last executing test programs: 3.915895862s ago: executing program 2 (id=763): bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x11, 0x4, 0x4, 0xc, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xda, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000180)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = openat$cgroup_subtree(r0, &(0x7f0000000080), 0x2, 0x0) write$cgroup_subtree(r1, &(0x7f0000000040)=ANY=[@ANYBLOB='+pids'], 0x6) write$cgroup_subtree(r1, &(0x7f0000000500)={[{0x2d, 'pids'}]}, 0x6) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000002c0)={0xffffffffffffffff, 0x0, 0xe, 0x0, &(0x7f0000000100)="e0b9547ed387dbe9abc89b6f5bec", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) r2 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240)={0x2, 0x4, 0x8, 0x1, 0x80, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000840)={0x3, 0x1c, &(0x7f0000000d80)=@ringbuf={{0x18, 0x8}, {{0x18, 0x1, 0x1, 0x0, r2}, {}, {}, {0x85, 0x0, 0x0, 0x5}}, {{0x5, 0x0, 0x3}}, [@snprintf={{0x7, 0x0, 0xb, 0x2}, {0x3, 0x3, 0x3, 0xa, 0x9}, {0x5, 0x0, 0xb, 0x9, 0x0, 0x0, 0x1}, {0x3, 0x3, 0x3, 0xa, 0xa}, {0x7, 0x1, 0xb, 0x7, 0x2}, {0x7, 0x0, 0x0, 0x8, 0x0, 0x0, 0xfffffdff}, {}, {}, {0x4, 0x0, 0x7}, {0x18, 0x2, 0x2, 0x0, r2}, {}, {0x46, 0x8, 0xfff0, 0x76}}], {{0x6, 0x1, 0x7, 0x5}, {0x6, 0x0, 0x5, 0x8}, {0x85, 0x0, 0x0, 0x5}}}, &(0x7f0000000300)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sched_cls, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'ip6tnl0\x00', 0x210}) 2.72112214s ago: executing program 2 (id=775): recvmsg$unix(0xffffffffffffffff, 0x0, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0xfdef) perf_event_open(&(0x7f0000000380)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x4004, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffffffffffffffa, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xae, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, 0xffffffffffffffff) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8914, &(0x7f0000000040)={'wg2\x00', @multicast}) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000100)={0x3, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="1800000000000000000000000000000061105f00000000009500000000000000"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x8, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) sendmsg$tipc(r0, &(0x7f0000003a00)={&(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x9}}, 0x10, &(0x7f0000000b40)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000001a00), 0x101d0}], 0x4}, 0x0) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000080)={'pimreg0\x00', 0x7c2}) ioctl$TUNATTACHFILTER(r2, 0x401054d5, &(0x7f0000000040)={0x3, &(0x7f0000000000)=[{0x35, 0x0, 0x1, 0xfffffffe}, {0x0, 0xb4, 0x0, 0x1}, {0x6, 0x0, 0xfe, 0xfffffffe}]}) 2.321841956s ago: executing program 2 (id=780): perf_event_open(&(0x7f00000010c0)={0x2, 0x80, 0xb3, 0x0, 0x0, 0x0, 0x0, 0x4c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x40a0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0xc48, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x44, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000, 0x0, @perf_bp={0x0, 0x6}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000340)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x21, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x40000000}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0600020001000000007c82a414087081661c0800", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xc, 0xc, &(0x7f0000000000)=ANY=[@ANYBLOB="1800000000000000000000000000000018150000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000ff0100007b8af8ff00000000bfa200000000000007020000f8ffffffb703000004000000b704000000000000850000001500000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000600)={r1, 0x0, 0xe, 0x0, &(0x7f0000000100)="e0857f9f582f0300000000000000", 0x0, 0xfffffffc, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) bpf$MAP_CREATE(0x0, &(0x7f0000000840)=ANY=[@ANYBLOB="0a00000001010000ff7f0000cc"], 0x48) close(0xffffffffffffffff) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xb, 0x2, 0x0, 0x0, 0x0, 0x0, 0x80350, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000180), 0x0, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000080)={'pimreg0\x00', 0x7c2}) ioctl$TUNSETQUEUE(r3, 0x400454d9, &(0x7f00000000c0)={'macsec0\x00', 0x400}) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000340)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x21, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x3}, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TUNSETQUEUE(r3, 0x400454d9, &(0x7f00000006c0)={'bridge_slave_0\x00', 0x600}) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5c31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x7ff}}, 0x0, 0xffffffffffffffff, r2, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)) recvmsg$unix(0xffffffffffffffff, 0x0, 0x0) ioctl$TUNGETVNETLE(0xffffffffffffffff, 0x800454dd, 0x0) mkdir(&(0x7f0000000200)='./file0\x00', 0x1c8) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x8946, &(0x7f0000000080)) 2.02665175s ago: executing program 0 (id=781): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) close(r0) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETOFFLOAD(r1, 0xc004743e, 0x110e22fff6) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0600000004000000ff0f000007"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) socketpair(0x2a, 0x5, 0xed1, &(0x7f0000000480)) r4 = syz_clone(0x800000, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}, 0x0, 0x0, 0x0, 0x0, 0x2, 0x8000}, r4, 0x1, 0xffffffffffffffff, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r5, 0x8923, &(0x7f0000000040)={'bridge_slave_0\x00', @random="4f33e363a4b1"}) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}, 0x0, 0x0, 0x7fff, 0x0, 0x2b}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000680)=ANY=[@ANYBLOB, @ANYRES32, @ANYBLOB="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", @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/25], 0x50) r6 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) mkdir(&(0x7f0000000300)='./file0\x00', 0x39451e8eed6c238) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='cgroup.freeze\x00', 0x275a, 0x0) ioctl$TUNSETIFF(r6, 0x400454ca, &(0x7f0000000080)={'pimreg0\x00', 0x7c2}) ioctl$TUNATTACHFILTER(r6, 0x401054d5, &(0x7f0000000780)={0x4, &(0x7f0000000600)=[{0x45, 0x0, 0x2, 0xffffffff}, {0x2d}, {0x2}, {0x6}]}) r7 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000240)={&(0x7f0000000380)='neigh_update\x00', r3}, 0x10) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000240)={&(0x7f0000000380)='neigh_update\x00', r8}, 0x10) r9 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x19, 0x4, 0x7fe2, 0x1, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r9}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r10 = bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00', r10}, 0x10) close(r7) ioctl$TUNATTACHFILTER(r8, 0x401054d5, &(0x7f0000000180)={0x8, &(0x7f0000000040)=[{0x8, 0x0, 0x7, 0x1}, {0x9, 0x6, 0xa, 0x6}, {0x7f, 0x5, 0x10, 0xffffffff}, {0x7, 0x9, 0x6, 0xa9ae}, {0x8001, 0x11, 0x9, 0x4c5f56d5}, {0x7fff, 0x37, 0x1, 0x10}, {0x2, 0x3, 0x5, 0x9}, {0x2, 0x3, 0x30, 0xb57}]}) ioctl$TUNGETVNETLE(r0, 0x40047451, 0x0) 1.660728076s ago: executing program 2 (id=785): r0 = bpf$MAP_CREATE(0x0, 0x0, 0x50) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x11, 0xc, 0x0, &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) socketpair$tipc(0x1e, 0x5, 0x0, 0x0) r2 = perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0x56, 0x1, 0x0, 0x0, 0x0, 0x7fef, 0x82, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x107b7b, 0x1, @perf_config_ext={0x2, 0x8000000000000000}, 0x208, 0x2e, 0xfffffbff, 0x6, 0x2, 0x0, 0x6, 0x0, 0x0, 0x0, 0xa9e6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0xffffffffffffffff}, 0x0, 0xc8, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x1) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r4) recvmsg$unix(r3, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) r5 = perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ID(r5, 0x80082407, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="8fedcb7907009875f37538e486dd6349363006"], 0xfdef) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="007a707573657420006370750806"], 0x12) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={0xffffffffffffffff, 0x5, 0x1, 0x0, &(0x7f0000000000)='%', 0x0, 0xd01, 0x80040000, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x50) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) close(r7) recvmsg$unix(r6, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r8, &(0x7f0000000000)=ANY=[], 0xfdef) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000200)={'veth0_to_bridge\x00', 0x10}) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000340)=0xffffffffffffffff, 0x4) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000007c0)=ANY=[@ANYBLOB="f7ff0100050000000000", @ANYRES32=r1, @ANYBLOB="0000000000000000000000000000000016000000", @ANYRES16=r2, @ANYRES32=r8, @ANYBLOB="050000000412c0a2425ceb6fb600000000000000000000000000000033f39ba4875d2c630f90e97b5e2366f3aabbf5efbdff07000017bb2761cd42ce4b3681f4"], 0x50) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0xffbf) 1.601721076s ago: executing program 1 (id=786): socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) sendmsg$tipc(r0, &(0x7f0000003a00)={&(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x9}}, 0x10, &(0x7f0000000b40)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000001a00), 0x101d0}], 0x4}, 0x0) 1.601380696s ago: executing program 4 (id=787): bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000480)=ANY=[@ANYBLOB="9feb012118000000000000003c0000003c000000020000000000000002000084ffffffff000000000300000000000001000000000300000000000000000000000000000200000000000000000000000602"], 0x0, 0x56, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x20) 1.585009057s ago: executing program 0 (id=788): perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x1, 0xffffffffffffffff, 0x2) socketpair(0xa, 0x800, 0x7, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)=""/181, 0xb5}, 0x40002080) close(0xffffffffffffffff) openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000140)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000000000), &(0x7f0000000040)='%pK \x00'}, 0x20) r3 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x26, 0x26, 0x5, [@float={0x6, 0x0, 0x0, 0x10, 0x8}, @datasec={0xe, 0x1, 0x0, 0xf, 0x2, [{0x3, 0xffff, 0x10001}], "8694"}]}, {0x0, [0x30, 0x61, 0x0]}}, &(0x7f0000001100)=""/4096, 0x45, 0x1000, 0x0, 0x4, 0x0, @void, @value}, 0x28) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240)={0x2, 0x4, 0x8, 0x1, 0x80, r2, 0xff000000, '\x00', 0x0, r3, 0x5, 0x0, 0x2, 0x0, @void, @value, @void, @value}, 0x50) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_ro(r1, &(0x7f0000000080)='blkio.throttle.io_serviced_recursive\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000001080)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x7602, 0x100000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}, 0x84, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x9) perf_event_open(&(0x7f0000001080)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x7602, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TUNGETVNETHDRSZ(0xffffffffffffffff, 0xb701, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f00000000c0)={'syzkaller0\x00', 0x1}) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) perf_event_open(0x0, 0x0, 0x1, 0xffffffffffffffff, 0x2) (async) socketpair(0xa, 0x800, 0x7, &(0x7f0000000100)) (async) recvmsg(r0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)=""/181, 0xb5}, 0x40002080) (async) close(0xffffffffffffffff) (async) openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) (async) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)) (async) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000140)={{}, &(0x7f0000000000), &(0x7f0000000040)='%pK \x00'}, 0x20) (async) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x26, 0x26, 0x5, [@float={0x6, 0x0, 0x0, 0x10, 0x8}, @datasec={0xe, 0x1, 0x0, 0xf, 0x2, [{0x3, 0xffff, 0x10001}], "8694"}]}, {0x0, [0x30, 0x61, 0x0]}}, &(0x7f0000001100)=""/4096, 0x45, 0x1000, 0x0, 0x4, 0x0, @void, @value}, 0x28) (async) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240)={0x2, 0x4, 0x8, 0x1, 0x80, r2, 0xff000000, '\x00', 0x0, r3, 0x5, 0x0, 0x2, 0x0, @void, @value, @void, @value}, 0x50) (async) bpf$PROG_LOAD(0x5, 0x0, 0x0) (async) openat$cgroup_ro(r1, &(0x7f0000000080)='blkio.throttle.io_serviced_recursive\x00', 0x26e1, 0x0) (async) perf_event_open(&(0x7f0000001080)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x7602, 0x100000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}, 0x84, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x9) (async) perf_event_open(&(0x7f0000001080)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x7602, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async) ioctl$TUNGETVNETHDRSZ(0xffffffffffffffff, 0xb701, 0x0) (async) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f00000000c0)={'syzkaller0\x00', 0x1}) (async) 1.584391967s ago: executing program 3 (id=789): bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000400)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x1}, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000001c0)={0x8, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa0000, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0xfffffffd, 0x2}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1800000000000000000000004b64ffec850000005000000085000000"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000380), 0x101000, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000100)='kfree\x00', r0}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=ANY=[@ANYRES64, @ANYRESDEC=0x0, @ANYBLOB="000000000000000000000000000196000000000000"], 0x48) syz_open_procfs$namespace(0x0, &(0x7f0000001000)='ns/pid_for_children\x00') syz_open_procfs$namespace(0x0, &(0x7f0000000240)='ns/pid\x00') r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.swap.current\x00', 0x26e1, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xb, 0x2, 0x0, 0x0, 0x0, 0x0, 0x20004, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000500), 0xb}, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0xfffc}, 0x0, 0xffffffffffffffff, r2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000001480)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r3, 0x0, 0x0) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000440)}, 0x100) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x19, 0x3, 0x0, &(0x7f0000000000)='GPL\x00', 0x5, 0x0, 0x0, 0x41100, 0x8, '\x00', 0x0, @fallback=0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'veth1_virt_wifi\x00'}) r4 = openat$cgroup_procs(r2, &(0x7f0000000280)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r4, &(0x7f0000000340), 0x12) socketpair(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r5, 0x8946, &(0x7f0000000080)) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x8, 0x4, 0x0, &(0x7f0000003ff6)='GPL\x00', 0x1, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @cgroup_skb=0x1, 0xffffffffffffffff, 0x19, &(0x7f0000000000), 0x8, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000001100)='cpu\t&0&&\t') bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={0x0}, 0x18) close(0xffffffffffffffff) bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000180), 0x4) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xb3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x6, @perf_bp={0x0}, 0x0, 0x1000, 0x0, 0x9, 0x0, 0xfffffffd}, 0x0, 0x1, 0xffffffffffffffff, 0x2) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 1.522888858s ago: executing program 1 (id=790): bpf$MAP_CREATE(0x0, 0x0, 0x50) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x11, 0xc, 0x0, &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) socketpair$tipc(0x1e, 0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0x56, 0x1, 0x0, 0x0, 0x0, 0x7fef, 0x82, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x107b7b, 0x1, @perf_config_ext={0x6f71, 0x8000000000000000}, 0x208, 0x2e, 0xfffffbff, 0x6, 0x2, 0x0, 0x6, 0x0, 0x0, 0x0, 0xa9e6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext, 0x0, 0xc8, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r0, &(0x7f00000006c0)=ANY=[@ANYBLOB="8f03000000000060007538e486dd630ace2200042f00fe80000000000000875a65059ff57b00000000000000000000000000ac1414aa12"], 0xcfa4) bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0xd, 0x4, 0x4, 0x9, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x4, &(0x7f0000000040)=@framed={{0xffffffb4, 0x5, 0x0, 0x0, 0x0, 0x61, 0x10, 0x86}, [@ldst={0x7, 0x3, 0x0, 0x1c10a1}]}, &(0x7f0000003ff6)='GPL\x00', 0x5, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x1dd, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x48) 1.453466799s ago: executing program 4 (id=791): perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x50, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x104046, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x100, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000100)={'macvtap0\x00', 0x2}) ioctl$TUNATTACHFILTER(r0, 0x401054d5, &(0x7f00000000c0)={0x2, &(0x7f00000003c0)=[{0x30, 0xfd, 0x6d, 0xfffff008}, {0x6, 0x40}]}) openat$ppp(0xffffffffffffff9c, &(0x7f00000007c0), 0x22100, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x3, 0x8, 0x0, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sched_cls, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) perf_event_open(&(0x7f0000001200)={0x2, 0x80, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_config_ext={0x8, 0x4}, 0x24, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)) sendmsg$inet(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001d80)=ANY=[@ANYBLOB="28010000000000000100000001"], 0x128}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001480)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r2, &(0x7f0000001b00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001d80)=ANY=[], 0x128}, 0x0) recvmsg$unix(r1, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000800)=[@cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @rights={{0x10}}], 0xc8}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'veth1_to_bond\x00', 0x200}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000340)={r3, 0xe0, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, &(0x7f0000000040)=[0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, &(0x7f0000000140)=[0x0], &(0x7f0000000180)=[0x0], 0x0, 0x68, &(0x7f00000001c0), 0x0, 0x10, &(0x7f0000000240), &(0x7f0000000280), 0x8, 0x8f, 0x8, 0x8, &(0x7f0000000300)}}, 0x10) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x8946, &(0x7f0000000080)) 1.395201889s ago: executing program 3 (id=792): perf_event_open(&(0x7f00000010c0)={0x2, 0x80, 0xb3, 0x0, 0x0, 0x0, 0x0, 