f285f653b621491dc6aaee0200e2ff08644fb94c06006eff1be2f633c1d987591ec3db58a7bb3042ec3f771f7a1338a5c3dd35e926049fe86e09c58e273cd905deb28c13c1ed1c0d9cae846bcbfa8cce7b893e578af7dc7d5e87d44ff828de453f34c2b18660b080efc707e676e1fb4d5825c0ca177a4c7fbb4eda0545c00f576b2b5cc7f819abd0f885cc4806f40300966fcf1e54f5a2d38708294cd6f496e5dee734fe7da3770845cf442d488afdc0e17000000000000000000000000000000000000000000000000000005205000000dc1c56d59f35d367632952a93466ae595c6a8cda690d192a070886df42b27098773b45198b4a34ac977ebd4450e121d01342703f5bf030e935878a6d169c80aa4252d4ea6b8f6216ff202b5b5a182cb5e838b307632d03a7ca6f6d0339f9953c3093c3690d10ecb65dc5b47481edbf1f000000000000004d16d29c28eb5167e9936ed327fb237a56224e49d9ea955a5f0dec1b3ccd35364600000000000000000000000000000000000000000000000000000000000026ded4dd6fe1518cc7802043ecfe69f743f1213bf8179ecd9e5a225d67521dc728eac7d80a5656ac2cbde21d3ebfbf69ff861f4394836ddf128d6d19079e64336e7c676505c78ad67548f4b192be1827fcd95cf107753cb0a6a979d3db0c407081c6281e2d8429a863903ca75f4c7df3ea8fc2018d07af1491ef060cd4403a099f32468f65bd06b4082d43e121861b5cc03f1a1561f0589e0d12969bc982ff5d8e9b986c0c6c747d9a1cc500bb892c3a16ff10feea20bdac0000000000000000ca06f256c8028e0f9b65f037b21f3289f86a6826c69fa35ba5cbc3f2db1516ffc5c6e3fa618b24a6ce16d6c7010bb37b61fa0a2d8974e69115d33394e86e4b838297ba20f96936b7e4746e92dea6c5d1d33d84d96b50fb000000ae07c65b71088dd7d5d1e1bab9000000000000000000000000b5ace293bec833c13e3229432ad71d646218b5229dd88137fc7c59aa242af3bb4efb82055a3b61227ad40f52c9f2500579aca11033ec14bb9cc16bd83a00840e31d828ec78e116ae46c4897e2795b6ff92e9a1e24b0b855c02f2b7add58ffb25f339297729a7a51810134d3dfbf71f6516737be55c06d9cdcfb1e2bb10b50000eb4acff90756dba1ecf9f58afd3c19b5c4558ba9af6b7333c894a1fb29ade9ad75c9c022e8d03fe28bc358684492aa771dbfe80745fe89ad349ffaad76ff9dd643796caffdf67af5dd476c37e7e9a84e2e5da2696e285a59b53f2fb0e16d8262c080c159ce40c14089c82759106f422582b42e3e8484ea5a6ad9aa52106eafe0e0caea1ad4cb23f3c2b8a0f455ba69ea284c268d54b43158a8b1d128d02af263b3dc1cab794c9ac57a2a7332f4d8764c302ccd5aac114482b619fc575aa0dd2777e881e29a854380e2f1e49db5a1517ec40bb3fa44f9959bad67ccaba76408da35c9f1534c8bd48bbd61627a2e0a74b5e6aefb7eee403502734137ff47257f164391c673b6079e65d7295eed164ca63e4ea26dce0fb3ce0f6591d80dfb8f386bb74b5589829b6b0679b5d65a"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r0 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000140)=@base={0xa, 0xfff, 0xb3, 0x48}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x11, 0xa, &(0x7f0000000080)=@framed={{0x18, 0x3}, [@func={0x85, 0x0, 0x1, 0x0, 0x6}, @map_fd={0x18, 0x0, 0x1, 0x0, r0}, @generic={0x66}, @initr0, @exit]}, &(0x7f0000000000)='GPL\x00'}, 0x90) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x3b, &(0x7f0000000000)='/proc/sys/net/ipv4\x00\x00s/sync_\x00le\xf44.\xab%\xf8\xff\xff\xff\xff\xff\xff\xff=\x11\xc8\xdd\x15\xcc\xd2\xf1d\'%\x11c\x91l,'}, 0x30) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'bond_slave_0\x00'}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8946, &(0x7f0000000080)) 49.932187ms ago: executing program 1 (id=5032): r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x9, 0x4, &(0x7f00000008c0)=ANY=[], 0x0}, 0x90) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000040)={@cgroup, r0, 0xc}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x0, 0xc, &(0x7f0000000300)=ANY=[], 0x0}, 0x90) perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x19, 0x2, 0x0, 0x0, 0x0, 0x0, 0x4, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x10000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$ENABLE_STATS(0x20, 0x0, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'pim6reg1\x00', 0x2}) ioctl$TUNSETLINK(r1, 0x400454cd, 0x339) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'pim6reg1\x00', 0xe511}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f0000000080)) 368.381µs ago: executing program 0 (id=5033): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x9, 0x6, 0x8, 0x8}, 0x48) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r0}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000040), &(0x7f00000004c0), 0xce, r0}, 0x38) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000700)='signal_generate\x00', r1}, 0x10) syz_open_procfs$namespace(0x0, 0xfffffffffffffffe) 0s ago: executing program 3 (id=5034): bpf$ENABLE_STATS(0x20, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x14, &(0x7f00000002c0)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000fcffffff7b8af8ff00000000bfa200000000000007020000f8ffffffb703000008230000b7040000000000008500000001000000180100002020732500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000000060ff850000000400000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0xb, 0x8, 0x10001, 0x9, 0x1}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x14, &(0x7f00000002c0)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000500)={&(0x7f0000000040)='sys_exit\x00', r1}, 0x10) kernel console output (not intermixed with test programs): ed { noatsecure } for pid=225 comm="sshd" scontext=system_u:system_r:sshd_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 14.593719][ T30] audit: type=1400 audit(1720475774.074:63): avc: denied { write } for pid=225 comm="sh" path="pipe:[347]" dev="pipefs" ino=347 scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:sshd_t tclass=fifo_file permissive=1 [ 14.599744][ T30] audit: type=1400 audit(1720475774.074:64): avc: denied { rlimitinh } for pid=225 comm="sh" scontext=system_u:system_r:sshd_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 14.614667][ T30] audit: type=1400 audit(1720475774.074:65): avc: denied { siginh } for pid=225 comm="sh" scontext=system_u:system_r:sshd_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 Warning: Permanently added '10.128.0.190' (ED25519) to the list of known hosts. [ 21.645609][ T30] audit: type=1400 audit(1720475781.134:66): avc: denied { integrity } for pid=279 comm="syz-executor" lockdown_reason="debugfs access" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=lockdown permissive=1 [ 21.650367][ T279] cgroup: Unknown subsys name 'net' [ 21.667834][ T30] audit: type=1400 audit(1720475781.134:67): avc: denied { mounton } for pid=279 comm="syz-executor" path="/syzcgroup/unified" dev="sda1" ino=1925 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 21.695216][ T30] audit: type=1400 audit(1720475781.134:68): avc: denied { mount } for pid=279 comm="syz-executor" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 21.695379][ T279] cgroup: Unknown subsys name 'devices' [ 21.717329][ T30] audit: type=1400 audit(1720475781.164:69): avc: denied { unmount } for pid=279 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 21.893460][ T279] cgroup: Unknown subsys name 'hugetlb' [ 21.898867][ T279] cgroup: Unknown subsys name 'rlimit' [ 22.032277][ T30] audit: type=1400 audit(1720475781.524:70): avc: denied { setattr } for pid=279 comm="syz-executor" name="raw-gadget" dev="devtmpfs" ino=162 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 22.055271][ T30] audit: type=1400 audit(1720475781.524:71): avc: denied { mounton } for pid=279 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1 Setting up swapspace version 1, size = 127995904 bytes [ 22.066364][ T281] SELinux: Context root:object_r:swapfile_t is not valid (left unmapped). [ 22.080201][ T30] audit: type=1400 audit(1720475781.524:72): avc: denied { mount } for pid=279 comm="syz-executor" name="/" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=filesystem permissive=1 [ 22.111266][ T30] audit: type=1400 audit(1720475781.574:73): avc: denied { relabelto } for pid=281 comm="mkswap" name="swap-file" dev="sda1" ino=1928 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 22.119475][ T279] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 22.136685][ T30] audit: type=1400 audit(1720475781.574:74): avc: denied { write } for pid=281 comm="mkswap" path="/root/swap-file" dev="sda1" ino=1928 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 22.170528][ T30] audit: type=1400 audit(1720475781.604:75): avc: denied { read } for pid=279 comm="syz-executor" name="swap-file" dev="sda1" ino=1928 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 22.639593][ T290] bridge0: port 1(bridge_slave_0) entered blocking state [ 22.646562][ T290] bridge0: port 1(bridge_slave_0) entered disabled state [ 22.654139][ T290] device bridge_slave_0 entered promiscuous mode [ 22.668347][ T288] bridge0: port 1(bridge_slave_0) entered blocking state [ 22.675218][ T288] bridge0: port 1(bridge_slave_0) entered disabled state [ 22.682555][ T288] device bridge_slave_0 entered promiscuous mode [ 22.690026][ T288] bridge0: port 2(bridge_slave_1) entered blocking state [ 22.696951][ T288] bridge0: port 2(bridge_slave_1) entered disabled state [ 22.704224][ T288] device bridge_slave_1 entered promiscuous mode [ 22.713751][ T290] bridge0: port 2(bridge_slave_1) entered blocking state [ 22.720598][ T290] bridge0: port 2(bridge_slave_1) entered disabled state [ 22.727938][ T290] device bridge_slave_1 entered promiscuous mode [ 22.782506][ T289] bridge0: port 1(bridge_slave_0) entered blocking state [ 22.789356][ T289] bridge0: port 1(bridge_slave_0) entered disabled state [ 22.796899][ T289] device bridge_slave_0 entered promiscuous mode [ 22.815350][ T289] bridge0: port 2(bridge_slave_1) entered blocking state [ 22.822217][ T289] bridge0: port 2(bridge_slave_1) entered disabled state [ 22.829461][ T289] device bridge_slave_1 entered promiscuous mode [ 22.861231][ T292] bridge0: port 1(bridge_slave_0) entered blocking state [ 22.868156][ T292] bridge0: port 1(bridge_slave_0) entered disabled state [ 22.875387][ T292] device bridge_slave_0 entered promiscuous mode [ 22.895898][ T292] bridge0: port 2(bridge_slave_1) entered blocking state [ 22.902815][ T292] bridge0: port 2(bridge_slave_1) entered disabled state [ 22.909936][ T292] device bridge_slave_1 entered promiscuous mode [ 22.962229][ T291] bridge0: port 1(bridge_slave_0) entered blocking state [ 22.969080][ T291] bridge0: port 1(bridge_slave_0) entered disabled state [ 22.976489][ T291] device bridge_slave_0 entered promiscuous mode [ 22.983215][ T291] bridge0: port 2(bridge_slave_1) entered blocking state [ 22.990064][ T291] bridge0: port 2(bridge_slave_1) entered disabled state [ 22.997411][ T291] device bridge_slave_1 entered promiscuous mode [ 23.120318][ T292] bridge0: port 2(bridge_slave_1) entered blocking state [ 23.127192][ T292] bridge0: port 2(bridge_slave_1) entered forwarding state [ 23.134330][ T292] bridge0: port 1(bridge_slave_0) entered blocking state [ 23.141163][ T292] bridge0: port 1(bridge_slave_0) entered forwarding state [ 23.162234][ T290] bridge0: port 2(bridge_slave_1) entered blocking state [ 23.169083][ T290] bridge0: port 2(bridge_slave_1) entered forwarding state [ 23.176218][ T290] bridge0: port 1(bridge_slave_0) entered blocking state [ 23.183080][ T290] bridge0: port 1(bridge_slave_0) entered forwarding state [ 23.191947][ T288] bridge0: port 2(bridge_slave_1) entered blocking state [ 23.198814][ T288] bridge0: port 2(bridge_slave_1) entered forwarding state [ 23.205926][ T288] bridge0: port 1(bridge_slave_0) entered blocking state [ 23.212700][ T288] bridge0: port 1(bridge_slave_0) entered forwarding state [ 23.222112][ T289] bridge0: port 2(bridge_slave_1) entered blocking state [ 23.228957][ T289] bridge0: port 2(bridge_slave_1) entered forwarding state [ 23.236083][ T289] bridge0: port 1(bridge_slave_0) entered blocking state [ 23.242859][ T289] bridge0: port 1(bridge_slave_0) entered forwarding state [ 23.280790][ T291] bridge0: port 2(bridge_slave_1) entered blocking state [ 23.287675][ T291] bridge0: port 2(bridge_slave_1) entered forwarding state [ 23.294852][ T291] bridge0: port 1(bridge_slave_0) entered blocking state [ 23.301636][ T291] bridge0: port 1(bridge_slave_0) entered forwarding state [ 23.336857][ T293] bridge0: port 1(bridge_slave_0) entered disabled state [ 23.344384][ T293] bridge0: port 2(bridge_slave_1) entered disabled state [ 23.351492][ T293] bridge0: port 1(bridge_slave_0) entered disabled state [ 23.358727][ T293] bridge0: port 2(bridge_slave_1) entered disabled state [ 23.366186][ T293] bridge0: port 1(bridge_slave_0) entered disabled state [ 23.373310][ T293] bridge0: port 2(bridge_slave_1) entered disabled state [ 23.380325][ T293] bridge0: port 1(bridge_slave_0) entered disabled state [ 23.387443][ T293] bridge0: port 2(bridge_slave_1) entered disabled state [ 23.395312][ T293] bridge0: port 1(bridge_slave_0) entered disabled state [ 23.402394][ T293] bridge0: port 2(bridge_slave_1) entered disabled state [ 23.409823][ T293] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 23.417196][ T293] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 23.453574][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 23.461320][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 23.470321][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 23.477849][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 23.485133][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 23.493248][ T26] bridge0: port 1(bridge_slave_0) entered blocking state [ 23.500084][ T26] bridge0: port 1(bridge_slave_0) entered forwarding state [ 23.507519][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 23.515502][ T26] bridge0: port 2(bridge_slave_1) entered blocking state [ 23.522360][ T26] bridge0: port 2(bridge_slave_1) entered forwarding state [ 23.529637][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 23.537938][ T26] bridge0: port 1(bridge_slave_0) entered blocking state [ 23.544789][ T26] bridge0: port 1(bridge_slave_0) entered forwarding state [ 23.551991][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 23.560067][ T26] bridge0: port 2(bridge_slave_1) entered blocking state [ 23.567114][ T26] bridge0: port 2(bridge_slave_1) entered forwarding state [ 23.574278][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 23.582321][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 23.590275][ T26] bridge0: port 1(bridge_slave_0) entered blocking state [ 23.597134][ T26] bridge0: port 1(bridge_slave_0) entered forwarding state [ 23.604421][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 23.612329][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 23.620446][ T26] bridge0: port 2(bridge_slave_1) entered blocking state [ 23.627304][ T26] bridge0: port 2(bridge_slave_1) entered forwarding state [ 23.634468][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 23.642557][ T26] bridge0: port 1(bridge_slave_0) entered blocking state [ 23.649431][ T26] bridge0: port 1(bridge_slave_0) entered forwarding state [ 23.683608][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 23.691703][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 23.699619][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 23.708147][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 23.716208][ T26] bridge0: port 2(bridge_slave_1) entered blocking state [ 23.723266][ T26] bridge0: port 2(bridge_slave_1) entered forwarding state [ 23.730391][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 23.738565][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 23.746340][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 23.754346][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 23.762140][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 23.770234][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 23.778396][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 23.786379][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 23.794234][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 23.802348][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 23.810137][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 23.818371][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 23.826726][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 