last executing test programs: 4.923386387s ago: executing program 0 (id=7472): socketpair$unix(0x1, 0x2, 0x0, 0x0) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x11, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="0a00000007000000ff0f00000700000000000000", @ANYRES32, @ANYBLOB], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000001"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) perf_event_open(&(0x7f0000000380)={0x4, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x0, 0x10000000}, 0x0, 0xc8, 0xffff, 0x5, 0xf9, 0x0, 0x2, 0x0, 0xffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xa, 0x4, 0xffd, 0x7, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[], 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000200)={{r1}, &(0x7f0000000180), &(0x7f00000001c0)=r0}, 0x20) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000b40)='neigh_create\x00', r2}, 0x10) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$MAP_CREATE(0x0, 0x0, 0x48) perf_event_open(0x0, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00'}, 0x10) bpf$ITER_CREATE(0xb, 0x0, 0x0) recvmsg$unix(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x420, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7fffffffffffffff, 0x2}, 0x0, 0x0, 0xfffffffd, 0xd, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f0000001300)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sk_skb, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000b40)='neigh_create\x00', r3}, 0x10) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) close(r5) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="8fedcb7907001175f37538e486dd6317ce22000000fffe8000000000000010"], 0xfdef) recvmsg$unix(r4, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0xffffffffffffffae}, 0x0) write$cgroup_subtree(r6, &(0x7f0000000000)=ANY=[], 0xfdef) 4.888923837s ago: executing program 0 (id=7475): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[], 0x48) bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="160000000000000004000000ff"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0, 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f00000004c0)={r0, 0x0, &(0x7f0000000b00)=""/151}, 0x20) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={&(0x7f0000000180)='workqueue_activate_work\x00', r1}, 0x10) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000300)={0xffffffffffffffff}) setsockopt$sock_attach_bpf(r2, 0x1, 0x1d, &(0x7f0000000200), 0x4) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x10020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x700000, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000040)=@base={0x4, 0x4, 0x4, 0x10000, 0x808, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x3000000, 0xffffffff, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) socketpair$tipc(0x1e, 0x2, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000003640)={0x0, 0x0, 0x0}, 0xc040) r3 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={0xffffffffffffffff, 0x18000000000002a0, 0x13, 0x0, &(0x7f0000000180)="09e403c6631e3974122e79d21c6059b2e8461d", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) syz_clone(0x0, 0x0, 0x9000, 0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000080)='sched_switch\x00', r3}, 0x10) bpf$MAP_CREATE_RINGBUF(0x0, 0x0, 0x0) write$cgroup_freezer_state(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfeffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000000c0), &(0x7f0000000140), 0x5}, 0x38) bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x10, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4000000000000007910480000000000610400000000000095000000"], &(0x7f0000003ff6)='GPL\x00', 0x2, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sk_msg, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) 4.786535359s ago: executing program 2 (id=7478): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffff"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[], 0x48) bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="160000000000000004000000ff"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0, 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f00000004c0)={r0, 0x0, &(0x7f0000000b00)=""/151}, 0x20) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={&(0x7f0000000180)='workqueue_activate_work\x00', r1}, 0x10) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000300)={0xffffffffffffffff}) setsockopt$sock_attach_bpf(r2, 0x1, 0x1d, &(0x7f0000000200), 0x4) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x10020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x700000, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000040)=@base={0x4, 0x4, 0x4, 0x10000, 0x808, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x3000000, 0xffffffff, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) socketpair$tipc(0x1e, 0x2, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000003640)={0x0, 0x0, 0x0}, 0xc040) r3 = bpf$PROG_LOAD(0x5, 0x0, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x5, &(0x7f0000000300)=ANY=[@ANYBLOB="bf16000000000000b70700000100f0ff4070000000001000480000000000e1ff95000000000000002ba7e1d30cb599e83f040000f300000000bd01212fb56f040026fbfefc41056bd8174b79ed317142fa9ea4158123751c5c652fbc1626cca2a2ad75806150ae0209e62f51ee988e6e06c8206ac6939fc404004900c788b277be1cb79b0a4dcf23d410f6accd3641110bec4e90a634199e07f8f6eb968f200e011ea665c45a34b8580218ce740068720000074e8b1715807ea0ca469e468eea3fd2f73902ebcfcf49822775985bf313405b367e81c700000040000000000200000000005335000000143ea70c2ab40c7cb70cc8943a6d60d7c4900282e147d08e0af4b29df814f5691db43a5c00000004000000000089faff01210cce39bf405f1e846c12423a164a330100846f26ad03dd65873d9f87463ad6f7c2e8ee1a39244960b318778f2a047f6d5bc24fef5d7d6155102b1ced1e8019e63c850af895abba14f6fbd7fb5e2a431ab914040000000000010092c9f4609646b6c5c29647d2f950a959cf9938d6dfcb8ed2cbdc2ba9d580609e31c3fa90812a533ce206e7e57a79d6fce424c2204dd418c005479ecbb720d4025b01b6b80acacab19bdfb15a32a4fd67ce446adb431d07db79240acaf091231b986e77d05d988d6efdffdf48dca02113a38300cabf2b7543ffc166955709009e000000000061629d1822f720ec23812770d72c700a44e113d17088fdd00600000f7889b8c7044f56ff030000000000006cd4970400cac6f45a6922ded2e29514af463f747c08f4010586903500000000000000000000be34cf0f9d640dd782ac0cbc46903243d0d0f4bc7f253d0500000032daaf281c450e64c33aac8f23e7d1c94c4505a9839688b008c370494f6734b771546d9552d3bb2da0d000000000000000009125c97f0400f5e1671bc5eb7739daa7820a91cb0e732df2ae0000c747e00a4fbfe8942fa859cd28bdaa1509309926c77fbcb15ec58b42b400005a6b649dd5f13cd776e6c7c4b5c4b0de20e033b378553ead4c8cc530b62c36364e6505992209bdbc6203da7a3797246a6adef071102f0aa2c40095ddd05176f5cb8bd99e1ba0f9568f3e3876bba7bf973334e7919a080000000000000004fb996ad919f7e9672ce107000000ad882f2aead166c94500be902ee7dabc768eb9ec13f334aae90981ecaf5f744f22f2e45afe2c9e8632276cffe5f1fc215c0797d0244cf1ce269d10525745caaa3f77d1b80116cb9a38400242010000000100000091a0116f4693133138583da5e10b434697b0443b7b4ddfb3ace29e16e5a881336aad0974269a1025e2a9a135c0508af1aec2926627b43bba1229a7466bdca64f514b7911458da09fe8681916d408d753226a83ae2434ccd3fc508216aea86833030f569d61dc998620fcf4eeb92e7bc511df63c53b82514493b8f3c74f44ba184d60e87612024da1a1ebe316923865f037c01d71b5de81121046d84b18acb5cbea7eecad9b6dd46ed83515cd9f140e5f00019be25b5910a3193e90be231a05fd82e6003969c3f081ff1d0eb50a04d14644234828cbb5aaa0ece702abdd425fa25ae04a2315c89064df633700000000d9e5953ea67310993d01000000000000003ac753358791b1490273ca535e05b11d815237743a5b79ad45de2a3c91257f02c2f30f5513662809073710937ed0055b238f466e1442f8ec7a5b394228035039ceeb452dca75f9ff5332b4c4777a58a0aa9a821667c68549e9da89ad4274ce2d3d7619936768a84a1465fff4eedba55955434f132ab7b884057aeb68f3d675a79907a72ace70902459f6950a06a03507838231a335ae759ed25534f2e90a7def4b3d4af7fd47ab1a701e4b7a7dfc1d12775ed0a31bc7b5855880aa767e68fe6b7aa5ac115724b6cb8fcebb67719eccd87b06b38566cf61ad2f307a79ce9801837bf0bd3af0271de700eef2795d28cb0017000000000000000000e052d93194121b774d21a0317d0346078400004652c769fd3d3e661a2fb511164f1502ab2ac4eb3f19c042163e0bdb88b82de384a8055e8b1e24294b0546cce481ff5618b7b9585dbb64d66debf219fa479abf22f3d64fe82e466ea6f27859946e72f80bb1c9cfcde57b79625e2979fe689a5a246cbbd488f43f46b2536f175f46dfb27d5229467270246ab53616c46edf34c559d3de0c59ca3305e66825715e5e4cd5b54c1b05c09f04337a76a30373baac3ecec91fd546308a0004be94dfab28c2a51dc816df0000000000c12254f041804f7f7074356789b1d4dd55f3e045a48241a4ce04d06acb2cf11eab759ba78da5da0f26126d4cf2c73e5f94030000040000000000000000c301985d603403592486204054be3fdda91f9e315886941928e5a8bc1a00e69a98c0a8f7192f6ee93cc4124cf4e7610915efc08c834a44e1d685d6835a40b5bc615949cbcd98d044fa492aa38717481455e86dcd7816ad8940bd1995369d89ae6eadeb9117e8b94ab422c8d62f858875dccdbc89572231ef5d6df6a9c55f8df763c7c64da7cc017e1e3f5cd4cb9fe6d19b11d4d38239d318016e622b9683b7e46be64dc097982e23462392a0cd05afb2e060fd42ef00dfbd057311aab94f307d10c7a1af0d8e5a0fcb547475d13c0000000000000000f1cc97103d714d1abb901f866d9d629b4fb185f45790517c4a0f5c6a5024e3359e8d83e3f6edf9e2afb5ab59c7b2b45cfb0a3c1303a98e4ed531ac11cca1cd744b431de74c7cd6533adaa8ec749061b2959d53da626aa189781dc1be4d5c81aebc0cada819895b377d6cf0a7878ba99864ae84464744c605646caf2e06b13eba7ba10acf77d91b2297e9573abb0a4da534d735a223626502b308daf7835780fa6f4e410000000000fb00000000000000000000b94952139bd4bdbccc5e334c49584655c4fce8c5bb7c54664aef6da54b4b49926c4be9ee4659153d9fa95d07cc4efdab2c5f4503148d0255d0b748366dafe042d78479c21d832e1431ed6d646d13e8e7230300920a5642bbed1dee9b46b6f02e572024ccf3c8edd82660e5d74c52be71d780c300000000000000000000000000000000000044ff72f96f084f4b6cdcb1b4a9d8e9f99f1b85497d0c3df704c8a0034c09caeeb0e34799b755649883539258a7b33dcef15d8fd1953ebaaa3cff81a0de7a05a440f20f6b273ceb8678f10378b670be7504dabd1471355d853292775d0366891f0bcf0a6087ed4f1f25ef52394db3e9d8318bbb9baff3db95bfd68a08ded5027a7ca2a64ca081c6b2f7b895cdf98b763ebab9451c65eced6f5f97a541210806d885762ac3150225036c7eccd7a05593abd963f9a02df58085115e54f675e6a08d25b5722cabf989b4bbc562e073b81bae61f05c5e1f90e021340b60cc5fb8fdb09b6d20b092b70f77f0f428d2000000000000000000000000006cc6f64f583a26a78f7f417f66c0af32f5194ddfce51e5aff28f621bb2fd2a5ab719823488d6e869b08d3d4ac7950c60144cf77437e29895a23282e3c65e015d1c334832a90ee77d93596e3f12e9ca8c67c7f3c9b66c9cb03edec184ad1d9544c7a3be250e471dca00000078544d79c0efe4094e561eeb26ee4c81106d03c004bc1589ef6e13648999c8735e2634e89aaa90c571fa3c07238697b1db783c52715055445e96995fe3273b0346b03fc742c06aa3947e0d9cf0c99b5e245ede85893112deea8bd3355a32ec15e1242f170a51f28cea4105541e96a52da4984d26bd29cb0623f00c6b0a4c00ad406d729babc9d1550a683c349017a340444000000000000000000000920ca49f7cc8194aaebdcae5a62bb7587b57f41f1c2034911f23e6bd0291b3319f03a0a15dea685a8ab75b3c60391afa5483231305402b52a8f9863800f127d6b4518f73a847ca583e855d70c6a4a53f61ad753d5e740db44afd32b019d9e8b41361c2c104fe52837a19dd6952fe2724c0105ab158a54a6a73000000000000000000000000b0d135da438cbe303f3ae070def97d6649b5a693ff5c788e5a406e1d06942ed51bff073011f6e6c29d3ea22e5fc26c7fbe37656229a6a12857ae9ed131ccdd513066bc9422ec38a1dc5212986d9bc330a23eb3b200af1a3678c2bfbe4b4ba6e8471495f6e82c5ee425973c590253e875352a3acaee044868f9b80f8fdc9d402007bb4c8df1b69d3d2b364ec9e4ed2f554118684eff1adf5b49b6b29232198e682dfa45dced8b332c40dc37dfe7a59e252ddc33ea9072dcd697a700cfac90b487660795f5645db61fa3e4835f936984200000000000000000008e9f7bc3a00cd72ced7684e264e45398f7087734fcf2023a7a4c880f562f46f14cdc1bf472d74bc0c777b1021ff75de086c08f72a41399d3a3065b2f50a531cc90edbf88370ff50ba1aa6cc59076165a3ab90a3c544b534c4368af8a022c09da0dc78ab8be0b952e24719e56edcb4ef18e0000000000"], &(0x7f0000000140)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r4, 0x18000000000002a0, 0x13, 0x0, &(0x7f0000000180)="09e403c6631e3974122e79d21c6059b2e8461d", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) syz_clone(0x0, 0x0, 0x9000, 0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000080)='sched_switch\x00', r3}, 0x10) bpf$MAP_CREATE_RINGBUF(0x0, 0x0, 0x0) write$cgroup_freezer_state(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfeffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000000c0), &(0x7f0000000140), 0x5}, 0x38) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000140)='sched_switch\x00', r5}, 0x10) r6 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x10, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4000000000000007910480000000000610400000000000095000000"], 0x0, 0x2, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @sk_msg, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) close(r6) 3.865072163s ago: executing program 0 (id=7483): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000007000000095"], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, @void, @value}, 0x90) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000680)='sched_switch\x00', r0}, 0x10) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x15, 0x4, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5, 0x3}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000180)={'syzkaller0\x00', 0x7101}) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) close(r2) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1800000000000000000000004b64ffec8500000050000000850000000f00000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000100)='kfree\x00', r3}, 0x10) ioctl$SIOCSIFHWADDR(r2, 0x8943, &(0x7f0000002280)={'syzkaller0\x00'}) close(r1) r4 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="02000000040000000800000001"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000700)={0x0, 0x10, &(0x7f0000000580)=ANY=[@ANYBLOB="18050000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r4], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x14, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x11, 0x10, &(0x7f0000000580)=ANY=[], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000006c0)={&(0x7f0000000700)='kmem_cache_free\x00', r5}, 0x10) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}, 0x0, 0xc8, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0x80000000000000, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r7) recvmsg$unix(r6, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r8, 0x0, 0x0) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000580), 0x100}, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000000)='percpu_alloc_percpu\x00'}, 0x42) perf_event_open(0x0, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) 3.608702817s ago: executing program 2 (id=7485): close(0xffffffffffffffff) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, 0x0, &(0x7f0000000000)='GPL\x00', 0x5, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000000)=ANY=[@ANYBLOB="9feb9d00180000000000000028060000280000000200000001"], 0x0, 0x42, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0xc, 0x0, &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2c, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x7, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={0x0}, 0x18) r0 = perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x100, 0x4}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000580)=@base={0x16, 0x0, 0x4, 0x10001, 0x8001, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @value, @void, @void, @value}, 0x50) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r2}, 0x10) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000058"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r3}, 0x10) r4 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002ac0)={0x1a, 0x3, &(0x7f0000000180)=@framed, &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x19, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x2008, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={0x0, r4}, 0x10) write$cgroup_devices(r0, &(0x7f0000000300)={'b', ' *:* ', 'w\x00'}, 0x8) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x13, &(0x7f0000000240)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020641700000000002020007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000400000018010000696c6c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000400000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000040)='kmem_cache_free\x00', r5}, 0x10) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x1}, 0x0, 0xc8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r7) recvmsg$unix(r6, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r8, &(0x7f0000001cc0)=ANY=[@ANYBLOB="8fedcb7907031175f37538e486dd630080fc000b2c00db5b686158bbcfe8875a060300001123000000000000000000000000ac1414aa2c"], 0xfdef) ioctl$TUNSETCARRIER(0xffffffffffffffff, 0x400454e2, &(0x7f0000000000)=0x3d) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'veth1_virt_wifi\x00'}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r9, 0x8946, &(0x7f0000000080)) 3.441158509s ago: executing program 3 (id=7487): socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff}) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x14, &(0x7f0000000c00)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007100000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000082000000"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000040)='kmem_cache_free\x00', r2}, 0x10) sendmsg$inet(r0, &(0x7f0000000d40)={0x0, 0x7000000, &(0x7f00000023c0)=[{&(0x7f0000000b40)='?', 0x1}, {0x0, 0x1}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x9}, 0x20001) 3.440756109s ago: executing program 2 (id=7488): bpf$PROG_BIND_MAP(0x23, 0x0, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x1c1341, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller0\x00', 0x84aebfbd6349b7f2}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000400)={0xffffffffffffffff, 0xe0, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000000200)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x4, 0x4, &(0x7f0000000280)=[0x0, 0x0, 0x0, 0x0], &(0x7f00000002c0)=[0x0, 0x0, 0x0, 0x0], 0x0, 0xe1, &(0x7f0000000300)=[{}, {}, {}, {}, {}], 0x28, 0x10, &(0x7f0000000340), &(0x7f0000000380), 0x8, 0x9f, 0x8, 0x8, &(0x7f00000003c0)}}, 0x10) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x1, 0x4, 0x7fe2, 0x1, 0x0, 0xffffffffffffffff, 0x0, '\x00', r1, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000001000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='kmem_cache_free\x00', r3}, 0x10) sendmsg$tipc(0xffffffffffffffff, 0x0, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x8981, 0x0) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002c80)={0x3, 0x5, &(0x7f0000000000)=@framed={{0x18, 0x2}, [@call={0x85, 0x0, 0x0, 0x18}, @call={0x85, 0x0, 0x0, 0x2a}]}, &(0x7f0000000080)='GPL\x00', 0x4, 0xc0, &(0x7f0000000140)=""/192, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) close(r4) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000000c0)) ioctl$SIOCSIFHWADDR(r4, 0x8914, &(0x7f0000002280)={'syzkaller0\x00', @link_local}) write$cgroup_subtree(r0, &(0x7f0000000180)=ANY=[], 0xfdef) syz_clone(0x640c7000, 0x0, 0x0, 0x0, 0x0, 0x0) 3.34296323s ago: executing program 3 (id=7490): bpf$PROG_LOAD_XDP(0x5, &(0x7f00000004c0)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000800000000000000000", @ANYRES32], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="1b00000000000000000000000080000000000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="0000000000000000000000000000000000000000000000ffff000000"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x18, 0x7, &(0x7f0000000540)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d0000001801000020696c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) perf_event_open(&(0x7f0000000380)={0x4, 0x80, 0x1, 0x0, 0x0, 0x2, 0x0, 0x0, 0x34000, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x2, 0x6}, 0x0, 0xc8, 0xfffffffe, 0x0, 0x9, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='io.stat\x00', 0x26e1, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x11, 0xc, &(0x7f0000000640)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x84, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x6, 0x80, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000080)}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) close(r3) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="8fedcb7907001175f37538e486dd6317ce22000000fffe80"], 0xfdef) recvmsg$unix(r2, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0xffffffffffffffae}, 0x0) write$cgroup_subtree(r4, &(0x7f0000000000)=ANY=[], 0xfdef) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f00000001c0)='sched_switch\x00', r1}, 0x10) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_bp={0x0, 0x2}, 0x800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r6 = openat$cgroup_procs(r5, &(0x7f00000002c0)='cgroup.threads\x00', 0x2, 0x0) write$cgroup_pid(r6, 0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) r7 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) openat$ppp(0xffffffffffffff9c, &(0x7f0000000640), 0x0, 0x0) r8 = openat$cgroup_procs(r7, &(0x7f0000000840)='cgroup.procs\x00', 0x2, 0x0) r9 = bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0xd, 0xb, &(0x7f0000000240)=ANY=[@ANYBLOB="06458b0001000000850000004e0000005b2afeff00000009ee2b536bbbe8dc2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000009000000850000"], &(0x7f0000000300)='GPL\x00', 0x9, 0x0, 0x0, 0x40f00, 0x26, '\x00', 0x0, @sock_ops, 0xffffffffffffffff, 0x8, &(0x7f0000000340)={0x0, 0x5}, 0x8, 0x10, &(0x7f0000000380)={0x0, 0x4, 0x73, 0x7}, 0x10, 0x0, r1, 0x6, 0x0, &(0x7f00000003c0)=[{0x0, 0x4, 0xc, 0x4}, {0x3, 0x3, 0xe, 0x5ece48105434dadb}, {0x6, 0x5, 0x1, 0x9}, {0x0, 0x2, 0xe, 0xd}, {0x0, 0x1, 0xf, 0x5}, {0x0, 0x5, 0x0, 0x2}], 0x10, 0x10, @void, @value}, 0x94) bpf$BPF_PROG_TEST_RUN_LIVE(0xa, &(0x7f00000008c0)={r9, 0x0, 0x86, 0x0, &(0x7f0000000680)="a8bf38f367fa179bf4174d0e959303fb4a2c6959687a02da24cb39327e693b868160ee12cbd1e3f261fcb512cd2aa006927f461a6f0ac0a075510d38b6beb79ef79f111c40337724ff4ce871356ac380261a7e428854e9455aa31a03451b525e0edbd3bf11ed9d4eb0c827b3e99ca78f5e5cd272aef75c7859b1a93377da3d98d53dcedf5112", 0x0, 0xc, 0x0, 0x23, 0x0, &(0x7f0000000740)="2545ab49c1dad4e9c43fd9c100"/35, 0x0, 0x2, 0x0, 0x82}, 0x50) write$cgroup_pid(r8, &(0x7f0000000880), 0x12) bpf$MAP_CREATE(0x0, 0x0, 0x48) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f00000002c0)='kfree\x00'}, 0x10) syz_clone(0x22023500, 0x0, 0x0, 0x0, 0x0, 0x0) 3.281797431s ago: executing program 0 (id=7491): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=@base={0x7, 0x4, 0x8, 0x1, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000440)=@base={0x1, 0x40, 0x6, 0x8, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)=@base={0xc, 0x4, 0x4, 0x9, 0x0, r1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000002000000b704000000000000850000005700000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x141141, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f00000000c0)={'syzkaller0\x00', 0x84aebfbd6349b7f2}) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000140)='sched_switch\x00', r4}, 0x10) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x8}, 0x0, 0x6, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000001fc0)=ANY=[@ANYBLOB="19000000040000000800000008"], 0x48) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000001b518110000", @ANYRES32=r6, @ANYBLOB], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0x22, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000380)={{r6}, &(0x7f0000000000), &(0x7f00000005c0)=r7}, 0x20) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r8}, 0x10) r9 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002ac0)={0x1a, 0x3, &(0x7f0000000180)=@framed, &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x19, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x2008, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={0x0, r9}, 0x10) ioctl$PERF_EVENT_IOC_SET_FILTER(r5, 0x8914, &(0x7f0000000080)) r10 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x11, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1801000021000000000000004bc311ec8500000075000000a70000000800000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f00000000c0)='percpu_alloc_percpu\x00', r10}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000107b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000925e850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r11 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x8, &(0x7f0000000740)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r0, @ANYBLOB="0000000000000000b703000000030000850000001b000000b70000000000000095"], &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='sys_enter\x00', r11}, 0x18) gettid() 3.252560542s ago: executing program 4 (id=7493): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[], 0x48) bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="160000000000000004000000ff"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0, 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f00000004c0)={r0, 0x0, &(0x7f0000000b00)=""/151}, 0x20) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={&(0x7f0000000180)='workqueue_activate_work\x00', r1}, 0x10) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000300)={0xffffffffffffffff}) setsockopt$sock_attach_bpf(r2, 0x1, 0x1d, &(0x7f0000000200), 0x4) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x10020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x700000, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000040)=@base={0x4, 0x4, 0x4, 0x10000, 0x808, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x3000000, 0xffffffff, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) socketpair$tipc(0x1e, 0x2, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000003640)={0x0, 0x0, 0x0}, 0xc040) r3 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={0xffffffffffffffff, 0x18000000000002a0, 0x13, 0x0, &(0x7f0000000180)="09e403c6631e3974122e79d21c6059b2e8461d", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) syz_clone(0x0, 0x0, 0x9000, 0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000080)='sched_switch\x00', r3}, 0x10) bpf$MAP_CREATE_RINGBUF(0x0, 0x0, 0x0) write$cgroup_freezer_state(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfeffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000000c0), &(0x7f0000000140), 0x5}, 0x38) bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x10, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4000000000000007910480000000000610400000000000095000000"], &(0x7f0000003ff6)='GPL\x00', 0x2, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sk_msg, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) 2.936836406s ago: executing program 0 (id=7495): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffff"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[], 0x48) bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="160000000000000004000000ff"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0, 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f00000004c0)={r0, 0x0, &(0x7f0000000b00)=""/151}, 0x20) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={&(0x7f0000000180)='workqueue_activate_work\x00', r1}, 0x10) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000300)={0xffffffffffffffff}) setsockopt$sock_attach_bpf(r2, 0x1, 0x1d, &(0x7f0000000200), 0x4) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x10020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x700000, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000040)=@base={0x4, 0x4, 0x4, 0x10000, 0x808, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x3000000, 0xffffffff, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) socketpair$tipc(0x1e, 0x2, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000003640)={0x0, 0x0, 0x0}, 0xc040) r3 = bpf$PROG_LOAD(0x5, 0x0, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x5, &(0x7f0000000300)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r4, 0x18000000000002a0, 0x13, 0x0, &(0x7f0000000180)="09e403c6631e3974122e79d21c6059b2e8461d", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) syz_clone(0x0, 0x0, 0x9000, 0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000080)='sched_switch\x00', r3}, 0x10) bpf$MAP_CREATE_RINGBUF(0x0, 0x0, 0x0) write$cgroup_freezer_state(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfeffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000000c0), &(0x7f0000000140), 0x5}, 0x38) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000140)='sched_switch\x00', r5}, 0x10) r6 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x10, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4000000000000007910480000000000610400000000000095000000"], 0x0, 0x2, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @sk_msg, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) close(r6) 2.385365815s ago: executing program 3 (id=7496): bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000380)={0x11, 0x4, &(0x7f00000002c0)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x8020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x40, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0xfbffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(0x0, 0x0, 0x0, r0, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000580)=ANY=[@ANYBLOB="05000000050000000200000004"], 0x48) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x14, &(0x7f0000000000)=ANY=[@ANYBLOB="1802000000000000000000000000000018010000786c6c2500000000070000007b1af8ff00000000bfa100000000000007010000f8ffffffb700000000000000b703000000000000850000007000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1d, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000004c0)={&(0x7f0000000300)='tlb_flush\x00', r3}, 0x10) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="06000000040000000300000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000bc0)={0x1d, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="0b00000005000000000400000900000001"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r5], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x40e00, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r6}, 0x10) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={0xffffffffffffffff, 0x18000000000002a0, 0x0, 0x0, 