0x4c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x40a0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0xc48, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x44, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000, 0x0, @perf_bp={0x0, 0x6}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000340)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x21, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x40000000}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0600020001000000007c82a414087081661c0800", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xc, 0xc, &(0x7f0000000000)=ANY=[@ANYBLOB="1800000000000000000000000000000018150000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000ff0100007b8af8ff00000000bfa200000000000007020000f8ffffffb703000004000000b704000000000000850000001500000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000600)={r1, 0x0, 0xe, 0x0, &(0x7f0000000100)="e0857f9f582f0300000000000000", 0x0, 0xfffffffc, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) bpf$MAP_CREATE(0x0, &(0x7f0000000840)=ANY=[@ANYBLOB="0a00000001010000ff7f0000cc"], 0x48) close(0xffffffffffffffff) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xb, 0x2, 0x0, 0x0, 0x0, 0x0, 0x80350, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000180), 0x0, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000080)={'pimreg0\x00', 0x7c2}) ioctl$TUNSETQUEUE(r3, 0x400454d9, &(0x7f00000000c0)={'macsec0\x00', 0x400}) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000340)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x21, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x3}, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TUNSETQUEUE(r3, 0x400454d9, &(0x7f00000006c0)={'bridge_slave_0\x00', 0x600}) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5c31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x7ff}}, 0x0, 0xffffffffffffffff, r2, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)) recvmsg$unix(0xffffffffffffffff, 0x0, 0x0) ioctl$TUNGETVNETLE(0xffffffffffffffff, 0x800454dd, 0x0) mkdir(&(0x7f0000000200)='./file0\x00', 0x1c8) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8946, &(0x7f0000000080)) 1.242787222s ago: executing program 1 (id=793): unlink(&(0x7f0000000100)='./file0\x00') r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x10, 0x3, 0x8, &(0x7f00000000c0)) close(r0) openat$ppp(0xffffffffffffff9c, &(0x7f0000000040), 0x20080, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000600)={0x18, 0x3, &(0x7f0000000000)=@framed={{0xad, 0xa, 0xa, 0x0, 0x0, 0x71, 0x10, 0x15}}, &(0x7f0000000480)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) ioctl$TUNSETOFFLOAD(r0, 0xc004743e, 0x10) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x11, 0x4, 0x4, 0x80000001, 0x10, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x3, 0x0, 0x0, @void, @value, @void, @value}, 0x50) ioctl$TUNGETVNETLE(r0, 0x800454dd, &(0x7f0000000000)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) r1 = openat$cgroup_procs(0xffffffffffffffff, 0x0, 0x2, 0x0) write$cgroup_pid(r1, &(0x7f0000000c40), 0x12) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x18028, 0x2, 0x0, 0x0, 0x0, 0x8000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x4, [@var={0x2, 0x0, 0x0, 0xe, 0x2}, @volatile={0x0, 0x0, 0x0, 0x2}]}, {0x0, [0x0, 0x2e]}}, 0x0, 0x38, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x20) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$sock_attach_bpf(r2, 0x1, 0x42, 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='cgroup.freeze\x00', 0x275a, 0x0) write$cgroup_int(r3, &(0x7f0000000200)=0x1, 0x12) write$cgroup_pid(r3, 0x0, 0x0) ioctl$TUNGETVNETLE(r0, 0x800454dd, &(0x7f0000000140)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r4 = openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f0000000080)={'syzkaller0\x00', 0xf301}) r5 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100), 0xc1842, 0x0) ioctl$TUNSETIFF(r5, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x8914, &(0x7f0000000080)) 1.236936852s ago: executing program 4 (id=794): bpf$MAP_CREATE(0x8000000, &(0x7f0000001040)=@base={0x3, 0x4, 0x4, 0x1, 0x12a2, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2000000, 0x0, 0x0, @void, @value, @void, @value}, 0x48) 1.147052323s ago: executing program 4 (id=795): bpf$PROG_LOAD_XDP(0x5, &(0x7f00000001c0)={0x12, 0x4, &(0x7f0000000280)=ANY=[@ANYBLOB="1800000000000000000000000000000071122a00000000009500000000000000eef513d3a8d744251af6fcfa9ac792223fc6"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0xe, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) r0 = bpf$TOKEN_CREATE(0x24, &(0x7f0000000000), 0x8) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0xf, 0x4, [{}]}]}}, 0x0, 0x2e, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x28) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xa, 0x6, &(0x7f0000000300)=ANY=[@ANYRES8=r0], &(0x7f0000000040)='syzkaller\x00', 0x3, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) 1.096613604s ago: executing program 4 (id=796): bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) perf_event_open(&(0x7f0000000380)={0x4, 0x80, 0x80, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x10000000}, 0x0, 0xc8, 0xffff, 0x1, 0x1, 0x0, 0x2, 0x0, 0xffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000740)={0xffffffffffffffff, 0x0, 0x0}, 0x20) perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sk_skb=0x4, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="02000000040000000800000001"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x3, 0x16, &(0x7f0000000d40)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x5, '\x00', 0x0, @sched_cls, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x48) perf_event_open(&(0x7f00000010c0)={0x2, 0x80, 0xb3, 0x0, 0x0, 0x0, 0x0, 0x4c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="1000000004000000040000000200000000000000", @ANYRES32=0x1, @ANYBLOB='\x00\x00\x00\x00\x00\a\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x1}, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x0, 0x0, &(0x7f0000000040)='syzkaller\x00', 0x5, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x4, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x10000, @void, @value}, 0x94) socketpair(0x1, 0x1, 0x0, &(0x7f0000000180)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'bridge0\x00', 0x100}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000100)={r2}, 0x4) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x89f0, &(0x7f0000000080)) socketpair(0x11, 0xa, 0x300, &(0x7f0000000000)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r4) recvmsg$unix(r3, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r5) openat$tun(0xffffffffffffff9c, &(0x7f00000000c0), 0x1c1842, 0x0) 789.929348ms ago: executing program 2 (id=797): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000080)={'syzkaller0\x00', 0xca58c30f81b6079f}) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, 0x0, 0x0) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x6a) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8914, &(0x7f0000000140)={'syzkaller0\x00', @broadcast}) close(0xffffffffffffffff) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) perf_event_open(0x0, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f00000010c0)={0x2, 0x80, 0xb3, 0x0, 0x0, 0x0, 0x0, 0x4c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000004c0)={0x1, 0xc46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r1, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000001480)={0x2, 0x80, 0x83, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x6, 0x7}, 0x0, 0x4, 0x0, 0x9, 0x0, 0xd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup.cpu/syz1\x00', 0x1ff) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='blkio.bfq.io_serviced\x00', 0x26e1, 0x0) ioctl$TUNSETOFFLOAD(r2, 0x400454d0, 0x4) sendmsg$inet(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001d80)=ANY=[@ANYBLOB="28010000000000000100000001"], 0x128}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000001480)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r4, &(0x7f0000001b00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001d80)=ANY=[], 0x128}, 0x0) recvmsg$unix(r3, &(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)=[@cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}], 0x98}, 0x2160) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x19, 0x0, 0x0, &(0x7f0000000000)='GPL\x00', 0x5, 0x0, 0x0, 0x41100, 0x8, '\x00', 0x0, @fallback=0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) ioctl$TUNSETCARRIER(0xffffffffffffffff, 0x400454e2, &(0x7f0000000000)=0x4b) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'veth1_virt_wifi\x00'}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r5, 0x8946, &(0x7f0000000080)) bpf$MAP_CREATE_CONST_STR(0x0, 0x0, 0x0) close(0x3) 723.72905ms ago: executing program 3 (id=798): perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2000000000, 0x3}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x18001, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000440)}, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'ip6_vti0\x00', 0x200}) perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0xb3, 0x0, 0x0, 0x0, 0x0, 0x4c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3fffff, 0x0, @perf_bp={0x0}, 0x0, 0x7ff, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r0 = bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000040)=@base={0xd, 0x6, 0x4, 0x1, 0x0, r0, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) r1 = bpf$ITER_CREATE(0xb, &(0x7f0000000100), 0x8) perf_event_open(&(0x7f00000010c0)={0x2, 0x80, 0xb3, 0x0, 0x0, 0x0, 0x0, 0x4c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x5}, 0x0, 0x0, 0x5316}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0xfdef) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x482, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_int(r1, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, 0x0, &(0x7f0000000180)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x6, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1, 0x5}, 0x0, 0xc8, 0x0, 0x9, 0x0, 0xfffffffd, 0xfffe, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) close(r3) recvmsg$unix(r2, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r4, &(0x7f0000000300)=ANY=[@ANYBLOB="8fedcb791f6f9875f37538e486dd6317ce8102030400fef2000e40000200875a65969ff57b00ff020000000000000000000000000001"], 0xfdef) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x202, 0x40020, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x1}, 0x0, 0x0, 0x1, 0x0, 0x100009}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000600)={0x11, 0x3, &(0x7f0000000000)=@framed={{0x3e, 0xa, 0xa, 0x0, 0x0, 0x71, 0x10, 0x15}}, &(0x7f0000000480)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) r5 = openat$tun(0xffffffffffffff9c, &(0x7f0000000200), 0x20702, 0x0) ioctl$TUNSETIFF(r5, 0x400454ca, &(0x7f0000000080)={'pim6reg1\x00', 0xe511}) ioctl$TUNSETQUEUE(r5, 0x400454d9, &(0x7f0000000100)={'veth0_to_bridge\x00', 0x400}) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8914, &(0x7f0000000080)) ioctl$TUNSETQUEUE(r5, 0x400454d9, &(0x7f00000001c0)={'gre0\x00', 0x400}) 427.268094ms ago: executing program 1 (id=799): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="0200000004000000040000000900000000000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="0000e4ffffffffffffff00000000000000000000001a00000000000042d24d9ea187819ab08b7a5a32660b2c653538341adeefc91e7ae0815d18acf4a888e200d9edb15756913e7b5976233dc49965a72c79afa356066cb6cc718d274b732b5a3edb24dc6011a94eea1a95efb315396fb547dfe6c56dd4faf28920d3c6ed2a8a918450ad093caed197406032f134216e21d89d28cc7a3c7d4ed33b5ff80f79c45d851cfe7405ac1d42aa0e189ff395900de445ee11bfbfe829eb86f6b965fc9f363914ad766b4918e07f6bc8bb276392ab9f"], 0x50) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)=@base={0xd, 0x6, 0x4, 0x1, 0x0, r0, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000008c0)={{r1}, &(0x7f0000000840), &(0x7f0000000880)=r0}, 0x20) close(r0) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000380)={r1, &(0x7f0000000900)}, 0x20) 373.046294ms ago: executing program 0 (id=800): perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000001500)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x1c, 0x60000000, &(0x7f0000000100)="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", 0x0, 0xfe, 0x60000000}, 0x2c) 372.586805ms ago: executing program 3 (id=801): bpf$MAP_CREATE(0x0, 0x0, 0x50) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x11, 0xc, 0x0, &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) socketpair$tipc(0x1e, 0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0x56, 0x1, 0x0, 0x0, 0x0, 0x7fef, 0x82, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x107b7b, 0x1, @perf_config_ext={0x2, 0x8000000000000000}, 0x208, 0x2e, 0xfffffbff, 0x6, 0x2, 0x0, 0x6, 0x0, 0x0, 0x0, 0xa9e6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r1) recvmsg$unix(r0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="8fedcb7907009875f37538e486dd6349363006"], 0xfdef) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={0xffffffffffffffff, 0x5, 0x1, 0x0, &(0x7f0000000000)='%', 0x0, 0xd01, 0x80040000, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x50) close(0xffffffffffffffff) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f00000000c0)={'netdevsim0\x00', 0x800}) write$cgroup_subtree(r3, &(0x7f0000000000)=ANY=[], 0xfdef) 372.437554ms ago: executing program 0 (id=802): r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40086602, &(0x7f0000000000)=0x7ff) recvmsg$unix(r0, &(0x7f0000000300)={&(0x7f0000000000), 0x6e, &(0x7f0000000140)=[{&(0x7f0000000080)=""/79, 0x4f}], 0x1, &(0x7f0000000180)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @rights={{0x10}}, @cred={{0x1c}}], 0x48}, 0x10000) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000002c0)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x7, [@enum={0x5}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x61]}}, &(0x7f0000000200)=""/144, 0x2b, 0x90, 0x1, 0x0, 0x0, @void, @value}, 0x20) 371.566335ms ago: executing program 2 (id=803): r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r1 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x10020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000001c0)={0x0, r1, 0x0, 0x0, 0x0}, 0x30) r2 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000200)='mm_khugepaged_scan_pmd\x00', r0}, 0x18) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x2400, 0x3) close(0xffffffffffffffff) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@bloom_filter={0x1e, 0x9, 0x3, 0x9, 0x1, 0xffffffffffffffff, 0x1, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x3, 0x4, 0xc, @void, @value, @void, @value}, 0x50) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) close(0xffffffffffffffff) r3 = bpf$ITER_CREATE(0xb, 0x0, 0x0) close(r3) bpf$BPF_PROG_TEST_RUN(0x1c, &(0x7f0000000240)={r2, 0x8, 0x25, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) syz_clone(0x40800000, 0x0, 0x0, 0x0, 0x0, 0x0) 326.755025ms ago: executing program 0 (id=804): bpf$MAP_CREATE(0x0, 0x0, 0x50) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x11, 0xc, 0x0, &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) socketpair$tipc(0x1e, 0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0x56, 0x1, 0x0, 0x0, 0x0, 0x7fef, 0x82, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x107b7b, 0x1, @perf_config_ext={0x6f71, 0x8000000000000000}, 0x208, 0x2e, 0xfffffbff, 0x6, 0x2, 0x0, 0x6, 0x0, 0x0, 0x0, 0xa9e6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext, 0x0, 0xc8, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r0, &(0x7f00000006c0)=ANY=[@ANYBLOB="8f03000000000060007538e486dd630ace2200042f00fe80000000000000875a65059ff57b00000000000000000000000000ac1414aa12"], 0xcfa4) bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0xd, 0x4, 0x4, 0x9, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x4, &(0x7f0000000040)=@framed={{0xffffffb4, 0x5, 0x0, 0x0, 0x0, 0x61, 0x10, 0x86}, [@ldst={0x7, 0x3, 0x0, 0x1c10a1}]}, &(0x7f0000003ff6)='GPL\x00', 0x5, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x1dd, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x48) 258.731636ms ago: executing program 1 (id=805): bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000800)=@bpf_lsm={0xc, 0x4, &(0x7f0000000040)=@framed={{0x66, 0xa, 0x0, 0x0, 0x0, 0x61, 0x11, 0x4c}, [@call={0x85, 0x0, 0x0, 0x2}]}, &(0x7f0000000380)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x8, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x34) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4020940d, &(0x7f00000005c0)=0x80000000000004) write$cgroup_pressure(r0, &(0x7f0000000000)={'full', 0x20, 0x2400000000000000}, 0x2f) 240.087376ms ago: executing program 0 (id=806): close(0x3) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000001c0)={0xe, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0xf, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, &(0x7f0000000140)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x20, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="8fedcb7907003675f37538e486dd6317ce623900fe800000002000e0865a6596aff57b00000000000000000000000000ac14"], 0xfe1b) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'sit0\x00'}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000740)={0x0, 0x5, &(0x7f0000000040)=ANY=[@ANYBLOB="0000186df4b1768c36153d42", @ANYRES32, @ANYRES16=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000300), 0x20200, 0x0) ioctl$TUNSETVNETBE(r1, 0x400454de, 0x0) perf_event_open(&(0x7f0000000a00)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x400, 0xe1589, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x401, 0x0, 0x0, 0x7}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d2e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x7, 0x9e0}, 0x400, 0x0, 0x0, 0x8, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000a40)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r2, 0x18000000000002a0, 0xe, 0x0, &(0x7f00000002c0)="f6ea090003000060009ba53886dd", 0x0, 0x608, 0x60000000, 0x0, 0x0, 0x0, 0x0}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x4, 0x6, &(0x7f0000000000)=@framed={{0xffffffb4, 0x8, 0x0, 0x0, 0x0, 0x73, 0x11, 0x36}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @call={0xb7}, @exit={0x95, 0x0, 0xc2}], {0x95, 0x0, 0x1200}}, &(0x7f0000000080)='GPL\x00', 0x4, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x70) socketpair(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x89f1, &(0x7f0000000080)) 172.665358ms ago: executing program 3 (id=807): r0 = bpf$MAP_CREATE(0x0, 0x0, 0x50) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x11, 0xc, 0x0, &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) socketpair$tipc(0x1e, 0x5, 0x0, 0x0) r2 = perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0x56, 0x1, 0x0, 0x0, 0x0, 0x7fef, 0x82, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x107b7b, 0x1, @perf_config_ext={0x2, 0x8000000000000000}, 0x208, 0x2e, 0xfffffbff, 0x6, 0x2, 0x0, 0x6, 0x0, 0x0, 0x0, 0xa9e6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0xffffffffffffffff}, 0x0, 