last executing test programs: 6.375596153s ago: executing program 2 (id=3111): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000240)=ANY=[], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="1b00000000000000000000000080000000000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="0000000000000000000000000000000000000000000000000000c200"], 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f0000000240)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b702000002000000850000008600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f00000006c0)='sched_switch\x00', r2}, 0x10) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000080)={{}, &(0x7f0000000000), &(0x7f0000000040), 0x2}, 0x20) r3 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x10020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc, 0x0, @perf_bp={&(0x7f0000000180)}, 0x13240, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000540)={0x5, 0x80, 0x6, 0x44, 0x1, 0x0, 0x0, 0x3, 0x60014, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x3, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, @perf_config_ext={0x8, 0x9}, 0x20, 0x200, 0xfffffff9, 0x4, 0xc, 0x0, 0x200, 0x0, 0x40, 0x0, 0x3}, 0x0, 0xf, r3, 0x2) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000140)={0x9, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="1800000000000000000000000000000079122800000000009500000000004000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0xd}, 0x80) openat$cgroup_devices(0xffffffffffffffff, 0x0, 0x2, 0x0) mkdir(&(0x7f0000000000)='./cgroup/../file0\x00', 0x0) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r5 = openat$cgroup_ro(r4, &(0x7f0000000200)='pids.current\x00', 0x275a, 0x0) r6 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r7 = openat$cgroup_subtree(r6, &(0x7f0000000200), 0x2, 0x0) write$cgroup_subtree(r7, &(0x7f0000000400)=ANY=[], 0x5) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8914, &(0x7f0000000000)={'veth0_vlan\x00', @remote}) socketpair(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) r9 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) socketpair(0x10, 0x0, 0xa, &(0x7f0000000080)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r9}, 0x10) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000009c0)={0x6, 0x0, 0x0, &(0x7f00000004c0)='GPL\x00', 0x800, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, 0x25, r5, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f0000000780), &(0x7f00000007c0)=[{0x2, 0x2, 0x3, 0x5}, {0x4, 0x5, 0x10, 0x6}, {0x2, 0x4, 0x7, 0xb}, {0x4, 0x5, 0x2, 0x1}], 0x10, 0xb}, 0x94) socketpair(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000001c0)={0x0, r3, 0x0, 0x0, 0x0}, 0x30) syz_clone(0x2a020600, &(0x7f0000000440)="4e159d92ce4e466744ae3704fbcbecdf6d177309d6887a9d4f60bdd3c2aa9601456e3bdfd0d883f01ff4b38bc7e0302ffc3a39d616b8f204f4e6067102b48bf64b442ded12f27d5c1fefd49050ae9b46d11c86ae78e3f153dacb1199b2571171df725d2ec1048be9f8fdf137cdd9075084f3", 0x72, &(0x7f0000000280), &(0x7f00000003c0), 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r10, 0x89a0, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_SET_FILTER(r8, 0x89a1, &(0x7f0000000080)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000340)={&(0x7f0000000300)='kfree\x00', r0}, 0x10) bpf$PROG_LOAD(0x5, 0x0, 0x0) 5.869262264s ago: executing program 2 (id=3115): bpf$PROG_LOAD(0x5, &(0x7f0000000c80)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18020000002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb703000008000000b703000000000020850000007200000095"], 0x0, 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x22, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000a40)={0x0, 0xb, &(0x7f0000000940)=ANY=[], &(0x7f0000000780)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000340)=@generic={&(0x7f0000001080)='./file0/../file0/file0\x00', r0}, 0x18) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000980)={&(0x7f00000009c0)=ANY=[@ANYBLOB="9feb01001800000000009f34246e303e2462d1e3d35c210600000000000000fd11f2fb399ad4d1a2f330c6225591ace7fef9010000060400000005000000000000810000000061f4e1bab6f28e9539632a2ccfc061704c4d39c5c6410d9b5640ab27f9e7a7c841ebcd5dcc165368b1e22c76058ffd951341b2"], &(0x7f0000000380)=""/187, 0x32, 0xbb, 0x1}, 0x28) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz1\x00', 0x1ff) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000002000000b7030000fa"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r2}, 0x10) r3 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000580)={0xffffffffffffffff, 0x4, 0x8}, 0xc) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000640)={0x6, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="bd50c0fffcffffff049500000000000018410300fdfbffff0000000000000000"], &(0x7f0000000300)='syzkaller\x00', 0x0, 0x54, &(0x7f0000000480)=""/84, 0x41000, 0x48, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000500)={0x6, 0x1}, 0x8, 0x10, &(0x7f0000000540)={0x1, 0x2, 0x3, 0x2}, 0x10, 0x0, 0x0, 0x2, &(0x7f00000005c0)=[r3], &(0x7f0000000600)=[{0x2, 0x2, 0xb, 0x4}, {0x1, 0x4, 0x2, 0x7}]}, 0x94) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) mkdir(&(0x7f0000000040)='./file0/../file0/../file0/file0\x00', 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) openat$cgroup_procs(r1, &(0x7f0000000240)='tasks\x00', 0x2, 0x0) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup/syz1\x00', 0x200002, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000740)={'ip6_vti0\x00', 0x1000}) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x11, 0xb, &(0x7f0000000c00)=ANY=[@ANYBLOB="18000000000000000000000023ed0000180100002820702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000083850000007100000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000700)={&(0x7f0000000440)='svcsock_tcp_state\x00', r5, 0x0, 0x2}, 0x18) unlink(0x0) openat$cgroup_procs(r4, &(0x7f0000000040)='cgroup.procs\x00', 0x2, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000800)={&(0x7f0000000840)=ANY=[@ANYBLOB="9feb0100180002000000000000000000000000000500000000612e2e002c8e9f2f4d6ae568982950931f28b159c5e19118f90d9672e143a64796e0771bb641c38a896be3195f32110f48a32ee8bd58fe3f4fb38a58739a59d1ef22b0c7a1b2371ec9ed0001836c6bc1642982fc5b8e062fef33ad26183c04d3ba924622132d1a72d1944c52f6ebd03214a7d0ac953f5d7aa02139f7985ee473676d0442376ce8fbbef7b9ddf2a966691023dac8c8de526cbe2fabf39bf668e86634ec260a1d09ae761fc25e269a3d0789ab7a8db8ed85f7193a1f60f5b340b91673716b529fa48a25e3011d75ad023b65bba8b0"], 0x0, 0x1d, 0x0, 0x1000, 0x4}, 0x28) r6 = syz_clone(0x42a00180, 0x0, 0x0, 0x0, 0x0, 0x0) r7 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, r6, 0x4, r7, 0x1e) openat$tun(0xffffffffffffff9c, &(0x7f0000000280), 0x341000, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x6, 0xb, 0x0, &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @xdp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) 3.598846828s ago: executing program 2 (id=3124): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={&(0x7f00000002c0)='mm_page_alloc\x00', r0}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={0x0}, 0x18) bpf$MAP_CREATE(0x0, &(0x7f0000000500)=ANY=[@ANYBLOB="1b00000000000000000000000080000000000000", @ANYRES32, @ANYBLOB="00007fffffffffffffff0000000000000000", @ANYRES32=0x0], 0x50) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, 0x0, &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, 0x0, 0x17) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffff8, 0x0, @perf_config_ext, 0x0, 0x4}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={0xffffffffffffffff, 0x0, &(0x7f0000001540)=""/155}, 0x20) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'veth0_vlan\x00', 0x800}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f00000006c0)='sched_switch\x00', r1}, 0x10) socketpair(0xf, 0x3, 0x2, &(0x7f00000001c0)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000040)={0x0, 0x0}) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000040)={0x0, 0x0}) close(r2) bpf$MAP_CREATE(0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="1e00007704000000030000000900000001000000097130a6ecb57c7eba49c41a4e637edc7bc5ba80dcdc7354c5556f8d8e715449ba6492c2bb3bcf6db94137c510b9a9f8dc029fc94f479057436c0578edc6a457f95125b6a19f35d050dc093e6fe6251295e81b13ec676c474480e1", @ANYRES32, @ANYBLOB="0100"/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="0000000003000000040000000c00"/28], 0x48) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000000)={0x0, 0x0}) close(r3) setsockopt$sock_attach_bpf(r4, 0x10f, 0x87, &(0x7f0000000180), 0x127) close(r4) syz_clone(0x638c1100, 0x0, 0x0, 0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.throttle.io_serviced_recursive\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000001080)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x7602, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 2.793699943s ago: executing program 1 (id=3128): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x18, 0x7, &(0x7f0000000080)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b702000001000000850000008600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1a, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f00000001c0)='sched_switch\x00', r2}, 0x10) r3 = openat$cgroup_procs(0xffffffffffffffff, 0x0, 0x2, 0x0) bpf$BPF_PROG_TEST_RUN_LIVE(0xa, 0x0, 0x0) write$cgroup_pid(r3, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, 0x0) syz_open_procfs$namespace(0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000100)={'macvtap0\x00', 0x2}) ioctl$TUNATTACHFILTER(r0, 0x401054d5, 0x0) 2.792476133s ago: executing program 2 (id=3129): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0xb, 0x8, 0xc, 0xffffffff, 0x1, 0x1}, 0x48) r1 = bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000001200)={0x0, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r0}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0xede8}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, r1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000000080)={0x0, 0x0}, 0x8) r4 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000002c0)=r3, 0x4) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f00000008c0)={r4, 0x0, 0xfffffffffffffffd}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000003c0)={&(0x7f0000000300)='qdisc_dequeue\x00', r2}, 0x10) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000580)={&(0x7f0000000540)='fib6_table_lookup\x00', r5}, 0x10) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x1b, 0xe, &(0x7f0000000640)=ANY=[@ANYRES8=r5], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, r3}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r6, 0x18000000000002a0, 0xe40, 0x0, &(0x7f0000000100)="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", 0x0, 0x8, 0x60000000}, 0x1e) 2.792370853s ago: executing program 4 (id=3112): bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d0000001801000020696c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000000085000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={&(0x7f0000000180)='workqueue_activate_work\x00', r0}, 0x10) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="19000000040000000800000008"], 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000001b518110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2b, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000a40)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={&(0x7f0000000180)='workqueue_activate_work\x00', r2}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x2, 0xa, &(0x7f0000000680)=@framed={{0x18, 0x8}, [@func={0x85, 0x0, 0x1, 0x0, 0x6}, @map_fd, @generic={0x79, 0x0, 0x0, 0x258}, @initr0, @exit]}, &(0x7f0000000000)='GPL\x00', 0x4, 0xee, &(0x7f0000000340)=""/238}, 0x80) 2.567903911s ago: executing program 1 (id=3130): r0 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0x0}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x11, 0xf, &(0x7f0000000340)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b702000014800000b7030000000000008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000000000008500000085000000b70000000000000095"], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='kfree\x00', r1}, 0x10) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct]}}, 0x0, 0x26}, 0x20) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="1b00000000000000000000000080000000000000", @ANYRES32, @ANYBLOB='\a\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="00000000000000000000000000000000000000000400000000000000"], 0x50) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f0000000540)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b702000003000000850000008600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x1c1341, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f00000000c0)={'syzkaller0\x00', 0x84aebfbd6349b7f2}) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x9, 0x4, 0x7fe2, 0x1}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x3, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r5}, {}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1f, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000340)={&(0x7f0000000040)='kmem_cache_free\x00', r6}, 0x10) r7 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) close(r7) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)) ioctl$SIOCSIFHWADDR(r7, 0x8914, &(0x7f0000002280)={'syzkaller0\x00', @link_local}) write$cgroup_subtree(r4, &(0x7f0000000440)=ANY=[@ANYBLOB="8fedcb5d07081175f37538e486dd63"], 0xfdef) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000001800)={&(0x7f0000000580)='kfree\x00', r3}, 0x9) r8 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x1, 0x100004, 0x220104, 0xe2a4, 0x1}, 0x48) bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x18, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x1, r8, 0x1000000}, 0x38) 2.567660941s ago: executing program 3 (id=3077): socketpair$unix(0x1, 0x5, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x7, 0xc9d7, 0x9, 0x1}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000000)={{r0, 0xffffffffffffffff}, &(0x7f0000000580), &(0x7f00000005c0)}, 0x20) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x11, 0xd, &(0x7f00000002c0)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x38, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={&(0x7f00000002c0)='mm_page_alloc\x00', r2}, 0x63) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) sendmsg$inet(r3, &(0x7f0000000980)={0x0, 0x0, &(0x7f0000000900)=[{&(0x7f0000000080)='U', 0x1080}], 0x29a, 0x0, 0x3e80}, 0x0) 2.411300034s ago: executing program 2 (id=3142): perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1000, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000380)={0x4, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x10000000}, 0x0, 0xc8, 0xffff, 0x7, 0xf9, 0x0, 0x2, 0x0, 0xffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x4, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080), 0x9}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x1) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000005c0)=@base={0xb, 0x5, 0x5, 0x9, 0x1}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1e, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x5}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x16, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000b40)='neigh_create\x00', r1}, 0x10) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000001900)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r2, 0x18000000000002a0, 0x26, 0x0, &(0x7f0000000100)="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", 0x0, 0xfe, 0x60000000}, 0x2c) 2.410686584s ago: executing program 1 (id=3131): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000240)=ANY=[], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="1b00000000000000000000000080000000000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="0000000000000000000000000000000000000000000000000000c200"], 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f0000000240)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b702000002000000850000008600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f00000006c0)='sched_switch\x00', r2}, 0x10) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000080)={{}, &(0x7f0000000000), &(0x7f0000000040), 0x2}, 0x20) r3 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x10020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc, 0x0, @perf_bp={&(0x7f0000000180)}, 0x13240, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000540)={0x5, 0x80, 0x6, 0x44, 0x1, 0x0, 0x0, 0x3, 0x60014, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x3, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, @perf_config_ext={0x8, 0x9}, 0x20, 0x200, 0xfffffff9, 0x4, 0xc, 0x0, 0x200, 0x0, 0x40, 0x0, 0x3}, 0x0, 0xf, r3, 0x2) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000140)={0x9, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="1800000000000000000000000000000079122800000000009500000000004000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0xd}, 0x80) openat$cgroup_devices(0xffffffffffffffff, 0x0, 0x2, 0x0) mkdir(&(0x7f0000000000)='./cgroup/../file0\x00', 0x0) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r5 = openat$cgroup_ro(r4, &(0x7f0000000200)='pids.current\x00', 0x275a, 0x0) r6 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r7 = openat$cgroup_subtree(r6, &(0x7f0000000200), 0x2, 0x0) write$cgroup_subtree(r7, &(0x7f0000000400)=ANY=[], 0x5) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8914, &(0x7f0000000000)={'veth0_vlan\x00', @remote}) socketpair(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) r9 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) socketpair(0x10, 0x0, 0xa, &(0x7f0000000080)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r9}, 0x10) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000009c0)={0x6, 0x0, 0x0, &(0x7f00000004c0)='GPL\x00', 0x800, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, 0x25, r5, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f0000000780), &(0x7f00000007c0)=[{0x2, 0x2, 0x3, 0x5}, {0x4, 0x5, 0x10, 0x6}, {0x2, 0x4, 0x3, 0xb}, {0x4, 0x5, 0x2, 0x1}], 0x10, 0xb}, 0x94) socketpair(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000001c0)={0x0, r3, 0x0, 0x0, 0x0}, 0x30) syz_clone(0x2a020600, &(0x7f0000000440)="4e159d92ce4e466744ae3704fbcbecdf6d177309d6887a9d4f60bdd3c2aa9601456e3bdfd0d883f01ff4b38bc7e0302ffc3a39d616b8f204f4e6067102b48bf64b442ded12f27d5c1fefd49050ae9b46d11c86ae78e3f153dacb1199b2571171df725d2ec1048be9f8fdf137cdd9075084", 0x71, &(0x7f0000000280), &(0x7f00000003c0), 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r10, 0x89a0, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_SET_FILTER(r8, 0x89a1, &(0x7f0000000080)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000340)={&(0x7f0000000300)='kfree\x00', r0}, 0x10) bpf$PROG_LOAD(0x5, 0x0, 0x0) 2.410313834s ago: executing program 4 (id=3112): bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d0000001801000020696c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000000085000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={&(0x7f0000000180)='workqueue_activate_work\x00', r0}, 0x10) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="19000000040000000800000008"], 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000001b518110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2b, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000a40)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={&(0x7f0000000180)='workqueue_activate_work\x00', r2}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x2, 0xa, &(0x7f0000000680)=@framed={{0x18, 0x8}, [@func={0x85, 0x0, 0x1, 0x0, 0x6}, @map_fd, @generic={0x79, 0x0, 0x0, 0x258}, @initr0, @exit]}, &(0x7f0000000000)='GPL\x00', 0x4, 0xee, &(0x7f0000000340)=""/238}, 0x80) 1.96519713s ago: executing program 2 (id=3139): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)=ANY=[@ANYBLOB="07000000040000001800000042a0000000000000", @ANYBLOB], 0x50) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000001c0)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x1, 0x3, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000f40)={r0, 0x0, 0x0}, 0x20) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340)=ANY=[], 0x48) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) recvmsg(r1, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000002c0)=""/227, 0xe3}], 0x1}, 