23.835317][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 23.843311][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 23.850605][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 23.858636][ T288] device veth0_vlan entered promiscuous mode [ 23.879468][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 23.886927][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 23.894469][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 23.902694][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 23.910800][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 23.918569][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 23.926464][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 23.934854][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 23.942837][ T60] bridge0: port 1(bridge_slave_0) entered blocking state [ 23.949656][ T60] bridge0: port 1(bridge_slave_0) entered forwarding state [ 23.957850][ T292] device veth0_vlan entered promiscuous mode [ 23.967642][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 23.975344][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 23.983022][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 23.991069][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 23.999182][ T26] bridge0: port 2(bridge_slave_1) entered blocking state [ 24.006038][ T26] bridge0: port 2(bridge_slave_1) entered forwarding state [ 24.013443][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 24.021627][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 24.036834][ T289] device veth0_vlan entered promiscuous mode [ 24.050030][ T293] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 24.058328][ T293] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 24.066191][ T293] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 24.074098][ T293] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 24.082529][ T293] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 24.090302][ T293] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 24.098364][ T293] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 24.112568][ T288] device veth1_macvtap entered promiscuous mode [ 24.122727][ T292] device veth1_macvtap entered promiscuous mode [ 24.134067][ T290] device veth0_vlan entered promiscuous mode [ 24.140774][ T310] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 24.148167][ T310] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 24.156026][ T310] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 24.163603][ T310] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 24.171868][ T310] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 24.179977][ T310] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 24.187941][ T310] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 24.195769][ T310] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 24.203570][ T310] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 24.211381][ T310] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 24.219450][ T310] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 24.227495][ T310] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 24.235583][ T310] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 24.244036][ T310] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 24.251355][ T310] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 24.262297][ T289] device veth1_macvtap entered promiscuous mode [ 24.276773][ T290] device veth1_macvtap entered promiscuous mode [ 24.283789][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 24.292171][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 24.300271][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 24.308355][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 24.316444][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 24.324434][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 24.332354][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 24.348763][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 24.357556][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 24.365708][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 24.373887][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 24.381975][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 24.390062][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 24.398205][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 24.412060][ T291] device veth0_vlan entered promiscuous mode [ 24.421772][ T311] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 24.429663][ T311] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 24.437096][ T311] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 24.452262][ T310] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 24.460355][ T310] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 24.498039][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 24.506496][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 24.526938][ T291] device veth1_macvtap entered promiscuous mode [ 24.538056][ T311] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 24.577551][ T311] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 24.586695][ T311] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 24.596318][ T311] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 24.604643][ T311] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 24.803062][ C1] hrtimer: interrupt took 30157 ns [ 24.884178][ T342] device syzkaller0 entered promiscuous mode [ 24.966207][ T347] FAULT_INJECTION: forcing a failure. [ 24.966207][ T347] name fail_usercopy, interval 1, probability 0, space 0, times 1 [ 25.080200][ T347] CPU: 0 PID: 347 Comm: syz.0.9 Not tainted 5.15.151-syzkaller-00415-gdb06c48ab67e #0 [ 25.089586][ T347] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/07/2024 [ 25.099496][ T347] Call Trace: [ 25.102614][ T347] [ 25.105491][ T347] dump_stack_lvl+0x151/0x1b7 [ 25.110005][ T347] ? io_uring_drop_tctx_refs+0x190/0x190 [ 25.115473][ T347] dump_stack+0x15/0x17 [ 25.119461][ T347] should_fail+0x3c6/0x510 [ 25.123713][ T347] should_fail_usercopy+0x1a/0x20 [ 25.128588][ T347] _copy_from_user+0x20/0xd0 [ 25.133019][ T347] ___sys_recvmsg+0x150/0x690 [ 25.137516][ T347] ? __sys_recvmsg+0x260/0x260 [ 25.142112][ T347] ? vfs_write+0x9ec/0x1110 [ 25.146457][ T347] ? __fdget+0x1bc/0x240 [ 25.150531][ T347] __x64_sys_recvmsg+0x1dc/0x2b0 [ 25.155323][ T347] ? fput+0x1a/0x20 [ 25.158950][ T347] ? ___sys_recvmsg+0x690/0x690 [ 25.163655][ T347] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 25.169538][ T347] ? exit_to_user_mode_prepare+0x39/0xa0 [ 25.175010][ T347] do_syscall_64+0x3d/0xb0 [ 25.179258][ T347] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 25.185001][ T347] RIP: 0033:0x7f16164adbd9 [ 25.189242][ T347] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 25.208682][ T347] RSP: 002b:00007f16156ed048 EFLAGS: 00000246 ORIG_RAX: 000000000000002f [ 25.216936][ T347] RAX: ffffffffffffffda RBX: 00007f161663c110 RCX: 00007f16164adbd9 [ 25.224739][ T347] RDX: 0000000000000101 RSI: 0000000020000040 RDI: 0000000000000004 [ 25.232550][ T347] RBP: 00007f16156ed0a0 R08: 0000000000000000 R09: 0000000000000000 [ 25.240361][ T347] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 25.248172][ T347] R13: 000000000000006e R14: 00007f161663c110 R15: 00007fff6baa70d8 [ 25.255987][ T347] [ 25.864582][ T360] FAULT_INJECTION: forcing a failure. [ 25.864582][ T360] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 25.910698][ T360] CPU: 0 PID: 360 Comm: syz.4.16 Not tainted 5.15.151-syzkaller-00415-gdb06c48ab67e #0 [ 25.920167][ T360] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/07/2024 [ 25.930060][ T360] Call Trace: [ 25.933179][ T360] [ 25.935958][ T360] dump_stack_lvl+0x151/0x1b7 [ 25.940469][ T360] ? io_uring_drop_tctx_refs+0x190/0x190 [ 25.945940][ T360] dump_stack+0x15/0x17 [ 25.949929][ T360] should_fail+0x3c6/0x510 [ 25.954184][ T360] should_fail_usercopy+0x1a/0x20 [ 25.959044][ T360] _copy_from_user+0x20/0xd0 [ 25.963474][ T360] __sys_bpf+0x1e9/0x760 [ 25.967557][ T360] ? fput_many+0x160/0x1b0 [ 25.971803][ T360] ? bpf_link_show_fdinfo+0x2d0/0x2d0 [ 25.977011][ T360] ? debug_smp_processor_id+0x17/0x20 [ 25.982216][ T360] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 25.988120][ T360] __x64_sys_bpf+0x7c/0x90 [ 25.992385][ T360] do_syscall_64+0x3d/0xb0 [ 25.996626][ T360] ? sysvec_apic_timer_interrupt+0x55/0xc0 [ 26.002276][ T360] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 26.008088][ T360] RIP: 0033:0x7fa3b2faebd9 [ 26.012334][ T360] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 26.031861][ T360] RSP: 002b:00007fa3b2230048 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 26.040106][ T360] RAX: ffffffffffffffda RBX: 00007fa3b313cf60 RCX: 00007fa3b2faebd9 [ 26.047922][ T360] RDX: 0000000000000048 RSI: 00000000200017c0 RDI: 0000000000000005 [ 26.055729][ T360] RBP: 00007fa3b22300a0 R08: 0000000000000000 R09: 0000000000000000 [ 26.063548][ T360] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 26.071353][ T360] R13: 000000000000000b R14: 00007fa3b313cf60 R15: 00007fff909c4ee8 [ 26.079179][ T360] [ 26.380108][ T385] device syzkaller0 entered promiscuous mode [ 26.463026][ T393] FAULT_INJECTION: forcing a failure. [ 26.463026][ T393] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 26.477459][ T393] CPU: 0 PID: 393 Comm: syz.1.31 Not tainted 5.15.151-syzkaller-00415-gdb06c48ab67e #0 [ 26.487793][ T393] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/07/2024 [ 26.497692][ T393] Call Trace: [ 26.500809][ T393] [ 26.503587][ T393] dump_stack_lvl+0x151/0x1b7 [ 26.508103][ T393] ? io_uring_drop_tctx_refs+0x190/0x190 [ 26.513572][ T393] dump_stack+0x15/0x17 [ 26.517561][ T393] should_fail+0x3c6/0x510 [ 26.521814][ T393] should_fail_usercopy+0x1a/0x20 [ 26.526673][ T393] _copy_to_user+0x20/0x90 [ 26.530928][ T393] simple_read_from_buffer+0xc7/0x150 [ 26.536139][ T393] proc_fail_nth_read+0x1a3/0x210 [ 26.540997][ T393] ? proc_fault_inject_write+0x390/0x390 [ 26.546461][ T393] ? fsnotify_perm+0x470/0x5d0 [ 26.551203][ T393] ? security_file_permission+0x86/0xb0 [ 26.556575][ T393] ? proc_fault_inject_write+0x390/0x390 [ 26.562045][ T393] vfs_read+0x27d/0xd40 [ 26.566036][ T393] ? rcu_gp_kthread_wake+0x90/0x90 [ 26.570987][ T393] ? kernel_read+0x1f0/0x1f0 [ 26.575413][ T393] ? __kasan_check_write+0x14/0x20 [ 26.580359][ T393] ? mutex_lock+0xb6/0x1e0 [ 26.584613][ T393] ? wait_for_completion_killable_timeout+0x10/0x10 [ 26.591052][ T393] ? __fdget_pos+0x2e7/0x3a0 [ 26.595461][ T393] ? ksys_read+0x77/0x2c0 [ 26.599624][ T393] ksys_read+0x199/0x2c0 [ 26.603708][ T393] ? unlock_page_memcg+0x160/0x160 [ 26.608692][ T393] ? vfs_write+0x1110/0x1110 [ 26.613080][ T393] ? debug_smp_processor_id+0x17/0x20 [ 26.618288][ T393] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 26.624187][ T393] __x64_sys_read+0x7b/0x90 [ 26.628618][ T393] do_syscall_64+0x3d/0xb0 [ 26.632871][ T393] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 26.638594][ T393] RIP: 0033:0x7f41670ce6bc [ 26.642850][ T393] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 c9 8c 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 1f 8d 02 00 48 [ 26.662290][ T393] RSP: 002b:00007f4166351040 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 26.670535][ T393] RAX: ffffffffffffffda RBX: 00007f416725df60 RCX: 00007f41670ce6bc [ 26.678538][ T393] RDX: 000000000000000f RSI: 00007f41663510b0 RDI: 0000000000000007 [ 26.686339][ T393] RBP: 00007f41663510a0 R08: 0000000000000000 R09: 0000000000000000 [ 26.694235][ T393] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 26.702048][ T393] R13: 000000000000000b R14: 00007f416725df60 R15: 00007ffd8d222418 [ 26.709952][ T393] [ 26.916776][ T424] device pim6reg1 entered promiscuous mode [ 26.985860][ T432] FAULT_INJECTION: forcing a failure. [ 26.985860][ T432] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 27.059809][ T432] CPU: 1 PID: 432 Comm: syz.1.43 Not tainted 5.15.151-syzkaller-00415-gdb06c48ab67e #0 [ 27.069380][ T432] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/07/2024 [ 27.079451][ T432] Call Trace: [ 27.082571][ T432] [ 27.085347][ T432] dump_stack_lvl+0x151/0x1b7 [ 27.089870][ T432] ? io_uring_drop_tctx_refs+0x190/0x190 [ 27.095332][ T432] ? __kasan_check_write+0x14/0x20 [ 27.100276][ T432] dump_stack+0x15/0x17 [ 27.104267][ T432] should_fail+0x3c6/0x510 [ 27.108523][ T432] should_fail_usercopy+0x1a/0x20 [ 27.113388][ T432] _copy_from_user+0x20/0xd0 [ 27.117807][ T432] sock_do_ioctl+0x229/0x5a0 [ 27.122235][ T432] ? sock_show_fdinfo+0xa0/0xa0 [ 27.126920][ T432] ? selinux_file_ioctl+0x3cc/0x540 [ 27.131954][ T432] sock_ioctl+0x455/0x740 [ 27.136119][ T432] ? sock_poll+0x400/0x400 [ 27.140373][ T432] ? __fget_files+0x31e/0x380 [ 27.144890][ T432] ? security_file_ioctl+0x84/0xb0 [ 27.149831][ T432] ? sock_poll+0x400/0x400 [ 27.154086][ T432] __se_sys_ioctl+0x114/0x190 [ 27.158602][ T432] __x64_sys_ioctl+0x7b/0x90 [ 27.163023][ T432] do_syscall_64+0x3d/0xb0 [ 27.167288][ T432] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 27.173004][ T432] RIP: 0033:0x7f41670cfbd9 [ 27.177260][ T432] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 27.196699][ T432] RSP: 002b:00007f4166351048 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 27.204947][ T432] RAX: ffffffffffffffda RBX: 00007f416725df60 RCX: 00007f41670cfbd9 [ 27.212755][ T432] RDX: 0000000020000100 RSI: 0000000000008914 RDI: 000000000000000c [ 27.220568][ T432] RBP: 00007f41663510a0 R08: 0000000000000000 R09: 0000000000000000 [ 27.228466][ T432] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 27.236276][ T432] R13: 000000000000000b R14: 00007f416725df60 R15: 00007ffd8d222418 [ 27.244107][ T432] [ 27.320711][ T446] device syzkaller0 entered promiscuous mode [ 27.354704][ T455] FAULT_INJECTION: forcing a failure. [ 27.354704][ T455] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 27.368094][ T455] CPU: 1 PID: 455 Comm: syz.3.55 Not tainted 5.15.151-syzkaller-00415-gdb06c48ab67e #0 [ 27.377689][ T455] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/07/2024 [ 27.387668][ T455] Call Trace: [ 27.390785][ T455] [ 27.393564][ T455] dump_stack_lvl+0x151/0x1b7 [ 27.398088][ T455] ? io_uring_drop_tctx_refs+0x190/0x190 [ 27.403548][ T455] ? kmem_cache_free+0x116/0x2e0 [ 27.408329][ T455] dump_stack+0x15/0x17 [ 27.412310][ T455] should_fail+0x3c6/0x510 [ 27.416566][ T455] should_fail_usercopy+0x1a/0x20 [ 27.421444][ T455] _copy_from_user+0x20/0xd0 [ 27.425851][ T455] __copy_msghdr_from_user+0xaf/0x7c0 [ 27.431059][ T455] ? __ia32_sys_shutdown+0x70/0x70 [ 27.436007][ T455] ___sys_sendmsg+0x166/0x2e0 [ 27.440517][ T455] ? __sys_sendmsg+0x260/0x260 [ 27.445216][ T455] ? __fdget+0x1bc/0x240 [ 27.449371][ T455] __se_sys_sendmsg+0x19a/0x260 [ 27.454067][ T455] ? __x64_sys_sendmsg+0x90/0x90 [ 27.458831][ T455] ? ksys_write+0x260/0x2c0 [ 27.463174][ T455] ? debug_smp_processor_id+0x17/0x20 [ 27.468380][ T455] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 27.474279][ T455] __x64_sys_sendmsg+0x7b/0x90 [ 27.478881][ T455] do_syscall_64+0x3d/0xb0 [ 27.483218][ T455] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 27.488947][ T455] RIP: 0033:0x7fc07874fbd9 [ 27.493203][ T455] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 27.512749][ T455] RSP: 002b:00007fc0779d1048 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 27.521115][ T455] RAX: ffffffffffffffda RBX: 00007fc0788ddf60 RCX: 00007fc07874fbd9 [ 27.528915][ T455] RDX: 0000000000000000 RSI: 0000000020003a00 RDI: 0000000000000003 [ 27.536814][ T455] RBP: 00007fc0779d10a0 R08: 0000000000000000 R09: 0000000000000000 [ 27.544631][ T455] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 27.552436][ T455] R13: 000000000000000b R14: 00007fc0788ddf60 R15: 00007fffff24d2a8 [ 27.560261][ T455] [ 28.516136][ T503] FAULT_INJECTION: forcing a failure. [ 28.516136][ T503] name fail_page_alloc, interval 1, probability 0, space 