0xc8, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x1) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r4) recvmsg$unix(r3, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8b26, &(0x7f0000000000)={'wlan1\x00', @random="0202000400"}) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="8fedcb7907009875f37538e486dd6349363006"], 0xfdef) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="007a707573657420006370750806"], 0x12) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={0xffffffffffffffff, 0x5, 0x1, 0x0, &(0x7f0000000000)='%', 0x0, 0xd01, 0x80040000, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x50) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) close(r6) recvmsg$unix(r5, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r7, &(0x7f0000000000)=ANY=[], 0xfdef) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000200)={'veth0_to_bridge\x00', 0x10}) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000340)=0xffffffffffffffff, 0x4) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000007c0)=ANY=[@ANYBLOB="f7ff0100050000000000", @ANYRES32=r1, @ANYBLOB="0000000000000000000000000000000016000000", @ANYRES16=r2, @ANYRES32=r7, @ANYBLOB="050000000412c0a2425ceb6fb600000000000000000000000000000033f39ba4875d2c630f90e97b5e2366f3aabbf5efbdff07000017bb2761cd42ce4b3681f4"], 0x50) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0xffbf) 172.107498ms ago: executing program 1 (id=808): perf_event_open(&(0x7f00000010c0)={0x2, 0x80, 0xb3, 0x0, 0x0, 0x0, 0x0, 0x4c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x40a0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0xc48, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x44, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000, 0x0, @perf_bp={0x0, 0x6}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000340)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x21, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x40000000}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0600020001000000007c82a414087081661c0800", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xc, 0xc, &(0x7f0000000000)=ANY=[@ANYBLOB="1800000000000000000000000000000018150000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000ff0100007b8af8ff00000000bfa200000000000007020000f8ffffffb703000004000000b704000000000000850000001500000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000600)={r1, 0x0, 0xe, 0x0, &(0x7f0000000100)="e0857f9f582f0300000000000000", 0x0, 0xfffffffc, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) bpf$MAP_CREATE(0x0, &(0x7f0000000840)=ANY=[@ANYBLOB="0a00000001010000ff7f0000cc"], 0x48) close(0xffffffffffffffff) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xb, 0x2, 0x0, 0x0, 0x0, 0x0, 0x80350, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000180), 0x0, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000080)={'pimreg0\x00', 0x7c2}) ioctl$TUNSETQUEUE(r3, 0x400454d9, &(0x7f00000000c0)={'macsec0\x00', 0x400}) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000340)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x21, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x3}, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TUNSETQUEUE(r3, 0x400454d9, &(0x7f00000006c0)={'bridge_slave_0\x00', 0x600}) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5c31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x7ff}}, 0x0, 0xffffffffffffffff, r2, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)) recvmsg$unix(0xffffffffffffffff, 0x0, 0x0) ioctl$TUNGETVNETLE(0xffffffffffffffff, 0x800454dd, 0x0) mkdir(&(0x7f0000000200)='./file0\x00', 0x1c8) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8946, &(0x7f0000000080)) 31.72647ms ago: executing program 4 (id=809): unlink(&(0x7f0000000100)='./file0\x00') r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x10, 0x3, 0x8, &(0x7f00000000c0)) close(r0) openat$ppp(0xffffffffffffff9c, &(0x7f0000000040), 0x20080, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000600)={0x18, 0x3, &(0x7f0000000000)=@framed={{0xad, 0xa, 0xa, 0x0, 0x0, 0x71, 0x10, 0x15}}, &(0x7f0000000480)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) ioctl$TUNSETOFFLOAD(r0, 0xc004743e, 0x10) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x11, 0x4, 0x4, 0x80000001, 0x10, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x3, 0x0, 0x0, @void, @value, @void, @value}, 0x50) ioctl$TUNGETVNETLE(r0, 0x800454dd, &(0x7f0000000000)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) r1 = openat$cgroup_procs(0xffffffffffffffff, 0x0, 0x2, 0x0) write$cgroup_pid(r1, &(0x7f0000000c40), 0x12) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x18028, 0x2, 0x0, 0x0, 0x0, 0x8000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x4, [@var={0x2, 0x0, 0x0, 0xe, 0x2}, @volatile={0x0, 0x0, 0x0, 0x2}]}, {0x0, [0x0, 0x2e]}}, 0x0, 0x38, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x20) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$sock_attach_bpf(r2, 0x1, 0x42, 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='cgroup.freeze\x00', 0x275a, 0x0) write$cgroup_int(r3, &(0x7f0000000200)=0x1, 0x12) write$cgroup_pid(r3, 0x0, 0x0) ioctl$TUNGETVNETLE(r0, 0x800454dd, &(0x7f0000000140)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r4 = openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f0000000080)={'syzkaller0\x00', 0xf301}) r5 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100), 0xc1842, 0x0) ioctl$TUNSETIFF(r5, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x8914, &(0x7f0000000080)) 0s ago: executing program 3 (id=810): bpf$PROG_LOAD(0x2d, &(0x7f0000000440)={0xe, 0x6, &(0x7f0000000000)=@framed={{0x5, 0x0, 0x0, 0x0, 0x0, 0x71, 0x11, 0x35}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @call={0x85, 0x0, 0x0, 0x5}, @exit], {0x95, 0x0, 0x5a5}}, &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @sk_skb, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x70) kernel console output (not intermixed with test programs): Warning: Permanently added '10.128.1.78' (ED25519) to the list of known hosts. [ 20.220404][ T23] audit: type=1400 audit(1748016565.400:81): avc: denied { mounton } for pid=329 comm="syz-executor" path="/syzcgroup/unified" dev="sda1" ino=1925 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 20.222252][ T329] cgroup1: Unknown subsys name 'net' [ 20.228724][ T23] audit: type=1400 audit(1748016565.410:82): avc: denied { mount } for pid=329 comm="syz-executor" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 20.230097][ T329] cgroup1: Unknown subsys name 'net_prio' [ 20.239429][ T329] cgroup1: Unknown subsys name 'devices' [ 20.243524][ T23] audit: type=1400 audit(1748016565.430:83): avc: denied { unmount } for pid=329 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 20.413384][ T329] cgroup1: Unknown subsys name 'hugetlb' [ 20.420341][ T329] cgroup1: Unknown subsys name 'rlimit' [ 20.589458][ T23] audit: type=1400 audit(1748016565.770:84): avc: denied { setattr } for pid=329 comm="syz-executor" name="raw-gadget" dev="devtmpfs" ino=10478 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 20.612883][ T23] audit: type=1400 audit(1748016565.770:85): avc: denied { mounton } for pid=329 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1 [ 20.637635][ T23] audit: type=1400 audit(1748016565.770:86): avc: denied { mount } for pid=329 comm="syz-executor" name="/" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=filesystem permissive=1 [ 20.644821][ T332] SELinux: Context root:object_r:swapfile_t is not valid (left unmapped). [ 20.669556][ T23] audit: type=1400 audit(1748016565.850:87): avc: denied { relabelto } for pid=332 comm="mkswap" name="swap-file" dev="sda1" ino=1928 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 20.695222][ T23] audit: type=1400 audit(1748016565.850:88): avc: denied { write } for pid=332 comm="mkswap" path="/root/swap-file" dev="sda1" ino=1928 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" Setting up swapspace version 1, size = 127995904 bytes [ 20.793103][ T23] audit: type=1400 audit(1748016565.980:89): avc: denied { read } for pid=329 comm="syz-executor" name="swap-file" dev="sda1" ino=1928 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 20.818597][ T23] audit: type=1400 audit(1748016565.980:90): avc: denied { open } for pid=329 comm="syz-executor" path="/root/swap-file" dev="sda1" ino=1928 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 20.844844][ T329] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 21.306363][ T340] bridge0: port 1(bridge_slave_0) entered blocking state [ 21.313426][ T340] bridge0: port 1(bridge_slave_0) entered disabled state [ 21.320991][ T340] device bridge_slave_0 entered promiscuous mode [ 21.329053][ T340] bridge0: port 2(bridge_slave_1) entered blocking state [ 21.336423][ T340] bridge0: port 2(bridge_slave_1) entered disabled state [ 21.343846][ T340] device bridge_slave_1 entered promiscuous mode [ 21.408014][ T343] bridge0: port 1(bridge_slave_0) entered blocking state [ 21.415490][ T343] bridge0: port 1(bridge_slave_0) entered disabled state [ 21.423506][ T343] device bridge_slave_0 entered promiscuous mode [ 21.431817][ T343] bridge0: port 2(bridge_slave_1) entered blocking state [ 21.438840][ T343] bridge0: port 2(bridge_slave_1) entered disabled state [ 21.446524][ T343] device bridge_slave_1 entered promiscuous mode [ 21.464197][ T342] bridge0: port 1(bridge_slave_0) entered blocking state [ 21.471389][ T342] bridge0: port 1(bridge_slave_0) entered disabled state [ 21.478855][ T342] device bridge_slave_0 entered promiscuous mode [ 21.487398][ T342] bridge0: port 2(bridge_slave_1) entered blocking state [ 21.494571][ T342] bridge0: port 2(bridge_slave_1) entered disabled state [ 21.502085][ T342] device bridge_slave_1 entered promiscuous mode [ 21.508605][ T339] bridge0: port 1(bridge_slave_0) entered blocking state [ 21.515891][ T339] bridge0: port 1(bridge_slave_0) entered disabled state [ 21.523424][ T339] device bridge_slave_0 entered promiscuous mode [ 21.543042][ T339] bridge0: port 2(bridge_slave_1) entered blocking state [ 21.550082][ T339] bridge0: port 2(bridge_slave_1) entered disabled state [ 21.557584][ T339] device bridge_slave_1 entered promiscuous mode [ 21.612389][ T341] bridge0: port 1(bridge_slave_0) entered blocking state [ 21.619461][ T341] bridge0: port 1(bridge_slave_0) entered disabled state [ 21.626954][ T341] device bridge_slave_0 entered promiscuous mode [ 21.651050][ T341] bridge0: port 2(bridge_slave_1) entered blocking state [ 21.658092][ T341] bridge0: port 2(bridge_slave_1) entered disabled state [ 21.665598][ T341] device bridge_slave_1 entered promiscuous mode [ 21.725848][ T343] bridge0: port 2(bridge_slave_1) entered blocking state [ 21.732971][ T343] bridge0: port 2(bridge_slave_1) entered forwarding state [ 21.740425][ T343] bridge0: port 1(bridge_slave_0) entered blocking state [ 21.747496][ T343] bridge0: port 1(bridge_slave_0) entered forwarding state [ 21.776071][ T340] bridge0: port 2(bridge_slave_1) entered blocking state [ 21.783135][ T340] bridge0: port 2(bridge_slave_1) entered forwarding state [ 21.844329][ T341] bridge0: port 2(bridge_slave_1) entered blocking state [ 21.851384][ T341] bridge0: port 2(bridge_slave_1) entered forwarding state [ 21.858639][ T341] bridge0: port 1(bridge_slave_0) entered blocking state [ 21.865672][ T341] bridge0: port 1(bridge_slave_0) entered forwarding state [ 21.879462][ T339] bridge0: port 2(bridge_slave_1) entered blocking state [ 21.886516][ T339] bridge0: port 2(bridge_slave_1) entered forwarding state [ 21.893762][ T339] bridge0: port 1(bridge_slave_0) entered blocking state [ 21.900796][ T339] bridge0: port 1(bridge_slave_0) entered forwarding state [ 21.916868][ T7] bridge0: port 2(bridge_slave_1) entered disabled state [ 21.924196][ T7] bridge0: port 1(bridge_slave_0) entered disabled state [ 21.931782][ T7] bridge0: port 2(bridge_slave_1) entered disabled state [ 21.939152][ T7] bridge0: port 1(bridge_slave_0) entered disabled state [ 21.946443][ T7] bridge0: port 2(bridge_slave_1) entered disabled state [ 21.953677][ T7] bridge0: port 1(bridge_slave_0) entered disabled state [ 21.960951][ T7] bridge0: port 2(bridge_slave_1) entered disabled state [ 21.968779][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 21.976385][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 21.993660][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 22.002124][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 22.010273][ T7] bridge0: port 1(bridge_slave_0) entered blocking state [ 22.017318][ T7] bridge0: port 1(bridge_slave_0) entered forwarding state [ 22.035887][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 22.043948][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 22.052284][ T7] bridge0: port 1(bridge_slave_0) entered blocking state [ 22.059291][ T7] bridge0: port 1(bridge_slave_0) entered forwarding state [ 22.066957][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 22.075541][ T7] bridge0: port 2(bridge_slave_1) entered blocking state [ 22.082580][ T7] bridge0: port 2(bridge_slave_1) entered forwarding state [ 22.089939][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 22.105573][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 22.113821][ T7] bridge0: port 2(bridge_slave_1) entered blocking state [ 22.120866][ T7] bridge0: port 2(bridge_slave_1) entered forwarding state [ 22.155345][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 22.164830][ T7] bridge0: port 1(bridge_slave_0) entered blocking state [ 22.171890][ T7] bridge0: port 1(bridge_slave_0) entered forwarding state [ 22.179639][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 22.188061][ T7] bridge0: port 2(bridge_slave_1) entered blocking state [ 22.195102][ T7] bridge0: port 2(bridge_slave_1) entered forwarding state [ 22.202456][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 22.210402][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 22.218441][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 22.226543][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 22.243318][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 22.254335][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 22.277972][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 22.286431][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 22.294528][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 22.302883][ T7] bridge0: port 1(bridge_slave_0) entered blocking state [ 22.309889][ T7] bridge0: port 1(bridge_slave_0) entered forwarding state [ 22.317264][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 22.325425][ T7] bridge0: port 2(bridge_slave_1) entered blocking state [ 22.332530][ T7] bridge0: port 2(bridge_slave_1) entered forwarding state [ 22.340196][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 22.364057][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 22.373335][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 22.381622][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 22.389704][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 22.399042][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 22.407383][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 22.415729][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 22.424179][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 22.432508][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 22.440888][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 22.471616][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 22.480236][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 22.488572][ T7] bridge0: port 1(bridge_slave_0) entered blocking state [ 22.495597][ T7] bridge0: port 1(bridge_slave_0) entered forwarding state [ 22.505017][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 22.513497][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 22.521874][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 22.530131][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 22.538414][ T7] bridge0: port 2(bridge_slave_1) entered blocking state [ 22.545467][ T7] bridge0: port 2(bridge_slave_1) entered forwarding state [ 22.553093][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 22.561084][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 22.568987][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 22.577158][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 22.585133][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 22.593532][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 22.601657][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 22.609945][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 22.618714][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 22.627038][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 22.635257][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 22.643559][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 22.651828][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 22.659727][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 22.684018][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 22.684253][ T340] request_module fs-gadgetfs succeeded, but still no fs? [ 22.692731][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 22.732850][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 22.742199][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 22.751093][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 22.759328][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 22.767881][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 22.770550][ C1] hrtimer: interrupt took 33096 ns [ 22.781751][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 22.790126][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 22.798907][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 22.807470][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 22.816077][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 22.825105][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 22.833855][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 22.877737][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 22.907330][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 22.916848][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 22.970852][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 23.012010][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 23.050953][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 23.179257][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 23.194919][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 23.226480][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 23.235188][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 23.243890][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 23.252969][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 23.261845][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 23.270287][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 23.326628][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 23.346527][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 