0x0) close(r1) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000b0ff000000180100002020000000000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b70300000000010a850000000400000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='kmem_cache_free\x00', r2}, 0x10) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) openat$tun(0xffffffffffffff9c, &(0x7f0000000300), 0x400000, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000040)='mm_page_alloc\x00'}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0xe}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='kmem_cache_free\x00'}, 0x10) syz_clone(0x640c7000, 0x0, 0x0, 0x0, 0x0, 0x0) 1.96497101s ago: executing program 3 (id=3077): socketpair$unix(0x1, 0x5, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x7, 0xc9d7, 0x9, 0x1}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000000)={{r0, 0xffffffffffffffff}, &(0x7f0000000580), &(0x7f00000005c0)}, 0x20) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x11, 0xd, &(0x7f00000002c0)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x38, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={&(0x7f00000002c0)='mm_page_alloc\x00', r2}, 0x63) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) sendmsg$inet(r3, &(0x7f0000000980)={0x0, 0x0, &(0x7f0000000900)=[{&(0x7f0000000080)='U', 0x1080}], 0x29a, 0x0, 0x3e80}, 0x0) 1.866784918s ago: executing program 1 (id=3140): bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="18010000000000000000000000000000850000007d"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x94) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x1, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0xb, 0x8, 0xc, 0xffffbfff, 0x1, 0x1}, 0x48) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000000c0), &(0x7f0000000140), 0x5, r0}, 0x38) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000810018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r2 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000140)='sched_switch\x00', r1}, 0x10) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xf, r2, 0xa) bpf$MAP_CREATE(0x0, &(0x7f0000000040)=@base={0xc, 0x4, 0x4, 0x9}, 0x48) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)=ANY=[@ANYBLOB="9feb010018000000000000000c0000000c00000002000000000000000000"], &(0x7f0000000040)=""/247, 0x26, 0xf7, 0x1}, 0x28) socketpair(0xb, 0xa, 0x4, &(0x7f0000000200)) write$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000400)='FREEZING\x00', 0x9) bpf$MAP_CREATE(0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="0100000004000000e27f0000010000", @ANYRES32, @ANYBLOB='\x00T\x00'/13, @ANYRES32=0x0, @ANYBLOB], 0x48) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup.net/syz1\x00', 0x200002, 0x0) mkdirat$cgroup(r3, &(0x7f00000001c0)='syz1\x00', 0x1ff) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000003c0)={0x0}, 0x18) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000640)=ANY=[@ANYBLOB], &(0x7f0000000340)='syzkaller\x00'}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r4, 0x18000000000002a0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x60000000, 0x0, 0x0, 0x0}, 0x50) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={0x0}, 0x18) syz_clone(0xc0001480, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x7) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xf, &(0x7f0000000240)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe}, {{0x18, 0x1, 0x1, 0x0, r5}}, {}, [], {{}, {}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x26, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f00000006c0)='sched_switch\x00', r6}, 0x10) openat$tun(0xffffff9c, &(0x7f0000000040), 0x0, 0x0) 1.866494658s ago: executing program 4 (id=3112): bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d0000001801000020696c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000000085000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={&(0x7f0000000180)='workqueue_activate_work\x00', r0}, 0x10) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="19000000040000000800000008"], 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000001b518110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2b, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000a40)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={&(0x7f0000000180)='workqueue_activate_work\x00', r2}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x2, 0xa, &(0x7f0000000680)=@framed={{0x18, 0x8}, [@func={0x85, 0x0, 0x1, 0x0, 0x6}, @map_fd, @generic={0x79, 0x0, 0x0, 0x258}, @initr0, @exit]}, &(0x7f0000000000)='GPL\x00', 0x4, 0xee, &(0x7f0000000340)=""/238}, 0x80) 1.310873213s ago: executing program 0 (id=3145): bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x11, 0x13, &(0x7f0000000080)=ANY=[@ANYBLOB="18080000000000000000000000000000851000000600000018020000", @ANYRES32, @ANYBLOB="000000f8ff0000006600020006000000180000000000000000000000000000009500040000000000360a020000000000180100002020782500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b50a00000000000085000000060000009500000000000000"], &(0x7f0000000000)='GPL\x00', 0x2, 0xff5c, &(0x7f0000000340)=""/222}, 0x78) 1.304621934s ago: executing program 3 (id=3077): socketpair$unix(0x1, 0x5, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x7, 0xc9d7, 0x9, 0x1}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000000)={{r0, 0xffffffffffffffff}, &(0x7f0000000580), &(0x7f00000005c0)}, 0x20) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x11, 0xd, &(0x7f00000002c0)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x38, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={&(0x7f00000002c0)='mm_page_alloc\x00', r2}, 0x63) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) sendmsg$inet(r3, &(0x7f0000000980)={0x0, 0x0, &(0x7f0000000900)=[{&(0x7f0000000080)='U', 0x1080}], 0x29a, 0x0, 0x3e80}, 0x0) 795.457205ms ago: executing program 0 (id=3141): r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x18, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="18010000200180000000000000000000850000007b00000095"], &(0x7f00000001c0)='GPL\x00', 0x4, 0x93, &(0x7f00000003c0)=""/147}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000080)='sched_switch\x00', r0}, 0x10) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000029c0)) openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x1c1842, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="9feb010018000000000000000c0000000c0000000200000000000000000008040000000000"], 0x0, 0x26}, 0x28) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100), 0xc1842, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) close(r2) socketpair(0x1, 0x1, 0x0, &(0x7f0000000200)) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000001f80)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000ac0)={0x0, 0x80, 0x4, 0x1, 0xfe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 793.332235ms ago: executing program 4 (id=3112): bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d0000001801000020696c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000000085000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={&(0x7f0000000180)='workqueue_activate_work\x00', r0}, 0x10) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="19000000040000000800000008"], 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000001b518110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2b, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000a40)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={&(0x7f0000000180)='workqueue_activate_work\x00', r2}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x2, 0xa, &(0x7f0000000680)=@framed={{0x18, 0x8}, [@func={0x85, 0x0, 0x1, 0x0, 0x6}, @map_fd, @generic={0x79, 0x0, 0x0, 0x258}, @initr0, @exit]}, &(0x7f0000000000)='GPL\x00', 0x4, 0xee, &(0x7f0000000340)=""/238}, 0x80) 687.469123ms ago: executing program 1 (id=3147): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000240)=ANY=[], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="1b00000000000000000000000080000000000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="0000000000000000000000000000000000000000000000000000c200"], 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f0000000240)=ANY=[@ANYBLOB="1800004000000000000000000000000018110000", @ANYRES32=r1, @ANYRES64], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f00000006c0)='sched_switch\x00', r2}, 0x10) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000080)={{}, &(0x7f0000000000), &(0x7f0000000040), 0x2}, 0x20) r3 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x10020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc, 0x0, @perf_bp={&(0x7f0000000180)}, 0x13240, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000540)={0x5, 0x80, 0x6, 0x44, 0x1, 0x0, 0x0, 0x3, 0x60014, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x3, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, @perf_config_ext={0x8, 0x9}, 0x20, 0x200, 0xfffffff9, 0x4, 0xc, 0x0, 0x200, 0x0, 0x40, 0x0, 0x3}, 0x0, 0xf, r3, 0x2) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000140)={0x9, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="1800000000000000000000000000000079122800000000009500000000004000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0xd}, 0x80) openat$cgroup_devices(0xffffffffffffffff, 0x0, 0x2, 0x0) mkdir(&(0x7f0000000000)='./cgroup/../file0\x00', 0x0) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r5 = openat$cgroup_ro(r4, &(0x7f0000000200)='pids.current\x00', 0x275a, 0x0) r6 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r7 = openat$cgroup_subtree(r6, &(0x7f0000000200), 0x2, 0x0) write$cgroup_subtree(r7, &(0x7f0000000400)=ANY=[], 0x5) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8914, &(0x7f0000000000)={'veth0_vlan\x00', @remote}) socketpair(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) r9 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) socketpair(0x10, 0x0, 0xa, &(0x7f0000000080)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r9}, 0x10) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000009c0)={0x6, 0x0, 0x0, &(0x7f00000004c0)='GPL\x00', 0x800, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, 0x25, r5, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f0000000780), &(0x7f00000007c0)=[{0x2, 0x2, 0x3, 0x5}, {0x4, 0x5, 0x10, 0x6}, {0x2, 0x4, 0x3, 0xb}, {0x4, 0x5, 0x2, 0x1}], 0x10, 0xb}, 0x94) socketpair(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000001c0)={0x0, r3, 0x0, 0x0, 0x0}, 0x30) syz_clone(0x2a020600, &(0x7f0000000440)="4e159d92ce4e466744ae3704fbcbecdf6d177309d6887a9d4f60bdd3c2aa9601456e3bdfd0d883f01ff4b38bc7e0302ffc3a39d616b8f204f4e6067102b48bf64b442ded12f27d5c1fefd49050ae9b46d11c86ae78e3f153dacb1199b2571171df725d2ec1048be9f8fdf137cdd9075084f3", 0x72, &(0x7f0000000280), &(0x7f00000003c0), 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r10, 0x89a0, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_SET_FILTER(r8, 0x89a1, &(0x7f0000000080)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000340)={&(0x7f0000000300)='kfree\x00', r0}, 0x10) bpf$PROG_LOAD(0x5, 0x0, 0x0) 687.026234ms ago: executing program 0 (id=3143): r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x18, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="18010000200180000000000000000000850000007b00000095"], &(0x7f00000001c0)='GPL\x00', 0x4, 0x93, &(0x7f00000003c0)=""/147}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000080)='sched_switch\x00', r0}, 0x10) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000029c0)) openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x1c1842, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="9feb010018000000000000000c0000000c00000002000000000000000000080400000000"], 0x0, 0x26}, 0x28) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100), 0xc1842, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) close(r2) socketpair(0x1, 0x1, 0x0, &(0x7f0000000200)) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000001f80)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000ac0)={0x0, 0x80, 0x4, 0x1, 0xfe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 686.817054ms ago: executing program 3 (id=3077): socketpair$unix(0x1, 0x5, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x7, 0xc9d7, 0x9, 0x1}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000000)={{r0, 0xffffffffffffffff}, &(0x7f0000000580), &(0x7f00000005c0)}, 0x20) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x11, 0xd, &(0x7f00000002c0)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x38, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={&(0x7f00000002c0)='mm_page_alloc\x00', r2}, 0x63) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) sendmsg$inet(r3, &(0x7f0000000980)={0x0, 0x0, &(0x7f0000000900)=[{&(0x7f0000000080)='U', 0x1080}], 0x29a, 0x0, 0x3e80}, 0x0) 313.724084ms ago: executing program 0 (id=3144): bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000280)={0x12, 0x4, &(0x7f0000000340)=ANY=[@ANYBLOB="180000000100000000000000000000007b01100000006b009500000000000000156b0525584845fc3f8c3b78e12db178fef1daa85c4a5acf88e849bd2c48da5fdfed8533ac72c96678d407220fc98d60ed1ba3347f13f757f7cebe8a09c3e18ced9a62397aaf18de5c985a1f9dabf1d326e8adfb6645055d986abfa6f32602e8aae3046d2a932a0d9dc3cee738dde776959ddce27c502badb58e38751ecd1fd94ac421c4c8e36daf106835e46836139acb1298ccdd2be1831684e089018bf24228e1f1e29653531ffc87ddd852e164360c5a44931ec929934ed2"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x20}, 0x80) 313.585584ms ago: executing program 4 (id=3112): bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d0000001801000020696c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000000085000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={&(0x7f0000000180)='workqueue_activate_work\x00', r0}, 0x10) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="19000000040000000800000008"], 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000001b518110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2b, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000a40)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={&(0x7f0000000180)='workqueue_activate_work\x00', r2}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x2, 0xa, &(0x7f0000000680)=@framed={{0x18, 0x8}, [@func={0x85, 0x0, 0x1, 0x0, 0x6}, @map_fd, @generic={0x79, 0x0, 0x0, 0x258}, @initr0, @exit]}, &(0x7f0000000000)='GPL\x00', 0x4, 0xee, &(0x7f0000000340)=""/238}, 0x80) 200.136813ms ago: executing program 0 (id=3146): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x18, 0x7, &(0x7f0000000080)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b702000001000000850000008600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1a, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f00000001c0)='sched_switch\x00', r2}, 0x10) r3 = openat$cgroup_procs(0xffffffffffffffff, 0x0, 0x2, 0x0) bpf$BPF_PROG_TEST_RUN_LIVE(0xa, 0x0, 0x0) write$cgroup_pid(r3, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, 0x0) syz_open_procfs$namespace(0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000100)={'macvtap0\x00', 0x2}) ioctl$TUNATTACHFILTER(r0, 0x401054d5, &(0x7f0000000000)={0x0, 0x0}) 199.408583ms ago: executing program 1 (id=3148): socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'ip6tnl0\x00', 0x210}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x89f4, &(0x7f0000000080)) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xe, 0xc, &(0x7f0000000440)=ANY=[@ANYRES32=0x0, @ANYBLOB], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000800)={r1, 0xe0, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, &(0x7f0000000040)=[0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, &(0x7f0000000280)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x0, 0xf3, 0x0, 0x0, 0x10, &(0x7f0000000400), &(0x7f0000000580), 0x8, 0x19, 0x8, 0x8, &(0x7f00000006c0)}}, 0x10) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.current\x00', 0x275a, 0x0) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000001080)=ANY=[@ANYBLOB="1b0000000000000000000000a9a6000000000000", @ANYRES32=r3, @ANYBLOB="00000000001000000000000000000000000000004d4d5d3abd4848ec3cf4dec43d6d823a43065998150ab2353aa1297bbd9d89781824e82dcb11b3ecd74723978378d5061673916b19a40e1b4bf7c2b769f70e3bc27f60a9bfcf4ccddc927429a30116fff4ece4cd404643ccb56b15af037660189065acddc369520b2b0c7c4e9bdb3ee1ed27bbec934eea854182644e896b5d3e35abce3cc3097a98c503c54558", @ANYRES32=r2, @ANYRES32, @ANYBLOB="03000000010000000400"/28], 0x50) r4 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000002c0)=0xffffffffffffffff, 0x4) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000840)=@base={0x3, 0x8, 0x7, 0xec94, 0x100, r3, 0x53, '\x00', r2, r4, 0x5, 0x4, 0x5}, 0x50) r6 = bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000001200)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000ffffffe3000000000000000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b7080000e8ed00007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000030000009500000000000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, r6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r7, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000003c0)={&(0x7f0000000300)='qdisc_dequeue\x00', r8}, 0x10) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) recvmsg$unix(r9, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r10, &(0x7f0000000000), 0xe) r11 = bpf$MAP_CREATE(0x1900000000000000, &(0x7f0000000040)=@base={0x1b, 0x0, 0x0, 0x2000}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x6, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @xdp, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) perf_event_open(&(0x7f0000000040)={0x4, 0x8c, 0x1, 0x8, 0x57, 0x2, 0x0, 0x900000, 0xa406, 0xf, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x3, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, @perf_config_ext={0x5, 0xf}, 0x1000, 0x5, 0x1, 0x6, 0x1, 0x1, 0x7, 0x0, 0xfffffff7, 0x0, 0x800000000000e6}, 0x0, 0x4, 0xffffffffffffffff, 0x1) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r11}}]}, 0x0, 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback=0xa, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r12 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r13 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000500)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000cc0)='mmap_lock_acquire_returned\x00', r13}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000cc0)='mmap_lock_acquire_returned\x00', r12}, 0x18) syz_clone(0x500, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$TUNSETVNETHDRSZ(r10, 0x400454d8, &(0x7f0000000040)=0x1) r14 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="02000000040000000600000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000260018110000", @ANYRES32=r14, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r15 = bpf$PROG_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000200)='fdb_delete\x00', r15}, 0x10) 199.191483ms ago: executing program 3 (id=3077): socketpair$unix(0x1, 0x5, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x7, 0xc9d7, 0x9, 0x1}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000000)={{r0, 0xffffffffffffffff}, &(0x7f0000000580), &(0x7f00000005c0)}, 0x20) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x11, 0xd, &(0x7f00000002c0)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x38, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={&(0x7f00000002c0)='mm_page_alloc\x00', r2}, 0x63) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) sendmsg$inet(r3, &(0x7f0000000980)={0x0, 0x0, &(0x7f0000000900)=[{&(0x7f0000000080)='U', 0x1080}], 0x29a, 0x0, 0x3e80}, 0x0) 156.929297ms ago: executing program 0 (id=3149): perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1000, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000380)={0x4, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x10000000}, 0x0, 0xc8, 0xffff, 0x7, 0xf9, 0x0, 0x2, 0x0, 0xffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x4, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080), 0x9}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x1) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000005c0)=@base={0xb, 0x5, 0x5, 0x9, 0x1}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1e, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x5}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x16, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000b40)='neigh_create\x00', r1}, 0x10) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000001900)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r2, 0x18000000000002a0, 0x26, 