0x0, 0x0, 0x2f, 0xe8034000, 0x0, 0x0, 0x0, 0x0, 0x5dc}, 0x50) perf_event_open$cgroup(&(0x7f0000000000)={0x6, 0x80, 0xb7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000539d00007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$MAP_CREATE(0x0, &(0x7f0000000740)=ANY=[@ANYBLOB="1900000004000000040000000800400000000000", @ANYRES32, @ANYBLOB='\a\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="00000000000000000300"/26], 0x50) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000500)={&(0x7f0000000680), 0x0, &(0x7f0000000840)="be64cac193d3ef74cb0c4e91363c73b6ca988f667841659933ed5f6f444b6201e566a677815212c5a2b715a2fe0681968144a6f82a4232417618cfbab4f68fa331a13283b776b92677ed505b16f9b1f4c4b226af78bb0e30d4f3d59a95433894d1057808333c7168e8bfe7a55dde2117b7aaf744a9f8654694faa3ccd163d02e69f53e40af707882691bbd8513d0712840ac0978ba23f36e02da600a79cd54831ccb8b6af264cd9d8ea976d40601b7027a67d1fe2132", &(0x7f0000000900)="e65a940913363138cdc83fea225b7c0dca530bd59db0d5518397463c1eddfecfad6effaf3b9344609738857d51d2e2b797909d715ace74b72ecbef05222f77b04049a64763a4ed8377eb6c1796bb531051bab2c71cf19982f13391fc73ba2c1b2b36e4c0784fbe051d6fdb23f11c79c3708928dd6ed03cb1e71064039fc4ce62abe306e60b", 0x8000, 0xffffffffffffffff, 0x4}, 0x38) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000140)='sched_switch\x00', r7}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b7030000ddffffff850000002d000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'veth1\x00'}) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000280)=@bpf_lsm={0x6, 0x3, &(0x7f00000003c0)=ANY=[@ANYRES64=r1], &(0x7f0000000140)='GPL\x00', 0x4000000, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$ENABLE_STATS(0x20, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x7, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c, @void, @value}, 0x94) r8 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r8, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000020000088500000082"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) 2.333132365s ago: executing program 1 (id=7497): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$ENABLE_STATS(0x20, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x48) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x9, 0x143fdd, 0x80, 0x1, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x10020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_DELETE_ELEM(0x2, &(0x7f0000000400)={r0, 0x0, 0x20000000}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000107b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000925e8500000001"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="0b0000000500000008040000cd00000001"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r1], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000300)='sys_enter\x00', r2}, 0x10) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) 2.305862166s ago: executing program 2 (id=7498): perf_event_open$cgroup(&(0x7f0000000300)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0, 0x2}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000380)={0x11, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="1801000000000000000000000000ea04850000005000000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) bpf$MAP_DELETE_ELEM(0x2, &(0x7f0000000400)={0xffffffffffffffff, &(0x7f0000000180), 0x20000000}, 0x20) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="16000000000000000400000001"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000b40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000058"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r2}, 0x10) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xc8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000200)=ANY=[], 0xffffffffffffff0a) close(r4) recvmsg$unix(r3, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r5, &(0x7f0000000000)=ANY=[], 0xfdef) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={0x0, r0}, 0x18) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz1\x00', 0x1ff) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup/syz1\x00', 0x200002, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xf, 0x5}, 0x100e64, 0xc78}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.freeze\x00', 0x26e1, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000280)=ANY=[@ANYBLOB], &(0x7f0000000b80)=""/4090, 0x5e, 0xffa, 0x1, 0x0, 0x0, @void, @value}, 0x28) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000005c0)='cpuacct.usage_percpu\x00', 0x26e1, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r6, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001d80)=ANY=[@ANYBLOB="28010000000000000100000001"], 0x128}, 0x0) socketpair$nbd(0x1, 0x1, 0x0, 0x0) socketpair(0x0, 0x0, 0x0, &(0x7f0000000000)) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8946, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000140)={0x9, 0x4, &(0x7f00000005c0)=ANY=[@ANYBLOB="18000000000000000000000000000000711236000000000095000007000000009836cc18ab08d4e47419593314221187738641c35ae9def4974d4f41f41853d02bc0fa24caa39c7c227bb4804beca2db6d81cf4e7754975b0db2be5894e20b0264219fc05e113dc593428b893f8c2df8b9ec93bd51197f7f73f33770696542fa93a293823caf8091ed0ae374a0dce35453bdb8893ccf7da39cf28028ad89c7406d63891acfae84487f40d2d137e6b98550d7de9f59bd3829f2f084fcaf04d35766"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0xd, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) 2.239984597s ago: executing program 4 (id=7499): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="19000000040000000400000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000005c0)={&(0x7f0000000580)='kmem_cache_free\x00', r1}, 0x10) syz_clone(0x2c000000, 0x0, 0x41, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_DELETE_ELEM(0x2, 0x0, 0x0) close(0xffffffffffffffff) 2.102197139s ago: executing program 1 (id=7500): socketpair$unix(0x1, 0x2, 0x0, 0x0) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x11, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="0a00000007000000ff0f00000700000000000000", @ANYRES32, @ANYBLOB], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000001"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) perf_event_open(&(0x7f0000000380)={0x4, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x0, 0x10000000}, 0x0, 0xc8, 0xffff, 0x5, 0xf9, 0x0, 0x2, 0x0, 0xffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xa, 0x4, 0xffd, 0x7, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[], 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000200)={{r1}, &(0x7f0000000180), &(0x7f00000001c0)=r0}, 0x20) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000b40)='neigh_create\x00', r2}, 0x10) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$MAP_CREATE(0x0, 0x0, 0x48) perf_event_open(0x0, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00'}, 0x10) bpf$ITER_CREATE(0xb, 0x0, 0x0) recvmsg$unix(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x420, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7fffffffffffffff, 0x2}, 0x0, 0x0, 0xfffffffd, 0xd, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f0000001300)=ANY=[@ANYBLOB="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"/2503], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sk_skb, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000b40)='neigh_create\x00', r3}, 0x10) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) close(r5) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="8fedcb7907001175f37538e486dd6317ce22000000fffe8000000000000010"], 0xfdef) recvmsg$unix(r4, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0xffffffffffffffae}, 0x0) write$cgroup_subtree(r6, &(0x7f0000000000)=ANY=[], 0xfdef) 2.06108336s ago: executing program 1 (id=7501): socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff}) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x14, &(0x7f0000000c00)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007100000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000082000000"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000040)='kmem_cache_free\x00', r2}, 0x10) sendmsg$inet(r0, &(0x7f0000000d40)={0x0, 0x7000000, &(0x7f00000023c0)=[{&(0x7f0000000b40)='?', 0x1}, {0x0, 0x1}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x9}, 0x20001) 2.00600646s ago: executing program 1 (id=7502): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x4e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @void, @value}, 0x90) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)={[{0x2d, 'pids'}]}, 0x6) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000680)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0x18, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000000)='workqueue_queue_work\x00', r1}, 0x10) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) close(r0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="01000000040000000800000005"], 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x6, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x29, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000003c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000000)='sched_switch\x00', r3}, 0x18) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, 0x0, &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x24, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r4 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x10, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4000000000000007910480000000000610400000000000095000080"], &(0x7f0000003ff6)='GPL\x00', 0x2, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @sk_msg, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x48) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) close(r4) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$OBJ_GET_MAP(0x7, &(0x7f00000001c0)=@o_path={&(0x7f0000000180)='./file0\x00', 0x0, 0x10, r1}, 0x18) r6 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f0000000540)=ANY=[@ANYBLOB="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"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @sk_skb, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x1dd, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x48) r7 = bpf$MAP_CREATE(0x0, &(0x7f0000000680)=ANY=[@ANYBLOB="0f00000004000000040000001200000000000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="00000000000700000000ff000000d11e0000a3a40aaab280799bb27e32688b66510000ca82f6c9b560ede016ec1644838905d167a341ad8baeb867a1617302c5ae50d3004c6823ca0face2f6d99342c0af381d5e2352393200000100"/106], 0x48) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000340)=ANY=[@ANYRES32=r7, @ANYRES32=r6, @ANYBLOB='&\x00'/12, @ANYRES32, @ANYBLOB, @ANYRES64=0x0], 0x10) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000000c0)={{r7}, &(0x7f0000000000), &(0x7f0000000080)=r4}, 0x20) sendmsg$inet(r5, &(0x7f0000000500)={0x0, 0x4003e80, &(0x7f0000001740)=[{&(0x7f0000000280)='>', 0x20000281}], 0x1}, 0x0) 1.992701771s ago: executing program 4 (id=7503): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x4, &(0x7f0000000280)=@framed={{}, [@call={0x85, 0x0, 0x0, 0xe}]}, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x30, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r1 = perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xad, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000500)='percpu_free_percpu\x00', r0}, 0x18) close(r1) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[], 0x48) bpf$PROG_LOAD(0x5, 0x0, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000140)='sched_switch\x00', r2}, 0x10) r3 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x10, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4000000000000007910480000000000610400000000000095000000"], &(0x7f0000003ff6)='GPL\x00', 0x2, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @sk_msg, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x48) close(r3) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0xf, 0x4, 0x4, 0x12, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000000c0)={{r6}, &(0x7f0000000000), &(0x7f0000000080)=r3}, 0x20) recvmsg$unix(r4, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000380)=[{&(0x7f0000001780)=""/4071, 0xfe7}], 0x1}, 0x0) sendmsg$inet(r5, &(0x7f0000000500)={0x0, 0x5e, &(0x7f0000001740)=[{&(0x7f0000000280)='>', 0xfffe}], 0x1}, 0x0) 1.991601371s ago: executing program 0 (id=7504): bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d0000001801000020696c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007000000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000ac0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r0}, 0x10) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000500)=@base={0x5, 0x1, 0x8e, 0xe7c9, 0x1, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$MAP_DELETE_BATCH(0x18, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0xe30a, r1}, 0x38) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0xc8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x10f, 0x87, 0x0, 0x0) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000040)={0x0, 0x0}) close(r2) setsockopt$sock_attach_bpf(r3, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000000180), 0x127) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000040)={0x0, 0x0}) setsockopt$sock_attach_bpf(r4, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x0, 0x6, 0x4, 0x6, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$MAP_DELETE_ELEM(0x2, &(0x7f00000003c0)={0xffffffffffffffff, &(0x7f00000002c0), 0x20000000}, 0x20) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r6) recvmsg$unix(r5, &(0x7f0000000400)={0x0, 0xffffffffffffffbc, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) syz_clone(0x410e6080, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000680)="2fd0fff506094f492faff2f173e1ac871d48eef87bb90a19da77ed4bb5ae2e86f7b0cf112203043f022f05c93af58dc47d13e4ed9d9426f7db4e53422cbc58b6b2e48d2a7570b19a5bdcded6dfa976c4bce46e30294d29a8f2bbfa35a756c52f5861fc73de3cd1c8f287a49685e7518b86f45801c10da574d850fd5c2ad8f247931b3c139b7fa61e4af791a289") 1.934687571s ago: executing program 3 (id=7505): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=@base={0x7, 0x4, 0x8, 0x1, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000440)=@base={0x1, 0x40, 0x6, 0x8, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)=@base={0xc, 0x4, 0x4, 0x9, 0x0, r1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000002000000b704000000000000850000005700000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x141141, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f00000000c0)={'syzkaller0\x00', 0x84aebfbd6349b7f2}) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000140)='sched_switch\x00', r4}, 0x10) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x8}, 0x0, 0x6, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000001fc0)=ANY=[@ANYBLOB="19000000040000000800000008"], 0x48) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000001b518110000", @ANYRES32=r6, @ANYBLOB], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0x22, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000380)={{r6}, &(0x7f0000000000), &(0x7f00000005c0)=r7}, 0x20) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r8}, 0x10) r9 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002ac0)={0x1a, 0x3, &(0x7f0000000180)=@framed, &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x19, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x2008, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={0x0, r9}, 0x10) ioctl$PERF_EVENT_IOC_SET_FILTER(r5, 0x8914, &(0x7f0000000080)) r10 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x11, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1801000021000000000000004bc311ec8500000075000000a70000000800000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f00000000c0)='percpu_alloc_percpu\x00', r10}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000107b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000925e850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r11 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x8, &(0x7f0000000740)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r0, @ANYBLOB="0000000000000000b703000000030000850000001b000000b70000000000000095"], &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='sys_enter\x00', r11}, 0x18) gettid() 1.788498803s ago: executing program 4 (id=7506): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x1c1341, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller0\x00', 0x84aebfbd6349b7f2}) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000580)=ANY=[@ANYBLOB="06000000040000000400000002"], 0x50) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x14, &(0x7f0000000200)=ANY=[@ANYBLOB="1802000000000000000000000000000018010000786c6c2500000000070000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000040)='kmem_cache_free\x00', r2}, 0x10) write$cgroup_subtree(r0, 0x0, 0x20a) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0600000004000000ff0f000007"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYRES16=r1, @ANYRES32=r3], 0x0, 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000800)={0x4, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x2, 0x0, 0x0, 0x41000, 0x8, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={r4, 0x2000000, 0xe, 0x0, &(0x7f0000000180)="63eced8e46dcd5837fa70bfb5700", 0x0, 0x7ffd, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) 1.694693075s ago: executing program 2 (id=7507): bpf$PROG_LOAD_XDP(0x5, &(0x7f00000004c0)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000800000000000000000", @ANYRES32], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="1b00000000000000000000000080000000000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="0000000000000000000000000000000000000000000000ffff000000"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x18, 0x7, &(0x7f0000000540)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d0000001801000020696c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) perf_event_open(&(0x7f0000000380)={0x4, 0x80, 0x1, 0x0, 0x0, 0x2, 0x0, 0x0, 0x34000, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x2, 0x6}, 0x0, 0xc8, 0xfffffffe, 0x0, 0x9, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='io.stat\x00', 0x26e1, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x11, 0xc, &(0x7f0000000640)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x84, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={0x0, r2}, 0x18) perf_event_open$cgroup(&(0x7f0000000000)={0x6, 0x80, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000080)}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) close(r4) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="8fedcb7907001175f37538e486dd6317ce22000000fffe80"], 0xfdef) recvmsg$unix(r3, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0xffffffffffffffae}, 0x0) write$cgroup_subtree(r5, &(0x7f0000000000)=ANY=[], 0xfdef) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f00000001c0)='sched_switch\x00', r1}, 0x10) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_bp={0x0, 0x2}, 0x800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) r6 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r7 = openat$cgroup_procs(r6, &(0x7f00000002c0)='cgroup.threads\x00', 0x2, 0x0) write$cgroup_pid(r7, 0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) r8 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) openat$ppp(0xffffffffffffff9c, &(0x7f0000000640), 0x0, 0x0) r9 = openat$cgroup_procs(r8, &(0x7f0000000840)='cgroup.procs\x00', 0x2, 0x0) r10 = bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0xd, 0xb, &(0x7f0000000240)=ANY=[@ANYBLOB="06458b0001000000850000004e0000005b2afeff00000009ee2b536bbbe8dc2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000009000000850000"], &(0x7f0000000300)='GPL\x00', 0x9, 0x0, 0x0, 0x40f00, 0x26, '\x00', 0x0, @sock_ops, 0xffffffffffffffff, 0x8, &(0x7f0000000340)={0x0, 0x5}, 0x8, 0x10, &(0x7f0000000380)={0x0, 0x4, 0x73, 0x7}, 0x10, 0x0, r1, 0x6, 0x0, &(0x7f00000003c0)=[{0x0, 0x4, 0xc, 0x4}, {0x3, 0x3, 0xe, 0x5ece48105434dadb}, {0x6, 0x5, 0x1, 0x9}, {0x0, 0x2, 0xe, 0xd}, {0x0, 0x1, 0xf, 0x5}, {0x0, 0x5, 0x0, 0x2}], 0x10, 0x10, @void, @value}, 0x94) bpf$BPF_PROG_TEST_RUN_LIVE(0xa, &(0x7f00000008c0)={r10, 0x0, 0x86, 0x0, &(0x7f0000000680)="a8bf38f367fa179bf4174d0e959303fb4a2c6959687a02da24cb39327e693b868160ee12cbd1e3f261fcb512cd2aa006927f461a6f0ac0a075510d38b6beb79ef79f111c40337724ff4ce871356ac380261a7e428854e9455aa31a03451b525e0edbd3bf11ed9d4eb0c827b3e99ca78f5e5cd272aef75c7859b1a93377da3d98d53dcedf5112", 0x0, 0xc, 0x0, 0x23, 0x0, &(0x7f0000000740)="2545ab49c1dad4e9c43fd9c100"/35, 0x0, 0x2, 0x0, 0x82}, 0x50) write$cgroup_pid(r9, &(0x7f0000000880), 0x12) bpf$MAP_CREATE(0x0, 0x0, 0x48) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f00000002c0)='kfree\x00'}, 0x10) syz_clone(0x22023500, 0x0, 0x0, 0x0, 0x0, 0x0) 1.555777987s ago: executing program 4 (id=7508): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=@base={0x7, 0x4, 0x8, 0x1, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000440)=@base={0x1, 0x40, 0x6, 0x8, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)=@base={0xc, 0x4, 0x4, 0x9, 0x0, r1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000002000000b704000000000000850000005700000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x141141, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f00000000c0)={'syzkaller0\x00', 0x84aebfbd6349b7f2}) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000140)='sched_switch\x00', r4}, 0x10) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x8}, 0x0, 0x6, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'syzkaller0\x00', 0xca58c30f81b6079f}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000001fc0)=ANY=[@ANYBLOB="19000000040000000800000008"], 0x48) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000001b518110000", @ANYRES32=r6, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0x22, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000380)={{r6}, &(0x7f0000000000), &(0x7f00000005c0)=r7}, 0x20) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r8}, 0x10) r9 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002ac0)={0x1a, 0x3, &(0x7f0000000180)=@framed, &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x19, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x2008, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={0x0, r9}, 0x10) ioctl$PERF_EVENT_IOC_SET_FILTER(r5, 0x8914, &(0x7f0000000080)) r10 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x11, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1801000021000000000000004bc311ec8500000075000000a70000000800000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f00000000c0)='percpu_alloc_percpu\x00', r10}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000107b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000925e850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r11 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x8, &(0x7f0000000740)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r0, @ANYBLOB="0000000000000000b703000000030000850000001b000000b700000000"], &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='sys_enter\x00', r11}, 0x18) gettid() 1.491749648s ago: executing program 3 (id=7509): bpf$PROG_LOAD(0x5, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x30, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe, 0x20060, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0xb00000000000000, &(0x7f0000004080)=@base={0x8, 0x4, 0x4, 0xbf26, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x3000000, 0x4, 0x0, 0x0, @void, @value, @void, @value}, 0x50) r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000040)={r0}, 0x4) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x18, &(0x7f00000001c0)=ANY=[@ANYBLOB="18000000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000000000018230000", @ANYRES32=r0, @ANYBLOB="0000000000000000b70500000000000085000000a5000000180100002020640500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000a50000000800000095"], &(0x7f0000000600)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000140)='sched_switch\x00', r1}, 0x10) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000, 0x0, @perf_bp={0x0, 0x7}, 0x40, 0x1, 0x4, 0x3, 0x0, 0x200000, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETOFFLOAD(r2, 0xc004743e, 0x110e22fff6) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xe, 0x4, 0x8, 0x6, 0x0, 0xffffffffffffffff, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='kmem_cache_free\x00'}, 0x10) close(r2) r3 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x4, &(0x7f0000000080)=ANY=[@ANYBLOB="b4f700000f95000800"/26], &(0x7f0000003ff6)='GPL\x00', 0x5, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, &(0x7f00000000c0), 0x366, 0x10, &(0x7f0000000000), 0x2b2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x39) r4 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x4, 0x0, 0x0, 0x0, 0x0, 0x100, 0x10020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}, 0x100002, 0x0, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1b, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c, @void, @value}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000a00)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18020000000000000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0xfffffff9) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000200)={{r5, 0xffffffffffffffff}, &(0x7f0000000180), &(0x7f00000001c0)=r4}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000580)=ANY=[@ANYRESHEX=r3, @ANYBLOB="8166f3458f519de22d355b0031e1748b74d92c02188cb4f9d5253679d217fbcf215d766925dd2098ffb9fbda7880203e5a1d24204116ac9fa0e71e4ec0466659730238d93d0bba22824520d41f90c1c8edad6e47059aab4ad46d1a82d8d48227e427ac609e5b3f283782d675d15f5f9b1e3b41cc138ab21ca82ef52255d624ecd439ac4296c4d033f5fc35f90cbad59fa9647eef5df4e02cfb08802a658b79d14c6b5b8d81d153e378068fadffc63f9bc7f2793548c6e58db75ba28714318b233920417e27478a5e319bafc3cbce9385713b2187b000e63b8c41087c3ea59d34702f8d", @ANYRESOCT=r3, @ANYRES32=r4, @ANYRESOCT=r7, @ANYRESDEC=r6, @ANYBLOB="261cc98ad5c7cf2f0b4e6b154b332475e02f438bcb5d35c591af6ff6a72fac7eb53fcd7a51d418aa506e95be13470bf344602b04b56db392f3b97e6dedf3f4c04fe432b66a3314dfdde2eb5d34d643c799d57b2d36ce21fececbe5ff0d570ace0158966ac59992efbbac7f012a23f95c6038e3b5e44aee48c59909c33e00e2c2e2f4330b37f0ab6a1290be92fd1278f30eabbc51"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x20, '\x00', 0x0, @fallback=0x2d, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) close(0xffffffffffffffff) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000001c0)={0x12, 0x4, &(0x7f0000001300)=ANY=[@ANYBLOB="1800000000000000000000000000000071120e00000000009500000000000000"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0xb, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x141141, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)) 1.149208633s ago: executing program 1 (id=7510): bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$tipc(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)}, 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) perf_event_open(&(0x7f00000006c0)={0x0, 0x80, 0x9, 0x8d, 0x16, 0x4, 0x0, 0x5, 0x94ba0, 0x48cf3dc79f55ac95, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x2, @perf_bp={0x0, 0x6}, 0x100000, 0x0, 0x2, 0x8, 0x0, 0x0, 0xc, 0x0, 0xc7a8, 0x0, 0x4}, 0x0, 0x1, 0xffffffffffffffff, 0x2) socketpair(0x18, 0x0, 0x2, &(0x7f0000000000)) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000bc0)=ANY=[@ANYBLOB="0e00000004000000040000000200020000000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="03090000020000000000000000000000000000000000000000000000c6deba5a21a0d179a36aaae8ba02d301eebc5cab25b34842802f94db92d20cfd0be12cee718954a8b55775e1c4af78fbaa0d00000000000000972e8fc86808570e56f601fee668"], 0x50) (fail_nth: 3) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000001b518110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0x22, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000380)={{}, &(0x7f0000000000), &(0x7f00000005c0)=r1}, 0x20) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000040)='hrtimer_init\x00', r2}, 0x10) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) 740.010829ms ago: executing program 2 (id=7511): bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB, @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000f60000008500000043"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="1b00000000000000000000000080000000000000", @ANYRES32, @ANYBLOB, @ANYRES32=0x0], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value=0x2000000}, 0x90) bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="170000000000000004000000ff"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x1030, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x4, 0xe, &(0x7f0000000200)=ANY=[@ANYBLOB="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"], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0xffffffffffffff97, 0x10, &(0x7f00000000c0), 0xffffffffffffffc2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value=0x1000000}, 0x48) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000580)='blkio.throttle.write_bps_device\x00', 0x2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000180)='sched_switch\x00', r1}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000700)='signal_deliver\x00'}, 0x10) syz_open_procfs$namespace(0x0, 0xfffffffffffffffe) 79.788149ms ago: executing program 1 (id=7512): openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) socketpair(0x1, 0x3, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000070000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000a5df850000002d00000095"], 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000600)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000000001801000020646c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000700000085000000050000008500000008"], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='net_dev_xmit\x00', r0}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x18000000000002a0, 