0, times 1 [ 28.553119][ T500] device syzkaller0 entered promiscuous mode [ 28.561725][ T503] CPU: 0 PID: 503 Comm: syz.2.73 Not tainted 5.15.151-syzkaller-00415-gdb06c48ab67e #0 [ 28.571190][ T503] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/07/2024 [ 28.581079][ T503] Call Trace: [ 28.584201][ T503] [ 28.586984][ T503] dump_stack_lvl+0x151/0x1b7 [ 28.591492][ T503] ? io_uring_drop_tctx_refs+0x190/0x190 [ 28.596991][ T503] dump_stack+0x15/0x17 [ 28.600959][ T503] should_fail+0x3c6/0x510 [ 28.605216][ T503] should_fail_alloc_page+0x5a/0x80 [ 28.610249][ T503] prepare_alloc_pages+0x15c/0x700 [ 28.615304][ T503] ? __alloc_pages_bulk+0xe40/0xe40 [ 28.620372][ T503] ? __kernel_text_address+0x9b/0x110 [ 28.625565][ T503] __alloc_pages+0x18c/0x8f0 [ 28.630052][ T503] ? prep_new_page+0x110/0x110 [ 28.634653][ T503] ? stack_trace_snprint+0xf0/0xf0 [ 28.639598][ T503] skb_page_frag_refill+0x209/0x3b0 [ 28.644649][ T503] tun_get_user+0x6f0/0x3aa0 [ 28.649077][ T503] ? kasan_set_track+0x4b/0x70 [ 28.653654][ T503] ? kasan_set_free_info+0x23/0x40 [ 28.658619][ T503] ? tun_do_read+0x1ef0/0x1ef0 [ 28.663521][ T503] ? kstrtouint_from_user+0x20a/0x2a0 [ 28.668727][ T503] ? kstrtol_from_user+0x310/0x310 [ 28.673677][ T503] ? avc_policy_seqno+0x1b/0x70 [ 28.678360][ T503] ? selinux_file_permission+0x2c4/0x570 [ 28.683825][ T503] tun_chr_write_iter+0x1e1/0x2e0 [ 28.688686][ T503] vfs_write+0xd5d/0x1110 [ 28.692850][ T503] ? kmem_cache_free+0x2c3/0x2e0 [ 28.697714][ T503] ? file_end_write+0x1c0/0x1c0 [ 28.702403][ T503] ? __fdget_pos+0x209/0x3a0 [ 28.706822][ T503] ? ksys_write+0x77/0x2c0 [ 28.711174][ T503] ksys_write+0x199/0x2c0 [ 28.715338][ T503] ? __ia32_sys_read+0x90/0x90 [ 28.719943][ T503] ? debug_smp_processor_id+0x17/0x20 [ 28.725148][ T503] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 28.731051][ T503] __x64_sys_write+0x7b/0x90 [ 28.735474][ T503] do_syscall_64+0x3d/0xb0 [ 28.739729][ T503] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 28.745463][ T503] RIP: 0033:0x7f28a8988bd9 [ 28.749711][ T503] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 28.769150][ T503] RSP: 002b:00007f28a7c0a048 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 28.777399][ T503] RAX: ffffffffffffffda RBX: 00007f28a8b16f60 RCX: 00007f28a8988bd9 [ 28.785205][ T503] RDX: 0000000000000015 RSI: 0000000020000000 RDI: 00000000000000c8 [ 28.793016][ T503] RBP: 00007f28a7c0a0a0 R08: 0000000000000000 R09: 0000000000000000 [ 28.800829][ T503] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 28.808640][ T503] R13: 000000000000000b R14: 00007f28a8b16f60 R15: 00007ffe4566ae48 [ 28.816455][ T503] [ 29.456020][ T554] FAULT_INJECTION: forcing a failure. [ 29.456020][ T554] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 29.545223][ T554] CPU: 0 PID: 554 Comm: syz.1.95 Not tainted 5.15.151-syzkaller-00415-gdb06c48ab67e #0 [ 29.554696][ T554] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/07/2024 [ 29.564590][ T554] Call Trace: [ 29.567716][ T554] [ 29.570490][ T554] dump_stack_lvl+0x151/0x1b7 [ 29.575009][ T554] ? io_uring_drop_tctx_refs+0x190/0x190 [ 29.580573][ T554] ? kstrtouint_from_user+0x20a/0x2a0 [ 29.585778][ T554] dump_stack+0x15/0x17 [ 29.589768][ T554] should_fail+0x3c6/0x510 [ 29.594024][ T554] should_fail_usercopy+0x1a/0x20 [ 29.598890][ T554] _copy_to_user+0x20/0x90 [ 29.603222][ T554] simple_read_from_buffer+0xc7/0x150 [ 29.608435][ T554] proc_fail_nth_read+0x1a3/0x210 [ 29.613299][ T554] ? proc_fault_inject_write+0x390/0x390 [ 29.618759][ T554] ? fsnotify_perm+0x470/0x5d0 [ 29.623492][ T554] ? security_file_permission+0x86/0xb0 [ 29.628872][ T554] ? proc_fault_inject_write+0x390/0x390 [ 29.634338][ T554] vfs_read+0x27d/0xd40 [ 29.638335][ T554] ? kernel_read+0x1f0/0x1f0 [ 29.642774][ T554] ? __kasan_check_write+0x14/0x20 [ 29.647703][ T554] ? mutex_lock+0xb6/0x1e0 [ 29.651957][ T554] ? wait_for_completion_killable_timeout+0x10/0x10 [ 29.658383][ T554] ? __fdget_pos+0x2e7/0x3a0 [ 29.662806][ T554] ? ksys_read+0x77/0x2c0 [ 29.666970][ T554] ksys_read+0x199/0x2c0 [ 29.671053][ T554] ? bpf_trace_run1+0x1c0/0x1c0 [ 29.675826][ T554] ? vfs_write+0x1110/0x1110 [ 29.680342][ T554] ? __bpf_trace_sys_enter+0x62/0x70 [ 29.685617][ T554] __x64_sys_read+0x7b/0x90 [ 29.689969][ T554] do_syscall_64+0x3d/0xb0 [ 29.694211][ T554] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 29.700123][ T554] RIP: 0033:0x7f41670ce6bc [ 29.704379][ T554] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 c9 8c 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 1f 8d 02 00 48 [ 29.723904][ T554] RSP: 002b:00007f4166351040 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 29.732239][ T554] RAX: ffffffffffffffda RBX: 00007f416725df60 RCX: 00007f41670ce6bc [ 29.740134][ T554] RDX: 000000000000000f RSI: 00007f41663510b0 RDI: 0000000000000006 [ 29.747947][ T554] RBP: 00007f41663510a0 R08: 0000000000000000 R09: 0000000000000000 [ 29.755862][ T554] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 29.763888][ T554] R13: 000000000000000b R14: 00007f416725df60 R15: 00007ffd8d222418 [ 29.771706][ T554] [ 30.058977][ T581] FAULT_INJECTION: forcing a failure. [ 30.058977][ T581] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 30.076777][ T581] CPU: 0 PID: 581 Comm: syz.2.109 Not tainted 5.15.151-syzkaller-00415-gdb06c48ab67e #0 [ 30.086335][ T581] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/07/2024 [ 30.096231][ T581] Call Trace: [ 30.099357][ T581] [ 30.102130][ T581] dump_stack_lvl+0x151/0x1b7 [ 30.106645][ T581] ? io_uring_drop_tctx_refs+0x190/0x190 [ 30.112117][ T581] dump_stack+0x15/0x17 [ 30.116121][ T581] should_fail+0x3c6/0x510 [ 30.120360][ T581] should_fail_usercopy+0x1a/0x20 [ 30.125214][ T581] _copy_from_user+0x20/0xd0 [ 30.129643][ T581] __sys_bpf+0x1e9/0x760 [ 30.133720][ T581] ? fput_many+0x160/0x1b0 [ 30.137978][ T581] ? bpf_link_show_fdinfo+0x2d0/0x2d0 [ 30.143217][ T581] ? debug_smp_processor_id+0x17/0x20 [ 30.148392][ T581] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 30.154291][ T581] __x64_sys_bpf+0x7c/0x90 [ 30.158543][ T581] do_syscall_64+0x3d/0xb0 [ 30.162796][ T581] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 30.168524][ T581] RIP: 0033:0x7f28a8988bd9 [ 30.172983][ T581] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 30.192421][ T581] RSP: 002b:00007f28a7c0a048 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 30.200677][ T581] RAX: ffffffffffffffda RBX: 00007f28a8b16f60 RCX: 00007f28a8988bd9 [ 30.208479][ T581] RDX: 000000000000002c RSI: 0000000020000080 RDI: 000000000000000a [ 30.216286][ T581] RBP: 00007f28a7c0a0a0 R08: 0000000000000000 R09: 0000000000000000 [ 30.224098][ T581] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 30.231910][ T581] R13: 000000000000000b R14: 00007f28a8b16f60 R15: 00007ffe4566ae48 [ 30.239730][ T581] [ 30.586725][ T619] syz.2.121[619] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 30.590119][ T619] syz.2.121[619] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 30.908796][ T30] kauditd_printk_skb: 40 callbacks suppressed [ 30.908812][ T30] audit: type=1400 audit(1720475790.394:116): avc: denied { read } for pid=633 comm="syz.2.128" name="ppp" dev="devtmpfs" ino=134 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ppp_device_t tclass=chr_file permissive=1 [ 30.962235][ T636] FAULT_INJECTION: forcing a failure. [ 30.962235][ T636] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 30.987340][ T636] CPU: 1 PID: 636 Comm: syz.0.129 Not tainted 5.15.151-syzkaller-00415-gdb06c48ab67e #0 [ 30.996895][ T636] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/07/2024 [ 31.006789][ T636] Call Trace: [ 31.009909][ T636] [ 31.012690][ T636] dump_stack_lvl+0x151/0x1b7 [ 31.017205][ T636] ? io_uring_drop_tctx_refs+0x190/0x190 [ 31.022672][ T636] dump_stack+0x15/0x17 [ 31.026660][ T636] should_fail+0x3c6/0x510 [ 31.028358][ T30] audit: type=1400 audit(1720475790.444:117): avc: denied { open } for pid=633 comm="syz.2.128" path="/dev/ppp" dev="devtmpfs" ino=134 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ppp_device_t tclass=chr_file permissive=1 [ 31.030913][ T636] should_fail_usercopy+0x1a/0x20 [ 31.030936][ T636] _copy_from_user+0x20/0xd0 [ 31.062858][ T636] __sys_bpf+0x1e9/0x760 [ 31.066947][ T636] ? fput_many+0x160/0x1b0 [ 31.071186][ T636] ? bpf_link_show_fdinfo+0x2d0/0x2d0 [ 31.076401][ T636] ? debug_smp_processor_id+0x17/0x20 [ 31.081603][ T636] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 31.087605][ T636] __x64_sys_bpf+0x7c/0x90 [ 31.091859][ T636] do_syscall_64+0x3d/0xb0 [ 31.096105][ T636] ? sysvec_apic_timer_interrupt+0x55/0xc0 [ 31.101750][ T636] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 31.107473][ T636] RIP: 0033:0x7f16164adbd9 [ 31.111733][ T636] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 31.131174][ T636] RSP: 002b:00007f161572f048 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 31.139412][ T636] RAX: ffffffffffffffda RBX: 00007f161663bf60 RCX: 00007f16164adbd9 [ 31.147229][ T636] RDX: 0000000000000090 RSI: 0000000020000840 RDI: 0000000000000005 [ 31.155035][ T636] RBP: 00007f161572f0a0 R08: 0000000000000000 R09: 0000000000000000 [ 31.162848][ T636] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 31.170661][ T636] R13: 000000000000000b R14: 00007f161663bf60 R15: 00007fff6baa70d8 [ 31.178475][ T636] [ 31.236634][ T648] syz.0.133[648] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 31.237102][ T648] syz.0.133[648] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 32.507797][ T701] syz.3.156[701] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 32.531010][ T701] syz.3.156[701] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 33.666683][ T734] syz.2.173[734] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 33.752261][ T734] syz.2.173[734] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 34.673596][ T771] syz.3.189[771] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 34.773613][ T771] syz.3.189[771] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 37.872886][ T886] device syzkaller0 entered promiscuous mode [ 38.396666][ T923] device syzkaller0 entered promiscuous mode [ 39.175494][ T947] device syzkaller0 entered promiscuous mode [ 39.894425][ T981] device syzkaller0 entered promiscuous mode [ 40.448350][ T1012] device syzkaller0 entered promiscuous mode [ 40.456177][ T1014] FAULT_INJECTION: forcing a failure. [ 40.456177][ T1014] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 40.479200][ T1014] CPU: 1 PID: 1014 Comm: syz.2.300 Not tainted 5.15.151-syzkaller-00415-gdb06c48ab67e #0 [ 40.488853][ T1014] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/07/2024 [ 40.498751][ T1014] Call Trace: [ 40.501867][ T1014] [ 40.504646][ T1014] dump_stack_lvl+0x151/0x1b7 [ 40.509157][ T1014] ? io_uring_drop_tctx_refs+0x190/0x190 [ 40.514630][ T1014] dump_stack+0x15/0x17 [ 40.518620][ T1014] should_fail+0x3c6/0x510 [ 40.522883][ T1014] should_fail_usercopy+0x1a/0x20 [ 40.527747][ T1014] _copy_from_user+0x20/0xd0 [ 40.532164][ T1014] ___sys_recvmsg+0x150/0x690 [ 40.536777][ T1014] ? __sys_recvmsg+0x260/0x260 [ 40.541360][ T1014] ? vfs_write+0x9ec/0x1110 [ 40.545707][ T1014] ? __fdget+0x1bc/0x240 [ 40.549784][ T1014] __x64_sys_recvmsg+0x1dc/0x2b0 [ 40.554552][ T1014] ? fput+0x1a/0x20 [ 40.558219][ T1014] ? ___sys_recvmsg+0x690/0x690 [ 40.562918][ T1014] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 40.568788][ T1014] ? exit_to_user_mode_prepare+0x39/0xa0 [ 40.574343][ T1014] do_syscall_64+0x3d/0xb0 [ 40.578596][ T1014] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 40.584508][ T1014] RIP: 0033:0x7f28a8988bd9 [ 40.588769][ T1014] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 40.608301][ T1014] RSP: 002b:00007f28a7c0a048 EFLAGS: 00000246 ORIG_RAX: 000000000000002f [ 40.616543][ T1014] RAX: ffffffffffffffda RBX: 00007f28a8b16f60 RCX: 00007f28a8988bd9 [ 40.624355][ T1014] RDX: 0000000000000000 RSI: 0000000020000b00 RDI: 0000000000000006 [ 40.632265][ T1014] RBP: 00007f28a7c0a0a0 R08: 0000000000000000 R09: 0000000000000000 [ 40.640161][ T1014] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 40.648160][ T1014] R13: 000000000000000b R14: 00007f28a8b16f60 R15: 00007ffe4566ae48 [ 40.656042][ T1014] [ 41.166785][ T1054] device syzkaller0 entered promiscuous mode [ 41.234026][ T1066] FAULT_INJECTION: forcing a failure. [ 41.234026][ T1066] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 41.247758][ T1066] CPU: 0 PID: 1066 Comm: syz.2.323 Not tainted 5.15.151-syzkaller-00415-gdb06c48ab67e #0 [ 41.257391][ T1066] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/07/2024 [ 41.267372][ T1066] Call Trace: [ 41.270495][ T1066] [ 41.273298][ T1066] dump_stack_lvl+0x151/0x1b7 [ 41.277785][ T1066] ? io_uring_drop_tctx_refs+0x190/0x190 [ 41.283342][ T1066] dump_stack+0x15/0x17 [ 41.287332][ T1066] should_fail+0x3c6/0x510 [ 41.291590][ T1066] should_fail_usercopy+0x1a/0x20 [ 41.296444][ T1066] _copy_from_user+0x20/0xd0 [ 41.300871][ T1066] __sys_bpf+0x1e9/0x760 [ 41.304951][ T1066] ? fput_many+0x160/0x1b0 [ 41.309202][ T1066] ? bpf_link_show_fdinfo+0x2d0/0x2d0 [ 41.314413][ T1066] ? debug_smp_processor_id+0x17/0x20 [ 41.319619][ T1066] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 41.325521][ T1066] __x64_sys_bpf+0x7c/0x90 [ 41.329772][ T1066] do_syscall_64+0x3d/0xb0 [ 41.334117][ T1066] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 41.340014][ T1066] RIP: 0033:0x7f28a8988bd9 [ 41.344362][ T1066] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 41.363888][ T1066] RSP: 002b:00007f28a7c0a048 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 41.372130][ T1066] RAX: ffffffffffffffda RBX: 00007f28a8b16f60 RCX: 00007f28a8988bd9 [ 41.379990][ T1066] RDX: 0000000000000020 RSI: 0000000020000200 RDI: 0000000000000015 [ 41.387962][ T1066] RBP: 00007f28a7c0a0a0 R08: 0000000000000000 R09: 0000000000000000 [ 41.395860][ T1066] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 41.404196][ T1066] R13: 000000000000000b R14: 00007f28a8b16f60 R15: 00007ffe4566ae48 [ 41.412097][ T1066] [ 41.557589][ T1087] device syzkaller0 entered promiscuous mode [ 41.885398][ T1122] device syzkaller0 entered promiscuous mode [ 42.203918][ T1156] device syzkaller0 entered promiscuous mode [ 42.398001][ T1182] device syzkaller0 entered promiscuous mode [ 42.682117][ T1208] device syzkaller0 entered promiscuous mode [ 42.968315][ T1244] device syzkaller0 entered promiscuous mode [ 43.214013][ T1268] device syzkaller0 entered promiscuous mode [ 43.565577][ T1304] device syzkaller0 entered promiscuous mode [ 43.972282][ T1345] device syzkaller0 entered promiscuous mode [ 44.235725][ T1380] device syzkaller0 entered promiscuous mode [ 44.493239][ T1412] device syzkaller0 entered promiscuous mode [ 44.768141][ T1434] device syzkaller0 entered promiscuous mode [ 45.047380][ T1473] device syzkaller0 entered promiscuous mode [ 45.257281][ T1515] device syzkaller0 entered promiscuous mode [ 45.543261][ T1548] device syzkaller0 entered promiscuous mode [ 45.918436][ T1587] device syzkaller0 entered promiscuous mode [ 46.253033][ T1647] device syzkaller0 entered promiscuous mode [ 46.933357][ T1684] device syzkaller0 entered promiscuous mode [ 47.248913][ T1721] device syzkaller0 entered promiscuous mode [ 47.858854][ T1761] device syzkaller0 entered promiscuous mode [ 48.455535][ T1816] device syzkaller0 entered promiscuous mode [ 49.231130][ T1862] device syzkaller0 entered promiscuous mode [ 49.654296][ T1914] device syzkaller0 entered promiscuous mode [ 50.193456][ T1956] device syzkaller0 entered promiscuous mode [ 50.652856][ T2019] device syzkaller0 entered promiscuous mode [ 50.779425][ T2043] FAULT_INJECTION: forcing a failure. [ 50.779425][ T2043] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 50.869687][ T2043] CPU: 0 PID: 2043 Comm: syz.4.791 Not tainted 5.15.151-syzkaller-00415-gdb06c48ab67e #0 [ 50.879342][ T2043] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/07/2024 [ 50.889323][ T2043] Call Trace: [ 50.892445][ T2043] [ 50.895222][ T2043] dump_stack_lvl+0x151/0x1b7 [ 50.899741][ T2043] ? io_uring_drop_tctx_refs+0x190/0x190 [ 50.905477][ T2043] dump_stack+0x15/0x17 [ 50.909467][ T2043] should_fail+0x3c6/0x510 [ 50.913719][ T2043] should_fail_usercopy+0x1a/0x20 [ 50.918664][ T2043] _copy_from_user+0x20/0xd0 [ 50.923181][ T2043] __sys_bpf+0x1e9/0x760 [ 50.927255][ T2043] ? fput_many+0x160/0x1b0 [ 50.931598][ T2043] ? bpf_link_show_fdinfo+0x2d0/0x2d0 [ 50.936808][ T2043] ? debug_smp_processor_id+0x17/0x20 [ 50.942013][ T2043] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 50.948002][ T2043] __x64_sys_bpf+0x7c/0x90 [ 50.952255][ T2043] do_syscall_64+0x3d/0xb0 [ 50.956507][ T2043] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 50.962234][ T2043] RIP: 0033:0x7fa3b2faebd9 [ 50.966609][ T2043] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 50.986050][ T2043] RSP: 002b:00007fa3b2230048 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 50.994291][ T2043] RAX: ffffffffffffffda RBX: 00007fa3b313cf60 RCX: 00007fa3b2faebd9 [ 51.002190][ T2043] RDX: 0000000000000048 RSI: 0000000020000840 RDI: 0000000000000000 [ 51.010092][ T2043] RBP: 00007fa3b22300a0 R08: 0000000000000000 R09: 0000000000000000 [ 51.017898][ T2043] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 51.025712][ T2043] R13: 000000000000000b R14: 00007fa3b313cf60 R15: 00007fff909c4ee8 [ 51.033529][ T2043] [ 51.240177][ T2074] device syzkaller0 entered promiscuous mode [ 51.648295][ T2128] device syzkaller0 entered promiscuous mode [ 51.988597][ T2154] FAULT_INJECTION: forcing a failure. [ 51.988597][ T2154] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 52.001557][ T2154] CPU: 1 PID: 2154 Comm: syz.4.846 Not tainted 5.15.151-syzkaller-00415-gdb06c48ab67e #0 [ 52.011185][ T2154] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/07/2024 [ 52.021082][ T2154] Call Trace: [ 52.024206][ T2154] [ 52.026986][ T2154] dump_stack_lvl+0x151/0x1b7 [ 52.031677][ T2154] ? io_uring_drop_tctx_refs+0x190/0x190 [ 52.037143][ T2154] ? enqueue_task_fair+0xd61/0x29a0 [ 52.042177][ T2154] dump_stack+0x15/0x17 [ 52.046174][ T2154] should_fail+0x3c6/0x510 [ 52.050504][ T2154] should_fail_usercopy+0x1a/0x20 [ 52.055450][ T2154] strncpy_from_user+0x24/0x2d0 [ 52.060138][ T2154] strncpy_from_user_nofault+0x73/0x150 [ 52.065519][ T2154] bpf_probe_read_user_str+0x2a/0x70 [ 52.070638][ T2154] bpf_prog_bc7c5c6b9645592f+0x35/0x1cc [ 52.076018][ T2154] bpf_trace_run3+0x11e/0x250 [ 52.080531][ T2154] ? bpf_trace_run2+0x210/0x210 [ 52.085221][ T2154] ? __this_cpu_preempt_check+0x13/0x20 [ 52.090599][ T2154] ? tracing_record_taskinfo_sched_switch+0x84/0x390 [ 52.097110][ T2154] ? __bpf_trace_sched_wakeup_template+0x10/0x10 [ 52.103273][ T2154] __bpf_trace_sched_switch+0xb/0x10 [ 52.108394][ T2154] __traceiter_sched_switch+0x85/0xc0 [ 52.113599][ T2154] __schedule+0x134b/0x1590 [ 52.117944][ T2154] ? __sched_text_start+0x8/0x8 [ 52.122626][ T2154] ? _raw_spin_lock+0xa4/0x1b0 [ 52.127313][ T2154] ? preempt_schedule+0xd9/0xe0 [ 52.132198][ T2154] preempt_schedule_common+0x9b/0xf0 [ 52.137317][ T2154] preempt_schedule+0xd9/0xe0 [ 52.141919][ T2154] ? schedule_preempt_disabled+0x20/0x20 [ 52.147391][ T2154] preempt_schedule_thunk+0x16/0x18 [ 52.152510][ T2154] _raw_spin_unlock+0x60/0x70 [ 52.157025][ T2154] dentry_unlink_inode+0x1e7/0x440 [ 52.161968][ T2154] __dentry_kill+0x447/0x660 [ 52.166394][ T2154] ? lockref_put_return+0xc9/0xe0 [ 52.171255][ T2154] dentry_kill+0xc0/0x2a0 [ 52.175424][ T2154] dput+0x45/0x80 [ 52.178893][ T2154] __fput+0x662/0x910 [ 52.182800][ T2154] ____fput+0x15/0x20 [ 52.186618][ T2154] task_work_run+0x129/0x190 [ 52.191045][ T2154] exit_to_user_mode_loop+0xc4/0xe0 [ 52.196077][ T2154] exit_to_user_mode_prepare+0x5a/0xa0 [ 52.201379][ T2154] syscall_exit_to_user_mode+0x26/0x160 [ 52.206758][ T2154] do_syscall_64+0x49/0xb0 [ 52.211006][ T2154] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 52.216735][ T2154] RIP: 0033:0x7fa3b2faebd9 [ 52.220990][ T2154] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 52.240514][ T2154] RSP: 002b:00007fa3b2230048 EFLAGS: 00000246 ORIG_RAX: 0000000000000003 [ 52.248760][ T2154] RAX: 0000000000000000 RBX: 00007fa3b313cf60 RCX: 00007fa3b2faebd9 [ 52.256570][ T2154] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000003 [ 52.264382][ T2154] RBP: 00007fa3b22300a0 R08: 0000000000000000 R09: 0000000000000000 [ 52.272208][ T2154] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 52.280003][ T2154] R13: 000000000000000b R14: 00007fa3b313cf60 R15: 00007fff909c4ee8 [ 52.287822][ T2154] [ 52.369092][ T2170] device syzkaller0 entered promiscuous mode [ 52.898244][ T2218] device syzkaller0 entered promiscuous mode [ 53.283537][ T1926] syz.1.736 (1926) used greatest stack depth: 21528 bytes left [ 53.365025][ T2258] device syzkaller0 entered promiscuous mode [ 53.678843][ T2305] device syzkaller0 entered promiscuous mode [ 54.374109][ T2357] device syzkaller0 entered promiscuous mode [ 54.926982][ T2399] device syzkaller0 entered promiscuous mode [ 55.321124][ T2437] device syzkaller0 entered promiscuous mode [ 55.851023][ T2479] device syzkaller0 entered promiscuous mode [ 56.297374][ T2510] device syzkaller0 entered promiscuous mode [ 56.984321][ T2563] device syzkaller0 entered promiscuous mode [ 57.391041][ T2592] device syzkaller0 entered promiscuous mode [ 58.014326][ T2640] device syzkaller0 entered promiscuous mode [ 58.513336][ T2678] device syzkaller0 entered promiscuous mode [ 58.864086][ T2734] device syzkaller0 entered promiscuous mode [ 59.333501][ T2781] device syzkaller0 entered promiscuous mode [ 59.514301][ T2820] FAULT_INJECTION: forcing a failure. [ 59.514301][ T2820] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 59.531813][ T2820] CPU: 1 PID: 2820 Comm: syz.1.1163 Not tainted 5.15.151-syzkaller-00415-gdb06c48ab67e #0 [ 59.541716][ T2820] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/07/2024 [ 59.551794][ T2820] Call Trace: [ 59.554908][ T2820] [ 59.557685][ T2820] dump_stack_lvl+0x151/0x1b7 [ 59.562375][ T2820] ? io_uring_drop_tctx_refs+0x190/0x190 [ 59.567840][ T2820] ? bpf_probe_read_compat+0x15c/0x180 [ 59.573137][ T2820] dump_stack+0x15/0x17 [ 59.577127][ T2820] should_fail+0x3c6/0x510 [ 59.581557][ T2820] should_fail_usercopy+0x1a/0x20 [ 59.586421][ T2820] _copy_from_user+0x20/0xd0 [ 59.590840][ T2820] ___sys_recvmsg+0x150/0x690 [ 59.595357][ T2820] ? __sys_recvmsg+0x260/0x260 [ 59.600130][ T2820] ? vfs_write+0x9ec/0x1110 [ 59.604473][ T2820] ? __fdget+0x1bc/0x240 [ 59.608545][ T2820] __x64_sys_recvmsg+0x1dc/0x2b0 [ 59.613317][ T2820] ? fput+0x1a/0x20 [ 59.616965][ T2820] ? ___sys_recvmsg+0x690/0x690 [ 59.621654][ T2820] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 59.627552][ T2820] ? exit_to_user_mode_prepare+0x39/0xa0 [ 59.633021][ T2820] do_syscall_64+0x3d/0xb0 [ 59.637272][ T2820] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 59.643000][ T2820] RIP: 0033:0x7f41670cfbd9 [ 59.647254][ T2820] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 59.666955][ T2820] RSP: 002b:00007f4166351048 EFLAGS: 00000246 ORIG_RAX: 000000000000002f [ 59.675199][ T2820] RAX: ffffffffffffffda RBX: 00007f416725df60 RCX: 00007f41670cfbd9 [ 59.683101][ T2820] RDX: 0000000000000000 RSI: 0000000020000b00 RDI: 0000000000000005 [ 59.690909][ T2820] RBP: 00007f41663510a0 R08: 0000000000000000 R09: 0000000000000000 [ 59.698723][ T2820] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 59.706534][ T2820] R13: 000000000000000b R14: 00007f416725df60 R15: 00007ffd8d222418 [ 59.714353][ T2820] [ 59.739688][ T2821] device syzkaller0 entered promiscuous mode [ 60.083945][ T2862] device syzkaller0 entered promiscuous mode [ 60.152306][ T2861] device syzkaller0 entered promiscuous mode [ 60.383137][ T2902] device syzkaller0 entered promiscuous mode [ 60.662499][ T2937] device syzkaller0 entered promiscuous mode [ 61.263821][ T2979] device syzkaller0 entered promiscuous mode [ 61.867740][ T3036] device syzkaller0 entered promiscuous mode [ 62.203998][ T3062] device syzkaller0 entered promiscuous mode [ 62.482268][ T3105] device syzkaller0 entered promiscuous mode [ 63.356225][ T3141] device syzkaller0 entered promiscuous mode [ 63.538840][ T288] syz-executor (288) used greatest stack depth: 20880 bytes left [ 63.636061][ T3164] bridge0: port 1(bridge_slave_0) entered blocking state [ 63.644756][ T3164] bridge0: port 1(bridge_slave_0) entered disabled state [ 63.658335][ T3164] device bridge_slave_0 entered promiscuous mode [ 63.688724][ T3164] bridge0: port 2(bridge_slave_1) entered blocking state [ 63.714007][ T3164] bridge0: port 2(bridge_slave_1) entered disabled state [ 63.723931][ T3164] device bridge_slave_1 entered promiscuous mode [ 63.903496][ T3191] device syzkaller0 entered promiscuous mode [ 63.937475][ T3164] bridge0: port 2(bridge_slave_1) entered blocking state [ 63.944442][ T3164] bridge0: port 2(bridge_slave_1) entered forwarding state [ 63.951567][ T3164] bridge0: port 1(bridge_slave_0) entered blocking state [ 63.958313][ T3164] bridge0: port 1(bridge_slave_0) entered forwarding state [ 63.992902][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 64.000792][ T20] bridge0: port 1(bridge_slave_0) entered disabled state [ 64.009300][ T20] bridge0: port 2(bridge_slave_1) entered disabled state [ 64.045934][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 64.058798][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 64.071590][ T6] bridge0: port 1(bridge_slave_0) entered blocking state [ 64.078563][ T6] bridge0: port 1(bridge_slave_0) entered forwarding state [ 64.086138][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 64.094812][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 64.103312][ T6] bridge0: port 2(bridge_slave_1) entered blocking state [ 64.110310][ T6] bridge0: port 2(bridge_slave_1) entered forwarding state [ 64.138333][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 64.147661][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 64.156103][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 64.165167][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 64.193281][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 64.216793][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 64.226860][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 64.255569][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 64.289565][ T3164] device veth0_vlan entered promiscuous mode [ 64.302897][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 64.314611][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 64.373990][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 64.383637][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 64.403600][ T3164] device veth1_macvtap entered promiscuous mode [ 64.428899][ T311] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 64.436766][ T311] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 64.446871][ T311] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 64.471611][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 64.482723][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 64.682835][ T292] syz-executor (292) used greatest stack depth: 20864 bytes left [ 64.798585][ T3247] bridge0: port 1(bridge_slave_0) entered blocking state [ 64.806232][ T3247] bridge0: port 1(bridge_slave_0) entered disabled state [ 64.813998][ T3247] device bridge_slave_0 entered promiscuous mode [ 64.821123][ T3247] bridge0: port 2(bridge_slave_1) entered blocking state [ 64.828490][ T3247] bridge0: port 2(bridge_slave_1) entered disabled state [ 64.836252][ T3247] device bridge_slave_1 entered promiscuous mode [ 64.932158][ T3247] bridge0: port 2(bridge_slave_1) entered blocking state [ 64.939263][ T3247] bridge0: port 2(bridge_slave_1) entered forwarding state [ 64.946369][ T3247] bridge0: port 1(bridge_slave_0) entered blocking state [ 64.953411][ T3247] bridge0: port 1(bridge_slave_0) entered forwarding state [ 64.982013][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 64.989839][ T26] bridge0: port 1(bridge_slave_0) entered disabled state [ 65.042265][ T26] bridge0: port 2(bridge_slave_1) entered disabled state [ 65.052622][ T8] device bridge_slave_1 left promiscuous mode [ 65.058662][ T8] bridge0: port 2(bridge_slave_1) entered disabled state [ 65.066769][ T8] device bridge_slave_0 left promiscuous mode [ 65.072941][ T8] bridge0: port 1(bridge_slave_0) entered disabled state [ 65.081350][ T8] device veth1_macvtap left promiscuous mode [ 65.087439][ T8] device veth0_vlan left promiscuous mode [ 65.203826][ T311] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 65.212374][ T311] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 65.220532][ T311] bridge0: port 1(bridge_slave_0) entered blocking state [ 65.227619][ T311] bridge0: port 1(bridge_slave_0) entered forwarding state [ 65.234950][ T311] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 65.243290][ T311] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 65.251717][ T311] bridge0: port 2(bridge_slave_1) entered blocking state [ 65.258590][ T311] bridge0: port 2(bridge_slave_1) entered forwarding state [ 65.288722][ T3247] device veth0_vlan entered promiscuous mode [ 65.303604][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 65.311859][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 65.319810][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 65.329229][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 65.337951][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 65.346444][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 65.355036][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 65.364363][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 65.390022][ T3247] device veth1_macvtap entered promiscuous mode [ 65.413966][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 65.423616][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 65.456615][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 65.486749][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 65.551863][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 65.559421][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 65.568304][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 65.577366][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 65.586206][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 66.283187][ T8] device bridge_slave_1 left promiscuous mode [ 66.292767][ T8] bridge0: port 2(bridge_slave_1) entered disabled state [ 66.304452][ T8] device bridge_slave_0 left promiscuous mode [ 66.310571][ T8] bridge0: port 1(bridge_slave_0) entered disabled state [ 66.318766][ T8] device veth1_macvtap left promiscuous mode [ 66.324835][ T8] device veth0_vlan left promiscuous mode [ 72.424329][ T3899] device syzkaller0 entered promiscuous mode [ 73.129771][ T3929] device syzkaller0 entered promiscuous mode [ 73.634718][ T3971] device syzkaller0 entered promiscuous mode [ 74.246964][ T4009] device syzkaller0 entered promiscuous mode [ 74.775266][ T4049] device syzkaller0 entered promiscuous mode [ 75.025678][ T4071] device syzkaller0 entered promiscuous mode [ 75.327273][ T4093] device syzkaller0 entered promiscuous mode [ 75.599492][ T4137] device syzkaller0 entered promiscuous mode [ 76.328640][ T4161] device syzkaller0 entered promiscuous mode [ 77.357352][ T4195] device syzkaller0 entered promiscuous mode [ 78.232431][ T4244] device syzkaller0 entered promiscuous mode [ 78.486560][ T4278] device syzkaller0 entered promiscuous mode [ 78.757058][ T4313] device syzkaller0 entered promiscuous mode [ 79.007861][ T4335] device syzkaller0 entered promiscuous mode [ 79.232099][ T4357] device syzkaller0 entered promiscuous mode [ 79.463818][ T4393] device syzkaller0 entered promiscuous mode [ 79.797447][ T4439] device syzkaller0 entered