0x0, &(0x7f0000000100)="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", 0x0, 0xfe, 0x60000000}, 0x2c) 156.767087ms ago: executing program 4 (id=3112): bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d0000001801000020696c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000000085000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={&(0x7f0000000180)='workqueue_activate_work\x00', r0}, 0x10) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="19000000040000000800000008"], 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000001b518110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2b, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000a40)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={&(0x7f0000000180)='workqueue_activate_work\x00', r2}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x2, 0xa, &(0x7f0000000680)=@framed={{0x18, 0x8}, [@func={0x85, 0x0, 0x1, 0x0, 0x6}, @map_fd, @generic={0x79, 0x0, 0x0, 0x258}, @initr0, @exit]}, &(0x7f0000000000)='GPL\x00', 0x4, 0xee, &(0x7f0000000340)=""/238}, 0x80) 0s ago: executing program 3 (id=3077): socketpair$unix(0x1, 0x5, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x7, 0xc9d7, 0x9, 0x1}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000000)={{r0, 0xffffffffffffffff}, &(0x7f0000000580), &(0x7f00000005c0)}, 0x20) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x11, 0xd, &(0x7f00000002c0)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x38, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={&(0x7f00000002c0)='mm_page_alloc\x00', r2}, 0x63) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) sendmsg$inet(r3, &(0x7f0000000980)={0x0, 0x0, &(0x7f0000000900)=[{&(0x7f0000000080)='U', 0x1080}], 0x29a, 0x0, 0x3e80}, 0x0) kernel console output (not intermixed with test programs): ridge_slave_1) entered disabled state [ 37.637943][ T764] bridge0: port 1(bridge_slave_0) entered disabled state [ 37.900655][ T773] FAULT_INJECTION: forcing a failure. [ 37.900655][ T773] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 37.932784][ T773] CPU: 0 PID: 773 Comm: syz.2.139 Not tainted 5.15.189-syzkaller-android13-5.15.189_r00 #0 [ 37.942794][ T773] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 37.952859][ T773] Call Trace: [ 37.956161][ T773] [ 37.959093][ T773] __dump_stack+0x21/0x30 [ 37.963436][ T773] dump_stack_lvl+0xee/0x150 [ 37.968045][ T773] ? show_regs_print_info+0x20/0x20 [ 37.973254][ T773] ? migrate_enable+0x192/0x260 [ 37.978228][ T773] ? migrate_disable+0x180/0x180 [ 37.983183][ T773] dump_stack+0x15/0x20 [ 37.987453][ T773] should_fail+0x3c1/0x510 [ 37.991981][ T773] should_fail_usercopy+0x1a/0x20 [ 37.997016][ T773] _copy_from_user+0x20/0xd0 [ 38.001623][ T773] generic_map_update_batch+0x4a3/0x740 [ 38.007185][ T773] ? generic_map_delete_batch+0x510/0x510 [ 38.012919][ T773] ? __fdget+0x1a1/0x230 [ 38.017177][ T773] ? generic_map_delete_batch+0x510/0x510 [ 38.022909][ T773] bpf_map_do_batch+0x463/0x5f0 [ 38.027774][ T773] __sys_bpf+0x5e3/0x730 [ 38.032028][ T773] ? bpf_link_show_fdinfo+0x310/0x310 [ 38.037425][ T773] __x64_sys_bpf+0x7c/0x90 [ 38.042051][ T773] x64_sys_call+0x4b9/0x9a0 [ 38.046568][ T773] do_syscall_64+0x4c/0xa0 [ 38.051004][ T773] ? clear_bhb_loop+0x50/0xa0 [ 38.055701][ T773] ? clear_bhb_loop+0x50/0xa0 [ 38.060394][ T773] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 38.066300][ T773] RIP: 0033:0x7f81b925cbe9 [ 38.070760][ T773] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 38.090372][ T773] RSP: 002b:00007f81b7cc5038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 38.098800][ T773] RAX: ffffffffffffffda RBX: 00007f81b9483fa0 RCX: 00007f81b925cbe9 [ 38.106955][ T773] RDX: 0000000000000038 RSI: 0000200000000200 RDI: 000000000000001a [ 38.111929][ T765] device bridge_slave_1 left promiscuous mode [ 38.114949][ T773] RBP: 00007f81b7cc5090 R08: 0000000000000000 R09: 0000000000000000 [ 38.114967][ T773] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 38.114976][ T773] R13: 00007f81b9484038 R14: 00007f81b9483fa0 R15: 00007ffdc103c8b8 [ 38.114990][ T773] [ 38.335178][ T765] bridge0: port 2(bridge_slave_1) entered disabled state [ 38.346775][ T30] kauditd_printk_skb: 2 callbacks suppressed [ 38.346789][ T30] audit: type=1400 audit(1754694345.793:122): avc: denied { create } for pid=778 comm="syz.4.142" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netrom_socket permissive=1 [ 38.483340][ T765] device bridge_slave_0 left promiscuous mode [ 38.531499][ T30] audit: type=1400 audit(1754694345.903:123): avc: denied { create } for pid=778 comm="syz.4.142" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 38.551358][ T765] bridge0: port 1(bridge_slave_0) entered disabled state [ 39.869274][ T816] FAULT_INJECTION: forcing a failure. [ 39.869274][ T816] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 39.904224][ T816] CPU: 1 PID: 816 Comm: syz.1.155 Not tainted 5.15.189-syzkaller-android13-5.15.189_r00 #0 [ 39.914236][ T816] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 39.924409][ T816] Call Trace: [ 39.927701][ T816] [ 39.930653][ T816] __dump_stack+0x21/0x30 [ 39.934992][ T816] dump_stack_lvl+0xee/0x150 [ 39.939584][ T816] ? show_regs_print_info+0x20/0x20 [ 39.944778][ T816] ? migrate_enable+0x192/0x260 [ 39.949637][ T816] ? migrate_disable+0x180/0x180 [ 39.954622][ T816] dump_stack+0x15/0x20 [ 39.958792][ T816] should_fail+0x3c1/0x510 [ 39.963252][ T816] should_fail_usercopy+0x1a/0x20 [ 39.968279][ T816] _copy_from_user+0x20/0xd0 [ 39.972872][ T816] generic_map_update_batch+0x4a3/0x740 [ 39.978452][ T816] ? generic_map_delete_batch+0x510/0x510 [ 39.984178][ T816] ? __fdget+0x1a1/0x230 [ 39.988424][ T816] ? generic_map_delete_batch+0x510/0x510 [ 39.994145][ T816] bpf_map_do_batch+0x463/0x5f0 [ 39.998998][ T816] __sys_bpf+0x5e3/0x730 [ 40.003239][ T816] ? bpf_link_show_fdinfo+0x310/0x310 [ 40.008612][ T816] ? debug_smp_processor_id+0x17/0x20 [ 40.013987][ T816] __x64_sys_bpf+0x7c/0x90 [ 40.018443][ T816] x64_sys_call+0x4b9/0x9a0 [ 40.022963][ T816] do_syscall_64+0x4c/0xa0 [ 40.027385][ T816] ? clear_bhb_loop+0x50/0xa0 [ 40.032075][ T816] ? clear_bhb_loop+0x50/0xa0 [ 40.036845][ T816] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 40.042748][ T816] RIP: 0033:0x7f22ce428be9 [ 40.047168][ T816] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 40.067241][ T816] RSP: 002b:00007f22cce91038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 40.075647][ T816] RAX: ffffffffffffffda RBX: 00007f22ce64ffa0 RCX: 00007f22ce428be9 [ 40.083602][ T816] RDX: 0000000000000038 RSI: 0000200000000200 RDI: 000000000000001a [ 40.091555][ T816] RBP: 00007f22cce91090 R08: 0000000000000000 R09: 0000000000000000 [ 40.099510][ T816] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 40.107463][ T816] R13: 00007f22ce650038 R14: 00007f22ce64ffa0 R15: 00007ffc2175b648 [ 40.115449][ T816] [ 40.158035][ T826] FAULT_INJECTION: forcing a failure. [ 40.158035][ T826] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 40.171687][ T826] CPU: 1 PID: 826 Comm: syz.4.158 Not tainted 5.15.189-syzkaller-android13-5.15.189_r00 #0 [ 40.181677][ T826] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 40.191846][ T826] Call Trace: [ 40.195126][ T826] [ 40.198051][ T826] __dump_stack+0x21/0x30 [ 40.202391][ T826] dump_stack_lvl+0xee/0x150 [ 40.206982][ T826] ? show_regs_print_info+0x20/0x20 [ 40.212563][ T826] ? migrate_enable+0x192/0x260 [ 40.217435][ T826] ? migrate_disable+0x180/0x180 [ 40.222376][ T826] dump_stack+0x15/0x20 [ 40.226543][ T826] should_fail+0x3c1/0x510 [ 40.230957][ T826] should_fail_usercopy+0x1a/0x20 [ 40.235989][ T826] _copy_from_user+0x20/0xd0 [ 40.240593][ T826] generic_map_update_batch+0x44f/0x740 [ 40.246227][ T826] ? generic_map_delete_batch+0x510/0x510 [ 40.252380][ T826] ? __fdget+0x1a1/0x230 [ 40.256632][ T826] ? generic_map_delete_batch+0x510/0x510 [ 40.262348][ T826] bpf_map_do_batch+0x463/0x5f0 [ 40.267195][ T826] __sys_bpf+0x5e3/0x730 [ 40.271515][ T826] ? bpf_link_show_fdinfo+0x310/0x310 [ 40.276880][ T826] __x64_sys_bpf+0x7c/0x90 [ 40.281290][ T826] x64_sys_call+0x4b9/0x9a0 [ 40.285873][ T826] do_syscall_64+0x4c/0xa0 [ 40.290279][ T826] ? clear_bhb_loop+0x50/0xa0 [ 40.295020][ T826] ? clear_bhb_loop+0x50/0xa0 [ 40.299686][ T826] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 40.305574][ T826] RIP: 0033:0x7fcf153cdbe9 [ 40.309987][ T826] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 40.329581][ T826] RSP: 002b:00007fcf13e36038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 40.338005][ T826] RAX: ffffffffffffffda RBX: 00007fcf155f4fa0 RCX: 00007fcf153cdbe9 [ 40.345987][ T826] RDX: 0000000000000038 RSI: 0000200000000200 RDI: 000000000000001a [ 40.353954][ T826] RBP: 00007fcf13e36090 R08: 0000000000000000 R09: 0000000000000000 [ 40.362005][ T826] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 40.369975][ T826] R13: 00007fcf155f5038 R14: 00007fcf155f4fa0 R15: 00007fffa885fb68 [ 40.377947][ T826] [ 40.460093][ T30] audit: type=1400 audit(1754694347.903:124): avc: denied { associate } for pid=823 comm="syz.0.159" name="cgroup.freeze" scontext=root:object_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 [ 40.579361][ T825] device syzkaller0 entered promiscuous mode [ 40.602644][ T30] audit: type=1400 audit(1754694348.043:125): avc: denied { create } for pid=831 comm="syz.4.161" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=caif_socket permissive=1 [ 40.738008][ T841] ref_ctr_offset mismatch. inode: 0xd8 offset: 0x0 ref_ctr_offset(old): 0x0 ref_ctr_offset(new): 0x1fe [ 41.324779][ T858] FAULT_INJECTION: forcing a failure. [ 41.324779][ T858] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 41.380029][ T858] CPU: 1 PID: 858 Comm: syz.1.171 Not tainted 5.15.189-syzkaller-android13-5.15.189_r00 #0 [ 41.390048][ T858] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 41.400108][ T858] Call Trace: [ 41.403394][ T858] [ 41.406322][ T858] __dump_stack+0x21/0x30 [ 41.410660][ T858] dump_stack_lvl+0xee/0x150 [ 41.415247][ T858] ? show_regs_print_info+0x20/0x20 [ 41.420453][ T858] ? migrate_enable+0x192/0x260 [ 41.425300][ T858] ? migrate_disable+0x180/0x180 [ 41.430233][ T858] dump_stack+0x15/0x20 [ 41.434402][ T858] should_fail+0x3c1/0x510 [ 41.438823][ T858] should_fail_usercopy+0x1a/0x20 [ 41.443842][ T858] _copy_from_user+0x20/0xd0 [ 41.448451][ T858] generic_map_update_batch+0x44f/0x740 [ 41.454084][ T858] ? generic_map_delete_batch+0x510/0x510 [ 41.459801][ T858] ? __fdget+0x1a1/0x230 [ 41.464072][ T858] ? generic_map_delete_batch+0x510/0x510 [ 41.469794][ T858] bpf_map_do_batch+0x463/0x5f0 [ 41.474650][ T858] __sys_bpf+0x5e3/0x730 [ 41.478893][ T858] ? bpf_link_show_fdinfo+0x310/0x310 [ 41.484248][ T858] ? debug_smp_processor_id+0x17/0x20 [ 41.489605][ T858] __x64_sys_bpf+0x7c/0x90 [ 41.494002][ T858] x64_sys_call+0x4b9/0x9a0 [ 41.498583][ T858] do_syscall_64+0x4c/0xa0 [ 41.502981][ T858] ? clear_bhb_loop+0x50/0xa0 [ 41.507645][ T858] ? clear_bhb_loop+0x50/0xa0 [ 41.512306][ T858] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 41.518179][ T858] RIP: 0033:0x7f22ce428be9 [ 41.522587][ T858] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 41.542261][ T858] RSP: 002b:00007f22cce91038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 41.550662][ T858] RAX: ffffffffffffffda RBX: 00007f22ce64ffa0 RCX: 00007f22ce428be9 [ 41.558705][ T858] RDX: 0000000000000038 RSI: 0000200000000200 RDI: 000000000000001a [ 41.566683][ T858] RBP: 00007f22cce91090 R08: 0000000000000000 R09: 0000000000000000 [ 41.574635][ T858] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 41.582605][ T858] R13: 00007f22ce650038 R14: 00007f22ce64ffa0 R15: 00007ffc2175b648 [ 41.590562][ T858] [ 42.258585][ T855] device wg2 left promiscuous mode [ 43.085570][ T855] device wg2 entered promiscuous mode [ 43.712807][ T909] bridge0: port 2(bridge_slave_1) entered disabled state [ 43.720173][ T909] bridge0: port 1(bridge_slave_0) entered disabled state [ 44.940610][ T918] device veth0_vlan left promiscuous mode [ 44.963392][ T918] device veth0_vlan entered promiscuous mode [ 45.352337][ T924] device pim6reg1 entered promiscuous mode [ 48.216256][ T982] Scheduler tracepoints stat_sleep, stat_iowait, stat_blocked and stat_runtime require the kernel parameter schedstats=enable or kernel.sched_schedstats=1 [ 48.869678][ T1002] bridge0: port 1(bridge_slave_0) entered disabled state [ 49.714565][ T30] audit: type=1400 audit(1754694357.153:126): avc: denied { cpu } for pid=1032 comm="syz.4.231" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=1 [ 50.074291][ T1055] FAULT_INJECTION: forcing a failure. [ 50.074291][ T1055] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 50.092372][ T1055] CPU: 1 PID: 1055 Comm: syz.1.237 Not tainted 5.15.189-syzkaller-android13-5.15.189_r00 #0 [ 50.102562][ T1055] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 50.112618][ T1055] Call Trace: [ 50.115954][ T1055] [ 50.118876][ T1055] __dump_stack+0x21/0x30 [ 50.123225][ T1055] dump_stack_lvl+0xee/0x150 [ 50.127947][ T1055] ? show_regs_print_info+0x20/0x20 [ 50.133190][ T1055] ? migrate_enable+0x192/0x260 [ 50.138126][ T1055] ? migrate_disable+0x180/0x180 [ 50.143196][ T1055] dump_stack+0x15/0x20 [ 50.147360][ T1055] should_fail+0x3c1/0x510 [ 50.151787][ T1055] should_fail_usercopy+0x1a/0x20 [ 50.156847][ T1055] _copy_from_user+0x20/0xd0 [ 50.161527][ T1055] generic_map_update_batch+0x4a3/0x740 [ 50.167078][ T1055] ? generic_map_delete_batch+0x510/0x510 [ 50.173147][ T1055] ? __fdget+0x1a1/0x230 [ 50.177391][ T1055] ? generic_map_delete_batch+0x510/0x510 [ 50.183119][ T1055] bpf_map_do_batch+0x463/0x5f0 [ 50.188036][ T1055] __sys_bpf+0x5e3/0x730 [ 50.192276][ T1055] ? bpf_link_show_fdinfo+0x310/0x310 [ 50.197959][ T1055] ? debug_smp_processor_id+0x17/0x20 [ 50.203348][ T1055] __x64_sys_bpf+0x7c/0x90 [ 50.207788][ T1055] x64_sys_call+0x4b9/0x9a0 [ 50.212404][ T1055] do_syscall_64+0x4c/0xa0 [ 50.216820][ T1055] ? clear_bhb_loop+0x50/0xa0 [ 50.221498][ T1055] ? clear_bhb_loop+0x50/0xa0 [ 50.226178][ T1055] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 50.232339][ T1055] RIP: 0033:0x7f22ce428be9 [ 50.236841][ T1055] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 50.256452][ T1055] RSP: 002b:00007f22cce91038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 50.265019][ T1055] RAX: ffffffffffffffda RBX: 00007f22ce64ffa0 RCX: 00007f22ce428be9 [ 50.272997][ T1055] RDX: 0000000000000038 RSI: 0000200000000200 RDI: 000000000000001a [ 50.280968][ T1055] RBP: 00007f22cce91090 R08: 0000000000000000 R09: 0000000000000000 [ 50.288936][ T1055] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 50.297261][ T1055] R13: 00007f22ce650038 R14: 00007f22ce64ffa0 R15: 00007ffc2175b648 [ 50.305242][ T1055] [ 50.706462][ T1078] device veth1_macvtap left promiscuous mode [ 50.799255][ T1080] device veth1_macvtap entered promiscuous mode [ 50.825597][ T1080] device macsec0 entered promiscuous mode [ 51.107854][ T1090] FAULT_INJECTION: forcing a failure. [ 51.107854][ T1090] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 51.237463][ T1090] CPU: 0 PID: 1090 Comm: syz.0.251 Not tainted 5.15.189-syzkaller-android13-5.15.189_r00 #0 [ 51.247566][ T1090] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 51.257710][ T1090] Call Trace: [ 51.261109][ T1090] [ 51.264053][ T1090] __dump_stack+0x21/0x30 [ 51.268467][ T1090] dump_stack_lvl+0xee/0x150 [ 51.273041][ T1090] ? show_regs_print_info+0x20/0x20 [ 51.278222][ T1090] ? migrate_enable+0x192/0x260 [ 51.283061][ T1090] ? migrate_disable+0x180/0x180 [ 51.287999][ T1090] dump_stack+0x15/0x20 [ 51.292143][ T1090] should_fail+0x3c1/0x510 [ 51.296554][ T1090] should_fail_usercopy+0x1a/0x20 [ 51.301561][ T1090] _copy_from_user+0x20/0xd0 [ 51.306135][ T1090] generic_map_update_batch+0x4a3/0x740 [ 51.311692][ T1090] ? generic_map_delete_batch+0x510/0x510 [ 51.317402][ T1090] ? __fdget+0x1a1/0x230 [ 51.321628][ T1090] ? generic_map_delete_batch+0x510/0x510 [ 51.327333][ T1090] bpf_map_do_batch+0x463/0x5f0 [ 51.332167][ T1090] __sys_bpf+0x5e3/0x730 [ 51.336392][ T1090] ? bpf_link_show_fdinfo+0x310/0x310 [ 51.341761][ T1090] ? debug_smp_processor_id+0x17/0x20 [ 51.347124][ T1090] __x64_sys_bpf+0x7c/0x90 [ 51.351527][ T1090] x64_sys_call+0x4b9/0x9a0 [ 51.356013][ T1090] do_syscall_64+0x4c/0xa0 [ 51.360412][ T1090] ? clear_bhb_loop+0x50/0xa0 [ 51.365073][ T1090] ? clear_bhb_loop+0x50/0xa0 [ 51.369861][ T1090] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 51.375738][ T1090] RIP: 0033:0x7f1b1efaebe9 [ 51.380135][ T1090] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 51.399724][ T1090] RSP: 002b:00007f1b1da17038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 51.408122][ T1090] RAX: ffffffffffffffda RBX: 00007f1b1f1d5fa0 RCX: 00007f1b1efaebe9 [ 51.416082][ T1090] RDX: 0000000000000038 RSI: 0000200000000200 RDI: 000000000000001a [ 51.424048][ T1090] RBP: 00007f1b1da17090 R08: 0000000000000000 R09: 0000000000000000 [ 51.432003][ T1090] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 51.439954][ T1090] R13: 00007f1b1f1d6038 R14: 00007f1b1f1d5fa0 R15: 00007ffd87f113b8 [ 51.447911][ T1090] [ 52.162885][ T1112] device veth0_vlan left promiscuous mode [ 52.170150][ T1112] device veth0_vlan entered promiscuous mode [ 52.801597][ T30] audit: type=1400 audit(1754694360.243:127): avc: denied { create } for pid=1117 comm="syz.3.258" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 52.831639][ T1123] device syzkaller0 entered promiscuous mode [ 56.078168][ T30] audit: type=1400 audit(1754694363.523:128): avc: denied { create } for pid=1194 comm="syz.1.286" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 58.483707][ T1279] device wg2 left promiscuous mode [ 58.835679][ T1288] FAULT_INJECTION: forcing a failure. [ 58.835679][ T1288] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 58.928825][ T1288] CPU: 0 PID: 1288 Comm: syz.4.314 Not tainted 5.15.189-syzkaller-android13-5.15.189_r00 #0 [ 58.938926][ T1288] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 58.949004][ T1288] Call Trace: [ 58.952289][ T1288] [ 58.955390][ T1288] __dump_stack+0x21/0x30 [ 58.959721][ T1288] dump_stack_lvl+0xee/0x150 [ 58.964307][ T1288] ? show_regs_print_info+0x20/0x20 [ 58.969506][ T1288] dump_stack+0x15/0x20 [ 58.973674][ T1288] should_fail+0x3c1/0x510 [ 58.978093][ T1288] should_fail_usercopy+0x1a/0x20 [ 58.983110][ T1288] _copy_from_user+0x20/0xd0 [ 58.987695][ T1288] generic_map_update_batch+0x44f/0x740 [ 58.993326][ T1288] ? generic_map_delete_batch+0x510/0x510 [ 58.999049][ T1288] ? __fdget+0x1a1/0x230 [ 59.003298][ T1288] ? generic_map_delete_batch+0x510/0x510 [ 59.009104][ T1288] bpf_map_do_batch+0x463/0x5f0 [ 59.013959][ T1288] __sys_bpf+0x5e3/0x730 [ 59.018206][ T1288] ? bpf_link_show_fdinfo+0x310/0x310 [ 59.023589][ T1288] __x64_sys_bpf+0x7c/0x90 [ 59.028105][ T1288] x64_sys_call+0x4b9/0x9a0 [ 59.032616][ T1288] do_syscall_64+0x4c/0xa0 [ 59.037036][ T1288] ? clear_bhb_loop+0x50/0xa0 [ 59.041722][ T1288] ? clear_bhb_loop+0x50/0xa0 [ 59.046422][ T1288] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 59.052532][ T1288] RIP: 0033:0x7fcf153cdbe9 [ 59.056999][ T1288] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 59.076790][ T1288] RSP: 002b:00007fcf13e36038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 59.085209][ T1288] RAX: ffffffffffffffda RBX: 00007fcf155f4fa0 RCX: 00007fcf153cdbe9 [ 59.093367][ T1288] RDX: 0000000000000038 RSI: 0000200000000200 RDI: 000000000000001a [ 59.101333][ T1288] RBP: 00007fcf13e36090 R08: 0000000000000000 R09: 0000000000000000 [ 59.109393][ T1288] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 59.117350][ T1288] R13: 00007fcf155f5038 R14: 00007fcf155f4fa0 R15: 00007fffa885fb68 [ 59.125399][ T1288] [ 59.907136][ T1336] FAULT_INJECTION: forcing a failure. [ 59.907136][ T1336] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 60.047895][ T1336] CPU: 1 PID: 1336 Comm: syz.4.329 Not tainted 5.15.189-syzkaller-android13-5.15.189_r00 #0 [ 60.058077][ T1336] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 60.068138][ T1336] Call Trace: [ 60.071426][ T1336] [ 60.074356][ T1336] __dump_stack+0x21/0x30 [ 60.078745][ T1336] dump_stack_lvl+0xee/0x150 [ 60.083341][ T1336] ? show_regs_print_info+0x20/0x20 [ 60.088545][ T1336] ? migrate_enable+0x1d1/0x260 [ 60.093398][ T1336] ? migrate_disable+0x180/0x180 [ 60.098338][ T1336] dump_stack+0x15/0x20 [ 60.102499][ T1336] should_fail+0x3c1/0x510 [ 60.107050][ T1336] should_fail_usercopy+0x1a/0x20 [ 60.112080][ T1336] _copy_from_user+0x20/0xd0 [ 