0xe40, 0x0, &(0x7f0000000100)="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", 0x0, 0x8, 0x60000000}, 0x1e) 35.72334ms ago: executing program 3 (id=7513): close(0x3) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="1900000004000000040000000280000000000000"], 0x50) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1801000011000000000000000000000018120000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000f6000000850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1a, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000600)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18000000000000000000000000000000850000006d"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000005c0)={&(0x7f0000000300)='sys_enter\x00', r2}, 0x10) openat$tun(0xffffffffffffff9c, 0x0, 0x400802, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000300)={r0, 0x0, 0x0}, 0x20) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000480)=@o_path={0x0, 0x0, 0x4010}, 0x18) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x1, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) syz_clone(0x40800000, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x1c1341, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f00000000c0)={'syzkaller0\x00', 0x84aebfbd6349b7f2}) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffefffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffffe}, 0x2037, 0x4000000000000c8, 0x3, 0x0, 0x0, 0x0, 0x8, 0x0, 0xfffffff9}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="16000000000000000400000001"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000b40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000580)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r5}, 0x10) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000058"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r6}, 0x10) r7 = openat$tun(0xffffffffffffff9c, &(0x7f00000003c0), 0x183081, 0x0) close(r7) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)) ioctl$SIOCSIFHWADDR(r7, 0x8914, &(0x7f0000002280)={'syzkaller0\x00', @link_local}) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000380)=ANY=[@ANYBLOB="8fedcb5d07081196f37538e486dd"], 0x280) 0s ago: executing program 4 (id=7514): bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000280)={{0x1, 0xffffffffffffffff}, &(0x7f0000000040), &(0x7f0000000080)}, 0x20) r1 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000840)={0x6, 0x1a, &(0x7f0000000580)=@raw=[@printk={@lli, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x9}}, @jmp={0x5, 0x1, 0x2, 0x7, 0x6, 0xfffffffffffffff8}, @call={0x85, 0x0, 0x0, 0x19}, @exit, @printk={@p, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x8}}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffe}, @btf_id={0x18, 0x5, 0x3, 0x0, 0x3}, @map_val={0x18, 0x7, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x7ff}, @map_val={0x18, 0x1, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x40}], &(0x7f0000000300)='GPL\x00', 0xffffffcf, 0x6c, &(0x7f0000000340)=""/108, 0x41100, 0x62, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f00000004c0)={0x2, 0x4}, 0x8, 0x10, &(0x7f0000000680)={0x3, 0x9, 0x8000, 0x4}, 0x10, 0x0, 0x0, 0x3, &(0x7f00000006c0)=[0x1, 0xffffffffffffffff, 0x1], &(0x7f0000000700)=[{0x5, 0x5, 0x10}, {0x3, 0x5, 0xb, 0x8}, {0x2, 0x4, 0x2, 0x3}], 0x10, 0x8f08, @void, @value}, 0x94) bpf$TOKEN_CREATE(0x24, &(0x7f0000000940)={0x0, r1}, 0x8) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000900)={{r0}, &(0x7f00000002c0), &(0x7f0000000740)=r1}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000500)=@base={0xb, 0x5, 0x400, 0x9, 0x1, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r2], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000200)={r2, 0x58, &(0x7f0000000180)}, 0x10) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r3}, 0x10) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x100, 0x0, 0x0, 0x2, 0x0, 0x1}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x2) r4 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TUNSETOFFLOAD(r4, 0xc004743e, 0x110c230000) ioctl$TUNSETOFFLOAD(r4, 0x40047452, 0xf0ff1f00000000) perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x430, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) kernel console output (not intermixed with test programs): [T14041] FAULT_INJECTION: forcing a failure. [ 589.870609][T14041] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 589.945764][T14031] device syzkaller0 entered promiscuous mode [ 589.960938][T14041] CPU: 0 PID: 14041 Comm: syz.0.4707 Not tainted 5.15.185-syzkaller-00339-ge678c93d43cc #0 [ 589.970976][T14041] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 589.981070][T14041] Call Trace: [ 589.984368][T14041] [ 589.987315][T14041] __dump_stack+0x21/0x30 [ 589.991670][T14041] dump_stack_lvl+0xee/0x150 [ 589.996275][T14041] ? show_regs_print_info+0x20/0x20 [ 590.001491][T14041] dump_stack+0x15/0x20 [ 590.005668][T14041] should_fail+0x3c1/0x510 [ 590.010104][T14041] should_fail_usercopy+0x1a/0x20 [ 590.015140][T14041] _copy_to_user+0x20/0x90 [ 590.019692][T14041] simple_read_from_buffer+0xe9/0x160 [ 590.025100][T14041] proc_fail_nth_read+0x19a/0x210 [ 590.030151][T14041] ? proc_fault_inject_write+0x2f0/0x2f0 [ 590.035808][T14041] ? security_file_permission+0x83/0xa0 [ 590.041371][T14041] ? proc_fault_inject_write+0x2f0/0x2f0 [ 590.047024][T14041] vfs_read+0x282/0xbe0 [ 590.051194][T14041] ? kernel_read+0x1f0/0x1f0 [ 590.055796][T14041] ? __kasan_check_write+0x14/0x20 [ 590.060924][T14041] ? mutex_lock+0x95/0x1a0 [ 590.065364][T14041] ? wait_for_completion_killable_timeout+0x10/0x10 [ 590.071977][T14041] ? __fget_files+0x2c4/0x320 [ 590.076684][T14041] ? __fdget_pos+0x2d2/0x380 [ 590.081294][T14041] ? ksys_read+0x71/0x240 [ 590.085642][T14041] ksys_read+0x140/0x240 [ 590.089904][T14041] ? vfs_write+0xf70/0xf70 [ 590.094337][T14041] ? debug_smp_processor_id+0x17/0x20 [ 590.099759][T14041] __x64_sys_read+0x7b/0x90 [ 590.104278][T14041] x64_sys_call+0x96d/0x9a0 [ 590.108795][T14041] do_syscall_64+0x4c/0xa0 [ 590.113229][T14041] ? clear_bhb_loop+0x50/0xa0 [ 590.117922][T14041] ? clear_bhb_loop+0x50/0xa0 [ 590.122618][T14041] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 590.128534][T14041] RIP: 0033:0x7f20a785533c [ 590.132970][T14041] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 93 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 ef 93 02 00 48 [ 590.152597][T14041] RSP: 002b:00007f20a5e9e030 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 590.161054][T14041] RAX: ffffffffffffffda RBX: 00007f20a7a7e080 RCX: 00007f20a785533c [ 590.169044][T14041] RDX: 000000000000000f RSI: 00007f20a5e9e0a0 RDI: 0000000000000005 [ 590.177031][T14041] RBP: 00007f20a5e9e090 R08: 0000000000000000 R09: 0000000000000000 [ 590.185018][T14041] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 590.193006][T14041] R13: 0000000000000001 R14: 00007f20a7a7e080 R15: 00007ffeb6582328 [ 590.201012][T14041] [ 591.226529][T14069] device pim6reg1 entered promiscuous mode [ 592.012311][T14081] device syzkaller0 entered promiscuous mode [ 592.513314][T14087] device syzkaller0 entered promiscuous mode [ 592.816308][T14095] device syzkaller0 entered promiscuous mode [ 593.287099][T14113] device syzkaller0 entered promiscuous mode [ 593.508536][T14132] device sit0 entered promiscuous mode [ 594.326651][T14129] device syzkaller0 entered promiscuous mode [ 595.101168][T14154] device syzkaller0 entered promiscuous mode [ 595.426860][T14160] device syzkaller0 entered promiscuous mode [ 595.505105][T14164] device syzkaller0 entered promiscuous mode [ 596.242119][T14169] device syzkaller0 entered promiscuous mode [ 596.435888][T14173] device syzkaller0 entered promiscuous mode [ 597.017840][T14189] device syzkaller0 entered promiscuous mode [ 597.051082][T14201] device sit0 left promiscuous mode [ 597.317141][T14207] device sit0 entered promiscuous mode [ 597.923970][T14205] device syzkaller0 entered promiscuous mode [ 598.408338][T14216] device syzkaller0 entered promiscuous mode [ 598.958188][T14231] device syzkaller0 entered promiscuous mode [ 599.344669][T14245] device syzkaller0 entered promiscuous mode [ 600.161532][T14259] device syzkaller0 entered promiscuous mode [ 600.361369][T14273] device pim6reg1 entered promiscuous mode [ 600.589708][T14277] device pim6reg1 entered promiscuous mode [ 601.078435][T14285] device syzkaller0 entered promiscuous mode [ 601.575230][T14294] device syzkaller0 entered promiscuous mode [ 601.869982][T14310] device pim6reg1 entered promiscuous mode [ 602.114198][T14307] device syzkaller0 entered promiscuous mode [ 602.782494][T14333] device pim6reg1 entered promiscuous mode [ 603.558229][T14344] device syzkaller0 entered promiscuous mode [ 603.677170][T14348] device pim6reg1 entered promiscuous mode [ 603.917594][T14358] GPL: port 1(erspan0) entered blocking state [ 603.929197][T14358] GPL: port 1(erspan0) entered disabled state [ 603.953227][T14358] device erspan0 entered promiscuous mode [ 603.975919][T14359] GPL: port 1(erspan0) entered blocking state [ 603.982090][T14359] GPL: port 1(erspan0) entered forwarding state [ 604.049251][T14356] device syzkaller0 entered promiscuous mode [ 605.319122][T14395] device syzkaller0 entered promiscuous mode [ 605.869632][T14405] device syzkaller0 entered promiscuous mode [ 606.121888][T14438] device sit0 left promiscuous mode [ 606.277566][T14441] device sit0 entered promiscuous mode [ 606.494452][T14451] device wg2 left promiscuous mode [ 606.555885][T14455] device wg2 entered promiscuous mode [ 606.927399][T14457] device syzkaller0 entered promiscuous mode [ 606.972092][T14466] device veth0_vlan left promiscuous mode [ 607.021971][T14466] device veth0_vlan entered promiscuous mode [ 607.100648][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 607.116896][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 607.138764][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 607.396548][T14476] device syzkaller0 entered promiscuous mode [ 607.765047][T14484] device syzkaller0 entered promiscuous mode [ 608.675387][T14521] device pim6reg1 entered promiscuous mode [ 609.559670][T14534] device syzkaller0 entered promiscuous mode [ 609.825500][T14550] FAULT_INJECTION: forcing a failure. [ 609.825500][T14550] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 609.858535][T14550] CPU: 1 PID: 14550 Comm: syz.0.4885 Not tainted 5.15.185-syzkaller-00339-ge678c93d43cc #0 [ 609.868599][T14550] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 609.878679][T14550] Call Trace: [ 609.881979][T14550] [ 609.884953][T14550] __dump_stack+0x21/0x30 [ 609.889315][T14550] dump_stack_lvl+0xee/0x150 [ 609.893931][T14550] ? show_regs_print_info+0x20/0x20 [ 609.899160][T14550] ? __hrtimer_run_queues+0x97a/0x9e0 [ 609.904566][T14550] dump_stack+0x15/0x20 [ 609.908752][T14550] should_fail+0x3c1/0x510 [ 609.913194][T14550] should_fail_usercopy+0x1a/0x20 [ 609.918249][T14550] _copy_from_user+0x20/0xd0 [ 609.922876][T14550] __sys_bpf+0x233/0x730 [ 609.927184][T14550] ? bpf_link_show_fdinfo+0x310/0x310 [ 609.932590][T14550] ? asm_sysvec_apic_timer_interrupt+0x1b/0x20 [ 609.938775][T14550] __x64_sys_bpf+0x7c/0x90 [ 609.943223][T14550] x64_sys_call+0x4b9/0x9a0 [ 609.947752][T14550] do_syscall_64+0x4c/0xa0 [ 609.952202][T14550] ? clear_bhb_loop+0x50/0xa0 [ 609.956909][T14550] ? clear_bhb_loop+0x50/0xa0 [ 609.961602][T14550] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 609.967514][T14550] RIP: 0033:0x7f20a7856929 [ 609.971953][T14550] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 609.991717][T14550] RSP: 002b:00007f20a5ebf038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 610.000257][T14550] RAX: ffffffffffffffda RBX: 00007f20a7a7dfa0 RCX: 00007f20a7856929 [ 610.008259][T14550] RDX: 0000000000000050 RSI: 0000200000000bc0 RDI: 0000000000000000 [ 610.016259][T14550] RBP: 00007f20a5ebf090 R08: 0000000000000000 R09: 0000000000000000 [ 610.024254][T14550] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 610.032339][T14550] R13: 0000000000000000 R14: 00007f20a7a7dfa0 R15: 00007ffeb6582328 [ 610.040359][T14550] [ 611.299222][T14575] device syzkaller0 entered promiscuous mode [ 611.606946][T14589] device syzkaller0 entered promiscuous mode [ 612.421013][T14603] device syzkaller0 entered promiscuous mode [ 613.083179][T14613] device syzkaller0 entered promiscuous mode [ 613.212224][T14629] FAULT_INJECTION: forcing a failure. [ 613.212224][T14629] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 613.305541][T14629] CPU: 1 PID: 14629 Comm: syz.2.4911 Not tainted 5.15.185-syzkaller-00339-ge678c93d43cc #0 [ 613.315591][T14629] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 613.325667][T14629] Call Trace: [ 613.328964][T14629] [ 613.331914][T14629] __dump_stack+0x21/0x30 [ 613.336267][T14629] dump_stack_lvl+0xee/0x150 [ 613.340875][T14629] ? show_regs_print_info+0x20/0x20 [ 613.346094][T14629] dump_stack+0x15/0x20 [ 613.350268][T14629] should_fail+0x3c1/0x510 [ 613.354716][T14629] should_fail_usercopy+0x1a/0x20 [ 613.359762][T14629] _copy_to_user+0x20/0x90 [ 613.364204][T14629] simple_read_from_buffer+0xe9/0x160 [ 613.369594][T14629] proc_fail_nth_read+0x19a/0x210 [ 613.374639][T14629] ? proc_fault_inject_write+0x2f0/0x2f0 [ 613.380299][T14629] ? security_file_permission+0x83/0xa0 [ 613.385864][T14629] ? proc_fault_inject_write+0x2f0/0x2f0 [ 613.391524][T14629] vfs_read+0x282/0xbe0 [ 613.395700][T14629] ? kernel_read+0x1f0/0x1f0 [ 613.400305][T14629] ? __kasan_check_write+0x14/0x20 [ 613.405434][T14629] ? mutex_lock+0x95/0x1a0 [ 613.409879][T14629] ? wait_for_completion_killable_timeout+0x10/0x10 [ 613.416487][T14629] ? __fget_files+0x2c4/0x320 [ 613.421191][T14629] ? __fdget_pos+0x2d2/0x380 [ 613.425802][T14629] ? ksys_read+0x71/0x240 [ 613.430148][T14629] ksys_read+0x140/0x240 [ 613.434431][T14629] ? vfs_write+0xf70/0xf70 [ 613.438876][T14629] ? sched_clock_cpu+0x18/0x3c0 [ 613.443751][T14629] __x64_sys_read+0x7b/0x90 [ 613.448272][T14629] x64_sys_call+0x96d/0x9a0 [ 613.452800][T14629] do_syscall_64+0x4c/0xa0 [ 613.457232][T14629] ? clear_bhb_loop+0x50/0xa0 [ 613.461927][T14629] ? clear_bhb_loop+0x50/0xa0 [ 613.466624][T14629] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 613.472546][T14629] RIP: 0033:0x7f9f15b0433c [ 613.476976][T14629] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 93 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 ef 93 02 00 48 [ 613.496603][T14629] RSP: 002b:00007f9f1414d030 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 613.505040][T14629] RAX: ffffffffffffffda RBX: 00007f9f15d2d080 RCX: 00007f9f15b0433c [ 613.513120][T14629] RDX: 000000000000000f RSI: 00007f9f1414d0a0 RDI: 0000000000000006 [ 613.521212][T14629] RBP: 00007f9f1414d090 R08: 0000000000000000 R09: 0000000000000000 [ 613.529198][T14629] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 613.537186][T14629] R13: 0000000000000000 R14: 00007f9f15d2d080 R15: 00007ffebe8ee0a8 [ 613.545193][T14629] [ 614.208695][T14649] device syzkaller0 entered promiscuous mode [ 614.475941][T14653] device syzkaller0 entered promiscuous mode [ 615.186920][T14663] device syzkaller0 entered promiscuous mode [ 615.385271][T14671] device syzkaller0 entered promiscuous mode [ 615.599989][T14682] device syzkaller0 entered promiscuous mode [ 615.778618][T14690] device veth0_vlan left promiscuous mode [ 615.800787][T14690] device veth0_vlan entered promiscuous mode [ 615.834244][ T354] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 615.847611][T14698] FAULT_INJECTION: forcing a failure. [ 615.847611][T14698] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 615.873128][ T354] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 615.881907][T14698] CPU: 0 PID: 14698 Comm: syz.0.4935 Not tainted 5.15.185-syzkaller-00339-ge678c93d43cc #0 [ 615.891924][T14698] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 615.901994][T14698] Call Trace: [ 615.905288][T14698] [ 615.908226][T14698] __dump_stack+0x21/0x30 [ 615.912580][T14698] dump_stack_lvl+0xee/0x150 [ 615.917183][T14698] ? show_regs_print_info+0x20/0x20 [ 615.922402][T14698] dump_stack+0x15/0x20 [ 615.926569][T14698] should_fail+0x3c1/0x510 [ 615.931008][T14698] should_fail_usercopy+0x1a/0x20 [ 615.936055][T14698] strncpy_from_user+0x24/0x2e0 [ 615.940942][T14698] bpf_prog_load+0x1b8/0x1550 [ 615.945658][T14698] ? map_freeze+0x360/0x360 [ 615.950184][T14698] ? selinux_bpf+0xc7/0xf0 [ 615.954618][T14698] ? security_bpf+0x82/0xa0 [ 615.959135][T14698] __sys_bpf+0x4c3/0x730 [ 615.963414][T14698] ? bpf_link_show_fdinfo+0x310/0x310 [ 615.968812][T14698] ? debug_smp_processor_id+0x17/0x20 [ 615.974206][T14698] __x64_sys_bpf+0x7c/0x90 [ 615.978635][T14698] x64_sys_call+0x4b9/0x9a0 [ 615.983153][T14698] do_syscall_64+0x4c/0xa0 [ 615.987581][T14698] ? clear_bhb_loop+0x50/0xa0 [ 615.992265][T14698] ? clear_bhb_loop+0x50/0xa0 [ 615.996960][T14698] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 616.002884][T14698] RIP: 0033:0x7f20a7856929 [ 616.007312][T14698] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 616.026942][T14698] RSP: 002b:00007f20a5ebf038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 616.035485][T14698] RAX: ffffffffffffffda RBX: 00007f20a7a7dfa0 RCX: 00007f20a7856929 [ 616.043486][T14698] RDX: 0000000000000048 RSI: 00002000000017c0 RDI: 0000000000000005 [ 616.051481][T14698] RBP: 00007f20a5ebf090 R08: 0000000000000000 R09: 0000000000000000 [ 616.059468][T14698] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 616.067463][T14698] R13: 0000000000000000 R14: 00007f20a7a7dfa0 R15: 00007ffeb6582328 [ 616.075463][T14698] [ 616.112738][ T354] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 616.519075][T14692] device syzkaller0 entered promiscuous mode [ 616.627057][T14708] device syzkaller0 entered promiscuous mode [ 617.269885][ T30] audit: type=1400 audit(1750735512.419:149): avc: denied { create } for pid=14730 comm="syz.4.4946" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=appletalk_socket permissive=1 [ 617.536024][T14729] device syzkaller0 entered promiscuous mode [ 618.994850][ T30] audit: type=1400 audit(1750735514.149:150): avc: denied { setattr } for pid=14736 comm="syz.2.4948" path="/dev/net/tun" dev="devtmpfs" ino=152 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tun_tap_device_t tclass=chr_file permissive=1 [ 619.651466][T14744] device syzkaller0 entered promiscuous mode [ 619.922714][T14747] device syzkaller0 entered promiscuous mode [ 620.718126][T14777] device syzkaller0 entered promiscuous mode [ 621.931370][T14798] device syzkaller0 entered promiscuous mode [ 622.058717][T14801] device syzkaller0 entered promiscuous mode [ 622.653783][T14824] device syzkaller0 entered promiscuous mode [ 623.007074][T14835] device syzkaller0 entered promiscuous mode [ 623.687478][T14862] device syzkaller0 entered promiscuous mode [ 623.945621][T14858] device syzkaller0 entered promiscuous mode [ 624.123334][T14874] device pim6reg1 entered promiscuous mode [ 624.725057][T14899] device syzkaller0 entered promiscuous mode [ 625.228251][T14926] syz.4.5016[14926] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 625.228367][T14926] syz.4.5016[14926] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 625.296621][T14927] syz.4.5016[14927] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 625.371889][T14927] syz.4.5016[14927] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 625.422300][T14915] device syzkaller0 entered promiscuous mode [ 625.681222][T14921] device syzkaller0 entered promiscuous mode [ 625.919760][T14948] device pim6reg1 entered promiscuous mode [ 627.049781][T14971] device syzkaller0 entered promiscuous mode [ 627.423392][T14982] device syzkaller0 entered promiscuous mode [ 627.458284][T14990] device pim6reg1 entered promiscuous mode [ 628.127498][T14998] device syzkaller0 entered promiscuous mode [ 628.855799][T15012] device syzkaller0 entered promiscuous mode [ 629.036096][T15033] device pim6reg1 entered promiscuous mode [ 629.724337][T15031] device syzkaller0 entered promiscuous mode [ 629.774115][T15048] device veth1_macvtap left promiscuous mode [ 629.961275][T15036] device syzkaller0 entered promiscuous mode [ 630.032211][T15055] FAULT_INJECTION: forcing a failure. [ 630.032211][T15055] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 630.073239][T15055] CPU: 1 PID: 15055 Comm: syz.2.5061 Not tainted 5.15.185-syzkaller-00339-ge678c93d43cc #0 [ 630.083277][T15055] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 630.093362][T15055] Call Trace: [ 630.096667][T15055] [ 630.099621][T15055] __dump_stack+0x21/0x30 [ 630.103970][T15055] dump_stack_lvl+0xee/0x150 [ 630.108568][T15055] ? show_regs_print_info+0x20/0x20 [ 630.113784][T15055] ? __kasan_kmalloc+0xec/0x110 [ 630.118640][T15055] dump_stack+0x15/0x20 [ 630.122813][T15055] should_fail+0x3c1/0x510 [ 630.127232][T15055] should_fail_alloc_page+0x55/0x80 [ 630.132437][T15055] prepare_alloc_pages+0x156/0x600 [ 630.137555][T15055] ? __alloc_pages_bulk+0xab0/0xab0 [ 630.142801][T15055] __alloc_pages+0x10a/0x440 [ 630.147398][T15055] ? prep_new_page+0x110/0x110 [ 630.152170][T15055] ? __kmalloc+0x13d/0x2c0 [ 630.156609][T15055] __vmalloc_node_range+0x440/0x840 [ 630.161816][T15055] bpf_map_area_alloc+0xd5/0xe0 [ 630.166685][T15055] ? htab_map_alloc+0xb29/0x14f0 [ 630.171626][T15055] htab_map_alloc+0xb29/0x14f0 [ 630.176404][T15055] map_create+0x455/0x21b0 [ 630.180827][T15055] __sys_bpf+0x2cf/0x730 [ 630.185072][T15055] ? bpf_link_show_fdinfo+0x310/0x310 [ 630.190453][T15055] ? debug_smp_processor_id+0x17/0x20 [ 630.195832][T15055] __x64_sys_bpf+0x7c/0x90 [ 630.200273][T15055] x64_sys_call+0x4b9/0x9a0 [ 630.204789][T15055] do_syscall_64+0x4c/0xa0 [ 630.209208][T15055] ? clear_bhb_loop+0x50/0xa0 [ 630.213884][T15055] ? clear_bhb_loop+0x50/0xa0 [ 630.218562][T15055] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 630.224463][T15055] RIP: 0033:0x7f9f15b05929 [ 630.228878][T15055] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 630.248483][T15055] RSP: 002b:00007f9f1416e038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 630.256904][T15055] RAX: ffffffffffffffda RBX: 00007f9f15d2cfa0 RCX: 00007f9f15b05929 [ 630.264884][T15055] RDX: 0000000000000050 RSI: 0000200000000840 RDI: 0000000000000000 [ 630.272854][T15055] RBP: 00007f9f1416e090 R08: 0000000000000000 R09: 0000000000000000 [ 630.280827][T15055] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 630.288798][T15055] R13: 0000000000000000 R14: 00007f9f15d2cfa0 R15: 00007ffebe8ee0a8 [ 630.296791][T15055] [ 630.401018][T15066] device pim6reg1 entered promiscuous mode [ 630.679458][T15057] device syzkaller0 entered promiscuous mode [ 630.800837][T15070] device syzkaller0 entered promiscuous mode [ 631.021882][T15093] device sit0 left promiscuous mode [ 631.126556][T15093] device sit0 entered promiscuous mode [ 631.545608][T15091] device syzkaller0 entered promiscuous mode [ 631.567876][T15105] device pim6reg1 entered promiscuous mode [ 631.796400][T15104] device syzkaller0 entered promiscuous mode [ 631.867387][T15113] device pim6reg1 entered promiscuous mode [ 632.073050][T15127] FAULT_INJECTION: forcing a failure. [ 632.073050][T15127] name failslab, interval 1, probability 0, space 0, times 0 [ 632.213169][T15127] CPU: 0 PID: 15127 Comm: syz.0.5089 Not tainted 5.15.185-syzkaller-00339-ge678c93d43cc #0 [ 632.223301][T15127] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 632.233381][T15127] Call Trace: [ 632.236682][T15127] [ 632.239654][T15127] __dump_stack+0x21/0x30 [ 632.244023][T15127] dump_stack_lvl+0xee/0x150 [ 632.248643][T15127] ? show_regs_print_info+0x20/0x20 [ 632.253870][T15127] ? kasan_set_track+0x5b/0x70 [ 632.258660][T15127] ? kasan_set_free_info+0x23/0x40 [ 632.263800][T15127] ? ____kasan_slab_free+0x125/0x160 [ 632.269108][T15127] ? __kasan_slab_free+0x11/0x20 [ 632.274070][T15127] ? slab_free_freelist_hook+0xc2/0x190 [ 632.279647][T15127] dump_stack+0x15/0x20 [ 632.283834][T15127] should_fail+0x3c1/0x510 [ 632.288278][T15127] __should_failslab+0xa4/0xe0 [ 632.293071][T15127] should_failslab+0x9/0x20 [ 632.297610][T15127] slab_pre_alloc_hook+0x3b/0xe0 [ 632.300924][T15119] device syzkaller0 entered promiscuous mode [ 632.302578][T15127] __kmalloc+0x6d/0x2c0 [ 632.302603][T15127] ? bpf_test_init+0x100/0x1c0 [ 632.302627][T15127] bpf_test_init+0x100/0x1c0 [ 632.302649][T15127] bpf_prog_test_run_skb+0x193/0x1150 [ 632.302690][T15127] ? __kasan_check_write+0x14/0x20 [ 632.302714][T15127] ? fput_many+0x15a/0x1a0 [ 632.302736][T15127] ? __bpf_prog_test_run_raw_tp+0x2b0/0x2b0 [ 632.302763][T15127] bpf_prog_test_run+0x3d5/0x620 [ 632.302787][T15127] ? bpf_prog_query+0x230/0x230 [ 632.302808][T15127] ? selinux_bpf+0xce/0xf0 [ 632.302833][T15127] ? security_bpf+0x82/0xa0 [ 632.302854][T15127] __sys_bpf+0x52c/0x730 [ 632.302875][T15127] ? bpf_link_show_fdinfo+0x310/0x310 [ 632.302905][T15127] ? debug_smp_processor_id+0x17/0x20 [ 632.302930][T15127] __x64_sys_bpf+0x7c/0x90 [ 632.302951][T15127] x64_sys_call+0x4b9/0x9a0 [ 632.302972][T15127] do_syscall_64+0x4c/0xa0 [ 632.302991][T15127] ? clear_bhb_loop+0x50/0xa0 [ 632.303011][T15127] ? clear_bhb_loop+0x50/0xa0 [ 632.303032][T15127] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 632.303058][T15127] RIP: 0033:0x7f20a7856929 [ 632.303077][T15127] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 632.303097][T15127] RSP: 002b:00007f20a5ebf038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 632.303120][T15127] RAX: ffffffffffffffda RBX: 00007f20a7a7dfa0 RCX: 00007f20a7856929 [ 632.303137][T15127] RDX: 000000000000004c RSI: 0000200000000240 RDI: 000000000000000a [ 632.303152][T15127] RBP: 00007f20a5ebf090 R08: 0000000000000000 R09: 0000000000000000 [ 632.303166][T15127] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 632.303180][T15127] R13: 0000000000000000 R14: 00007f20a7a7dfa0 R15: 00007ffeb6582328 [ 632.303208][T15127] [ 634.055975][T15147] device syzkaller0 entered promiscuous mode [ 634.713475][T15159] device syzkaller0 entered promiscuous mode [ 634.777353][T15175] device sit0 left promiscuous mode [ 634.905631][T15175] device sit0 entered promiscuous mode [ 635.245740][T15195] FAULT_INJECTION: forcing a failure. [ 635.245740][T15195] name failslab, interval 1, probability 0, space 0, times 0 [ 635.285401][T15195] CPU: 0 PID: 15195 Comm: syz.1.5113 Not tainted 5.15.185-syzkaller-00339-ge678c93d43cc #0 [ 635.295443][T15195] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 635.305525][T15195] Call Trace: [ 635.308822][T15195] [ 635.311768][T15195] __dump_stack+0x21/0x30 [ 635.316140][T15195] dump_stack_lvl+0xee/0x150 [ 635.320763][T15195] ? show_regs_print_info+0x20/0x20 [ 635.325991][T15195] dump_stack+0x15/0x20 [ 635.330173][T15195] should_fail+0x3c1/0x510 [ 635.334616][T15195] __should_failslab+0xa4/0xe0 [ 635.339411][T15195] should_failslab+0x9/0x20 [ 635.343946][T15195] slab_pre_alloc_hook+0x3b/0xe0 [ 635.348920][T15195] kmem_cache_alloc_trace+0x48/0x270 [ 635.354239][T15195] ? htab_map_alloc+0x9a/0x14f0 [ 635.359133][T15195] htab_map_alloc+0x9a/0x14f0 [ 635.363853][T15195] ? avc_has_perm_noaudit+0x460/0x460 [ 635.369259][T15195] ? htab_map_alloc_check+0x3d8/0x4c0 [ 635.374662][T15195] map_create+0x455/0x21b0 [ 635.379097][T15195] __sys_bpf+0x2cf/0x730 [ 635.383345][T15195] ? bpf_link_show_fdinfo+0x310/0x310 [ 635.388726][T15195] ? debug_smp_processor_id+0x17/0x20 [ 635.394105][T15195] __x64_sys_bpf+0x7c/0x90 [ 635.398532][T15195] x64_sys_call+0x4b9/0x9a0 [ 635.403037][T15195] do_syscall_64+0x4c/0xa0 [ 635.407457][T15195] ? clear_bhb_loop+0x50/0xa0 [ 635.412137][T15195] ? clear_bhb_loop+0x50/0xa0 [ 635.416825][T15195] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 635.422724][T15195] RIP: 0033:0x7fcc35f29929 [ 635.427142][T15195] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 635.446753][T15195] RSP: 002b:00007fcc34592038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 635.455173][T15195] RAX: ffffffffffffffda RBX: 00007fcc36150fa0 RCX: 00007fcc35f29929 [ 635.463145][T15195] RDX: 0000000000000048 RSI: 0000200000000580 RDI: 0000000000000000 [ 635.471120][T15195] RBP: 00007fcc34592090 R08: 0000000000000000 R09: 0000000000000000 [ 635.479093][T15195] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 635.487080][T15195] R13: 0000000000000001 R14: 00007fcc36150fa0 R15: 00007ffdaca7f2c8 [ 635.495070][T15195] [ 635.513561][T15199] device pim6reg1 entered promiscuous mode [ 636.322680][T15220] device syzkaller0 entered promiscuous mode [ 636.710626][T15241] device pim6reg1 entered promiscuous mode [ 636.764663][T15244] device veth1_macvtap left promiscuous mode [ 636.814022][T15245] device veth1_macvtap entered promiscuous mode [ 636.881128][ T354] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 637.443246][T15252] device syzkaller0 entered promiscuous mode [ 637.804572][T15255] device syzkaller0 entered promiscuous mode [ 637.892531][T15270] device pim6reg1 entered promiscuous mode [ 638.466939][T15287] device pim6reg1 entered promiscuous mode [ 639.320479][T15305] device syzkaller0 entered promiscuous mode [ 639.704971][T15314] device syzkaller0 entered promiscuous mode [ 640.727905][T15348] device syzkaller0 entered promiscuous mode [ 641.391530][T15362] device syzkaller0 entered promiscuous mode [ 641.640523][T15358] device syzkaller0 entered promiscuous mode [ 642.892083][T15409] device syzkaller0 entered promiscuous mode [ 643.522783][T15424] device syzkaller0 entered promiscuous mode [ 643.850603][T15422] device syzkaller0 entered promiscuous mode [ 643.983922][T15443] FAULT_INJECTION: forcing a failure. [ 643.983922][T15443] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 644.052129][T15443] CPU: 0 PID: 15443 Comm: syz.4.5204 Not tainted 5.15.185-syzkaller-00339-ge678c93d43cc #0 [ 644.062166][T15443] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 644.072239][T15443] Call Trace: [ 644.075526][T15443] [ 644.078471][T15443] __dump_stack+0x21/0x30 [ 644.082807][T15443] dump_stack_lvl+0xee/0x150 [ 644.087404][T15443] ? show_regs_print_info+0x20/0x20 [ 644.092613][T15443] ? format_decode+0x1bb/0x1520 [ 644.097485][T15443] dump_stack+0x15/0x20 [ 644.101647][T15443] should_fail+0x3c1/0x510 [ 644.106078][T15443] should_fail_usercopy+0x1a/0x20 [ 644.111132][T15443] _copy_from_user+0x20/0xd0 [ 644.115727][T15443] kstrtouint_from_user+0xbe/0x200 [ 644.120847][T15443] ? kstrtol_from_user+0x260/0x260 [ 644.125958][T15443] ? 