promiscuous mode [ 80.400019][ T4465] device syzkaller0 entered promiscuous mode [ 80.890621][ T4516] device syzkaller0 entered promiscuous mode [ 81.344077][ T4541] device syzkaller0 entered promiscuous mode [ 82.241971][ T4585] device syzkaller0 entered promiscuous mode [ 82.820988][ T4625] device syzkaller0 entered promiscuous mode [ 83.277341][ T4652] device syzkaller0 entered promiscuous mode [ 84.074479][ T4694] device syzkaller0 entered promiscuous mode [ 84.309532][ T4729] device syzkaller0 entered promiscuous mode [ 84.948409][ T4757] device syzkaller0 entered promiscuous mode [ 85.217984][ T4778] device syzkaller0 entered promiscuous mode [ 85.769365][ T30] audit: type=1400 audit(1720475845.254:118): avc: denied { remove_name } for pid=82 comm="syslogd" name="messages" dev="tmpfs" ino=2 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 85.791687][ T30] audit: type=1400 audit(1720475845.254:119): avc: denied { rename } for pid=82 comm="syslogd" name="messages" dev="tmpfs" ino=2 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 86.772234][ T4903] bridge0: port 1(bridge_slave_0) entered blocking state [ 86.780610][ T4903] bridge0: port 1(bridge_slave_0) entered disabled state [ 86.788253][ T4903] device bridge_slave_0 entered promiscuous mode [ 86.795958][ T4903] bridge0: port 2(bridge_slave_1) entered blocking state [ 86.802928][ T4903] bridge0: port 2(bridge_slave_1) entered disabled state [ 86.810572][ T4903] device bridge_slave_1 entered promiscuous mode [ 86.912249][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 86.919928][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 86.940707][ T429] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 86.949927][ T429] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 86.958304][ T429] bridge0: port 1(bridge_slave_0) entered blocking state [ 86.965193][ T429] bridge0: port 1(bridge_slave_0) entered forwarding state [ 86.973119][ T429] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 86.982168][ T429] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 86.990278][ T429] bridge0: port 2(bridge_slave_1) entered blocking state [ 86.997160][ T429] bridge0: port 2(bridge_slave_1) entered forwarding state [ 87.014660][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 87.022273][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 87.030362][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 87.038543][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 87.047269][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 87.072599][ T429] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 87.089662][ T429] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 87.110840][ T429] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 87.145630][ T429] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 87.165340][ T4903] device veth0_vlan entered promiscuous mode [ 87.190303][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 87.199488][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 87.217417][ T4903] device veth1_macvtap entered promiscuous mode [ 87.227936][ T310] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 87.240560][ T310] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 87.249059][ T310] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 87.273764][ T429] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 87.292385][ T429] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 87.300739][ T429] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 87.311670][ T429] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 87.466019][ T45] device bridge_slave_1 left promiscuous mode [ 87.474893][ T45] bridge0: port 2(bridge_slave_1) entered disabled state [ 87.526801][ T45] device bridge_slave_0 left promiscuous mode [ 87.539722][ T45] bridge0: port 1(bridge_slave_0) entered disabled state [ 87.572938][ T45] device veth1_macvtap left promiscuous mode [ 87.591479][ T45] device veth0_vlan left promiscuous mode [ 106.356826][ T6307] FAULT_INJECTION: forcing a failure. [ 106.356826][ T6307] name failslab, interval 1, probability 0, space 0, times 1 [ 106.369476][ T6307] CPU: 0 PID: 6307 Comm: syz.0.2781 Not tainted 5.15.151-syzkaller-00415-gdb06c48ab67e #0 [ 106.379192][ T6307] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/07/2024 [ 106.389089][ T6307] Call Trace: [ 106.392213][ T6307] [ 106.394987][ T6307] dump_stack_lvl+0x151/0x1b7 [ 106.399503][ T6307] ? io_uring_drop_tctx_refs+0x190/0x190 [ 106.404976][ T6307] dump_stack+0x15/0x17 [ 106.408960][ T6307] should_fail+0x3c6/0x510 [ 106.413217][ T6307] __should_failslab+0xa4/0xe0 [ 106.417823][ T6307] ? __alloc_skb+0xbe/0x550 [ 106.422240][ T6307] should_failslab+0x9/0x20 [ 106.426580][ T6307] slab_pre_alloc_hook+0x37/0xd0 [ 106.431354][ T6307] ? __alloc_skb+0xbe/0x550 [ 106.435694][ T6307] kmem_cache_alloc+0x44/0x200 [ 106.440294][ T6307] __alloc_skb+0xbe/0x550 [ 106.444464][ T6307] alloc_skb_with_frags+0xa6/0x680 [ 106.449411][ T6307] ? 0xffffffffa0028fb8 [ 106.453403][ T6307] ? is_bpf_text_address+0x172/0x190 [ 106.458522][ T6307] ? stack_trace_save+0x1c0/0x1c0 [ 106.463389][ T6307] sock_alloc_send_pskb+0x915/0xa50 [ 106.468420][ T6307] ? sock_kzfree_s+0x60/0x60 [ 106.472843][ T6307] ? __kasan_check_write+0x14/0x20 [ 106.477899][ T6307] ? _raw_spin_lock_irqsave+0xf9/0x210 [ 106.483970][ T6307] ? __stack_depot_save+0x34/0x470 [ 106.488919][ T6307] tun_get_user+0xf1b/0x3aa0 [ 106.493342][ T6307] ? kasan_set_free_info+0x23/0x40 [ 106.498291][ T6307] ? _kstrtoull+0x3a0/0x4a0 [ 106.502632][ T6307] ? tun_do_read+0x1ef0/0x1ef0 [ 106.507329][ T6307] ? kstrtouint_from_user+0x20a/0x2a0 [ 106.512533][ T6307] ? kstrtol_from_user+0x310/0x310 [ 106.517479][ T6307] ? bpf_ringbuf_query+0xad/0x130 [ 106.522344][ T6307] ? bpf_trace_run3+0x123/0x250 [ 106.527030][ T6307] ? avc_policy_seqno+0x1b/0x70 [ 106.531716][ T6307] ? selinux_file_permission+0x2c4/0x570 [ 106.537185][ T6307] tun_chr_write_iter+0x1e1/0x2e0 [ 106.542044][ T6307] vfs_write+0xd5d/0x1110 [ 106.546212][ T6307] ? kmem_cache_free+0x2c3/0x2e0 [ 106.550987][ T6307] ? file_end_write+0x1c0/0x1c0 [ 106.555682][ T6307] ? __fdget_pos+0x209/0x3a0 [ 106.560096][ T6307] ? ksys_write+0x77/0x2c0 [ 106.564347][ T6307] ksys_write+0x199/0x2c0 [ 106.568513][ T6307] ? __ia32_sys_read+0x90/0x90 [ 106.573112][ T6307] ? debug_smp_processor_id+0x17/0x20 [ 106.578321][ T6307] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 106.584224][ T6307] __x64_sys_write+0x7b/0x90 [ 106.588653][ T6307] do_syscall_64+0x3d/0xb0 [ 106.592904][ T6307] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 106.598632][ T6307] RIP: 0033:0x7f16164adbd9 [ 106.603322][ T6307] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 106.622888][ T6307] RSP: 002b:00007f161572f048 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 106.631125][ T6307] RAX: ffffffffffffffda RBX: 00007f161663bf60 RCX: 00007f16164adbd9 [ 106.638940][ T6307] RDX: 000000000000fdef RSI: 0000000020000300 RDI: 00000000000000c8 [ 106.646748][ T6307] RBP: 00007f161572f0a0 R08: 0000000000000000 R09: 0000000000000000 [ 106.654562][ T6307] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 106.662373][ T6307] R13: 000000000000000b R14: 00007f161663bf60 R15: 00007fff6baa70d8 [ 106.670193][ T6307] [ 107.040529][ T6340] bridge0: port 1(bridge_slave_0) entered blocking state [ 107.047778][ T6340] bridge0: port 1(bridge_slave_0) entered disabled state [ 107.055206][ T6340] device bridge_slave_0 entered promiscuous mode [ 107.065342][ T6340] bridge0: port 2(bridge_slave_1) entered blocking state [ 107.072349][ T6340] bridge0: port 2(bridge_slave_1) entered disabled state [ 107.079861][ T6340] device bridge_slave_1 entered promiscuous mode [ 107.156944][ T6340] bridge0: port 2(bridge_slave_1) entered blocking state [ 107.163850][ T6340] bridge0: port 2(bridge_slave_1) entered forwarding state [ 107.170956][ T6340] bridge0: port 1(bridge_slave_0) entered blocking state [ 107.177837][ T6340] bridge0: port 1(bridge_slave_0) entered forwarding state [ 107.208387][ T4932] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 107.217444][ T4932] bridge0: port 1(bridge_slave_0) entered disabled state [ 107.224854][ T4932] bridge0: port 2(bridge_slave_1) entered disabled state [ 107.245807][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 107.254521][ T20] bridge0: port 1(bridge_slave_0) entered blocking state [ 107.261427][ T20] bridge0: port 1(bridge_slave_0) entered forwarding state [ 107.268746][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 107.277330][ T20] bridge0: port 2(bridge_slave_1) entered blocking state [ 107.284226][ T20] bridge0: port 2(bridge_slave_1) entered forwarding state [ 107.291869][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 107.310485][ T310] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 107.322724][ T4932] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 107.335417][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 107.343610][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 107.350973][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 107.368666][ T6340] device veth0_vlan entered promiscuous mode [ 107.383096][ T6340] device veth1_macvtap entered promiscuous mode [ 107.391946][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 107.416120][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 107.454617][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 107.463782][ T8] device bridge_slave_1 left promiscuous mode [ 107.469730][ T8] bridge0: port 2(bridge_slave_1) entered disabled state [ 107.477696][ T8] device bridge_slave_0 left promiscuous mode [ 107.485055][ T8] bridge0: port 1(bridge_slave_0) entered disabled state [ 107.493569][ T8] device veth1_macvtap left promiscuous mode [ 107.499464][ T8] device veth0_vlan left promiscuous mode [ 107.943429][ T6376] FAULT_INJECTION: forcing a failure. [ 107.943429][ T6376] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 107.956550][ T6376] CPU: 0 PID: 6376 Comm: syz.0.2811 Not tainted 5.15.151-syzkaller-00415-gdb06c48ab67e #0 [ 107.966267][ T6376] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/07/2024 [ 107.976160][ T6376] Call Trace: [ 107.979283][ T6376] [ 107.982061][ T6376] dump_stack_lvl+0x151/0x1b7 [ 107.986578][ T6376] ? io_uring_drop_tctx_refs+0x190/0x190 [ 107.992044][ T6376] dump_stack+0x15/0x17 [ 107.996039][ T6376] should_fail+0x3c6/0x510 [ 108.000292][ T6376] should_fail_usercopy+0x1a/0x20 [ 108.005147][ T6376] _copy_from_user+0x20/0xd0 [ 108.009575][ T6376] __sys_bpf+0x1e9/0x760 [ 108.013656][ T6376] ? fput_many+0x160/0x1b0 [ 108.017905][ T6376] ? bpf_link_show_fdinfo+0x2d0/0x2d0 [ 108.023121][ T6376] ? debug_smp_processor_id+0x17/0x20 [ 108.028322][ T6376] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 108.034226][ T6376] __x64_sys_bpf+0x7c/0x90 [ 108.038482][ T6376] do_syscall_64+0x3d/0xb0 [ 108.042729][ T6376] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 108.048456][ T6376] RIP: 0033:0x7f16164adbd9 [ 108.052713][ T6376] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 108.072156][ T6376] RSP: 002b:00007f161572f048 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 108.080399][ T6376] RAX: ffffffffffffffda RBX: 00007f161663bf60 RCX: 00007f16164adbd9 [ 108.088208][ T6376] RDX: 000000000000002c RSI: 0000000020000080 RDI: 000000000000000a [ 108.096022][ T6376] RBP: 00007f161572f0a0 R08: 0000000000000000 R09: 0000000000000000 [ 108.103833][ T6376] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 108.111642][ T6376] R13: 000000000000000b R14: 00007f161663bf60 R15: 00007fff6baa70d8 [ 108.119461][ T6376] [ 110.086570][ T6529] FAULT_INJECTION: forcing a failure. [ 110.086570][ T6529] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 110.099879][ T6529] CPU: 0 PID: 6529 Comm: syz.0.2884 Not tainted 5.15.151-syzkaller-00415-gdb06c48ab67e #0 [ 110.109627][ T6529] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/07/2024 [ 110.119517][ T6529] Call Trace: [ 110.122647][ T6529] [ 110.125419][ T6529] dump_stack_lvl+0x151/0x1b7 [ 110.129938][ T6529] ? io_uring_drop_tctx_refs+0x190/0x190 [ 110.135398][ T6529] ? _raw_spin_lock_irqsave+0xf9/0x210 [ 110.140696][ T6529] ? kmem_cache_free+0x116/0x2e0 [ 110.145476][ T6529] ? _raw_spin_lock+0x1b0/0x1b0 [ 110.150151][ T6529] dump_stack+0x15/0x17 [ 110.154143][ T6529] should_fail+0x3c6/0x510 [ 110.158396][ T6529] should_fail_usercopy+0x1a/0x20 [ 110.163260][ T6529] _copy_from_user+0x20/0xd0 [ 110.167687][ T6529] __copy_msghdr_from_user+0xaf/0x7c0 [ 110.172893][ T6529] ? __ia32_sys_shutdown+0x70/0x70 [ 110.177841][ T6529] ___sys_sendmsg+0x166/0x2e0 [ 110.182351][ T6529] ? __sys_sendmsg+0x260/0x260 [ 110.186965][ T6529] ? __fdget+0x1bc/0x240 [ 110.191034][ T6529] __se_sys_sendmsg+0x19a/0x260 [ 110.195719][ T6529] ? __x64_sys_sendmsg+0x90/0x90 [ 110.200491][ T6529] ? ksys_write+0x260/0x2c0 [ 110.204834][ T6529] ? debug_smp_processor_id+0x17/0x20 [ 110.210043][ T6529] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 110.215946][ T6529] __x64_sys_sendmsg+0x7b/0x90 [ 110.220542][ T6529] do_syscall_64+0x3d/0xb0 [ 110.224795][ T6529] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 110.230525][ T6529] RIP: 0033:0x7f16164adbd9 [ 110.234786][ T6529] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 110.254220][ T6529] RSP: 002b:00007f161572f048 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 110.262457][ T6529] RAX: ffffffffffffffda RBX: 00007f161663bf60 RCX: 00007f16164adbd9 [ 110.270267][ T6529] RDX: 0000000000000000 RSI: 0000000020000040 RDI: 0000000000000007 [ 110.278082][ T6529] RBP: 00007f161572f0a0 R08: 0000000000000000 R09: 0000000000000000 [ 110.285890][ T6529] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 110.293703][ T6529] R13: 000000000000000b R14: 00007f161663bf60 R15: 00007fff6baa70d8 [ 110.301607][ T6529] [ 111.187179][ T30] audit: type=1400 audit(1720475870.674:120): avc: denied { create } for pid=6589 comm="syz.2.2910" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=atmpvc_socket permissive=1 [ 111.232413][ T6594] FAULT_INJECTION: forcing a failure. [ 111.232413][ T6594] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 111.246140][ T6594] CPU: 1 PID: 6594 Comm: syz.2.2912 Not tainted 5.15.151-syzkaller-00415-gdb06c48ab67e #0 [ 111.255877][ T6594] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/07/2024 [ 111.265759][ T6594] Call Trace: [ 111.268882][ T6594] [ 111.271659][ T6594] dump_stack_lvl+0x151/0x1b7 [ 111.276176][ T6594] ? io_uring_drop_tctx_refs+0x190/0x190 [ 111.281643][ T6594] dump_stack+0x15/0x17 [ 111.285634][ T6594] should_fail+0x3c6/0x510 [ 111.289888][ T6594] should_fail_usercopy+0x1a/0x20 [ 111.294748][ T6594] _copy_from_user+0x20/0xd0 [ 111.299175][ T6594] __sys_bpf+0x1e9/0x760 [ 111.303252][ T6594] ? fput_many+0x160/0x1b0 [ 111.307504][ T6594] ? bpf_link_show_fdinfo+0x2d0/0x2d0 [ 111.312717][ T6594] ? debug_smp_processor_id+0x17/0x20 [ 111.317918][ T6594] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 111.323821][ T6594] __x64_sys_bpf+0x7c/0x90 [ 111.328075][ T6594] do_syscall_64+0x3d/0xb0 [ 111.332332][ T6594] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 111.338056][ T6594] RIP: 0033:0x7f28a8988bd9 [ 111.342311][ T6594] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 111.361750][ T6594] RSP: 002b:00007f28a7c0a048 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 111.369998][ T6594] RAX: ffffffffffffffda RBX: 00007f28a8b16f60 RCX: 00007f28a8988bd9 [ 111.377805][ T6594] RDX: 000000000000001e RSI: 0000000020000080 RDI: 000000000000000a [ 111.385617][ T6594] RBP: 00007f28a7c0a0a0 R08: 0000000000000000 R09: 0000000000000000 [ 111.393429][ T6594] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 111.401244][ T6594] R13: 000000000000000b R14: 00007f28a8b16f60 R15: 00007ffe4566ae48 [ 111.409057][ T6594] [ 111.716193][ T6645] FAULT_INJECTION: forcing a failure. [ 111.716193][ T6645] name failslab, interval 1, probability 0, space 0, times 0 [ 111.728745][ T6645] CPU: 1 PID: 6645 Comm: syz.4.2936 Not tainted 5.15.151-syzkaller-00415-gdb06c48ab67e #0 [ 111.738638][ T6645] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/07/2024 [ 111.748531][ T6645] Call Trace: [ 111.751652][ T6645] [ 111.754430][ T6645] dump_stack_lvl+0x151/0x1b7 [ 111.758943][ T6645] ? io_uring_drop_tctx_refs+0x190/0x190 [ 111.764413][ T6645] dump_stack+0x15/0x17 [ 111.768402][ T6645] should_fail+0x3c6/0x510 [ 111.772655][ T6645] __should_failslab+0xa4/0xe0 [ 111.777255][ T6645] ? __alloc_skb+0xbe/0x550 [ 111.781596][ T6645] should_failslab+0x9/0x20 [ 111.785934][ T6645] slab_pre_alloc_hook+0x37/0xd0 [ 111.790708][ T6645] ? __alloc_skb+0xbe/0x550 [ 111.795049][ T6645] kmem_cache_alloc+0x44/0x200 [ 111.799649][ T6645] __alloc_skb+0xbe/0x550 [ 111.803814][ T6645] alloc_skb_with_frags+0xa6/0x680 [ 111.808761][ T6645] ? 