23.358361][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 23.367977][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 23.498529][ T377] bridge0: port 3(veth0) entered blocking state [ 23.505548][ T377] bridge0: port 3(veth0) entered disabled state [ 23.518308][ T377] device veth0 entered promiscuous mode [ 23.525780][ T377] bridge0: port 3(veth0) entered blocking state [ 23.532114][ T377] bridge0: port 3(veth0) entered forwarding state [ 23.566937][ T380] device veth0 left promiscuous mode [ 23.580679][ T380] bridge0: port 3(veth0) entered disabled state [ 24.649822][ T400] syz.0.14 (400) used greatest stack depth: 22896 bytes left [ 25.502812][ T23] kauditd_printk_skb: 40 callbacks suppressed [ 25.502824][ T23] audit: type=1400 audit(1748016570.690:132): avc: denied { create } for pid=405 comm="syz.3.16" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 25.566895][ T23] audit: type=1400 audit(1748016570.690:131): avc: denied { create } for pid=405 comm="syz.3.16" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 27.208670][ T433] cgroup: syz.1.27 (433) created nested cgroup for controller "memory" which has incomplete hierarchy support. Nested cgroups may change behavior in the future. [ 27.276339][ T433] cgroup: "memory" requires setting use_hierarchy to 1 on the root [ 27.333349][ T436] bridge0: port 2(bridge_slave_1) entered disabled state [ 27.340610][ T436] bridge0: port 1(bridge_slave_0) entered disabled state [ 27.470644][ T433] bridge0: port 2(bridge_slave_1) entered blocking state [ 27.477844][ T433] bridge0: port 2(bridge_slave_1) entered forwarding state [ 27.489788][ T433] bridge0: port 1(bridge_slave_0) entered blocking state [ 27.496909][ T433] bridge0: port 1(bridge_slave_0) entered forwarding state [ 27.522572][ T433] device bridge0 entered promiscuous mode [ 30.871220][ T23] audit: type=1400 audit(1748016576.030:133): avc: denied { relabelfrom } for pid=486 comm="syz.2.44" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tun_socket permissive=1 [ 30.960615][ T23] audit: type=1400 audit(1748016576.090:134): avc: denied { relabelto } for pid=486 comm="syz.2.44" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tun_socket permissive=1 [ 31.186754][ T489] device syzkaller0 entered promiscuous mode [ 32.287358][ T23] audit: type=1400 audit(1748016577.460:135): avc: denied { create } for pid=537 comm="syz.0.58" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 33.936867][ T23] audit: type=1400 audit(1748016579.100:136): avc: denied { write } for pid=600 comm="syz.4.79" name="ppp" dev="devtmpfs" ino=9786 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ppp_device_t tclass=chr_file permissive=1 [ 39.675854][ T745] device syzkaller0 entered promiscuous mode [ 39.740866][ T745] FAULT_INJECTION: forcing a failure. [ 39.740866][ T745] name failslab, interval 1, probability 0, space 0, times 1 [ 39.756619][ T745] CPU: 0 PID: 745 Comm: syz.3.127 Not tainted 5.4.292-syzkaller-00021-gcd8e74fa0fa3 #0 [ 39.766263][ T745] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 39.776333][ T745] Call Trace: [ 39.779644][ T745] __dump_stack+0x1e/0x20 [ 39.783978][ T745] dump_stack+0x15b/0x1b8 [ 39.788310][ T745] ? thaw_kernel_threads+0x220/0x220 [ 39.793593][ T745] ? show_regs_print_info+0x18/0x18 [ 39.798795][ T745] should_fail+0x69e/0x7e0 [ 39.803218][ T745] ? setup_fault_attr+0x230/0x230 [ 39.808247][ T745] __should_failslab+0x10c/0x150 [ 39.813184][ T745] ? alloc_skb_with_frags+0xa2/0x560 [ 39.818467][ T745] should_failslab+0x9/0x20 [ 39.822975][ T745] __kmalloc_track_caller+0x52/0x2d0 [ 39.828257][ T745] ? kmem_cache_alloc+0xe2/0x270 [ 39.833192][ T745] ? __alloc_skb+0x9e/0x500 [ 39.837696][ T745] ? alloc_skb_with_frags+0xa2/0x560 [ 39.842975][ T745] __alloc_skb+0xdc/0x500 [ 39.847312][ T745] alloc_skb_with_frags+0xa2/0x560 [ 39.852425][ T745] sock_alloc_send_pskb+0x81c/0x930 [ 39.857621][ T745] ? sock_kzfree_s+0x60/0x60 [ 39.862204][ T745] ? iov_iter_advance+0x1f7/0x750 [ 39.867235][ T745] tun_get_user+0x4bb/0x2f50 [ 39.871826][ T745] ? _kstrtoull+0x3c0/0x4d0 [ 39.876323][ T745] ? tun_do_read+0x1c40/0x1c40 [ 39.881083][ T745] ? kstrtouint_from_user+0x1a0/0x200 [ 39.886449][ T745] ? kstrtol_from_user+0x260/0x260 [ 39.891553][ T745] ? do_syscall_64+0xcf/0x170 [ 39.896235][ T745] ? __kasan_check_write+0x14/0x20 [ 39.901344][ T745] ? proc_fail_nth_write+0x17a/0x1f0 [ 39.906621][ T745] ? proc_fail_nth_read+0x210/0x210 [ 39.911816][ T745] tun_chr_write_iter+0x1c7/0x270 [ 39.916840][ T745] __vfs_write+0x480/0x5d0 [ 39.921251][ T745] ? __kernel_write+0x320/0x320 [ 39.926095][ T745] ? fsnotify+0xdea/0xeb0 [ 39.930446][ T745] ? security_file_permission+0xde/0x300 [ 39.936077][ T745] ? rw_verify_area+0x1c0/0x360 [ 39.940923][ T745] vfs_write+0x20e/0x4c0 [ 39.945159][ T745] ksys_write+0x140/0x240 [ 39.949480][ T745] ? __ia32_sys_read+0x90/0x90 [ 39.954237][ T745] ? debug_smp_processor_id+0x1c/0x20 [ 39.959605][ T745] ? fpregs_assert_state_consistent+0xb1/0xe0 [ 39.965692][ T745] __x64_sys_write+0x7b/0x90 [ 39.970280][ T745] do_syscall_64+0xcf/0x170 [ 39.974777][ T745] entry_SYSCALL_64_after_hwframe+0x5c/0xc1 [ 39.980675][ T745] RIP: 0033:0x7ff931fc5969 [ 39.985088][ T745] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 40.004689][ T745] RSP: 002b:00007ff93062e038 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 40.013094][ T745] RAX: ffffffffffffffda RBX: 00007ff9321ecfa0 RCX: 00007ff931fc5969 [ 40.021058][ T745] RDX: 000000000000ffdd RSI: 0000200000000140 RDI: 0000000000000003 [ 40.029021][ T745] RBP: 00007ff93062e090 R08: 0000000000000000 R09: 0000000000000000 [ 40.036982][ T745] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 40.044947][ T745] R13: 0000000000000000 R14: 00007ff9321ecfa0 R15: 00007fff9387b7d8 [ 40.511171][ T764] device syzkaller0 entered promiscuous mode [ 40.663307][ T23] audit: type=1400 audit(1748016585.850:137): avc: denied { read } for pid=772 comm="syz.4.137" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 41.649168][ T805] device syzkaller0 entered promiscuous mode [ 41.762982][ T23] audit: type=1400 audit(1748016586.950:138): avc: denied { create } for pid=797 comm="syz.2.142" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 42.749110][ T782] device syzkaller0 entered promiscuous mode [ 42.955338][ T822] FAULT_INJECTION: forcing a failure. [ 42.955338][ T822] name failslab, interval 1, probability 0, space 0, times 0 [ 43.030902][ T822] CPU: 0 PID: 822 Comm: syz.1.148 Not tainted 5.4.292-syzkaller-00021-gcd8e74fa0fa3 #0 [ 43.040556][ T822] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 43.050610][ T822] Call Trace: [ 43.053904][ T822] __dump_stack+0x1e/0x20 [ 43.058230][ T822] dump_stack+0x15b/0x1b8 [ 43.062566][ T822] ? thaw_kernel_threads+0x220/0x220 [ 43.067851][ T822] ? show_regs_print_info+0x18/0x18 [ 43.073051][ T822] ? should_fail+0x3f5/0x7e0 [ 43.077638][ T822] should_fail+0x69e/0x7e0 [ 43.082056][ T822] ? setup_fault_attr+0x230/0x230 [ 43.087084][ T822] __should_failslab+0x10c/0x150 [ 43.092041][ T822] ? rtmsg_ifinfo_build_skb+0x7c/0x180 [ 43.097498][ T822] should_failslab+0x9/0x20 [ 43.101999][ T822] __kmalloc_track_caller+0x52/0x2d0 [ 43.107278][ T822] ? kmem_cache_alloc+0xe2/0x270 [ 43.112213][ T822] ? __alloc_skb+0x9e/0x500 [ 43.116717][ T822] ? rtmsg_ifinfo_build_skb+0x7c/0x180 [ 43.122171][ T822] __alloc_skb+0xdc/0x500 [ 43.126504][ T822] ? if_nlmsg_size+0x4f4/0x520 [ 43.131266][ T822] rtmsg_ifinfo_build_skb+0x7c/0x180 [ 43.136546][ T822] rtnetlink_event+0xd2/0x1a0 [ 43.141254][ T822] raw_notifier_call_chain+0xa0/0x120 [ 43.146624][ T822] call_netdevice_notifiers_mtu+0xd2/0x140 [ 43.152425][ T822] ? dev_set_mtu_ext+0x590/0x590 [ 43.157359][ T822] dev_set_mtu_ext+0x3cc/0x590 [ 43.162124][ T822] ? selinux_capable+0x127/0x380 [ 43.167056][ T822] ? dev_validate_mtu+0x150/0x150 [ 43.172077][ T822] dev_set_mtu+0x44/0xc0 [ 43.176316][ T822] dev_ifsioc+0x3bb/0xa40 [ 43.180638][ T822] ? mutex_trylock+0xa0/0xa0 [ 43.185222][ T822] ? dev_ioctl+0xb80/0xb80 [ 43.189632][ T822] ? dev_load+0x34/0xb0 [ 43.193782][ T822] dev_ioctl+0x550/0xb80 [ 43.198171][ T822] sock_do_ioctl+0x235/0x330 [ 43.202757][ T822] ? sock_splice_read+0xe0/0xe0 [ 43.207608][ T822] ? apic_timer_interrupt+0xa/0x20 [ 43.212724][ T822] ? sock_ioctl+0x1a2/0x710 [ 43.217228][ T822] ? __sanitizer_cov_trace_switch+0x5c/0xd0 [ 43.223115][ T822] sock_ioctl+0x505/0x710 [ 43.227439][ T822] ? sock_poll+0x2f0/0x2f0 [ 43.231844][ T822] ? __vfs_write+0xf9/0x5d0 [ 43.236342][ T822] ? sock_poll+0x2f0/0x2f0 [ 43.240754][ T822] do_vfs_ioctl+0x753/0x13f0 [ 43.245339][ T822] ? ioctl_preallocate+0x1c0/0x1c0 [ 43.250453][ T822] ? __fget+0x3be/0x440 [ 43.254606][ T822] ? fget_many+0x30/0x30 [ 43.258840][ T822] ? check_preemption_disabled+0x118/0x300 [ 43.264641][ T822] ? debug_smp_processor_id+0x20/0x20 [ 43.270013][ T822] ? security_file_ioctl+0x84/0xa0 [ 43.275119][ T822] __x64_sys_ioctl+0xe1/0x120 [ 43.279790][ T822] do_syscall_64+0xcf/0x170 [ 43.284288][ T822] entry_SYSCALL_64_after_hwframe+0x5c/0xc1 [ 43.290171][ T822] RIP: 0033:0x7fdfaa109969 [ 43.294579][ T822] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 43.314202][ T822] RSP: 002b:00007fdfa8772038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 43.322638][ T822] RAX: ffffffffffffffda RBX: 00007fdfaa330fa0 RCX: 00007fdfaa109969 [ 43.330603][ T822] RDX: 0000200000000080 RSI: 0000000000008922 RDI: 0000000000000006 [ 43.338567][ T822] RBP: 00007fdfa8772090 R08: 0000000000000000 R09: 0000000000000000 [ 43.346535][ T822] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 43.354500][ T822] R13: 0000000000000000 R14: 00007fdfaa330fa0 R15: 00007ffcdfa5d868 [ 43.425170][ T838] FAULT_INJECTION: forcing a failure. [ 43.425170][ T838] name fail_page_alloc, interval 1, probability 0, space 0, times 1 [ 43.461115][ T838] CPU: 0 PID: 838 Comm: syz.0.154 Not tainted 5.4.292-syzkaller-00021-gcd8e74fa0fa3 #0 [ 43.470768][ T838] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 43.480820][ T838] Call Trace: [ 43.484114][ T838] __dump_stack+0x1e/0x20 [ 43.488441][ T838] dump_stack+0x15b/0x1b8 [ 43.492777][ T838] ? thaw_kernel_threads+0x220/0x220 [ 43.498059][ T838] ? stack_trace_save+0xaa/0xf0 [ 43.502906][ T838] ? show_regs_print_info+0x18/0x18 [ 43.508106][ T838] ? __kasan_kmalloc+0x1c3/0x200 [ 43.513056][ T838] ? stack_trace_snprint+0x170/0x170 [ 43.518341][ T838] should_fail+0x69e/0x7e0 [ 43.522782][ T838] ? setup_fault_attr+0x230/0x230 [ 43.527810][ T838] ? entry_SYSCALL_64_after_hwframe+0x5c/0xc1 [ 43.534159][ T838] should_fail_alloc_page+0x4f/0x60 [ 43.539353][ T838] __alloc_pages_nodemask+0xf5/0x4b0 [ 43.544639][ T838] ? gfp_pfmemalloc_allowed+0x130/0x130 [ 43.550184][ T838] kmalloc_order_trace+0x31/0x100 [ 43.555306][ T838] ? alloc_skb_with_frags+0xa2/0x560 [ 43.560588][ T838] __kmalloc_track_caller+0x166/0x2d0 [ 43.565954][ T838] ? kmem_cache_alloc+0xe2/0x270 [ 43.570921][ T838] ? __alloc_skb+0x9e/0x500 [ 43.575433][ T838] ? alloc_skb_with_frags+0xa2/0x560 [ 43.580716][ T838] __alloc_skb+0xdc/0x500 [ 43.585045][ T838] alloc_skb_with_frags+0xa2/0x560 [ 43.590153][ T838] sock_alloc_send_pskb+0x81c/0x930 [ 43.595350][ T838] ? sock_kzfree_s+0x60/0x60 [ 43.599940][ T838] ? __kernel_text_address+0xa0/0x100 [ 43.605317][ T838] ? unwind_get_return_address+0x4d/0x90 [ 43.610951][ T838] ? stack_trace_save+0xf0/0xf0 [ 43.615807][ T838] tun_get_user+0x4bb/0x2f50 [ 43.620404][ T838] ? tun_do_read+0x1c40/0x1c40 [ 43.625174][ T838] ? kstrtouint_from_user+0x1a0/0x200 [ 43.630549][ T838] ? kstrtol_from_user+0x260/0x260 [ 43.635654][ T838] ? do_syscall_64+0xcf/0x170 [ 43.640325][ T838] ? __kasan_check_write+0x14/0x20 [ 43.645432][ T838] ? proc_fail_nth_write+0x17a/0x1f0 [ 43.650701][ T838] ? proc_fail_nth_read+0x210/0x210 [ 43.655895][ T838] tun_chr_write_iter+0x1c7/0x270 [ 43.660905][ T838] __vfs_write+0x480/0x5d0 [ 43.665306][ T838] ? __kernel_write+0x320/0x320 [ 43.670172][ T838] ? fsnotify+0xdea/0xeb0 [ 43.674493][ T838] ? security_file_permission+0xde/0x300 [ 43.680109][ T838] ? rw_verify_area+0x1c0/0x360 [ 43.684942][ T838] vfs_write+0x20e/0x4c0 [ 43.689168][ T838] ksys_write+0x140/0x240 [ 43.693482][ T838] ? __ia32_sys_read+0x90/0x90 [ 43.698234][ T838] ? debug_smp_processor_id+0x1c/0x20 [ 43.703588][ T838] ? fpregs_assert_state_consistent+0xb1/0xe0 [ 43.709649][ T838] __x64_sys_write+0x7b/0x90 [ 43.714232][ T838] do_syscall_64+0xcf/0x170 [ 43.718728][ T838] entry_SYSCALL_64_after_hwframe+0x5c/0xc1 [ 43.724609][ T838] RIP: 0033:0x7f28f0ff0969 [ 43.729011][ T838] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 43.748595][ T838] RSP: 002b:00007f28ef659038 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 43.756998][ T838] RAX: ffffffffffffffda RBX: 00007f28f1217fa0 RCX: 00007f28f0ff0969 [ 43.764961][ T838] RDX: 000000000000fdef RSI: 0000200000000280 RDI: 00000000000000c8 [ 43.773005][ T838] RBP: 00007f28ef659090 R08: 0000000000000000 R09: 0000000000000000 [ 43.780959][ T838] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 43.788912][ T838] R13: 0000000000000000 R14: 00007f28f1217fa0 R15: 00007ffff6002cf8 [ 44.793848][ T856] device syzkaller0 entered promiscuous mode [ 45.202303][ T882] FAULT_INJECTION: forcing a failure. [ 45.202303][ T882] name failslab, interval 1, probability 0, space 0, times 0 [ 45.301217][ T882] CPU: 0 PID: 882 Comm: syz.4.167 Not tainted 5.4.292-syzkaller-00021-gcd8e74fa0fa3 #0 [ 45.310872][ T882] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 45.320927][ T882] Call Trace: [ 45.324224][ T882] __dump_stack+0x1e/0x20 [ 45.328551][ T882] dump_stack+0x15b/0x1b8 [ 45.332886][ T882] ? thaw_kernel_threads+0x220/0x220 [ 45.338173][ T882] ? show_regs_print_info+0x18/0x18 [ 45.343376][ T882] should_fail+0x69e/0x7e0 [ 45.347794][ T882] ? setup_fault_attr+0x230/0x230 [ 45.352818][ T882] ? __schedule+0xa57/0x12a0 [ 45.357407][ T882] ? rcu_preempt_deferred_qs_irqrestore+0x755/0xae0 [ 45.358568][ T23] audit: type=1400 audit(1748016590.540:139): avc: denied { create } for pid=885 comm="syz.0.168" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=isdn_socket permissive=1 [ 45.364025][ T882] ? tipc_conn_alloc+0x5a/0x460 [ 45.364038][ T882] __should_failslab+0x10c/0x150 [ 45.364049][ T882] should_failslab+0x9/0x20 [ 45.364061][ T882] kmem_cache_alloc_trace+0x2d/0x290 [ 45.364073][ T882] tipc_conn_alloc+0x5a/0x460 [ 45.364083][ T882] ? rcu_read_unlock_special+0x239/0x520 [ 45.364095][ T882] tipc_topsrv_kern_subscr+0x15e/0x380 [ 45.364113][ T882] ? conn_put+0x320/0x320 [ 45.422848][ T882] tipc_group_create+0x40e/0x650 [ 45.427795][ T882] tipc_sk_join+0x15b/0x8c0 [ 45.432312][ T882] tipc_setsockopt+0x3f2/0x6f0 [ 45.437083][ T882] ? tipc_shutdown+0x460/0x460 [ 45.441849][ T882] ? check_preemption_disabled+0x118/0x300 [ 45.447656][ T882] ? security_socket_setsockopt+0x82/0xa0 [ 45.453383][ T882] __sys_setsockopt+0x3ca/0x4e0 [ 45.458235][ T882] ? __kasan_check_write+0x14/0x20 [ 45.463361][ T882] ? sockfs_listxattr+0xf0/0xf0 [ 45.468205][ T882] ? check_preemption_disabled+0x118/0x300 [ 45.474010][ T882] ? task_work_run+0x15e/0x170 [ 45.478768][ T882] ? apic_timer_interrupt+0xa/0x20 [ 45.483878][ T882] __x64_sys_setsockopt+0xbf/0xd0 [ 45.488900][ T882] do_syscall_64+0xcf/0x170 [ 45.493405][ T882] entry_SYSCALL_64_after_hwframe+0x5c/0xc1 [ 45.499310][ T882] RIP: 0033:0x7f48790d6969 [ 45.503734][ T882] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 45.523342][ T882] RSP: 002b:00007f487773f038 EFLAGS: 00000246 ORIG_RAX: 0000000000000036 [ 45.531750][ T882] RAX: ffffffffffffffda RBX: 00007f48792fdfa0 RCX: 00007f48790d6969 [ 45.539720][ T882] RDX: 0000000000000087 RSI: 000000000000010f RDI: 0000000000000007 [ 45.547687][ T882] RBP: 00007f487773f090 R08: 00000000000004bd R09: 0000000000000000 [ 45.555654][ T882] R10: 0000200000000180 R11: 0000000000000246 R12: 0000000000000001 [ 45.563627][ T882] R13: 0000000000000000 R14: 00007f48792fdfa0 R15: 00007ffe4e0bdf58 [ 45.728356][ T23] audit: type=1400 audit(1748016590.890:140): avc: denied { create } for pid=890 comm="syz.2.170" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_iscsi_socket permissive=1 [ 47.578947][ T941] device syzkaller0 entered promiscuous mode [ 47.604437][ T951] FAULT_INJECTION: forcing a failure. [ 47.604437][ T951] name failslab, interval 1, probability 0, space 0, times 0 [ 47.619249][ T951] CPU: 1 PID: 951 Comm: syz.1.189 Not tainted 5.4.292-syzkaller-00021-gcd8e74fa0fa3 #0 [ 47.629004][ T951] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 47.639061][ T951] Call Trace: [ 47.642355][ T951] __dump_stack+0x1e/0x20 [ 47.646681][ T951] dump_stack+0x15b/0x1b8 [ 47.651010][ T951] ? thaw_kernel_threads+0x220/0x220 [ 47.656298][ T951] ? show_regs_print_info+0x18/0x18 [ 47.661490][ T951] ? __kasan_kmalloc+0x1c3/0x200 [ 47.666421][ T951] ? kasan_kmalloc+0xd/0x20 [ 47.670922][ T951] ? find_next_bit+0xfb/0x100 [ 47.675596][ T951] should_fail+0x69e/0x7e0 [ 47.680012][ T951] ? setup_fault_attr+0x230/0x230 [ 47.685063][ T951] ? __hw_addr_add_ex+0x182/0x5b0 [ 47.690092][ T951] __should_failslab+0x10c/0x150 [ 47.695036][ T951] should_failslab+0x9/0x20 [ 47.699537][ T951] kmem_cache_alloc_trace+0x2d/0x290 [ 47.704820][ T951] __hw_addr_add_ex+0x182/0x5b0 [ 47.709674][ T951] dev_addr_init+0x118/0x1f0 [ 47.714264][ T951] ? pcpu_alloc+0xc88/0x1120 [ 47.718854][ T951] ? dev_addr_flush+0x1d0/0x1d0 [ 47.723707][ T951] alloc_netdev_mqs+0x124/0xc50 [ 47.728556][ T951] ? asan.module_dtor+0x20/0x20 [ 47.733549][ T951] ipip6_tunnel_locate+0x40f/0x5a0 [ 47.738670][ T951] ? skb_clone_writable+0x1d0/0x1d0 [ 47.743872][ T951] ? __kasan_check_write+0x14/0x20 [ 47.748989][ T951] ? _copy_from_user+0xaa/0xe0 [ 47.753764][ T951] ipip6_tunnel_ioctl+0xd13/0xf80 [ 47.758789][ T951] ? sit_tunnel_xmit+0x1d40/0x1d40 [ 47.763909][ T951] dev_ifsioc+0x6a1/0xa40 [ 47.768234][ T951] ? full_name_hash+0xa0/0xf0 [ 47.772906][ T951] ? dev_ioctl+0xb80/0xb80 [ 47.777328][ T951] dev_ioctl+0x5ea/0xb80 [ 47.781571][ T951] sock_ioctl+0x6a1/0x710 [ 47.785898][ T951] ? sock_poll+0x2f0/0x2f0 [ 47.790321][ T951] ? __vfs_write+0xf9/0x5d0 [ 47.794840][ T951] ? fsnotify+0xdea/0xeb0 [ 47.799171][ T951] ? avc_policy_seqno+0x1b/0x70 [ 47.804024][ T951] ? check_preemption_disabled+0x9b/0x300 [ 47.809746][ T951] ? sock_poll+0x2f0/0x2f0 [ 47.814166][ T951] do_vfs_ioctl+0x753/0x13f0 [ 47.818759][ T951] ? ioctl_preallocate+0x1c0/0x1c0 [ 47.823878][ T951] ? __fget+0x3be/0x440 [ 47.828033][ T951] ? fget_many+0x30/0x30 [ 47.832276][ T951] ? ksys_write+0x1eb/0x240 [ 47.836780][ T951] ? __ia32_sys_read+0x90/0x90 [ 47.841548][ T951] ? security_file_ioctl+0x84/0xa0 [ 47.846659][ T951] __x64_sys_ioctl+0xe1/0x120 [ 47.851338][ T951] do_syscall_64+0xcf/0x170 [ 47.855848][ T951] entry_SYSCALL_64_after_hwframe+0x5c/0xc1 [ 47.861736][ T951] RIP: 0033:0x7fdfaa109969 [ 47.866148][ T951] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 47.885753][ T951] RSP: 002b:00007fdfa8751038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 47.894166][ T951] RAX: ffffffffffffffda RBX: 00007fdfaa331080 RCX: 00007fdfaa109969 [ 47.902123][ T951] RDX: 0000200000000080 RSI: 00000000000089f1 RDI: 0000000000000006 [ 47.910088][ T951] RBP: 00007fdfa8751090 R08: 