0xffffffff81000000 [ 644.130111][T15443] ? _copy_to_user+0x78/0x90 [ 644.134715][T15443] ? simple_read_from_buffer+0x10f/0x160 [ 644.140351][T15443] proc_fail_nth_write+0x85/0x1f0 [ 644.145403][T15443] ? proc_fail_nth_read+0x210/0x210 [ 644.150707][T15443] ? security_file_permission+0x79/0xa0 [ 644.156385][T15443] ? security_file_permission+0x83/0xa0 [ 644.161953][T15443] ? proc_fail_nth_read+0x210/0x210 [ 644.167172][T15443] vfs_write+0x3ee/0xf70 [ 644.171433][T15443] ? file_end_write+0x1b0/0x1b0 [ 644.176287][T15443] ? __kasan_check_write+0x14/0x20 [ 644.181403][T15443] ? mutex_lock+0x95/0x1a0 [ 644.185823][T15443] ? wait_for_completion_killable_timeout+0x10/0x10 [ 644.192415][T15443] ? __fget_files+0x2c4/0x320 [ 644.197103][T15443] ? __fdget_pos+0x2d2/0x380 [ 644.201700][T15443] ? ksys_write+0x71/0x240 [ 644.206115][T15443] ksys_write+0x140/0x240 [ 644.210451][T15443] ? __ia32_sys_read+0x90/0x90 [ 644.215213][T15443] ? debug_smp_processor_id+0x17/0x20 [ 644.220594][T15443] __x64_sys_write+0x7b/0x90 [ 644.225205][T15443] x64_sys_call+0x8ef/0x9a0 [ 644.229709][T15443] do_syscall_64+0x4c/0xa0 [ 644.234122][T15443] ? clear_bhb_loop+0x50/0xa0 [ 644.238798][T15443] ? clear_bhb_loop+0x50/0xa0 [ 644.243476][T15443] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 644.249375][T15443] RIP: 0033:0x7f460b7583df [ 644.253793][T15443] Code: 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 f9 92 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 b8 01 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 44 24 08 e8 4c 93 02 00 48 [ 644.273403][T15443] RSP: 002b:00007f4609dc2030 EFLAGS: 00000293 ORIG_RAX: 0000000000000001 [ 644.281821][T15443] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f460b7583df [ 644.289797][T15443] RDX: 0000000000000001 RSI: 00007f4609dc20a0 RDI: 0000000000000007 [ 644.297767][T15443] RBP: 00007f4609dc2090 R08: 0000000000000000 R09: 0000000000000000 [ 644.305745][T15443] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000001 [ 644.313718][T15443] R13: 0000000000000000 R14: 00007f460b980fa0 R15: 00007ffe3098f308 [ 644.321707][T15443] [ 644.925549][T15455] device syzkaller0 entered promiscuous mode [ 645.805872][T15490] device syzkaller0 entered promiscuous mode [ 646.027541][T15484] device syzkaller0 entered promiscuous mode [ 649.983160][T15476] device syzkaller0 entered promiscuous mode [ 650.062417][T15501] device syzkaller0 entered promiscuous mode [ 652.226100][T15548] device syzkaller0 entered promiscuous mode [ 655.167129][T15618] device syzkaller0 entered promiscuous mode [ 657.269231][T15680] device syzkaller0 entered promiscuous mode [ 657.632078][T15696] device syzkaller0 entered promiscuous mode [ 657.907336][T15704] device syzkaller0 entered promiscuous mode [ 658.307809][T15708] device syzkaller0 entered promiscuous mode [ 659.431917][T15743] device syzkaller0 entered promiscuous mode [ 659.853302][T15757] device pim6reg1 entered promiscuous mode [ 660.094080][T15751] device syzkaller0 entered promiscuous mode [ 660.355248][T15755] device syzkaller0 entered promiscuous mode [ 660.832086][T15776] device syzkaller0 entered promiscuous mode [ 661.030490][T15778] device syzkaller0 entered promiscuous mode [ 661.282715][T15774] device syzkaller0 entered promiscuous mode [ 661.458619][T15789] device syzkaller0 entered promiscuous mode [ 661.742147][T15804] device pim6reg1 entered promiscuous mode [ 661.983417][T15793] device syzkaller0 entered promiscuous mode [ 662.319060][T15797] device syzkaller0 entered promiscuous mode [ 663.111539][T15815] device syzkaller0 entered promiscuous mode [ 663.432058][T15824] device syzkaller0 entered promiscuous mode [ 663.722173][T15834] device syzkaller0 entered promiscuous mode [ 663.903069][T15837] device syzkaller0 entered promiscuous mode [ 663.954282][T15829] device syzkaller0 entered promiscuous mode [ 664.641999][T15845] device syzkaller0 entered promiscuous mode [ 664.895852][T15850] device syzkaller0 entered promiscuous mode [ 665.144368][T15865] device syzkaller0 entered promiscuous mode [ 665.562217][T15871] device syzkaller0 entered promiscuous mode [ 665.930786][T15875] device syzkaller0 entered promiscuous mode [ 666.230874][T15881] device syzkaller0 entered promiscuous mode [ 666.404055][T15890] device syzkaller0 entered promiscuous mode [ 666.655685][T15894] device syzkaller0 entered promiscuous mode [ 667.184171][T15900] device syzkaller0 entered promiscuous mode [ 667.394889][T15898] device syzkaller0 entered promiscuous mode [ 668.050095][T15922] device syzkaller0 entered promiscuous mode [ 668.309413][T15926] device syzkaller0 entered promiscuous mode [ 668.575884][T15932] device syzkaller0 entered promiscuous mode [ 668.637890][T15929] device syzkaller0 entered promiscuous mode [ 668.980377][T15938] device syzkaller0 entered promiscuous mode [ 669.426119][T15956] device syzkaller0 entered promiscuous mode [ 671.056619][T15970] device pim6reg1 entered promiscuous mode [ 671.375921][T15972] device syzkaller0 entered promiscuous mode [ 671.628791][T15976] device syzkaller0 entered promiscuous mode [ 671.880085][T15974] device syzkaller0 entered promiscuous mode [ 672.471494][T15988] device syzkaller0 entered promiscuous mode [ 672.686697][T15991] device syzkaller0 entered promiscuous mode [ 673.196158][T16014] FAULT_INJECTION: forcing a failure. [ 673.196158][T16014] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 673.245837][T16014] CPU: 1 PID: 16014 Comm: syz.2.5404 Not tainted 5.15.185-syzkaller-00339-ge678c93d43cc #0 [ 673.255883][T16014] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 673.265968][T16014] Call Trace: [ 673.269284][T16014] [ 673.272236][T16014] __dump_stack+0x21/0x30 [ 673.276605][T16014] dump_stack_lvl+0xee/0x150 [ 673.281228][T16014] ? show_regs_print_info+0x20/0x20 [ 673.286473][T16014] dump_stack+0x15/0x20 [ 673.290655][T16014] should_fail+0x3c1/0x510 [ 673.295097][T16014] should_fail_alloc_page+0x55/0x80 [ 673.300409][T16014] prepare_alloc_pages+0x156/0x600 [ 673.305544][T16014] ? __alloc_pages_bulk+0xab0/0xab0 [ 673.310787][T16014] ? kasan_check_range+0x11/0x290 [ 673.315844][T16014] __alloc_pages+0x10a/0x440 [ 673.320465][T16014] ? prep_new_page+0x110/0x110 [ 673.325261][T16014] ? sysvec_apic_timer_interrupt+0x64/0xc0 [ 673.331097][T16014] pcpu_populate_chunk+0x184/0xcb0 [ 673.336237][T16014] ? _find_next_bit+0x1b5/0x200 [ 673.341123][T16014] pcpu_alloc+0xc4d/0x1660 [ 673.345577][T16014] __alloc_percpu_gfp+0x25/0x30 [ 673.350462][T16014] bpf_map_alloc_percpu+0xc5/0x150 [ 673.355610][T16014] array_map_alloc+0x39a/0x6d0 [ 673.360397][T16014] ? __bpf_hash_map_seq_show+0x8c0/0x8c0 [ 673.366058][T16014] map_create+0x455/0x21b0 [ 673.370497][T16014] __sys_bpf+0x2cf/0x730 [ 673.374761][T16014] ? bpf_link_show_fdinfo+0x310/0x310 [ 673.380159][T16014] ? bpf_trace_run2+0xb5/0x1b0 [ 673.384958][T16014] ? __bpf_trace_sys_enter+0x62/0x70 [ 673.390303][T16014] __x64_sys_bpf+0x7c/0x90 [ 673.394747][T16014] x64_sys_call+0x4b9/0x9a0 [ 673.399282][T16014] do_syscall_64+0x4c/0xa0 [ 673.403736][T16014] ? clear_bhb_loop+0x50/0xa0 [ 673.408439][T16014] ? clear_bhb_loop+0x50/0xa0 [ 673.413140][T16014] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 673.419073][T16014] RIP: 0033:0x7f9f15b05929 [ 673.423514][T16014] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 673.443148][T16014] RSP: 002b:00007f9f1416e038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 673.451601][T16014] RAX: ffffffffffffffda RBX: 00007f9f15d2cfa0 RCX: 00007f9f15b05929 [ 673.459606][T16014] RDX: 0000000000000048 RSI: 0000200000000b00 RDI: 2000000000000000 [ 673.467611][T16014] RBP: 00007f9f1416e090 R08: 0000000000000000 R09: 0000000000000000 [ 673.475607][T16014] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 673.483606][T16014] R13: 0000000000000000 R14: 00007f9f15d2cfa0 R15: 00007ffebe8ee0a8 [ 673.491633][T16014] [ 673.551840][T16011] device syzkaller0 entered promiscuous mode [ 673.644001][T16006] device syzkaller0 entered promiscuous mode [ 674.257612][T16026] device syzkaller0 entered promiscuous mode [ 674.353264][T16024] device syzkaller0 entered promiscuous mode [ 674.405388][T16040] device syzkaller0 entered promiscuous mode [ 674.443941][T16045] bond_slave_1: mtu less than device minimum [ 674.466954][T16050] device pim6reg1 entered promiscuous mode [ 674.997860][T16060] device syzkaller0 entered promiscuous mode [ 675.316611][T16063] device syzkaller0 entered promiscuous mode [ 675.648408][T16076] device syzkaller0 entered promiscuous mode [ 675.837255][T16079] device syzkaller0 entered promiscuous mode [ 676.087862][T16083] device syzkaller0 entered promiscuous mode [ 676.360498][T16088] device syzkaller0 entered promiscuous mode [ 676.401913][T16092] device pim6reg1 entered promiscuous mode [ 676.953748][T16100] device syzkaller0 entered promiscuous mode [ 677.182832][T16102] device syzkaller0 entered promiscuous mode [ 677.380775][T16106] device syzkaller0 entered promiscuous mode [ 677.416213][T16104] device syzkaller0 entered promiscuous mode [ 677.798395][T16116] device syzkaller0 entered promiscuous mode [ 678.045921][T16129] device pim6reg1 entered promiscuous mode [ 678.415228][T16131] device syzkaller0 entered promiscuous mode [ 678.988847][T16152] device syzkaller0 entered promiscuous mode [ 679.160095][T16161] device syzkaller0 entered promiscuous mode [ 679.352415][T16175] device pim6reg1 entered promiscuous mode [ 679.476372][T16168] device syzkaller0 entered promiscuous mode [ 680.629475][T16202] device syzkaller0 entered promiscuous mode [ 681.383995][T16214] device syzkaller0 entered promiscuous mode [ 681.801035][T16222] device syzkaller0 entered promiscuous mode [ 682.200163][T16233] device syzkaller0 entered promiscuous mode [ 683.301749][T16255] device syzkaller0 entered promiscuous mode [ 683.691845][T16263] device syzkaller0 entered promiscuous mode [ 684.279013][T16270] device syzkaller0 entered promiscuous mode [ 684.467834][T16277] device syzkaller0 entered promiscuous mode [ 684.738419][T16272] device syzkaller0 entered promiscuous mode [ 684.965036][T16275] device syzkaller0 entered promiscuous mode [ 685.644833][T16295] device syzkaller0 entered promiscuous mode [ 685.866332][T16293] device syzkaller0 entered promiscuous mode [ 686.644654][T16319] device syzkaller0 entered promiscuous mode [ 686.850778][T16318] device syzkaller0 entered promiscuous mode [ 687.502517][T16329] device syzkaller0 entered promiscuous mode [ 687.695253][T16332] device syzkaller0 entered promiscuous mode [ 688.204467][T16347] device syzkaller0 entered promiscuous mode [ 688.523962][T16365] device syzkaller0 entered promiscuous mode [ 692.282598][T16376] device syzkaller0 entered promiscuous mode [ 692.475997][T16386] device syzkaller0 entered promiscuous mode [ 692.964783][T16385] device syzkaller0 entered promiscuous mode [ 693.007959][T16378] device syzkaller0 entered promiscuous mode [ 694.016599][T16414] device syzkaller0 entered promiscuous mode [ 694.225984][T16416] device syzkaller0 entered promiscuous mode [ 694.809642][T16431] device syzkaller0 entered promiscuous mode [ 694.967733][T16452] FAULT_INJECTION: forcing a failure. [ 694.967733][T16452] name failslab, interval 1, probability 0, space 0, times 0 [ 695.021755][T16452] CPU: 1 PID: 16452 Comm: syz.3.5557 Not tainted 5.15.185-syzkaller-00339-ge678c93d43cc #0 [ 695.031803][T16452] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 695.041874][T16452] Call Trace: [ 695.045165][T16452] [ 695.048119][T16452] __dump_stack+0x21/0x30 [ 695.052469][T16452] dump_stack_lvl+0xee/0x150 [ 695.057266][T16452] ? show_regs_print_info+0x20/0x20 [ 695.062482][T16452] ? __kasan_kmalloc+0xec/0x110 [ 695.067354][T16452] dump_stack+0x15/0x20 [ 695.071728][T16452] should_fail+0x3c1/0x510 [ 695.076175][T16452] __should_failslab+0xa4/0xe0 [ 695.080967][T16452] should_failslab+0x9/0x20 [ 695.085498][T16452] slab_pre_alloc_hook+0x3b/0xe0 [ 695.090469][T16452] ? getname_kernel+0x59/0x2e0 [ 695.095259][T16452] kmem_cache_alloc+0x44/0x260 [ 695.100035][T16452] getname_kernel+0x59/0x2e0 [ 695.104858][T16452] kern_path+0x24/0x1b0 [ 695.109041][T16452] create_local_trace_uprobe+0xa2/0x6f0 [ 695.114611][T16452] ? bpf_get_uprobe_info+0x4e0/0x4e0 [ 695.119910][T16452] ? _copy_from_user+0x95/0xd0 [ 695.124721][T16452] perf_uprobe_init+0xf9/0x1a0 [ 695.129504][T16452] perf_uprobe_event_init+0x10b/0x190 [ 695.134891][T16452] perf_try_init_event+0x14a/0x430 [ 695.140022][T16452] perf_event_alloc+0xedd/0x1a20 [ 695.144991][T16452] __se_sys_perf_event_open+0x5ae/0x1b80 [ 695.150632][T16452] ? __kasan_check_write+0x14/0x20 [ 695.155861][T16452] ? mutex_unlock+0x89/0x220 [ 695.160473][T16452] ? __x64_sys_perf_event_open+0xd0/0xd0 [ 695.166130][T16452] ? __ia32_sys_read+0x90/0x90 [ 695.170913][T16452] __x64_sys_perf_event_open+0xbf/0xd0 [ 695.176391][T16452] x64_sys_call+0x50d/0x9a0 [ 695.180902][T16452] do_syscall_64+0x4c/0xa0 [ 695.185319][T16452] ? clear_bhb_loop+0x50/0xa0 [ 695.189998][T16452] ? clear_bhb_loop+0x50/0xa0 [ 695.194678][T16452] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 695.200575][T16452] RIP: 0033:0x7fd2fe18c929 [ 695.204999][T16452] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 695.224612][T16452] RSP: 002b:00007fd2fc7f5038 EFLAGS: 00000246 ORIG_RAX: 000000000000012a [ 695.233067][T16452] RAX: ffffffffffffffda RBX: 00007fd2fe3b3fa0 RCX: 00007fd2fe18c929 [ 695.241166][T16452] RDX: 0000000000000000 RSI: ffffffffffffffff RDI: 0000200000000000 [ 695.249138][T16452] RBP: 00007fd2fc7f5090 R08: 0000000000000000 R09: 0000000000000000 [ 695.257113][T16452] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000001 [ 695.265087][T16452] R13: 0000000000000000 R14: 00007fd2fe3b3fa0 R15: 00007fffa175e8f8 [ 695.273080][T16452] [ 695.312245][T16443] device syzkaller0 entered promiscuous mode [ 695.384182][T16433] device syzkaller0 entered promiscuous mode [ 695.891512][T16456] device syzkaller0 entered promiscuous mode [ 696.743431][T16488] device syzkaller0 entered promiscuous mode [ 697.034656][T16497] device syzkaller0 entered promiscuous mode [ 697.410508][T16506] device syzkaller0 entered promiscuous mode [ 697.979381][T16518] device syzkaller0 entered promiscuous mode [ 698.807523][T16540] device syzkaller0 entered promiscuous mode [ 699.242718][T16536] device syzkaller0 entered promiscuous mode [ 699.815720][T16563] device syzkaller0 entered promiscuous mode [ 701.060432][T16592] device syzkaller0 entered promiscuous mode [ 701.619831][T16611] device syzkaller0 entered promiscuous mode [ 701.806754][T16609] device syzkaller0 entered promiscuous mode [ 701.974873][ T30] audit: type=1400 audit(1750735597.129:151): avc: denied { ioctl } for pid=16624 comm="syz.2.5617" path="cgroup:[4026532297]" dev="nsfs" ino=4026532297 ioctlcmd=0xb706 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 702.121439][T16625] device veth0_vlan left promiscuous mode [ 702.160545][ T30] audit: type=1400 audit(1750735597.249:152): avc: denied { write } for pid=16624 comm="syz.2.5617" name="cgroup.subtree_control" dev="cgroup2" ino=631 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 [ 702.180730][T16625] device veth0_vlan entered promiscuous mode [ 702.255506][ T30] audit: type=1400 audit(1750735597.249:153): avc: denied { open } for pid=16624 comm="syz.2.5617" path="" dev="cgroup2" ino=631 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 [ 702.270522][ T8903] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 702.323996][ T8903] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 702.335912][ T8903] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 702.429335][T16635] device veth1_macvtap left promiscuous mode [ 702.887270][T16641] device syzkaller0 entered promiscuous mode [ 703.215030][T16648] device syzkaller0 entered promiscuous mode [ 703.364530][T16652] device syzkaller0 entered promiscuous mode [ 704.031049][T16674] device syzkaller0 entered promiscuous mode [ 704.293526][T16670] device syzkaller0 entered promiscuous mode [ 705.234238][T16691] device syzkaller0 entered promiscuous mode [ 705.449336][T16704] device syzkaller0 entered promiscuous mode [ 705.596597][T16701] device syzkaller0 entered promiscuous mode [ 705.760132][T16728] FAULT_INJECTION: forcing a failure. [ 705.760132][T16728] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 705.828181][T16728] CPU: 0 PID: 16728 Comm: syz.0.5654 Not tainted 5.15.185-syzkaller-00339-ge678c93d43cc #0 [ 705.838223][T16728] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 705.848393][T16728] Call Trace: [ 705.851698][T16728] [ 705.854646][T16728] __dump_stack+0x21/0x30 [ 705.858997][T16728] dump_stack_lvl+0xee/0x150 [ 705.863602][T16728] ? show_regs_print_info+0x20/0x20 [ 705.868830][T16728] dump_stack+0x15/0x20 [ 705.873006][T16728] should_fail+0x3c1/0x510 [ 705.877440][T16728] should_fail_alloc_page+0x55/0x80 [ 705.882660][T16728] prepare_alloc_pages+0x156/0x600 [ 705.887799][T16728] ? __alloc_pages_bulk+0xab0/0xab0 [ 705.893018][T16728] ? slab_post_alloc_hook+0x4f/0x2b0 [ 705.898325][T16728] ? alloc_vmap_area+0x17a/0x1990 [ 705.903367][T16728] ? __get_vm_area_node+0x14e/0x350 [ 705.908586][T16728] ? __vmalloc_node_range+0xe8/0x840 [ 705.913888][T16728] ? dev_map_create_hash+0x26/0x1c0 [ 705.919117][T16728] __alloc_pages+0x10a/0x440 [ 705.923724][T16728] ? prep_new_page+0x110/0x110 [ 705.928598][T16728] ? __kasan_check_write+0x14/0x20 [ 705.933743][T16728] __get_free_pages+0x10/0x30 [ 705.938447][T16728] kasan_populate_vmalloc_pte+0x29/0x120 [ 705.944103][T16728] __apply_to_page_range+0x8b0/0xbf0 [ 705.949410][T16728] ? kasan_populate_vmalloc+0x70/0x70 [ 705.954814][T16728] ? kasan_populate_vmalloc+0x70/0x70 [ 705.960212][T16728] apply_to_page_range+0x3b/0x50 [ 705.965181][T16728] kasan_populate_vmalloc+0x60/0x70 [ 705.970406][T16728] alloc_vmap_area+0x185c/0x1990 [ 705.975383][T16728] ? vm_map_ram+0xa60/0xa60 [ 705.979912][T16728] ? kmem_cache_alloc_trace+0x119/0x270 [ 705.985481][T16728] ? __get_vm_area_node+0x11d/0x350 [ 705.990714][T16728] __get_vm_area_node+0x14e/0x350 [ 705.995775][T16728] __vmalloc_node_range+0xe8/0x840 [ 706.000905][T16728] ? dev_map_create_hash+0x26/0x1c0 [ 706.006131][T16728] bpf_map_area_alloc+0xd5/0xe0 [ 706.011008][T16728] ? dev_map_create_hash+0x26/0x1c0 [ 706.016228][T16728] dev_map_create_hash+0x26/0x1c0 [ 706.021276][T16728] dev_map_alloc+0x2d4/0x560 [ 706.025889][T16728] map_create+0x455/0x21b0 [ 706.030333][T16728] __sys_bpf+0x2cf/0x730 [ 706.034609][T16728] ? bpf_link_show_fdinfo+0x310/0x310 [ 706.040113][T16728] ? debug_smp_processor_id+0x17/0x20 [ 706.045551][T16728] __x64_sys_bpf+0x7c/0x90 [ 706.049998][T16728] x64_sys_call+0x4b9/0x9a0 [ 706.054529][T16728] do_syscall_64+0x4c/0xa0 [ 706.058967][T16728] ? clear_bhb_loop+0x50/0xa0 [ 706.063663][T16728] ? clear_bhb_loop+0x50/0xa0 [ 706.068355][T16728] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 706.074268][T16728] RIP: 0033:0x7f20a7856929 [ 706.078702][T16728] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 706.098323][T16728] RSP: 002b:00007f20a5ebf038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 706.106761][T16728] RAX: ffffffffffffffda RBX: 00007f20a7a7dfa0 RCX: 00007f20a7856929 [ 706.114754][T16728] RDX: 0000000000000048 RSI: 0000200000000580 RDI: 0000000000000000 [ 706.122747][T16728] RBP: 00007f20a5ebf090 R08: 0000000000000000 R09: 0000000000000000 [ 706.130736][T16728] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 706.138724][T16728] R13: 0000000000000000 R14: 00007f20a7a7dfa0 R15: 00007ffeb6582328 [ 706.146732][T16728] [ 706.341034][T16722] device syzkaller0 entered promiscuous mode [ 706.500675][T16741] FAULT_INJECTION: forcing a failure. [ 706.500675][T16741] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 706.546522][T16741] CPU: 1 PID: 16741 Comm: syz.2.5658 Not tainted 5.15.185-syzkaller-00339-ge678c93d43cc #0 [ 706.556654][T16741] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 706.566744][T16741] Call Trace: [ 706.570059][T16741] [ 706.573015][T16741] __dump_stack+0x21/0x30 [ 706.577371][T16741] dump_stack_lvl+0xee/0x150 [ 706.581992][T16741] ? show_regs_print_info+0x20/0x20 [ 706.587228][T16741] ? migrate_enable+0x192/0x260 [ 706.592117][T16741] ? migrate_disable+0x180/0x180 [ 706.597093][T16741] dump_stack+0x15/0x20 [ 706.601299][T16741] should_fail+0x3c1/0x510 [ 706.605751][T16741] should_fail_usercopy+0x1a/0x20 [ 706.610818][T16741] _copy_from_user+0x20/0xd0 [ 706.615451][T16741] generic_map_update_batch+0x4a3/0x740 [ 706.621040][T16741] ? generic_map_delete_batch+0x510/0x510 [ 706.626806][T16741] ? __fdget+0x1a1/0x230 [ 706.631093][T16741] ? generic_map_delete_batch+0x510/0x510 [ 706.636850][T16741] bpf_map_do_batch+0x463/0x5f0 [ 706.641743][T16741] __sys_bpf+0x5e3/0x730 [ 706.646028][T16741] ? bpf_link_show_fdinfo+0x310/0x310 [ 706.651437][T16741] ? debug_smp_processor_id+0x17/0x20 [ 706.656840][T16741] __x64_sys_bpf+0x7c/0x90 [ 706.661286][T16741] x64_sys_call+0x4b9/0x9a0 [ 706.665844][T16741] do_syscall_64+0x4c/0xa0 [ 706.670293][T16741] ? clear_bhb_loop+0x50/0xa0 [ 706.674987][T16741] ? clear_bhb_loop+0x50/0xa0 [ 706.679678][T16741] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 706.685588][T16741] RIP: 0033:0x7f9f15b05929 [ 706.690017][T16741] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 706.709723][T16741] RSP: 002b:00007f9f1416e038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 706.718163][T16741] RAX: ffffffffffffffda RBX: 00007f9f15d2cfa0 RCX: 00007f9f15b05929 [ 706.726145][T16741] RDX: 0000000000000038 RSI: 0000200000000380 RDI: 000000000000001a [ 706.734129][T16741] RBP: 00007f9f1416e090 R08: 0000000000000000 R09: 0000000000000000 [ 706.742144][T16741] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 706.750125][T16741] R13: 0000000000000000 R14: 00007f9f15d2cfa0 R15: 00007ffebe8ee0a8 [ 706.758121][T16741] [ 706.860271][T16750] device syzkaller0 entered promiscuous mode [ 706.881645][T16753] device veth0_vlan left promiscuous mode [ 706.906706][T16753] device veth0_vlan entered promiscuous mode [ 706.987499][T16747] device wg2 entered promiscuous mode [ 707.012326][T16756] device syzkaller0 entered promiscuous mode [ 707.019690][ T8903] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 707.037296][ T8903] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 707.045108][ T8903] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 707.584842][T16777] device syzkaller0 entered promiscuous mode [ 707.613163][T16790] device sit0 left promiscuous mode [ 707.668586][T16786] device sit0 entered promiscuous mode [ 707.823169][T16788] device veth0_vlan left promiscuous mode [ 707.829778][T16788] device veth0_vlan entered promiscuous mode [ 707.848908][ T8903] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 707.857488][ T8903] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 707.867262][ T8903] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 708.273179][T16800] device syzkaller0 entered promiscuous mode [ 708.454763][T16797] device syzkaller0 entered promiscuous mode [ 709.013764][T16847] FAULT_INJECTION: forcing a failure. [ 709.013764][T16847] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 709.076942][T16847] CPU: 0 PID: 16847 Comm: syz.4.5699 Not tainted 5.15.185-syzkaller-00339-ge678c93d43cc #0 [ 709.086992][T16847] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 709.097080][T16847] Call Trace: [ 709.100381][T16847] [ 709.103341][T16847] __dump_stack+0x21/0x30 [ 709.107711][T16847] dump_stack_lvl+0xee/0x150 [ 709.112335][T16847] ? show_regs_print_info+0x20/0x20 [ 709.117563][T16847] ? migrate_enable+0x192/0x260 [ 709.122455][T16847] ? migrate_disable+0x180/0x180 [ 709.127427][T16847] dump_stack+0x15/0x20 [ 709.131613][T16847] should_fail+0x3c1/0x510 [ 709.136057][T16847] should_fail_usercopy+0x1a/0x20 [ 709.141113][T16847] _copy_to_user+0x20/0x90 [ 709.145567][T16847] generic_map_lookup_batch+0x707/0xa70 [ 709.151160][T16847] ? bpf_map_update_value+0x3e0/0x3e0 [ 709.156574][T16847] ? __fdget+0x1a1/0x230 [ 709.160861][T16847] ? bpf_map_update_value+0x3e0/0x3e0 [ 709.166282][T16847] bpf_map_do_batch+0x2d4/0x5f0 [ 709.171166][T16847] ? security_bpf+0x82/0xa0 [ 709.175840][T16847] __sys_bpf+0x5e3/0x730 [ 709.180121][T16847] ? bpf_link_show_fdinfo+0x310/0x310 [ 709.185543][T16847] __x64_sys_bpf+0x7c/0x90 [ 709.190001][T16847] x64_sys_call+0x4b9/0x9a0 [ 709.194547][T16847] do_syscall_64+0x4c/0xa0 [ 709.198993][T16847] ? clear_bhb_loop+0x50/0xa0 [ 709.203701][T16847] ? clear_bhb_loop+0x50/0xa0 [ 709.208416][T16847] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 709.214343][T16847] RIP: 0033:0x7f460b759929 [ 709.218777][T16847] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 709.238453][T16847] RSP: 002b:00007f4609dc2038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 709.246885][T16847] RAX: ffffffffffffffda RBX: 00007f460b980fa0 RCX: 00007f460b759929 [ 709.254874][T16847] RDX: 0000000000000038 RSI: 00002000000003c0 RDI: 0000000000000018 [ 709.262876][T16847] RBP: 00007f4609dc2090 R08: 0000000000000000 R09: 0000000000000000 [ 709.270855][T16847] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 709.278828][T16847] R13: 0000000000000000 R14: 00007f460b980fa0 R15: 00007ffe3098f308 [ 709.286852][T16847] [ 709.485731][T16852] device syzkaller0 entered promiscuous mode [ 709.631709][T16866] device sit0 left promiscuous mode [ 709.746215][T16869] device sit0 entered promiscuous mode [ 710.071219][T16862] device syzkaller0 entered promiscuous mode [ 710.685765][T16885] device syzkaller0 entered promiscuous mode [ 710.911900][T16888] device syzkaller0 entered promiscuous mode [ 710.943198][T16893] device sit0 left promiscuous mode [ 711.133652][T16900] device veth0_vlan left promiscuous mode [ 711.139805][T16900] device veth0_vlan entered promiscuous mode [ 711.196071][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 711.212445][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 711.230457][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 712.089785][T16913] device syzkaller0 entered promiscuous mode [ 712.353649][T16932] device syzkaller0 entered promiscuous mode [ 712.467791][T16942] device veth0_vlan left promiscuous mode [ 712.532139][T16942] device veth0_vlan entered promiscuous mode [ 712.610292][T16923] device syzkaller0 entered promiscuous mode [ 712.828661][T16929] device syzkaller0 entered promiscuous mode [ 713.092698][T16948] device syzkaller0 entered promiscuous mode [ 713.507459][T16968] device syzkaller0 entered promiscuous mode [ 713.721171][T16979] device veth0_vlan left promiscuous mode [ 713.741672][T16979] device veth0_vlan entered promiscuous mode [ 713.748827][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 713.767302][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 713.823909][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 714.029244][T16984] device syzkaller0 entered promiscuous mode [ 714.186826][T16983] device syzkaller0 entered promiscuous mode [ 714.750140][T16994] device syzkaller0 entered promiscuous mode [ 714.795657][T17006] device pim6reg1 entered promiscuous mode [ 714.989628][T16999] device syzkaller0 entered promiscuous mode [ 715.421648][T17010] device syzkaller0 entered promiscuous mode [ 715.444588][T17012] device pim6reg1 entered promiscuous mode [ 715.797227][T17029] device veth0_vlan left promiscuous mode [ 715.812617][T17029] device veth0_vlan entered promiscuous mode [ 716.067645][T17022] device syzkaller0 entered promiscuous mode [ 716.264178][T17041] device syzkaller0 entered promiscuous mode [ 716.289029][T17046] device syzkaller0 entered promiscuous mode [ 716.481013][T17047] device syzkaller0 entered promiscuous mode [ 716.576070][T17056] device veth0_vlan left promiscuous mode [ 716.586684][T17056] device veth0_vlan entered promiscuous mode [ 716.599107][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 716.635195][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 716.665049][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 716.682674][T17054] device pim6reg1 entered promiscuous mode [ 716.867322][T17065] FAULT_INJECTION: forcing a failure. [ 716.867322][T17065] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 716.880740][T17065] CPU: 0 PID: 17065 Comm: syz.2.5771 Not tainted 5.15.185-syzkaller-00339-ge678c93d43cc #0 [ 716.890847][T17065] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 716.900934][T17065] Call Trace: [ 716.904238][T17065] [ 716.907195][T17065] __dump_stack+0x21/0x30 [ 716.911544][T17065] dump_stack_lvl+0xee/0x150 [ 716.916158][T17065] ? show_regs_print_info+0x20/0x20 [ 716.921384][T17065] ? 