0xffffffffa0028b44 [ 111.812752][ T6645] ? is_bpf_text_address+0x172/0x190 [ 111.817872][ T6645] ? stack_trace_save+0x1c0/0x1c0 [ 111.822736][ T6645] sock_alloc_send_pskb+0x915/0xa50 [ 111.827771][ T6645] ? sock_kzfree_s+0x60/0x60 [ 111.832194][ T6645] ? __kasan_check_write+0x14/0x20 [ 111.837143][ T6645] ? _raw_spin_lock_irqsave+0xf9/0x210 [ 111.842437][ T6645] ? __stack_depot_save+0x34/0x470 [ 111.847387][ T6645] tun_get_user+0xf1b/0x3aa0 [ 111.851810][ T6645] ? kasan_set_free_info+0x23/0x40 [ 111.856760][ T6645] ? _kstrtoull+0x3a0/0x4a0 [ 111.861096][ T6645] ? tun_do_read+0x1ef0/0x1ef0 [ 111.865694][ T6645] ? kstrtouint_from_user+0x20a/0x2a0 [ 111.870903][ T6645] ? kstrtol_from_user+0x310/0x310 [ 111.875852][ T6645] ? bpf_trace_run3+0x123/0x250 [ 111.880540][ T6645] ? avc_policy_seqno+0x1b/0x70 [ 111.885224][ T6645] ? selinux_file_permission+0x2c4/0x570 [ 111.890694][ T6645] tun_chr_write_iter+0x1e1/0x2e0 [ 111.895554][ T6645] vfs_write+0xd5d/0x1110 [ 111.899721][ T6645] ? kmem_cache_free+0x2c3/0x2e0 [ 111.904495][ T6645] ? file_end_write+0x1c0/0x1c0 [ 111.909185][ T6645] ? __fdget_pos+0x209/0x3a0 [ 111.913604][ T6645] ? ksys_write+0x77/0x2c0 [ 111.917857][ T6645] ksys_write+0x199/0x2c0 [ 111.922024][ T6645] ? __ia32_sys_read+0x90/0x90 [ 111.926626][ T6645] ? debug_smp_processor_id+0x17/0x20 [ 111.931833][ T6645] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 111.937734][ T6645] __x64_sys_write+0x7b/0x90 [ 111.942160][ T6645] do_syscall_64+0x3d/0xb0 [ 111.946411][ T6645] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 111.952143][ T6645] RIP: 0033:0x7fd96307ebd9 [ 111.956396][ T6645] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 111.975835][ T6645] RSP: 002b:00007fd962300048 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 111.984602][ T6645] RAX: ffffffffffffffda RBX: 00007fd96320cf60 RCX: 00007fd96307ebd9 [ 111.992413][ T6645] RDX: 000000000000fdef RSI: 0000000020000300 RDI: 00000000000000c8 [ 112.000225][ T6645] RBP: 00007fd9623000a0 R08: 0000000000000000 R09: 0000000000000000 [ 112.008036][ T6645] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 112.015848][ T6645] R13: 000000000000000b R14: 00007fd96320cf60 R15: 00007ffe41a86318 [ 112.023664][ T6645] [ 112.553163][ T6667] device pim6reg1 entered promiscuous mode [ 112.844671][ T6678] bridge0: port 1(bridge_slave_0) entered blocking state [ 112.877455][ T6678] bridge0: port 1(bridge_slave_0) entered disabled state [ 112.886586][ T6678] device bridge_slave_0 entered promiscuous mode [ 112.899162][ T6678] bridge0: port 2(bridge_slave_1) entered blocking state [ 112.906099][ T6678] bridge0: port 2(bridge_slave_1) entered disabled state [ 112.914804][ T6678] device bridge_slave_1 entered promiscuous mode [ 113.039510][ T6678] bridge0: port 2(bridge_slave_1) entered blocking state [ 113.046429][ T6678] bridge0: port 2(bridge_slave_1) entered forwarding state [ 113.053643][ T6678] bridge0: port 1(bridge_slave_0) entered blocking state [ 113.060486][ T6678] bridge0: port 1(bridge_slave_0) entered forwarding state [ 113.088987][ T311] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 113.097311][ T311] bridge0: port 1(bridge_slave_0) entered disabled state [ 113.104837][ T311] bridge0: port 2(bridge_slave_1) entered disabled state [ 113.139871][ T6678] device veth0_vlan entered promiscuous mode [ 113.159972][ T6678] device veth1_macvtap entered promiscuous mode [ 113.168566][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 113.177292][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 113.212103][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 113.219452][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 113.226940][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 113.235196][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 113.243305][ T26] bridge0: port 1(bridge_slave_0) entered blocking state [ 113.250157][ T26] bridge0: port 1(bridge_slave_0) entered forwarding state [ 113.257428][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 113.265574][ T26] bridge0: port 2(bridge_slave_1) entered blocking state [ 113.272453][ T26] bridge0: port 2(bridge_slave_1) entered forwarding state [ 113.279696][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 113.287643][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 113.308756][ T311] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 113.317212][ T311] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 113.452285][ T428] device bridge_slave_1 left promiscuous mode [ 113.458757][ T428] bridge0: port 2(bridge_slave_1) entered disabled state [ 113.466705][ T428] device bridge_slave_0 left promiscuous mode [ 113.473157][ T428] bridge0: port 1(bridge_slave_0) entered disabled state [ 113.482021][ T428] device veth1_macvtap left promiscuous mode [ 113.488070][ T428] device veth0_vlan left promiscuous mode [ 113.782484][ T6753] FAULT_INJECTION: forcing a failure. [ 113.782484][ T6753] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 113.795577][ T6753] CPU: 0 PID: 6753 Comm: syz.3.2981 Not tainted 5.15.151-syzkaller-00415-gdb06c48ab67e #0 [ 113.805294][ T6753] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/07/2024 [ 113.815276][ T6753] Call Trace: [ 113.818397][ T6753] [ 113.821177][ T6753] dump_stack_lvl+0x151/0x1b7 [ 113.825689][ T6753] ? io_uring_drop_tctx_refs+0x190/0x190 [ 113.831162][ T6753] dump_stack+0x15/0x17 [ 113.835151][ T6753] should_fail+0x3c6/0x510 [ 113.839408][ T6753] should_fail_usercopy+0x1a/0x20 [ 113.844263][ T6753] _copy_to_user+0x20/0x90 [ 113.848518][ T6753] simple_read_from_buffer+0xc7/0x150 [ 113.853726][ T6753] proc_fail_nth_read+0x1a3/0x210 [ 113.858583][ T6753] ? proc_fault_inject_write+0x390/0x390 [ 113.864052][ T6753] ? fsnotify_perm+0x470/0x5d0 [ 113.868652][ T6753] ? security_file_permission+0x86/0xb0 [ 113.874032][ T6753] ? proc_fault_inject_write+0x390/0x390 [ 113.879500][ T6753] vfs_read+0x27d/0xd40 [ 113.883490][ T6753] ? rcu_gp_kthread_wake+0x90/0x90 [ 113.888438][ T6753] ? kernel_read+0x1f0/0x1f0 [ 113.892865][ T6753] ? __kasan_check_write+0x14/0x20 [ 113.897811][ T6753] ? mutex_lock+0xb6/0x1e0 [ 113.902067][ T6753] ? wait_for_completion_killable_timeout+0x10/0x10 [ 113.908491][ T6753] ? __fdget_pos+0x2e7/0x3a0 [ 113.912915][ T6753] ? ksys_read+0x77/0x2c0 [ 113.917079][ T6753] ksys_read+0x199/0x2c0 [ 113.921159][ T6753] ? vfs_write+0x1110/0x1110 [ 113.925583][ T6753] ? __kasan_check_read+0x11/0x20 [ 113.930449][ T6753] __x64_sys_read+0x7b/0x90 [ 113.934788][ T6753] do_syscall_64+0x3d/0xb0 [ 113.939039][ T6753] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 113.944773][ T6753] RIP: 0033:0x7f1f3bc846bc [ 113.949021][ T6753] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 c9 8c 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 1f 8d 02 00 48 [ 113.968462][ T6753] RSP: 002b:00007f1f3af07040 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 113.976705][ T6753] RAX: ffffffffffffffda RBX: 00007f1f3be13f60 RCX: 00007f1f3bc846bc [ 113.984515][ T6753] RDX: 000000000000000f RSI: 00007f1f3af070b0 RDI: 0000000000000009 [ 113.992326][ T6753] RBP: 00007f1f3af070a0 R08: 0000000000000000 R09: 0000000000000000 [ 114.000140][ T6753] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 114.007949][ T6753] R13: 000000000000000b R14: 00007f1f3be13f60 R15: 00007ffd1e6b8db8 [ 114.015768][ T6753] [ 114.111814][ T6779] FAULT_INJECTION: forcing a failure. [ 114.111814][ T6779] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 114.125224][ T6779] CPU: 0 PID: 6779 Comm: syz.3.2993 Not tainted 5.15.151-syzkaller-00415-gdb06c48ab67e #0 [ 114.134947][ T6779] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/07/2024 [ 114.144840][ T6779] Call Trace: [ 114.147962][ T6779] [ 114.150742][ T6779] dump_stack_lvl+0x151/0x1b7 [ 114.155257][ T6779] ? io_uring_drop_tctx_refs+0x190/0x190 [ 114.160724][ T6779] dump_stack+0x15/0x17 [ 114.164716][ T6779] should_fail+0x3c6/0x510 [ 114.168970][ T6779] should_fail_usercopy+0x1a/0x20 [ 114.173830][ T6779] _copy_from_user+0x20/0xd0 [ 114.178253][ T6779] __sys_bpf+0x1e9/0x760 [ 114.182335][ T6779] ? fput_many+0x160/0x1b0 [ 114.186587][ T6779] ? bpf_link_show_fdinfo+0x2d0/0x2d0 [ 114.191881][ T6779] ? debug_smp_processor_id+0x17/0x20 [ 114.197086][ T6779] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 114.202990][ T6779] __x64_sys_bpf+0x7c/0x90 [ 114.207245][ T6779] do_syscall_64+0x3d/0xb0 [ 114.211495][ T6779] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 114.217222][ T6779] RIP: 0033:0x7f1f3bc85bd9 [ 114.221479][ T6779] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 114.240919][ T6779] RSP: 002b:00007f1f3af07048 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 114.249170][ T6779] RAX: ffffffffffffffda RBX: 00007f1f3be13f60 RCX: 00007f1f3bc85bd9 [ 114.256974][ T6779] RDX: 0000000000000080 RSI: 0000000020000300 RDI: 0000000000000005 [ 114.264784][ T6779] RBP: 00007f1f3af070a0 R08: 0000000000000000 R09: 0000000000000000 [ 114.272596][ T6779] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 114.280409][ T6779] R13: 000000000000000b R14: 00007f1f3be13f60 R15: 00007ffd1e6b8db8 [ 114.288232][ T6779] [ 114.927828][ T6820] FAULT_INJECTION: forcing a failure. [ 114.927828][ T6820] name failslab, interval 1, probability 0, space 0, times 0 [ 114.948231][ T6820] CPU: 1 PID: 6820 Comm: syz.2.3009 Not tainted 5.15.151-syzkaller-00415-gdb06c48ab67e #0 [ 114.957977][ T6820] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/07/2024 [ 114.967859][ T6820] Call Trace: [ 114.970980][ T6820] [ 114.973758][ T6820] dump_stack_lvl+0x151/0x1b7 [ 114.978712][ T6820] ? io_uring_drop_tctx_refs+0x190/0x190 [ 114.984191][ T6820] dump_stack+0x15/0x17 [ 114.988167][ T6820] should_fail+0x3c6/0x510 [ 114.992419][ T6820] __should_failslab+0xa4/0xe0 [ 114.997014][ T6820] ? __alloc_skb+0xbe/0x550 [ 115.001353][ T6820] should_failslab+0x9/0x20 [ 115.005697][ T6820] slab_pre_alloc_hook+0x37/0xd0 [ 115.010471][ T6820] ? __alloc_skb+0xbe/0x550 [ 115.014810][ T6820] kmem_cache_alloc+0x44/0x200 [ 115.019410][ T6820] __alloc_skb+0xbe/0x550 [ 115.023578][ T6820] alloc_skb_with_frags+0xa6/0x680 [ 115.028523][ T6820] ? 0xffffffffa0028264 [ 115.032512][ T6820] ? is_bpf_text_address+0x172/0x190 [ 115.037631][ T6820] ? stack_trace_save+0x1c0/0x1c0 [ 115.042492][ T6820] sock_alloc_send_pskb+0x915/0xa50 [ 115.047533][ T6820] ? sock_kzfree_s+0x60/0x60 [ 115.051952][ T6820] ? stack_trace_snprint+0xf0/0xf0 [ 115.056903][ T6820] ? __stack_depot_save+0x34/0x470 [ 115.061846][ T6820] tun_get_user+0xf1b/0x3aa0 [ 115.066282][ T6820] ? kasan_set_track+0x4b/0x70 [ 115.070876][ T6820] ? kasan_set_free_info+0x23/0x40 [ 115.075824][ T6820] ? _kstrtoull+0x3a0/0x4a0 [ 115.080159][ T6820] ? tun_do_read+0x1ef0/0x1ef0 [ 115.084783][ T6820] ? kstrtouint_from_user+0x20a/0x2a0 [ 115.089967][ T6820] ? kstrtol_from_user+0x310/0x310 [ 115.094916][ T6820] ? bpf_trace_run3+0x123/0x250 [ 115.099601][ T6820] ? avc_policy_seqno+0x1b/0x70 [ 115.104300][ T6820] ? selinux_file_permission+0x2c4/0x570 [ 115.109762][ T6820] tun_chr_write_iter+0x1e1/0x2e0 [ 115.114629][ T6820] vfs_write+0xd5d/0x1110 [ 115.118782][ T6820] ? kmem_cache_free+0x2c3/0x2e0 [ 115.123558][ T6820] ? file_end_write+0x1c0/0x1c0 [ 115.128246][ T6820] ? __fdget_pos+0x209/0x3a0 [ 115.132668][ T6820] ? ksys_write+0x77/0x2c0 [ 115.136922][ T6820] ksys_write+0x199/0x2c0 [ 115.141098][ T6820] ? __ia32_sys_read+0x90/0x90 [ 115.145695][ T6820] ? debug_smp_processor_id+0x17/0x20 [ 115.150901][ T6820] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 115.156798][ T6820] __x64_sys_write+0x7b/0x90 [ 115.161226][ T6820] do_syscall_64+0x3d/0xb0 [ 115.165475][ T6820] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 115.171204][ T6820] RIP: 0033:0x7f28a8988bd9 [ 115.175461][ T6820] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 115.194903][ T6820] RSP: 002b:00007f28a7c0a048 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 115.203143][ T6820] RAX: ffffffffffffffda RBX: 00007f28a8b16f60 RCX: 00007f28a8988bd9 [ 115.210954][ T6820] RDX: 000000000000fdef RSI: 0000000020000000 RDI: 00000000000000c8 [ 115.218765][ T6820] RBP: 00007f28a7c0a0a0 R08: 0000000000000000 R09: 0000000000000000 [ 115.226579][ T6820] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 115.234387][ T6820] R13: 000000000000000b R14: 00007f28a8b16f60 R15: 00007ffe4566ae48 [ 115.242204][ T6820] [ 117.681300][ T6908] FAULT_INJECTION: forcing a failure. [ 117.681300][ T6908] name failslab, interval 1, probability 0, space 0, times 0 [ 117.693732][ T6908] CPU: 0 PID: 6908 Comm: syz.4.3045 Not tainted 5.15.151-syzkaller-00415-gdb06c48ab67e #0 [ 117.703449][ T6908] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/07/2024 [ 117.713345][ T6908] Call Trace: [ 117.716466][ T6908] [ 117.719336][ T6908] dump_stack_lvl+0x151/0x1b7 [ 117.723941][ T6908] ? io_uring_drop_tctx_refs+0x190/0x190 [ 117.729412][ T6908] ? perf_swevent_hrtimer+0x4b8/0x560 [ 117.734614][ T6908] dump_stack+0x15/0x17 [ 117.738607][ T6908] should_fail+0x3c6/0x510 [ 117.742861][ T6908] __should_failslab+0xa4/0xe0 [ 117.747456][ T6908] ? __sigqueue_alloc+0x130/0x200 [ 117.752319][ T6908] should_failslab+0x9/0x20 [ 117.756657][ T6908] slab_pre_alloc_hook+0x37/0xd0 [ 117.761430][ T6908] ? __sigqueue_alloc+0x130/0x200 [ 117.766295][ T6908] kmem_cache_alloc+0x44/0x200 [ 117.770897][ T6908] __sigqueue_alloc+0x130/0x200 [ 117.775580][ T6908] __send_signal+0x1fd/0xcb0 [ 117.780013][ T6908] send_signal+0x43a/0x590 [ 117.784260][ T6908] force_sig_info_to_task+0x2fe/0x440 [ 117.789555][ T6908] force_sig+0x114/0x1d0 [ 117.793628][ T6908] ? send_sig+0x60/0x60 [ 117.797621][ T6908] ? hrtimer_interrupt+0x867/0xaa0 [ 117.802568][ T6908] exc_general_protection+0x11d/0x4b0 [ 117.807860][ T6908] ? kvm_sched_clock_read+0x18/0x40 [ 117.812894][ T6908] ? sched_clock+0x9/0x10 [ 117.817063][ T6908] ? sched_clock_cpu+0x18/0x3b0 [ 117.821751][ T6908] ? irqentry_exit_to_user_mode+0x17/0x20 [ 117.827306][ T6908] ? irqentry_exit+0x12/0x40 [ 117.831731][ T6908] asm_exc_general_protection+0x27/0x30 [ 117.837111][ T6908] RIP: 0033:0x7fd9630574f9 [ 117.841372][ T6908] Code: f8 77 c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 89 f8 48 89 fa c5 f9 ef c0 25 ff 0f 00 00 3d e0 0f 00 00 0f 87 27 01 00 00 fd 74 0f c5 fd d7 c1 85 c0 74 5b f3 0f bc c0 e9 30 01 00 00 66 [ 117.860810][ T6908] RSP: 002b:00007fd9622de7d8 EFLAGS: 00010283 [ 117.866707][ T6908] RAX: 0000000000000999 RBX: 00007fd9622ded40 RCX: 00007fd9631ce160 [ 117.874518][ T6908] RDX: 9999999999999999 RSI: 00007fd9630ec344 RDI: 9999999999999999 [ 117.882327][ T6908] RBP: 000000000000000b R08: 0000000000000000 R09: 0000000000000000 [ 117.890139][ T6908] R10: 00000000ffffffff R11: 0000000000000000 R12: 0000000000000073 [ 117.897952][ T6908] R13: 00007fd9622deec0 R14: 9999999999999999 R15: 0000000000000000 [ 117.905771][ T6908] [ 118.079616][ T6920] device pim6reg1 entered promiscuous mode [ 118.888884][ T6975] FAULT_INJECTION: forcing a failure. [ 118.888884][ T6975] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 119.021813][ T6975] CPU: 1 PID: 6975 