0000000000000000 R09: 0000000000000000 [ 47.918072][ T951] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 47.926051][ T951] R13: 0000000000000000 R14: 00007fdfaa331080 R15: 00007ffcdfa5d868 [ 48.201101][ T971] FAULT_INJECTION: forcing a failure. [ 48.201101][ T971] name failslab, interval 1, probability 0, space 0, times 0 [ 48.268443][ T23] audit: type=1400 audit(1748016593.330:141): avc: denied { tracepoint } for pid=964 comm="syz.2.194" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=1 [ 48.323111][ T971] CPU: 0 PID: 971 Comm: syz.3.196 Not tainted 5.4.292-syzkaller-00021-gcd8e74fa0fa3 #0 [ 48.332762][ T971] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 48.342852][ T971] Call Trace: [ 48.346144][ T971] __dump_stack+0x1e/0x20 [ 48.350471][ T971] dump_stack+0x15b/0x1b8 [ 48.354806][ T971] ? thaw_kernel_threads+0x220/0x220 [ 48.360093][ T971] ? show_regs_print_info+0x18/0x18 [ 48.365404][ T971] should_fail+0x69e/0x7e0 [ 48.369823][ T971] ? setup_fault_attr+0x230/0x230 [ 48.374878][ T971] ? kvmalloc_node+0x88/0xf0 [ 48.379501][ T971] __should_failslab+0x10c/0x150 [ 48.384441][ T971] should_failslab+0x9/0x20 [ 48.388942][ T971] __kmalloc+0x53/0x2f0 [ 48.393107][ T971] ? btf_new_fd+0x26b/0x10d0 [ 48.397702][ T971] kvmalloc_node+0x88/0xf0 [ 48.402119][ T971] btf_new_fd+0x2af/0x10d0 [ 48.406539][ T971] bpf_btf_load+0x49/0x60 [ 48.410873][ T971] __se_sys_bpf+0x485/0x570 [ 48.415376][ T971] ? __x64_sys_bpf+0x90/0x90 [ 48.419963][ T971] ? check_preemption_disabled+0x118/0x300 [ 48.425770][ T971] ? __ia32_sys_read+0x90/0x90 [ 48.430536][ T971] ? debug_smp_processor_id+0x1c/0x20 [ 48.435911][ T971] ? fpregs_assert_state_consistent+0xb1/0xe0 [ 48.441980][ T971] __x64_sys_bpf+0x7b/0x90 [ 48.446397][ T971] do_syscall_64+0xcf/0x170 [ 48.450901][ T971] entry_SYSCALL_64_after_hwframe+0x5c/0xc1 [ 48.456791][ T971] RIP: 0033:0x7ff931fc5969 [ 48.461205][ T971] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 48.480807][ T971] RSP: 002b:00007ff93062e038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 48.489308][ T971] RAX: ffffffffffffffda RBX: 00007ff9321ecfa0 RCX: 00007ff931fc5969 [ 48.497280][ T971] RDX: 0000000000000020 RSI: 0000200000000280 RDI: 0000000000000012 [ 48.505250][ T971] RBP: 00007ff93062e090 R08: 0000000000000000 R09: 0000000000000000 [ 48.513219][ T971] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 48.521282][ T971] R13: 0000000000000001 R14: 00007ff9321ecfa0 R15: 00007fff9387b7d8 [ 48.730828][ T982] FAULT_INJECTION: forcing a failure. [ 48.730828][ T982] name failslab, interval 1, probability 0, space 0, times 0 [ 48.799214][ T982] CPU: 1 PID: 982 Comm: syz.0.200 Not tainted 5.4.292-syzkaller-00021-gcd8e74fa0fa3 #0 [ 48.808868][ T982] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 48.818946][ T982] Call Trace: [ 48.822244][ T982] __dump_stack+0x1e/0x20 [ 48.826575][ T982] dump_stack+0x15b/0x1b8 [ 48.830904][ T982] ? thaw_kernel_threads+0x220/0x220 [ 48.836188][ T982] ? show_regs_print_info+0x18/0x18 [ 48.841385][ T982] ? alloc_vmap_area+0x1cec/0x1db0 [ 48.846495][ T982] should_fail+0x69e/0x7e0 [ 48.850908][ T982] ? setup_fault_attr+0x230/0x230 [ 48.855935][ T982] ? __kasan_check_write+0x14/0x20 [ 48.861051][ T982] ? _raw_spin_lock+0x8e/0xe0 [ 48.865757][ T982] ? _raw_spin_trylock_bh+0x130/0x130 [ 48.871127][ T982] ? __vmalloc_node_range+0x2af/0x6e0 [ 48.876508][ T982] __should_failslab+0x10c/0x150 [ 48.881532][ T982] should_failslab+0x9/0x20 [ 48.886034][ T982] __kmalloc+0x53/0x2f0 [ 48.890187][ T982] __vmalloc_node_range+0x2af/0x6e0 [ 48.895384][ T982] __vmalloc+0x45/0x50 [ 48.899453][ T982] ? bpf_prog_alloc_no_stats+0x73/0x230 [ 48.904994][ T982] bpf_prog_alloc_no_stats+0x73/0x230 [ 48.910358][ T982] bpf_prog_alloc+0x21/0x1f0 [ 48.914945][ T982] bpf_prog_load+0x5f4/0xe10 [ 48.919527][ T982] ? map_freeze+0x210/0x210 [ 48.924028][ T982] ? selinux_bpf+0xc7/0xf0 [ 48.928434][ T982] ? security_bpf+0x82/0xa0 [ 48.932933][ T982] __se_sys_bpf+0x435/0x570 [ 48.937431][ T982] ? __x64_sys_bpf+0x90/0x90 [ 48.942011][ T982] ? check_preemption_disabled+0x118/0x300 [ 48.947813][ T982] ? __ia32_sys_read+0x90/0x90 [ 48.952574][ T982] ? debug_smp_processor_id+0x1c/0x20 [ 48.957938][ T982] ? fpregs_assert_state_consistent+0xb1/0xe0 [ 48.964003][ T982] __x64_sys_bpf+0x7b/0x90 [ 48.968415][ T982] do_syscall_64+0xcf/0x170 [ 48.972912][ T982] entry_SYSCALL_64_after_hwframe+0x5c/0xc1 [ 48.978796][ T982] RIP: 0033:0x7f28f0ff0969 [ 48.983208][ T982] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 49.002804][ T982] RSP: 002b:00007f28ef659038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 49.011244][ T982] RAX: ffffffffffffffda RBX: 00007f28f1217fa0 RCX: 00007f28f0ff0969 [ 49.019233][ T982] RDX: 0000000000000080 RSI: 0000200000000300 RDI: 0000000000000005 [ 49.027197][ T982] RBP: 00007f28ef659090 R08: 0000000000000000 R09: 0000000000000000 [ 49.035163][ T982] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 49.043133][ T982] R13: 0000000000000001 R14: 00007f28f1217fa0 R15: 00007ffff6002cf8 [ 49.719423][ T23] audit: type=1400 audit(1748016594.900:142): avc: denied { cpu } for pid=1016 comm="syz.2.213" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=1 [ 50.391972][ T23] audit: type=1400 audit(1748016595.580:143): avc: denied { create } for pid=1051 comm="syz.0.223" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rose_socket permissive=1 [ 50.477626][ T1063] FAULT_INJECTION: forcing a failure. [ 50.477626][ T1063] name failslab, interval 1, probability 0, space 0, times 0 [ 50.490281][ T1063] CPU: 0 PID: 1063 Comm: syz.0.227 Not tainted 5.4.292-syzkaller-00021-gcd8e74fa0fa3 #0 [ 50.499987][ T1063] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 50.510033][ T1063] Call Trace: [ 50.513321][ T1063] __dump_stack+0x1e/0x20 [ 50.517645][ T1063] dump_stack+0x15b/0x1b8 [ 50.521968][ T1063] ? thaw_kernel_threads+0x220/0x220 [ 50.527252][ T1063] ? show_regs_print_info+0x18/0x18 [ 50.532451][ T1063] should_fail+0x69e/0x7e0 [ 50.536868][ T1063] ? setup_fault_attr+0x230/0x230 [ 50.541888][ T1063] ? __rt6_find_exception_rcu+0x25c/0x320 [ 50.547601][ T1063] ? dst_alloc+0x176/0x4f0 [ 50.552015][ T1063] __should_failslab+0x10c/0x150 [ 50.556953][ T1063] should_failslab+0x9/0x20 [ 50.561456][ T1063] kmem_cache_alloc+0x2d/0x270 [ 50.566216][ T1063] dst_alloc+0x176/0x4f0 [ 50.570459][ T1063] ip6_pol_route+0x9f2/0x1120 [ 50.575141][ T1063] ? prep_new_page+0x35e/0x370 [ 50.579904][ T1063] ? fib6_table_lookup+0xa90/0xa90 [ 50.585013][ T1063] ? sock_alloc_send_pskb+0x81c/0x930 [ 50.590376][ T1063] ? tun_chr_write_iter+0x1c7/0x270 [ 50.595570][ T1063] ? do_syscall_64+0xcf/0x170 [ 50.600243][ T1063] ? entry_SYSCALL_64_after_hwframe+0x5c/0xc1 [ 50.606302][ T1063] ? check_preemption_disabled+0x9b/0x300 [ 50.612009][ T1063] ip6_pol_route_input+0x56/0x80 [ 50.616931][ T1063] fib6_rule_lookup+0x1cc/0x5e0 [ 50.621762][ T1063] ? ip6_route_input_lookup+0xd0/0xd0 [ 50.627115][ T1063] ? fib6_lookup+0x2a0/0x2a0 [ 50.631685][ T1063] ? ip6t_do_table+0x1348/0x14e0 [ 50.636611][ T1063] ip6_route_input+0x5be/0x7b0 [ 50.641361][ T1063] ? ip6_multipath_l3_keys+0x5f0/0x5f0 [ 50.646807][ T1063] ? ip6table_raw_hook+0x6a/0x80 [ 50.651728][ T1063] ? ip6table_mangle_net_exit+0x90/0x90 [ 50.657279][ T1063] ip6_rcv_finish+0x155/0x360 [ 50.661943][ T1063] ipv6_rcv+0xec/0x220 [ 50.665997][ T1063] ? ip6_rcv_finish+0x360/0x360 [ 50.670829][ T1063] ? asan.module_dtor+0x20/0x20 [ 50.675703][ T1063] ? do_page_fault+0x37/0x320 [ 50.680364][ T1063] ? ip6_rcv_finish+0x360/0x360 [ 50.685198][ T1063] __netif_receive_skb+0xc8/0x280 [ 50.690210][ T1063] ? page_fault+0x2f/0x40 [ 50.694524][ T1063] netif_receive_skb+0x9b/0x480 [ 50.699356][ T1063] ? netif_receive_skb_core+0x100/0x100 [ 50.704884][ T1063] ? virtio_net_hdr_to_skb+0x6d1/0x10c0 [ 50.710411][ T1063] tun_rx_batched+0x5e9/0x720 [ 50.715077][ T1063] ? debug_smp_processor_id+0x20/0x20 [ 50.720434][ T1063] ? local_bh_enable+0x30/0x30 [ 50.725203][ T1063] ? unwind_get_return_address+0x4d/0x90 [ 50.730829][ T1063] ? stack_trace_save+0xf0/0xf0 [ 50.735679][ T1063] tun_get_user+0x24be/0x2f50 [ 50.740350][ T1063] ? tun_do_read+0x1c40/0x1c40 [ 50.745096][ T1063] ? kstrtouint_from_user+0x1a0/0x200 [ 50.750452][ T1063] ? kstrtol_from_user+0x260/0x260 [ 50.755551][ T1063] ? do_syscall_64+0xcf/0x170 [ 50.760214][ T1063] ? __kasan_check_write+0x14/0x20 [ 50.765310][ T1063] ? proc_fail_nth_write+0x17a/0x1f0 [ 50.770579][ T1063] ? proc_fail_nth_read+0x210/0x210 [ 50.775771][ T1063] tun_chr_write_iter+0x1c7/0x270 [ 50.780797][ T1063] __vfs_write+0x480/0x5d0 [ 50.785194][ T1063] ? trace_call_bpf+0x360/0x3a0 [ 50.790050][ T1063] ? __kernel_write+0x320/0x320 [ 50.795502][ T1063] ? fsnotify+0xdea/0xeb0 [ 50.799826][ T1063] ? security_file_permission+0xde/0x300 [ 50.805454][ T1063] ? rw_verify_area+0x1c0/0x360 [ 50.810295][ T1063] vfs_write+0x20e/0x4c0 [ 50.814526][ T1063] ksys_write+0x140/0x240 [ 50.818839][ T1063] ? __ia32_sys_read+0x90/0x90 [ 50.823589][ T1063] ? debug_smp_processor_id+0x1c/0x20 [ 50.828950][ T1063] ? fpregs_assert_state_consistent+0xb1/0xe0 [ 50.835002][ T1063] __x64_sys_write+0x7b/0x90 [ 50.839575][ T1063] do_syscall_64+0xcf/0x170 [ 50.844063][ T1063] entry_SYSCALL_64_after_hwframe+0x5c/0xc1 [ 50.849953][ T1063] RIP: 0033:0x7f28f0ff0969 [ 50.854351][ T1063] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 50.873943][ T1063] RSP: 002b:00007f28ef659038 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 50.882338][ T1063] RAX: ffffffffffffffda RBX: 00007f28f1217fa0 RCX: 00007f28f0ff0969 [ 50.890289][ T1063] RDX: 000000000000cfa4 RSI: 00002000000006c0 RDI: 00000000000000c8 [ 50.898243][ T1063] RBP: 00007f28ef659090 R08: 0000000000000000 R09: 0000000000000000 [ 50.906198][ T1063] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 50.914238][ T1063] R13: 0000000000000000 R14: 00007f28f1217fa0 R15: 00007ffff6002cf8 [ 51.464361][ T1107] FAULT_INJECTION: forcing a failure. [ 51.464361][ T1107] name failslab, interval 1, probability 0, space 0, times 0 [ 51.477482][ T1107] CPU: 0 PID: 1107 Comm: syz.4.237 Not tainted 5.4.292-syzkaller-00021-gcd8e74fa0fa3 #0 [ 51.487203][ T1107] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 51.497256][ T1107] Call Trace: [ 51.500549][ T1107] __dump_stack+0x1e/0x20 [ 51.504877][ T1107] dump_stack+0x15b/0x1b8 [ 51.509206][ T1107] ? thaw_kernel_threads+0x220/0x220 [ 51.514494][ T1107] ? show_regs_print_info+0x18/0x18 [ 51.519695][ T1107] should_fail+0x69e/0x7e0 [ 51.524125][ T1107] ? setup_fault_attr+0x230/0x230 [ 51.529157][ T1107] __should_failslab+0x10c/0x150 [ 51.534099][ T1107] ? alloc_skb_with_frags+0xa2/0x560 [ 51.539384][ T1107] should_failslab+0x9/0x20 [ 51.543888][ T1107] __kmalloc_track_caller+0x52/0x2d0 [ 51.549178][ T1107] ? kmem_cache_alloc+0xe2/0x270 [ 51.554157][ T1107] ? __alloc_skb+0x9e/0x500 [ 51.558666][ T1107] ? alloc_skb_with_frags+0xa2/0x560 [ 51.563954][ T1107] __alloc_skb+0xdc/0x500 [ 51.568286][ T1107] ? vsnprintf+0x1871/0x1960 [ 51.572921][ T1107] alloc_skb_with_frags+0xa2/0x560 [ 51.578028][ T1107] sock_alloc_send_pskb+0x81c/0x930 [ 51.583235][ T1107] ? __kasan_check_write+0x14/0x20 [ 51.588345][ T1107] ? sock_kzfree_s+0x60/0x60 [ 51.592925][ T1107] ? unix_autobind+0x883/0xa20 [ 51.597678][ T1107] unix_dgram_sendmsg+0x5f4/0x1800 [ 51.602778][ T1107] ? selinux_socket_accept+0x500/0x500 [ 51.608220][ T1107] ? unix_dgram_poll+0x630/0x630 [ 51.613404][ T1107] ? security_socket_sendmsg+0x82/0xa0 [ 51.618847][ T1107] ? unix_dgram_poll+0x630/0x630 [ 51.623767][ T1107] ____sys_sendmsg+0x57b/0x8d0 [ 51.628516][ T1107] ? _copy_from_user+0xaa/0xe0 [ 51.633270][ T1107] ? __sys_sendmsg_sock+0x250/0x250 [ 51.638456][ T1107] ? proc_fail_nth_read+0x210/0x210 [ 51.643639][ T1107] __sys_sendmsg+0x28e/0x360 [ 51.648215][ T1107] ? ____sys_sendmsg+0x8d0/0x8d0 [ 51.653134][ T1107] ? check_preemption_disabled+0x9b/0x300 [ 51.658839][ T1107] ? security_file_permission+0xde/0x300 [ 51.664459][ T1107] ? __kasan_check_write+0x14/0x20 [ 51.669553][ T1107] ? check_preemption_disabled+0x118/0x300 [ 51.675346][ T1107] ? debug_smp_processor_id+0x1c/0x20 [ 51.680713][ T1107] ? fpregs_assert_state_consistent+0xb1/0xe0 [ 51.686762][ T1107] __x64_sys_sendmsg+0x7f/0x90 [ 51.691599][ T1107] do_syscall_64+0xcf/0x170 [ 51.696086][ T1107] entry_SYSCALL_64_after_hwframe+0x5c/0xc1 [ 51.701979][ T1107] RIP: 0033:0x7f48790d6969 [ 51.706401][ T1107] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 51.725998][ T1107] RSP: 002b:00007f487773f038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 51.734396][ T1107] RAX: ffffffffffffffda RBX: 00007f48792fdfa0 RCX: 00007f48790d6969 [ 51.742353][ T1107] RDX: 0000000000000000 RSI: 0000200000000300 RDI: 0000000000000004 [ 51.750404][ T1107] RBP: 00007f487773f090 R08: 0000000000000000 R09: 0000000000000000 [ 51.758360][ T1107] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 51.766313][ T1107] R13: 0000000000000000 R14: 00007f48792fdfa0 R15: 00007ffe4e0bdf58 [ 52.278505][ T23] audit: type=1400 audit(1748016597.460:144): avc: denied { create } for pid=1172 comm="syz.2.247" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=iucv_socket permissive=1 [ 52.371057][ T1177] device syzkaller0 entered promiscuous mode [ 52.746874][ T1207] device syzkaller0 entered promiscuous mode [ 52.840412][ T1218] FAULT_INJECTION: forcing a failure. [ 52.840412][ T1218] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 52.878416][ T1218] CPU: 1 PID: 1218 Comm: syz.3.264 Not tainted 5.4.292-syzkaller-00021-gcd8e74fa0fa3 #0 [ 52.888162][ T1218] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 52.898221][ T1218] Call Trace: [ 52.901520][ T1218] __dump_stack+0x1e/0x20 [ 52.905849][ T1218] dump_stack+0x15b/0x1b8 [ 52.910178][ T1218] ? thaw_kernel_threads+0x220/0x220 [ 52.916077][ T1218] ? show_regs_print_info+0x18/0x18 [ 52.921285][ T1218] should_fail+0x69e/0x7e0 [ 52.925708][ T1218] ? setup_fault_attr+0x230/0x230 [ 52.930852][ T1218] ? __alloc_pages_nodemask+0x4b0/0x4b0 [ 52.936403][ T1218] ? __kernel_text_address+0xa0/0x100 [ 52.941794][ T1218] should_fail_alloc_page+0x4f/0x60 [ 52.946995][ T1218] __alloc_pages_nodemask+0xf5/0x4b0 [ 52.952286][ T1218] ? check_preemption_disabled+0x118/0x300 [ 52.958093][ T1218] ? gfp_pfmemalloc_allowed+0x130/0x130 [ 52.964081][ T1218] pipe_write+0x5aa/0x1090 [ 52.968513][ T1218] ? pipe_read+0xc00/0xc00 [ 52.972935][ T1218] ? __kasan_check_write+0x14/0x20 [ 52.978044][ T1218] ? proc_fail_nth_write+0x17a/0x1f0 [ 52.983332][ T1218] ? iov_iter_init+0x88/0x160 [ 52.988009][ T1218] __vfs_write+0x480/0x5d0 [ 52.992426][ T1218] ? __kernel_write+0x320/0x320 [ 52.997273][ T1218] ? fsnotify+0xdea/0xeb0 [ 53.002048][ T1218] ? security_file_permission+0xde/0x300 [ 53.007683][ T1218] ? rw_verify_area+0x1c0/0x360 [ 53.012531][ T1218] vfs_write+0x20e/0x4c0 [ 53.016781][ T1218] ksys_write+0x140/0x240 [ 53.021106][ T1218] ? __ia32_sys_read+0x90/0x90 [ 53.025871][ T1218] ? debug_smp_processor_id+0x1c/0x20 [ 53.031240][ T1218] ? fpregs_assert_state_consistent+0xb1/0xe0 [ 53.037307][ T1218] __x64_sys_write+0x7b/0x90 [ 53.041895][ T1218] do_syscall_64+0xcf/0x170 [ 53.046402][ T1218] entry_SYSCALL_64_after_hwframe+0x5c/0xc1 [ 53.052478][ T1218] RIP: 0033:0x7ff931fc5969 [ 53.056914][ T1218] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 53.076521][ T1218] RSP: 002b:00007ff93062e038 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 53.084930][ T1218] RAX: ffffffffffffffda RBX: 00007ff9321ecfa0 RCX: 00007ff931fc5969 [ 53.092899][ T1218] RDX: 000000000000fdef RSI: 0000200000000000 RDI: 0000000000000000 [ 53.100865][ T1218] RBP: 00007ff93062e090 R08: 0000000000000000 R09: 0000000000000000 [ 53.108827][ T1218] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 53.116796][ T1218] R13: 0000000000000000 R14: 00007ff9321ecfa0 R15: 00007fff9387b7d8 [ 56.389989][ T23] audit: type=1400 audit(1748016601.570:145): avc: denied { create } for pid=1317 comm="syz.0.303" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=pppox_socket permissive=1 [ 57.776625][ T1374] FAULT_INJECTION: forcing a failure. [ 57.776625][ T1374] name failslab, interval 1, probability 0, space 0, times 0 [ 57.862223][ T1374] CPU: 1 PID: 1374 Comm: syz.4.324 Not tainted 5.4.292-syzkaller-00021-gcd8e74fa0fa3 #0 [ 57.871963][ T1374] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 57.882122][ T1374] Call Trace: [ 57.885457][ T1374] __dump_stack+0x1e/0x20 [ 57.889879][ T1374] dump_stack+0x15b/0x1b8 [ 57.894213][ T1374] ? thaw_kernel_threads+0x220/0x220 [ 57.900423][ T1374] ? show_regs_print_info+0x18/0x18 [ 57.905625][ T1374] ? __hw_addr_add_ex+0x182/0x5b0 [ 57.910703][ T1374] should_fail+0x69e/0x7e0 [ 57.915239][ T1374] ? setup_fault_attr+0x230/0x230 [ 57.920263][ T1374] ? __hw_addr_add_ex+0x28c/0x5b0 [ 57.925296][ T1374] ? kvmalloc_node+0x88/0xf0 [ 57.929976][ T1374] __should_failslab+0x10c/0x150 [ 57.934919][ T1374] should_failslab+0x9/0x20 [ 57.939424][ T1374] __kmalloc+0x53/0x2f0 [ 57.943580][ T1374] kvmalloc_node+0x88/0xf0 [ 57.948226][ T1374] alloc_netdev_mqs+0x5df/0xc50 [ 57.953087][ T1374] ipip6_tunnel_locate+0x40f/0x5a0 [ 57.958208][ T1374] ? skb_clone_writable+0x1d0/0x1d0 [ 57.963416][ T1374] ? __kasan_check_write+0x14/0x20 [ 57.968528][ T1374] ? _copy_from_user+0xaa/0xe0 [ 57.973298][ T1374] ipip6_tunnel_ioctl+0xd13/0xf80 [ 57.978325][ T1374] ? debug_smp_processor_id+0x20/0x20 [ 57.983701][ T1374] ? sit_tunnel_xmit+0x1d40/0x1d40 [ 57.988822][ T1374] dev_ifsioc+0x6a1/0xa40 [ 57.993153][ T1374] ? full_name_hash+0xa0/0xf0 [ 57.997829][ T1374] ? dev_ioctl+0xb80/0xb80 [ 58.002254][ T1374] dev_ioctl+0x5ea/0xb80 [ 58.006504][ T1374] sock_ioctl+0x6a1/0x710 [ 58.010835][ T1374] ? sock_poll+0x2f0/0x2f0 [ 58.015251][ T1374] ? __vfs_write+0xf9/0x5d0 [ 58.019759][ T1374] ? fsnotify+0xdea/0xeb0 [ 58.024087][ T1374] ? avc_policy_seqno+0x1b/0x70 [ 58.028938][ T1374] ? check_preemption_disabled+0x9b/0x300 [ 58.034658][ T1374] ? sock_poll+0x2f0/0x2f0 [ 58.039078][ T1374] do_vfs_ioctl+0x753/0x13f0 [ 58.043681][ T1374] ? ioctl_preallocate+0x1c0/0x1c0 [ 58.048797][ T1374] ? __fget+0x3be/0x440 [ 58.052958][ T1374] ? fget_many+0x30/0x30 [ 58.057220][ T1374] ? ksys_write+0x1eb/0x240 [ 58.061725][ T1374] ? __ia32_sys_read+0x90/0x90 [ 58.066492][ T1374] ? security_file_ioctl+0x84/0xa0 [ 58.071609][ T1374] __x64_sys_ioctl+0xe1/0x120 [ 58.076290][ T1374] do_syscall_64+0xcf/0x170 [ 58.080798][ T1374] entry_SYSCALL_64_after_hwframe+0x5c/0xc1 [ 58.086695][ T1374] RIP: 0033:0x7f48790d6969 [ 58.091111][ T1374] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 58.110718][ T1374] RSP: 002b:00007f487773f038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 58.119131][ T1374] RAX: ffffffffffffffda RBX: 00007f48792fdfa0 RCX: 00007f48790d6969 [ 58.127111][ T1374] RDX: 0000200000000080 RSI: 00000000000089f1 RDI: 0000000000000004 [ 58.135097][ T1374] RBP: 00007f487773f090 R08: 0000000000000000 R09: 0000000000000000 [ 58.143073][ T1374] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 58.151047][ T1374] R13: 0000000000000000 R14: 00007f48792fdfa0 R15: 00007ffe4e0bdf58 [ 58.161590][ T23] audit: type=1400 audit(1748016603.350:146): avc: denied { remove_name } for pid=146 comm="syslogd" name="messages" dev="tmpfs" ino=10609 