0xffffffffa0016000 [ 716.925559][T17065] dump_stack+0x15/0x20 [ 716.929736][T17065] should_fail+0x3c1/0x510 [ 716.934182][T17065] should_fail_alloc_page+0x55/0x80 [ 716.939409][T17065] prepare_alloc_pages+0x156/0x600 [ 716.944554][T17065] ? __alloc_pages_bulk+0xab0/0xab0 [ 716.949786][T17065] ? stack_trace_save+0x98/0xe0 [ 716.954671][T17065] ? _find_next_bit+0x1fa/0x200 [ 716.959550][T17065] __alloc_pages+0x10a/0x440 [ 716.964167][T17065] ? prep_new_page+0x110/0x110 [ 716.968965][T17065] pcpu_populate_chunk+0x184/0xcb0 [ 716.974105][T17065] ? _find_next_bit+0x106/0x200 [ 716.978991][T17065] pcpu_alloc+0xc4d/0x1660 [ 716.983551][T17065] __alloc_percpu_gfp+0x25/0x30 [ 716.988437][T17065] bpf_map_alloc_percpu+0xc5/0x150 [ 716.993609][T17065] array_map_alloc+0x39a/0x6d0 [ 716.998406][T17065] map_create+0x455/0x21b0 [ 717.002852][T17065] __sys_bpf+0x2cf/0x730 [ 717.007117][T17065] ? bpf_link_show_fdinfo+0x310/0x310 [ 717.012510][T17065] ? bpf_trace_run2+0xb5/0x1b0 [ 717.017313][T17065] ? __bpf_trace_sys_enter+0x62/0x70 [ 717.022623][T17065] __x64_sys_bpf+0x7c/0x90 [ 717.027080][T17065] x64_sys_call+0x4b9/0x9a0 [ 717.031606][T17065] do_syscall_64+0x4c/0xa0 [ 717.036043][T17065] ? clear_bhb_loop+0x50/0xa0 [ 717.040743][T17065] ? clear_bhb_loop+0x50/0xa0 [ 717.045455][T17065] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 717.051386][T17065] RIP: 0033:0x7f9f15b05929 [ 717.055839][T17065] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 717.075473][T17065] RSP: 002b:00007f9f1416e038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 717.083914][T17065] RAX: ffffffffffffffda RBX: 00007f9f15d2cfa0 RCX: 00007f9f15b05929 [ 717.091918][T17065] RDX: 0000000000000048 RSI: 0000200000000b00 RDI: 2000000000000000 [ 717.099928][T17065] RBP: 00007f9f1416e090 R08: 0000000000000000 R09: 0000000000000000 [ 717.107923][T17065] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 717.115915][T17065] R13: 0000000000000001 R14: 00007f9f15d2cfa0 R15: 00007ffebe8ee0a8 [ 717.123931][T17065] [ 717.245883][T17058] device syzkaller0 entered promiscuous mode [ 717.407589][T17068] device syzkaller0 entered promiscuous mode [ 718.003699][T17083] device syzkaller0 entered promiscuous mode [ 718.301766][T17088] device syzkaller0 entered promiscuous mode [ 719.081366][T17103] device syzkaller0 entered promiscuous mode [ 719.309773][T17105] device syzkaller0 entered promiscuous mode [ 719.423029][T17109] device syzkaller0 entered promiscuous mode [ 719.573511][ T8990] syz-executor (8990) used greatest stack depth: 20416 bytes left [ 719.706643][T17121] bridge0: port 1(bridge_slave_0) entered blocking state [ 719.753448][T17121] bridge0: port 1(bridge_slave_0) entered disabled state [ 719.761048][T17121] device bridge_slave_0 entered promiscuous mode [ 719.868930][T17121] bridge0: port 2(bridge_slave_1) entered blocking state [ 719.882641][T17121] bridge0: port 2(bridge_slave_1) entered disabled state [ 719.890241][T17121] device bridge_slave_1 entered promiscuous mode [ 719.982170][T17125] device veth0_vlan left promiscuous mode [ 719.996423][T17125] device veth0_vlan entered promiscuous mode [ 720.173679][ T10] GPL: port 1(erspan0) entered disabled state [ 720.184630][ T10] device erspan0 left promiscuous mode [ 720.200350][ T10] GPL: port 1(erspan0) entered disabled state [ 720.214792][T17139] device syzkaller0 entered promiscuous mode [ 720.569875][T17135] device syzkaller0 entered promiscuous mode [ 720.856589][T17144] device syzkaller0 entered promiscuous mode [ 721.044361][ T10] device veth1_macvtap left promiscuous mode [ 721.050469][ T10] device veth0_vlan left promiscuous mode [ 721.470833][T17150] device syzkaller0 entered promiscuous mode [ 721.503954][ T8903] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 721.535609][ T8903] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 721.581514][ T8903] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 721.597869][ T8903] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 721.615114][ T8903] bridge0: port 1(bridge_slave_0) entered blocking state [ 721.622247][ T8903] bridge0: port 1(bridge_slave_0) entered forwarding state [ 721.661834][ T8903] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 721.680543][ T8903] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 721.698129][ T8903] bridge0: port 2(bridge_slave_1) entered blocking state [ 721.705351][ T8903] bridge0: port 2(bridge_slave_1) entered forwarding state [ 721.738290][ T8903] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 721.818930][ T8903] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 721.844900][ T8903] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 721.882022][ T8903] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 721.910520][ T8903] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 721.964707][ T8903] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 721.982414][ T8903] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 722.005569][T17121] device veth0_vlan entered promiscuous mode [ 722.083042][T17164] device syzkaller0 entered promiscuous mode [ 722.096758][ T8903] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 722.109309][ T8903] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 722.139899][ T8903] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 722.147788][ T8903] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 722.165861][ T8903] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 722.182266][ T8903] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 722.211468][T17121] device veth1_macvtap entered promiscuous mode [ 722.253496][ T8903] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 722.264347][ T8903] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 722.283201][ T8903] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 722.301397][ T8903] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 722.319004][ T8903] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 723.833400][T17184] device syzkaller0 entered promiscuous mode [ 724.070936][T17191] device syzkaller0 entered promiscuous mode [ 724.107470][T17201] device pim6reg1 entered promiscuous mode [ 724.292713][T17203] device syzkaller0 entered promiscuous mode [ 724.296005][T17205] FAULT_INJECTION: forcing a failure. [ 724.296005][T17205] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 724.391940][T17205] CPU: 0 PID: 17205 Comm: syz.3.5819 Not tainted 5.15.185-syzkaller-00339-ge678c93d43cc #0 [ 724.401987][T17205] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 724.412083][T17205] Call Trace: [ 724.415383][T17205] [ 724.418328][T17205] __dump_stack+0x21/0x30 [ 724.422683][T17205] dump_stack_lvl+0xee/0x150 [ 724.427287][T17205] ? show_regs_print_info+0x20/0x20 [ 724.432501][T17205] ? asm_sysvec_apic_timer_interrupt+0x1b/0x20 [ 724.438678][T17205] dump_stack+0x15/0x20 [ 724.442861][T17205] should_fail+0x3c1/0x510 [ 724.447297][T17205] should_fail_usercopy+0x1a/0x20 [ 724.452345][T17205] _copy_from_user+0x20/0xd0 [ 724.457074][T17205] generic_map_update_batch+0x4a3/0x740 [ 724.462654][T17205] ? generic_map_delete_batch+0x510/0x510 [ 724.468409][T17205] ? generic_map_delete_batch+0x510/0x510 [ 724.474153][T17205] bpf_map_do_batch+0x463/0x5f0 [ 724.479023][T17205] __sys_bpf+0x5e3/0x730 [ 724.483288][T17205] ? bpf_link_show_fdinfo+0x310/0x310 [ 724.488683][T17205] ? asm_sysvec_apic_timer_interrupt+0x1b/0x20 [ 724.494861][T17205] __x64_sys_bpf+0x7c/0x90 [ 724.499297][T17205] x64_sys_call+0x4b9/0x9a0 [ 724.503815][T17205] do_syscall_64+0x4c/0xa0 [ 724.508252][T17205] ? clear_bhb_loop+0x50/0xa0 [ 724.512950][T17205] ? clear_bhb_loop+0x50/0xa0 [ 724.517662][T17205] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 724.523578][T17205] RIP: 0033:0x7fd2fe18c929 [ 724.528010][T17205] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 724.547634][T17205] RSP: 002b:00007fd2fc7f5038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 724.556071][T17205] RAX: ffffffffffffffda RBX: 00007fd2fe3b3fa0 RCX: 00007fd2fe18c929 [ 724.564060][T17205] RDX: 0000000000000038 RSI: 0000200000002340 RDI: 000000000000001a [ 724.572048][T17205] RBP: 00007fd2fc7f5090 R08: 0000000000000000 R09: 0000000000000000 [ 724.580057][T17205] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 724.588047][T17205] R13: 0000000000000000 R14: 00007fd2fe3b3fa0 R15: 00007fffa175e8f8 [ 724.596057][T17205] [ 726.158499][T17231] device syzkaller0 entered promiscuous mode [ 726.198357][T17239] device pim6reg1 entered promiscuous mode [ 726.795373][T17241] device syzkaller0 entered promiscuous mode [ 727.256432][T17255] device syzkaller0 entered promiscuous mode [ 727.556570][T17270] device syzkaller0 entered promiscuous mode [ 727.613878][T17275] device pim6reg1 entered promiscuous mode [ 728.153264][T17285] device syzkaller0 entered promiscuous mode [ 728.324527][T17302] device syzkaller0 entered promiscuous mode [ 728.682765][T17315] device syzkaller0 entered promiscuous mode [ 729.035708][T17313] device syzkaller0 entered promiscuous mode [ 729.067702][T17332] device pim6reg1 entered promiscuous mode [ 729.883836][T17359] device syzkaller0 entered promiscuous mode [ 730.134787][T17348] device syzkaller0 entered promiscuous mode [ 730.374258][T17362] device syzkaller0 entered promiscuous mode [ 730.799723][T17383] device pim6reg1 entered promiscuous mode [ 731.191902][T17380] device syzkaller0 entered promiscuous mode [ 732.134188][T17412] device syzkaller0 entered promiscuous mode [ 732.584255][T17407] device syzkaller0 entered promiscuous mode [ 732.654687][T17418] device wg2 left promiscuous mode [ 732.947579][T17421] device syzkaller0 entered promiscuous mode [ 733.168116][T17441] device syzkaller0 entered promiscuous mode [ 733.379110][T17456] device pim6reg1 entered promiscuous mode [ 734.010044][T17452] device syzkaller0 entered promiscuous mode [ 734.686536][T17472] device syzkaller0 entered promiscuous mode [ 734.838862][T17473] device syzkaller0 entered promiscuous mode [ 735.279033][T17486] device syzkaller0 entered promiscuous mode [ 735.455367][T17496] device syzkaller0 entered promiscuous mode [ 735.531769][T17497] device pim6reg1 entered promiscuous mode [ 736.580071][T17519] device syzkaller0 entered promiscuous mode [ 736.858062][T17526] device syzkaller0 entered promiscuous mode [ 737.200882][T17523] device syzkaller0 entered promiscuous mode [ 737.520475][T17532] device syzkaller0 entered promiscuous mode [ 737.836862][T17538] device syzkaller0 entered promiscuous mode [ 737.980972][T17541] device syzkaller0 entered promiscuous mode [ 738.004661][T17546] device syzkaller0 entered promiscuous mode [ 738.178926][T17548] device pim6reg1 entered promiscuous mode [ 738.339726][T17554] device syzkaller0 entered promiscuous mode [ 740.116412][T17579] device syzkaller0 entered promiscuous mode [ 740.319379][T17584] device syzkaller0 entered promiscuous mode [ 740.518917][T17588] device syzkaller0 entered promiscuous mode [ 740.558069][T17593] device pim6reg1 entered promiscuous mode [ 740.577887][T17597] device syzkaller0 entered promiscuous mode [ 741.286123][T17600] device syzkaller0 entered promiscuous mode [ 741.537919][T17612] device syzkaller0 entered promiscuous mode [ 742.326806][T17634] device syzkaller0 entered promiscuous mode [ 742.538294][T17632] device syzkaller0 entered promiscuous mode [ 742.697039][T17641] device syzkaller0 entered promiscuous mode [ 742.831264][T17638] device syzkaller0 entered promiscuous mode [ 742.848845][T17647] device sit0 entered promiscuous mode [ 743.253009][T17643] device syzkaller0 entered promiscuous mode [ 743.549841][T17655] device syzkaller0 entered promiscuous mode [ 743.995543][T17662] device syzkaller0 entered promiscuous mode [ 744.632174][T17686] FAULT_INJECTION: forcing a failure. [ 744.632174][T17686] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 744.820739][T17686] CPU: 0 PID: 17686 Comm: syz.2.5975 Not tainted 5.15.185-syzkaller-00339-ge678c93d43cc #0 [ 744.830788][T17686] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 744.840857][T17686] Call Trace: [ 744.844158][T17686] [ 744.847105][T17686] __dump_stack+0x21/0x30 [ 744.851454][T17686] dump_stack_lvl+0xee/0x150 [ 744.856052][T17686] ? show_regs_print_info+0x20/0x20 [ 744.861259][T17686] ? kstrtouint_from_user+0x1a0/0x200 [ 744.866644][T17686] dump_stack+0x15/0x20 [ 744.870805][T17686] should_fail+0x3c1/0x510 [ 744.875230][T17686] should_fail_usercopy+0x1a/0x20 [ 744.880262][T17686] _copy_from_user+0x20/0xd0 [ 744.884859][T17686] ___sys_recvmsg+0x129/0x4f0 [ 744.889544][T17686] ? proc_fail_nth_read+0x210/0x210 [ 744.894748][T17686] ? __sys_recvmsg+0x250/0x250 [ 744.899521][T17686] ? vfs_write+0xc17/0xf70 [ 744.903961][T17686] ? __fdget+0x1a1/0x230 [ 744.908213][T17686] __x64_sys_recvmsg+0x1df/0x2a0 [ 744.913163][T17686] ? ___sys_recvmsg+0x4f0/0x4f0 [ 744.918027][T17686] ? ksys_write+0x1eb/0x240 [ 744.922549][T17686] ? fpregs_assert_state_consistent+0xb1/0xe0 [ 744.928625][T17686] x64_sys_call+0x705/0x9a0 [ 744.933136][T17686] do_syscall_64+0x4c/0xa0 [ 744.937557][T17686] ? clear_bhb_loop+0x50/0xa0 [ 744.942240][T17686] ? clear_bhb_loop+0x50/0xa0 [ 744.947050][T17686] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 744.953087][T17686] RIP: 0033:0x7f9f15b05929 [ 744.957529][T17686] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 744.977141][T17686] RSP: 002b:00007f9f1416e038 EFLAGS: 00000246 ORIG_RAX: 000000000000002f [ 744.985559][T17686] RAX: ffffffffffffffda RBX: 00007f9f15d2cfa0 RCX: 00007f9f15b05929 [ 744.993623][T17686] RDX: 0000000000000000 RSI: 0000200000000b00 RDI: 0000000000000003 [ 745.001598][T17686] RBP: 00007f9f1416e090 R08: 0000000000000000 R09: 0000000000000000 [ 745.009579][T17686] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 745.017556][T17686] R13: 0000000000000000 R14: 00007f9f15d2cfa0 R15: 00007ffebe8ee0a8 [ 745.025638][T17686] [ 745.870699][T17705] device syzkaller0 entered promiscuous mode [ 746.162225][T17698] device syzkaller0 entered promiscuous mode [ 746.694268][T17738] device syzkaller0 entered promiscuous mode [ 746.825491][T17744] FAULT_INJECTION: forcing a failure. [ 746.825491][T17744] name failslab, interval 1, probability 0, space 0, times 0 [ 746.838182][T17744] CPU: 1 PID: 17744 Comm: syz.0.5999 Not tainted 5.15.185-syzkaller-00339-ge678c93d43cc #0 [ 746.848294][T17744] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 746.858376][T17744] Call Trace: [ 746.861672][T17744] [ 746.864623][T17744] __dump_stack+0x21/0x30 [ 746.868976][T17744] dump_stack_lvl+0xee/0x150 [ 746.873588][T17744] ? show_regs_print_info+0x20/0x20 [ 746.878809][T17744] ? fib6_select_path+0x107/0x620 [ 746.883860][T17744] dump_stack+0x15/0x20 [ 746.888038][T17744] should_fail+0x3c1/0x510 [ 746.892476][T17744] __should_failslab+0xa4/0xe0 [ 746.897266][T17744] should_failslab+0x9/0x20 [ 746.901790][T17744] slab_pre_alloc_hook+0x3b/0xe0 [ 746.906746][T17744] ? __alloc_skb+0xe0/0x740 [ 746.911261][T17744] kmem_cache_alloc+0x44/0x260 [ 746.916040][T17744] ? icmpv6_xrlim_allow+0x350/0x490 [ 746.921263][T17744] __alloc_skb+0xe0/0x740 [ 746.925615][T17744] alloc_skb_with_frags+0xa8/0x620 [ 746.930772][T17744] ? fib6_lookup+0x2a0/0x2a0 [ 746.935385][T17744] sock_alloc_send_pskb+0x853/0x980 [ 746.940608][T17744] ? sock_kzfree_s+0x60/0x60 [ 746.945218][T17744] ? __local_bh_enable_ip+0x58/0x80 [ 746.950432][T17744] ? local_bh_enable+0x1f/0x30 [ 746.955211][T17744] ? ip6_dst_lookup_tail+0xd01/0x1370 [ 746.960617][T17744] sock_alloc_send_skb+0x32/0x40 [ 746.965572][T17744] __ip6_append_data+0x252e/0x37e0 [ 746.970721][T17744] ? icmpv6_route_lookup+0x457/0x4e0 [ 746.976034][T17744] ? ip6_setup_cork+0x1290/0x1290 [ 746.981070][T17744] ? __kasan_check_read+0x11/0x20 [ 746.986107][T17744] ? ip6_setup_cork+0xd10/0x1290 [ 746.991069][T17744] ip6_append_data+0x1d0/0x330 [ 746.995947][T17744] ? icmpv6_route_lookup+0x4e0/0x4e0 [ 747.001271][T17744] ? icmpv6_route_lookup+0x4e0/0x4e0 [ 747.006592][T17744] icmp6_send+0xeb8/0x14c0 [ 747.011042][T17744] ? icmpv6_push_pending_frames+0x440/0x440 [ 747.016965][T17744] ? numa_migrate_prep+0xd0/0xd0 [ 747.021930][T17744] ? __skb_flow_dissect+0x520c/0x5930 [ 747.027320][T17744] icmpv6_param_prob+0x2f/0x40 [ 747.032110][T17744] ip6_parse_tlv+0x1a4c/0x1ba0 [ 747.036905][T17744] ipv6_parse_hopopts+0x2a3/0x580 [ 747.042043][T17744] ip6_rcv_core+0xca7/0x1390 [ 747.046709][T17744] ipv6_rcv+0xca/0x210 [ 747.050809][T17744] ? irqentry_exit+0x37/0x40 [ 747.055426][T17744] ? exc_page_fault+0x5e/0xb0 [ 747.060136][T17744] ? ip6_rcv_finish+0x360/0x360 [ 747.065010][T17744] ? asm_exc_page_fault+0x27/0x30 [ 747.070059][T17744] ? _copy_from_iter+0x181/0x1050 [ 747.075107][T17744] ? ip6_rcv_finish+0x360/0x360 [ 747.079980][T17744] __netif_receive_skb+0xc8/0x280 [ 747.085019][T17744] ? _copy_from_iter+0x4ae/0x1050 [ 747.090058][T17744] ? ktime_get_with_offset+0x1b0/0x200 [ 747.095536][T17744] netif_receive_skb+0x98/0x3d0 [ 747.100405][T17744] ? netif_receive_skb_core+0x100/0x100 [ 747.105967][T17744] ? __kernel_text_address+0xa0/0x100 [ 747.111359][T17744] ? virtio_net_hdr_to_skb+0x9df/0x11c0 [ 747.116936][T17744] tun_rx_batched+0x5e8/0x710 [ 747.121629][T17744] ? local_bh_enable+0x30/0x30 [ 747.126415][T17744] tun_get_user+0x279c/0x33c0 [ 747.131110][T17744] ? _raw_spin_lock_irqsave+0x30/0x110 [ 747.136588][T17744] ? x64_sys_call+0x219/0x9a0 [ 747.141287][T17744] ? tun_do_read+0x1c40/0x1c40 [ 747.146070][T17744] ? kstrtouint_from_user+0x1a0/0x200 [ 747.151464][T17744] ? kstrtol_from_user+0x260/0x260 [ 747.156592][T17744] ? putname+0x111/0x160 [ 747.160850][T17744] ? avc_policy_seqno+0x1b/0x70 [ 747.165725][T17744] ? selinux_file_permission+0x2aa/0x510 [ 747.171393][T17744] tun_chr_write_iter+0x1eb/0x2e0 [ 747.176444][T17744] vfs_write+0x802/0xf70 [ 747.180712][T17744] ? file_end_write+0x1b0/0x1b0 [ 747.185590][T17744] ? __fget_files+0x2c4/0x320 [ 747.190315][T17744] ? __fdget_pos+0x1f7/0x380 [ 747.194952][T17744] ? ksys_write+0x71/0x240 [ 747.199390][T17744] ksys_write+0x140/0x240 [ 747.203737][T17744] ? __ia32_sys_read+0x90/0x90 [ 747.208521][T17744] ? debug_smp_processor_id+0x17/0x20 [ 747.213915][T17744] __x64_sys_write+0x7b/0x90 [ 747.218527][T17744] x64_sys_call+0x8ef/0x9a0 [ 747.223057][T17744] do_syscall_64+0x4c/0xa0 [ 747.227494][T17744] ? clear_bhb_loop+0x50/0xa0 [ 747.232365][T17744] ? clear_bhb_loop+0x50/0xa0 [ 747.237067][T17744] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 747.242987][T17744] RIP: 0033:0x7f20a7856929 [ 747.247416][T17744] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 747.267039][T17744] RSP: 002b:00007f20a5ebf038 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 747.275468][T17744] RAX: ffffffffffffffda RBX: 00007f20a7a7dfa0 RCX: 00007f20a7856929 [ 747.283450][T17744] RDX: 000000000000fdef RSI: 0000200000000000 RDI: 00000000000000c8 [ 747.291433][T17744] RBP: 00007f20a5ebf090 R08: 0000000000000000 R09: 0000000000000000 [ 747.299415][T17744] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 747.307397][T17744] R13: 0000000000000000 R14: 00007f20a7a7dfa0 R15: 00007ffeb6582328 [ 747.315399][T17744] [ 747.359193][T17740] bridge0: port 1(bridge_slave_0) entered blocking state [ 747.369055][T17740] bridge0: port 1(bridge_slave_0) entered disabled state [ 747.376744][T17740] device bridge_slave_0 entered promiscuous mode [ 747.384276][T17740] bridge0: port 2(bridge_slave_1) entered blocking state [ 747.391345][T17740] bridge0: port 2(bridge_slave_1) entered disabled state [ 747.399028][T17740] device bridge_slave_1 entered promiscuous mode [ 747.496487][T17740] bridge0: port 2(bridge_slave_1) entered blocking state [ 747.503618][T17740] bridge0: port 2(bridge_slave_1) entered forwarding state [ 747.510947][T17740] bridge0: port 1(bridge_slave_0) entered blocking state [ 747.518038][T17740] bridge0: port 1(bridge_slave_0) entered forwarding state [ 747.544217][T17167] bridge0: port 1(bridge_slave_0) entered disabled state [ 747.606652][T17167] bridge0: port 2(bridge_slave_1) entered disabled state [ 747.633942][T17167] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 747.712051][T17167] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 747.725711][T17167] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 747.813017][T17167] bridge0: port 1(bridge_slave_0) entered blocking state [ 747.820186][T17167] bridge0: port 1(bridge_slave_0) entered forwarding state [ 748.078439][T17167] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 748.102028][T17167] bridge0: port 2(bridge_slave_1) entered blocking state [ 748.109108][T17167] bridge0: port 2(bridge_slave_1) entered forwarding state [ 748.179650][T17167] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 748.226490][T17167] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 748.322496][ T45] device hsr_slave_0 left promiscuous mode [ 748.328433][ T45] bridge0: port 3(hsr_slave_0) entered disabled state [ 748.372159][ T45] device bridge_slave_1 left promiscuous mode [ 748.378357][ T45] bridge0: port 2(bridge_slave_1) entered disabled state [ 748.412185][ T45] device bridge_slave_0 left promiscuous mode [ 748.418365][ T45] bridge0: port 1(bridge_slave_0) entered disabled state [ 748.443373][ T45] device veth1_macvtap left promiscuous mode [ 748.449441][ T45] device veth0_vlan left promiscuous mode [ 748.848118][T17764] device syzkaller0 entered promiscuous mode [ 748.945110][T17167] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 748.982296][T17167] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 749.019070][T17167] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 749.027903][T17167] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 749.036661][T17167] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 749.054524][T17167] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 749.252309][T17779] device syzkaller0 entered promiscuous mode [ 749.283919][T17740] device veth0_vlan entered promiscuous mode [ 749.312882][T17780] device syzkaller0 entered promiscuous mode [ 749.546515][T17782] device syzkaller0 entered promiscuous mode [ 749.732183][T17167] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 749.750499][T17167] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 749.771134][T17740] device veth1_macvtap entered promiscuous mode [ 749.833420][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 749.892198][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 749.933309][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 749.962105][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 750.462348][T17820] device pim6reg1 entered promiscuous mode [ 750.912105][T17824] bridge0: port 1(bridge_slave_0) entered blocking state [ 750.919194][T17824] bridge0: port 1(bridge_slave_0) entered disabled state [ 750.982574][T17824] device bridge_slave_0 entered promiscuous mode [ 750.994117][T17840] device syzkaller0 entered promiscuous mode [ 751.021184][T17824] bridge0: port 2(bridge_slave_1) entered blocking state [ 751.091273][T17824] bridge0: port 2(bridge_slave_1) entered disabled state [ 751.122290][T17824] device bridge_slave_1 entered promiscuous mode [ 751.543214][T17824] bridge0: port 2(bridge_slave_1) entered blocking state [ 751.550328][T17824] bridge0: port 2(bridge_slave_1) entered forwarding state [ 751.557714][T17824] bridge0: port 1(bridge_slave_0) entered blocking state [ 751.564803][T17824] bridge0: port 1(bridge_slave_0) entered forwarding state [ 751.672636][T17167] device bridge_slave_1 left promiscuous mode [ 751.678829][T17167] bridge0: port 2(bridge_slave_1) entered disabled state [ 751.692108][T17167] device bridge_slave_0 left promiscuous mode [ 751.743062][T17167] bridge0: port 1(bridge_slave_0) entered disabled state [ 751.795068][T17167] device veth1_macvtap left promiscuous mode [ 751.801152][T17167] device veth0_vlan left promiscuous mode [ 752.059398][ T45] bridge0: port 1(bridge_slave_0) entered disabled state [ 752.076976][ T45] bridge0: port 2(bridge_slave_1) entered disabled state [ 752.098252][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 752.107425][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 752.129405][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 752.138816][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 752.147213][ T45] bridge0: port 1(bridge_slave_0) entered blocking state [ 752.154298][ T45] bridge0: port 1(bridge_slave_0) entered forwarding state [ 752.187643][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 752.196253][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 752.204743][ T45] bridge0: port 2(bridge_slave_1) entered blocking state [ 752.211841][ T45] bridge0: port 2(bridge_slave_1) entered forwarding state [ 752.219539][T17867] device pim6reg1 entered promiscuous mode [ 752.260823][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 752.273308][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 752.294471][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 752.322029][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 752.393112][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 752.408394][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 752.420264][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 752.452549][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 752.462436][T17824] device veth0_vlan entered promiscuous mode [ 752.469172][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 752.492473][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 752.535116][T17880] device syzkaller0 entered promiscuous mode [ 752.596199][T17824] device veth1_macvtap entered promiscuous mode [ 752.622378][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 752.631048][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 752.665490][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 752.699348][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 752.729730][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 752.758467][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 752.801318][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 753.204436][T17896] device syzkaller0 entered promiscuous mode [ 753.597871][T17913] device veth0_vlan left promiscuous mode [ 753.640602][T17913] device veth0_vlan entered promiscuous mode [ 753.847148][T17921] device syzkaller0 entered promiscuous mode [ 754.338011][T17919] device syzkaller0 entered promiscuous mode [ 754.654487][T17936] device syzkaller0 entered promiscuous mode [ 755.289394][T17974] FAULT_INJECTION: forcing a failure. [ 755.289394][T17974] name failslab, interval 1, probability 0, space 0, times 0 [ 755.395018][T17974] CPU: 0 PID: 17974 Comm: syz.4.6068 Not tainted 5.15.185-syzkaller-00339-ge678c93d43cc #0 [ 755.405068][T17974] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 755.409701][T17960] device syzkaller0 entered promiscuous mode [ 755.415143][T17974] Call Trace: [ 755.415153][T17974] [ 755.415162][T17974] __dump_stack+0x21/0x30 [ 755.415189][T17974] dump_stack_lvl+0xee/0x150 [ 755.415208][T17974] ? show_regs_print_info+0x20/0x20 [ 755.415234][T17974] dump_stack+0x15/0x20 [ 755.415252][T17974] should_fail+0x3c1/0x510 [ 755.415276][T17974] __should_failslab+0xa4/0xe0 [ 755.415302][T17974] should_failslab+0x9/0x20 [ 755.415322][T17974] slab_pre_alloc_hook+0x3b/0xe0 [ 755.415347][T17974] ? security_file_alloc+0x33/0x120 [ 755.415372][T17974] kmem_cache_alloc+0x44/0x260 [ 755.415397][T17974] security_file_alloc+0x33/0x120 [ 755.415421][T17974] __alloc_file+0xb5/0x2a0 [ 755.415444][T17974] alloc_empty_file+0x97/0x180 [ 755.415467][T17974] alloc_file+0x59/0x540 [ 755.415490][T17974] alloc_file_pseudo+0x17a/0x1f0 [ 755.415513][T17974] ? alloc_empty_file_noaccount+0x80/0x80 [ 755.415544][T17974] sock_alloc_file+0xba/0x260 [ 755.415570][T17974] __sys_socketpair+0x386/0x590 [ 755.415595][T17974] __x64_sys_socketpair+0x9b/0xb0 [ 755.518347][T17974] x64_sys_call+0x36/0x9a0 [ 755.522809][T17974] do_syscall_64+0x4c/0xa0 [ 755.527277][T17974] ? clear_bhb_loop+0x50/0xa0 [ 755.531977][T17974] ? clear_bhb_loop+0x50/0xa0 [ 755.536676][T17974] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 755.542596][T17974] RIP: 0033:0x7f8657222929 [ 755.547045][T17974] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 755.566682][T17974] RSP: 002b:00007f865588b038 EFLAGS: 00000246 ORIG_RAX: 0000000000000035 [ 755.575134][T17974] RAX: ffffffffffffffda RBX: 00007f8657449fa0 RCX: 00007f8657222929 [ 755.583135][T17974] RDX: 0000000000000000 RSI: 0000000000000002 RDI: 000000000000001e [ 755.591138][T17974] RBP: 00007f865588b090 R08: 0000000000000000 R09: 0000000000000000 [ 755.599134][T17974] R10: 0000200000000240 R11: 0000000000000246 R12: 0000000000000002 [ 755.607133][T17974] R13: 0000000000000000 R14: 00007f8657449fa0 R15: 00007ffde2665478 [ 755.615146][T17974] [ 755.624882][T17975] device veth0_vlan left promiscuous mode [ 755.671075][T17975] device veth0_vlan entered promiscuous mode [ 756.068518][T17984] device syzkaller0 entered promiscuous mode [ 756.682303][T18001] device macsec0 left promiscuous mode [ 757.040247][T18015] bridge0: port 1(bridge_slave_0) entered blocking state [ 757.066897][T18015] bridge0: port 1(bridge_slave_0) entered disabled state [ 757.102228][T18015] device bridge_slave_0 entered promiscuous mode [ 757.141190][T18028] device pim6reg1 entered promiscuous mode [ 757.154445][T18015] bridge0: port 2(bridge_slave_1) entered blocking state [ 757.161550][T18015] bridge0: port 2(bridge_slave_1) entered disabled state [ 757.200372][T18015] device bridge_slave_1 entered promiscuous mode [ 757.634326][ T45] device bridge_slave_1 left promiscuous mode [ 757.655422][ T45] bridge0: port 2(bridge_slave_1) entered disabled state [ 757.682133][ T45] device bridge_slave_0 left promiscuous mode [ 757.688380][ T45] bridge0: port 1(bridge_slave_0) entered disabled state [ 757.726073][ T45] device veth0_vlan left promiscuous mode [ 757.915170][T18042] device pim6reg1 entered promiscuous mode [ 757.989192][ T354] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 758.002090][ T354] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 758.052136][ T354] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 758.060890][ T354] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 758.069873][ T354] bridge0: port 1(bridge_slave_0) entered blocking state [ 758.076971][ T354] bridge0: port 1(bridge_slave_0) entered forwarding state [ 758.091782][ T354] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 758.122244][ T354] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 758.140603][ T354] bridge0: port 2(bridge_slave_1) entered blocking state [ 758.147722][ T354] bridge0: port 2(bridge_slave_1) entered forwarding state [ 758.162087][ T354] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 758.196802][ T354] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 758.205348][ T354] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 758.336103][ T354] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 758.360499][ T354] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 758.388247][T18015] device veth0_vlan entered promiscuous mode [ 758.430389][ T354] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 758.462483][ T354] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 758.492280][ T354] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 758.519969][T18044] FAULT_INJECTION: forcing a failure. [ 758.519969][T18044] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 758.528791][ T354] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 758.533310][T18044] CPU: 0 PID: 18044 Comm: syz.4.6093 Not tainted 5.15.185-syzkaller-00339-ge678c93d43cc #0 [ 758.550867][T18044] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 758.558387][T18015] device veth1_macvtap entered promiscuous mode [ 758.560948][T18044] Call Trace: [ 758.560957][T18044] [ 758.573429][T18044] __dump_stack+0x21/0x30 [ 758.577785][T18044] dump_stack_lvl+0xee/0x150 [ 758.582392][T18044] ? show_regs_print_info+0x20/0x20 [ 758.587613][T18044] ? 