60.116675][ T1336] generic_map_update_batch+0x4a3/0x740 [ 60.122228][ T1336] ? generic_map_delete_batch+0x510/0x510 [ 60.128299][ T1336] ? bpf_map_do_batch+0x385/0x5f0 [ 60.133326][ T1336] ? __sanitizer_cov_trace_switch+0x61/0xe0 [ 60.139310][ T1336] ? generic_map_delete_batch+0x510/0x510 [ 60.145282][ T1336] bpf_map_do_batch+0x463/0x5f0 [ 60.150155][ T1336] __sys_bpf+0x5e3/0x730 [ 60.154402][ T1336] ? bpf_link_show_fdinfo+0x310/0x310 [ 60.159902][ T1336] ? __kasan_check_write+0x14/0x20 [ 60.165020][ T1336] __x64_sys_bpf+0x7c/0x90 [ 60.169455][ T1336] x64_sys_call+0x4b9/0x9a0 [ 60.173988][ T1336] do_syscall_64+0x4c/0xa0 [ 60.178416][ T1336] ? clear_bhb_loop+0x50/0xa0 [ 60.183096][ T1336] ? clear_bhb_loop+0x50/0xa0 [ 60.187810][ T1336] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 60.193749][ T1336] RIP: 0033:0x7fcf153cdbe9 [ 60.198177][ T1336] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 60.217881][ T1336] RSP: 002b:00007fcf13e36038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 60.226388][ T1336] RAX: ffffffffffffffda RBX: 00007fcf155f4fa0 RCX: 00007fcf153cdbe9 [ 60.234475][ T1336] RDX: 0000000000000038 RSI: 0000200000000200 RDI: 000000000000001a [ 60.242445][ T1336] RBP: 00007fcf13e36090 R08: 0000000000000000 R09: 0000000000000000 [ 60.250420][ T1336] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 60.258395][ T1336] R13: 00007fcf155f5038 R14: 00007fcf155f4fa0 R15: 00007fffa885fb68 [ 60.266378][ T1336] [ 61.299823][ T1381] FAULT_INJECTION: forcing a failure. [ 61.299823][ T1381] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 61.379422][ T1381] CPU: 0 PID: 1381 Comm: syz.2.345 Not tainted 5.15.189-syzkaller-android13-5.15.189_r00 #0 [ 61.389529][ T1381] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 61.399600][ T1381] Call Trace: [ 61.402877][ T1381] [ 61.405804][ T1381] __dump_stack+0x21/0x30 [ 61.410242][ T1381] dump_stack_lvl+0xee/0x150 [ 61.414831][ T1381] ? show_regs_print_info+0x20/0x20 [ 61.420037][ T1381] ? dump_stack+0x9/0x20 [ 61.424275][ T1381] dump_stack+0x15/0x20 [ 61.428510][ T1381] should_fail+0x3c1/0x510 [ 61.433006][ T1381] should_fail_usercopy+0x1a/0x20 [ 61.438024][ T1381] _copy_from_user+0x20/0xd0 [ 61.442713][ T1381] generic_map_update_batch+0x44f/0x740 [ 61.448261][ T1381] ? generic_map_delete_batch+0x510/0x510 [ 61.453980][ T1381] ? bpf_map_do_batch+0x1e7/0x5f0 [ 61.459002][ T1381] ? generic_map_delete_batch+0x510/0x510 [ 61.464735][ T1381] bpf_map_do_batch+0x463/0x5f0 [ 61.469583][ T1381] __sys_bpf+0x5e3/0x730 [ 61.473910][ T1381] ? bpf_link_show_fdinfo+0x310/0x310 [ 61.479283][ T1381] __x64_sys_bpf+0x7c/0x90 [ 61.483693][ T1381] x64_sys_call+0x4b9/0x9a0 [ 61.488192][ T1381] do_syscall_64+0x4c/0xa0 [ 61.492606][ T1381] ? clear_bhb_loop+0x50/0xa0 [ 61.497282][ T1381] ? clear_bhb_loop+0x50/0xa0 [ 61.501956][ T1381] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 61.507858][ T1381] RIP: 0033:0x7f81b925cbe9 [ 61.512271][ T1381] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 61.531875][ T1381] RSP: 002b:00007f81b7cc5038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 61.540381][ T1381] RAX: ffffffffffffffda RBX: 00007f81b9483fa0 RCX: 00007f81b925cbe9 [ 61.548355][ T1381] RDX: 0000000000000038 RSI: 0000200000000200 RDI: 000000000000001a [ 61.556327][ T1381] RBP: 00007f81b7cc5090 R08: 0000000000000000 R09: 0000000000000000 [ 61.564300][ T1381] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 61.572270][ T1381] R13: 00007f81b9484038 R14: 00007f81b9483fa0 R15: 00007ffdc103c8b8 [ 61.580248][ T1381] [ 63.375350][ T1420] ref_ctr_offset mismatch. inode: 0x190 offset: 0x0 ref_ctr_offset(old): 0x0 ref_ctr_offset(new): 0x1fe [ 63.891027][ T1421] GPL: port 1(erspan0) entered blocking state [ 63.897282][ T1421] GPL: port 1(erspan0) entered disabled state [ 63.904093][ T1421] device erspan0 entered promiscuous mode [ 63.910745][ T1425] GPL: port 1(erspan0) entered blocking state [ 63.916918][ T1425] GPL: port 1(erspan0) entered forwarding state [ 64.048540][ T1431] device syzkaller0 entered promiscuous mode [ 65.683265][ T30] audit: type=1400 audit(1754694373.133:129): avc: denied { create } for pid=1486 comm="syz.0.377" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 65.774982][ T1488] device syzkaller0 entered promiscuous mode [ 66.271476][ T1523] device pim6reg1 entered promiscuous mode [ 66.689602][ T30] audit: type=1400 audit(1754694374.103:130): avc: denied { create } for pid=1536 comm="syz.3.392" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 67.589540][ T30] audit: type=1400 audit(1754694375.033:131): avc: denied { create } for pid=1583 comm="syz.2.406" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 70.625450][ T1672] device wg2 entered promiscuous mode [ 70.789529][ T1682] device veth1_macvtap left promiscuous mode [ 72.159292][ T1724] device pim6reg1 entered promiscuous mode [ 74.900928][ T1783] device syzkaller0 entered promiscuous mode [ 75.404600][ T1809] device syzkaller0 entered promiscuous mode [ 76.965206][ T1836] device wg2 left promiscuous mode [ 77.346653][ T1836] device wg2 entered promiscuous mode [ 81.052772][ T1898] device veth0_vlan left promiscuous mode [ 81.088995][ T1898] device veth0_vlan entered promiscuous mode [ 81.592126][ T1910] FAULT_INJECTION: forcing a failure. [ 81.592126][ T1910] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 81.614414][ T1910] CPU: 0 PID: 1910 Comm: syz.2.514 Not tainted 5.15.189-syzkaller-android13-5.15.189_r00 #0 [ 81.624515][ T1910] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 81.634562][ T1910] Call Trace: [ 81.637823][ T1910] [ 81.640739][ T1910] __dump_stack+0x21/0x30 [ 81.645057][ T1910] dump_stack_lvl+0xee/0x150 [ 81.649632][ T1910] ? show_regs_print_info+0x20/0x20 [ 81.654812][ T1910] ? vfs_write+0xc17/0xf70 [ 81.659210][ T1910] dump_stack+0x15/0x20 [ 81.663486][ T1910] should_fail+0x3c1/0x510 [ 81.667906][ T1910] should_fail_usercopy+0x1a/0x20 [ 81.673018][ T1910] _copy_from_user+0x20/0xd0 [ 81.677627][ T1910] __sys_bpf+0x233/0x730 [ 81.681859][ T1910] ? bpf_link_show_fdinfo+0x310/0x310 [ 81.687247][ T1910] ? debug_smp_processor_id+0x17/0x20 [ 81.692606][ T1910] __x64_sys_bpf+0x7c/0x90 [ 81.697006][ T1910] x64_sys_call+0x4b9/0x9a0 [ 81.701526][ T1910] do_syscall_64+0x4c/0xa0 [ 81.706029][ T1910] ? clear_bhb_loop+0x50/0xa0 [ 81.710689][ T1910] ? clear_bhb_loop+0x50/0xa0 [ 81.715401][ T1910] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 81.721277][ T1910] RIP: 0033:0x7f81b925cbe9 [ 81.725792][ T1910] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 81.745561][ T1910] RSP: 002b:00007f81b7cc5038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 81.753989][ T1910] RAX: ffffffffffffffda RBX: 00007f81b9483fa0 RCX: 00007f81b925cbe9 [ 81.761955][ T1910] RDX: 0000000000000078 RSI: 0000200000000440 RDI: 0000000000000005 [ 81.770004][ T1910] RBP: 00007f81b7cc5090 R08: 0000000000000000 R09: 0000000000000000 [ 81.777964][ T1910] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 81.786002][ T1910] R13: 00007f81b9484038 R14: 00007f81b9483fa0 R15: 00007ffdc103c8b8 [ 81.794045][ T1910] [ 81.982742][ T30] audit: type=1400 audit(1754694389.423:132): avc: denied { create } for pid=1911 comm="syz.0.513" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=isdn_socket permissive=1 [ 82.344656][ T1946] FAULT_INJECTION: forcing a failure. [ 82.344656][ T1946] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 82.357972][ T1946] CPU: 0 PID: 1946 Comm: syz.3.526 Not tainted 5.15.189-syzkaller-android13-5.15.189_r00 #0 [ 82.368300][ T1946] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 82.378389][ T1946] Call Trace: [ 82.381753][ T1946] [ 82.384669][ T1946] __dump_stack+0x21/0x30 [ 82.388998][ T1946] dump_stack_lvl+0xee/0x150 [ 82.393568][ T1946] ? show_regs_print_info+0x20/0x20 [ 82.398749][ T1946] dump_stack+0x15/0x20 [ 82.402884][ T1946] should_fail+0x3c1/0x510 [ 82.407309][ T1946] should_fail_usercopy+0x1a/0x20 [ 82.412405][ T1946] strncpy_from_user+0x24/0x2e0 [ 82.417239][ T1946] bpf_prog_load+0x1b8/0x1550 [ 82.421989][ T1946] ? __kasan_check_write+0x14/0x20 [ 82.427081][ T1946] ? proc_fail_nth_write+0x17a/0x1f0 [ 82.432384][ T1946] ? map_freeze+0x360/0x360 [ 82.436901][ T1946] ? selinux_bpf+0xc7/0xf0 [ 82.441304][ T1946] ? security_bpf+0x82/0xa0 [ 82.445794][ T1946] __sys_bpf+0x4c3/0x730 [ 82.450016][ T1946] ? bpf_link_show_fdinfo+0x310/0x310 [ 82.455373][ T1946] ? debug_smp_processor_id+0x17/0x20 [ 82.460729][ T1946] __x64_sys_bpf+0x7c/0x90 [ 82.465125][ T1946] x64_sys_call+0x4b9/0x9a0 [ 82.469698][ T1946] do_syscall_64+0x4c/0xa0 [ 82.474109][ T1946] ? clear_bhb_loop+0x50/0xa0 [ 82.479036][ T1946] ? clear_bhb_loop+0x50/0xa0 [ 82.483694][ T1946] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 82.489568][ T1946] RIP: 0033:0x7f78abbe0be9 [ 82.493967][ T1946] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 82.513560][ T1946] RSP: 002b:00007f78aa649038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 82.522130][ T1946] RAX: ffffffffffffffda RBX: 00007f78abe07fa0 RCX: 00007f78abbe0be9 [ 82.530084][ T1946] RDX: 0000000000000078 RSI: 0000200000000440 RDI: 0000000000000005 [ 82.538042][ T1946] RBP: 00007f78aa649090 R08: 0000000000000000 R09: 0000000000000000 [ 82.545994][ T1946] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 82.553945][ T1946] R13: 00007f78abe08038 R14: 00007f78abe07fa0 R15: 00007fff38b9ed28 [ 82.561902][ T1946] [ 83.567148][ T1989] FAULT_INJECTION: forcing a failure. [ 83.567148][ T1989] name failslab, interval 1, probability 0, space 0, times 0 [ 83.619193][ T1978] device wg2 left promiscuous mode [ 83.672746][ T1989] CPU: 0 PID: 1989 Comm: syz.0.540 Not tainted 5.15.189-syzkaller-android13-5.15.189_r00 #0 [ 83.683092][ T1989] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 83.693438][ T1989] Call Trace: [ 83.696717][ T1989] [ 83.699634][ T1989] __dump_stack+0x21/0x30 [ 83.703964][ T1989] dump_stack_lvl+0xee/0x150 [ 83.708539][ T1989] ? show_regs_print_info+0x20/0x20 [ 83.713809][ T1989] ? 0xffffffffa0026038 [ 83.718117][ T1989] ? is_bpf_text_address+0x177/0x190 [ 83.723388][ T1989] dump_stack+0x15/0x20 [ 83.727875][ T1989] should_fail+0x3c1/0x510 [ 83.732283][ T1989] __should_failslab+0xa4/0xe0 [ 83.737147][ T1989] should_failslab+0x9/0x20 [ 83.741671][ T1989] slab_pre_alloc_hook+0x3b/0xe0 [ 83.746598][ T1989] kmem_cache_alloc_trace+0x48/0x270 [ 83.751883][ T1989] ? __get_vm_area_node+0x11d/0x350 [ 83.757086][ T1989] __get_vm_area_node+0x11d/0x350 [ 83.762109][ T1989] __vmalloc_node_range+0xdf/0xaf0 [ 83.767232][ T1989] ? bpf_prog_alloc_no_stats+0x3e/0x2d0 [ 83.772896][ T1989] ? selinux_capset+0xf0/0xf0 [ 83.777583][ T1989] ? _kstrtoull+0x3c0/0x4d0 [ 83.782072][ T1989] ? bpf_prog_alloc_no_stats+0x3e/0x2d0 [ 83.787615][ T1989] __vmalloc+0x79/0x90 [ 83.791689][ T1989] ? bpf_prog_alloc_no_stats+0x3e/0x2d0 [ 83.797220][ T1989] bpf_prog_alloc_no_stats+0x3e/0x2d0 [ 83.802576][ T1989] bpf_prog_alloc+0x1f/0x1e0 [ 83.807159][ T1989] bpf_prog_load+0x7c3/0x1550 [ 83.811823][ T1989] ? __kasan_check_write+0x14/0x20 [ 83.816925][ T1989] ? map_freeze+0x360/0x360 [ 83.821415][ T1989] ? selinux_bpf+0xc7/0xf0 [ 83.825827][ T1989] ? security_bpf+0x82/0xa0 [ 83.830321][ T1989] __sys_bpf+0x4c3/0x730 [ 83.834541][ T1989] ? bpf_link_show_fdinfo+0x310/0x310 [ 83.839897][ T1989] ? debug_smp_processor_id+0x17/0x20 [ 83.845298][ T1989] __x64_sys_bpf+0x7c/0x90 [ 83.849704][ T1989] x64_sys_call+0x4b9/0x9a0 [ 83.854191][ T1989] do_syscall_64+0x4c/0xa0 [ 83.858610][ T1989] ? clear_bhb_loop+0x50/0xa0 [ 83.863288][ T1989] ? clear_bhb_loop+0x50/0xa0 [ 83.867956][ T1989] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 83.873834][ T1989] RIP: 0033:0x7f1b1efaebe9 [ 83.878234][ T1989] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 83.898014][ T1989] RSP: 002b:00007f1b1da17038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 83.906604][ T1989] RAX: ffffffffffffffda RBX: 00007f1b1f1d5fa0 RCX: 00007f1b1efaebe9 [ 83.914650][ T1989] RDX: 0000000000000078 RSI: 0000200000000440 RDI: 0000000000000005 [ 83.922610][ T1989] RBP: 00007f1b1da17090 R08: 0000000000000000 R09: 0000000000000000 [ 83.930748][ T1989] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 83.939079][ T1989] R13: 00007f1b1f1d6038 R14: 00007f1b1f1d5fa0 R15: 00007ffd87f113b8 [ 83.947048][ T1989] [ 84.072734][ T1989] syz.0.540: vmalloc error: size 4096, vm_struct allocation failed, mode:0x500dc0(GFP_USER|__GFP_ZERO|__GFP_ACCOUNT), nodemask=(null),cpuset=syz0,mems_allowed=0 [ 84.145649][ T1989] CPU: 0 PID: 1989 Comm: syz.0.540 Not tainted 5.15.189-syzkaller-android13-5.15.189_r00 #0 [ 84.155879][ T1989] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 84.165982][ T1989] Call Trace: [ 84.169270][ T1989] [ 84.172186][ T1989] __dump_stack+0x21/0x30 [ 84.176537][ T1989] dump_stack_lvl+0xee/0x150 [ 84.181163][ T1989] ? show_regs_print_info+0x20/0x20 [ 84.186349][ T1989] ? pr_cont_kernfs_name+0xe3/0xf0 [ 84.191451][ T1989] dump_stack+0x15/0x20 [ 84.195598][ T1989] warn_alloc+0x1b0/0x1d0 [ 84.199911][ T1989] ? __should_failslab+0xa4/0xe0 [ 84.204836][ T1989] ? zone_watermark_ok_safe+0x270/0x270 [ 84.210546][ T1989] ? __get_vm_area_node+0x11d/0x350 [ 84.215831][ T1989] ? __get_vm_area_node+0x33e/0x350 [ 84.221107][ T1989] __vmalloc_node_range+0x152/0xaf0 [ 84.226288][ T1989] ? selinux_capset+0xf0/0xf0 [ 84.230957][ T1989] ? _kstrtoull+0x3c0/0x4d0 [ 84.235467][ T1989] ? bpf_prog_alloc_no_stats+0x3e/0x2d0 [ 84.241103][ T1989] __vmalloc+0x79/0x90 [ 84.245174][ T1989] ? bpf_prog_alloc_no_stats+0x3e/0x2d0 [ 84.250702][ T1989] bpf_prog_alloc_no_stats+0x3e/0x2d0 [ 84.256089][ T1989] bpf_prog_alloc+0x1f/0x1e0 [ 84.260682][ T1989] bpf_prog_load+0x7c3/0x1550 [ 84.265432][ T1989] ? __kasan_check_write+0x14/0x20 [ 84.270539][ T1989] ? map_freeze+0x360/0x360 [ 84.275114][ T1989] ? selinux_bpf+0xc7/0xf0 [ 84.279517][ T1989] ? security_bpf+0x82/0xa0 [ 84.284000][ T1989] __sys_bpf+0x4c3/0x730 [ 84.288234][ T1989] ? bpf_link_show_fdinfo+0x310/0x310 [ 84.293587][ T1989] ? debug_smp_processor_id+0x17/0x20 [ 84.298968][ T1989] __x64_sys_bpf+0x7c/0x90 [ 84.303391][ T1989] x64_sys_call+0x4b9/0x9a0 [ 84.307887][ T1989] do_syscall_64+0x4c/0xa0 [ 84.312288][ T1989] ? clear_bhb_loop+0x50/0xa0 [ 84.316949][ T1989] ? clear_bhb_loop+0x50/0xa0 [ 84.321632][ T1989] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 84.327614][ T1989] RIP: 0033:0x7f1b1efaebe9 [ 84.332024][ T1989] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 84.351798][ T1989] RSP: 002b:00007f1b1da17038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 84.360211][ T1989] RAX: ffffffffffffffda RBX: 00007f1b1f1d5fa0 RCX: 00007f1b1efaebe9 [ 84.368274][ T1989] RDX: 0000000000000078 RSI: 0000200000000440 RDI: 0000000000000005 [ 84.376329][ T1989] RBP: 00007f1b1da17090 R08: 0000000000000000 R09: 0000000000000000 [ 84.384463][ T1989] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 84.392502][ T1989] R13: 00007f1b1f1d6038 R14: 00007f1b1f1d5fa0 R15: 00007ffd87f113b8 [ 84.400736][ T1989] [ 84.410683][ T1989] Mem-Info: [ 84.411721][ T1978] device wg2 entered promiscuous mode [ 84.414446][ T1989] active_anon:37 inactive_anon:16043 isolated_anon:0 [ 84.414446][ T1989] active_file:15027 inactive_file:7913 isolated_file:0 [ 84.414446][ T1989] unevictable:0 dirty:326 writeback:0 [ 84.414446][ T1989] slab_reclaimable:7681 slab_unreclaimable:74177 [ 84.414446][ T1989] mapped:29497 shmem:4242 pagetables:625 bounce:0 [ 84.414446][ T1989] kernel_misc_reclaimable:0 [ 84.414446][ T1989] free:1534170 free_pcp:23323 free_cma:0 [ 84.414500][ T1989] Node 0 active_anon:148kB inactive_anon:64172kB active_file:60108kB inactive_file:31652kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:117988kB dirty:1304kB writeback:0kB shmem:16968kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 0kB writeback_tmp:0kB kernel_stack:5320kB pagetables:2500kB all_unreclaimable? no [ 84.414552][ T1989] DMA32 free:2978772kB min:62612kB low:78264kB high:93916kB reserved_highatomic:0KB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:3145324kB managed:2982964kB mlocked:0kB bounce:0kB free_pcp:4192kB local_pcp:0kB free_cma:0kB [ 84.414599][ T1989] lowmem_reserve[]: 0 3941 3941 [ 84.414621][ T1989] Normal free:3157908kB min:84840kB low:106048kB high:127256kB reserved_highatomic:0KB active_anon:148kB inactive_anon:64172kB active_file:60108kB inactive_file:31652kB unevictable:0kB writepending:1304kB present:5242880kB managed:4036096kB mlocked:0kB bounce:0kB free_pcp:89100kB local_pcp:46648kB free_cma:0kB [ 84.414668][ T1989] lowmem_reserve[]: 0 0 0 [ 84.414686][ T1989] DMA32: 3*4kB (M) 1*8kB (M) 2*16kB (M) 3*32kB (M) 3*64kB (M) 3*128kB (M) 3*256kB (M) 3*512kB (M) 4*1024kB (UM) 3*2048kB (UM) 724*4096kB (M) = 2978772kB [ 84.414810][ T1989] Normal: 63*4kB (UME) 45*8kB (UME) 55*16kB (ME) 22*32kB (UME) 18*64kB (UM) 7*128kB (ME) 5*256kB (UME) 1*512kB (U) 2*1024kB (UE) 2*2048kB (UM) 768*4096kB (M) = 3157908kB [ 84.414935][ T1989] 27182 total pagecache pages [ 84.414945][ T1989] 0 pages in swap cache [ 84.414950][ T1989] Swap cache stats: add 0, delete 0, find 0/0 [ 84.414961][ T1989] Free swap = 124996kB [ 84.414966][ T1989] Total swap = 124996kB [ 84.414971][ T1989] 2097051 pages RAM [ 84.414976][ T1989] 0 pages HighMem/MovableOnly [ 84.414981][ T1989] 342286 pages reserved [ 84.414986][ T1989] 0 pages cma reserved [ 84.754470][ T2011] device syzkaller0 entered promiscuous mode [ 85.768881][ T2047] device syzkaller0 entered promiscuous mode [ 86.542824][ T2053] device syzkaller0 entered promiscuous mode [ 86.793336][ T2058] device syzkaller0 entered promiscuous mode [ 87.836740][ T2084] device syzkaller0 entered promiscuous mode [ 88.406225][ T2102] device sit0 entered promiscuous mode [ 93.165436][ T2240] device syzkaller0 entered promiscuous mode [ 95.207758][ T2307] device wg2 left promiscuous mode [ 95.353869][ T2305] device wg2 entered promiscuous mode [ 98.853783][ T2350] syz.4.664[2350] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 98.853877][ T2350] syz.4.664[2350] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 102.678817][ T2385] device wg2 left promiscuous mode [ 105.970308][ T2431] device wg2 left promiscuous mode [ 106.188982][ T2432] device wg2 entered promiscuous mode [ 108.142577][ T2475] device syzkaller0 entered promiscuous mode [ 109.631670][ T2515] device syzkaller0 entered promiscuous mode [ 110.714481][ T2530] device pim6reg1 entered promiscuous mode [ 110.913562][ T2541] bond_slave_1: mtu greater than device maximum [ 111.744220][ T2552] device syzkaller0 entered promiscuous mode [ 112.466906][ T2563] device veth1_macvtap left promiscuous mode [ 112.496430][ T30] audit: type=1400 audit(1754694419.943:133): avc: denied { create } for pid=2564 comm="syz.2.739" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=atmpvc_socket permissive=1 [ 114.302416][ T2609] device syzkaller0 entered promiscuous mode [ 114.925457][ T2619] device wg2 left promiscuous mode [ 114.985061][ T2621] device wg2 entered promiscuous mode [ 115.243490][ T2636] device wg2 left promiscuous mode [ 115.356001][ T2637] device wg2 entered promiscuous mode [ 116.761860][ T2672] device wg2 entered promiscuous mode [ 118.153717][ T2714] syz.3.792[2714] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 118.214677][ T2714] syz.3.792[2714] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 118.407036][ T2734] device pim6reg1 entered promiscuous mode [ 119.693690][ T2758] device wg2 entered promiscuous mode [ 120.541444][ T2773] device wg2 left promiscuous mode [ 120.796638][ T2777] device wg2 entered promiscuous mode [ 122.870549][ T2860] device wg2 entered promiscuous mode [ 124.188318][ T2904] device wg2 left promiscuous mode [ 127.745379][ T2954] FAULT_INJECTION: forcing a failure. [ 127.745379][ T2954] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 127.892785][ T2954] CPU: 1 PID: 2954 Comm: syz.2.871 Not tainted 5.15.189-syzkaller-android13-5.15.189_r00 #0 [ 127.902893][ T2954] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 127.913086][ T2954] Call Trace: [ 127.916364][ T2954] [ 127.919298][ T2954] __dump_stack+0x21/0x30 [ 127.923649][ T2954] dump_stack_lvl+0xee/0x150 [ 127.928236][ T2954] ? show_regs_print_info+0x20/0x20 [ 127.933434][ T2954] dump_stack+0x15/0x20 [ 127.937587][ T2954] should_fail+0x3c1/0x510 [ 127.941997][ T2954] should_fail_usercopy+0x1a/0x20 [ 127.947032][ T2954] _copy_to_user+0x20/0x90 [ 127.951467][ T2954] simple_read_from_buffer+0xe9/0x160 [ 127.956839][ T2954] proc_fail_nth_read+0x19a/0x210 [ 127.961971][ T2954] ? proc_fault_inject_write+0x2f0/0x2f0 [ 127.968315][ T2954] ? security_file_permission+0x83/0xa0 [ 127.973957][ T2954] ? proc_fault_inject_write+0x2f0/0x2f0 [ 127.979592][ T2954] vfs_read+0x282/0xbe0 [ 127.983752][ T2954] ? kernel_read+0x1f0/0x1f0 [ 127.988347][ T2954] ? fput+0x1a/0x20 [ 127.992306][ T2954] ? __kasan_check_write+0x14/0x20 [ 127.997431][ T2954] ? mutex_lock+0x95/0x1a0 [ 128.001984][ T2954] ? wait_for_completion_killable_timeout+0x10/0x10 [ 128.008759][ T2954] ? __fget_files+0x2c4/0x320 [ 128.013444][ T2954] ? __fdget_pos+0x2d2/0x380 [ 128.018034][ T2954] ? ksys_read+0x71/0x240 [ 128.022366][ T2954] ksys_read+0x140/0x240 [ 128.026605][ T2954] ? vfs_write+0xf70/0xf70 [ 128.031116][ T2954] ? debug_smp_processor_id+0x17/0x20 [ 128.036488][ T2954] __x64_sys_read+0x7b/0x90 [ 128.040991][ T2954] x64_sys_call+0x96d/0x9a0 [ 128.045504][ T2954] do_syscall_64+0x4c/0xa0 [ 128.049921][ T2954] ? clear_bhb_loop+0x50/0xa0 [ 128.054594][ T2954] ? clear_bhb_loop+0x50/0xa0 [ 128.059266][ T2954] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 128.065158][ T2954] RIP: 0033:0x7f81b925b5fc [ 128.069573][ T2954] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 93 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 ef 93 02 00 48 [ 128.089330][ T2954] RSP: 002b:00007f81b7cc5030 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 128.097756][ T2954] RAX: ffffffffffffffda RBX: 00007f81b9483fa0 RCX: 00007f81b925b5fc [ 128.105816][ T2954] RDX: 000000000000000f RSI: 00007f81b7cc50a0 RDI: 0000000000000007 [ 128.113795][ T2954] RBP: 00007f81b7cc5090 R08: 0000000000000000 R09: 0000000000000000 [ 128.121775][ T2954] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 128.129758][ T2954] R13: 00007f81b9484038 R14: 00007f81b9483fa0 R15: 00007ffdc103c8b8 [ 128.137736][ T2954] [ 129.964916][ T2970] device syzkaller0 entered promiscuous mode [ 132.649238][ T3026] device sit0 entered promiscuous mode [ 133.764529][ T3052] device sit0 left promiscuous mode [ 133.876574][ T3052] device sit0 entered promiscuous mode [ 134.593656][ T3061] device wg2 left promiscuous mode [ 134.839740][ T3080] device wg2 entered promiscuous mode [ 135.230497][ T3090] device wg2 left promiscuous mode [ 135.328161][ T3092] device wg2 entered promiscuous mode [ 135.678986][ T30] audit: type=1400 audit(1754694443.123:134): avc: denied { ioctl } for pid=3126 comm="syz.0.934" path="net:[4026532552]" dev="nsfs" ino=4026532552 ioctlcmd=0x9409 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 135.848237][ T3127] device pim6reg1 entered promiscuous mode [ 137.259006][ T3175] syz.0.949[3175] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 137.259113][ T3175] syz.0.949[3175] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 139.252389][ T3223] device wg2 left promiscuous mode [ 139.466948][ T3222] device wg2 entered promiscuous mode [ 139.673024][ T3235] device wg2 left promiscuous mode [ 139.736669][ T3235] device wg2 entered promiscuous mode [ 140.191410][ T3245] device wg2 left promiscuous mode [ 140.277697][ T3246] device wg2 entered promiscuous mode [ 143.485868][ T3322] device wg2 left promiscuous mode [ 143.754769][ T3322] device wg2 entered promiscuous mode [ 146.341907][ T3359] device wg2 entered promiscuous mode [ 147.416100][ T3379] device syzkaller0 entered promiscuous mode [ 147.979157][ T3394] device wg2 left promiscuous mode [ 148.120034][ T3396] device wg2 entered promiscuous mode [ 148.578451][ T3391] device syzkaller0 entered promiscuous mode [ 149.965813][ T3439] device wg2 left promiscuous mode [ 150.320195][ T3434] device syzkaller0 entered promiscuous mode [ 150.385419][ T3439] device wg2 entered promiscuous mode [ 151.408900][ T3467] device sit0 entered promiscuous mode [ 152.443055][ T3490] device sit0 entered promiscuous mode [ 157.152706][ C1] sched: RT throttling activated [ 161.453928][ T3615] device wg2 left promiscuous mode [ 161.732998][ T3614] device wg2 entered promiscuous mode [ 162.727810][ T3642] device pim6reg1 entered promiscuous mode [ 162.756404][ T3652] device wg2 left promiscuous mode [ 162.809931][ T3658] device wg2 entered promiscuous mode [ 162.831635][ T3653] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 163.235537][ T3679] device wg2 left promiscuous mode [ 164.130992][ T3687] device syzkaller0 entered promiscuous mode [ 164.344141][ T3702] device syzkaller0 entered promiscuous mode [ 164.843179][ T3731] device wg2 left promiscuous mode [ 164.955404][ T3731] device wg2 entered promiscuous mode [ 166.470046][ T3766] device syzkaller0 entered promiscuous mode [ 167.742376][ T3775] device wg2 entered promiscuous mode [ 168.637329][ T3783] device wg2 left promiscuous mode [ 168.807784][ T3784] device wg2 entered promiscuous mode [ 169.952059][ T30] audit: type=1400 audit(1754694477.393:135): avc: denied { create } for pid=3797 comm="syz.2.1159" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1 [ 172.929850][ T3844] device syzkaller0 entered promiscuous mode [ 173.182541][ T3871] device syzkaller0 entered promiscuous mode [ 173.264681][ T3869] device wg2 left promiscuous mode [ 173.405970][ T3874] device wg2 entered promiscuous mode [ 173.442609][ T3876] device wg2 left promiscuous mode [ 173.515927][ T3877] device wg2 entered promiscuous mode [ 174.278822][ T3898] device syzkaller0 entered promiscuous mode [ 174.687755][ T3908] ref_ctr_offset mismatch. inode: 0x4ce offset: 0x0 ref_ctr_offset(old): 0x0 ref_ctr_offset(new): 0x1fe [ 174.911126][ T3917] FAULT_INJECTION: forcing a failure. [ 174.911126][ T3917] name fail_page_alloc, interval 1, probability 0, space 0, times 1 [ 175.094635][ T3917] CPU: 1 PID: 3917 Comm: syz.1.1199 Not tainted 5.15.189-syzkaller-android13-5.15.189_r00 #0 [ 175.105533][ T3917] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 175.115596][ T3917] Call Trace: [ 175.118870][ T3917] [ 175.121794][ T3917] __dump_stack+0x21/0x30 [ 175.126124][ T3917] dump_stack_lvl+0xee/0x150 [ 175.130710][ T3917] ? show_regs_print_info+0x20/0x20 [ 175.135940][ T3917] ? fixup_exception+0xd34/0x1360 [ 175.141068][ T3917] dump_stack+0x15/0x20 [ 175.145233][ T3917] should_fail+0x3c1/0x510 [ 175.149650][ T3917] should_fail_alloc_page+0x55/0x80 [ 175.154841][ T3917] prepare_alloc_pages+0x156/0x600 [ 175.159951][ T3917] ? __alloc_pages_bulk+0xab0/0xab0 [ 175.165195][ T3917] ? do_user_addr_fault+0xce0/0x1180 [ 175.170485][ T3917] ? do_kern_addr_fault+0x80/0x80 [ 175.175517][ T3917] __alloc_pages+0x10a/0x440 [ 175.180108][ T3917] ? prep_new_page+0x110/0x110 [ 175.184865][ T3917] skb_page_frag_refill+0x202/0x3a0 [ 175.190059][ T3917] tun_get_user+0x785/0x33c0 [ 175.194662][ T3917] ? exc_page_fault+0x5e/0xb0 [ 175.199344][ T3917] ? tun_do_read+0x1c40/0x1c40 [ 175.204107][ T3917] ? kstrtouint_from_user+0x1a0/0x200 [ 175.209485][ T3917] ? kstrtol_from_user+0x260/0x260 [ 175.214615][ T3917] ? bpf_probe_read_user+0x68/0x70 [ 175.219727][ T3917] ? avc_policy_seqno+0x1b/0x70 [ 175.224580][ T3917] ? selinux_file_permission+0x2aa/0x510 [ 175.230217][ T3917] tun_chr_write_iter+0x1eb/0x2e0 [ 175.235250][ T3917] vfs_write+0x802/0xf70 [ 175.239538][ T3917] ? file_end_write+0x1b0/0x1b0 [ 175.244405][ T3917] ? __fget_files+0x2c4/0x320 [ 175.249092][ T3917] ? __fdget_pos+0x1f7/0x380 [ 175.253685][ T3917] ? ksys_write+0x71/0x240 [ 175.258132][ T3917] ksys_write+0x140/0x240 [ 175.262459][ T3917] ? __ia32_sys_read+0x90/0x90 [ 175.267223][ T3917] ? debug_smp_processor_id+0x17/0x20 [ 175.272696][ T3917] __x64_sys_write+0x7b/0x90 [ 175.277288][ T3917] x64_sys_call+0x8ef/0x9a0 [ 175.281786][ T3917] do_syscall_64+0x4c/0xa0 [ 175.286297][ T3917] ? clear_bhb_loop+0x50/0xa0 [ 175.290973][ T3917] ? clear_bhb_loop+0x50/0xa0 [ 175.295654][ T3917] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 175.301590][ T3917] RIP: 0033:0x7f22ce428be9 [ 175.306003][ T3917] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 175.325836][ T3917] RSP: 002b:00007f22cce91038 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 175.334255][ T3917] RAX: ffffffffffffffda RBX: 00007f22ce64ffa0 RCX: 00007f22ce428be9 [ 175.342232][ T3917] RDX: 000000000000000e RSI: 0000200000000000 RDI: 00000000000000c8 [ 175.350208][ T3917] RBP: 00007f22cce91090 R08: 0000000000000000 R09: 0000000000000000 [ 175.358200][ T3917] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 175.366170][ T3917] R13: 00007f22ce650038 R14: 00007f22ce64ffa0 R15: 00007ffc2175b648 [ 175.374186][ T3917] [ 177.416043][ T3981] device wg2 left promiscuous mode [ 177.482253][ T3981] device wg2 entered promiscuous mode [ 177.796367][ T3999] device wg2 left promiscuous mode [ 177.913234][ T3999] device wg2 entered promiscuous mode [ 178.059600][ T4002] device syzkaller0 entered promiscuous mode [ 178.514904][ T4028] tap0: tun_chr_ioctl cmd 2148553947 [ 179.187782][ T4037] device wg2 left promiscuous mode [ 179.446855][ T4037] device wg2 entered promiscuous mode [ 182.802511][ T4086] device syzkaller0 entered promiscuous mode [ 184.305381][ T4104] device veth1_macvtap entered promiscuous mode [ 184.434746][ T4104] device macsec0 entered promiscuous mode [ 184.482997][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 186.069977][ T4131] bridge0: port 2(bridge_slave_1) entered disabled state [ 186.217090][ T4131] device bridge_slave_1 left promiscuous mode [ 186.331442][ T4131] bridge0: port 2(bridge_slave_1) entered disabled state [ 186.339508][ T4131] device bridge_slave_0 left promiscuous mode [ 186.346033][ T4131] bridge0: port 1(bridge_slave_0) entered disabled state [ 186.674624][ T4143] device wg2 left promiscuous mode [ 187.625044][ T4154] device wg2 left promiscuous mode [ 187.850380][ T4152] device wg2 entered promiscuous mode [ 188.676477][ T4172] device wg2 left promiscuous mode [ 188.764086][ T4172] device wg2 entered promiscuous mode [ 189.031617][ T4188] device wg2 left promiscuous mode [ 189.056770][ T4194] skbuff: bad partial csum: csum=65489/0 headroom=64 headlen=65491 [ 189.134577][ T4188] device wg2 entered promiscuous mode [ 190.045678][ T4206] device syzkaller0 entered promiscuous mode [ 190.468408][ T4217] device syzkaller0 entered promiscuous mode [ 190.747056][ T4236] device wg2 left promiscuous mode [ 190.895689][ T4232] device wg2 entered promiscuous mode [ 191.224558][ T4262] device sit0 left promiscuous mode [ 191.434170][ T4262] device sit0 entered promiscuous mode [ 193.728899][ T4291] device syzkaller0 entered promiscuous mode [ 194.464595][ T30] audit: type=1400 audit(1754694501.913:136): avc: denied { create } for pid=4302 comm="syz.3.1322" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 195.363129][ T4323] device wg2 left promiscuous mode [ 195.483388][ T4323] device wg2 entered promiscuous mode [ 197.014309][ T4374] device wg2 left promiscuous mode [ 197.211593][ T4383] device wg2 entered promiscuous mode [ 198.238384][ T4401] device syzkaller0 entered promiscuous mode [ 199.902636][ T4444] device pim6reg1 entered promiscuous mode [ 199.955705][ T4440] device syzkaller0 entered promiscuous mode [ 202.367065][ T4526] device wg2 left promiscuous mode [ 202.485782][ T4526] device wg2 entered promiscuous mode [ 203.422193][ T4556] device wg2 entered promiscuous mode [ 203.525513][ T4559] device wg2 left promiscuous mode [ 203.678989][ T4559] device wg2 entered promiscuous mode [ 204.375042][ T30] audit: type=1400 audit(1754694511.823:137): avc: denied { create } for pid=4585 comm="syz.4.1419" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 204.544933][ T30] audit: type=1400 audit(1754694511.853:138): avc: denied { create } for pid=4585 comm="syz.4.1419" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 206.033510][ T4613] device syzkaller0 entered promiscuous mode [ 207.374876][ T30] audit: type=1400 audit(1754694514.823:139): avc: denied { append } for pid=4678 comm="syz.3.1447" name="ppp" dev="devtmpfs" ino=154 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ppp_device_t tclass=chr_file permissive=1 [ 207.643739][ T4673] device syzkaller0 entered promiscuous mode [ 207.934140][ T4699] device wg2 left promiscuous mode [ 207.946171][ T4702] device wg2 entered promiscuous mode [ 208.254629][ T4714] device wg2 left promiscuous mode [ 208.407924][ T4714] device wg2 entered promiscuous mode [ 209.104704][ T4722] device syzkaller0 entered promiscuous mode [ 210.303939][ T4770] device sit0 left promiscuous mode [ 210.501962][ T4773] device sit0 entered promiscuous mode [ 211.288337][ T4786] device sit0 left promiscuous mode [ 211.357818][ T4787] device sit0 entered promiscuous mode [ 212.718621][ T4812] FAULT_INJECTION: forcing a failure. [ 212.718621][ T4812] name failslab, interval 1, probability 0, space 0, times 0 [ 212.968353][ T4812] CPU: 1 PID: 4812 Comm: syz.3.1494 Not tainted 5.15.189-syzkaller-android13-5.15.189_r00 #0 [ 212.978549][ T4812] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 212.988619][ T4812] Call Trace: [ 212.991980][ T4812] [ 212.994904][ T4812] __dump_stack+0x21/0x30 [ 212.999271][ T4812] dump_stack_lvl+0xee/0x150 [ 213.003862][ T4812] ? show_regs_print_info+0x20/0x20 [ 213.009055][ T4812] ? stack_trace_save+0x98/0xe0 [ 213.013900][ T4812] dump_stack+0x15/0x20 [ 213.018059][ T4812] should_fail+0x3c1/0x510 [ 213.022598][ T4812] __should_failslab+0xa4/0xe0 [ 213.027466][ T4812] should_failslab+0x9/0x20 [ 213.031973][ T4812] slab_pre_alloc_hook+0x3b/0xe0 [ 213.036914][ T4812] ? __d_alloc+0x2d/0x6a0 [ 213.041244][ T4812] kmem_cache_alloc+0x44/0x260 [ 213.046092][ T4812] __d_alloc+0x2d/0x6a0 [ 213.050285][ T4812] d_alloc_pseudo+0x1d/0x70 [ 213.054884][ T4812] alloc_file_pseudo+0xc8/0x1f0 [ 213.059847][ T4812] ? alloc_empty_file_noaccount+0x80/0x80 [ 213.065783][ T4812] ? __kasan_check_write+0x14/0x20 [ 213.070899][ T4812] ? _raw_spin_lock_bh+0x8e/0xe0 [ 213.075837][ T4812] anon_inode_getfile+0xa6/0x180 [ 213.080779][ T4812] bpf_link_prime+0xf0/0x250 [ 213.085376][ T4812] bpf_raw_tracepoint_open+0x4d4/0x960 [ 213.090848][ T4812] ? bpf_obj_get_info_by_fd+0x2990/0x2990 [ 213.096564][ T4812] ? vfs_write+0xc17/0xf70 [ 213.100983][ T4812] ? selinux_bpf+0xce/0xf0 [ 213.105408][ T4812] ? security_bpf+0x82/0xa0 [ 213.109911][ T4812] __sys_bpf+0x490/0x730 [ 213.114148][ T4812] ? bpf_link_show_fdinfo+0x310/0x310 [ 213.119692][ T4812] ? debug_smp_processor_id+0x17/0x20 [ 213.125067][ T4812] __x64_sys_bpf+0x7c/0x90 [ 213.129485][ T4812] x64_sys_call+0x4b9/0x9a0 [ 213.133987][ T4812] do_syscall_64+0x4c/0xa0 [ 213.138402][ T4812] ? clear_bhb_loop+0x50/0xa0 [ 213.143083][ T4812] ? clear_bhb_loop+0x50/0xa0 [ 213.147759][ T4812] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 213.153746][ T4812] RIP: 0033:0x7f78abbe0be9 [ 213.158158][ T4812] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 213.177764][ T4812] RSP: 002b:00007f78aa649038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 213.186179][ T4812] RAX: ffffffffffffffda RBX: 00007f78abe07fa0 RCX: 00007f78abbe0be9 [ 213.194150][ T4812] RDX: 0000000000000010 RSI: 00002000000001c0 RDI: 0000000000000011 [ 213.202121][ T4812] RBP: 00007f78aa649090 R08: 0000000000000000 R09: 0000000000000000 [ 213.210091][ T4812] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 213.218153][ T4812] R13: 00007f78abe08038 R14: 00007f78abe07fa0 R15: 00007fff38b9ed28 [ 213.226125][ T4812] [ 214.397650][ T4830] device wg2 left promiscuous mode [ 214.419501][ T4835] device wg2 entered promiscuous mode [ 217.027202][ T4890] device syzkaller0 entered promiscuous mode [ 217.990617][ T4906] device wg2 left promiscuous mode [ 218.151930][ T4906] device wg2 entered promiscuous mode [ 218.485349][ T4918] device sit0 left promiscuous mode [ 219.534897][ T4916] device syzkaller0 entered promiscuous mode [ 219.615388][ T4918] device sit0 entered promiscuous mode [ 220.008938][ T4939] device syzkaller0 entered promiscuous mode [ 220.530766][ T4962] device wg2 left promiscuous mode [ 220.634354][ T4962] device wg2 entered promiscuous mode [ 221.517242][ T4994] device syzkaller0 entered promiscuous mode [ 221.808793][ T30] audit: type=1400 audit(1754694529.253:140): avc: denied { ioctl } for pid=5003 comm="syz.2.1554" path="socket:[33272]" dev="sockfs" ino=33272 ioctlcmd=0x8914 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 221.848854][ T5012] FAULT_INJECTION: forcing a failure. [ 221.848854][ T5012] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 221.883891][ T5012] CPU: 1 PID: 5012 Comm: syz.3.1556 Not tainted 5.15.189-syzkaller-android13-5.15.189_r00 #0 [ 221.894069][ T5012] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 221.904117][ T5012] Call Trace: [ 221.907380][ T5012] [ 221.910309][ T5012] __dump_stack+0x21/0x30 [ 221.914627][ T5012] dump_stack_lvl+0xee/0x150 [ 221.919199][ T5012] ? show_regs_print_info+0x20/0x20 [ 221.924464][ T5012] ? vfs_write+0xc17/0xf70 [ 221.928960][ T5012] dump_stack+0x15/0x20 [ 221.933115][ T5012] should_fail+0x3c1/0x510 [ 221.937513][ T5012] should_fail_usercopy+0x1a/0x20 [ 221.942536][ T5012] _copy_from_user+0x20/0xd0 [ 221.947111][ T5012] __sys_bpf+0x233/0x730 [ 221.951334][ T5012] ? bpf_link_show_fdinfo+0x310/0x310 [ 221.956797][ T5012] ? debug_smp_processor_id+0x17/0x20 [ 221.962155][ T5012] __x64_sys_bpf+0x7c/0x90 [ 221.966551][ T5012] x64_sys_call+0x4b9/0x9a0 [ 221.971059][ T5012] do_syscall_64+0x4c/0xa0 [ 221.975456][ T5012] ? clear_bhb_loop+0x50/0xa0 [ 221.980137][ T5012] ? clear_bhb_loop+0x50/0xa0 [ 221.984795][ T5012] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 221.990671][ T5012] RIP: 0033:0x7f78abbe0be9 [ 221.995431][ T5012] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 222.015031][ T5012] RSP: 002b:00007f78aa649038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 222.023428][ T5012] RAX: ffffffffffffffda RBX: 00007f78abe07fa0 RCX: 00007f78abbe0be9 [ 222.031384][ T5012] RDX: 0000000000000010 RSI: 00002000000001c0 RDI: 0000000000000011 [ 222.039337][ T5012] RBP: 00007f78aa649090 R08: 0000000000000000 R09: 0000000000000000 [ 222.047291][ T5012] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 222.055271][ T5012] R13: 00007f78abe08038 R14: 00007f78abe07fa0 R15: 00007fff38b9ed28 [ 222.063232][ T5012] [ 222.095881][ T30] audit: type=1400 audit(1754694529.543:141): avc: denied { create } for pid=5019 comm="syz.2.1560" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=qipcrtr_socket permissive=1 [ 222.134178][ T5020] ref_ctr_offset mismatch. inode: 0x6c2 offset: 0x0 ref_ctr_offset(old): 0x7602 ref_ctr_offset(new): 0x0 [ 222.341736][ T5033] device sit0 left promiscuous mode [ 222.476617][ T5033] device sit0 entered promiscuous mode [ 223.350275][ T5052] FAULT_INJECTION: forcing a failure. [ 223.350275][ T5052] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 223.465274][ T5052] CPU: 1 PID: 5052 Comm: syz.1.1571 Not tainted 5.15.189-syzkaller-android13-5.15.189_r00 #0 [ 223.475457][ T5052] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 223.485597][ T5052] Call Trace: [ 223.488877][ T5052] [ 223.491802][ T5052] __dump_stack+0x21/0x30 [ 223.496130][ T5052] dump_stack_lvl+0xee/0x150 [ 223.500722][ T5052] ? show_regs_print_info+0x20/0x20 [ 223.505919][ T5052] ? kstrtouint_from_user+0x1a0/0x200 [ 223.511283][ T5052] dump_stack+0x15/0x20 [ 223.515437][ T5052] should_fail+0x3c1/0x510 [ 223.519845][ T5052] should_fail_usercopy+0x1a/0x20 [ 223.524957][ T5052] strncpy_from_user+0x24/0x2e0 [ 223.529803][ T5052] ? __kasan_check_write+0x14/0x20 [ 223.534907][ T5052] bpf_raw_tracepoint_open+0x352/0x960 [ 223.540363][ T5052] ? bpf_obj_get_info_by_fd+0x2990/0x2990 [ 223.546072][ T5052] ? vfs_write+0xc17/0xf70 [ 223.550484][ T5052] ? selinux_bpf+0xce/0xf0 [ 223.555067][ T5052] ? security_bpf+0x82/0xa0 [ 223.559585][ T5052] __sys_bpf+0x490/0x730 [ 223.563909][ T5052] ? bpf_link_show_fdinfo+0x310/0x310 [ 223.569367][ T5052] ? debug_smp_processor_id+0x17/0x20 [ 223.574758][ T5052] __x64_sys_bpf+0x7c/0x90 [ 223.579164][ T5052] x64_sys_call+0x4b9/0x9a0 [ 223.583659][ T5052] do_syscall_64+0x4c/0xa0 [ 223.588068][ T5052] ? clear_bhb_loop+0x50/0xa0 [ 223.592738][ T5052] ? clear_bhb_loop+0x50/0xa0 [ 223.597404][ T5052] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 223.603463][ T5052] RIP: 0033:0x7f22ce428be9 [ 223.607870][ T5052] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 223.627470][ T5052] RSP: 002b:00007f22cce91038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 223.635880][ T5052] RAX: ffffffffffffffda RBX: 00007f22ce64ffa0 RCX: 00007f22ce428be9 [ 223.643846][ T5052] RDX: 0000000000000010 RSI: 00002000000001c0 RDI: 0000000000000011 [ 223.651811][ T5052] RBP: 00007f22cce91090 R08: 0000000000000000 R09: 0000000000000000 [ 223.659789][ T5052] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 223.667747][ T5052] R13: 00007f22ce650038 R14: 00007f22ce64ffa0 R15: 00007ffc2175b648 [ 223.675804][ T5052] [ 224.099511][ T5066] device wg2 left promiscuous mode [ 224.163451][ T5067] device wg2 entered promiscuous mode [ 224.772357][ T5081] device wg2 left promiscuous mode [ 225.105982][ T5081] device wg2 entered promiscuous mode [ 228.543244][ T5184] device wg2 left promiscuous mode [ 228.559648][ T5184] device wg2 entered promiscuous mode [ 228.595268][ T5183] device wg2 left promiscuous mode [ 228.665683][ T5186] device wg2 entered promiscuous mode [ 232.463791][ T5264] device wg2 left promiscuous mode [ 232.576920][ T5264] device wg2 entered promiscuous mode [ 234.733020][ T5300] device sit0 left promiscuous mode [ 235.407254][ T5308] device syzkaller0 entered promiscuous mode [ 235.545179][ T5313] device veth0_vlan left promiscuous mode [ 235.553865][ T5313] device veth0_vlan entered promiscuous mode [ 235.597823][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 235.606245][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 235.614313][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 235.731882][ T5311] device syzkaller0 entered promiscuous mode [ 235.926817][ T5323] device syzkaller0 entered promiscuous mode [ 236.972935][ T5341] device syzkaller0 entered promiscuous mode [ 237.408280][ T5349] device syzkaller0 entered promiscuous mode [ 237.913570][ T5355] device wg2 left promiscuous mode [ 239.357212][ T5391] device wg2 left promiscuous mode [ 239.393774][ T5395] device wg2 entered promiscuous mode [ 239.640999][ T5403] device syzkaller0 entered promiscuous mode [ 239.915381][ T5415] device wg2 left promiscuous mode [ 240.043471][ T5415] device wg2 entered promiscuous mode [ 240.939758][ T5456] device syzkaller0 entered promiscuous mode [ 242.334622][ T5510] device wg2 left promiscuous mode [ 242.354137][ T5510] syz.2.1718[5510] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 243.015988][ T5522] device syzkaller0 entered promiscuous mode [ 243.547686][ T5542] device wg2 entered promiscuous mode [ 244.745336][ T5595] device wg2 entered promiscuous mode [ 246.432112][ T5642] device wg2 left promiscuous mode [ 246.477651][ T5643] device wg2 entered promiscuous mode [ 246.799730][ T5659] device syzkaller0 entered promiscuous mode [ 248.160411][ T5713] device syzkaller0 entered promiscuous mode [ 248.758189][ T5747] device wg2 left promiscuous mode [ 248.829995][ T5745] device wg2 entered promiscuous mode [ 249.238757][ T5759] syz.4.1796[5759] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 249.238868][ T5759] syz.4.1796[5759] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 251.350525][ T5818] device wg2 left promiscuous mode [ 251.501090][ T5823] device wg2 entered promiscuous mode [ 252.866587][ T5872] device wg2 left promiscuous mode [ 253.024508][ T5865] device wg2 entered promiscuous mode [ 253.162183][ T5873] ref_ctr_offset mismatch. inode: 0x764 offset: 0x0 ref_ctr_offset(old): 0x0 ref_ctr_offset(new): 0x1fe [ 255.001822][ T5916] device wg2 left promiscuous mode [ 255.026182][ T5915] device wg2 entered promiscuous mode [ 262.808226][ T6085] device wg2 left promiscuous mode [ 262.883068][ T6087] device wg2 entered promiscuous mode [ 265.323687][ T6126] device sit0 left promiscuous mode [ 265.518146][ T6127] device sit0 entered promiscuous mode [ 266.677978][ T6138] device wg2 left promiscuous mode [ 266.764052][ T6142] device wg2 entered promiscuous mode [ 268.095519][ T6168] device syzkaller0 entered promiscuous mode [ 268.549735][ T6186] device syzkaller0 entered promiscuous mode [ 268.658518][ T6192] device syzkaller0 entered promiscuous mode [ 270.142547][ T30] audit: type=1400 audit(1754694577.583:142): avc: denied { create } for pid=6231 comm="syz.3.1950" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_nflog_socket permissive=1 [ 271.525643][ T6283] device syzkaller0 entered promiscuous mode [ 272.373735][ T6311] device wg2 left promiscuous mode [ 272.494130][ T6311] device wg2 entered promiscuous mode [ 272.546329][ T6321] device wg2 left promiscuous mode [ 273.253008][ T6318] device syzkaller0 entered promiscuous mode [ 273.259714][ T6324] device wg2 entered promiscuous mode [ 273.294730][ T6332] device syzkaller0 entered promiscuous mode [ 273.414432][ T6338] device syzkaller0 entered promiscuous mode [ 273.609543][ T6352] ±ÿ: renamed from team_slave_1 [ 273.736868][ T6357] device pim6reg1 entered promiscuous mode [ 274.416454][ T6388] syz.4.2001[6388] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 274.416529][ T6388] syz.4.2001[6388] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 274.554127][ T6391] bridge0: port 2(bridge_slave_1) entered disabled state [ 274.572655][ T6391] bridge0: port 1(bridge_slave_0) entered disabled state [ 274.987328][ T6404] syz.4.2001[6404] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 274.987403][ T6404] syz.4.2001[6404] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 275.228552][ T6416] device wg2 left promiscuous mode [ 275.407131][ T6416] device wg2 entered promiscuous mode [ 275.996616][ T6456] device wg2 left promiscuous mode [ 276.068215][ T6446] device wg2 entered promiscuous mode [ 278.923209][ T6521] device wg2 left promiscuous mode [ 279.022285][ T6518] device wg2 entered promiscuous mode [ 280.148574][ T6568] device wg2 left promiscuous mode [ 280.305778][ T6566] device wg2 entered promiscuous mode [ 281.054696][ T6594] device syzkaller0 entered promiscuous mode [ 281.616396][ T6611] device veth0_vlan left promiscuous mode [ 281.623687][ T6611] device veth0_vlan entered promiscuous mode [ 281.649803][ T1158] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 281.668217][ T1158] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 281.672809][ T6625] syz.0.2074[6625] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 281.685352][ T1158] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 281.708509][ T6625] syz.0.2074[6625] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 282.387859][ T6622] device syzkaller0 entered promiscuous mode [ 283.056188][ T6655] device syzkaller0 entered promiscuous mode [ 283.832224][ T6688] device wg2 left promiscuous mode [ 284.033308][ T6689] device wg2 entered promiscuous mode [ 284.604128][ T6707] device veth0_vlan left promiscuous mode [ 284.613210][ T6707] device veth0_vlan entered promiscuous mode [ 284.633296][ T6708] device syzkaller0 entered promiscuous mode [ 284.642595][ T340] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 284.669958][ T340] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 284.696490][ T340] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 286.689984][ T6791] FAULT_INJECTION: forcing a failure. [ 286.689984][ T6791] name failslab, interval 1, probability 0, space 0, times 0 [ 286.742976][ T6791] CPU: 1 PID: 6791 Comm: syz.1.2131 Not tainted 5.15.189-syzkaller-android13-5.15.189_r00 #0 [ 286.753250][ T6791] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 286.763393][ T6791] Call Trace: [ 286.766671][ T6791] [ 286.769720][ T6791] __dump_stack+0x21/0x30 [ 286.774061][ T6791] dump_stack_lvl+0xee/0x150 [ 286.778674][ T6791] ? show_regs_print_info+0x20/0x20 [ 286.783868][ T6791] ? avc_has_perm+0x158/0x240 [ 286.788542][ T6791] ? security_file_permission+0x79/0xa0 [ 286.794089][ T6791] dump_stack+0x15/0x20 [ 286.798254][ T6791] should_fail+0x3c1/0x510 [ 286.802701][ T6791] __should_failslab+0xa4/0xe0 [ 286.807473][ T6791] should_failslab+0x9/0x20 [ 286.811979][ T6791] slab_pre_alloc_hook+0x3b/0xe0 [ 286.816921][ T6791] ? sock_alloc_inode+0x1b/0xb0 [ 286.821768][ T6791] kmem_cache_alloc+0x44/0x260 [ 286.826533][ T6791] ? sockfs_init_fs_context+0xb0/0xb0 [ 286.831906][ T6791] sock_alloc_inode+0x1b/0xb0 [ 286.836591][ T6791] ? sockfs_init_fs_context+0xb0/0xb0 [ 286.841963][ T6791] new_inode_pseudo+0x62/0x210 [ 286.846728][ T6791] __sock_create+0x12c/0x7a0 [ 286.851330][ T6791] __sys_socketpair+0x1a1/0x590 [ 286.856200][ T6791] __x64_sys_socketpair+0x9b/0xb0 [ 286.861233][ T6791] x64_sys_call+0x36/0x9a0 [ 286.865658][ T6791] do_syscall_64+0x4c/0xa0 [ 286.870078][ T6791] ? clear_bhb_loop+0x50/0xa0 [ 286.874764][ T6791] ? clear_bhb_loop+0x50/0xa0 [ 286.879453][ T6791] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 286.885360][ T6791] RIP: 0033:0x7f22ce428be9 [ 286.889791][ T6791] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 286.909490][ T6791] RSP: 002b:00007f22cce91038 EFLAGS: 00000246 ORIG_RAX: 0000000000000035 [ 286.917918][ T6791] RAX: ffffffffffffffda RBX: 00007f22ce64ffa0 RCX: 00007f22ce428be9 [ 286.925893][ T6791] RDX: 0000000000000000 RSI: 0000000000000001 RDI: 000000000000000a [ 286.934069][ T6791] RBP: 00007f22cce91090 R08: 0000000000000000 R09: 0000000000000000 [ 286.942032][ T6791] R10: 0000200000000000 R11: 0000000000000246 R12: 0000000000000001 [ 286.950081][ T6791] R13: 00007f22ce650038 R14: 00007f22ce64ffa0 R15: 00007ffc2175b648 [ 286.958061][ T6791] [ 287.102758][ T6791] socket: no more sockets [ 287.934785][ T6836] FAULT_INJECTION: forcing a failure. [ 287.934785][ T6836] name failslab, interval 1, probability 0, space 0, times 0 [ 287.996630][ T6836] CPU: 1 PID: 6836 Comm: syz.3.2144 Not tainted 5.15.189-syzkaller-android13-5.15.189_r00 #0 [ 288.006813][ T6836] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 288.016856][ T6836] Call Trace: [ 288.020201][ T6836] [ 288.023111][ T6836] __dump_stack+0x21/0x30 [ 288.027426][ T6836] dump_stack_lvl+0xee/0x150 [ 288.031996][ T6836] ? show_regs_print_info+0x20/0x20 [ 288.037175][ T6836] dump_stack+0x15/0x20 [ 288.041316][ T6836] should_fail+0x3c1/0x510 [ 288.045715][ T6836] __should_failslab+0xa4/0xe0 [ 288.050469][ T6836] should_failslab+0x9/0x20 [ 288.054951][ T6836] slab_pre_alloc_hook+0x3b/0xe0 [ 288.059957][ T6836] ? security_inode_alloc+0x33/0x110 [ 288.065326][ T6836] kmem_cache_alloc+0x44/0x260 [ 288.070090][ T6836] security_inode_alloc+0x33/0x110 [ 288.075192][ T6836] inode_init_always+0x711/0x990 [ 288.080121][ T6836] new_inode_pseudo+0x91/0x210 [ 288.084869][ T6836] __sock_create+0x12c/0x7a0 [ 288.089446][ T6836] __sys_socketpair+0x1a1/0x590 [ 288.094277][ T6836] __x64_sys_socketpair+0x9b/0xb0 [ 288.099458][ T6836] x64_sys_call+0x36/0x9a0 [ 288.103856][ T6836] do_syscall_64+0x4c/0xa0 [ 288.108271][ T6836] ? clear_bhb_loop+0x50/0xa0 [ 288.112929][ T6836] ? clear_bhb_loop+0x50/0xa0 [ 288.117594][ T6836] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 288.123468][ T6836] RIP: 0033:0x7f78abbe0be9 [ 288.127867][ T6836] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 288.147543][ T6836] RSP: 002b:00007f78aa649038 EFLAGS: 00000246 ORIG_RAX: 0000000000000035 [ 288.156027][ T6836] RAX: ffffffffffffffda RBX: 00007f78abe07fa0 RCX: 00007f78abbe0be9 [ 288.163981][ T6836] RDX: 0000000000000000 RSI: 0000000000000001 RDI: 000000000000000a [ 288.171932][ T6836] RBP: 00007f78aa649090 R08: 0000000000000000 R09: 0000000000000000 [ 288.180125][ T6836] R10: 0000200000000000 R11: 0000000000000246 R12: 0000000000000001 [ 288.188088][ T6836] R13: 00007f78abe08038 R14: 00007f78abe07fa0 R15: 00007fff38b9ed28 [ 288.196058][ T6836] [ 288.214586][ T6836] socket: no more sockets [ 288.245815][ T6839] device pim6reg1 entered promiscuous mode [ 288.509583][ T6858] FAULT_INJECTION: forcing a failure. [ 288.509583][ T6858] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 288.903975][ T6858] CPU: 1 PID: 6858 Comm: syz.0.2153 Not tainted 5.15.189-syzkaller-android13-5.15.189_r00 #0 [ 288.914163][ T6858] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 288.924436][ T6858] Call Trace: [ 288.927718][ T6858] [ 288.930818][ T6858] __dump_stack+0x21/0x30 [ 288.935269][ T6858] dump_stack_lvl+0xee/0x150 [ 288.939899][ T6858] ? show_regs_print_info+0x20/0x20 [ 288.945116][ T6858] ? __hrtimer_run_queues+0x97a/0x9e0 [ 288.950508][ T6858] dump_stack+0x15/0x20 [ 288.954705][ T6858] should_fail+0x3c1/0x510 [ 288.959125][ T6858] should_fail_usercopy+0x1a/0x20 [ 288.964245][ T6858] _copy_from_user+0x20/0xd0 [ 288.968854][ T6858] __sys_bpf+0x233/0x730 [ 288.973090][ T6858] ? bpf_link_show_fdinfo+0x310/0x310 [ 288.978460][ T6858] ? asm_sysvec_apic_timer_interrupt+0x1b/0x20 [ 288.984625][ T6858] __x64_sys_bpf+0x7c/0x90 [ 288.989049][ T6858] x64_sys_call+0x4b9/0x9a0 [ 288.993670][ T6858] do_syscall_64+0x4c/0xa0 [ 288.998100][ T6858] ? clear_bhb_loop+0x50/0xa0 [ 289.002952][ T6858] ? clear_bhb_loop+0x50/0xa0 [ 289.007647][ T6858] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 289.013642][ T6858] RIP: 0033:0x7f1b1efaebe9 [ 289.018055][ T6858] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 289.037688][ T6858] RSP: 002b:00007f1b1da17038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 289.046107][ T6858] RAX: ffffffffffffffda RBX: 00007f1b1f1d5fa0 RCX: 00007f1b1efaebe9 [ 289.054073][ T6858] RDX: 0000000000000023 RSI: 0000200000000300 RDI: 0000000000000005 [ 289.062039][ T6858] RBP: 00007f1b1da17090 R08: 0000000000000000 R09: 0000000000000000 [ 289.070134][ T6858] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 289.078277][ T6858] R13: 00007f1b1f1d6038 R14: 00007f1b1f1d5fa0 R15: 00007ffd87f113b8 [ 289.086346][ T6858] [ 289.148378][ T6863] device syzkaller0 entered promiscuous mode [ 289.434081][ T6874] FAULT_INJECTION: forcing a failure. [ 289.434081][ T6874] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 289.447793][ T6874] CPU: 1 PID: 6874 Comm: syz.3.2160 Not tainted 5.15.189-syzkaller-android13-5.15.189_r00 #0 [ 289.458082][ T6874] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 289.468240][ T6874] Call Trace: [ 289.471532][ T6874] [ 289.474469][ T6874] __dump_stack+0x21/0x30 [ 289.478891][ T6874] dump_stack_lvl+0xee/0x150 [ 289.483468][ T6874] ? show_regs_print_info+0x20/0x20 [ 289.488660][ T6874] ? kstrtouint_from_user+0x1a0/0x200 [ 289.494013][ T6874] dump_stack+0x15/0x20 [ 289.498150][ T6874] should_fail+0x3c1/0x510 [ 289.502568][ T6874] should_fail_usercopy+0x1a/0x20 [ 289.507619][ T6874] _copy_from_user+0x20/0xd0 [ 289.512284][ T6874] ___sys_recvmsg+0x129/0x4f0 [ 289.516944][ T6874] ? proc_fail_nth_read+0x210/0x210 [ 289.522134][ T6874] ? __sys_recvmsg+0x250/0x250 [ 289.526878][ T6874] ? vfs_write+0xc17/0xf70 [ 289.531367][ T6874] ? __fdget+0x1a1/0x230 [ 289.535597][ T6874] __x64_sys_recvmsg+0x1df/0x2a0 [ 289.540516][ T6874] ? ___sys_recvmsg+0x4f0/0x4f0 [ 289.545358][ T6874] ? ksys_write+0x1eb/0x240 [ 289.549931][ T6874] ? fpregs_assert_state_consistent+0xb1/0xe0 [ 289.555983][ T6874] x64_sys_call+0x705/0x9a0 [ 289.560469][ T6874] do_syscall_64+0x4c/0xa0 [ 289.564868][ T6874] ? clear_bhb_loop+0x50/0xa0 [ 289.569525][ T6874] ? clear_bhb_loop+0x50/0xa0 [ 289.574187][ T6874] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 289.580063][ T6874] RIP: 0033:0x7f78abbe0be9 [ 289.584463][ T6874] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 289.604051][ T6874] RSP: 002b:00007f78aa649038 EFLAGS: 00000246 ORIG_RAX: 000000000000002f [ 289.612450][ T6874] RAX: ffffffffffffffda RBX: 00007f78abe07fa0 RCX: 00007f78abbe0be9 [ 289.620408][ T6874] RDX: 0000000040000100 RSI: 0000200000000100 RDI: 0000000000000007 [ 289.628360][ T6874] RBP: 00007f78aa649090 R08: 0000000000000000 R09: 0000000000000000 [ 289.636363][ T6874] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 289.644467][ T6874] R13: 00007f78abe08038 R14: 00007f78abe07fa0 R15: 00007fff38b9ed28 [ 289.652428][ T6874] [ 289.840342][ T6888] device veth1_macvtap left promiscuous mode [ 289.923767][ T6888] device veth1_macvtap entered promiscuous mode [ 289.930627][ T6892] FAULT_INJECTION: forcing a failure. [ 289.930627][ T6892] name failslab, interval 1, probability 0, space 0, times 0 [ 289.945377][ T6888] device macsec0 entered promiscuous mode [ 289.954523][ T6892] CPU: 0 PID: 6892 Comm: syz.2.2165 Not tainted 5.15.189-syzkaller-android13-5.15.189_r00 #0 [ 289.964872][ T6892] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 289.974915][ T6892] Call Trace: [ 289.978184][ T6892] [ 289.981142][ T6892] __dump_stack+0x21/0x30 [ 289.985586][ T6892] dump_stack_lvl+0xee/0x150 [ 289.990181][ T6892] ? show_regs_print_info+0x20/0x20 [ 289.995471][ T6892] dump_stack+0x15/0x20 [ 289.999639][ T6892] should_fail+0x3c1/0x510 [ 290.004038][ T6892] __should_failslab+0xa4/0xe0 [ 290.008787][ T6892] should_failslab+0x9/0x20 [ 290.013278][ T6892] slab_pre_alloc_hook+0x3b/0xe0 [ 290.018204][ T6892] ? sk_prot_alloc+0x5f/0x320 [ 290.022866][ T6892] kmem_cache_alloc+0x44/0x260 [ 290.027613][ T6892] sk_prot_alloc+0x5f/0x320 [ 290.032098][ T6892] sk_alloc+0x38/0x430 [ 290.036147][ T6892] inet6_create+0x5c4/0x1020 [ 290.040720][ T6892] __sock_create+0x38d/0x7a0 [ 290.045295][ T6892] __sys_socketpair+0x1a1/0x590 [ 290.050144][ T6892] __x64_sys_socketpair+0x9b/0xb0 [ 290.055170][ T6892] x64_sys_call+0x36/0x9a0 [ 290.059663][ T6892] do_syscall_64+0x4c/0xa0 [ 290.064070][ T6892] ? clear_bhb_loop+0x50/0xa0 [ 290.068925][ T6892] ? clear_bhb_loop+0x50/0xa0 [ 290.073587][ T6892] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 290.079465][ T6892] RIP: 0033:0x7f81b925cbe9 [ 290.083866][ T6892] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 290.103457][ T6892] RSP: 002b:00007f81b7cc5038 EFLAGS: 00000246 ORIG_RAX: 0000000000000035 [ 290.111857][ T6892] RAX: ffffffffffffffda RBX: 00007f81b9483fa0 RCX: 00007f81b925cbe9 [ 290.119905][ T6892] RDX: 0000000000000000 RSI: 0000000000000001 RDI: 000000000000000a [ 290.127859][ T6892] RBP: 00007f81b7cc5090 R08: 0000000000000000 R09: 0000000000000000 [ 290.135824][ T6892] R10: 0000200000000000 R11: 0000000000000246 R12: 0000000000000001 [ 290.143812][ T6892] R13: 00007f81b9484038 R14: 00007f81b9483fa0 R15: 00007ffdc103c8b8 [ 290.151871][ T6892] [ 290.681942][ T6913] device syzkaller0 entered promiscuous mode [ 291.020247][ T6930] device wg2 left promiscuous mode [ 291.107312][ T6926] device wg2 entered promiscuous mode [ 291.716682][ T6955] device syzkaller0 entered promiscuous mode [ 291.828659][ T6973] device wg2 left promiscuous mode [ 291.884219][ T6976] device wg2 entered promiscuous mode [ 291.994367][ T6984] FAULT_INJECTION: forcing a failure. [ 291.994367][ T6984] name failslab, interval 1, probability 0, space 0, times 0 [ 292.073554][ T6984] CPU: 1 PID: 6984 Comm: syz.3.2198 Not tainted 5.15.189-syzkaller-android13-5.15.189_r00 #0 [ 292.083870][ T6984] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 292.093934][ T6984] Call Trace: [ 292.097211][ T6984] [ 292.100141][ T6984] __dump_stack+0x21/0x30 [ 292.104485][ T6984] dump_stack_lvl+0xee/0x150 [ 292.109166][ T6984] ? show_regs_print_info+0x20/0x20 [ 292.114445][ T6984] ? avc_has_perm+0x158/0x240 [ 292.119112][ T6984] dump_stack+0x15/0x20 [ 292.123338][ T6984] should_fail+0x3c1/0x510 [ 292.127745][ T6984] __should_failslab+0xa4/0xe0 [ 292.132494][ T6984] should_failslab+0x9/0x20 [ 292.136985][ T6984] slab_pre_alloc_hook+0x3b/0xe0 [ 292.141911][ T6984] ? sock_alloc_inode+0x1b/0xb0 [ 292.146761][ T6984] kmem_cache_alloc+0x44/0x260 [ 292.151606][ T6984] ? sockfs_init_fs_context+0xb0/0xb0 [ 292.156967][ T6984] sock_alloc_inode+0x1b/0xb0 [ 292.161632][ T6984] ? sockfs_init_fs_context+0xb0/0xb0 [ 292.167002][ T6984] new_inode_pseudo+0x62/0x210 [ 292.171860][ T6984] __sock_create+0x12c/0x7a0 [ 292.176542][ T6984] __sys_socketpair+0x218/0x590 [ 292.181615][ T6984] __x64_sys_socketpair+0x9b/0xb0 [ 292.186645][ T6984] x64_sys_call+0x36/0x9a0 [ 292.191142][ T6984] do_syscall_64+0x4c/0xa0 [ 292.195547][ T6984] ? clear_bhb_loop+0x50/0xa0 [ 292.200422][ T6984] ? clear_bhb_loop+0x50/0xa0 [ 292.205083][ T6984] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 292.210961][ T6984] RIP: 0033:0x7f78abbe0be9 [ 292.215362][ T6984] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 292.235193][ T6984] RSP: 002b:00007f78aa649038 EFLAGS: 00000246 ORIG_RAX: 0000000000000035 [ 292.243613][ T6984] RAX: ffffffffffffffda RBX: 00007f78abe07fa0 RCX: 00007f78abbe0be9 [ 292.251572][ T6984] RDX: 0000000000000000 RSI: 0000000000000001 RDI: 000000000000000a [ 292.259533][ T6984] RBP: 00007f78aa649090 R08: 0000000000000000 R09: 0000000000000000 [ 292.267489][ T6984] R10: 0000200000000000 R11: 0000000000000246 R12: 0000000000000001 [ 292.275447][ T6984] R13: 00007f78abe08038 R14: 00007f78abe07fa0 R15: 00007fff38b9ed28 [ 292.283433][ T6984] [ 292.293048][ T6984] socket: no more sockets [ 293.514056][ T7022] FAULT_INJECTION: forcing a failure. [ 293.514056][ T7022] name failslab, interval 1, probability 0, space 0, times 0 [ 293.658250][ T7022] CPU: 0 