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 58.247371][ T23] audit: type=1400 audit(1748016603.350:147): avc: denied { rename } for pid=146 comm="syslogd" name="messages" dev="tmpfs" ino=10609 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 58.293023][ T23] audit: type=1400 audit(1748016603.350:148): avc: denied { create } for pid=146 comm="syslogd" name="messages" scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 58.329385][ T1365] bridge0: port 2(bridge_slave_1) entered disabled state [ 58.341524][ T1365] bridge0: port 1(bridge_slave_0) entered disabled state [ 58.429019][ T1368] device bridge_slave_1 left promiscuous mode [ 58.481124][ T1368] bridge0: port 2(bridge_slave_1) entered disabled state [ 58.522310][ T1368] device bridge_slave_0 left promiscuous mode [ 58.529094][ T1368] bridge0: port 1(bridge_slave_0) entered disabled state [ 59.495119][ T23] audit: type=1400 audit(1748016604.680:149): avc: denied { create } for pid=1412 comm="syz.2.338" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=qipcrtr_socket permissive=1 [ 61.451414][ T1473] syz.2.359[1473] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 61.451472][ T1473] syz.2.359[1473] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 61.863279][ T23] audit: type=1400 audit(1748016607.040:150): avc: denied { ioctl } for pid=1485 comm="syz.2.365" path="net:[4026532590]" dev="nsfs" ino=4026532590 ioctlcmd=0x54cd scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 61.953086][ T1486] Ÿë: port 1(syz_tun) entered blocking state [ 61.960050][ T1486] Ÿë: port 1(syz_tun) entered disabled state [ 61.967017][ T1486] device syz_tun entered promiscuous mode [ 62.130109][ T1494] FAULT_INJECTION: forcing a failure. [ 62.130109][ T1494] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 62.151215][ T1494] CPU: 1 PID: 1494 Comm: syz.0.367 Not tainted 5.4.292-syzkaller-00021-gcd8e74fa0fa3 #0 [ 62.161149][ T1494] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 62.171496][ T1494] Call Trace: [ 62.174806][ T1494] __dump_stack+0x1e/0x20 [ 62.179365][ T1494] dump_stack+0x15b/0x1b8 [ 62.183696][ T1494] ? thaw_kernel_threads+0x220/0x220 [ 62.188987][ T1494] ? bpf_prog_load+0x5f4/0xe10 [ 62.193759][ T1494] ? show_regs_print_info+0x18/0x18 [ 62.198956][ T1494] ? entry_SYSCALL_64_after_hwframe+0x5c/0xc1 [ 62.205035][ T1494] should_fail+0x69e/0x7e0 [ 62.209457][ T1494] ? setup_fault_attr+0x230/0x230 [ 62.214490][ T1494] should_fail_alloc_page+0x4f/0x60 [ 62.219690][ T1494] __alloc_pages_nodemask+0xf5/0x4b0 [ 62.224979][ T1494] ? gfp_pfmemalloc_allowed+0x130/0x130 [ 62.230529][ T1494] ? __vmalloc_node_range+0x2af/0x6e0 [ 62.235908][ T1494] ? kasan_kmalloc+0xd/0x20 [ 62.240410][ T1494] ? __vmalloc_node_range+0x2af/0x6e0 [ 62.245784][ T1494] __vmalloc_node_range+0x36a/0x6e0 [ 62.251163][ T1494] __vmalloc+0x45/0x50 [ 62.255231][ T1494] ? bpf_prog_alloc_no_stats+0x73/0x230 [ 62.260774][ T1494] bpf_prog_alloc_no_stats+0x73/0x230 [ 62.266144][ T1494] bpf_prog_alloc+0x21/0x1f0 [ 62.270745][ T1494] bpf_prog_load+0x5f4/0xe10 [ 62.275345][ T1494] ? map_freeze+0x210/0x210 [ 62.279853][ T1494] ? selinux_bpf+0xc7/0xf0 [ 62.284361][ T1494] ? security_bpf+0x82/0xa0 [ 62.288874][ T1494] __se_sys_bpf+0x435/0x570 [ 62.293384][ T1494] ? __x64_sys_bpf+0x90/0x90 [ 62.297973][ T1494] ? check_preemption_disabled+0x118/0x300 [ 62.303781][ T1494] ? __ia32_sys_read+0x90/0x90 [ 62.308547][ T1494] ? debug_smp_processor_id+0x1c/0x20 [ 62.313932][ T1494] ? fpregs_assert_state_consistent+0xb1/0xe0 [ 62.320000][ T1494] __x64_sys_bpf+0x7b/0x90 [ 62.324422][ T1494] do_syscall_64+0xcf/0x170 [ 62.329043][ T1494] entry_SYSCALL_64_after_hwframe+0x5c/0xc1 [ 62.335470][ T1494] RIP: 0033:0x7f28f0ff0969 [ 62.339891][ T1494] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 62.359498][ T1494] RSP: 002b:00007f28ef659038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 62.368060][ T1494] RAX: ffffffffffffffda RBX: 00007f28f1217fa0 RCX: 00007f28f0ff0969 [ 62.376029][ T1494] RDX: 0000000000000080 RSI: 0000200000000300 RDI: 0000000000000005 [ 62.384002][ T1494] RBP: 00007f28ef659090 R08: 0000000000000000 R09: 0000000000000000 [ 62.391969][ T1494] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 62.400081][ T1494] R13: 0000000000000001 R14: 00007f28f1217fa0 R15: 00007ffff6002cf8 [ 62.409274][ T1494] syz.0.367: vmalloc: allocation failure, allocated 0 of 8192 bytes, mode:0x100dc0(GFP_USER|__GFP_ZERO), nodemask=(null),cpuset=syz0,mems_allowed=0 [ 62.427409][ T1494] CPU: 1 PID: 1494 Comm: syz.0.367 Not tainted 5.4.292-syzkaller-00021-gcd8e74fa0fa3 #0 [ 62.437133][ T1494] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 62.447181][ T1494] Call Trace: [ 62.450469][ T1494] __dump_stack+0x1e/0x20 [ 62.454797][ T1494] dump_stack+0x15b/0x1b8 [ 62.459225][ T1494] ? thaw_kernel_threads+0x220/0x220 [ 62.464604][ T1494] ? show_regs_print_info+0x18/0x18 [ 62.469807][ T1494] ? pr_cont_kernfs_name+0xe3/0xf0 [ 62.474919][ T1494] warn_alloc+0x227/0x300 [ 62.479251][ T1494] ? zone_watermark_ok_safe+0x250/0x250 [ 62.484797][ T1494] ? __vmalloc_node_range+0x2af/0x6e0 [ 62.490169][ T1494] ? kasan_kmalloc+0xd/0x20 [ 62.494667][ T1494] ? __vmalloc_node_range+0x2af/0x6e0 [ 62.500039][ T1494] __vmalloc_node_range+0x5be/0x6e0 [ 62.505240][ T1494] __vmalloc+0x45/0x50 [ 62.509311][ T1494] ? bpf_prog_alloc_no_stats+0x73/0x230 [ 62.515298][ T1494] bpf_prog_alloc_no_stats+0x73/0x230 [ 62.520676][ T1494] bpf_prog_alloc+0x21/0x1f0 [ 62.525416][ T1494] bpf_prog_load+0x5f4/0xe10 [ 62.530013][ T1494] ? map_freeze+0x210/0x210 [ 62.534525][ T1494] ? selinux_bpf+0xc7/0xf0 [ 62.538940][ T1494] ? security_bpf+0x82/0xa0 [ 62.543449][ T1494] __se_sys_bpf+0x435/0x570 [ 62.547954][ T1494] ? __x64_sys_bpf+0x90/0x90 [ 62.552562][ T1494] ? check_preemption_disabled+0x118/0x300 [ 62.558381][ T1494] ? __ia32_sys_read+0x90/0x90 [ 62.563165][ T1494] ? debug_smp_processor_id+0x1c/0x20 [ 62.568544][ T1494] ? fpregs_assert_state_consistent+0xb1/0xe0 [ 62.574613][ T1494] __x64_sys_bpf+0x7b/0x90 [ 62.579029][ T1494] do_syscall_64+0xcf/0x170 [ 62.583531][ T1494] entry_SYSCALL_64_after_hwframe+0x5c/0xc1 [ 62.589426][ T1494] RIP: 0033:0x7f28f0ff0969 [ 62.593847][ T1494] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 62.613459][ T1494] RSP: 002b:00007f28ef659038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 62.621871][ T1494] RAX: ffffffffffffffda RBX: 00007f28f1217fa0 RCX: 00007f28f0ff0969 [ 62.629842][ T1494] RDX: 0000000000000080 RSI: 0000200000000300 RDI: 0000000000000005 [ 62.637817][ T1494] RBP: 00007f28ef659090 R08: 0000000000000000 R09: 0000000000000000 [ 62.645782][ T1494] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 62.653776][ T1494] R13: 0000000000000001 R14: 00007f28f1217fa0 R15: 00007ffff6002cf8 [ 62.669315][ T1494] Mem-Info: [ 62.672589][ T1494] active_anon:3807 inactive_anon:137 isolated_anon:0 [ 62.672589][ T1494] active_file:3568 inactive_file:3340 isolated_file:0 [ 62.672589][ T1494] unevictable:0 dirty:374 writeback:0 unstable:0 [ 62.672589][ T1494] slab_reclaimable:5969 slab_unreclaimable:71306 [ 62.672589][ T1494] mapped:28693 shmem:216 pagetables:427 bounce:0 [ 62.672589][ T1494] free:1607596 free_pcp:1264 free_cma:0 [ 62.710487][ T1494] Node 0 active_anon:15228kB inactive_anon:548kB active_file:14272kB inactive_file:13360kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:114772kB dirty:1496kB writeback:0kB shmem:864kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 0kB writeback_tmp:0kB unstable:0kB all_unreclaimable? no [ 62.740827][ T1494] DMA free:15908kB min:500kB low:624kB high:748kB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:15992kB managed:15908kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 62.769248][ T1498] device syzkaller0 entered promiscuous mode [ 62.779808][ T1494] lowmem_reserve[]: 0 2896 6837 6837 [ 62.785963][ T1494] DMA32 free:2968740kB min:93460kB low:116824kB high:140188kB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:3129332kB managed:2971508kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:2768kB local_pcp:1420kB free_cma:0kB [ 62.815275][ T1494] lowmem_reserve[]: 0 0 3941 3941 [ 62.816736][ T1502] FAULT_INJECTION: forcing a failure. [ 62.816736][ T1502] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 62.821291][ T1494] Normal free:3439148kB min:127216kB low:159020kB high:190824kB active_anon:15128kB inactive_anon:548kB active_file:14272kB inactive_file:13360kB unevictable:0kB writepending:1496kB present:5242880kB managed:4036560kB mlocked:0kB kernel_stack:5984kB pagetables:1708kB bounce:0kB free_pcp:2144kB local_pcp:936kB free_cma:0kB [ 62.863882][ T1502] CPU: 0 PID: 1502 Comm: syz.1.370 Not tainted 5.4.292-syzkaller-00021-gcd8e74fa0fa3 #0 [ 62.863889][ T1502] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 62.863892][ T1502] Call Trace: [ 62.863910][ T1502] __dump_stack+0x1e/0x20 [ 62.863920][ T1502] dump_stack+0x15b/0x1b8 [ 62.863942][ T1502] ? thaw_kernel_threads+0x220/0x220 [ 62.875406][ T1494] lowmem_reserve[]: 0 0 0 0 [ 62.883710][ T1502] ? show_regs_print_info+0x18/0x18 [ 62.883726][ T1502] should_fail+0x69e/0x7e0 [ 62.883739][ T1502] ? setup_fault_attr+0x230/0x230 [ 62.883750][ T1502] ? stack_trace_save+0xaa/0xf0 [ 62.883770][ T1502] ? stack_trace_snprint+0x170/0x170 [ 62.887550][ T1494] DMA: 1*4kB (U) 0*8kB 0*16kB 1*32kB (U) 2*64kB (U) 1*128kB (U) 1*256kB (U) 0*512kB 1*1024kB (U) 1*2048kB (U) 3*4096kB (M) = 15908kB [ 62.891348][ T1502] ? entry_SYSCALL_64_after_hwframe+0x5c/0xc1 [ 62.891365][ T1502] should_fail_alloc_page+0x4f/0x60 [ 62.891376][ T1502] __alloc_pages_nodemask+0xf5/0x4b0 [ 62.891394][ T1502] ? gfp_pfmemalloc_allowed+0x130/0x130 [ 62.896194][ T1494] DMA32: 5*4kB (M) 6*8kB (M) 2*16kB (M) 6*32kB (M) 4*64kB (M) 5*128kB (M) 4*256kB (M) 4*512kB (M) 3*1024kB (M) 2*2048kB (M) 722*4096kB (M) = 2968740kB [ 62.900965][ T1502] ? path_openat+0x133f/0x35c0 [ 62.900980][ T1502] wp_page_copy+0x1ef/0x1630 [ 62.900995][ T1502] ? mm_counter+0x130/0x130 [ 62.901009][ T1502] ? debug_smp_processor_id+0x20/0x20 [ 62.901018][ T1502] ? vm_normal_page+0x1dd/0x1f0 [ 62.901034][ T1502] do_wp_page+0x926/0xac0 [ 62.906028][ T1494] Normal: 243*4kB (UM) 226*8kB (UME) 167*16kB (UME) 52*32kB (UME) 12*64kB (UME) 11*128kB (ME) 10*256kB (M) 10*512kB (UME) 10*1024kB (UME) 10*2048kB (UME) 828*4096kB (M) = 3439180kB [ 62.910809][ T1502] handle_mm_fault+0x159b/0x3930 [ 62.910823][ T1502] ? __kasan_check_read+0x11/0x20 [ 62.910834][ T1502] ? finish_fault+0x240/0x240 [ 62.910852][ T1502] ? __kasan_check_write+0x14/0x20 [ 62.910871][ T1502] ? down_read_trylock+0x100/0x150 [ 63.053464][ T1502] ? vmacache_find+0x1fa/0x490 [ 63.058216][ T1502] ? find_vma+0x30/0x150 [ 63.062445][ T1502] __do_page_fault+0x4c0/0xb20 [ 63.067194][ T1502] do_page_fault+0x37/0x320 [ 63.071682][ T1502] ? __rcu_read_unlock+0x110/0x110 [ 63.076799][ T1502] page_fault+0x2f/0x40 [ 63.080949][ T1502] RIP: 0010:copy_user_enhanced_fast_string+0xe/0x30 [ 63.087549][ T1502] Code: 89 d1 c1 e9 03 83 e2 07 f3 48 a5 89 d1 f3 a4 31 c0 0f 01 ca c3 0f 1f 80 00 00 00 00 0f 01 cb 83 fa 40 0f 82 70 ff ff ff 89 d1 a4 31 c0 0f 01 ca c3 66 2e 0f 1f 84 00 00 00 00 00 89 d1 f3 a4 [ 63.107144][ T1502] RSP: 0018:ffff8881e7adfb80 EFLAGS: 00050206 [ 63.113832][ T1502] RAX: ffffffff821c8f01 RBX: 0000000000000e40 RCX: 0000000000000140 [ 63.121790][ T1502] RDX: 0000000000000e40 RSI: ffff8881d0a38d40 RDI: 0000200000001000 [ 63.129752][ T1502] RBP: ffff8881e7adfbb0 R08: dffffc0000000000 R09: ffffed103a1471d0 [ 63.137817][ T1502] R10: 0000000000000000 R11: 00000000000001c8 R12: 00007ffffffff000 [ 63.145865][ T1502] R13: 0000200000001140 R14: ffff8881d0a38040 R15: 0000200000000300 [ 63.153866][ T1502] ? _copy_to_user+0x41/0xb0 [ 63.158444][ T1502] ? _copy_to_user+0x90/0xb0 [ 63.163026][ T1502] bpf_test_finish+0x15a/0x420 [ 63.167775][ T1502] ? bpf_test_run+0x5d0/0x5d0 [ 63.172440][ T1502] bpf_prog_test_run_skb+0x9dc/0xdc0 [ 63.177718][ T1502] ? __bpf_trace_bpf_test_finish+0x30/0x30 [ 63.183507][ T1502] bpf_prog_test_run+0x21a/0x2a0 [ 63.188427][ T1502] __se_sys_bpf+0x49a/0x570 [ 63.192917][ T1502] ? __x64_sys_bpf+0x90/0x90 [ 63.197487][ T1502] ? check_preemption_disabled+0x118/0x300 [ 63.203280][ T1502] ? __ia32_sys_read+0x90/0x90 [ 63.208028][ T1502] ? debug_smp_processor_id+0x1c/0x20 [ 63.213391][ T1502] ? fpregs_assert_state_consistent+0xb1/0xe0 [ 63.219441][ T1502] __x64_sys_bpf+0x7b/0x90 [ 63.223845][ T1502] do_syscall_64+0xcf/0x170 [ 63.228449][ T1502] entry_SYSCALL_64_after_hwframe+0x5c/0xc1 [ 63.234330][ T1502] RIP: 0033:0x7fdfaa109969 [ 63.238733][ T1502] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 63.258318][ T1502] RSP: 002b:00007fdfa8772038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 63.266732][ T1502] RAX: ffffffffffffffda RBX: 00007fdfaa330fa0 RCX: 00007fdfaa109969 [ 63.274684][ T1502] RDX: 000000000000004c RSI: 0000200000000240 RDI: 000000000000000a [ 63.282640][ T1502] RBP: 00007fdfa8772090 R08: 0000000000000000 R09: 0000000000000000 [ 63.290681][ T1502] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 63.298635][ T1502] R13: 0000000000000000 R14: 00007fdfaa330fa0 R15: 00007ffcdfa5d868 [ 63.310649][ T1494] 7123 total pagecache pages [ 63.315395][ T1494] 0 pages in swap cache [ 63.321712][ T1494] Swap cache stats: add 0, delete 0, find 0/0 [ 63.327896][ T1494] Free swap = 124996kB [ 63.338698][ T1494] Total swap = 124996kB [ 63.343175][ T1494] 2097051 pages RAM [ 63.347033][ T1494] 0 pages HighMem/MovableOnly [ 63.353287][ T1494] 341057 pages reserved [ 63.362248][ T1494] 0 pages cma reserved [ 65.099916][ T1561] device bridge0 entered promiscuous mode [ 65.250967][ T24] cfg80211: failed to load regulatory.db [ 66.388933][ T1598] device syzkaller0 entered promiscuous mode [ 66.399238][ T1598] FAULT_INJECTION: forcing a failure. [ 66.399238][ T1598] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 66.412615][ T1598] CPU: 0 PID: 1598 Comm: syz.2.402 Not tainted 5.4.292-syzkaller-00021-gcd8e74fa0fa3 #0 [ 66.422323][ T1598] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 66.432460][ T1598] Call Trace: [ 66.435756][ T1598] __dump_stack+0x1e/0x20 [ 66.440087][ T1598] dump_stack+0x15b/0x1b8 [ 66.444485][ T1598] ? thaw_kernel_threads+0x220/0x220 [ 66.449790][ T1598] ? show_regs_print_info+0x18/0x18 [ 66.455001][ T1598] should_fail+0x69e/0x7e0 [ 66.459456][ T1598] ? setup_fault_attr+0x230/0x230 [ 66.464484][ T1598] ? __alloc_pages_nodemask+0x4b0/0x4b0 [ 66.470118][ T1598] should_fail_alloc_page+0x4f/0x60 [ 66.475318][ T1598] __alloc_pages_nodemask+0xf5/0x4b0 [ 66.480612][ T1598] ? gfp_pfmemalloc_allowed+0x130/0x130 [ 66.486245][ T1598] ? __kmalloc_track_caller+0x10d/0x2d0 [ 66.491926][ T1598] ? __kasan_check_write+0x14/0x20 [ 66.497044][ T1598] ? __alloc_skb+0x2c6/0x500 [ 66.501636][ T1598] alloc_skb_with_frags+0x1bc/0x560 [ 66.506846][ T1598] sock_alloc_send_pskb+0x81c/0x930 [ 66.512051][ T1598] ? sock_kzfree_s+0x60/0x60 [ 66.516640][ T1598] ? iov_iter_advance+0x1f7/0x750 [ 66.522108][ T1598] tun_get_user+0x4bb/0x2f50 [ 66.526959][ T1598] ? _kstrtoull+0x3c0/0x4d0 [ 66.531549][ T1598] ? tun_do_read+0x1c40/0x1c40 [ 66.536311][ T1598] ? kstrtouint_from_user+0x1a0/0x200 [ 66.542132][ T1598] ? kstrtol_from_user+0x260/0x260 [ 66.547240][ T1598] ? do_syscall_64+0xcf/0x170 [ 66.551924][ T1598] ? __kasan_check_write+0x14/0x20 [ 66.557263][ T1598] ? proc_fail_nth_write+0x17a/0x1f0 [ 66.562547][ T1598] ? proc_fail_nth_read+0x210/0x210 [ 66.568565][ T1598] tun_chr_write_iter+0x1c7/0x270 [ 66.573596][ T1598] __vfs_write+0x480/0x5d0 [ 66.578279][ T1598] ? __kernel_write+0x320/0x320 [ 66.583953][ T1598] ? fsnotify+0xdea/0xeb0 [ 66.588304][ T1598] ? security_file_permission+0xde/0x300 [ 66.594031][ T1598] ? rw_verify_area+0x1c0/0x360 [ 66.598895][ T1598] vfs_write+0x20e/0x4c0 [ 66.603140][ T1598] ksys_write+0x140/0x240 [ 66.607469][ T1598] ? __ia32_sys_read+0x90/0x90 [ 66.612231][ T1598] ? debug_smp_processor_id+0x1c/0x20 [ 66.617607][ T1598] ? fpregs_assert_state_consistent+0xb1/0xe0 [ 66.623672][ T1598] __x64_sys_write+0x7b/0x90 [ 66.628259][ T1598] do_syscall_64+0xcf/0x170 [ 66.632759][ T1598] entry_SYSCALL_64_after_hwframe+0x5c/0xc1 [ 66.638676][ T1598] RIP: 0033:0x7fe914e51969 [ 66.643108][ T1598] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 66.662704][ T1598] RSP: 002b:00007fe9134ba038 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 66.671108][ T1598] RAX: ffffffffffffffda RBX: 00007fe915078fa0 RCX: 00007fe914e51969 [ 66.679070][ T1598] RDX: 000000000000ffdd RSI: 0000200000000140 RDI: 0000000000000003 [ 66.687036][ T1598] RBP: 00007fe9134ba090 R08: 0000000000000000 R09: 0000000000000000 [ 66.695003][ T1598] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 66.702968][ T1598] R13: 0000000000000000 R14: 00007fe915078fa0 R15: 00007ffe3a8cc4e8 [ 66.716832][ T1605] FAULT_INJECTION: forcing a failure. [ 66.716832][ T1605] name failslab, interval 1, probability 0, space 0, times 0 [ 66.729493][ T1605] CPU: 0 PID: 1605 Comm: syz.1.403 Not tainted 5.4.292-syzkaller-00021-gcd8e74fa0fa3 #0 [ 66.739293][ T1605] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 66.749944][ T1605] Call Trace: [ 66.753226][ T1605] __dump_stack+0x1e/0x20 [ 66.757540][ T1605] dump_stack+0x15b/0x1b8 [ 66.761856][ T1605] ? thaw_kernel_threads+0x220/0x220 [ 66.767124][ T1605] ? vfs_write+0x20e/0x4c0 [ 66.771524][ T1605] ? show_regs_print_info+0x18/0x18 [ 66.776705][ T1605] ? entry_SYSCALL_64_after_hwframe+0x5c/0xc1 [ 66.782758][ T1605] should_fail+0x69e/0x7e0 [ 66.787169][ T1605] ? setup_fault_attr+0x230/0x230 [ 66.792179][ T1605] __should_failslab+0x10c/0x150 [ 66.797098][ T1605] ? alloc_skb_with_frags+0xa2/0x560 [ 66.802367][ T1605] should_failslab+0x9/0x20 [ 66.806852][ T1605] __kmalloc_track_caller+0x52/0x2d0 [ 66.812119][ T1605] ? kmem_cache_alloc+0xe2/0x270 [ 66.817038][ T1605] ? __alloc_skb+0x9e/0x500 [ 66.821523][ T1605] ? alloc_skb_with_frags+0xa2/0x560 [ 66.826793][ T1605] __alloc_skb+0xdc/0x500 [ 66.831120][ T1605] alloc_skb_with_frags+0xa2/0x560 [ 66.836220][ T1605] ? __kasan_check_write+0x14/0x20 [ 66.841315][ T1605] ? ipv6_get_saddr_eval+0xaac/0xf70 [ 66.846584][ T1605] sock_alloc_send_pskb+0x81c/0x930 [ 66.851792][ T1605] ? sock_kzfree_s+0x60/0x60 [ 66.856363][ T1605] ? ip6_route_output_flags+0x27f/0x330 [ 66.861915][ T1605] sock_alloc_send_skb+0x32/0x40 [ 66.866838][ T1605] __ip6_append_data+0x23c3/0x3650 [ 66.871945][ T1605] ? __kasan_check_read+0x11/0x20 [ 66.876954][ T1605] ? ip6_setup_cork+0xd3e/0x12c0 [ 66.881875][ T1605] ? ip6_setup_cork+0x12c0/0x12c0 [ 66.886882][ T1605] ? ip6_append_data+0x310/0x310 [ 66.891803][ T1605] ? dst_release+0x54/0xf0 [ 66.896206][ T1605] ip6_append_data+0x1c0/0x310 [ 66.901224][ T1605] ? icmpv6_route_lookup+0x4e0/0x4e0 [ 66.906511][ T1605] ? icmpv6_route_lookup+0x4e0/0x4e0 [ 66.911899][ T1605] icmp6_send+0xf3b/0x1480 [ 66.916306][ T1605] ? __kmalloc_track_caller+0x166/0x2d0 [ 66.921843][ T1605] ? icmpv6_push_pending_frames+0x440/0x440 [ 66.927721][ T1605] ? __split_page_owner+0x4f/0x280 [ 66.932821][ T1605] ? __kasan_check_write+0x14/0x20 [ 66.937925][ T1605] ? debug_smp_processor_id+0x20/0x20 [ 66.943406][ T1605] ? __skb_flow_dissect+0x48b5/0x4f90 [ 66.948769][ T1605] icmpv6_param_prob+0x2f/0x40 [ 66.953608][ T1605] ip6_parse_tlv+0x6f6/0x7e0 [ 66.958185][ T1605] ipv6_parse_hopopts+0x2a5/0x580 [ 66.963195][ T1605] ip6_rcv_core+0xca4/0x1390 [ 66.967771][ T1605] ipv6_rcv+0xca/0x220 [ 66.971826][ T1605] ? __do_page_fault+0x6f1/0xb20 [ 66.976747][ T1605] ? ip6_rcv_finish+0x360/0x360 [ 66.981584][ T1605] ? do_page_fault+0x37/0x320 [ 66.986263][ T1605] ? ip6_rcv_finish+0x360/0x360 [ 66.991098][ T1605] __netif_receive_skb+0xc8/0x280 [ 66.996103][ T1605] ? page_fault+0x2f/0x40 [ 67.000418][ T1605] netif_receive_skb+0x9b/0x480 [ 67.005255][ T1605] ? netif_receive_skb_core+0x100/0x100 [ 67.010793][ T1605] ? virtio_net_hdr_to_skb+0x6d1/0x10c0 [ 67.016323][ T1605] tun_rx_batched+0x5e9/0x720 [ 67.020982][ T1605] ? debug_smp_processor_id+0x20/0x20 [ 67.026340][ T1605] ? local_bh_enable+0x30/0x30 [ 67.031088][ T1605] ? unwind_get_return_address+0x4d/0x90 [ 67.036703][ T1605] ? stack_trace_save+0xf0/0xf0 [ 67.041540][ T1605] tun_get_user+0x24be/0x2f50 [ 67.046228][ T1605] ? tun_do_read+0x1c40/0x1c40 [ 67.050989][ T1605] ? kstrtouint_from_user+0x1a0/0x200 [ 67.056348][ T1605] ? kstrtol_from_user+0x260/0x260 [ 67.061443][ T1605] ? do_syscall_64+0xcf/0x170 [ 67.066111][ T1605] ? __kasan_check_write+0x14/0x20 [ 67.071217][ T1605] ? proc_fail_nth_write+0x17a/0x1f0 [ 67.076486][ T1605] ? proc_fail_nth_read+0x210/0x210 [ 67.081672][ T1605] tun_chr_write_iter+0x1c7/0x270 [ 67.086687][ T1605] __vfs_write+0x480/0x5d0 [ 67.091090][ T1605] ? __kernel_write+0x320/0x320 [ 67.095923][ T1605] ? fsnotify+0xdea/0xeb0 [ 67.100242][ T1605] ? security_file_permission+0xde/0x300 [ 67.105858][ T1605] ? rw_verify_area+0x1c0/0x360 [ 67.110691][ T1605] vfs_write+0x20e/0x4c0 [ 67.114920][ T1605] ksys_write+0x140/0x240 [ 67.119233][ T1605] ? __ia32_sys_read+0x90/0x90 [ 67.123981][ T1605] ? debug_smp_processor_id+0x1c/0x20 [ 67.129340][ T1605] ? fpregs_assert_state_consistent+0xb1/0xe0 [ 67.135421][ T1605] __x64_sys_write+0x7b/0x90 [ 67.140000][ T1605] do_syscall_64+0xcf/0x170 [ 67.144494][ T1605] entry_SYSCALL_64_after_hwframe+0x5c/0xc1 [ 67.150387][ T1605] RIP: 0033:0x7fdfaa109969 [ 67.154793][ T1605] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 67.179569][ T1605] RSP: 002b:00007fdfa8751038 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 67.188346][ T1605] RAX: ffffffffffffffda RBX: 00007fdfaa331080 RCX: 00007fdfaa109969 [ 67.196401][ T1605] RDX: 000000000000fdef RSI: 0000200000000000 RDI: 00000000000000c8 [ 67.204460][ T1605] RBP: 00007fdfa8751090 R08: 0000000000000000 R09: 0000000000000000 [ 67.212437][ T1605] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 67.220394][ T1605] R13: 0000000000000000 R14: 00007fdfaa331080 R15: 00007ffcdfa5d868 [ 67.423225][ T23] audit: type=1400 audit(1748016612.610:151): avc: denied { create } for pid=1616 comm="syz.2.410" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 67.715750][ T1625] FAULT_INJECTION: forcing a failure. [ 67.715750][ T1625] name failslab, interval 1, probability 0, space 0, times 0 [ 67.781466][ T1625] CPU: 1 PID: 1625 Comm: syz.2.411 Not tainted 5.4.292-syzkaller-00021-gcd8e74fa0fa3 #0 [ 67.791209][ T1625] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 67.801348][ T1625] Call Trace: [ 67.804957][ T1625] __dump_stack+0x1e/0x20 [ 67.809302][ T1625] dump_stack+0x15b/0x1b8 [ 67.813643][ T1625] ? thaw_kernel_threads+0x220/0x220 [ 67.818941][ T1625] ? show_regs_print_info+0x18/0x18 [ 67.824490][ T1625] ? check_preemption_disabled+0x9b/0x300 [ 67.830214][ T1625] ? check_preemption_disabled+0x9b/0x300 [ 67.835935][ T1625] ? check_preemption_disabled+0x9b/0x300 [ 67.841655][ T1625] should_fail+0x69e/0x7e0 [ 67.846070][ T1625] ? setup_fault_attr+0x230/0x230 [ 67.851092][ T1625] ? avc_denied+0x1b0/0x1b0 [ 67.855598][ T1625] ? __perf_event_task_sched_in+0x1fb/0x280 [ 67.861496][ T1625] ? kvmalloc_node+0x88/0xf0 [ 67.866086][ T1625] __should_failslab+0x10c/0x150 [ 67.871022][ T1625] should_failslab+0x9/0x20 [ 67.875518][ T1625] __kmalloc+0x53/0x2f0 [ 67.879668][ T1625] kvmalloc_node+0x88/0xf0 [ 67.884083][ T1625] alloc_netdev_mqs+0x88/0xc50 [ 67.888841][ T1625] ? asan.module_dtor+0x20/0x20 [ 67.893689][ T1625] ipip6_tunnel_locate+0x40f/0x5a0 [ 67.898807][ T1625] ? skb_clone_writable+0x1d0/0x1d0 [ 67.904006][ T1625] ? __kasan_check_write+0x14/0x20 [ 67.909113][ T1625] ? _copy_from_user+0xaa/0xe0 [ 67.913876][ T1625] ipip6_tunnel_ioctl+0xd13/0xf80 [ 67.918899][ T1625] ? sit_tunnel_xmit+0x1d40/0x1d40 [ 67.924015][ T1625] dev_ifsioc+0x6a1/0xa40 [ 67.928496][ T1625] ? full_name_hash+0xa0/0xf0 [ 67.933175][ T1625] ? dev_ioctl+0xb80/0xb80 [ 67.937599][ T1625] dev_ioctl+0x5ea/0xb80 [ 67.941846][ T1625] sock_ioctl+0x6a1/0x710 [ 67.946173][ T1625] ? sock_poll+0x2f0/0x2f0 [ 67.950590][ T1625] ? __vfs_write+0xf9/0x5d0 [ 67.955094][ T1625] ? fsnotify+0xdea/0xeb0 [ 67.959422][ T1625] ? avc_policy_seqno+0x1b/0x70 [ 67.964271][ T1625] ? check_preemption_disabled+0x9b/0x300 [ 67.970003][ T1625] ? sock_poll+0x2f0/0x2f0 [ 67.974427][ T1625] do_vfs_ioctl+0x753/0x13f0 [ 67.979022][ T1625] ? ioctl_preallocate+0x1c0/0x1c0 [ 67.984136][ T1625] ? __fget+0x3be/0x440 [ 67.988307][ T1625] ? fget_many+0x30/0x30 [ 67.992552][ T1625] ? ksys_write+0x1eb/0x240 [ 67.997055][ T1625] ? __ia32_sys_read+0x90/0x90 [ 68.001820][ T1625] ? security_file_ioctl+0x84/0xa0 [ 68.006930][ T1625] __x64_sys_ioctl+0xe1/0x120 [ 68.011606][ T1625] do_syscall_64+0xcf/0x170 [ 68.016107][ T1625] entry_SYSCALL_64_after_hwframe+0x5c/0xc1 [ 68.021995][ T1625] RIP: 0033:0x7fe914e51969 [ 68.026409][ T1625] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 68.046010][ T1625] RSP: 002b:00007fe913499038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 68.054421][ T1625] RAX: ffffffffffffffda RBX: 00007fe915079080 RCX: 00007fe914e51969 [ 68.062406][ T1625] RDX: 0000200000000080 RSI: 00000000000089f1 RDI: 0000000000000006 [ 68.070375][ T1625] RBP: 00007fe913499090 R08: 0000000000000000 R09: 0000000000000000 [ 68.078352][ T1625] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 68.086329][ T1625] R13: 0000000000000000 R14: 00007fe915079080 R15: 00007ffe3a8cc4e8 [ 68.303659][ T1628] device pim6reg1 entered promiscuous mode [ 70.838808][ T23] audit: type=1400 audit(1748016616.010:152): avc: denied { create } for pid=1699 comm="syz.4.438" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 71.512118][ T1708] device wg2 entered promiscuous mode [ 72.073003][ T1738] device wg2 left promiscuous mode [ 74.111552][ T1792] device syzkaller0 entered promiscuous mode [ 74.232506][ T1803] FAULT_INJECTION: forcing a failure. [ 74.232506][ T1803] name failslab, interval 1, probability 0, space 0, times 0 [ 74.330823][ T1803] CPU: 1 PID: 1803 Comm: syz.0.474 Not tainted 5.4.292-syzkaller-00021-gcd8e74fa0fa3 #0 [ 74.341273][ T1803] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 74.352033][ T1803] Call Trace: [ 74.355339][ T1803] __dump_stack+0x1e/0x20 [ 74.359665][ T1803] dump_stack+0x15b/0x1b8 [ 74.364018][ T1803] ? thaw_kernel_threads+0x220/0x220 [ 74.369304][ T1803] ? show_regs_print_info+0x18/0x18 [ 74.374506][ T1803] ? __btf_verifier_log_type+0x2a4/0x5b0 [ 74.380147][ T1803] should_fail+0x69e/0x7e0 [ 74.384562][ T1803] ? setup_fault_attr+0x230/0x230 [ 74.389593][ T1803] ? bpf_trace_run1+0x230/0x230 [ 74.394454][ T1803] ? btf_int_seq_show+0x380/0x380 [ 74.399472][ T1803] ? kvmalloc_node+0x88/0xf0 [ 74.404057][ T1803] __should_failslab+0x10c/0x150 [ 74.409000][ T1803] should_failslab+0x9/0x20 [ 74.413499][ T1803] __kmalloc+0x53/0x2f0 [ 74.417672][ T1803] kvmalloc_node+0x88/0xf0 [ 74.422094][ T1803] btf_parse_type_sec+0x769/0x1c50 [ 74.427202][ T1803] ? btf_check_sec_info+0x330/0x330 [ 74.432408][ T1803] ? sort+0x37/0x50 [ 74.436217][ T1803] ? btf_parse_type_sec+0x1c50/0x1c50 [ 74.441596][ T1803] ? check_stack_object+0x81/0x140 [ 74.446709][ T1803] btf_new_fd+0xc4c/0x10d0 [ 74.451127][ T1803] bpf_btf_load+0x49/0x60 [ 74.455453][ T1803] __se_sys_bpf+0x485/0x570 [ 74.459954][ T1803] ? __x64_sys_bpf+0x90/0x90 [ 74.464548][ T1803] ? do_syscall_64+0x170/0x170 [ 74.469311][ T1803] ? debug_smp_processor_id+0x1c/0x20 [ 74.474686][ T1803] ? fpregs_assert_state_consistent+0xb1/0xe0 [ 74.480752][ T1803] __x64_sys_bpf+0x7b/0x90 [ 74.485249][ T1803] do_syscall_64+0xcf/0x170 [ 74.489997][ T1803] entry_SYSCALL_64_after_hwframe+0x5c/0xc1 [ 74.495908][ T1803] RIP: 0033:0x7f28f0ff0969 [ 74.500322][ T1803] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 74.520010][ T1803] RSP: 002b:00007f28ef659038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 74.528681][ T1803] RAX: ffffffffffffffda RBX: 00007f28f1217fa0 RCX: 00007f28f0ff0969 [ 74.536644][ T1803] RDX: 0000000000000020 RSI: 0000200000000280 RDI: 0000000000000012 [ 74.544610][ T1803] RBP: 00007f28ef659090 R08: 0000000000000000 R09: 0000000000000000 [ 74.552579][ T1803] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 74.560545][ T1803] R13: 0000000000000001 R14: 00007f28f1217fa0 R15: 00007ffff6002cf8 [ 74.776709][ T1807] [ 74.789257][ T1807] ********************************************************** [ 74.830580][ T1807] ** NOTICE NOTICE NOTICE NOTICE NOTICE NOTICE NOTICE ** [ 74.869152][ T1807] ** ** [ 74.909884][ T1807] ** trace_printk() being used. Allocating extra memory. ** [ 74.970498][ T1811] FAULT_INJECTION: forcing a failure. [ 74.970498][ T1811] name failslab, interval 1, probability 0, space 0, times 0 [ 75.001139][ T1807] ** ** [ 75.051733][ T1807] ** This means that this is a DEBUG kernel and it is ** [ 75.069610][ T1811] CPU: 0 PID: 1811 Comm: syz.0.477 Not tainted 5.4.292-syzkaller-00021-gcd8e74fa0fa3 #0 [ 75.079343][ T1811] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 75.089394][ T1811] Call Trace: [ 75.092672][ T1811] __dump_stack+0x1e/0x20 [ 75.096984][ T1811] dump_stack+0x15b/0x1b8 [ 75.101297][ T1811] ? thaw_kernel_threads+0x220/0x220 [ 75.106564][ T1811] ? entry_SYSCALL_64_after_hwframe+0x5c/0xc1 [ 75.112613][ T1811] ? show_regs_print_info+0x18/0x18 [ 75.117798][ T1811] should_fail+0x69e/0x7e0 [ 75.122203][ T1811] ? setup_fault_attr+0x230/0x230 [ 75.127214][ T1811] ? avc_has_perm_noaudit+0x30e/0x3f0 [ 75.132585][ T1811] ? proc_tid_base_lookup+0x2b/0x30 [ 75.137768][ T1811] ? path_openat+0x133f/0x35c0 [ 75.142612][ T1811] ? __d_alloc+0x2d/0x6a0 [ 75.146926][ T1811] __should_failslab+0x10c/0x150 [ 75.151851][ T1811] should_failslab+0x9/0x20 [ 75.156337][ T1811] kmem_cache_alloc+0x2d/0x270 [ 75.161083][ T1811] ? __d_alloc+0x1c/0x6a0 [ 75.165416][ T1811] __d_alloc+0x2d/0x6a0 [ 75.169570][ T1811] d_alloc_parallel+0xd6/0x1330 [ 75.174406][ T1811] ? avc_denied+0x1b0/0x1b0 [ 75.178909][ T1811] ? debug_smp_processor_id+0x20/0x20 [ 75.184270][ T1811] ? d_hash_and_lookup+0x1e0/0x1e0 [ 75.189366][ T1811] ? __kasan_check_write+0x14/0x20 [ 75.194474][ T1811] ? lockref_get_not_dead+0xe6/0x1c0 [ 75.199746][ T1811] ? unlazy_walk+0x393/0x650 [ 75.204410][ T1811] __lookup_slow+0x140/0x410 [ 75.208991][ T1811] ? lookup_fast+0x4cf/0x970 [ 75.213570][ T1811] ? lookup_one_len+0x2c0/0x2c0 [ 75.218408][ T1811] ? __kasan_check_write+0x14/0x20 [ 75.223501][ T1811] lookup_slow+0x57/0x70 [ 75.227724][ T1811] walk_component+0x237/0x400 [ 75.232385][ T1811] ? path_put_conditional+0x90/0x90 [ 75.237575][ T1811] path_lookupat+0x179/0x3f0 [ 75.242168][ T1811] filename_lookup+0x1bf/0x5f0 [ 75.246940][ T1811] ? hashlen_string+0x120/0x120 [ 75.251798][ T1811] ? kasan_kmalloc+0xd/0x20 [ 75.256299][ T1811] ? memcpy+0x49/0x60 [ 75.260281][ T1811] ? getname_kernel+0x201/0x2e0 [ 75.265115][ T1811] kern_path+0x35/0x40 [ 75.269165][ T1811] bpf_obj_get_user+0xe0/0x3b0 [ 75.273912][ T1811] ? bpf_obj_pin_user+0x280/0x280 [ 75.278921][ T1811] bpf_obj_get+0xd3/0x120 [ 75.283234][ T1811] __se_sys_bpf+0x3dd/0x570 [ 75.287723][ T1811] ? __x64_sys_bpf+0x90/0x90 [ 75.292302][ T1811] ? do_syscall_64+0x170/0x170 [ 75.297053][ T1811] ? debug_smp_processor_id+0x1c/0x20 [ 75.302411][ T1811] ? fpregs_assert_state_consistent+0xb1/0xe0 [ 75.308460][ T1811] __x64_sys_bpf+0x7b/0x90 [ 75.312861][ T1811] do_syscall_64+0xcf/0x170 [ 75.317350][ T1811] entry_SYSCALL_64_after_hwframe+0x5c/0xc1 [ 75.323225][ T1811] RIP: 0033:0x7f28f0ff0969 [ 75.327622][ T1811] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 75.347302][ T1811] RSP: 002b:00007f28ef659038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 75.355795][ T1811] RAX: ffffffffffffffda RBX: 00007f28f1217fa0 RCX: 00007f28f0ff0969 [ 75.363753][ T1811] RDX: 0000000000000018 RSI: 0000200000000240 RDI: 0000000000000007 [ 75.371711][ T1811] RBP: 00007f28ef659090 R08: 0000000000000000 R09: 0000000000000000 [ 75.379665][ T1811] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 75.387632][ T1811] R13: 0000000000000001 R14: 00007f28f1217fa0 R15: 00007ffff6002cf8 [ 75.433977][ T1807] ** unsafe for production use. ** [ 75.487122][ T1807] ** ** [ 75.620302][ T1807] ** If you see this message and you are not debugging ** [ 75.735540][ T1807] ** the kernel, report this immediately to your vendor! ** [ 75.783651][ T1807] ** ** [ 75.813726][ T1807] ** NOTICE NOTICE NOTICE NOTICE NOTICE NOTICE NOTICE ** [ 75.870587][ T1807] ********************************************************** [ 77.942538][ T1865] device syzkaller0 entered promiscuous mode [ 80.160657][ T1911] device veth0_vlan entered promiscuous mode [ 80.213896][ T103] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 80.290926][ T1912] FAULT_INJECTION: forcing a failure. [ 80.290926][ T1912] name failslab, interval 1, probability 0, space 0, times 0 [ 80.313839][ T1912] CPU: 0 PID: 1912 Comm: syz.2.512 Not tainted 5.4.292-syzkaller-00021-gcd8e74fa0fa3 #0 [ 80.323568][ T1912] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 80.333624][ T1912] Call Trace: [ 80.336918][ T1912] __dump_stack+0x1e/0x20 [ 80.341246][ T1912] dump_stack+0x15b/0x1b8 [ 80.345576][ T1912] ? thaw_kernel_threads+0x220/0x220 [ 80.350877][ T1912] ? show_regs_print_info+0x18/0x18 [ 80.356086][ T1912] should_fail+0x69e/0x7e0 [ 80.360500][ T1912] ? setup_fault_attr+0x230/0x230 [ 80.365524][ T1912] ? __hw_addr_add_ex+0x182/0x5b0 [ 80.370549][ T1912] __should_failslab+0x10c/0x150 [ 80.375484][ T1912] should_failslab+0x9/0x20 [ 80.379997][ T1912] kmem_cache_alloc_trace+0x2d/0x290 [ 80.385386][ T1912] __hw_addr_add_ex+0x182/0x5b0 [ 80.390243][ T1912] dev_addr_init+0x118/0x1f0 [ 80.394831][ T1912] ? pcpu_alloc+0xc88/0x1120 [ 80.399425][ T1912] ? dev_addr_flush+0x1d0/0x1d0 [ 80.404286][ T1912] alloc_netdev_mqs+0x124/0xc50 [ 80.409224][ T1912] ? asan.module_dtor+0x20/0x20 [ 80.414078][ T1912] ipip6_tunnel_locate+0x40f/0x5a0 [ 80.419191][ T1912] ? skb_clone_writable+0x1d0/0x1d0 [ 80.424391][ T1912] ? ipip6_tunnel_ioctl+0x8ce/0xf80 [ 80.429590][ T1912] ipip6_tunnel_ioctl+0xd13/0xf80 [ 80.434616][ T1912] ? sit_tunnel_xmit+0x1d40/0x1d40 [ 80.439734][ T1912] ? dev_ifsioc+0x678/0xa40 [ 80.444239][ T1912] dev_ifsioc+0x6a1/0xa40 [ 80.448569][ T1912] ? dev_ioctl+0xb80/0xb80 [ 80.452990][ T1912] dev_ioctl+0x5ea/0xb80 [ 80.457229][ T1912] sock_ioctl+0x6a1/0x710 [ 80.461578][ T1912] ? sock_poll+0x2f0/0x2f0 [ 80.465998][ T1912] ? do_vfs_ioctl+0x282/0x13f0 [ 80.470760][ T1912] ? sock_poll+0x2f0/0x2f0 [ 80.475175][ T1912] do_vfs_ioctl+0x753/0x13f0 [ 80.479761][ T1912] ? ioctl_preallocate+0x1c0/0x1c0 [ 80.484884][ T1912] ? __fget+0x3be/0x440 [ 80.489043][ T1912] ? fget_many+0x30/0x30 [ 80.493290][ T1912] ? __kasan_check_write+0x14/0x20 [ 80.498403][ T1912] ? switch_fpu_return+0x197/0x3b0 [ 80.503527][ T1912] ? security_file_ioctl+0x84/0xa0 [ 80.508650][ T1912] __x64_sys_ioctl+0xe1/0x120 [ 80.513436][ T1912] do_syscall_64+0xcf/0x170 [ 80.517940][ T1912] entry_SYSCALL_64_after_hwframe+0x5c/0xc1 [ 80.523875][ T1912] RIP: 0033:0x7fe914e51969 [ 80.528412][ T1912] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 80.548021][ T1912] RSP: 002b:00007fe9134ba038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 80.556431][ T1912] RAX: ffffffffffffffda RBX: 00007fe915078fa0 RCX: 00007fe914e51969 [ 80.564403][ T1912] RDX: 0000200000000080 RSI: 00000000000089f1 RDI: 0000000000000006 [ 80.572374][ T1912] RBP: 00007fe9134ba090 R08: 0000000000000000 R09: 0000000000000000 [ 80.580351][ T1912] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 80.588320][ T1912] R13: 0000000000000000 R14: 00007fe915078fa0 R15: 00007ffe3a8cc4e8 [ 80.600792][ T1919] FAULT_INJECTION: forcing a failure. [ 80.600792][ T1919] name failslab, interval 1, probability 0, space 0, times 0 [ 80.613938][ T1919] CPU: 1 PID: 1919 Comm: syz.4.514 Not tainted 5.4.292-syzkaller-00021-gcd8e74fa0fa3 #0 [ 80.623658][ T1919] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 80.633737][ T1919] Call Trace: [ 80.637023][ T1919] __dump_stack+0x1e/0x20 [ 80.641475][ T1919] dump_stack+0x15b/0x1b8 [ 80.645800][ T1919] ? thaw_kernel_threads+0x220/0x220 [ 80.651075][ T1919] ? __sock_create+0x3a8/0x740 [ 80.655892][ T1919] ? show_regs_print_info+0x18/0x18 [ 80.661087][ T1919] ? entry_SYSCALL_64_after_hwframe+0x5c/0xc1 [ 80.667154][ T1919] should_fail+0x69e/0x7e0 [ 80.671588][ T1919] ? setup_fault_attr+0x230/0x230 [ 80.676601][ T1919] ? selinux_sk_alloc_security+0x78/0x190 [ 80.682320][ T1919] __should_failslab+0x10c/0x150 [ 80.687245][ T1919] should_failslab+0x9/0x20 [ 80.691734][ T1919] kmem_cache_alloc_trace+0x2d/0x290 [ 80.697003][ T1919] selinux_sk_alloc_security+0x78/0x190 [ 80.702792][ T1919] security_sk_alloc+0x72/0xa0 [ 80.707550][ T1919] sk_prot_alloc+0x133/0x410 [ 80.712135][ T1919] sk_alloc+0x38/0x330 [ 80.716189][ T1919] ? debug_smp_processor_id+0x20/0x20 [ 80.721545][ T1919] unix_create1+0x90/0x5a0 [ 80.725942][ T1919] ? __module_get+0x150/0x150 [ 80.730603][ T1919] unix_create+0x135/0x1c0 [ 80.735031][ T1919] __sock_create+0x3a8/0x740 [ 80.739613][ T1919] __sys_socketpair+0x1a7/0x5a0 [ 80.744451][ T1919] __x64_sys_socketpair+0x9b/0xb0 [ 80.749462][ T1919] do_syscall_64+0xcf/0x170 [ 80.754040][ T1919] entry_SYSCALL_64_after_hwframe+0x5c/0xc1 [ 80.759915][ T1919] RIP: 0033:0x7f48790d6969 [ 80.764336][ T1919] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 80.783921][ T1919] RSP: 002b:00007f487773f038 EFLAGS: 00000246 ORIG_RAX: 0000000000000035 [ 80.792317][ T1919] RAX: ffffffffffffffda RBX: 00007f48792fdfa0 RCX: 00007f48790d6969 [ 80.800270][ T1919] RDX: 0000000000000000 RSI: 0000000000000002 RDI: 0000000000000001 [ 80.808225][ T1919] RBP: 00007f487773f090 R08: 0000000000000000 R09: 0000000000000000 [ 80.816181][ T1919] R10: 0000200000000200 R11: 0000000000000246 R12: 0000000000000001 [ 80.824138][ T1919] R13: 0000000000000000 R14: 00007f48792fdfa0 R15: 00007ffe4e0bdf58 [ 81.372435][ T1934] Scheduler tracepoints stat_sleep, stat_iowait, stat_blocked and stat_runtime require the kernel parameter schedstats=enable or kernel.sched_schedstats=1 [ 85.293842][ T2026] device syzkaller0 entered promiscuous mode [ 87.868135][ T2082] device syzkaller0 entered promiscuous mode [ 88.253410][ T2100] FAULT_INJECTION: forcing a failure. [ 88.253410][ T2100] name failslab, interval 1, probability 0, space 0, times 0 [ 88.304773][ T2100] CPU: 0 PID: 2100 Comm: syz.4.574 Not tainted 5.4.292-syzkaller-00021-gcd8e74fa0fa3 #0 [ 88.314514][ T2100] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 88.324833][ T2100] Call Trace: [ 88.328129][ T2100] __dump_stack+0x1e/0x20 [ 88.332460][ T2100] dump_stack+0x15b/0x1b8 [ 88.336792][ T2100] ? thaw_kernel_threads+0x220/0x220 [ 88.342087][ T2100] ? show_regs_print_info+0x18/0x18 [ 88.347291][ T2100] should_fail+0x69e/0x7e0 [ 88.351709][ T2100] ? setup_fault_attr+0x230/0x230 [ 88.356732][ T2100] ? kvmalloc_node+0x88/0xf0 [ 88.361324][ T2100] __should_failslab+0x10c/0x150 [ 88.366263][ T2100] should_failslab+0x9/0x20 [ 88.370774][ T2100] __kmalloc+0x53/0x2f0 [ 88.375019][ T2100] ? kvmalloc_node+0x88/0xf0 [ 88.379623][ T2100] kvmalloc_node+0x88/0xf0 [ 88.384049][ T2100] btf_parse_type_sec+0x787/0x1c50 [ 88.389169][ T2100] ? btf_check_sec_info+0x330/0x330 [ 88.394367][ T2100] ? sort+0x37/0x50 [ 88.398189][ T2100] ? btf_parse_type_sec+0x1c50/0x1c50 [ 88.403569][ T2100] ? check_stack_object+0x81/0x140 [ 88.408692][ T2100] btf_new_fd+0xc4c/0x10d0 [ 88.413115][ T2100] bpf_btf_load+0x49/0x60 [ 88.417445][ T2100] __se_sys_bpf+0x485/0x570 [ 88.421938][ T2100] ? __x64_sys_bpf+0x90/0x90 [ 88.426522][ T2100] ? check_preemption_disabled+0x118/0x300 [ 88.432327][ T2100] ? __ia32_sys_read+0x90/0x90 [ 88.437111][ T2100] ? debug_smp_processor_id+0x1c/0x20 [ 88.442477][ T2100] ? fpregs_assert_state_consistent+0xb1/0xe0 [ 88.448543][ T2100] __x64_sys_bpf+0x7b/0x90 [ 88.452963][ T2100] do_syscall_64+0xcf/0x170 [ 88.457458][ T2100] entry_SYSCALL_64_after_hwframe+0x5c/0xc1 [ 88.463348][ T2100] RIP: 0033:0x7f48790d6969 [ 88.467753][ T2100] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 88.487343][ T2100] RSP: 002b:00007f487773f038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 88.495755][ T2100] RAX: ffffffffffffffda RBX: 00007f48792fdfa0 RCX: 00007f48790d6969 [ 88.503714][ T2100] RDX: 0000000000000020 RSI: 0000200000000280 RDI: 0000000000000012 [ 88.511695][ T2100] RBP: 00007f487773f090 R08: 0000000000000000 R09: 0000000000000000 [ 88.519655][ T2100] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 88.527815][ T2100] R13: 0000000000000001 R14: 00007f48792fdfa0 R15: 00007ffe4e0bdf58 [ 92.468341][ T2191] device syzkaller0 entered promiscuous mode [ 92.613830][ T23] audit: type=1400 audit(1748016637.800:153): avc: denied { write } for pid=2192 comm="syz.1.606" name="cgroup.subtree_control" dev="cgroup2" ino=291 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 [ 92.775119][ T23] audit: type=1400 audit(1748016637.800:154): avc: denied { open } for pid=2192 comm="syz.1.606" path="" dev="cgroup2" ino=291 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 [ 93.820745][ T23] audit: type=1400 audit(1748016639.000:155): avc: denied { create } for pid=2235 comm="syz.0.622" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=atmpvc_socket permissive=1 [ 94.008625][ T23] audit: type=1400 audit(1748016639.190:156): avc: denied { attach_queue } for pid=2242 comm="syz.1.624" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tun_socket permissive=1 [ 96.234469][ T23] audit: type=1400 audit(1748016641.420:157): avc: denied { create } for pid=2312 comm="syz.4.648" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 99.144140][ T2422] syz.4.687 (2422) used greatest stack depth: 22832 bytes left [ 100.092331][ T2423] device syzkaller0 entered promiscuous mode [ 100.298070][ T23] audit: type=1400 audit(1748016645.460:158): avc: denied { create } for pid=2470 comm="syz.4.707" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_nflog_socket permissive=1 [ 100.952339][ T23] audit: type=1400 audit(1748016646.140:159): avc: denied { create } for pid=2485 comm="syz.3.712" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=ax25_socket permissive=1 [ 101.018550][ T2320] syz.3.649 (2320) used greatest stack depth: 22528 bytes left [ 106.906561][ T2621] device syzkaller0 entered promiscuous mode [ 106.963998][ T2621] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 107.321578][ T2627] device pim6reg1 entered promiscuous mode [ 107.732968][ T2641] device syzkaller0 entered promiscuous mode [ 108.348078][ T2654] device wg2 entered promiscuous mode [ 109.850771][ T2687] device syzkaller0 entered promiscuous mode [ 110.134771][ T23] audit: type=1400 audit(1748016655.320:160): avc: denied { setattr } for pid=2723 comm="syz.4.783" path="pipe:[11588]" dev="pipefs" ino=11588 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=fifo_file permissive=1 [ 111.890708][ C0] ================================================================== [ 111.899667][ C0] BUG: KASAN: use-after-free in __run_timers+0x759/0xb60 [ 111.906931][ C0] Write of size 8 at addr ffff8881e37bb1c8 by task syz.4.809/2790 [ 111.914707][ C0] [ 111.917026][ C0] CPU: 0 PID: 2790 Comm: syz.4.809 Not tainted 5.4.292-syzkaller-00021-gcd8e74fa0fa3 #0 [ 111.926708][ C0] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 111.936742][ C0] Call Trace: [ 111.940002][ C0] [ 111.942841][ C0] __dump_stack+0x1e/0x20 [ 111.947147][ C0] dump_stack+0x15b/0x1b8 [ 111.951451][ C0] ? vprintk_default+0x28/0x30 [ 111.956208][ C0] ? show_regs_print_info+0x18/0x18 [ 111.961467][ C0] ? printk+0xcc/0x110 [ 111.966042][ C0] ? __run_timers+0x759/0xb60 [ 111.970885][ C0] print_address_description+0x8d/0x4c0 [ 111.976408][ C0] ? mod_timer+0x1f/0x30 [ 111.980629][ C0] ? can_stat_update+0xbab/0xc40 [ 111.985541][ C0] ? __run_timers+0x759/0xb60 [ 111.990281][ C0] __kasan_report+0xef/0x120 [ 111.995004][ C0] ? __run_timers+0x759/0xb60 [ 111.999910][ C0] kasan_report+0x30/0x60 [ 112.004350][ C0] __asan_report_store8_noabort+0x17/0x20 [ 112.010151][ C0] __run_timers+0x759/0xb60 [ 112.014637][ C0] ? enqueue_timer+0x2c0/0x2c0 [ 112.019557][ C0] ? check_preemption_disabled+0x9b/0x300 [ 112.025268][ C0] ? debug_smp_processor_id+0x20/0x20 [ 112.030656][ C0] run_timer_softirq+0x6a/0xf0 [ 112.035418][ C0] __do_softirq+0x236/0x660 [ 112.039938][ C0] irq_exit+0x197/0x1c0 [ 112.044092][ C0] smp_apic_timer_interrupt+0x11d/0x490 [ 112.049703][ C0] apic_timer_interrupt+0xf/0x20 [ 112.055222][ C0] [ 112.058160][ C0] RIP: 0010:kmalloc_slab+0x0/0xb0 [ 112.063165][ C0] Code: c7 58 57 d6 85 e8 40 6b a8 02 e8 1b 2c b6 ff 5b 41 5c 41 5e 41 5f 5d c3 66 90 55 48 89 e5 83 3d 8d f9 d4 04 03 0f 93 c0 5d c3 <55> 48 89 e5 41 56 53 50 89 f3 48 81 ff c0 00 00 00 77 18 48 85 ff [ 112.082856][ C0] RSP: 0018:ffff8881e2ba7690 EFLAGS: 00000287 ORIG_RAX: ffffffffffffff13 [ 112.091421][ C0] RAX: ffffffff81804654 RBX: 0000000000100dc0 RCX: 0000000000000002 [ 112.099409][ C0] RDX: ffff8881e7aa8000 RSI: 0000000000100dc0 RDI: 0000000000000018 [ 112.107394][ C0] RBP: ffff8881e2ba76d8 R08: ffff8881e7aa8000 R09: 0000000000000002 [ 112.115439][ C0] R10: 0000000000000003 R11: 0000000000000002 R12: 0000000000100dc0 [ 112.123488][ C0] R13: 0000000000000000 R14: 0000000000100dc0 R15: 0000000000000018 [ 112.131467][ C0] ? kvmalloc_node+0x64/0xf0 [ 112.136054][ C0] ? __kmalloc+0x2f/0x2f0 [ 112.140390][ C0] kvmalloc_node+0x88/0xf0 [ 112.144799][ C0] bpf_check+0x17f9/0x9cf0 [ 112.149230][ C0] ? stack_trace_snprint+0x170/0x170 [ 112.154497][ C0] ? bpf_verifier_log_write+0x230/0x230 [ 112.160543][ C0] ? apic_timer_interrupt+0xa/0x20 [ 112.165821][ C0] ? __kasan_kmalloc+0x1c3/0x200 [ 112.170933][ C0] ? __kasan_kmalloc+0x162/0x200 [ 112.175953][ C0] ? kasan_kmalloc+0xd/0x20 [ 112.180632][ C0] ? kmem_cache_alloc_trace+0x112/0x290 [ 112.186271][ C0] ? selinux_bpf_prog_alloc+0x51/0x140 [ 112.191799][ C0] ? security_bpf_prog_alloc+0x62/0x90 [ 112.197409][ C0] ? bpf_prog_load+0x6b8/0xe10 [ 112.202177][ C0] ? __se_sys_bpf+0x435/0x570 [ 112.206835][ C0] ? __x64_sys_bpf+0x7b/0x90 [ 112.211590][ C0] ? do_syscall_64+0xcf/0x170 [ 112.216418][ C0] ? entry_SYSCALL_64_after_hwframe+0x5c/0xc1 [ 112.222592][ C0] ? apic_timer_interrupt+0xa/0x20 [ 112.227957][ C0] ? memset+0x31/0x40 [ 112.231931][ C0] ? bpf_obj_name_cpy+0x7df/0x1380 [ 112.237027][ C0] bpf_prog_load+0xa5f/0xe10 [ 112.241784][ C0] ? map_freeze+0x210/0x210 [ 112.246707][ C0] ? __se_sys_bpf+0x427/0x570 [ 112.251694][ C0] __se_sys_bpf+0x435/0x570 [ 112.256268][ C0] ? __x64_sys_bpf+0x90/0x90 [ 112.262198][ C0] __x64_sys_bpf+0x7b/0x90 [ 112.266615][ C0] do_syscall_64+0xcf/0x170 [ 112.271202][ C0] entry_SYSCALL_64_after_hwframe+0x5c/0xc1 [ 112.277160][ C0] RIP: 0033:0x7f48790d6969 [ 112.281560][ C0] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 112.301234][ C0] RSP: 002b:00007f487773f038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 112.309754][ C0] RAX: ffffffffffffffda RBX: 00007f48792fdfa0 RCX: 00007f48790d6969 [ 112.317709][ C0] RDX: 0000000000000080 RSI: 0000200000000600 RDI: 0000000000000005 [ 112.325661][ C0] RBP: 00007f4879158ab1 R08: 0000000000000000 R09: 0000000000000000 [ 112.333712][ C0] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 112.341827][ C0] R13: 0000000000000000 R14: 00007f48792fdfa0 R15: 00007ffe4e0bdf58 [ 112.349794][ C0] [ 112.352108][ C0] Allocated by task 343: [ 112.356332][ C0] __kasan_kmalloc+0x162/0x200 [ 112.361083][ C0] kasan_slab_alloc+0x12/0x20 [ 112.365763][ C0] kmem_cache_alloc+0xe2/0x270 [ 112.370642][ C0] dup_fd+0x70/0xaf0 [ 112.374518][ C0] copy_files+0xc4/0x160 [ 112.378743][ C0] copy_process+0x10b5/0x2cf0 [ 112.383400][ C0] _do_fork+0x190/0x860 [ 112.387544][ C0] __x64_sys_clone+0x12e/0x160 [ 112.392451][ C0] do_syscall_64+0xcf/0x170 [ 112.397106][ C0] entry_SYSCALL_64_after_hwframe+0x5c/0xc1 [ 112.403757][ C0] [ 112.406076][ C0] Freed by task 2713: [ 112.410048][ C0] __kasan_slab_free+0x1c3/0x280 [ 112.414974][ C0] kasan_slab_free+0xe/0x10 [ 112.419505][ C0] slab_free_freelist_hook+0xb7/0x180 [ 112.425562][ C0] kmem_cache_free+0x10c/0x2c0 [ 112.430498][ C0] put_files_struct+0x2f9/0x330 [ 112.435527][ C0] exit_files+0x80/0xa0 [ 112.439682][ C0] do_exit+0xa0c/0x2660 [ 112.444433][ C0] do_group_exit+0x13e/0x300 [ 112.449002][ C0] get_signal+0xdee/0x13d0 [ 112.453399][ C0] do_signal+0xad/0xda0 [ 112.457567][ C0] exit_to_usermode_loop+0xc4/0x1b0 [ 112.462764][ C0] prepare_exit_to_usermode+0x18e/0x1f0 [ 112.468890][ C0] do_syscall_64+0x13e/0x170 [ 112.473466][ C0] entry_SYSCALL_64_after_hwframe+0x5c/0xc1 [ 112.479454][ C0] [ 112.481883][ C0] The buggy address belongs to the object at ffff8881e37bb0c0 [ 112.481883][ C0] which belongs to the cache files_cache of size 704 [ 112.496228][ C0] The buggy address is located 264 bytes inside of [ 112.496228][ C0] 704-byte region [ffff8881e37bb0c0, ffff8881e37bb380) [ 112.509739][ C0] The buggy address belongs to the page: [ 112.515361][ C0] page:ffffea00078dee00 refcount:1 mapcount:0 mapping:ffff8881f5cf7400 index:0x0 compound_mapcount: 0 [ 112.526267][ C0] flags: 0x8000000000010200(slab|head) [ 112.531706][ C0] raw: 8000000000010200 dead000000000100 dead000000000122 ffff8881f5cf7400 [ 112.540267][ C0] raw: 0000000000000000 0000000080130013 00000001ffffffff 0000000000000000 [ 112.548831][ C0] page dumped because: kasan: bad access detected [ 112.555227][ C0] page_owner tracks the page as allocated [ 112.560926][ C0] page last allocated via order 2, migratetype Unmovable, gfp_mask 0x1d20c0(__GFP_IO|__GFP_FS|__GFP_NOWARN|__GFP_NORETRY|__GFP_COMP|__GFP_NOMEMALLOC|__GFP_HARDWALL) [ 112.577309][ C0] prep_new_page+0x35e/0x370 [ 112.581877][ C0] get_page_from_freelist+0x1296/0x1310 [ 112.587616][ C0] __alloc_pages_nodemask+0x202/0x4b0 [ 112.592972][ C0] alloc_slab_page+0x3c/0x3b0 [ 112.597630][ C0] new_slab+0x93/0x420 [ 112.601756][ C0] ___slab_alloc+0x29e/0x420 [ 112.606342][ C0] __slab_alloc+0x63/0xa0 [ 112.610655][ C0] kmem_cache_alloc+0x12c/0x270 [ 112.615517][ C0] dup_fd+0x70/0xaf0 [ 112.619582][ C0] copy_files+0xc4/0x160 [ 112.623805][ C0] copy_process+0x10b5/0x2cf0 [ 112.628783][ C0] _do_fork+0x190/0x860 [ 112.632920][ C0] __x64_sys_clone+0x12e/0x160 [ 112.637682][ C0] do_syscall_64+0xcf/0x170 [ 112.642163][ C0] entry_SYSCALL_64_after_hwframe+0x5c/0xc1 [ 112.648026][ C0] page last free stack trace: [ 112.652809][ C0] __free_pages_ok+0x7e4/0x910 [ 112.657811][ C0] __free_pages+0x8c/0x110 [ 112.662938][ C0] kfree+0x1ca/0x260 [ 112.666866][ C0] kvfree+0x4c/0x50 [ 112.670672][ C0] netdev_freemem+0x3f/0x60 [ 112.675152][ C0] netdev_release+0x7f/0xb0 [ 112.679647][ C0] device_release+0x70/0x1a0 [ 112.684431][ C0] kobject_put+0x1fe/0x2c0 [ 112.688835][ C0] netdev_run_todo+0xae4/0xc70 [ 112.693581][ C0] rtnl_unlock+0xe/0x10 [ 112.697742][ C0] tun_chr_close+0xc4/0x140 [ 112.702239][ C0] __fput+0x2a3/0x730 [ 112.706198][ C0] ____fput+0x15/0x20 [ 112.710175][ C0] task_work_run+0x146/0x170 [ 112.714756][ C0] do_exit+0xa43/0x2660 [ 112.718887][ C0] do_group_exit+0x13e/0x300 [ 112.723446][ C0] [ 112.725751][ C0] Memory state around the buggy address: [ 112.731359][ C0] ffff8881e37bb080: fc fc fc fc fc fc fc fc fb fb fb fb fb fb fb fb [ 112.739416][ C0] ffff8881e37bb100: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 112.747452][ C0] >ffff8881e37bb180: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 112.755485][ C0] ^ [ 112.761896][ C0] ffff8881e37bb200: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 112.769948][ C0] ffff8881e37bb280: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 112.778078][ C0] ================================================================== [ 112.786860][ C0] Disabling lock debugging due to kernel taint [ 112.794676][ C0] BUG: kernel NULL pointer dereference, address: 0000000000000000 [ 112.802497][ C0] #PF: supervisor instruction fetch in kernel mode [ 112.808984][ C0] #PF: error_code(0x0010) - not-present page [ 112.815298][ C0] PGD 1e159f067 P4D 1e159f067 PUD 0 [ 112.820588][ C0] Oops: 0010 [#1] PREEMPT SMP KASAN [ 112.826404][ C0] CPU: 0 PID: 2790 Comm: syz.4.809 Tainted: G B 5.4.292-syzkaller-00021-gcd8e74fa0fa3 #0 [ 112.837485][ C0] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 112.847540][ C0] RIP: 0010:0x0 [ 112.851450][ C0] Code: Bad RIP value. [ 112.856025][ C0] RSP: 0018:ffff8881f6e09cf0 EFLAGS: 00010206 [ 112.862073][ C0] RAX: ffffffff8150a590 RBX: 0000000000000100 RCX: ffff8881e7aa8000 [ 112.870081][ C0] RDX: 0000000000000100 RSI: 0000000000000000 RDI: ffff8881e37bb1c0 [ 112.879545][ C0] RBP: ffff8881f6e09d30 R08: 0000000000000004 R09: 0000000000000003 [ 112.887505][ C0] R10: ffffed103edc1398 R11: 1ffff1103edc1398 R12: 00000000ffffb638 [ 112.895463][ C0] R13: dffffc0000000000 R14: 0000000000000000 R15: ffff8881e37bb1c0 [ 112.903424][ C0] FS: 00007f487773f6c0(0000) GS:ffff8881f6e00000(0000) knlGS:0000000000000000 [ 112.912454][ C0] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 112.919020][ C0] CR2: ffffffffffffffd6 CR3: 00000001e3e21000 CR4: 00000000003406b0 [ 112.927010][ C0] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 112.935938][ C0] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000600 [ 112.943979][ C0] Call Trace: [ 112.947245][ C0] [ 112.950087][ C0] call_timer_fn+0x3c/0x380 [ 112.954668][ C0] __run_timers+0x81d/0xb60 [ 112.959247][ C0] ? enqueue_timer+0x2c0/0x2c0 [ 112.964097][ C0] ? check_preemption_disabled+0x9b/0x300 [ 112.969801][ C0] ? debug_smp_processor_id+0x20/0x20 [ 112.975159][ C0] run_timer_softirq+0x6a/0xf0 [ 112.980091][ C0] __do_softirq+0x236/0x660 [ 112.984578][ C0] irq_exit+0x197/0x1c0 [ 112.988716][ C0] smp_apic_timer_interrupt+0x11d/0x490 [ 112.994249][ C0] apic_timer_interrupt+0xf/0x20 [ 112.999164][ C0] [ 113.002086][ C0] RIP: 0010:kmalloc_slab+0x0/0xb0 [ 113.007180][ C0] Code: c7 58 57 d6 85 e8 40 6b a8 02 e8 1b 2c b6 ff 5b 41 5c 41 5e 41 5f 5d c3 66 90 55 48 89 e5 83 3d 8d f9 d4 04 03 0f 93 c0 5d c3 <55> 48 89 e5 41 56 53 50 89 f3 48 81 ff c0 00 00 00 77 18 48 85 ff [ 113.027483][ C0] RSP: 0018:ffff8881e2ba7690 EFLAGS: 00000287 ORIG_RAX: ffffffffffffff13 [ 113.035879][ C0] RAX: ffffffff81804654 RBX: 0000000000100dc0 RCX: 0000000000000002 [ 113.043847][ C0] RDX: ffff8881e7aa8000 RSI: 0000000000100dc0 RDI: 0000000000000018 [ 113.051817][ C0] RBP: ffff8881e2ba76d8 R08: ffff8881e7aa8000 R09: 0000000000000002 [ 113.059804][ C0] R10: 0000000000000003 R11: 0000000000000002 R12: 0000000000100dc0 [ 113.067759][ C0] R13: 0000000000000000 R14: 0000000000100dc0 R15: 0000000000000018 [ 113.075732][ C0] ? kvmalloc_node+0x64/0xf0 [ 113.080313][ C0] ? __kmalloc+0x2f/0x2f0 [ 113.084626][ C0] kvmalloc_node+0x88/0xf0 [ 113.089043][ C0] bpf_check+0x17f9/0x9cf0 [ 113.093447][ C0] ? stack_trace_snprint+0x170/0x170 [ 113.098712][ C0] ? bpf_verifier_log_write+0x230/0x230 [ 113.104238][ C0] ? apic_timer_interrupt+0xa/0x20 [ 113.109332][ C0] ? __kasan_kmalloc+0x1c3/0x200 [ 113.114260][ C0] ? __kasan_kmalloc+0x162/0x200 [ 113.119181][ C0] ? kasan_kmalloc+0xd/0x20 [ 113.123667][ C0] ? kmem_cache_alloc_trace+0x112/0x290 [ 113.129195][ C0] ? selinux_bpf_prog_alloc+0x51/0x140 [ 113.134724][ C0] ? security_bpf_prog_alloc+0x62/0x90 [ 113.140163][ C0] ? bpf_prog_load+0x6b8/0xe10 [ 113.145538][ C0] ? __se_sys_bpf+0x435/0x570 [ 113.150298][ C0] ? __x64_sys_bpf+0x7b/0x90 [ 113.155042][ C0] ? do_syscall_64+0xcf/0x170 [ 113.159719][ C0] ? entry_SYSCALL_64_after_hwframe+0x5c/0xc1 [ 113.165791][ C0] ? apic_timer_interrupt+0xa/0x20 [ 113.170914][ C0] ? memset+0x31/0x40 [ 113.174928][ C0] ? bpf_obj_name_cpy+0x7df/0x1380 [ 113.180071][ C0] bpf_prog_load+0xa5f/0xe10 [ 113.185181][ C0] ? map_freeze+0x210/0x210 [ 113.189757][ C0] ? __se_sys_bpf+0x427/0x570 [ 113.194426][ C0] __se_sys_bpf+0x435/0x570 [ 113.199212][ C0] ? __x64_sys_bpf+0x90/0x90 [ 113.203885][ C0] __x64_sys_bpf+0x7b/0x90 [ 113.208312][ C0] do_syscall_64+0xcf/0x170 [ 113.212810][ C0] entry_SYSCALL_64_after_hwframe+0x5c/0xc1 [ 113.218953][ C0] RIP: 0033:0x7f48790d6969 [ 113.223361][ C0] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 113.242948][ C0] RSP: 002b:00007f487773f038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 113.251351][ C0] RAX: ffffffffffffffda RBX: 00007f48792fdfa0 RCX: 00007f48790d6969 [ 113.259305][ C0] RDX: 0000000000000080 RSI: 0000200000000600 RDI: 0000000000000005 [ 113.267262][ C0] RBP: 00007f4879158ab1 R08: 0000000000000000 R09: 0000000000000000 [ 113.275217][ C0] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 113.283169][ C0] R13: 0000000000000000 R14: 00007f48792fdfa0 R15: 00007ffe4e0bdf58 [ 113.291126][ C0] Modules linked in: [ 113.295017][ C0] CR2: 0000000000000000 [ 113.299167][ C0] ---[ end trace 528667a61879d105 ]--- [ 113.304614][ C0] RIP: 0010:0x0 [ 113.308057][ C0] Code: Bad RIP value. [ 113.312102][ C0] RSP: 0018:ffff8881f6e09cf0 EFLAGS: 00010206 [ 113.318146][ C0] RAX: ffffffff8150a590 RBX: 0000000000000100 RCX: ffff8881e7aa8000 [ 113.326101][ C0] RDX: 0000000000000100 RSI: 0000000000000000 RDI: ffff8881e37bb1c0 [ 113.334196][ C0] RBP: ffff8881f6e09d30 R08: 0000000000000004 R09: 0000000000000003 [ 113.342160][ C0] R10: ffffed103edc1398 R11: 1ffff1103edc1398 R12: 00000000ffffb638 [ 113.350119][ C0] R13: dffffc0000000000 R14: 0000000000000000 R15: ffff8881e37bb1c0 [ 113.358077][ C0] FS: 00007f487773f6c0(0000) GS:ffff8881f6e00000(0000) knlGS:0000000000000000 [ 113.366985][ C0] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 113.373636][ C0] CR2: ffffffffffffffd6 CR3: 00000001e3e21000 CR4: 00000000003406b0 [ 113.381680][ C0] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 113.389645][ C0] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000600 [ 113.397709][ C0] Kernel panic - not syncing: Fatal exception in interrupt [ 113.405083][ C0] Kernel Offset: disabled [ 113.409566][ C0] Rebooting in 86400 seconds..