0xffffffffa0016000 [ 758.591794][T18044] ? is_bpf_text_address+0x177/0x190 [ 758.597106][T18044] dump_stack+0x15/0x20 [ 758.601312][T18044] should_fail+0x3c1/0x510 [ 758.605757][T18044] should_fail_alloc_page+0x55/0x80 [ 758.610989][T18044] prepare_alloc_pages+0x156/0x600 [ 758.616137][T18044] ? __alloc_pages_bulk+0xab0/0xab0 [ 758.621373][T18044] __alloc_pages+0x10a/0x440 [ 758.625996][T18044] ? unlock_page_memcg+0x115/0x130 [ 758.631148][T18044] ? prep_new_page+0x110/0x110 [ 758.635950][T18044] ? page_remove_rmap+0xe3b/0xef0 [ 758.641010][T18044] ? page_add_file_rmap+0x6f0/0x6f0 [ 758.646242][T18044] ? __kasan_check_write+0x14/0x20 [ 758.651388][T18044] ? _raw_spin_lock+0x8e/0xe0 [ 758.656103][T18044] __get_free_pages+0x10/0x30 [ 758.660811][T18044] __tlb_remove_page_size+0x17b/0x300 [ 758.666223][T18044] unmap_page_range+0x10cc/0x1ce0 [ 758.671294][T18044] ? mmu_notifier_invalidate_range_end+0xe0/0xe0 [ 758.677654][T18044] ? kasan_save_stack+0x49/0x60 [ 758.682513][T18044] ? kasan_save_stack+0x3a/0x60 [ 758.687365][T18044] ? __kasan_record_aux_stack+0xd2/0x100 [ 758.693010][T18044] unmap_vmas+0x258/0x360 [ 758.697342][T18044] ? unmap_page_range+0x1ce0/0x1ce0 [ 758.702546][T18044] ? __kasan_check_write+0x14/0x20 [ 758.707675][T18044] ? tlb_gather_mmu_fullmm+0x144/0x1c0 [ 758.713145][T18044] exit_mmap+0x3e6/0x860 [ 758.717392][T18044] ? vm_brk+0x30/0x30 [ 758.721371][T18044] ? mutex_unlock+0x89/0x220 [ 758.725972][T18044] ? uprobe_clear_state+0x2c1/0x320 [ 758.731183][T18044] __mmput+0x93/0x320 [ 758.735169][T18044] ? mmput+0x48/0x150 [ 758.739158][T18044] mmput+0x50/0x150 [ 758.742970][T18044] do_exit+0x9ca/0x27a0 [ 758.747137][T18044] ? put_task_struct+0x90/0x90 [ 758.751989][T18044] ? __fput+0x63f/0x8b0 [ 758.756152][T18044] ? __kasan_check_write+0x14/0x20 [ 758.761263][T18044] ? _raw_spin_lock_irq+0x8f/0xe0 [ 758.766294][T18044] do_group_exit+0x141/0x310 [ 758.770892][T18044] ? __kasan_check_write+0x14/0x20 [ 758.776010][T18044] get_signal+0x66a/0x1480 [ 758.780441][T18044] arch_do_signal_or_restart+0xc1/0x10f0 [ 758.786084][T18044] ? kick_process+0xdc/0x150 [ 758.790678][T18044] ? task_work_add+0x1b2/0x1e0 [ 758.795442][T18044] ? get_sigframe_size+0x10/0x10 [ 758.800379][T18044] ? fput+0x1a/0x20 [ 758.804193][T18044] ? __x64_sys_recvmsg+0x24e/0x2a0 [ 758.809320][T18044] exit_to_user_mode_loop+0xa7/0xe0 [ 758.814519][T18044] exit_to_user_mode_prepare+0x5a/0xa0 [ 758.819984][T18044] syscall_exit_to_user_mode+0x1a/0x30 [ 758.825449][T18044] do_syscall_64+0x58/0xa0 [ 758.829872][T18044] ? clear_bhb_loop+0x50/0xa0 [ 758.834546][T18044] ? clear_bhb_loop+0x50/0xa0 [ 758.839226][T18044] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 758.845134][T18044] RIP: 0033:0x7f8657222929 [ 758.849568][T18044] Code: Unable to access opcode bytes at RIP 0x7f86572228ff. [ 758.856941][T18044] RSP: 002b:00007f865588b038 EFLAGS: 00000246 ORIG_RAX: 000000000000002f [ 758.865362][T18044] RAX: 0000000000000000 RBX: 00007f8657449fa0 RCX: 00007f8657222929 [ 758.873336][T18044] RDX: 0000000040002002 RSI: 0000200000000000 RDI: 0000000000000008 [ 758.881310][T18044] RBP: 00007f865588b090 R08: 0000000000000000 R09: 0000000000000000 [ 758.889284][T18044] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 758.897255][T18044] R13: 0000000000000000 R14: 00007f8657449fa0 R15: 00007ffde2665478 [ 758.905330][T18044] [ 758.921792][ T354] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 758.929435][ T354] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 758.950904][ T354] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 758.969492][ T354] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 758.992259][ T354] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 759.002727][ T354] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 759.011242][ T354] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 759.021070][ T354] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 759.030036][ T354] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 759.739400][T18071] bridge0: port 1(bridge_slave_0) entered blocking state [ 759.754452][T18071] bridge0: port 1(bridge_slave_0) entered disabled state [ 759.792232][T18071] device bridge_slave_0 entered promiscuous mode [ 759.832829][T18071] bridge0: port 2(bridge_slave_1) entered blocking state [ 759.839941][T18071] bridge0: port 2(bridge_slave_1) entered disabled state [ 759.922179][T18071] device bridge_slave_1 entered promiscuous mode [ 760.120739][ T45] GPL: port 1(erspan0) entered disabled state [ 760.133727][ T45] device erspan0 left promiscuous mode [ 760.152280][ T45] GPL: port 1(erspan0) entered disabled state [ 760.435469][T18088] device pim6reg1 entered promiscuous mode [ 760.532303][ T45] device bridge_slave_1 left promiscuous mode [ 760.538628][ T45] bridge0: port 2(bridge_slave_1) entered disabled state [ 760.571576][ T45] device bridge_slave_0 left promiscuous mode [ 760.602267][ T45] bridge0: port 1(bridge_slave_0) entered disabled state [ 760.616039][ T45] device veth0_vlan left promiscuous mode [ 760.883976][ T354] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 760.893275][ T354] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 761.103366][ T354] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 761.112585][ T354] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 761.139922][ T354] bridge0: port 1(bridge_slave_0) entered blocking state [ 761.147044][ T354] bridge0: port 1(bridge_slave_0) entered forwarding state [ 761.211557][ T354] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 761.230332][ T354] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 761.252466][ T354] bridge0: port 2(bridge_slave_1) entered blocking state [ 761.259571][ T354] bridge0: port 2(bridge_slave_1) entered forwarding state [ 761.331912][ T354] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 761.347724][ T354] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 761.467584][T18102] device syzkaller0 entered promiscuous mode [ 761.494700][ T354] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 761.522154][ T354] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 761.530630][ T354] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 761.584652][ T354] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 761.605522][ T354] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 761.632374][ T354] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 761.640468][ T354] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 761.948945][T18110] device syzkaller0 entered promiscuous mode [ 762.008274][T18071] device veth0_vlan entered promiscuous mode [ 762.065755][ T354] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 762.078132][ T354] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 762.102866][T18071] device veth1_macvtap entered promiscuous mode [ 762.118825][ T354] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 762.165653][ T354] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 762.192070][ T354] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 762.241831][ T354] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 762.281293][ T354] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 762.312549][T18124] device pim6reg1 entered promiscuous mode [ 762.427547][T18131] device pim6reg1 entered promiscuous mode [ 762.528129][T18133] device syzkaller0 entered promiscuous mode [ 763.237422][T18155] device syzkaller0 entered promiscuous mode [ 763.598182][T18153] device syzkaller0 entered promiscuous mode [ 763.856829][T18148] device syzkaller0 entered promiscuous mode [ 764.045252][T18158] device syzkaller0 entered promiscuous mode [ 764.087454][T18167] device pim6reg1 entered promiscuous mode [ 764.262923][T18173] device pim6reg1 entered promiscuous mode [ 764.304788][T18175] device syzkaller0 entered promiscuous mode [ 764.453045][T18180] FAULT_INJECTION: forcing a failure. [ 764.453045][T18180] name failslab, interval 1, probability 0, space 0, times 0 [ 764.518027][T18180] CPU: 1 PID: 18180 Comm: syz.2.6140 Not tainted 5.15.185-syzkaller-00339-ge678c93d43cc #0 [ 764.528087][T18180] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 764.538175][T18180] Call Trace: [ 764.541476][T18180] [ 764.544465][T18180] __dump_stack+0x21/0x30 [ 764.548817][T18180] dump_stack_lvl+0xee/0x150 [ 764.553428][T18180] ? show_regs_print_info+0x20/0x20 [ 764.558656][T18180] dump_stack+0x15/0x20 [ 764.562837][T18180] should_fail+0x3c1/0x510 [ 764.566655][T18189] device syzkaller0 entered promiscuous mode [ 764.567285][T18180] __should_failslab+0xa4/0xe0 [ 764.578064][T18180] should_failslab+0x9/0x20 [ 764.582601][T18180] slab_pre_alloc_hook+0x3b/0xe0 [ 764.587569][T18180] kmem_cache_alloc_trace+0x48/0x270 [ 764.592865][T18180] ? selinux_sk_alloc_security+0x7e/0x1a0 [ 764.598607][T18180] selinux_sk_alloc_security+0x7e/0x1a0 [ 764.604169][T18180] security_sk_alloc+0x72/0xa0 [ 764.608951][T18180] sk_prot_alloc+0x108/0x320 [ 764.613561][T18180] sk_alloc+0x38/0x430 [ 764.617641][T18180] bpf_prog_test_run_skb+0x24b/0x1150 [ 764.623026][T18180] ? __kasan_check_write+0x14/0x20 [ 764.628152][T18180] ? __bpf_prog_test_run_raw_tp+0x2b0/0x2b0 [ 764.634058][T18180] bpf_prog_test_run+0x3d5/0x620 [ 764.639011][T18180] ? bpf_prog_query+0x230/0x230 [ 764.643870][T18180] ? selinux_bpf+0xce/0xf0 [ 764.648292][T18180] ? security_bpf+0x82/0xa0 [ 764.652798][T18180] __sys_bpf+0x52c/0x730 [ 764.657183][T18180] ? bpf_link_show_fdinfo+0x310/0x310 [ 764.662564][T18180] ? debug_smp_processor_id+0x17/0x20 [ 764.667946][T18180] __x64_sys_bpf+0x7c/0x90 [ 764.672365][T18180] x64_sys_call+0x4b9/0x9a0 [ 764.676877][T18180] do_syscall_64+0x4c/0xa0 [ 764.681293][T18180] ? clear_bhb_loop+0x50/0xa0 [ 764.685978][T18180] ? clear_bhb_loop+0x50/0xa0 [ 764.690658][T18180] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 764.696557][T18180] RIP: 0033:0x7fca94ad9929 [ 764.700974][T18180] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 764.720582][T18180] RSP: 002b:00007fca93142038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 764.728999][T18180] RAX: ffffffffffffffda RBX: 00007fca94d00fa0 RCX: 00007fca94ad9929 [ 764.736972][T18180] RDX: 000000000000002c RSI: 0000200000000080 RDI: 000000000000000a [ 764.744946][T18180] RBP: 00007fca93142090 R08: 0000000000000000 R09: 0000000000000000 [ 764.752924][T18180] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 764.760900][T18180] R13: 0000000000000000 R14: 00007fca94d00fa0 R15: 00007fffdd5344d8 [ 764.768889][T18180] [ 765.460630][T18213] device pim6reg1 entered promiscuous mode [ 765.795229][T18209] device syzkaller0 entered promiscuous mode [ 766.025085][T18215] device syzkaller0 entered promiscuous mode [ 766.325065][T18222] device syzkaller0 entered promiscuous mode [ 766.502207][T18227] device sit0 entered promiscuous mode [ 766.776109][T18231] device syzkaller0 entered promiscuous mode [ 766.980693][T18249] device pim6reg1 entered promiscuous mode [ 767.012741][T18240] device wg2 entered promiscuous mode [ 767.422058][T18263] FAULT_INJECTION: forcing a failure. [ 767.422058][T18263] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 767.552027][T18263] CPU: 0 PID: 18263 Comm: syz.3.6167 Not tainted 5.15.185-syzkaller-00339-ge678c93d43cc #0 [ 767.562081][T18263] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 767.572169][T18263] Call Trace: [ 767.575473][T18263] [ 767.578426][T18263] __dump_stack+0x21/0x30 [ 767.582787][T18263] dump_stack_lvl+0xee/0x150 [ 767.587415][T18263] ? show_regs_print_info+0x20/0x20 [ 767.592647][T18263] dump_stack+0x15/0x20 [ 767.596822][T18263] should_fail+0x3c1/0x510 [ 767.601269][T18263] should_fail_alloc_page+0x55/0x80 [ 767.606488][T18263] prepare_alloc_pages+0x156/0x600 [ 767.611629][T18263] ? __alloc_pages_bulk+0xab0/0xab0 [ 767.616859][T18263] ? slab_post_alloc_hook+0x4f/0x2b0 [ 767.622175][T18263] ? kmem_cache_alloc+0xf7/0x260 [ 767.627137][T18263] ? alloc_vmap_area+0x17a/0x1990 [ 767.632186][T18263] ? __get_vm_area_node+0x14e/0x350 [ 767.637413][T18263] ? __vmalloc_node_range+0xe8/0x840 [ 767.642728][T18263] ? copy_process+0x5a9/0x3210 [ 767.647553][T18263] __alloc_pages+0x10a/0x440 [ 767.652191][T18263] ? prep_new_page+0x110/0x110 [ 767.656982][T18263] __get_free_pages+0x10/0x30 [ 767.661681][T18263] kasan_populate_vmalloc_pte+0x29/0x120 [ 767.667342][T18263] __apply_to_page_range+0x8b0/0xbf0 [ 767.672651][T18263] ? kasan_populate_vmalloc+0x70/0x70 [ 767.678221][T18263] ? kasan_populate_vmalloc+0x70/0x70 [ 767.683612][T18263] apply_to_page_range+0x3b/0x50 [ 767.688576][T18263] kasan_populate_vmalloc+0x60/0x70 [ 767.693791][T18263] alloc_vmap_area+0x185c/0x1990 [ 767.698770][T18263] ? vm_map_ram+0xa60/0xa60 [ 767.703302][T18263] ? kmem_cache_alloc_trace+0x119/0x270 [ 767.708865][T18263] ? __get_vm_area_node+0x11d/0x350 [ 767.714082][T18263] __get_vm_area_node+0x14e/0x350 [ 767.719134][T18263] __vmalloc_node_range+0xe8/0x840 [ 767.724262][T18263] ? copy_process+0x5a9/0x3210 [ 767.729056][T18263] ? slab_post_alloc_hook+0x6d/0x2b0 [ 767.734376][T18263] ? kmem_cache_alloc+0xf7/0x260 [ 767.739339][T18263] dup_task_struct+0x3f2/0xc10 [ 767.744129][T18263] ? copy_process+0x5a9/0x3210 [ 767.748913][T18263] ? recalc_sigpending+0x1ac/0x230 [ 767.754041][T18263] copy_process+0x5a9/0x3210 [ 767.758658][T18263] ? kstrtol_from_user+0x260/0x260 [ 767.763798][T18263] ? __kasan_check_write+0x14/0x20 [ 767.768947][T18263] ? proc_fail_nth_write+0x17a/0x1f0 [ 767.774254][T18263] ? proc_fail_nth_read+0x210/0x210 [ 767.779476][T18263] ? __pidfd_prepare+0x150/0x150 [ 767.784441][T18263] ? security_file_permission+0x83/0xa0 [ 767.790016][T18263] kernel_clone+0x23f/0x940 [ 767.794541][T18263] ? create_io_thread+0x130/0x130 [ 767.799590][T18263] ? __kasan_check_write+0x14/0x20 [ 767.804720][T18263] ? mutex_unlock+0x89/0x220 [ 767.809336][T18263] __x64_sys_clone+0x176/0x1d0 [ 767.814123][T18263] ? __kasan_check_write+0x14/0x20 [ 767.819275][T18263] ? __ia32_sys_vfork+0xf0/0xf0 [ 767.824170][T18263] ? fpregs_assert_state_consistent+0xb1/0xe0 [ 767.830267][T18263] x64_sys_call+0x41f/0x9a0 [ 767.834790][T18263] do_syscall_64+0x4c/0xa0 [ 767.839246][T18263] ? clear_bhb_loop+0x50/0xa0 [ 767.843942][T18263] ? clear_bhb_loop+0x50/0xa0 [ 767.848637][T18263] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 767.854555][T18263] RIP: 0033:0x7f8eb5cec929 [ 767.858988][T18263] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 767.878616][T18263] RSP: 002b:00007f8eb4354fe8 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 767.887142][T18263] RAX: ffffffffffffffda RBX: 00007f8eb5f13fa0 RCX: 00007f8eb5cec929 [ 767.895129][T18263] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00000000640c7000 [ 767.903118][T18263] RBP: 00007f8eb4355090 R08: 0000000000000000 R09: 0000000000000000 [ 767.911101][T18263] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000001 [ 767.919088][T18263] R13: 0000000000000000 R14: 00007f8eb5f13fa0 R15: 00007ffffa8ef288 [ 767.927244][T18263] [ 768.001761][T18263] syz.3.6167: vmalloc error: size 32768, vm_struct allocation failed, mode:0xdc0(GFP_KERNEL|__GFP_ZERO), nodemask=(null),cpuset=syz3,mems_allowed=0 [ 768.017085][T18263] CPU: 1 PID: 18263 Comm: syz.3.6167 Not tainted 5.15.185-syzkaller-00339-ge678c93d43cc #0 [ 768.027098][T18263] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 768.037177][T18263] Call Trace: [ 768.040469][T18263] [ 768.043402][T18263] __dump_stack+0x21/0x30 [ 768.047744][T18263] dump_stack_lvl+0xee/0x150 [ 768.052335][T18263] ? show_regs_print_info+0x20/0x20 [ 768.057538][T18263] ? pr_cont_kernfs_name+0xe3/0xf0 [ 768.062657][T18263] dump_stack+0x15/0x20 [ 768.066818][T18263] warn_alloc+0x1b0/0x1d0 [ 768.071157][T18263] ? __kasan_slab_free+0x11/0x20 [ 768.076099][T18263] ? slab_free_freelist_hook+0xc2/0x190 [ 768.081654][T18263] ? zone_watermark_ok_safe+0x270/0x270 [ 768.087203][T18263] ? __get_vm_area_node+0x163/0x350 [ 768.092413][T18263] __vmalloc_node_range+0x2c4/0x840 [ 768.097614][T18263] ? slab_post_alloc_hook+0x6d/0x2b0 [ 768.102913][T18263] ? kmem_cache_alloc+0xf7/0x260 [ 768.107859][T18263] dup_task_struct+0x3f2/0xc10 [ 768.112640][T18263] ? copy_process+0x5a9/0x3210 [ 768.117473][T18263] ? recalc_sigpending+0x1ac/0x230 [ 768.122605][T18263] copy_process+0x5a9/0x3210 [ 768.127241][T18263] ? kstrtol_from_user+0x260/0x260 [ 768.132364][T18263] ? __kasan_check_write+0x14/0x20 [ 768.137485][T18263] ? proc_fail_nth_write+0x17a/0x1f0 [ 768.142776][T18263] ? proc_fail_nth_read+0x210/0x210 [ 768.147984][T18263] ? __pidfd_prepare+0x150/0x150 [ 768.152931][T18263] ? security_file_permission+0x83/0xa0 [ 768.158487][T18263] kernel_clone+0x23f/0x940 [ 768.163005][T18263] ? create_io_thread+0x130/0x130 [ 768.168039][T18263] ? __kasan_check_write+0x14/0x20 [ 768.173159][T18263] ? mutex_unlock+0x89/0x220 [ 768.177772][T18263] __x64_sys_clone+0x176/0x1d0 [ 768.182557][T18263] ? __kasan_check_write+0x14/0x20 [ 768.187692][T18263] ? __ia32_sys_vfork+0xf0/0xf0 [ 768.192565][T18263] ? fpregs_assert_state_consistent+0xb1/0xe0 [ 768.198667][T18263] x64_sys_call+0x41f/0x9a0 [ 768.203184][T18263] do_syscall_64+0x4c/0xa0 [ 768.207605][T18263] ? clear_bhb_loop+0x50/0xa0 [ 768.212283][T18263] ? clear_bhb_loop+0x50/0xa0 [ 768.216963][T18263] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 768.222864][T18263] RIP: 0033:0x7f8eb5cec929 [ 768.227307][T18263] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 768.246918][T18263] RSP: 002b:00007f8eb4354fe8 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 768.255341][T18263] RAX: ffffffffffffffda RBX: 00007f8eb5f13fa0 RCX: 00007f8eb5cec929 [ 768.263404][T18263] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00000000640c7000 [ 768.271377][T18263] RBP: 00007f8eb4355090 R08: 0000000000000000 R09: 0000000000000000 [ 768.279350][T18263] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000001 [ 768.287320][T18263] R13: 0000000000000000 R14: 00007f8eb5f13fa0 R15: 00007ffffa8ef288 [ 768.295314][T18263] [ 768.311014][T18263] Mem-Info: [ 768.319241][T18263] active_anon:40 inactive_anon:51060 isolated_anon:0 [ 768.319241][T18263] active_file:26380 inactive_file:2939 isolated_file:0 [ 768.319241][T18263] unevictable:0 dirty:187 writeback:0 [ 768.319241][T18263] slab_reclaimable:8432 slab_unreclaimable:73795 [ 768.319241][T18263] mapped:40581 shmem:36684 pagetables:772 bounce:0 [ 768.319241][T18263] kernel_misc_reclaimable:0 [ 768.319241][T18263] free:1505561 free_pcp:15066 free_cma:0 [ 768.400471][T18271] device pim6reg1 entered promiscuous mode [ 768.436859][T18263] Node 0 active_anon:160kB inactive_anon:213440kB active_file:105520kB inactive_file:11756kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:158024kB dirty:748kB writeback:0kB shmem:155936kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 0kB writeback_tmp:0kB kernel_stack:4348kB pagetables:3088kB all_unreclaimable? no [ 768.687078][T18268] device syzkaller0 entered promiscuous mode [ 768.766029][T18265] device syzkaller0 entered promiscuous mode [ 768.772224][T18263] DMA32 free:2978772kB min:62612kB low:78264kB high:93916kB reserved_highatomic:0KB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:3145324kB managed:2983024kB mlocked:0kB bounce:0kB free_pcp:4252kB local_pcp:0kB free_cma:0kB [ 768.816823][T18263] lowmem_reserve[]: 0 3941 3941 [ 768.826920][T18263] Normal free:3027228kB min:84840kB low:106048kB high:127256kB reserved_highatomic:0KB active_anon:160kB inactive_anon:185740kB active_file:105520kB inactive_file:11756kB unevictable:0kB writepending:748kB present:5242880kB managed:4036096kB mlocked:0kB bounce:0kB free_pcp:69396kB local_pcp:18116kB free_cma:0kB [ 768.968027][T18284] device syzkaller0 entered promiscuous mode [ 769.112411][T18286] device wg2 entered promiscuous mode [ 769.161442][T18263] lowmem_reserve[]: 0 0 0 [ 769.167355][T18290] device pim6reg1 entered promiscuous mode [ 769.176110][T18263] DMA32: 3*4kB (M) 1*8kB (M) 2*16kB (M) 3*32kB (M) 3*64kB (M) 3*128kB (M) 3*256kB (M) 3*512kB (M) 4*1024kB (UM) 3*2048kB (UM) 724*4096kB (M) = 2978772kB [ 769.211739][T18263] Normal: 6*4kB (UME) 955*8kB (UME) 2523*16kB (UME) 2055*32kB (UME) 989*64kB (UME) 468*128kB (UME) 117*256kB (UM) 42*512kB (UM) 7*1024kB (UM) 4*2048kB (UME) 672*4096kB (UM) = 3056320kB [ 769.351792][T18263] 57064 total pagecache pages [ 769.376386][T18263] 0 pages in swap cache [ 769.380615][T18263] Swap cache stats: add 0, delete 0, find 0/0 [ 769.429569][T18263] Free swap = 124996kB [ 769.430128][T18281] device syzkaller0 entered promiscuous mode [ 769.444003][T18263] Total swap = 124996kB [ 769.466033][T18263] 2097051 pages RAM [ 769.482287][T18263] 0 pages HighMem/MovableOnly [ 769.489225][T18263] 342271 pages reserved [ 769.527124][T18263] 0 pages cma reserved [ 769.637779][T18298] bond_slave_1: mtu less than device minimum [ 769.765007][T18305] device sit0 entered promiscuous mode [ 770.526266][T18319] device syzkaller0 entered promiscuous mode [ 770.786932][T18323] device syzkaller0 entered promiscuous mode [ 770.795354][T18339] syz.4.6192[18339] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 770.795437][T18339] syz.4.6192[18339] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 770.807361][T18335] device wg2 entered promiscuous mode [ 770.885879][T18336] device pim6reg1 entered promiscuous mode [ 771.507425][T18350] device syzkaller0 entered promiscuous mode [ 771.747507][T18358] device syzkaller0 entered promiscuous mode [ 771.783889][T18370] device sit0 entered promiscuous mode [ 772.328687][T18391] device sit0 left promiscuous mode [ 772.592140][T18393] device sit0 entered promiscuous mode [ 772.924149][T18390] device syzkaller0 entered promiscuous mode [ 772.952635][T18396] device pim6reg1 entered promiscuous mode [ 773.045908][T18388] device syzkaller0 entered promiscuous mode [ 773.198735][T18400] device syzkaller0 entered promiscuous mode [ 773.289877][T18403] device sit0 left promiscuous mode [ 773.922075][T18429] device pim6reg1 entered promiscuous mode [ 774.192118][T18431] device syzkaller0 entered promiscuous mode [ 774.841927][T18434] device syzkaller0 entered promiscuous mode [ 775.639091][T18447] device syzkaller0 entered promiscuous mode [ 776.227156][T18473] device syzkaller0 entered promiscuous mode [ 776.697175][T18483] device syzkaller0 entered promiscuous mode [ 776.865692][T18498] device pim6reg1 entered promiscuous mode [ 776.904758][T18502] device sit0 left promiscuous mode [ 777.122631][T18512] FAULT_INJECTION: forcing a failure. [ 777.122631][T18512] name failslab, interval 1, probability 0, space 0, times 0 [ 777.210661][T18512] CPU: 1 PID: 18512 Comm: syz.4.6249 Not tainted 5.15.185-syzkaller-00339-ge678c93d43cc #0 [ 777.220797][T18512] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 777.230873][T18512] Call Trace: [ 777.234174][T18512] [ 777.237119][T18512] __dump_stack+0x21/0x30 [ 777.241476][T18512] dump_stack_lvl+0xee/0x150 [ 777.246093][T18512] ? show_regs_print_info+0x20/0x20 [ 777.251306][T18512] ? avc_has_perm+0x158/0x240 [ 777.256003][T18512] dump_stack+0x15/0x20 [ 777.260166][T18512] should_fail+0x3c1/0x510 [ 777.264593][T18512] __should_failslab+0xa4/0xe0 [ 777.269370][T18512] should_failslab+0x9/0x20 [ 777.273882][T18512] slab_pre_alloc_hook+0x3b/0xe0 [ 777.278827][T18512] ? sock_alloc_inode+0x1b/0xb0 [ 777.283681][T18512] kmem_cache_alloc+0x44/0x260 [ 777.288448][T18512] ? sockfs_init_fs_context+0xb0/0xb0 [ 777.293826][T18512] sock_alloc_inode+0x1b/0xb0 [ 777.298507][T18512] ? sockfs_init_fs_context+0xb0/0xb0 [ 777.303884][T18512] new_inode_pseudo+0x62/0x210 [ 777.308655][T18512] __sock_create+0x12c/0x7a0 [ 777.313254][T18512] __sys_socketpair+0x218/0x590 [ 777.318114][T18512] __x64_sys_socketpair+0x9b/0xb0 [ 777.323142][T18512] x64_sys_call+0x36/0x9a0 [ 777.327564][T18512] do_syscall_64+0x4c/0xa0 [ 777.331981][T18512] ? clear_bhb_loop+0x50/0xa0 [ 777.336658][T18512] ? clear_bhb_loop+0x50/0xa0 [ 777.341337][T18512] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 777.347238][T18512] RIP: 0033:0x7f8657222929 [ 777.351658][T18512] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 777.371270][T18512] RSP: 002b:00007f865588b038 EFLAGS: 00000246 ORIG_RAX: 0000000000000035 [ 777.379690][T18512] RAX: ffffffffffffffda RBX: 00007f8657449fa0 RCX: 00007f8657222929 [ 777.387664][T18512] RDX: 0000000000000001 RSI: 0000000000000002 RDI: 0000000000000002 [ 777.395639][T18512] RBP: 00007f865588b090 R08: 0000000000000000 R09: 0000000000000000 [ 777.403610][T18512] R10: 0000200000002c40 R11: 0000000000000246 R12: 0000000000000002 [ 777.411584][T18512] R13: 0000000000000001 R14: 00007f8657449fa0 R15: 00007ffde2665478 [ 777.419580][T18512] [ 777.492791][T18512] socket: no more sockets [ 777.773113][T18510] device syzkaller0 entered promiscuous mode [ 777.809097][T18519] device pim6reg1 entered promiscuous mode [ 777.822946][T18525] device sit0 entered promiscuous mode [ 778.120826][T18531] ÿÿÿÿÿÿ: renamed from vlan1 [ 786.319500][T18556] device syzkaller0 entered promiscuous mode [ 786.528233][T18562] device syzkaller0 entered promiscuous mode [ 786.551992][T18571] device sit0 left promiscuous mode [ 786.619410][T18581] FAULT_INJECTION: forcing a failure. [ 786.619410][T18581] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 786.632670][T18581] CPU: 0 PID: 18581 Comm: syz.1.6275 Not tainted 5.15.185-syzkaller-00339-ge678c93d43cc #0 [ 786.642682][T18581] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 786.652758][T18581] Call Trace: [ 786.656046][T18581] [ 786.658980][T18581] __dump_stack+0x21/0x30 [ 786.663316][T18581] dump_stack_lvl+0xee/0x150 [ 786.667914][T18581] ? show_regs_print_info+0x20/0x20 [ 786.673119][T18581] dump_stack+0x15/0x20 [ 786.677281][T18581] should_fail+0x3c1/0x510 [ 786.681705][T18581] should_fail_usercopy+0x1a/0x20 [ 786.686731][T18581] _copy_from_user+0x20/0xd0 [ 786.691327][T18581] iovec_from_user+0x1bc/0x2f0 [ 786.696094][T18581] __import_iovec+0x71/0x400 [ 786.700688][T18581] ? kstrtol_from_user+0x260/0x260 [ 786.705807][T18581] import_iovec+0x7c/0xb0 [ 786.710145][T18581] ___sys_recvmsg+0x420/0x4f0 [ 786.714832][T18581] ? __sys_recvmsg+0x250/0x250 [ 786.719779][T18581] ? vfs_write+0xc17/0xf70 [ 786.724214][T18581] ? __fdget+0x1a1/0x230 [ 786.728462][T18581] __x64_sys_recvmsg+0x1df/0x2a0 [ 786.733403][T18581] ? ___sys_recvmsg+0x4f0/0x4f0 [ 786.738261][T18581] ? ksys_write+0x1eb/0x240 [ 786.742774][T18581] ? fpregs_assert_state_consistent+0xb1/0xe0 [ 786.748847][T18581] x64_sys_call+0x705/0x9a0 [ 786.753356][T18581] do_syscall_64+0x4c/0xa0 [ 786.757775][T18581] ? clear_bhb_loop+0x50/0xa0 [ 786.762454][T18581] ? clear_bhb_loop+0x50/0xa0 [ 786.767173][T18581] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 786.773081][T18581] RIP: 0033:0x7f81ec5d8929 [ 786.777498][T18581] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 786.797109][T18581] RSP: 002b:00007f81eac41038 EFLAGS: 00000246 ORIG_RAX: 000000000000002f [ 786.805529][T18581] RAX: ffffffffffffffda RBX: 00007f81ec7fffa0 RCX: 00007f81ec5d8929 [ 786.813505][T18581] RDX: 0000000000000000 RSI: 0000200000000b00 RDI: 0000000000000003 [ 786.821483][T18581] RBP: 00007f81eac41090 R08: 0000000000000000 R09: 0000000000000000 [ 786.829457][T18581] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 786.837435][T18581] R13: 0000000000000000 R14: 00007f81ec7fffa0 R15: 00007fffe8aa9728 [ 786.845430][T18581] [ 786.886038][T18573] device sit0 entered promiscuous mode [ 787.117033][T18577] device syzkaller0 entered promiscuous mode [ 787.216247][T18585] ref_ctr_offset mismatch. inode: 0xa4 offset: 0x0 ref_ctr_offset(old): 0x0 ref_ctr_offset(new): 0x1fe [ 787.340547][T18585] GPL: port 1(erspan0) entered blocking state [ 787.348577][T18585] GPL: port 1(erspan0) entered disabled state [ 787.364487][T18585] device erspan0 entered promiscuous mode [ 787.390145][T18585] GPL: port 1(erspan0) entered blocking state [ 787.396452][T18585] GPL: port 1(erspan0) entered forwarding state [ 787.575125][T18606] device pim6reg1 entered promiscuous mode [ 787.760504][T18604] device syzkaller0 entered promiscuous mode [ 787.781278][T18612] device veth1_macvtap left promiscuous mode [ 788.198620][T18621] device syzkaller0 entered promiscuous mode [ 788.694671][T18659] device pim6reg1 entered promiscuous mode [ 789.026911][T18653] device syzkaller0 entered promiscuous mode [ 789.261283][T18680] device sit0 entered promiscuous mode [ 789.650977][T18673] device syzkaller0 entered promiscuous mode [ 790.264866][T18714] device pim6reg1 entered promiscuous mode [ 790.698741][T18715] device syzkaller0 entered promiscuous mode [ 791.352098][T18728] device syzkaller0 entered promiscuous mode [ 792.406139][T18755] device syzkaller0 entered promiscuous mode [ 792.486378][T18767] device sit0 left promiscuous mode [ 792.602756][T18771] device sit0 entered