PID: 7022 Comm: syz.1.2211 Not tainted 5.15.189-syzkaller-android13-5.15.189_r00 #0 [ 293.668549][ T7022] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 293.678693][ T7022] Call Trace: [ 293.681974][ T7022] [ 293.684992][ T7022] __dump_stack+0x21/0x30 [ 293.689397][ T7022] dump_stack_lvl+0xee/0x150 [ 293.693990][ T7022] ? show_regs_print_info+0x20/0x20 [ 293.699209][ T7022] dump_stack+0x15/0x20 [ 293.703394][ T7022] should_fail+0x3c1/0x510 [ 293.707814][ T7022] __should_failslab+0xa4/0xe0 [ 293.712581][ T7022] should_failslab+0x9/0x20 [ 293.717080][ T7022] slab_pre_alloc_hook+0x3b/0xe0 [ 293.722019][ T7022] ? security_inode_alloc+0x33/0x110 [ 293.727323][ T7022] kmem_cache_alloc+0x44/0x260 [ 293.732092][ T7022] security_inode_alloc+0x33/0x110 [ 293.737202][ T7022] inode_init_always+0x711/0x990 [ 293.742137][ T7022] new_inode_pseudo+0x91/0x210 [ 293.746898][ T7022] __sock_create+0x12c/0x7a0 [ 293.751494][ T7022] __sys_socketpair+0x218/0x590 [ 293.756351][ T7022] __x64_sys_socketpair+0x9b/0xb0 [ 293.761376][ T7022] x64_sys_call+0x36/0x9a0 [ 293.765791][ T7022] do_syscall_64+0x4c/0xa0 [ 293.770203][ T7022] ? clear_bhb_loop+0x50/0xa0 [ 293.774913][ T7022] ? clear_bhb_loop+0x50/0xa0 [ 293.779601][ T7022] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 293.785492][ T7022] RIP: 0033:0x7f22ce428be9 [ 293.789905][ T7022] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 293.809510][ T7022] RSP: 002b:00007f22cce91038 EFLAGS: 00000246 ORIG_RAX: 0000000000000035 [ 293.817927][ T7022] RAX: ffffffffffffffda RBX: 00007f22ce64ffa0 RCX: 00007f22ce428be9 [ 293.825902][ T7022] RDX: 0000000000000000 RSI: 0000000000000001 RDI: 000000000000000a [ 293.834055][ T7022] RBP: 00007f22cce91090 R08: 0000000000000000 R09: 0000000000000000 [ 293.842049][ T7022] R10: 0000200000000000 R11: 0000000000000246 R12: 0000000000000001 [ 293.850019][ T7022] R13: 00007f22ce650038 R14: 00007f22ce64ffa0 R15: 00007ffc2175b648 [ 293.858001][ T7022] [ 294.333473][ T7034] device wg2 left promiscuous mode [ 294.414939][ T7022] socket: no more sockets [ 294.457252][ T7033] device wg2 entered promiscuous mode [ 294.783233][ T7048] device pim6reg1 entered promiscuous mode [ 295.601006][ T30] audit: type=1400 audit(1754694603.043:143): avc: denied { create } for pid=7070 comm="syz.4.2229" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rxrpc_socket permissive=1 [ 295.784834][ T30] audit: type=1400 audit(1754694603.223:144): avc: denied { read } for pid=7070 comm="syz.4.2229" dev="nsfs" ino=4026532545 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 296.072835][ T30] audit: type=1400 audit(1754694603.233:145): avc: denied { open } for pid=7070 comm="syz.4.2229" path="cgroup:[4026532545]" dev="nsfs" ino=4026532545 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 296.544718][ T7107] device sit0 entered promiscuous mode [ 296.660131][ T7112] device syzkaller0 entered promiscuous mode [ 298.456023][ T7184] device syzkaller0 entered promiscuous mode [ 298.530571][ T7193] device wg2 left promiscuous mode [ 298.775885][ T7190] device wg2 entered promiscuous mode [ 300.278903][ T7255] device sit0 left promiscuous mode [ 300.341378][ T7257] device sit0 entered promiscuous mode [ 301.413636][ T7284] syz.3.2295[7284] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 301.413733][ T7284] syz.3.2295[7284] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 302.454464][ T7310] device syzkaller0 entered promiscuous mode [ 303.894558][ T7351] syz.4.2317[7351] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 303.894663][ T7351] syz.4.2317[7351] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 304.770223][ T7373] device syzkaller0 entered promiscuous mode [ 304.808627][ T7369] device veth0_vlan left promiscuous mode [ 304.871340][ T7369] device veth0_vlan entered promiscuous mode [ 305.234699][ T1158] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 305.243526][ T1158] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 305.251103][ T1158] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 305.865727][ T7385] device wg2 left promiscuous mode [ 305.879027][ T7385] device wg2 entered promiscuous mode [ 309.748373][ T7463] device sit0 left promiscuous mode [ 309.953464][ T7463] device sit0 entered promiscuous mode [ 310.577998][ T7473] device wg2 left promiscuous mode [ 310.596076][ T7474] device wg2 entered promiscuous mode [ 311.147279][ T7490] device syzkaller0 entered promiscuous mode [ 311.367179][ T7498] device wg2 left promiscuous mode [ 311.539026][ T7503] device wg2 entered promiscuous mode [ 311.814814][ T7515] device wg2 left promiscuous mode [ 311.828784][ T7514] device wg2 entered promiscuous mode [ 312.503206][ T7530] device syzkaller0 entered promiscuous mode [ 314.680593][ T7574] device syzkaller0 entered promiscuous mode [ 314.913889][ T7587] ------------[ cut here ]------------ [ 314.919459][ T7587] trace type BPF program uses run-time allocation [ 314.926425][ T7587] WARNING: CPU: 1 PID: 7587 at kernel/bpf/verifier.c:11718 check_map_prog_compatibility+0x6cd/0x870 [ 315.012857][ T7587] Modules linked in: [ 315.016794][ T7587] CPU: 0 PID: 7587 Comm: syz.1.2388 Not tainted 5.15.189-syzkaller-android13-5.15.189_r00 #0 [ 315.027025][ T7587] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 315.037572][ T7587] RIP: 0010:check_map_prog_compatibility+0x6cd/0x870 [ 315.279681][ T7587] Code: ee ff 48 c7 c6 20 ec 47 85 4c 8b 65 d0 e9 fd fc ff ff e8 56 4c ee ff c6 05 43 92 6b 05 01 48 c7 c7 80 e8 47 85 e8 a3 e9 24 03 <0f> 0b e9 88 fb ff ff 89 d9 80 e1 07 80 c1 03 38 c1 0f 8c ac f9 ff [ 315.346685][ T7595] device syzkaller0 entered promiscuous mode [ 315.352965][ T7587] RSP: 0018:ffffc9000117f428 EFLAGS: 00010246 [ 315.359158][ T7587] RAX: a20cc468e4b1cf00 RBX: 0000000000000001 RCX: ffff88811b5ba780 [ 315.603020][ T7587] RDX: 0000000000000000 RSI: 0000000080000000 RDI: 0000000000000000 [ 315.653766][ T7587] RBP: ffffc9000117f470 R08: dffffc0000000000 R09: ffffed103ee265e8 [ 315.663165][ T7587] R10: ffffed103ee265e8 R11: 1ffff1103ee265e7 R12: ffff888116d58000 [ 315.671322][ T7587] R13: 0000000000000002 R14: dffffc0000000000 R15: ffff88810aa7b800 [ 315.729510][ T7587] FS: 00007f22cce916c0(0000) GS:ffff8881f7000000(0000) knlGS:0000000000000000 [ 315.742781][ T7587] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 315.758638][ T7587] CR2: 0000001b2e613ff8 CR3: 000000010dbdd000 CR4: 00000000003506b0 [ 315.766937][ T7587] DR0: 0000000000000000 DR1: 0000200000000300 DR2: 0000000000000000 [ 315.780661][ T7587] DR3: 0000000000000000 DR6: 00000000ffff0ff0 DR7: 0000000000000600 [ 315.829366][ T7587] Call Trace: [ 315.861958][ T7587] [ 315.915676][ T7587] resolve_pseudo_ldimm64+0x685/0x11d0 [ 315.921268][ T7587] ? check_attach_btf_id+0xde0/0xde0 [ 316.061384][ T7587] ? __mark_reg_known+0x1b0/0x1b0 [ 316.092850][ T7587] ? security_capable+0x87/0xb0 [ 316.097855][ T7587] bpf_check+0x2c44/0xf330 [ 316.102272][ T7587] ? 0xffffffffa0028690 [ 316.192916][ T7587] ? is_bpf_text_address+0x177/0x190 [ 316.198251][ T7587] ? bpf_get_btf_vmlinux+0x60/0x60 [ 316.240997][ T7587] ? unwind_get_return_address+0x4d/0x90 [ 316.365170][ T7587] ? stack_trace_save+0xe0/0xe0 [ 316.420815][ T7587] ? arch_stack_walk+0xee/0x140 [ 316.499622][ T7616] device pim6reg1 entered promiscuous mode [ 316.505533][ T7587] ? stack_trace_save+0x98/0xe0 [ 316.531400][ T7587] ? __stack_depot_save+0x34/0x480 [ 316.607542][ T7587] ? __kasan_slab_alloc+0x69/0xf0 [ 316.612612][ T7587] ? bpf_probe_read_kernel_str+0x68/0x70 [ 316.789361][ T7587] ? __kasan_kmalloc+0xec/0x110 [ 316.796742][ T7587] ? __kasan_kmalloc+0xda/0x110 [ 316.810547][ T7587] ? kmem_cache_alloc_trace+0x119/0x270 [ 316.849549][ T7587] ? selinux_bpf_prog_alloc+0x51/0x140 [ 316.953379][ T7587] ? security_bpf_prog_alloc+0x62/0x90 [ 316.982737][ T7587] ? bpf_prog_load+0x97c/0x1550 [ 316.987724][ T7587] ? __sys_bpf+0x4c3/0x730 [ 317.032379][ T7587] ? __x64_sys_bpf+0x7c/0x90 [ 317.043639][ T7587] ? x64_sys_call+0x4b9/0x9a0 [ 317.048470][ T7587] ? do_syscall_64+0x4c/0xa0 [ 317.053114][ T7587] ? entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 317.059345][ T7587] ? check_stack_object+0x81/0x140 [ 317.064520][ T7587] ? memset+0x35/0x40 [ 317.068561][ T7587] ? bpf_obj_name_cpy+0x193/0x1e0 [ 317.073750][ T7587] bpf_prog_load+0x1042/0x1550 [ 317.078570][ T7587] ? map_freeze+0x360/0x360 [ 317.083132][ T7587] ? selinux_bpf+0xc7/0xf0 [ 317.087697][ T7587] ? security_bpf+0x82/0xa0 [ 317.092242][ T7587] __sys_bpf+0x4c3/0x730 [ 317.096580][ T7587] ? bpf_link_show_fdinfo+0x310/0x310 [ 317.102286][ T7587] ? __kasan_check_write+0x14/0x20 [ 317.110722][ T7619] device pim6reg1 entered promiscuous mode [ 317.137862][ T7587] ? switch_fpu_return+0x15d/0x2c0 [ 317.143265][ T7587] __x64_sys_bpf+0x7c/0x90 [ 317.147874][ T7587] x64_sys_call+0x4b9/0x9a0 [ 317.153347][ T7587] do_syscall_64+0x4c/0xa0 [ 317.157788][ T7587] ? clear_bhb_loop+0x50/0xa0 [ 317.233309][ T7587] ? clear_bhb_loop+0x50/0xa0 [ 317.277202][ T7587] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 317.302792][ T7587] RIP: 0033:0x7f22ce428be9 [ 317.307271][ T7587] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 317.327113][ T7587] RSP: 002b:00007f22cce91038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 317.336856][ T7587] RAX: ffffffffffffffda RBX: 00007f22ce64ffa0 RCX: 00007f22ce428be9 [ 317.345293][ T7587] RDX: 0000000000000080 RSI: 0000200000000440 RDI: 0000000000000005 [ 317.354371][ T7587] RBP: 00007f22ce4abe19 R08: 0000000000000000 R09: 0000000000000000 [ 317.364147][ T7587] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 317.372141][ T7587] R13: 00007f22ce650038 R14: 00007f22ce64ffa0 R15: 00007ffc2175b648 [ 317.380605][ T7587] [ 317.383900][ T7587] ---[ end trace 920095a0922cb72e ]--- [ 319.186223][ T7645] device wg2 left promiscuous mode [ 319.426337][ T7641] device wg2 entered promiscuous mode [ 321.143367][ T30] audit: type=1400 audit(1754694628.593:146): avc: denied { create } for pid=7687 comm="syz.4.2416" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rose_socket permissive=1 [ 321.329093][ T7689] device sit0 entered promiscuous mode [ 322.060403][ T7709] syz.2.2424[7709] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 322.060477][ T7709] syz.2.2424[7709] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 322.411717][ T7719] device wg2 left promiscuous mode [ 322.694699][ T7732] device wg2 left promiscuous mode [ 323.173476][ T7767] FAULT_INJECTION: forcing a failure. [ 323.173476][ T7767] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 323.293235][ T7767] CPU: 0 PID: 7767 Comm: syz.2.2442 Tainted: G W 5.15.189-syzkaller-android13-5.15.189_r00 #0 [ 323.305071][ T7767] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 323.315123][ T7767] Call Trace: [ 323.318412][ T7767] [ 323.321340][ T7767] __dump_stack+0x21/0x30 [ 323.325670][ T7767] dump_stack_lvl+0xee/0x150 [ 323.330261][ T7767] ? show_regs_print_info+0x20/0x20 [ 323.335460][ T7767] ? vfs_write+0xc17/0xf70 [ 323.339879][ T7767] dump_stack+0x15/0x20 [ 323.344022][ T7767] should_fail+0x3c1/0x510 [ 323.348459][ T7767] should_fail_usercopy+0x1a/0x20 [ 323.353668][ T7767] _copy_from_user+0x20/0xd0 [ 323.358256][ T7767] __sys_bpf+0x233/0x730 [ 323.362482][ T7767] ? bpf_link_show_fdinfo+0x310/0x310 [ 323.368295][ T7767] ? debug_smp_processor_id+0x17/0x20 [ 323.373657][ T7767] __x64_sys_bpf+0x7c/0x90 [ 323.378071][ T7767] x64_sys_call+0x4b9/0x9a0 [ 323.382557][ T7767] do_syscall_64+0x4c/0xa0 [ 323.386959][ T7767] ? clear_bhb_loop+0x50/0xa0 [ 323.391667][ T7767] ? clear_bhb_loop+0x50/0xa0 [ 323.396329][ T7767] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 323.402207][ T7767] RIP: 0033:0x7f81b925cbe9 [ 323.406606][ T7767] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 323.426193][ T7767] RSP: 002b:00007f81b7cc5038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 323.434589][ T7767] RAX: ffffffffffffffda RBX: 00007f81b9483fa0 RCX: 00007f81b925cbe9 [ 323.442543][ T7767] RDX: 0000000000000050 RSI: 0000200000000180 RDI: 000000000000000a [ 323.450495][ T7767] RBP: 00007f81b7cc5090 R08: 0000000000000000 R09: 0000000000000000 [ 323.458453][ T7767] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 323.466414][ T7767] R13: 00007f81b9484038 R14: 00007f81b9483fa0 R15: 00007ffdc103c8b8 [ 323.474381][ T7767] [ 326.050783][ T7816] device veth0_vlan left promiscuous mode [ 326.164318][ T7816] device veth0_vlan entered promiscuous mode [ 326.276546][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 326.298315][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 326.325286][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 326.783965][ T7824] device syzkaller0 entered promiscuous mode [ 327.578651][ T7856] device wg2 entered promiscuous mode [ 328.164677][ T7865] device veth0_vlan left promiscuous mode [ 328.201971][ T7865] device veth0_vlan entered promiscuous mode [ 328.355226][ T340] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 328.375240][ T340] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 328.435451][ T340] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 329.686985][ T7910] device sit0 left promiscuous mode [ 329.777847][ T7907] device wg2 left promiscuous mode [ 329.830691][ T7910] device sit0 entered promiscuous mode [ 329.952506][ T7902] device wg2 entered promiscuous mode [ 330.295970][ T7923] device veth0_vlan left promiscuous mode [ 330.334299][ T7923] device veth0_vlan entered promiscuous mode [ 330.404329][ T7923] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 330.518290][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 330.542904][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 330.576058][ T7930] syz.0.2489[7930] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 330.576179][ T7930] syz.0.2489[7930] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 330.602407][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 332.693097][ T7961] device wg2 left promiscuous mode [ 332.757613][ T7957] device wg2 entered promiscuous mode [ 333.494613][ T8002] device wg2 left promiscuous mode [ 333.619354][ T8003] device veth0_vlan left promiscuous mode [ 333.723198][ T8003] device veth0_vlan entered promiscuous mode [ 336.251605][ T8101] device wg2 left promiscuous mode [ 338.292812][ T8126] device wg2 entered promiscuous mode [ 338.913301][ T8147] device veth0_vlan left promiscuous mode [ 338.919347][ T8147] device veth0_vlan entered promiscuous mode [ 339.054434][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 339.073331][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 339.173956][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 340.251682][ T8172] device wg2 entered promiscuous mode [ 341.069735][ T8193] device wg2 left promiscuous mode [ 341.267871][ T8195] device wg2 entered promiscuous mode [ 344.161299][ T8249] device wg2 left promiscuous mode [ 344.691295][ T8269] device pim6reg1 entered promiscuous mode [ 346.136230][ T8305] device wg2 left promiscuous mode [ 347.296195][ T8354] device syzkaller0 entered promiscuous mode [ 347.430252][ T8369] device wg2 left promiscuous mode [ 347.817322][ T8379] syz.0.2628[8379] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 347.817410][ T8379] syz.0.2628[8379] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 351.188387][ T8434] device syzkaller0 entered promiscuous mode [ 351.358516][ T8443] device sit0 left promiscuous mode [ 351.400253][ T8444] device sit0 entered promiscuous mode [ 351.828611][ T8452] ref_ctr_offset mismatch. inode: 0xa1b offset: 0x0 ref_ctr_offset(old): 0x0 ref_ctr_offset(new): 0x1fe [ 351.862328][ T8463] device vlan0 entered promiscuous mode [ 351.872502][ T8463] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 353.276346][ T8484] bridge0: port 1(bridge_slave_0) entered blocking state [ 353.284736][ T8484] bridge0: port 1(bridge_slave_0) entered disabled state [ 353.292318][ T8484] device bridge_slave_0 entered promiscuous mode [ 353.337777][ T8484] bridge0: port 2(bridge_slave_1) entered blocking state [ 353.344889][ T8484] bridge0: port 2(bridge_slave_1) entered disabled state [ 353.352277][ T8484] device bridge_slave_1 entered promiscuous mode [ 353.806623][ T8505] device syzkaller0 entered promiscuous mode [ 353.833091][ T30] audit: type=1400 audit(1754694661.283:147): avc: denied { create } for pid=8484 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 353.861898][ T8511] device pim6reg1 entered promiscuous mode [ 353.875492][ T30] audit: type=1400 audit(1754694661.313:148): avc: denied { write } for pid=8484 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 353.900912][ T30] audit: type=1400 audit(1754694661.313:149): avc: denied { read } for pid=8484 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 354.095013][ T340] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 354.123076][ T340] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 354.510329][ T340] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 354.523760][ T340] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 354.543139][ T340] bridge0: port 1(bridge_slave_0) entered blocking state [ 354.550197][ T340] bridge0: port 1(bridge_slave_0) entered forwarding state [ 354.558929][ T340] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 354.567639][ T340] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 354.581323][ T340] bridge0: port 2(bridge_slave_1) entered blocking state [ 354.588412][ T340] bridge0: port 2(bridge_slave_1) entered forwarding state [ 354.596349][ T340] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 354.725432][ T340] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 354.734991][ T340] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 354.744114][ T340] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 354.752209][ T340] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 355.222644][ T8484] device veth0_vlan entered promiscuous mode [ 355.240806][ T340] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 355.249340][ T340] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 355.258409][ T340] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 355.266984][ T340] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 355.299057][ T8484] device veth1_macvtap entered promiscuous mode [ 355.395157][ T340] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 355.408179][ T340] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 355.416044][ T340] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 355.447014][ T340] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 355.460513][ T340] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 355.477079][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 355.500437][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 355.623909][ T340] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 355.674219][ T340] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 355.959115][ T1158] device bridge_slave_1 left promiscuous mode [ 355.969485][ T1158] bridge0: port 2(bridge_slave_1) entered disabled state [ 356.058661][ T1158] device bridge_slave_0 left promiscuous mode [ 356.138088][ T1158] bridge0: port 1(bridge_slave_0) entered disabled state [ 356.238296][ T1158] device veth1_macvtap left promiscuous mode [ 356.766715][ T8591] syz.3.2696[8591] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 356.766831][ T8591] syz.3.2696[8591] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 357.123104][ T45] kworker/dying (45) used greatest stack depth: 21248 bytes left [ 357.544349][ T8602] device sit0 left promiscuous mode [ 358.051609][ T8610] device sit0 left promiscuous mode [ 358.068752][ T8612] device sit0 entered promiscuous mode [ 358.868491][ T8638] device wg2 left promiscuous mode [ 359.650518][ T30] audit: type=1400 audit(1754694667.093:150): avc: denied { ioctl } for pid=8691 comm="syz.4.2726" path="cgroup:[4026532545]" dev="nsfs" ino=4026532545 ioctlcmd=0xb702 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 362.593499][ T8785] device veth1_macvtap left promiscuous mode [ 379.115519][ T30] audit: type=1400 audit(1754694686.543:151): avc: denied { create } for pid=9141 comm="syz.0.2865" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 380.421769][ T9175] FAULT_INJECTION: forcing a failure. [ 380.421769][ T9175] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 380.574785][ T9175] CPU: 0 PID: 9175 Comm: syz.1.2876 Tainted: G W 5.15.189-syzkaller-android13-5.15.189_r00 #0 [ 380.586361][ T9175] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 