Comm: syz.0.3064 Not tainted 5.15.151-syzkaller-00415-gdb06c48ab67e #0 [ 119.031642][ T6975] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/07/2024 [ 119.041534][ T6975] Call Trace: [ 119.044657][ T6975] [ 119.047438][ T6975] dump_stack_lvl+0x151/0x1b7 [ 119.051947][ T6975] ? io_uring_drop_tctx_refs+0x190/0x190 [ 119.057424][ T6975] dump_stack+0x15/0x17 [ 119.061417][ T6975] should_fail+0x3c6/0x510 [ 119.065661][ T6975] should_fail_usercopy+0x1a/0x20 [ 119.070519][ T6975] _copy_from_user+0x20/0xd0 [ 119.074951][ T6975] __sys_bpf+0x1e9/0x760 [ 119.079030][ T6975] ? fput_many+0x160/0x1b0 [ 119.083281][ T6975] ? bpf_link_show_fdinfo+0x2d0/0x2d0 [ 119.088490][ T6975] ? debug_smp_processor_id+0x17/0x20 [ 119.093693][ T6975] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 119.099600][ T6975] __x64_sys_bpf+0x7c/0x90 [ 119.103855][ T6975] do_syscall_64+0x3d/0xb0 [ 119.108100][ T6975] ? sysvec_apic_timer_interrupt+0x55/0xc0 [ 119.113745][ T6975] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 119.119471][ T6975] RIP: 0033:0x7f463eaddbd9 [ 119.123726][ T6975] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 119.143170][ T6975] RSP: 002b:00007f463dd5f048 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 119.151410][ T6975] RAX: ffffffffffffffda RBX: 00007f463ec6bf60 RCX: 00007f463eaddbd9 [ 119.159231][ T6975] RDX: 0000000000000020 RSI: 0000000020000400 RDI: 0000000000000015 [ 119.167034][ T6975] RBP: 00007f463dd5f0a0 R08: 0000000000000000 R09: 0000000000000000 [ 119.174845][ T6975] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 119.182658][ T6975] R13: 000000000000000b R14: 00007f463ec6bf60 R15: 00007ffd94b575e8 [ 119.190475][ T6975] [ 120.510212][ T7036] FAULT_INJECTION: forcing a failure. [ 120.510212][ T7036] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 120.531503][ T7036] CPU: 1 PID: 7036 Comm: syz.4.3087 Not tainted 5.15.151-syzkaller-00415-gdb06c48ab67e #0 [ 120.541235][ T7036] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/07/2024 [ 120.551131][ T7036] Call Trace: [ 120.554259][ T7036] [ 120.557030][ T7036] dump_stack_lvl+0x151/0x1b7 [ 120.561545][ T7036] ? io_uring_drop_tctx_refs+0x190/0x190 [ 120.567021][ T7036] dump_stack+0x15/0x17 [ 120.571005][ T7036] should_fail+0x3c6/0x510 [ 120.575256][ T7036] should_fail_usercopy+0x1a/0x20 [ 120.580117][ T7036] _copy_from_user+0x20/0xd0 [ 120.584542][ T7036] __sys_bpf+0x1e9/0x760 [ 120.588619][ T7036] ? fput_many+0x160/0x1b0 [ 120.592874][ T7036] ? bpf_link_show_fdinfo+0x2d0/0x2d0 [ 120.598093][ T7036] ? debug_smp_processor_id+0x17/0x20 [ 120.603289][ T7036] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 120.609201][ T7036] __x64_sys_bpf+0x7c/0x90 [ 120.613452][ T7036] do_syscall_64+0x3d/0xb0 [ 120.617697][ T7036] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 120.623453][ T7036] RIP: 0033:0x7fd96307ebd9 [ 120.627681][ T7036] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 120.647120][ T7036] RSP: 002b:00007fd962300048 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 120.655364][ T7036] RAX: ffffffffffffffda RBX: 00007fd96320cf60 RCX: 00007fd96307ebd9 [ 120.663178][ T7036] RDX: 0000000000000028 RSI: 0000000020000080 RDI: 000000000000000a [ 120.671105][ T7036] RBP: 00007fd9623000a0 R08: 0000000000000000 R09: 0000000000000000 [ 120.678915][ T7036] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 120.686728][ T7036] R13: 000000000000000b R14: 00007fd96320cf60 R15: 00007ffe41a86318 [ 120.694546][ T7036] [ 122.672026][ T7108] FAULT_INJECTION: forcing a failure. [ 122.672026][ T7108] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 122.688175][ T7108] CPU: 1 PID: 7108 Comm: syz.3.3117 Not tainted 5.15.151-syzkaller-00415-gdb06c48ab67e #0 [ 122.697919][ T7108] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/07/2024 [ 122.707823][ T7108] Call Trace: [ 122.710936][ T7108] [ 122.713844][ T7108] dump_stack_lvl+0x151/0x1b7 [ 122.718346][ T7108] ? io_uring_drop_tctx_refs+0x190/0x190 [ 122.723816][ T7108] dump_stack+0x15/0x17 [ 122.727801][ T7108] should_fail+0x3c6/0x510 [ 122.732079][ T7108] should_fail_usercopy+0x1a/0x20 [ 122.736919][ T7108] _copy_from_user+0x20/0xd0 [ 122.741352][ T7108] __sys_bpf+0x1e9/0x760 [ 122.745421][ T7108] ? fput_many+0x160/0x1b0 [ 122.749671][ T7108] ? bpf_link_show_fdinfo+0x2d0/0x2d0 [ 122.754887][ T7108] ? debug_smp_processor_id+0x17/0x20 [ 122.760107][ T7108] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 122.765996][ T7108] __x64_sys_bpf+0x7c/0x90 [ 122.770331][ T7108] do_syscall_64+0x3d/0xb0 [ 122.774589][ T7108] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 122.780529][ T7108] RIP: 0033:0x7f1f3bc85bd9 [ 122.784903][ T7108] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 122.805960][ T7108] RSP: 002b:00007f1f3af07048 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 122.814321][ T7108] RAX: ffffffffffffffda RBX: 00007f1f3be13f60 RCX: 00007f1f3bc85bd9 [ 122.822142][ T7108] RDX: 0000000000000048 RSI: 0000000020000140 RDI: 2000000000000000 [ 122.829942][ T7108] RBP: 00007f1f3af070a0 R08: 0000000000000000 R09: 0000000000000000 [ 122.837754][ T7108] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 122.845566][ T7108] R13: 000000000000000b R14: 00007f1f3be13f60 R15: 00007ffd1e6b8db8 [ 122.853386][ T7108] [ 122.894184][ T7110] device wg2 entered promiscuous mode [ 155.207151][ T8287] bridge0: port 1(bridge_slave_0) entered blocking state [ 155.214275][ T8287] bridge0: port 1(bridge_slave_0) entered disabled state [ 155.221819][ T8287] device bridge_slave_0 entered promiscuous mode [ 155.229037][ T8287] bridge0: port 2(bridge_slave_1) entered blocking state [ 155.236082][ T8287] bridge0: port 2(bridge_slave_1) entered disabled state [ 155.243591][ T8287] device bridge_slave_1 entered promiscuous mode [ 156.273544][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 156.283037][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 156.307749][ T311] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 156.318355][ T311] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 156.334183][ T311] bridge0: port 1(bridge_slave_0) entered blocking state [ 156.341087][ T311] bridge0: port 1(bridge_slave_0) entered forwarding state [ 156.397902][ T311] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 156.454826][ T311] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 156.516549][ T311] bridge0: port 2(bridge_slave_1) entered blocking state [ 156.523556][ T311] bridge0: port 2(bridge_slave_1) entered forwarding state [ 156.578971][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 156.612072][ T428] device bridge_slave_1 left promiscuous mode [ 156.619210][ T428] bridge0: port 2(bridge_slave_1) entered disabled state [ 156.644258][ T428] device bridge_slave_0 left promiscuous mode [ 156.654592][ T428] bridge0: port 1(bridge_slave_0) entered disabled state [ 156.669253][ T428] device veth1_macvtap left promiscuous mode [ 156.679506][ T428] device veth0_vlan left promiscuous mode [ 156.855395][ T429] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 156.865519][ T429] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 156.890569][ T460] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 156.931808][ T4932] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 156.940190][ T4932] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 156.947933][ T4932] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 156.980040][ T8287] device veth0_vlan entered promiscuous mode [ 157.046084][ T4932] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 157.071192][ T8287] device veth1_macvtap entered promiscuous mode [ 157.129728][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 157.170258][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 157.285904][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 157.352779][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 196.728097][ T9514] bridge0: port 1(bridge_slave_0) entered blocking state [ 196.775504][ T9514] bridge0: port 1(bridge_slave_0) entered disabled state [ 196.826474][ T9514] device bridge_slave_0 entered promiscuous mode [ 196.908058][ T9514] bridge0: port 2(bridge_slave_1) entered blocking state [ 196.947114][ T9514] bridge0: port 2(bridge_slave_1) entered disabled state [ 196.998116][ T9514] device bridge_slave_1 entered promiscuous mode [ 197.338073][ T9533] bridge0: port 1(bridge_slave_0) entered blocking state [ 197.355021][ T9533] bridge0: port 1(bridge_slave_0) entered disabled state [ 197.363442][ T9533] device bridge_slave_0 entered promiscuous mode [ 197.411536][ T9533] bridge0: port 2(bridge_slave_1) entered blocking state [ 197.418443][ T9533] bridge0: port 2(bridge_slave_1) entered disabled state [ 197.425812][ T9533] device bridge_slave_1 entered promiscuous mode [ 197.495346][ T9514] bridge0: port 2(bridge_slave_1) entered blocking state [ 197.502244][ T9514] bridge0: port 2(bridge_slave_1) entered forwarding state [ 197.509351][ T9514] bridge0: port 1(bridge_slave_0) entered blocking state [ 197.516275][ T9514] bridge0: port 1(bridge_slave_0) entered forwarding state [ 197.525245][ T60] bridge0: port 1(bridge_slave_0) entered disabled state [ 197.535861][ T60] bridge0: port 2(bridge_slave_1) entered disabled state [ 197.630733][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 197.639584][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 197.647745][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 197.656239][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 197.664648][ T6] bridge0: port 1(bridge_slave_0) entered blocking state [ 197.671536][ T6] bridge0: port 1(bridge_slave_0) entered forwarding state [ 197.679080][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 197.687442][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 197.695897][ T6] bridge0: port 2(bridge_slave_1) entered blocking state [ 197.702782][ T6] bridge0: port 2(bridge_slave_1) entered forwarding state [ 197.715259][ T45] device bridge_slave_1 left promiscuous mode [ 197.723613][ T45] bridge0: port 2(bridge_slave_1) entered disabled state [ 197.731160][ T45] device bridge_slave_0 left promiscuous mode [ 197.737764][ T45] bridge0: port 1(bridge_slave_0) entered disabled state [ 197.746248][ T45] device veth1_macvtap left promiscuous mode [ 197.752315][ T45] device veth0_vlan left promiscuous mode [ 197.847300][ T4932] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 197.855891][ T4932] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 197.864121][ T4932] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 197.872491][ T4932] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 197.896487][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 197.905934][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 197.924520][ T9514] device veth0_vlan entered promiscuous mode [ 197.931884][ T4932] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 197.940002][ T4932] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 197.961387][ T9514] device veth1_macvtap entered promiscuous mode [ 197.972784][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 197.980680][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 197.988345][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 197.996849][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 198.006098][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 198.030978][ T4932] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 198.039362][ T4932] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 198.047928][ T4932] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 198.057234][ T4932] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 198.110221][ T293] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 198.123405][ T293] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 198.184192][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 198.208178][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 198.234929][ T6] bridge0: port 1(bridge_slave_0) entered blocking state [ 198.241836][ T6] bridge0: port 1(bridge_slave_0) entered forwarding state [ 198.320286][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 198.366195][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 198.502820][ T6] bridge0: port 2(bridge_slave_1) entered blocking state [ 198.509704][ T6] bridge0: port 2(bridge_slave_1) entered forwarding state [ 198.583192][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 198.627768][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 198.688517][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 198.759938][ T9533] device veth0_vlan entered promiscuous mode [ 198.797057][ T293] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 198.816602][ T293] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 198.867835][ T293] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 198.916794][ T293] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 198.987685][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 199.006412][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 199.069089][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 199.086428][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 199.095068][ T9533] device veth1_macvtap entered promiscuous mode [ 199.137188][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 199.152538][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 199.239853][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 199.292632][ T460] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 199.301074][ T460] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 199.703035][ T45] device bridge_slave_1 left promiscuous mode [ 199.711725][ T45] bridge0: port 2(bridge_slave_1) entered disabled state [ 199.802969][ T45] device bridge_slave_0 left promiscuous mode [ 199.874694][ T45] bridge0: port 1(bridge_slave_0) entered disabled state [ 199.933157][ T45] device veth1_macvtap left promiscuous mode [ 199.992438][ T45] device veth0_vlan left promiscuous mode [ 211.026497][ T9930] bridge0: port 1(bridge_slave_0) entered blocking state [ 211.062705][ T9930] bridge0: port 1(bridge_slave_0) entered disabled state [ 211.110856][ T9930] device bridge_slave_0 entered promiscuous mode [ 211.157916][ T9930] bridge0: port 2(bridge_slave_1) entered blocking state [ 211.210882][ T9930] bridge0: port 2(bridge_slave_1) entered disabled state [ 211.256949][ T9930] device bridge_slave_1 entered promiscuous mode [ 211.777269][ T428] device bridge_slave_1 left promiscuous mode [ 211.785552][ T428] bridge0: port 2(bridge_slave_1) entered disabled state [ 211.836037][ T428] device bridge_slave_0 left promiscuous mode [ 211.842337][ T428] bridge0: port 1(bridge_slave_0) entered disabled state [ 211.876136][ T428] device veth1_macvtap left promiscuous mode [ 211.916622][ T428] device veth0_vlan left promiscuous mode [ 212.232018][ T9623] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 212.249346][ T9623] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 212.283648][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 212.362168][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 212.421992][ T26] bridge0: port 1(bridge_slave_0) entered blocking state [ 212.428869][ T26] bridge0: port 1(bridge_slave_0) entered forwarding state [ 212.515445][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 212.568685][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 212.622815][ T26] bridge0: port 2(bridge_slave_1) entered blocking state [ 212.629713][ T26] bridge0: port 2(bridge_slave_1) entered forwarding state [ 212.720735][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 212.767820][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 212.817564][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 212.868361][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 212.920370][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 212.998482][ T311] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 213.009082][ T311] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 213.131710][ T9930] device veth0_vlan entered promiscuous mode [ 213.163764][ T9930] device veth1_macvtap entered promiscuous mode [ 213.184882][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 213.257156][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 213.312692][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 213.320832][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 213.400256][ T293] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 213.408053][ T293] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 213.466254][ T429] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 213.489711][ T429] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 213.565060][ T429] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 213.622437][ T429] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 252.763190][ T30] audit: type=1400 audit(1720476012.254:121): avc: denied { ioctl } for pid=11359 comm="syz.1.4977" path="/dev/ppp" dev="devtmpfs" ino=134 ioctlcmd=0x743e scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ppp_device_t tclass=chr_file permissive=1 [ 253.509327][ T30] audit: type=1400 audit(1720476012.514:122): avc: denied { create } for pid=11375 comm="syz.3.4984" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=pppox_socket permissive=1 [ 253.531773][ T30] audit: type=1400 audit(1720476013.024:123): avc: denied { read } for pid=82 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 253.623297][T11369] bridge0: port 1(bridge_slave_0) entered blocking state [ 253.630622][T11369] bridge0: port 1(bridge_slave_0) entered disabled state [ 253.638856][T11369] device bridge_slave_0 entered promiscuous mode [ 253.659899][T11369] bridge0: port 2(bridge_slave_1) entered blocking state [ 253.667052][T11369] bridge0: port 2(bridge_slave_1) entered disabled state [ 253.674632][T11369] device bridge_slave_1 entered promiscuous mode [ 253.922304][T11432] device syzkaller0 entered promiscuous mode [ 253.937735][T11369] bridge0: port 2(bridge_slave_1) entered blocking state [ 253.944636][T11369] bridge0: port 2(bridge_slave_1) entered forwarding state [ 254.367721][ T9989] bridge0: port 2(bridge_slave_1) entered disabled state [ 254.397790][ T9989] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 254.417716][ T9989] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 254.470246][ T9989] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 254.521060][ T9989] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 254.565693][ T9989] bridge0: port 1(bridge_slave_0) entered blocking state [ 254.572592][ T9989] bridge0: port 1(bridge_slave_0) entered forwarding state [ 254.580049][ T9989] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 254.588159][ T9989] bridge0: port 2(bridge_slave_1) entered blocking state [ 254.595052][ T9989] bridge0: port 2(bridge_slave_1) entered forwarding state [ 254.611401][ T4932] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 254.664120][ T4932] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 254.692166][ T8312] device bridge_slave_1 left promiscuous mode [ 254.698165][ T8312] bridge0: port 2(bridge_slave_1) entered disabled state [ 254.739625][ T8312] device bridge_slave_0 left promiscuous mode [ 254.745659][ T8312] bridge0: port 1(bridge_slave_0) entered disabled state [ 254.754911][ T8312] device veth1_macvtap left promiscuous mode [ 254.767481][ T8312] device veth0_vlan left promiscuous mode [ 255.089459][ T293] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 255.097861][ T293] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 255.112737][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 255.121144][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 255.146505][T11369] device veth0_vlan entered promiscuous mode [ 255.162956][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 255.170755][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 255.188063][T11369] device veth1_macvtap entered promiscuous mode [ 255.205835][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 255.214748][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 255.222195][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 255.230663][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 255.239931][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 255.266038][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 255.276071][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 255.285561][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 255.296074][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 255.308497][ T30] audit: type=1400 audit(1720476014.794:124): avc: denied { mounton } for pid=11369 comm="syz-executor" path="/root/syzkaller.8gXHVw/syz-tmp/newroot/dev" dev="tmpfs" ino=3 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 255.335162][ T30] audit: type=1400 audit(1720476014.794:125): avc: denied { mount } for pid=11369 comm="syz-executor" name="/" dev="proc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 [ 255.365294][ T30] audit: type=1400 audit(1720476014.824:126): avc: denied { mounton } for pid=11369 comm="syz-executor" path="/dev/binderfs" dev="devtmpfs" ino=362 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:device_t tclass=dir permissive=1 [ 255.412390][ T30] audit: type=1400 audit(1720476014.894:127): avc: denied { write } for pid=11493 comm="syz.2.4979" name="ppp" dev="devtmpfs" ino=134 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ppp_device_t tclass=chr_file permissive=1 [ 255.510046][T11500] device pim6reg1 entered promiscuous mode [ 255.523387][T11504] BUG: unable to handle page fault for address: ffffffffff600000 [ 255.531054][T11504] #PF: supervisor read access in kernel mode [ 255.536866][T11504] #PF: error_code(0x0001) - permissions violation [ 255.543117][T11504] PGD 6812067 P4D 6812067 PUD 6814067 PMD 6816067 PTE 8000000006809165 [ 255.551190][T11504] Oops: 0001 [#1] PREEMPT SMP KASAN [ 255.556223][T11504] CPU: 1 PID: 11504 Comm: syz.3.5034 Not tainted 5.15.151-syzkaller-00415-gdb06c48ab67e #0 [ 255.566030][T11504] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/07/2024 [ 255.575924][T11504] RIP: 0010:copy_from_kernel_nofault+0x86/0x2e0 [ 255.582000][T11504] Code: 48 89 55 d0 0f 85 ea 01 00 00 ff 02 bf 07 00 00 00 4c 89 ee e8 8b 92 d6 ff 49 83 fd 07 76 5c 4d 89 fe 49 83 c5 f8 49 83 c7 08 <49> 8b 1c 24 4c 89 f0 48 c1 e8 03 48 b9 00 00 00 00 00 fc ff df 80 [ 255.601566][T11504] RSP: 0018:ffffc90000b57d50 EFLAGS: 00010296 [ 255.607550][T11504] RAX: 0000000000000002 RBX: 00007ffffffff000 RCX: ffff8881257a0000 [ 255.615368][T11504] RDX: ffff8881257a0b90 RSI: 0000000000000008 RDI: 0000000000000007 [ 255.623177][T11504] RBP: ffffc90000b57d88 R08: ffffffff8199a975 R09: ffffed1024af4001 [ 255.630981][T11504] R10: 0000000000000000 R11: dffffc0000000001 R12: ffffffffff600000 [ 255.638791][T11504] R13: 0000000000000000 R14: ffffc90000b57de8 R15: ffffc90000b57df0 [ 255.646601][T11504] FS: 00007f1f3af076c0(0000) GS:ffff8881f7100000(0000) knlGS:0000000000000000 [ 255.655462][T11504] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 255.661875][T11504] CR2: ffffffffff600000 CR3: 0000000120bd8000 CR4: 00000000003506a0 [ 255.669689][T11504] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 255.677500][T11504] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 255.685309][T11504] Call Trace: [ 255.688455][T11504] [ 255.691216][T11504] ? __die_body+0x62/0xb0 [ 255.695388][T11504] ? __die+0x7e/0x90 [ 255.699136][T11504] ? page_fault_oops+0x7f9/0xa90 [ 255.703888][T11504] ? jump_label_update+0x3af/0x450 [ 255.708844][T11504] ? kernelmode_fixup_or_oops+0x270/0x270 [ 255.714475][T11504] ? __mutex_lock_slowpath+0x10/0x10 [ 255.719593][T11504] ? tracepoint_add_func+0x77e/0x940 [ 255.724712][T11504] ? alloc_file_pseudo+0x280/0x2f0 [ 255.729665][T11504] ? exc_page_fault+0x521/0x830 [ 255.734354][T11504] ? asm_exc_page_fault+0x27/0x30 [ 255.739209][T11504] ? copy_from_kernel_nofault+0x75/0x2e0 [ 255.744675][T11504] ? copy_from_kernel_nofault+0x86/0x2e0 [ 255.750144][T11504] bpf_probe_read_compat+0x112/0x180 [ 255.755267][T11504] bpf_prog_baa065642a502c00+0x64/0xf3c [ 255.760645][T11504] bpf_trace_run2+0x159/0x210 [ 255.765160][T11504] ? bpf_trace_run1+0x1c0/0x1c0 [ 255.769848][T11504] __bpf_trace_sys_exit+0x62/0x70 [ 255.774706][T11504] syscall_exit_to_user_mode+0x149/0x160 [ 255.780176][T11504] do_syscall_64+0x49/0xb0 [ 255.784426][T11504] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 255.790156][T11504] RIP: 0033:0x7f1f3bc85bd9 [ 255.794410][T11504] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 255.813859][T11504] RSP: 002b:00007f1f3af07048 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 255.822102][T11504] RAX: 0000000000000006 RBX: 00007f1f3be13f60 RCX: 00007f1f3bc85bd9 [ 255.829910][T11504] RDX: 0000000000000010 RSI: 0000000020000500 RDI: 0000000000000011 [ 255.837720][T11504] RBP: 00007f1f3bcf4e60 R08: 0000000000000000 R09: 0000000000000000 [ 255.845651][T11504] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 255.853462][T11504] R13: 000000000000000b R14: 00007f1f3be13f60 R15: 00007ffd1e6b8db8 [ 255.861273][T11504] [ 255.864126][T11504] Modules linked in: [ 255.867876][T11504] CR2: ffffffffff600000 [ 255.871869][T11504] ---[ end trace 3f306896e05c23ee ]--- [ 255.871908][ T6340] BUG: unable to handle page fault for address: ffffffffff600000 [ 255.877156][T11504] RIP: 0010:copy_from_kernel_nofault+0x86/0x2e0 [ 255.884707][ T6340] #PF: supervisor read access in kernel mode [ 255.890779][T11504] Code: 48 89 55 d0 0f 85 ea 01 00 00 ff 02 bf 07 00 00 00 4c 89 ee e8 8b 92 d6 ff 49 83 fd 07 76 5c 4d 89 fe 49 83 c5 f8 49 83 c7 08 <49> 8b 1c 24 4c 89 f0 48 c1 e8 03 48 b9 00 00 00 00 00 fc ff df 80 [ 255.896590][ T6340] #PF: error_code(0x0001) - permissions violation [ 255.916137][T11504] RSP: 0018:ffffc90000b57d50 EFLAGS: 00010296 [ 255.922381][ T6340] PGD 6812067 P4D 6812067 PUD 6814067 PMD 6816067 [ 255.928281][T11504] RAX: 0000000000000002 RBX: 00007ffffffff000 RCX: ffff8881257a0000 [ 255.928290][ T6340] PTE 8000000006809165 [ 255.928301][T11504] RDX: ffff8881257a0b90 RSI: 0000000000000008 RDI: 0000000000000007 [ 255.934615][ T6340] [ 255.934622][ T6340] Oops: 0001 [#2] PREEMPT SMP KASAN [ 255.942516][T11504] RBP: ffffc90000b57d88 R08: ffffffff8199a975 R09: ffffed1024af4001 [ 255.946427][ T6340] CPU: 0 PID: 6340 Comm: syz-executor Tainted: G D 5.15.151-syzkaller-00415-gdb06c48ab67e #0 [ 255.954232][T11504] R10: 0000000000000000 R11: dffffc0000000001 R12: ffffffffff600000 [ 255.956402][ T6340] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/07/2024 [ 255.961440][T11504] R13: 0000000000000000 R14: ffffc90000b57de8 R15: ffffc90000b57df0 [ 255.969246][ T6340] RIP: 0010:copy_from_kernel_nofault+0x86/0x2e0 [ 255.980531][T11504] FS: 00007f1f3af076c0(0000) GS:ffff8881f7100000(0000) knlGS:0000000000000000 [ 255.988341][ T6340] Code: 48 89 55 d0 0f 85 ea 01 00 00 ff 02 bf 07 00 00 00 4c 89 ee e8 8b 92 d6 ff 49 83 fd 07 76 5c 4d 89 fe 49 83 c5 f8 49 83 c7 08 <49> 8b 1c 24 4c 89 f0 48 c1 e8 03 48 b9 00 00 00 00 00 fc ff df 80 [ 255.998233][T11504] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 256.006048][ T6340] RSP: 0018:ffffc90000ac7d50 EFLAGS: 00010296 [ 256.012120][T11504] CR2: ffffffffff600000 CR3: 0000000120bd8000 CR4: 00000000003506a0 [ 256.020887][ T6340] [ 256.020893][ T6340] RAX: 0000000000000000 RBX: 00007ffffffff000 RCX: ffff88810b82cf00 [ 256.040330][T11504] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 256.046753][ T6340] RDX: ffff88810b82da90 RSI: 0000000000000008 RDI: 0000000000000007 [ 256.052652][T11504] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 256.060464][ T6340] RBP: ffffc90000ac7d88 R08: ffffffff8199a975 R09: ffffed10217059e1 [ 256.062648][T11504] Kernel panic - not syncing: Fatal exception [ 256.070447][ T6340] R10: 0000000000000000 R11: dffffc0000000001 R12: ffffffffff600000 [ 256.115520][ T6340] R13: 0000000000000000 R14: ffffc90000ac7de8 R15: ffffc90000ac7df0 [ 256.123327][ T6340] FS: 0000555556def500(0000) GS:ffff8881f7000000(0000) knlGS:0000000000000000 [ 256.132090][ T6340] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 256.138509][ T6340] CR2: ffffffffff600000 CR3: 000000010dc71000 CR4: 00000000003506b0 [ 256.146332][ T6340] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 256.154135][ T6340] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 256.161952][ T6340] Call Trace: [ 256.165071][ T6340] [ 256.167849][ T6340] ? __die_body+0x62/0xb0 [ 256.172013][ T6340] ? __die+0x7e/0x90 [ 256.175760][ T6340] ? page_fault_oops+0x7f9/0xa90 [ 256.180519][ T6340] ? kernelmode_fixup_or_oops+0x270/0x270 [ 256.186076][ T6340] ? __schedule+0xcd4/0x1590 [ 256.190504][ T6340] ? exc_page_fault+0x521/0x830 [ 256.195221][ T6340] ? asm_exc_page_fault+0x27/0x30 [ 256.200054][ T6340] ? copy_from_kernel_nofault+0x75/0x2e0 [ 256.205514][ T6340] ? copy_from_kernel_nofault+0x86/0x2e0 [ 256.210988][ T6340] bpf_probe_read_compat+0x112/0x180 [ 256.216119][ T6340] bpf_prog_baa065642a502c00+0x64/0xf3c [ 256.221483][ T6340] bpf_trace_run2+0x159/0x210 [ 256.225999][ T6340] ? common_nsleep+0x91/0xb0 [ 256.230437][ T6340] ? bpf_trace_run1+0x1c0/0x1c0 [ 256.235198][ T6340] ? __se_sys_clock_nanosleep+0x323/0x3b0 [ 256.240757][ T6340] ? __x64_sys_clock_nanosleep+0xb0/0xb0 [ 256.246220][ T6340] __bpf_trace_sys_exit+0x62/0x70 [ 256.251093][ T6340] syscall_exit_to_user_mode+0x149/0x160 [ 256.256575][ T6340] do_syscall_64+0x49/0xb0 [ 256.260803][ T6340] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 256.266531][ T6340] RIP: 0033:0x7f1f3bcb7b83 [ 256.270787][ T6340] Code: 1f 84 00 00 00 00 00 83 ff 03 74 7b 83 ff 02 b8 fa ff ff ff 49 89 ca 0f 44 f8 80 3d be d9 12 00 00 74 14 b8 e6 00 00 00 0f 05 d8 c3 66 2e 0f 1f 84 00 00 00 00 00 48 83 ec 28 48 89 54 24 10 [ 256.290227][ T6340] RSP: 002b:00007ffd1e6b9078 EFLAGS: 00000202 ORIG_RAX: 00000000000000e6 [ 256.298467][ T6340] RAX: 0000000000000000 RBX: 000000000000041b RCX: 00007f1f3bcb7b83 [ 256.306279][ T6340] RDX: 00007ffd1e6b9090 RSI: 0000000000000000 RDI: 0000000000000000 [ 256.314093][ T6340] RBP: 00007ffd1e6b910c R08: 00007ffd1e724080 R09: 00007ffd1e7240b0 [ 256.321912][ T6340] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000000000032 [ 256.329712][ T6340] R13: 0000000000000bb8 R14: 000000000003e5fd R15: 000000000003e5fd [ 256.337529][ T6340] [ 256.340389][ T6340] Modules linked in: [ 256.344128][ T6340] CR2: ffffffffff600000 [ 256.348118][ T6340] ---[ end trace 3f306896e05c23ef ]--- [ 256.356361][ T6340] RIP: 0010:copy_from_kernel_nofault+0x86/0x2e0 [ 256.362524][ T6340] Code: 48 89 55 d0 0f 85 ea 01 00 00 ff 02 bf 07 00 00 00 4c 89 ee e8 8b 92 d6 ff 49 83 fd 07 76 5c 4d 89 fe 49 83 c5 f8 49 83 c7 08 <49> 8b 1c 24 4c 89 f0 48 c1 e8 03 48 b9 00 00 00 00 00 fc ff df 80 [ 256.381965][ T6340] RSP: 0018:ffffc90000b57d50 EFLAGS: 00010296 [ 256.387864][ T6340] RAX: 0000000000000002 RBX: 00007ffffffff000 RCX: ffff8881257a0000 [ 256.395678][ T6340] RDX: ffff8881257a0b90 RSI: 0000000000000008 RDI: 0000000000000007 [ 256.403487][ T6340] RBP: ffffc90000b57d88 R08: ffffffff8199a975 R09: ffffed1024af4001 [ 256.411298][ T6340] R10: 0000000000000000 R11: dffffc0000000001 R12: ffffffffff600000 [ 256.419116][ T6340] R13: 0000000000000000 R14: ffffc90000b57de8 R15: ffffc90000b57df0 [ 256.426936][ T6340] FS: 0000555556def500(0000) GS:ffff8881f7000000(0000) knlGS:0000000000000000 [ 256.435787][ T6340] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 256.442295][ T6340] CR2: ffffffffff600000 CR3: 000000010dc71000 CR4: 00000000003506b0 [ 256.450120][ T6340] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 256.457918][ T6340] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 257.265292][T11504] Shutting down cpus with NMI [ 257.270119][T11504] Kernel Offset: disabled [ 257.274244][T11504] Rebooting in 86400 seconds..