380.596593][ T9175] Call Trace: [ 380.599868][ T9175] [ 380.602796][ T9175] __dump_stack+0x21/0x30 [ 380.607122][ T9175] dump_stack_lvl+0xee/0x150 [ 380.611703][ T9175] ? show_regs_print_info+0x20/0x20 [ 380.616890][ T9175] ? stack_trace_save+0x98/0xe0 [ 380.621780][ T9175] ? __stack_depot_save+0x34/0x480 [ 380.626888][ T9175] dump_stack+0x15/0x20 [ 380.631237][ T9175] should_fail+0x3c1/0x510 [ 380.635660][ T9175] should_fail_usercopy+0x1a/0x20 [ 380.640691][ T9175] _copy_from_user+0x20/0xd0 [ 380.645373][ T9175] __copy_msghdr_from_user+0xaf/0x5e0 [ 380.650754][ T9175] ? _kstrtoull+0x3c0/0x4d0 [ 380.655253][ T9175] ? __ia32_sys_shutdown+0x1e0/0x1e0 [ 380.660535][ T9175] ? kstrtouint_from_user+0x1a0/0x200 [ 380.665925][ T9175] ___sys_sendmsg+0x156/0x260 [ 380.670605][ T9175] ? __sys_sendmsg+0x250/0x250 [ 380.675369][ T9175] ? __fdget+0x1a1/0x230 [ 380.679616][ T9175] __x64_sys_sendmsg+0x1e2/0x2a0 [ 380.684638][ T9175] ? ___sys_sendmsg+0x260/0x260 [ 380.689496][ T9175] ? ksys_write+0x1eb/0x240 [ 380.694174][ T9175] ? fpregs_assert_state_consistent+0xb1/0xe0 [ 380.700240][ T9175] x64_sys_call+0x4b/0x9a0 [ 380.704656][ T9175] do_syscall_64+0x4c/0xa0 [ 380.709083][ T9175] ? clear_bhb_loop+0x50/0xa0 [ 380.714200][ T9175] ? clear_bhb_loop+0x50/0xa0 [ 380.719048][ T9175] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 380.724952][ T9175] RIP: 0033:0x7f22ce428be9 [ 380.729376][ T9175] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 380.749262][ T9175] RSP: 002b:00007f22cce91038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 380.757765][ T9175] RAX: ffffffffffffffda RBX: 00007f22ce64ffa0 RCX: 00007f22ce428be9 [ 380.765905][ T9175] RDX: 0000000000020001 RSI: 0000200000000d40 RDI: 0000000000000003 [ 380.773922][ T9175] RBP: 00007f22cce91090 R08: 0000000000000000 R09: 0000000000000000 [ 380.781996][ T9175] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 380.789969][ T9175] R13: 00007f22ce650038 R14: 00007f22ce64ffa0 R15: 00007ffc2175b648 [ 380.797957][ T9175] [ 383.156420][ T9254] device veth0_vlan left promiscuous mode [ 383.162469][ T9254] device veth0_vlan entered promiscuous mode [ 383.320935][ T30] audit: type=1400 audit(1754694690.763:152): avc: denied { create } for pid=9257 comm="syz.3.2901" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=x25_socket permissive=1 [ 383.389187][ T9262] FAULT_INJECTION: forcing a failure. [ 383.389187][ T9262] name failslab, interval 1, probability 0, space 0, times 0 [ 383.461695][ T1158] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 383.472175][ T1158] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 383.479829][ T1158] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 383.485064][ T9262] CPU: 1 PID: 9262 Comm: syz.1.2902 Tainted: G W 5.15.189-syzkaller-android13-5.15.189_r00 #0 [ 383.499330][ T9262] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 383.509594][ T9262] Call Trace: [ 383.512877][ T9262] [ 383.515813][ T9262] __dump_stack+0x21/0x30 [ 383.520150][ T9262] dump_stack_lvl+0xee/0x150 [ 383.524762][ T9262] ? show_regs_print_info+0x20/0x20 [ 383.529972][ T9262] ? __kasan_check_write+0x14/0x20 [ 383.535093][ T9262] ? _raw_spin_lock_irqsave+0xb0/0x110 [ 383.540567][ T9262] ? _raw_spin_lock+0xe0/0xe0 [ 383.545426][ T9262] ? __kasan_slab_free+0x11/0x20 [ 383.550372][ T9262] dump_stack+0x15/0x20 [ 383.554518][ T9262] should_fail+0x3c1/0x510 [ 383.558925][ T9262] __should_failslab+0xa4/0xe0 [ 383.563671][ T9262] should_failslab+0x9/0x20 [ 383.568163][ T9262] slab_pre_alloc_hook+0x3b/0xe0 [ 383.573183][ T9262] __kmalloc+0x6d/0x2c0 [ 383.577318][ T9262] ? bpf_test_init+0x100/0x1c0 [ 383.582063][ T9262] ? putname+0x111/0x160 [ 383.586566][ T9262] bpf_test_init+0x100/0x1c0 [ 383.591135][ T9262] bpf_prog_test_run_skb+0x193/0x1150 [ 383.596499][ T9262] ? __kasan_check_write+0x14/0x20 [ 383.601708][ T9262] ? fput_many+0x15a/0x1a0 [ 383.606120][ T9262] ? __bpf_prog_test_run_raw_tp+0x2b0/0x2b0 [ 383.612082][ T9262] bpf_prog_test_run+0x3d5/0x620 [ 383.617001][ T9262] ? bpf_prog_query+0x230/0x230 [ 383.621918][ T9262] ? selinux_bpf+0xce/0xf0 [ 383.626315][ T9262] ? security_bpf+0x82/0xa0 [ 383.630804][ T9262] __sys_bpf+0x52c/0x730 [ 383.635037][ T9262] ? bpf_link_show_fdinfo+0x310/0x310 [ 383.640391][ T9262] ? debug_smp_processor_id+0x17/0x20 [ 383.645750][ T9262] __x64_sys_bpf+0x7c/0x90 [ 383.650152][ T9262] x64_sys_call+0x4b9/0x9a0 [ 383.654733][ T9262] do_syscall_64+0x4c/0xa0 [ 383.659138][ T9262] ? clear_bhb_loop+0x50/0xa0 [ 383.663795][ T9262] ? clear_bhb_loop+0x50/0xa0 [ 383.668483][ T9262] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 383.674456][ T9262] RIP: 0033:0x7f22ce428be9 [ 383.678856][ T9262] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 383.698442][ T9262] RSP: 002b:00007f22cce91038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 383.706846][ T9262] RAX: ffffffffffffffda RBX: 00007f22ce64ffa0 RCX: 00007f22ce428be9 [ 383.714800][ T9262] RDX: 000000000000001e RSI: 0000200000000080 RDI: 000000000000000a [ 383.722759][ T9262] RBP: 00007f22cce91090 R08: 0000000000000000 R09: 0000000000000000 [ 383.730717][ T9262] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 383.738672][ T9262] R13: 00007f22ce650038 R14: 00007f22ce64ffa0 R15: 00007ffc2175b648 [ 383.746807][ T9262] [ 385.152570][ T9306] device sit0 entered promiscuous mode [ 386.020331][ T9316] FAULT_INJECTION: forcing a failure. [ 386.020331][ T9316] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 386.072754][ T9316] CPU: 0 PID: 9316 Comm: syz.3.2919 Tainted: G W 5.15.189-syzkaller-android13-5.15.189_r00 #0 [ 386.084428][ T9316] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 386.094483][ T9316] Call Trace: [ 386.097758][ T9316] [ 386.100685][ T9316] __dump_stack+0x21/0x30 [ 386.105015][ T9316] dump_stack_lvl+0xee/0x150 [ 386.109602][ T9316] ? show_regs_print_info+0x20/0x20 [ 386.114795][ T9316] dump_stack+0x15/0x20 [ 386.118945][ T9316] should_fail+0x3c1/0x510 [ 386.123353][ T9316] should_fail_usercopy+0x1a/0x20 [ 386.128375][ T9316] _copy_from_user+0x20/0xd0 [ 386.133100][ T9316] bpf_test_init+0x13d/0x1c0 [ 386.137715][ T9316] bpf_prog_test_run_skb+0x193/0x1150 [ 386.143086][ T9316] ? __kasan_check_write+0x14/0x20 [ 386.148180][ T9316] ? fput_many+0x15a/0x1a0 [ 386.152587][ T9316] ? __bpf_prog_test_run_raw_tp+0x2b0/0x2b0 [ 386.158465][ T9316] bpf_prog_test_run+0x3d5/0x620 [ 386.163397][ T9316] ? bpf_prog_query+0x230/0x230 [ 386.168274][ T9316] ? selinux_bpf+0xce/0xf0 [ 386.172693][ T9316] ? security_bpf+0x82/0xa0 [ 386.177176][ T9316] __sys_bpf+0x52c/0x730 [ 386.181401][ T9316] ? bpf_link_show_fdinfo+0x310/0x310 [ 386.186753][ T9316] ? debug_smp_processor_id+0x17/0x20 [ 386.192154][ T9316] __x64_sys_bpf+0x7c/0x90 [ 386.196549][ T9316] x64_sys_call+0x4b9/0x9a0 [ 386.201030][ T9316] do_syscall_64+0x4c/0xa0 [ 386.205456][ T9316] ? clear_bhb_loop+0x50/0xa0 [ 386.210176][ T9316] ? clear_bhb_loop+0x50/0xa0 [ 386.214930][ T9316] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 386.220811][ T9316] RIP: 0033:0x7f78abbe0be9 [ 386.225561][ T9316] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 386.245247][ T9316] RSP: 002b:00007f78aa649038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 386.253659][ T9316] RAX: ffffffffffffffda RBX: 00007f78abe07fa0 RCX: 00007f78abbe0be9 [ 386.261706][ T9316] RDX: 000000000000001e RSI: 0000200000000080 RDI: 000000000000000a [ 386.269658][ T9316] RBP: 00007f78aa649090 R08: 0000000000000000 R09: 0000000000000000 [ 386.277784][ T9316] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 386.285737][ T9316] R13: 00007f78abe08038 R14: 00007f78abe07fa0 R15: 00007fff38b9ed28 [ 386.293695][ T9316] [ 386.572748][ T9314] bridge0: port 1(bridge_slave_0) entered blocking state [ 386.612734][ T9314] bridge0: port 1(bridge_slave_0) entered disabled state [ 386.629046][ T9314] device bridge_slave_0 entered promiscuous mode [ 386.996301][ T9314] bridge0: port 2(bridge_slave_1) entered blocking state [ 387.009271][ T9314] bridge0: port 2(bridge_slave_1) entered disabled state [ 387.043136][ T9314] device bridge_slave_1 entered promiscuous mode [ 388.440410][ T340] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 388.448150][ T340] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 388.478707][ T340] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 388.501225][ T340] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 388.546865][ T340] bridge0: port 1(bridge_slave_0) entered blocking state [ 388.553974][ T340] bridge0: port 1(bridge_slave_0) entered forwarding state [ 388.569254][ T340] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 388.636150][ T340] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 388.651706][ T340] bridge0: port 2(bridge_slave_1) entered blocking state [ 388.658798][ T340] bridge0: port 2(bridge_slave_1) entered forwarding state [ 388.716982][ T340] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 388.779157][ T340] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 388.848640][ T340] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 388.884881][ T340] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 388.897648][ T9314] device veth0_vlan entered promiscuous mode [ 388.906773][ T340] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 388.914809][ T340] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 388.930259][ T9314] device veth1_macvtap entered promiscuous mode [ 388.953575][ T340] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 388.966671][ T340] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 388.982507][ T340] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 389.009062][ T340] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 389.023584][ T9419] FAULT_INJECTION: forcing a failure. [ 389.023584][ T9419] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 389.060740][ T340] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 389.102754][ T340] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 389.195428][ T340] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 389.204155][ T9419] CPU: 0 PID: 9419 Comm: syz.4.2948 Tainted: G W 5.15.189-syzkaller-android13-5.15.189_r00 #0 [ 389.215956][ T9419] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 389.226027][ T9419] Call Trace: [ 389.229304][ T9419] [ 389.232234][ T9419] __dump_stack+0x21/0x30 [ 389.236572][ T9419] dump_stack_lvl+0xee/0x150 [ 389.241178][ T9419] ? show_regs_print_info+0x20/0x20 [ 389.246396][ T9419] dump_stack+0x15/0x20 [ 389.250556][ T9419] should_fail+0x3c1/0x510 [ 389.255143][ T9419] should_fail_usercopy+0x1a/0x20 [ 389.260162][ T9419] _copy_to_user+0x20/0x90 [ 389.264580][ T9419] simple_read_from_buffer+0xe9/0x160 [ 389.269959][ T9419] proc_fail_nth_read+0x19a/0x210 [ 389.274987][ T9419] ? proc_fault_inject_write+0x2f0/0x2f0 [ 389.280624][ T9419] ? security_file_permission+0x83/0xa0 [ 389.286262][ T9419] ? proc_fault_inject_write+0x2f0/0x2f0 [ 389.291899][ T9419] vfs_read+0x282/0xbe0 [ 389.296054][ T9419] ? kernel_read+0x1f0/0x1f0 [ 389.300666][ T9419] ? __kasan_check_write+0x14/0x20 [ 389.305780][ T9419] ? mutex_lock+0x95/0x1a0 [ 389.310201][ T9419] ? wait_for_completion_killable_timeout+0x10/0x10 [ 389.316788][ T9419] ? __fget_files+0x2c4/0x320 [ 389.321489][ T9419] ? __fdget_pos+0x2d2/0x380 [ 389.326348][ T9419] ? ksys_read+0x71/0x240 [ 389.330777][ T9419] ksys_read+0x140/0x240 [ 389.335115][ T9419] ? vfs_write+0xf70/0xf70 [ 389.339528][ T9419] ? debug_smp_processor_id+0x17/0x20 [ 389.344911][ T9419] __x64_sys_read+0x7b/0x90 [ 389.349398][ T9419] x64_sys_call+0x96d/0x9a0 [ 389.353880][ T9419] do_syscall_64+0x4c/0xa0 [ 389.358287][ T9419] ? clear_bhb_loop+0x50/0xa0 [ 389.362956][ T9419] ? clear_bhb_loop+0x50/0xa0 [ 389.366026][ T340] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 389.367747][ T9419] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 389.367773][ T9419] RIP: 0033:0x7fcf153cc5fc [ 389.376176][ T340] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 389.381583][ T9419] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 93 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 ef 93 02 00 48 [ 389.381600][ T9419] RSP: 002b:00007fcf13e36030 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 389.422277][ T9419] RAX: ffffffffffffffda RBX: 00007fcf155f4fa0 RCX: 00007fcf153cc5fc [ 389.430244][ T9419] RDX: 000000000000000f RSI: 00007fcf13e360a0 RDI: 0000000000000007 [ 389.438238][ T9419] RBP: 00007fcf13e36090 R08: 0000000000000000 R09: 0000000000000000 [ 389.446204][ T9419] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 389.454180][ T9419] R13: 00007fcf155f5038 R14: 00007fcf155f4fa0 R15: 00007fffa885fb68 [ 389.462163][ T9419] [ 389.487732][ T1158] GPL: port 1(erspan0) entered disabled state [ 389.495652][ T1158] device erspan0 left promiscuous mode [ 389.501119][ T1158] GPL: port 1(erspan0) entered disabled state [ 389.579016][ T30] audit: type=1400 audit(1754694697.023:153): avc: denied { create } for pid=9436 comm="syz.2.2954" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=ax25_socket permissive=1 [ 389.849835][ T9454] device sit0 left promiscuous mode [ 390.946899][ T9501] FAULT_INJECTION: forcing a failure. [ 390.946899][ T9501] name failslab, interval 1, probability 0, space 0, times 0 [ 391.021535][ T9501] CPU: 0 PID: 9501 Comm: syz.0.2975 Tainted: G W 5.15.189-syzkaller-android13-5.15.189_r00 #0 [ 391.033110][ T9501] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 391.043193][ T9501] Call Trace: [ 391.046482][ T9501] [ 391.049409][ T9501] __dump_stack+0x21/0x30 [ 391.053739][ T9501] dump_stack_lvl+0xee/0x150 [ 391.058323][ T9501] ? show_regs_print_info+0x20/0x20 [ 391.063518][ T9501] ? avc_has_perm+0x158/0x240 [ 391.068192][ T9501] dump_stack+0x15/0x20 [ 391.072340][ T9501] should_fail+0x3c1/0x510 [ 391.076766][ T9501] __should_failslab+0xa4/0xe0 [ 391.081526][ T9501] should_failslab+0x9/0x20 [ 391.086028][ T9501] slab_pre_alloc_hook+0x3b/0xe0 [ 391.090960][ T9501] ? sock_alloc_inode+0x1b/0xb0 [ 391.095809][ T9501] kmem_cache_alloc+0x44/0x260 [ 391.100573][ T9501] ? sockfs_init_fs_context+0xb0/0xb0 [ 391.105947][ T9501] sock_alloc_inode+0x1b/0xb0 [ 391.110730][ T9501] ? sockfs_init_fs_context+0xb0/0xb0 [ 391.116416][ T9501] new_inode_pseudo+0x62/0x210 [ 391.121190][ T9501] __sock_create+0x12c/0x7a0 [ 391.126044][ T9501] __sys_socketpair+0x1a1/0x590 [ 391.130906][ T9501] __x64_sys_socketpair+0x9b/0xb0 [ 391.135966][ T9501] x64_sys_call+0x36/0x9a0 [ 391.140383][ T9501] do_syscall_64+0x4c/0xa0 [ 391.144798][ T9501] ? clear_bhb_loop+0x50/0xa0 [ 391.149470][ T9501] ? clear_bhb_loop+0x50/0xa0 [ 391.154159][ T9501] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 391.160174][ T9501] RIP: 0033:0x7f1b1efaebe9 [ 391.164608][ T9501] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 391.184220][ T9501] RSP: 002b:00007f1b1da17038 EFLAGS: 00000246 ORIG_RAX: 0000000000000035 [ 391.192647][ T9501] RAX: ffffffffffffffda RBX: 00007f1b1f1d5fa0 RCX: 00007f1b1efaebe9 [ 391.200807][ T9501] RDX: 000000000000000a RSI: 0000000000000000 RDI: 0000000000000010 [ 391.208784][ T9501] RBP: 00007f1b1da17090 R08: 0000000000000000 R09: 0000000000000000 [ 391.216760][ T9501] R10: 0000200000000080 R11: 0000000000000246 R12: 0000000000000001 [ 391.224736][ T9501] R13: 00007f1b1f1d6038 R14: 00007f1b1f1d5fa0 R15: 00007ffd87f113b8 [ 391.232867][ T9501] [ 391.413218][ T9501] socket: no more sockets [ 395.070962][ T9611] device veth0_vlan left promiscuous mode [ 395.077999][ T9611] device veth0_vlan entered promiscuous mode [ 396.709034][ T30] audit: type=1400 audit(1754694704.153:154): avc: denied { create } for pid=9677 comm="syz.3.3030" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bluetooth_socket permissive=1 [ 396.785749][ T9672] device syzkaller0 entered promiscuous mode [ 398.981527][ T9705] device syzkaller0 entered promiscuous mode [ 401.872021][ T9765] device veth0_vlan left promiscuous mode [ 401.878112][ T9765] device veth0_vlan entered promiscuous mode [ 401.886965][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 401.898021][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 401.968915][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 402.234527][ T9793] tap0: tun_chr_ioctl cmd 2147767520 [ 402.279191][ T9790] tap0: tun_chr_ioctl cmd 1074025680 [ 406.271579][ T9884] device gretap0 entered promiscuous mode [ 406.405802][ T1158] device veth0_vlan left promiscuous mode [ 409.473425][ T9979] device gretap0 entered promiscuous mode [ 409.523213][ T1158] device bridge_slave_1 left promiscuous mode [ 409.529517][ T1158] bridge0: port 2(bridge_slave_1) entered disabled state [ 409.538966][ T1158] device bridge_slave_0 left promiscuous mode [ 409.545256][ T1158] bridge0: port 1(bridge_slave_0) entered disabled state [ 409.554544][ T1158] device veth1_macvtap left promiscuous mode [ 409.560587][ T1158] device veth0_vlan left promiscuous mode [ 412.442543][T10062] device gretap0 entered promiscuous mode SYZFAIL: tun: ioctl(TUNSETIFF) failed (errno 25: Inappropriate ioctl for device) loop exited with status 67 SYZFAIL: tun: ioctl(TUNSETIFF) failed (errno 25: Inappropriate ioctl for device) loop exited with status 67 SYZFAIL: tun: ioctl(TUNSETIFF) failed (errno 25: Inappropriate ioctl for device) loop exited with status 67 SYZFAIL: tun: ioctl(TUNSETIFF) failed (errno 25: Inappropriate ioctl for device) loop exited with status 67 SYZFAIL: tun: ioctl(TUNSETIFF) failed (errno 25: Inappropriate ioctl for device) loop exited with status 67 SYZFAIL: tun: ioctl(TUNSETIFF) failed (errno 25: Inappropriate ioctl for device) loop exited with status 67 SYZFAIL: tun: ioctl(TUNSETIFF) failed (errno 25: Inappropriate ioctl for device) loop exited with status 67 SYZFAIL: tun: ioctl(TUNSETIFF) failed (errno 25: Inappropriate ioctl for device) loop exited with status 67 SYZFAIL: tun: ioctl(TUNSETIFF) failed (errno 25: Inappropriate ioctl for device) loop exited with status 67 SYZFAIL: tun: ioctl(TUNSETIFF) failed (errno 25: Inappropriate ioctl for device) loop exited with status 67 SYZFAIL: tun: ioctl(TUNSETIFF) failed (errno 25: Inappropriate ioctl for device) loop exited with status 67 SYZFAIL: tun: ioctl(TUNSETIFF) failed (errno 25: Inappropriate ioctl for device) loop exited with status 67 SYZFAIL: tun: ioctl(TUNSETIFF) failed (errno 25: Inappropriate ioctl for device) loop exited with status 67 SYZFAIL: tun: ioctl(TUNSETIFF) failed (errno 25: Inappropriate ioctl for device) loop exited with status 67 SYZFAIL: tun: ioctl(TUNSETIFF) failed (errno 25: Inappropriate ioctl for device) loop exited with status 67 SYZFAIL: tun: ioctl(TUNSETIFF) failed (errno 25: Inappropriate ioctl for device) loop exited with status 67 SYZFAIL: tun: ioctl(TUNSETIFF) failed (errno 25: Inappropriate ioctl for device) loop exited with status 67 SYZFAIL: tun: ioctl(TUNSETIFF) failed (errno 25: Inappropriate ioctl for device) loop exited with status 67 SYZFAIL: tun: ioctl(TUNSETIFF) failed (errno 25: Inappropriate ioctl for device) loop exited with status 67 SYZFAIL: tun: ioctl(TUNSETIFF) failed (errno 25: Inappropriate ioctl for device) loop exited with status 67 SYZFAIL: tun: ioctl(TUNSETIFF) failed (errno 25: Inappropriate ioctl for device) loop exited with status 67 SYZFAIL: repeatedly failed to execute the program proc=3 req=3077 state=3 status=67 (errno 32: Broken pipe) [ 414.397596][ T30] audit: type=1400 audit(1754694721.823:155): avc: denied { write } for pid=273 comm="syz-executor" path="pipe:[14597]" dev="pipefs" ino=14597 scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:sshd_t tclass=fifo_file permissive=1 [ 416.204331][ T1158] device bridge_slave_1 left promiscuous mode [ 416.210476][ T1158] bridge0: port 2(bridge_slave_1) entered disabled state [ 416.218045][ T1158] device bridge_slave_0 left promiscuous mode [ 416.224534][ T1158] bridge0: port 1(bridge_slave_0) entered disabled state [ 416.232433][ T1158] device veth1_macvtap left promiscuous mode [ 416.238493][ T1158] device veth0_vlan left promiscuous mode [ 416.244436][ T1158] device veth1_macvtap left promiscuous mode [ 416.250496][ T1158] device veth0_vlan left promiscuous mode [ 418.003400][ T1158] device bridge_slave_1 left promiscuous mode [ 418.009512][ T1158] bridge0: port 2(bridge_slave_1) entered disabled state [ 418.017052][ T1158] device bridge_slave_0 left promiscuous mode [ 418.023355][ T1158] bridge0: port 1(bridge_slave_0) entered disabled state [ 418.031501][ T1158] device veth1_macvtap left promiscuous mode [ 418.037593][ T1158] device veth0_vlan left promiscuous mode