promiscuous mode [ 792.744639][T18769] device pim6reg1 entered promiscuous mode [ 793.274554][T18785] device syzkaller0 entered promiscuous mode [ 793.454705][T18788] device syzkaller0 entered promiscuous mode [ 793.641906][T18800] device wg2 left promiscuous mode [ 793.661264][T18800] device pim6reg1 entered promiscuous mode [ 793.686355][T18800] device wg2 entered promiscuous mode [ 793.737527][T18806] device sit0 left promiscuous mode [ 793.889257][T18799] device syzkaller0 entered promiscuous mode [ 793.987075][T18806] device sit0 entered promiscuous mode [ 794.807292][T18843] FAULT_INJECTION: forcing a failure. [ 794.807292][T18843] name failslab, interval 1, probability 0, space 0, times 0 [ 794.861320][T18834] device syzkaller0 entered promiscuous mode [ 794.982381][T18843] CPU: 0 PID: 18843 Comm: syz.0.6374 Not tainted 5.15.185-syzkaller-00339-ge678c93d43cc #0 [ 794.992557][T18843] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 795.002638][T18843] Call Trace: [ 795.005940][T18843] [ 795.008911][T18843] __dump_stack+0x21/0x30 [ 795.013262][T18843] dump_stack_lvl+0xee/0x150 [ 795.017876][T18843] ? show_regs_print_info+0x20/0x20 [ 795.023693][T18843] dump_stack+0x15/0x20 [ 795.027880][T18843] should_fail+0x3c1/0x510 [ 795.032323][T18843] __should_failslab+0xa4/0xe0 [ 795.037115][T18843] should_failslab+0x9/0x20 [ 795.041643][T18843] slab_pre_alloc_hook+0x3b/0xe0 [ 795.046608][T18843] __kmalloc+0x6d/0x2c0 [ 795.050782][T18843] ? bpf_map_area_alloc+0x49/0xe0 [ 795.055840][T18843] bpf_map_area_alloc+0x49/0xe0 [ 795.060716][T18843] htab_map_alloc+0x3c0/0x14f0 [ 795.065514][T18843] map_create+0x455/0x21b0 [ 795.069951][T18843] __sys_bpf+0x2cf/0x730 [ 795.074214][T18843] ? bpf_link_show_fdinfo+0x310/0x310 [ 795.079614][T18843] ? debug_smp_processor_id+0x17/0x20 [ 795.085012][T18843] __x64_sys_bpf+0x7c/0x90 [ 795.089456][T18843] x64_sys_call+0x4b9/0x9a0 [ 795.093977][T18843] do_syscall_64+0x4c/0xa0 [ 795.098402][T18843] ? clear_bhb_loop+0x50/0xa0 [ 795.103081][T18843] ? clear_bhb_loop+0x50/0xa0 [ 795.107762][T18843] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 795.113702][T18843] RIP: 0033:0x7f0366fc8929 [ 795.118134][T18843] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 795.137749][T18843] RSP: 002b:00007f0365631038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 795.146173][T18843] RAX: ffffffffffffffda RBX: 00007f03671effa0 RCX: 00007f0366fc8929 [ 795.154154][T18843] RDX: 0000000000000048 RSI: 0000200000000580 RDI: 0000000000000000 [ 795.162128][T18843] RBP: 00007f0365631090 R08: 0000000000000000 R09: 0000000000000000 [ 795.170100][T18843] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 795.178071][T18843] R13: 0000000000000000 R14: 00007f03671effa0 R15: 00007fff0491e738 [ 795.186069][T18843] [ 795.257596][T18832] device syzkaller0 entered promiscuous mode [ 795.440160][T18839] device syzkaller0 entered promiscuous mode [ 796.236394][T18863] device syzkaller0 entered promiscuous mode [ 796.549743][T18875] device syzkaller0 entered promiscuous mode [ 796.740336][T18887] device syzkaller0 entered promiscuous mode [ 797.109439][T18895] device syzkaller0 entered promiscuous mode [ 797.239331][T18891] device syzkaller0 entered promiscuous mode [ 797.553975][T18921] device pim6reg1 entered promiscuous mode [ 798.217927][T18927] device syzkaller0 entered promiscuous mode [ 798.451531][T18935] device syzkaller0 entered promiscuous mode [ 798.717032][T18932] device syzkaller0 entered promiscuous mode [ 798.938574][T18946] device syzkaller0 entered promiscuous mode [ 799.122459][T18947] device syzkaller0 entered promiscuous mode [ 799.298306][T18955] device pim6reg1 entered promiscuous mode [ 799.416917][T18959] device syzkaller0 entered promiscuous mode [ 799.667497][T18965] syz.2.6417[18965] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 799.667577][T18965] syz.2.6417[18965] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 800.795724][T18987] device syzkaller0 entered promiscuous mode [ 801.093647][T18984] device syzkaller0 entered promiscuous mode [ 801.459959][T18997] device syzkaller0 entered promiscuous mode [ 801.627857][T19000] device syzkaller0 entered promiscuous mode [ 801.906070][T19004] device syzkaller0 entered promiscuous mode [ 802.457351][T19020] device syzkaller0 entered promiscuous mode [ 802.483551][T19031] device sit0 entered promiscuous mode [ 802.679749][T19026] device syzkaller0 entered promiscuous mode [ 802.814336][T19030] device syzkaller0 entered promiscuous mode [ 803.636789][T19055] device syzkaller0 entered promiscuous mode [ 803.904306][T19058] device syzkaller0 entered promiscuous mode [ 804.108480][T19062] device syzkaller0 entered promiscuous mode [ 804.190314][T19053] device syzkaller0 entered promiscuous mode [ 804.729754][T19075] device syzkaller0 entered promiscuous mode [ 804.901281][T19078] device syzkaller0 entered promiscuous mode [ 804.933529][T19081] GPL: port 1(erspan0) entered blocking state [ 804.940083][T19081] GPL: port 1(erspan0) entered disabled state [ 804.977115][T19081] device erspan0 entered promiscuous mode [ 805.013508][T19088] GPL: port 1(erspan0) entered blocking state [ 805.019673][T19088] GPL: port 1(erspan0) entered forwarding state [ 805.242998][T19085] device syzkaller0 entered promiscuous mode [ 805.952744][T19095] device syzkaller0 entered promiscuous mode [ 805.974051][T19101] device pim6reg1 entered promiscuous mode [ 806.151879][T19102] device syzkaller0 entered promiscuous mode [ 806.464990][T19115] device syzkaller0 entered promiscuous mode [ 806.710830][T19118] device syzkaller0 entered promiscuous mode [ 806.930892][T19123] device syzkaller0 entered promiscuous mode [ 807.191607][T19120] device syzkaller0 entered promiscuous mode [ 807.225294][T19126] device wg2 left promiscuous mode [ 807.240913][T19127] device wg2 entered promiscuous mode [ 807.922718][T19138] device syzkaller0 entered promiscuous mode [ 808.190113][T19150] device syzkaller0 entered promiscuous mode [ 809.214457][T19180] GPL: port 1(erspan0) entered blocking state [ 809.221190][T19180] GPL: port 1(erspan0) entered disabled state [ 809.347786][T19180] device erspan0 entered promiscuous mode [ 809.394194][T19182] GPL: port 1(erspan0) entered blocking state [ 809.400353][T19182] GPL: port 1(erspan0) entered forwarding state [ 809.916109][T19181] device syzkaller0 entered promiscuous mode [ 810.063428][T19191] device syzkaller0 entered promiscuous mode [ 810.346219][T19201] device syzkaller0 entered promiscuous mode [ 810.665888][T19214] device wg2 left promiscuous mode [ 810.704550][T19214] device wg2 entered promiscuous mode [ 811.781168][T19235] device syzkaller0 entered promiscuous mode [ 812.316020][T19245] device syzkaller0 entered promiscuous mode [ 812.367238][T19258] device sit0 entered promiscuous mode [ 812.503466][T19264] device pim6reg1 entered promiscuous mode [ 813.467511][T19278] device syzkaller0 entered promiscuous mode [ 814.151717][T19292] device syzkaller0 entered promiscuous mode [ 814.396720][T19296] device syzkaller0 entered promiscuous mode [ 814.665263][T19298] device syzkaller0 entered promiscuous mode [ 814.821731][T19304] device syzkaller0 entered promiscuous mode [ 814.958418][T19316] device pim6reg1 entered promiscuous mode [ 815.838102][T19326] device syzkaller0 entered promiscuous mode [ 816.044002][T19343] device syzkaller0 entered promiscuous mode [ 816.483382][T19346] device syzkaller0 entered promiscuous mode [ 816.773632][T19356] device pim6reg1 entered promiscuous mode [ 816.960193][T19366] device sit0 left promiscuous mode [ 817.240903][T19358] device syzkaller0 entered promiscuous mode [ 817.332133][T19371] device sit0 entered promiscuous mode [ 817.561316][T19361] device syzkaller0 entered promiscuous mode [ 817.780929][T19380] device syzkaller0 entered promiscuous mode [ 818.048612][T19395] device pim6reg1 entered promiscuous mode [ 819.665922][T19409] device syzkaller0 entered promiscuous mode [ 819.851367][T19398] device syzkaller0 entered promiscuous mode [ 820.206769][T19420] device syzkaller0 entered promiscuous mode [ 820.253587][T19432] device pim6reg1 entered promiscuous mode [ 820.948187][T19450] device syzkaller0 entered promiscuous mode [ 821.530182][T19454] device syzkaller0 entered promiscuous mode [ 822.115839][T19482] device syzkaller0 entered promiscuous mode [ 822.447897][T19497] device syzkaller0 entered promiscuous mode [ 822.961334][T19516] device syzkaller0 entered promiscuous mode [ 823.024946][T19525] device pim6reg1 entered promiscuous mode [ 823.137402][T19529] device veth1_macvtap entered promiscuous mode [ 823.152002][T19529] device macsec0 entered promiscuous mode [ 823.186689][ T354] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 823.378462][T19546] device syzkaller0 entered promiscuous mode [ 823.541990][T19536] device syzkaller0 entered promiscuous mode [ 823.749073][T19543] device syzkaller0 entered promiscuous mode [ 823.996119][T19569] device pim6reg1 entered promiscuous mode [ 824.604537][T19593] bond_slave_1: mtu less than device minimum [ 824.684731][T19589] device veth1_macvtap left promiscuous mode [ 824.908505][T19597] device syzkaller0 entered promiscuous mode [ 825.083198][T19599] device syzkaller0 entered promiscuous mode [ 825.143248][ T354] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 825.214249][T19611] device pim6reg1 entered promiscuous mode [ 825.259900][T19615] FAULT_INJECTION: forcing a failure. [ 825.259900][T19615] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 825.310504][T19615] CPU: 1 PID: 19615 Comm: syz.2.6642 Not tainted 5.15.185-syzkaller-00339-ge678c93d43cc #0 [ 825.320557][T19615] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 825.330637][T19615] Call Trace: [ 825.333927][T19615] [ 825.336866][T19615] __dump_stack+0x21/0x30 [ 825.341208][T19615] dump_stack_lvl+0xee/0x150 [ 825.345813][T19615] ? show_regs_print_info+0x20/0x20 [ 825.351022][T19615] dump_stack+0x15/0x20 [ 825.355179][T19615] should_fail+0x3c1/0x510 [ 825.359608][T19615] should_fail_alloc_page+0x55/0x80 [ 825.364818][T19615] prepare_alloc_pages+0x156/0x600 [ 825.369940][T19615] ? __alloc_pages_bulk+0xab0/0xab0 [ 825.375145][T19615] __alloc_pages+0x10a/0x440 [ 825.379740][T19615] ? sysvec_apic_timer_interrupt+0x64/0xc0 [ 825.385553][T19615] ? prep_new_page+0x110/0x110 [ 825.390321][T19615] ? __kasan_check_write+0x14/0x20 [ 825.395447][T19615] __get_free_pages+0x10/0x30 [ 825.400127][T19615] kasan_populate_vmalloc_pte+0x29/0x120 [ 825.405768][T19615] __apply_to_page_range+0x8b0/0xbf0 [ 825.411057][T19615] ? kasan_populate_vmalloc+0x70/0x70 [ 825.416436][T19615] ? kasan_populate_vmalloc+0x70/0x70 [ 825.421814][T19615] apply_to_page_range+0x3b/0x50 [ 825.426756][T19615] kasan_populate_vmalloc+0x60/0x70 [ 825.431955][T19615] alloc_vmap_area+0x185c/0x1990 [ 825.436909][T19615] ? vm_map_ram+0xa60/0xa60 [ 825.441414][T19615] ? kmem_cache_alloc_trace+0x119/0x270 [ 825.446963][T19615] ? __get_vm_area_node+0x11d/0x350 [ 825.452166][T19615] __get_vm_area_node+0x14e/0x350 [ 825.457194][T19615] __vmalloc_node_range+0xe8/0x840 [ 825.462305][T19615] ? dev_map_create_hash+0x26/0x1c0 [ 825.467521][T19615] bpf_map_area_alloc+0xd5/0xe0 [ 825.472379][T19615] ? dev_map_create_hash+0x26/0x1c0 [ 825.477580][T19615] dev_map_create_hash+0x26/0x1c0 [ 825.482616][T19615] dev_map_alloc+0x2d4/0x560 [ 825.487221][T19615] map_create+0x455/0x21b0 [ 825.491642][T19615] __sys_bpf+0x2cf/0x730 [ 825.495891][T19615] ? bpf_link_show_fdinfo+0x310/0x310 [ 825.501272][T19615] ? asm_sysvec_apic_timer_interrupt+0x1b/0x20 [ 825.507435][T19615] __x64_sys_bpf+0x7c/0x90 [ 825.511962][T19615] x64_sys_call+0x4b9/0x9a0 [ 825.516470][T19615] do_syscall_64+0x4c/0xa0 [ 825.520892][T19615] ? clear_bhb_loop+0x50/0xa0 [ 825.525569][T19615] ? clear_bhb_loop+0x50/0xa0 [ 825.530266][T19615] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 825.536353][T19615] RIP: 0033:0x7fca94ad9929 [ 825.540771][T19615] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 825.560385][T19615] RSP: 002b:00007fca93142038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 825.568805][T19615] RAX: ffffffffffffffda RBX: 00007fca94d00fa0 RCX: 00007fca94ad9929 [ 825.576783][T19615] RDX: 0000000000000048 RSI: 0000200000000580 RDI: 0000000000000000 [ 825.584759][T19615] RBP: 00007fca93142090 R08: 0000000000000000 R09: 0000000000000000 [ 825.592731][T19615] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 825.600703][T19615] R13: 0000000000000000 R14: 00007fca94d00fa0 R15: 00007fffdd5344d8 [ 825.608692][T19615] [ 826.815156][T19659] device pim6reg1 entered promiscuous mode [ 827.162738][T19655] device syzkaller0 entered promiscuous mode [ 827.385389][T19662] device syzkaller0 entered promiscuous mode [ 828.171723][T19699] device syzkaller0 entered promiscuous mode [ 828.694525][T19711] device syzkaller0 entered promiscuous mode [ 828.930086][T19718] device syzkaller0 entered promiscuous mode [ 830.242518][T19770] device syzkaller0 entered promiscuous mode [ 830.676614][T19778] device syzkaller0 entered promiscuous mode [ 832.150047][T19818] device syzkaller0 entered promiscuous mode [ 832.549926][T19830] device syzkaller0 entered promiscuous mode [ 833.186222][T19847] device syzkaller0 entered promiscuous mode [ 833.530886][T19853] device syzkaller0 entered promiscuous mode [ 833.656167][T19856] device syzkaller0 entered promiscuous mode [ 836.959028][T19884] device syzkaller0 entered promiscuous mode [ 837.283504][T19885] device syzkaller0 entered promiscuous mode [ 837.845319][T19903] device syzkaller0 entered promiscuous mode [ 838.070040][T19911] device syzkaller0 entered promiscuous mode [ 838.810123][T19933] device syzkaller0 entered promiscuous mode [ 839.358038][T19954] device syzkaller0 entered promiscuous mode [ 839.767114][T19974] FAULT_INJECTION: forcing a failure. [ 839.767114][T19974] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 839.809278][T19974] CPU: 0 PID: 19974 Comm: syz.0.6764 Not tainted 5.15.185-syzkaller-00339-ge678c93d43cc #0 [ 839.819308][T19974] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 839.829405][T19974] Call Trace: [ 839.832716][T19974] [ 839.835659][T19974] __dump_stack+0x21/0x30 [ 839.840016][T19974] dump_stack_lvl+0xee/0x150 [ 839.844632][T19974] ? show_regs_print_info+0x20/0x20 [ 839.849859][T19974] dump_stack+0x15/0x20 [ 839.854068][T19974] should_fail+0x3c1/0x510 [ 839.858516][T19974] should_fail_alloc_page+0x55/0x80 [ 839.863743][T19974] prepare_alloc_pages+0x156/0x600 [ 839.868885][T19974] ? __alloc_pages_bulk+0xab0/0xab0 [ 839.874111][T19974] ? _find_next_bit+0x1fa/0x200 [ 839.878984][T19974] __alloc_pages+0x10a/0x440 [ 839.883593][T19974] ? prep_new_page+0x110/0x110 [ 839.888388][T19974] ? irqentry_exit+0x37/0x40 [ 839.893002][T19974] ? sysvec_apic_timer_interrupt+0x64/0xc0 [ 839.898837][T19974] pcpu_populate_chunk+0x184/0xcb0 [ 839.903979][T19974] ? pcpu_alloc+0xc38/0x1660 [ 839.908617][T19974] pcpu_alloc+0xc4d/0x1660 [ 839.913073][T19974] __alloc_percpu_gfp+0x25/0x30 [ 839.918046][T19974] bpf_map_alloc_percpu+0xc5/0x150 [ 839.923197][T19974] array_map_alloc+0x39a/0x6d0 [ 839.928002][T19974] map_create+0x455/0x21b0 [ 839.932462][T19974] __sys_bpf+0x2cf/0x730 [ 839.936732][T19974] ? bpf_link_show_fdinfo+0x310/0x310 [ 839.942139][T19974] __x64_sys_bpf+0x7c/0x90 [ 839.946667][T19974] x64_sys_call+0x4b9/0x9a0 [ 839.951285][T19974] do_syscall_64+0x4c/0xa0 [ 839.955730][T19974] ? clear_bhb_loop+0x50/0xa0 [ 839.960431][T19974] ? clear_bhb_loop+0x50/0xa0 [ 839.965133][T19974] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 839.971065][T19974] RIP: 0033:0x7f0366fc8929 [ 839.975511][T19974] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 839.995143][T19974] RSP: 002b:00007f0365631038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 840.003586][T19974] RAX: ffffffffffffffda RBX: 00007f03671effa0 RCX: 00007f0366fc8929 [ 840.011590][T19974] RDX: 0000000000000048 RSI: 0000200000000b00 RDI: 2000000000000000 [ 840.019582][T19974] RBP: 00007f0365631090 R08: 0000000000000000 R09: 0000000000000000 [ 840.027559][T19974] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 840.035532][T19974] R13: 0000000000000000 R14: 00007f03671effa0 R15: 00007fff0491e738 [ 840.043524][T19974] [ 840.202321][T19986] device pim6reg1 entered promiscuous mode [ 840.590096][T19988] device syzkaller0 entered promiscuous mode [ 840.993202][T20002] device syzkaller0 entered promiscuous mode [ 841.402834][ T30] audit: type=1400 audit(1750735736.559:154): avc: denied { create } for pid=20032 comm="syz.0.6784" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 844.369754][T20082] FAULT_INJECTION: forcing a failure. [ 844.369754][T20082] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 844.403706][T20082] CPU: 1 PID: 20082 Comm: syz.4.6803 Not tainted 5.15.185-syzkaller-00339-ge678c93d43cc #0 [ 844.413925][T20082] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 844.424008][T20082] Call Trace: [ 844.427320][T20082] [ 844.430268][T20082] __dump_stack+0x21/0x30 [ 844.434634][T20082] dump_stack_lvl+0xee/0x150 [ 844.439249][T20082] ? show_regs_print_info+0x20/0x20 [ 844.444475][T20082] dump_stack+0x15/0x20 [ 844.448655][T20082] should_fail+0x3c1/0x510 [ 844.453101][T20082] should_fail_usercopy+0x1a/0x20 [ 844.458149][T20082] _copy_from_user+0x20/0xd0 [ 844.462772][T20082] bpf_test_init+0x13d/0x1c0 [ 844.467393][T20082] bpf_prog_test_run_skb+0x193/0x1150 [ 844.472799][T20082] ? __kasan_check_write+0x14/0x20 [ 844.477942][T20082] ? fput_many+0x15a/0x1a0 [ 844.482388][T20082] ? __bpf_prog_test_run_raw_tp+0x2b0/0x2b0 [ 844.488313][T20082] bpf_prog_test_run+0x3d5/0x620 [ 844.493280][T20082] ? bpf_prog_query+0x230/0x230 [ 844.498151][T20082] ? selinux_bpf+0xce/0xf0 [ 844.502607][T20082] ? security_bpf+0x82/0xa0 [ 844.507138][T20082] __sys_bpf+0x52c/0x730 [ 844.511402][T20082] ? bpf_link_show_fdinfo+0x310/0x310 [ 844.516800][T20082] ? debug_smp_processor_id+0x17/0x20 [ 844.522204][T20082] __x64_sys_bpf+0x7c/0x90 [ 844.526640][T20082] x64_sys_call+0x4b9/0x9a0 [ 844.531161][T20082] do_syscall_64+0x4c/0xa0 [ 844.535586][T20082] ? clear_bhb_loop+0x50/0xa0 [ 844.540276][T20082] ? clear_bhb_loop+0x50/0xa0 [ 844.544968][T20082] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 844.550886][T20082] RIP: 0033:0x7f8657222929 [ 844.555316][T20082] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 844.574945][T20082] RSP: 002b:00007f865588b038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 844.583389][T20082] RAX: ffffffffffffffda RBX: 00007f8657449fa0 RCX: 00007f8657222929 [ 844.591399][T20082] RDX: 000000000000004c RSI: 0000200000000240 RDI: 000000000000000a [ 844.599394][T20082] RBP: 00007f865588b090 R08: 0000000000000000 R09: 0000000000000000 [ 844.607387][T20082] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 844.615381][T20082] R13: 0000000000000000 R14: 00007f8657449fa0 R15: 00007ffde2665478 [ 844.623489][T20082] [ 848.254319][T20097] device syzkaller0 entered promiscuous mode [ 848.458184][ T30] audit: type=1400 audit(1750735743.609:155): avc: denied { create } for pid=20106 comm="syz.4.6810" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netrom_socket permissive=1 [ 848.856017][T20138] device sit0 left promiscuous mode [ 849.187326][T20148] device syzkaller0 entered promiscuous mode [ 849.468627][T20141] device syzkaller0 entered promiscuous mode [ 849.493025][T20145] device sit0 entered promiscuous mode [ 850.286159][T20155] device syzkaller0 entered promiscuous mode [ 850.508336][T20158] device syzkaller0 entered promiscuous mode [ 850.645623][T20170] FAULT_INJECTION: forcing a failure. [ 850.645623][T20170] name failslab, interval 1, probability 0, space 0, times 0 [ 850.705303][T20169] device sit0 left promiscuous mode [ 850.714873][T20170] CPU: 0 PID: 20170 Comm: syz.3.6830 Not tainted 5.15.185-syzkaller-00339-ge678c93d43cc #0 [ 850.724905][T20170] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 850.734983][T20170] Call Trace: [ 850.738269][T20170] [ 850.741199][T20170] __dump_stack+0x21/0x30 [ 850.745536][T20170] dump_stack_lvl+0xee/0x150 [ 850.750124][T20170] ? show_regs_print_info+0x20/0x20 [ 850.755320][T20170] ? __kernel_text_address+0xa0/0x100 [ 850.760693][T20170] ? unwind_get_return_address+0x4d/0x90 [ 850.766328][T20170] dump_stack+0x15/0x20 [ 850.770484][T20170] should_fail+0x3c1/0x510 [ 850.774901][T20170] __should_failslab+0xa4/0xe0 [ 850.779668][T20170] should_failslab+0x9/0x20 [ 850.784173][T20170] slab_pre_alloc_hook+0x3b/0xe0 [ 850.789121][T20170] ? __d_alloc+0x2d/0x6a0 [ 850.793452][T20170] kmem_cache_alloc+0x44/0x260 [ 850.798232][T20170] __d_alloc+0x2d/0x6a0 [ 850.802389][T20170] d_alloc_parallel+0xd6/0x1320 [ 850.807246][T20170] ? selinux_inode_permission+0x426/0x5e0 [ 850.812972][T20170] ? selinux_inode_follow_link+0x360/0x360 [ 850.818786][T20170] ? d_hash_and_lookup+0x1f0/0x1f0 [ 850.823901][T20170] ? unwind_get_return_address+0x4d/0x90 [ 850.829539][T20170] ? __kasan_check_write+0x14/0x20 [ 850.834651][T20170] ? rwsem_read_trylock+0x29a/0x620 [ 850.839848][T20170] ? lockref_get_not_dead+0xe6/0x1c0 [ 850.845134][T20170] ? downgrade_write+0x410/0x410 [ 850.850077][T20170] __lookup_slow+0x13e/0x3e0 [ 850.854674][T20170] ? lookup_one_len+0x2c0/0x2c0 [ 850.859527][T20170] ? down_read+0xa5/0xf0 [ 850.863772][T20170] ? handle_dots+0xe10/0xe10 [ 850.868380][T20170] lookup_slow+0x57/0x70 [ 850.872621][T20170] walk_component+0x325/0x460 [ 850.877307][T20170] path_lookupat+0x180/0x490 [ 850.881900][T20170] filename_lookup+0x1e2/0x4f0 [ 850.886664][T20170] ? hashlen_string+0x120/0x120 [ 850.891521][T20170] ? getname_kernel+0x59/0x2e0 [ 850.896301][T20170] ? memcpy+0x56/0x70 [ 850.900286][T20170] ? getname_kernel+0x201/0x2e0 [ 850.905139][T20170] kern_path+0x3d/0x1b0 [ 850.909294][T20170] create_local_trace_uprobe+0xa2/0x6f0 [ 850.914844][T20170] ? bpf_get_uprobe_info+0x4e0/0x4e0 [ 850.920131][T20170] ? _copy_from_user+0x95/0xd0 [ 850.924906][T20170] perf_uprobe_init+0xf9/0x1a0 [ 850.929672][T20170] perf_uprobe_event_init+0x10b/0x190 [ 850.935048][T20170] perf_try_init_event+0x14a/0x430 [ 850.940161][T20170] perf_event_alloc+0xedd/0x1a20 [ 850.945120][T20170] __se_sys_perf_event_open+0x5ae/0x1b80 [ 850.950755][T20170] ? __kasan_check_write+0x14/0x20 [ 850.955865][T20170] ? mutex_unlock+0x89/0x220 [ 850.960470][T20170] ? __x64_sys_perf_event_open+0xd0/0xd0 [ 850.966110][T20170] ? __ia32_sys_read+0x90/0x90 [ 850.970879][T20170] __x64_sys_perf_event_open+0xbf/0xd0 [ 850.976342][T20170] x64_sys_call+0x50d/0x9a0 [ 850.980844][T20170] do_syscall_64+0x4c/0xa0 [ 850.985259][T20170] ? clear_bhb_loop+0x50/0xa0 [ 850.989936][T20170] ? clear_bhb_loop+0x50/0xa0 [ 850.994632][T20170] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 851.000526][T20170] RIP: 0033:0x7f8eb5cec929 [ 851.004948][T20170] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 851.024552][T20170] RSP: 002b:00007f8eb4355038 EFLAGS: 00000246 ORIG_RAX: 000000000000012a [ 851.032966][T20170] RAX: ffffffffffffffda RBX: 00007f8eb5f13fa0 RCX: 00007f8eb5cec929 [ 851.040942][T20170] RDX: 0000000000000000 RSI: ffffffffffffffff RDI: 0000200000000000 [ 851.048912][T20170] RBP: 00007f8eb4355090 R08: 0000000000000000 R09: 0000000000000000 [ 851.056883][T20170] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000001 [ 851.064854][T20170] R13: 0000000000000000 R14: 00007f8eb5f13fa0 R15: 00007ffffa8ef288 [ 851.072840][T20170] [ 851.079451][T20172] device sit0 entered promiscuous mode [ 851.819217][T20188] device wg2 entered promiscuous mode [ 852.251728][T20192] device syzkaller0 entered promiscuous mode [ 852.545503][T20185] device syzkaller0 entered promiscuous mode [ 852.904382][T20206] device syzkaller0 entered promiscuous mode [ 854.086478][T20247] device syzkaller0 entered promiscuous mode [ 854.849994][T20266] ip6_vti0: mtu greater than device maximum [ 854.967531][T20266] device veth1_macvtap left promiscuous mode [ 855.499657][T20272] device syzkaller0 entered promiscuous mode [ 857.408989][T20355] device syzkaller0 entered promiscuous mode [ 858.046232][T20353] device syzkaller0 entered promiscuous mode [ 858.164850][T20367] device sit0 left promiscuous mode [ 858.501706][T20372] device sit0 entered promiscuous mode [ 858.813142][T20380] device syzkaller0 entered promiscuous mode [ 859.019138][T20375] device syzkaller0 entered promiscuous mode [ 859.206370][T20381] device syzkaller0 entered promiscuous mode [ 859.507177][T20391] device syzkaller0 entered promiscuous mode [ 860.720105][T20410] device syzkaller0 entered promiscuous mode [ 861.419621][T20430] device syzkaller0 entered promiscuous mode [ 861.790235][T20429] device syzkaller0 entered promiscuous mode [ 861.865667][T20434] device syzkaller0 entered promiscuous mode [ 862.609168][T20479] device syzkaller0 entered promiscuous mode [ 862.828407][T20481] device syzkaller0 entered promiscuous mode [ 863.293885][T20493] FAULT_INJECTION: forcing a failure. [ 863.293885][T20493] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 863.356313][T20493] CPU: 1 PID: 20493 Comm: syz.3.6942 Not tainted 5.15.185-syzkaller-00339-ge678c93d43cc #0 [ 863.366353][T20493] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 863.376437][T20493] Call Trace: [ 863.379741][T20493] [ 863.382691][T20493] __dump_stack+0x21/0x30 [ 863.387042][T20493] dump_stack_lvl+0xee/0x150 [ 863.391651][T20493] ? show_regs_print_info+0x20/0x20 [ 863.396884][T20493] dump_stack+0x15/0x20 [ 863.401065][T20493] should_fail+0x3c1/0x510 [ 863.405513][T20493] should_fail_alloc_page+0x55/0x80 [ 863.409256][T20484] device syzkaller0 entered promiscuous mode [ 863.410737][T20493] prepare_alloc_pages+0x156/0x600 [ 863.410769][T20493] ? __alloc_pages_bulk+0xab0/0xab0 [ 863.410790][T20493] ? slab_post_alloc_hook+0x4f/0x2b0 [ 863.410815][T20493] ? alloc_vmap_area+0x17a/0x1990 [ 863.410836][T20493] ? __get_vm_area_node+0x14e/0x350 [ 863.410862][T20493] ? __vmalloc_node_range+0xe8/0x840 [ 863.447910][T20493] ? dev_map_create_hash+0x26/0x1c0 [ 863.453139][T20493] __alloc_pages+0x10a/0x440 [ 863.457753][T20493] ? prep_new_page+0x110/0x110 [ 863.462538][T20493] ? __kasan_check_write+0x14/0x20 [ 863.467688][T20493] __get_free_pages+0x10/0x30 [ 863.472388][T20493] kasan_populate_vmalloc_pte+0x29/0x120 [ 863.478050][T20493] __apply_to_page_range+0x8b0/0xbf0 [ 863.483363][T20493] ? kasan_populate_vmalloc+0x70/0x70 [ 863.488768][T20493] ? kasan_populate_vmalloc+0x70/0x70 [ 863.494161][T20493] apply_to_page_range+0x3b/0x50 [ 863.499120][T20493] kasan_populate_vmalloc+0x60/0x70 [ 863.504343][T20493] alloc_vmap_area+0x185c/0x1990 [ 863.509323][T20493] ? vm_map_ram+0xa60/0xa60 [ 863.513856][T20493] ? kmem_cache_alloc_trace+0x119/0x270 [ 863.519430][T20493] ? __get_vm_area_node+0x11d/0x350 [ 863.524664][T20493] __get_vm_area_node+0x14e/0x350 [ 863.529726][T20493] __vmalloc_node_range+0xe8/0x840 [ 863.534865][T20493] ? dev_map_create_hash+0x26/0x1c0 [ 863.540105][T20493] bpf_map_area_alloc+0xd5/0xe0 [ 863.544983][T20493] ? dev_map_create_hash+0x26/0x1c0 [ 863.550214][T20493] dev_map_create_hash+0x26/0x1c0 [ 863.555277][T20493] dev_map_alloc+0x2d4/0x560 [ 863.559903][T20493] map_create+0x455/0x21b0 [ 863.564347][T20493] __sys_bpf+0x2cf/0x730 [ 863.568602][T20493] ? bpf_link_show_fdinfo+0x310/0x310 [ 863.574007][T20493] ? debug_smp_processor_id+0x17/0x20 [ 863.579407][T20493] __x64_sys_bpf+0x7c/0x90 [ 863.583856][T20493] x64_sys_call+0x4b9/0x9a0 [ 863.588390][T20493] do_syscall_64+0x4c/0xa0 [ 863.592838][T20493] ? clear_bhb_loop+0x50/0xa0 [ 863.597544][T20493] ? clear_bhb_loop+0x50/0xa0 [ 863.602243][T20493] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 863.608159][T20493] RIP: 0033:0x7f8eb5cec929 [ 863.612588][T20493] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 863.632210][T20493] RSP: 002b:00007f8eb4355038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 863.640647][T20493] RAX: ffffffffffffffda RBX: 00007f8eb5f13fa0 RCX: 00007f8eb5cec929 [ 863.648641][T20493] RDX: 0000000000000048 RSI: 0000200000000580 RDI: 0000000000000000 [ 863.656644][T20493] RBP: 00007f8eb4355090 R08: 0000000000000000 R09: 0000000000000000 [ 863.664635][T20493] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 863.672632][T20493] R13: 0000000000000000 R14: 00007f8eb5f13fa0 R15: 00007ffffa8ef288 [ 863.680642][T20493] [ 863.816228][T20486] device syzkaller0 entered promiscuous mode [ 864.020160][T20504] FAULT_INJECTION: forcing a failure. [ 864.020160][T20504] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 864.072646][T20504] CPU: 1 PID: 20504 Comm: syz.1.6944 Not tainted 5.15.185-syzkaller-00339-ge678c93d43cc #0 [ 864.082689][T20504] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 864.092775][T20504] Call Trace: [ 864.096082][T20504] [ 864.099034][T20504] __dump_stack+0x21/0x30 [ 864.103397][T20504] dump_stack_lvl+0xee/0x150 [ 864.108006][T20504] ? show_regs_print_info+0x20/0x20 [ 864.113234][T20504] ? migrate_enable+0x192/0x260 [ 864.118114][T20504] ? migrate_disable+0x180/0x180 [ 864.123228][T20504] dump_stack+0x15/0x20 [ 864.127416][T20504] should_fail+0x3c1/0x510 [ 864.131945][T20504] should_fail_usercopy+0x1a/0x20 [ 864.137016][T20504] _copy_from_user+0x20/0xd0 [ 864.141752][T20504] generic_map_update_batch+0x44f/0x740 [ 864.147408][T20504] ? vfs_write+0x974/0xf70 [ 864.151849][T20504] ? generic_map_delete_batch+0x510/0x510 [ 864.157592][T20504] ? __fdget+0x1a1/0x230 [ 864.161855][T20504] ? generic_map_delete_batch+0x510/0x510 [ 864.167744][T20504] bpf_map_do_batch+0x463/0x5f0 [ 864.172717][T20504] __sys_bpf+0x5e3/0x730 [ 864.176992][T20504] ? bpf_link_show_fdinfo+0x310/0x310 [ 864.182398][T20504] ? debug_smp_processor_id+0x17/0x20 [ 864.187790][T20504] __x64_sys_bpf+0x7c/0x90 [ 864.192224][T20504] x64_sys_call+0x4b9/0x9a0 [ 864.196740][T20504] do_syscall_64+0x4c/0xa0 [ 864.201165][T20504] ? clear_bhb_loop+0x50/0xa0 [ 864.205852][T20504] ? clear_bhb_loop+0x50/0xa0 [ 864.210541][T20504] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 864.216456][T20504] RIP: 0033:0x7f81ec5d8929 [ 864.220885][T20504] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 864.240508][T20504] RSP: 002b:00007f81eac41038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 864.248941][T20504] RAX: ffffffffffffffda RBX: 00007f81ec7fffa0 RCX: 00007f81ec5d8929 [ 864.256932][T20504] RDX: 0000000000000038 RSI: 0000200000000380 RDI: 000000000000001a [ 864.264920][T20504] RBP: 00007f81eac41090 R08: 0000000000000000 R09: 0000000000000000 [ 864.272903][T20504] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 864.280887][T20504] R13: 0000000000000000 R14: 00007f81ec7fffa0 R15: 00007fffe8aa9728 [ 864.288892][T20504] [ 864.295424][T20496] device syzkaller0 entered promiscuous mode [ 864.904776][T20530] device sit0 left promiscuous mode [ 864.969693][T20531] device sit0 entered promiscuous mode [ 865.250107][T20538] device veth1_macvtap left promiscuous mode [ 865.985310][T20549] device syzkaller0 entered promiscuous mode [ 866.411655][T20591] ip6gretap0: refused to change device tx_queue_len [ 868.029885][T20638] device syzkaller0 entered promiscuous mode [ 868.300975][T20642] device syzkaller0 entered promiscuous mode [ 868.734603][T20651] device syzkaller0 entered promiscuous mode [ 869.904041][T20700] device syzkaller0 entered promiscuous mode [ 870.313027][T20697] device syzkaller0 entered promiscuous mode [ 870.718922][T20722] ÿÿÿÿÿÿ: renamed from vlan1 [ 870.779292][T20722] FAULT_INJECTION: forcing a failure. [ 870.779292][T20722] name failslab, interval 1, probability 0, space 0, times 0 [ 870.862921][T20722] CPU: 0 PID: 20722 Comm: syz.2.7019 Not tainted 5.15.185-syzkaller-00339-ge678c93d43cc #0 [ 870.872967][T20722] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 870.883049][T20722] Call Trace: [ 870.886371][T20722] [ 870.889320][T20722] __dump_stack+0x21/0x30 [ 870.893688][T20722] dump_stack_lvl+0xee/0x150 [ 870.898307][T20722] ? show_regs_print_info+0x20/0x20 [ 870.903546][T20722] dump_stack+0x15/0x20 [ 870.907726][T20722] should_fail+0x3c1/0x510 [ 870.912175][T20722] __should_failslab+0xa4/0xe0 [ 870.916969][T20722] should_failslab+0x9/0x20 [ 870.921496][T20722] slab_pre_alloc_hook+0x3b/0xe0 [ 870.926466][T20722] __kmalloc+0x6d/0x2c0 [ 870.930646][T20722] ? kobject_rename+0x1a8/0x4d0 [ 870.935528][T20722] kobject_rename+0x1a8/0x4d0 [ 870.940234][T20722] ? kobject_init_and_add+0x190/0x190 [ 870.945818][T20722] ? sysfs_rename_link_ns+0x170/0x1a0 [ 870.951285][T20722] device_rename+0x164/0x190 [ 870.955926][T20722] dev_change_name+0x2df/0x8f0 [ 870.960726][T20722] ? avc_denied+0x1b0/0x1b0 [ 870.965413][T20722] ? dev_alloc_name+0x130/0x130 [ 870.970310][T20722] dev_ifsioc+0x3b9/0xe70 [ 870.974677][T20722] ? dev_ioctl+0xd10/0xd10 [ 870.979125][T20722] ? __kasan_check_write+0x14/0x20 [ 870.984269][T20722] ? mutex_lock+0x95/0x1a0 [ 870.988716][T20722] ? wait_for_completion_killable_timeout+0x10/0x10 [ 870.995332][T20722] ? security_capable+0x87/0xb0 [ 871.000216][T20722] dev_ioctl+0x345/0xd10 [ 871.004488][T20722] sock_do_ioctl+0x22e/0x300 [ 871.009114][T20722] ? sock_show_fdinfo+0xa0/0xa0 [ 871.014001][T20722] ? selinux_file_ioctl+0x377/0x480 [ 871.019271][T20722] sock_ioctl+0x4bc/0x6b0 [ 871.023630][T20722] ? sock_poll+0x3d0/0x3d0 [ 871.028072][T20722] ? __fget_files+0x2c4/0x320 [ 871.032793][T20722] ? security_file_ioctl+0x84/0xa0 [ 871.037940][T20722] ? sock_poll+0x3d0/0x3d0 [ 871.042393][T20722] __se_sys_ioctl+0x121/0x1a0 [ 871.047105][T20722] __x64_sys_ioctl+0x7b/0x90 [ 871.051722][T20722] x64_sys_call+0x2f/0x9a0 [ 871.056162][T20722] do_syscall_64+0x4c/0xa0 [ 871.060598][T20722] ? clear_bhb_loop+0x50/0xa0 [ 871.065299][T20722] ? clear_bhb_loop+0x50/0xa0 [ 871.070003][T20722] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 871.075942][T20722] RIP: 0033:0x7fca94ad9929 [ 871.080385][T20722] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 871.100025][T20722] RSP: 002b:00007fca93121038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 871.108487][T20722] RAX: ffffffffffffffda RBX: 00007fca94d01080 RCX: 00007fca94ad9929 [ 871.116492][T20722] RDX: 0000200000000000 RSI: 0000000000008923 RDI: 000000000000000b [ 871.124483][T20722] RBP: 00007fca93121090 R08: 0000000000000000 R09: 0000000000000000 [ 871.132456][T20722] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 871.140431][T20722] R13: 0000000000000000 R14: 00007fca94d01080 R15: 00007fffdd5344d8 [ 871.148436][T20722] [ 871.450038][T20713] device syzkaller0 entered promiscuous mode [ 871.468703][T20730] device macsec0 left promiscuous mode [ 871.586777][T20738] device syzkaller0 entered promiscuous mode [ 871.925664][T20740] device syzkaller0 entered promiscuous mode [ 872.272939][T20742] device syzkaller0 entered promiscuous mode [ 872.685636][T20764] ref_ctr_offset mismatch. inode: 0x4b3 offset: 0x0 ref_ctr_offset(old): 0x0 ref_ctr_offset(new): 0x1fe [ 873.335774][T20777] device veth1_macvtap left promiscuous mode [ 873.945228][T20787] device syzkaller0 entered promiscuous mode [ 874.206536][T20792] device syzkaller0 entered promiscuous mode [ 875.532263][T20839] device syzkaller0 entered promiscuous mode [ 876.298034][T20861] device wg2 left promiscuous mode [ 876.385170][T20862] device wg2 entered promiscuous mode [ 877.275917][T20885] device wg2 left promiscuous mode [ 877.414618][T20885] device wg2 entered promiscuous mode [ 877.481524][T20896] FAULT_INJECTION: forcing a failure. [ 877.481524][T20896] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 877.541878][T20896] CPU: 1 PID: 20896 Comm: syz.4.7078 Not tainted 5.15.185-syzkaller-00339-ge678c93d43cc #0 [ 877.552085][T20896] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 877.562180][T20896] Call Trace: [ 877.565490][T20896] [ 877.568439][T20896] __dump_stack+0x21/0x30 [ 877.572895][T20896] dump_stack_lvl+0xee/0x150 [ 877.577506][T20896] ? show_regs_print_info+0x20/0x20 [ 877.582735][T20896] ? migrate_enable+0x192/0x260 [ 877.587606][T20896] ? migrate_disable+0x180/0x180 [ 877.592575][T20896] dump_stack+0x15/0x20 [ 877.596753][T20896] should_fail+0x3c1/0x510 [ 877.601201][T20896] should_fail_usercopy+0x1a/0x20 [ 877.606247][T20896] _copy_from_user+0x20/0xd0 [ 877.610865][T20896] generic_map_update_batch+0x44f/0x740 [ 877.616441][T20896] ? generic_map_delete_batch+0x510/0x510 [ 877.622198][T20896] ? __fdget+0x1a1/0x230 [ 877.626479][T20896] ? generic_map_delete_batch+0x510/0x510 [ 877.632216][T20896] bpf_map_do_batch+0x463/0x5f0 [ 877.637087][T20896] __sys_bpf+0x5e3/0x730 [ 877.641349][T20896] ? bpf_link_show_fdinfo+0x310/0x310 [ 877.646744][T20896] ? debug_smp_processor_id+0x17/0x20 [ 877.652140][T20896] __x64_sys_bpf+0x7c/0x90 [ 877.656572][T20896] x64_sys_call+0x4b9/0x9a0 [ 877.661095][T20896] do_syscall_64+0x4c/0xa0 [ 877.665525][T20896] ? clear_bhb_loop+0x50/0xa0 [ 877.670224][T20896] ? clear_bhb_loop+0x50/0xa0 [ 877.674923][T20896] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 877.680841][T20896] RIP: 0033:0x7f8657222929 [ 877.685274][T20896] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 877.704897][T20896] RSP: 002b:00007f865588b038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 877.713333][T20896] RAX: ffffffffffffffda RBX: 00007f8657449fa0 RCX: 00007f8657222929 [ 877.721328][T20896] RDX: 0000000000000038 RSI: 0000200000002340 RDI: 000000000000001a [ 877.729314][T20896] RBP: 00007f865588b090 R08: 0000000000000000 R09: 0000000000000000 [ 877.737305][T20896] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 877.745295][T20896] R13: 0000000000000000 R14: 00007f8657449fa0 R15: 00007ffde2665478 [ 877.753308][T20896] [ 878.350170][T20894] device syzkaller0 entered promiscuous mode [ 878.589641][T20918] device wg2 left promiscuous mode [ 878.676704][T20923] device wg2 entered promiscuous mode [ 879.183159][T20931] device syzkaller0 entered promiscuous mode [ 879.802853][T20949] device syzkaller0 entered promiscuous mode [ 879.846968][T20953] device wg2 left promiscuous mode [ 879.866964][T20954] device wg2 entered promiscuous mode [ 880.722203][T20977] device macsec0 entered promiscuous mode [ 881.186150][T20987] device wg2 left promiscuous mode [ 881.401688][T20990] device wg2 entered promiscuous mode [ 882.085209][T21011] FAULT_INJECTION: forcing a failure. [ 882.085209][T21011] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 882.265468][T21011] CPU: 0 PID: 21011 Comm: syz.0.7118 Not tainted 5.15.185-syzkaller-00339-ge678c93d43cc #0 [ 882.275511][T21011] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 882.285597][T21011] Call Trace: [ 882.288901][T21011] [ 882.291854][T21011] __dump_stack+0x21/0x30 [ 882.296222][T21011] dump_stack_lvl+0xee/0x150 [ 882.300840][T21011] ? show_regs_print_info+0x20/0x20 [ 882.306076][T21011] dump_stack+0x15/0x20 [ 882.310276][T21011] should_fail+0x3c1/0x510 [ 882.314728][T21011] should_fail_usercopy+0x1a/0x20 [ 882.319783][T21011] _copy_from_user+0x20/0xd0 [ 882.324405][T21011] iovec_from_user+0x1bc/0x2f0 [ 882.329192][T21011] __import_iovec+0x71/0x400 [ 882.333802][T21011] ? kstrtol_from_user+0x260/0x260 [ 882.338943][T21011] import_iovec+0x7c/0xb0 [ 882.343299][T21011] ___sys_recvmsg+0x420/0x4f0 [ 882.348001][T21011] ? __sys_recvmsg+0x250/0x250 [ 882.352786][T21011] ? vfs_write+0xc17/0xf70 [ 882.357236][T21011] ? __fdget+0x1a1/0x230 [ 882.361511][T21011] __x64_sys_recvmsg+0x1df/0x2a0 [ 882.366481][T21011] ? ___sys_recvmsg+0x4f0/0x4f0 [ 882.371354][T21011] ? ksys_write+0x1eb/0x240 [ 882.375891][T21011] ? fpregs_assert_state_consistent+0xb1/0xe0 [ 882.382000][T21011] x64_sys_call+0x705/0x9a0 [ 882.386535][T21011] do_syscall_64+0x4c/0xa0 [ 882.390983][T21011] ? clear_bhb_loop+0x50/0xa0 [ 882.395694][T21011] ? clear_bhb_loop+0x50/0xa0 [ 882.400404][T21011] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 882.406328][T21011] RIP: 0033:0x7f0366fc8929 [ 882.407980][T21000] device syzkaller0 entered promiscuous mode [ 882.410764][T21011] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 882.410785][T21011] RSP: 002b:00007f0365631038 EFLAGS: 00000246 ORIG_RAX: 000000000000002f [ 882.410810][T21011] RAX: ffffffffffffffda RBX: 00007f03671effa0 RCX: 00007f0366fc8929 [ 882.410827][T21011] RDX: 0000000000000000 RSI: 0000200000000b00 RDI: 0000000000000003 [ 882.410841][T21011] RBP: 00007f0365631090 R08: 0000000000000000 R09: 0000000000000000 [ 882.410854][T21011] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 882.410867][T21011] R13: 0000000000000000 R14: 00007f03671effa0 R15: 00007fff0491e738 [ 882.410897][T21011] [ 883.442756][T21039] syz.4.7128[21039] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 883.442836][T21039] syz.4.7128[21039] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 883.459043][T21040] FAULT_INJECTION: forcing a failure. [ 883.459043][T21040] name failslab, interval 1, probability 0, space 0, times 0 [ 883.483110][T21040] CPU: 1 PID: 21040 Comm: syz.0.7129 Not tainted 5.15.185-syzkaller-00339-ge678c93d43cc #0 [ 883.493114][T21040] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 883.503187][T21040] Call Trace: [ 883.506482][T21040] [ 883.509426][T21040] __dump_stack+0x21/0x30 [ 883.513775][T21040] dump_stack_lvl+0xee/0x150 [ 883.518379][T21040] ? show_regs_print_info+0x20/0x20 [ 883.523599][T21040] dump_stack+0x15/0x20 [ 883.527768][T21040] should_fail+0x3c1/0x510 [ 883.532199][T21040] ? alloc_skb_with_frags+0xa8/0x620 [ 883.537510][T21040] __should_failslab+0xa4/0xe0 [ 883.542296][T21040] should_failslab+0x9/0x20 [ 883.546818][T21040] slab_pre_alloc_hook+0x3b/0xe0 [ 883.551792][T21040] ? alloc_skb_with_frags+0xa8/0x620 [ 883.557097][T21040] ? alloc_skb_with_frags+0xa8/0x620 [ 883.562401][T21040] __kmalloc_track_caller+0x6c/0x2c0 [ 883.567704][T21040] ? alloc_skb_with_frags+0xa8/0x620 [ 883.573008][T21040] ? alloc_skb_with_frags+0xa8/0x620 [ 883.578401][T21040] __alloc_skb+0x21a/0x740 [ 883.582835][T21040] alloc_skb_with_frags+0xa8/0x620 [ 883.587972][T21040] ? fib6_lookup+0x2a0/0x2a0 [ 883.592588][T21040] sock_alloc_send_pskb+0x853/0x980 [ 883.597815][T21040] ? sock_kzfree_s+0x60/0x60 [ 883.602431][T21040] ? __local_bh_enable_ip+0x58/0x80 [ 883.607657][T21040] ? local_bh_enable+0x1f/0x30 [ 883.612442][T21040] ? ip6_dst_lookup_tail+0xd01/0x1370 [ 883.617843][T21040] sock_alloc_send_skb+0x32/0x40 [ 883.622804][T21040] __ip6_append_data+0x252e/0x37e0 [ 883.627955][T21040] ? icmpv6_route_lookup+0x457/0x4e0 [ 883.633263][T21040] ? ip6_setup_cork+0x1290/0x1290 [ 883.638307][T21040] ? __kasan_check_read+0x11/0x20 [ 883.643354][T21040] ? ip6_setup_cork+0xd10/0x1290 [ 883.648319][T21040] ip6_append_data+0x1d0/0x330 [ 883.653097][T21040] ? icmpv6_route_lookup+0x4e0/0x4e0 [ 883.658403][T21040] ? icmpv6_route_lookup+0x4e0/0x4e0 [ 883.663710][T21040] icmp6_send+0xeb8/0x14c0 [ 883.668158][T21040] ? icmpv6_push_pending_frames+0x440/0x440 [ 883.674093][T21040] ? numa_migrate_prep+0xd0/0xd0 [ 883.679065][T21040] ? __skb_flow_dissect+0x520c/0x5930 [ 883.684457][T21040] icmpv6_param_prob+0x2f/0x40 [ 883.689248][T21040] ip6_parse_tlv+0x1a4c/0x1ba0 [ 883.694071][T21040] ipv6_parse_hopopts+0x2a3/0x580 [ 883.699118][T21040] ip6_rcv_core+0xca7/0x1390 [ 883.703739][T21040] ipv6_rcv+0xca/0x210 [ 883.707827][T21040] ? irqentry_exit+0x37/0x40 [ 883.712447][T21040] ? exc_page_fault+0x5e/0xb0 [ 883.717149][T21040] ? ip6_rcv_finish+0x360/0x360 [ 883.722041][T21040] ? asm_exc_page_fault+0x27/0x30 [ 883.727087][T21040] ? _copy_from_iter+0x181/0x1050 [ 883.732133][T21040] ? ip6_rcv_finish+0x360/0x360 [ 883.737090][T21040] __netif_receive_skb+0xc8/0x280 [ 883.742133][T21040] ? _copy_from_iter+0x4ae/0x1050 [ 883.747181][T21040] ? ktime_get_with_offset+0x1b0/0x200 [ 883.752683][T21040] netif_receive_skb+0x98/0x3d0 [ 883.757551][T21040] ? netif_receive_skb_core+0x100/0x100 [ 883.763112][T21040] ? __kernel_text_address+0xa0/0x100 [ 883.768522][T21040] ? virtio_net_hdr_to_skb+0x9df/0x11c0 [ 883.774087][T21040] tun_rx_batched+0x5e8/0x710 [ 883.778782][T21040] ? local_bh_enable+0x30/0x30 [ 883.783592][T21040] tun_get_user+0x279c/0x33c0 [ 883.788313][T21040] ? _raw_spin_lock_irqsave+0x30/0x110 [ 883.793803][T21040] ? x64_sys_call+0x219/0x9a0 [ 883.798509][T21040] ? tun_do_read+0x1c40/0x1c40 [ 883.803291][T21040] ? kstrtouint_from_user+0x1a0/0x200 [ 883.808684][T21040] ? kstrtol_from_user+0x260/0x260 [ 883.813814][T21040] ? putname+0x111/0x160 [ 883.818076][T21040] ? avc_policy_seqno+0x1b/0x70 [ 883.822953][T21040] ? selinux_file_permission+0x2aa/0x510 [ 883.828604][T21040] tun_chr_write_iter+0x1eb/0x2e0 [ 883.833653][T21040] vfs_write+0x802/0xf70 [ 883.837919][T21040] ? file_end_write+0x1b0/0x1b0 [ 883.842788][T21040] ? __fget_files+0x2c4/0x320 [ 883.847486][T21040] ? __fdget_pos+0x1f7/0x380 [ 883.852097][T21040] ? ksys_write+0x71/0x240 [ 883.856530][T21040] ksys_write+0x140/0x240 [ 883.860881][T21040] ? __ia32_sys_read+0x90/0x90 [ 883.865667][T21040] ? debug_smp_processor_id+0x17/0x20 [ 883.871058][T21040] __x64_sys_write+0x7b/0x90 [ 883.875662][T21040] x64_sys_call+0x8ef/0x9a0 [ 883.880182][T21040] do_syscall_64+0x4c/0xa0 [ 883.884613][T21040] ? clear_bhb_loop+0x50/0xa0 [ 883.889303][T21040] ? clear_bhb_loop+0x50/0xa0 [ 883.893996][T21040] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 883.899906][T21040] RIP: 0033:0x7f0366fc8929 [ 883.904426][T21040] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 883.924054][T21040] RSP: 002b:00007f0365631038 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 883.932486][T21040] RAX: ffffffffffffffda RBX: 00007f03671effa0 RCX: 00007f0366fc8929 [ 883.940485][T21040] RDX: 000000000000fdef RSI: 0000200000000000 RDI: 00000000000000c8 [ 883.948479][T21040] RBP: 00007f0365631090 R08: 0000000000000000 R09: 0000000000000000 [ 883.956580][T21040] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 883.964567][T21040] R13: 0000000000000000 R14: 00007f03671effa0 R15: 00007fff0491e738 [ 883.972658][T21040] [ 884.729044][T21069] ªªªªªª: renamed from vlan0 [ 885.240987][T21079] device wg2 left promiscuous mode [ 886.073408][T21095] device syzkaller0 entered promiscuous mode [ 886.319780][T21101] device syzkaller0 entered promiscuous mode [ 887.796356][T21144] device syzkaller0 entered promiscuous mode [ 887.936590][T21141] device syzkaller0 entered promiscuous mode [ 891.119741][T21183] device syzkaller0 entered promiscuous mode [ 891.410877][T21189] device syzkaller0 entered promiscuous mode [ 892.618557][T21218] FAULT_INJECTION: forcing a failure. [ 892.618557][T21218] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 892.811588][T21218] CPU: 0 PID: 21218 Comm: syz.4.7185 Not tainted 5.15.185-syzkaller-00339-ge678c93d43cc #0 [ 892.821729][T21218] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 892.831808][T21218] Call Trace: [ 892.835109][T21218] [ 892.838059][T21218] __dump_stack+0x21/0x30 [ 892.842445][T21218] dump_stack_lvl+0xee/0x150 [ 892.847058][T21218] ? show_regs_print_info+0x20/0x20 [ 892.852304][T21218] dump_stack+0x15/0x20 [ 892.856486][T21218] should_fail+0x3c1/0x510 [ 892.860934][T21218] should_fail_usercopy+0x1a/0x20 [ 892.865991][T21218] _copy_to_user+0x20/0x90 [ 892.870439][T21218] simple_read_from_buffer+0xe9/0x160 [ 892.875840][T21218] proc_fail_nth_read+0x19a/0x210 [ 892.880976][T21218] ? proc_fault_inject_write+0x2f0/0x2f0 [ 892.886635][T21218] ? security_file_permission+0x83/0xa0 [ 892.892215][T21218] ? proc_fault_inject_write+0x2f0/0x2f0 [ 892.897876][T21218] vfs_read+0x282/0xbe0 [ 892.902054][T21218] ? kernel_read+0x1f0/0x1f0 [ 892.906676][T21218] ? __kasan_check_write+0x14/0x20 [ 892.911811][T21218] ? mutex_lock+0x95/0x1a0 [ 892.916252][T21218] ? wait_for_completion_killable_timeout+0x10/0x10 [ 892.922867][T21218] ? __fget_files+0x2c4/0x320 [ 892.927576][T21218] ? __fdget_pos+0x2d2/0x380 [ 892.932185][T21218] ? ksys_read+0x71/0x240 [ 892.936531][T21218] ksys_read+0x140/0x240 [ 892.940806][T21218] ? fd_install+0x169/0x2a0 [ 892.945330][T21218] ? vfs_write+0xf70/0xf70 [ 892.949752][T21218] ? debug_smp_processor_id+0x17/0x20 [ 892.955131][T21218] __x64_sys_read+0x7b/0x90 [ 892.959634][T21218] x64_sys_call+0x96d/0x9a0 [ 892.964165][T21218] do_syscall_64+0x4c/0xa0 [ 892.968704][T21218] ? clear_bhb_loop+0x50/0xa0 [ 892.973398][T21218] ? clear_bhb_loop+0x50/0xa0 [ 892.978088][T21218] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 892.983984][T21218] RIP: 0033:0x7f865722133c [ 892.988426][T21218] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 93 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 ef 93 02 00 48 [ 893.008036][T21218] RSP: 002b:00007f865588b030 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 893.016456][T21218] RAX: ffffffffffffffda RBX: 00007f8657449fa0 RCX: 00007f865722133c [ 893.024429][T21218] RDX: 000000000000000f RSI: 00007f865588b0a0 RDI: 0000000000000006 [ 893.032411][T21218] RBP: 00007f865588b090 R08: 0000000000000000 R09: 0000000000000000 [ 893.040383][T21218] R10: 0000200000000240 R11: 0000000000000246 R12: 0000000000000002 [ 893.048353][T21218] R13: 0000000000000000 R14: 00007f8657449fa0 R15: 00007ffde2665478 [ 893.056355][T21218] [ 893.415541][T21232] device syzkaller0 entered promiscuous mode [ 893.621514][T21236] device syzkaller0 entered promiscuous mode [ 893.830048][T21255] device syzkaller0 entered promiscuous mode [ 894.485077][T21260] device syzkaller0 entered promiscuous mode [ 895.010973][T21280] device syzkaller0 entered promiscuous mode [ 895.474043][T21284] device syzkaller0 entered promiscuous mode [ 896.638731][T21306] device syzkaller0 entered promiscuous mode [ 896.665817][T21325] device macsec0 left promiscuous mode [ 896.883581][T21316] device syzkaller0 entered promiscuous mode [ 896.910935][T21327] device veth1_macvtap entered promiscuous mode [ 896.937681][T21327] device macsec0 entered promiscuous mode [ 897.053832][T17167] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 897.509026][T21338] device syzkaller0 entered promiscuous mode [ 898.081911][T21366] device veth1_macvtap entered promiscuous mode [ 898.088254][T21366] device macsec0 entered promiscuous mode [ 898.222694][T17167] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 898.868155][T21374] device syzkaller0 entered promiscuous mode [ 899.243342][T21379] device syzkaller0 entered promiscuous mode [ 900.766044][T21398] device syzkaller0 entered promiscuous mode [ 900.948408][T21410] device veth1_macvtap left promiscuous mode [ 900.992458][T21410] device veth1_macvtap entered promiscuous mode [ 901.032071][T21410] device macsec0 entered promiscuous mode [ 901.892701][T21427] device syzkaller0 entered promiscuous mode [ 902.602252][T21449] device syzkaller0 entered promiscuous mode [ 902.845403][T21466] device sit0 left promiscuous mode [ 903.043196][T21471] device sit0 entered promiscuous mode [ 903.184351][T21479] tap0: tun_chr_ioctl cmd 2147767506 [ 903.263087][T21475] device wg2 entered promiscuous mode [ 904.328284][T21500] device syzkaller0 entered promiscuous mode [ 904.629587][T21498] device syzkaller0 entered promiscuous mode [ 904.789156][T21505] device syzkaller0 entered promiscuous mode [ 904.820358][T21508] device sit0 left promiscuous mode [ 904.969270][T21509] device sit0 entered promiscuous mode [ 905.305246][T21513] device sit0 left promiscuous mode [ 905.404059][T21521] device sit0 left promiscuous mode [ 906.180519][T21534] device syzkaller0 entered promiscuous mode [ 906.287764][T21548] device syzkaller0 entered promiscuous mode [ 906.688857][T21553] device syzkaller0 entered promiscuous mode [ 907.303083][T21584] device sit0 left promiscuous mode [ 907.954144][T21582] device syzkaller0 entered promiscuous mode [ 908.090305][T21600] device syzkaller0 entered promiscuous mode [ 908.559618][T21606] device syzkaller0 entered promiscuous mode [ 908.753289][T21618] device syzkaller0 entered promiscuous mode [ 908.979146][T21632] FAULT_INJECTION: forcing a failure. [ 908.979146][T21632] name failslab, interval 1, probability 0, space 0, times 0 [ 909.061574][T21632] CPU: 1 PID: 21632 Comm: syz.0.7327 Not tainted 5.15.185-syzkaller-00339-ge678c93d43cc #0 [ 909.071619][T21632] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 909.081702][T21632] Call Trace: [ 909.085004][T21632] [ 909.087957][T21632] __dump_stack+0x21/0x30 [ 909.092462][T21632] dump_stack_lvl+0xee/0x150 [ 909.097080][T21632] ? show_regs_print_info+0x20/0x20 [ 909.102306][T21632] dump_stack+0x15/0x20 [ 909.106485][T21632] should_fail+0x3c1/0x510 [ 909.110929][T21632] __should_failslab+0xa4/0xe0 [ 909.115727][T21632] should_failslab+0x9/0x20 [ 909.120264][T21632] slab_pre_alloc_hook+0x3b/0xe0 [ 909.125231][T21632] ? security_inode_alloc+0x33/0x110 [ 909.130548][T21632] kmem_cache_alloc+0x44/0x260 [ 909.135357][T21632] security_inode_alloc+0x33/0x110 [ 909.140505][T21632] inode_init_always+0x711/0x990 [ 909.145479][T21632] new_inode_pseudo+0x91/0x210 [ 909.150273][T21632] __sock_create+0x12c/0x7a0 [ 909.154914][T21632] __sys_socketpair+0x218/0x590 [ 909.159803][T21632] __x64_sys_socketpair+0x9b/0xb0 [ 909.164859][T21632] x64_sys_call+0x36/0x9a0 [ 909.169305][T21632] do_syscall_64+0x4c/0xa0 [ 909.173749][T21632] ? clear_bhb_loop+0x50/0xa0 [ 909.178448][T21632] ? clear_bhb_loop+0x50/0xa0 [ 909.183160][T21632] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 909.189082][T21632] RIP: 0033:0x7f0366fc8929 [ 909.193524][T21632] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 909.213161][T21632] RSP: 002b:00007f0365631038 EFLAGS: 00000246 ORIG_RAX: 0000000000000035 [ 909.221609][T21632] RAX: ffffffffffffffda RBX: 00007f03671effa0 RCX: 00007f0366fc8929 [ 909.229609][T21632] RDX: 0000000000000001 RSI: 0000000000000002 RDI: 0000000000000002 [ 909.237608][T21632] RBP: 00007f0365631090 R08: 0000000000000000 R09: 0000000000000000 [ 909.245612][T21632] R10: 0000200000002c40 R11: 0000000000000246 R12: 0000000000000002 [ 909.253614][T21632] R13: 0000000000000001 R14: 00007f03671effa0 R15: 00007fff0491e738 [ 909.261632][T21632] [ 909.286546][T21632] socket: no more sockets [ 909.347447][T21637] ÿÿÿÿÿÿ: renamed from vlan1 [ 909.758810][T21648] device syzkaller0 entered promiscuous mode [ 909.845497][T21654] device pim6reg1 entered promiscuous mode [ 910.650032][T21694] FAULT_INJECTION: forcing a failure. [ 910.650032][T21694] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 910.742020][T21694] CPU: 1 PID: 21694 Comm: syz.0.7347 Not tainted 5.15.185-syzkaller-00339-ge678c93d43cc #0 [ 910.752062][T21694] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 910.762137][T21694] Call Trace: [ 910.765435][T21694] [ 910.768400][T21694] __dump_stack+0x21/0x30 [ 910.772756][T21694] dump_stack_lvl+0xee/0x150 [ 910.777371][T21694] ? show_regs_print_info+0x20/0x20 [ 910.782621][T21694] ? avc_has_perm_noaudit+0x2f4/0x460 [ 910.788018][T21694] dump_stack+0x15/0x20 [ 910.792193][T21694] should_fail+0x3c1/0x510 [ 910.796634][T21694] should_fail_usercopy+0x1a/0x20 [ 910.801683][T21694] _copy_to_iter+0x21a/0x1070 [ 910.806375][T21694] ? memcpy+0x56/0x70 [ 910.810386][T21694] ? avc_has_perm_noaudit+0x2f4/0x460 [ 910.815792][T21694] ? iov_iter_init+0x180/0x180 [ 910.820582][T21694] ? __kasan_check_write+0x14/0x20 [ 910.825719][T21694] ? _raw_spin_lock_bh+0x8e/0xe0 [ 910.830689][T21694] ? check_stack_object+0x81/0x140 [ 910.835824][T21694] ? __check_object_size+0x2f4/0x3c0 [ 910.841136][T21694] simple_copy_to_iter+0x50/0x70 [ 910.846099][T21694] __skb_datagram_iter+0xe0/0x710 [ 910.851146][T21694] ? tsk_importance+0x150/0x150 [ 910.856015][T21694] ? skb_copy_datagram_iter+0x150/0x150 [ 910.861589][T21694] skb_copy_datagram_iter+0x40/0x150 [ 910.866904][T21694] tipc_recvmsg+0x79b/0x13a0 [ 910.871532][T21694] ? tipc_send_packet+0xa0/0xa0 [ 910.876410][T21694] ? bad_area_nosemaphore+0x2d/0x40 [ 910.881643][T21694] ? security_socket_recvmsg+0x87/0xb0 [ 910.887132][T21694] ? tipc_send_packet+0xa0/0xa0 [ 910.892008][T21694] ____sys_recvmsg+0x291/0x580 [ 910.896805][T21694] ? __sys_recvmsg_sock+0x50/0x50 [ 910.901938][T21694] ? memset+0x35/0x40 [ 910.905956][T21694] ? import_iovec+0x7c/0xb0 [ 910.910488][T21694] ___sys_recvmsg+0x1af/0x4f0 [ 910.915197][T21694] ? __sys_recvmsg+0x250/0x250 [ 910.919992][T21694] ? __irq_work_queue_local+0x115/0x190 [ 910.925578][T21694] ? __fdget+0x1a1/0x230 [ 910.929856][T21694] __x64_sys_recvmsg+0x1df/0x2a0 [ 910.934818][T21694] ? ___sys_recvmsg+0x4f0/0x4f0 [ 910.939671][T21694] ? ksys_write+0x1eb/0x240 [ 910.944184][T21694] ? fpregs_assert_state_consistent+0xb1/0xe0 [ 910.950260][T21694] x64_sys_call+0x705/0x9a0 [ 910.954784][T21694] do_syscall_64+0x4c/0xa0 [ 910.959203][T21694] ? clear_bhb_loop+0x50/0xa0 [ 910.963877][T21694] ? clear_bhb_loop+0x50/0xa0 [ 910.968557][T21694] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 910.974458][T21694] RIP: 0033:0x7f0366fc8929 [ 910.978872][T21694] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 910.998483][T21694] RSP: 002b:00007f0365631038 EFLAGS: 00000246 ORIG_RAX: 000000000000002f [ 911.006899][T21694] RAX: ffffffffffffffda RBX: 00007f03671effa0 RCX: 00007f0366fc8929 [ 911.014881][T21694] RDX: 0000000000000000 RSI: 0000200000000b00 RDI: 0000000000000003 [ 911.022860][T21694] RBP: 00007f0365631090 R08: 0000000000000000 R09: 0000000000000000 [ 911.030834][T21694] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 911.038809][T21694] R13: 0000000000000000 R14: 00007f03671effa0 R15: 00007fff0491e738 [ 911.046803][T21694] [ 911.692320][T21699] device syzkaller0 entered promiscuous mode [ 912.293513][T21728] device syzkaller0 entered promiscuous mode [ 912.336563][T21731] device veth1_macvtap left promiscuous mode [ 912.356286][T21731] device macsec0 left promiscuous mode [ 912.530487][T21737] tap0: tun_chr_ioctl cmd 1074025677 [ 912.536134][T21737] tap0: linktype set to 519 [ 913.215287][T21778] ref_ctr_offset mismatch. inode: 0x5d4 offset: 0x0 ref_ctr_offset(old): 0x0 ref_ctr_offset(new): 0x1fe [ 915.098444][T21786] device syzkaller0 entered promiscuous mode [ 915.113996][T21820] device sit0 left promiscuous mode [ 915.319080][T21809] device syzkaller0 entered promiscuous mode [ 915.794545][T21844] device wg2 left promiscuous mode [ 915.841901][T21844] device wg2 entered promiscuous mode [ 916.275050][T21855] FAULT_INJECTION: forcing a failure. [ 916.275050][T21855] name failslab, interval 1, probability 0, space 0, times 0 [ 916.321642][T21855] CPU: 1 PID: 21855 Comm: syz.1.7404 Not tainted 5.15.185-syzkaller-00339-ge678c93d43cc #0 [ 916.331765][T21855] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 916.341847][T21855] Call Trace: [ 916.345160][T21855] [ 916.348126][T21855] __dump_stack+0x21/0x30 [ 916.352479][T21855] dump_stack_lvl+0xee/0x150 [ 916.357092][T21855] ? show_regs_print_info+0x20/0x20 [ 916.362315][T21855] ? debug_smp_processor_id+0x17/0x20 [ 916.367710][T21855] ? get_random_u32+0x2ff/0x590 [ 916.372588][T21855] dump_stack+0x15/0x20 [ 916.376763][T21855] should_fail+0x3c1/0x510 [ 916.381204][T21855] __should_failslab+0xa4/0xe0 [ 916.385998][T21855] should_failslab+0x9/0x20 [ 916.390523][T21855] slab_pre_alloc_hook+0x3b/0xe0 [ 916.395497][T21855] __kmalloc+0x6d/0x2c0 [ 916.399685][T21855] ? bpf_map_area_alloc+0x49/0xe0 [ 916.404738][T21855] bpf_map_area_alloc+0x49/0xe0 [ 916.409620][T21855] htab_map_alloc+0xb29/0x14f0 [ 916.414428][T21855] map_create+0x455/0x21b0 [ 916.418880][T21855] __sys_bpf+0x2cf/0x730 [ 916.423145][T21855] ? bpf_link_show_fdinfo+0x310/0x310 [ 916.428547][T21855] ? debug_smp_processor_id+0x17/0x20 [ 916.433946][T21855] __x64_sys_bpf+0x7c/0x90 [ 916.438395][T21855] x64_sys_call+0x4b9/0x9a0 [ 916.442943][T21855] do_syscall_64+0x4c/0xa0 [ 916.447385][T21855] ? clear_bhb_loop+0x50/0xa0 [ 916.452087][T21855] ? clear_bhb_loop+0x50/0xa0 [ 916.456796][T21855] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 916.462728][T21855] RIP: 0033:0x7f81ec5d8929 [ 916.467166][T21855] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 916.486801][T21855] RSP: 002b:00007f81eac41038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 916.495254][T21855] RAX: ffffffffffffffda RBX: 00007f81ec7fffa0 RCX: 00007f81ec5d8929 [ 916.503252][T21855] RDX: 0000000000000048 RSI: 0000200000000580 RDI: 0000000000000000 [ 916.511244][T21855] RBP: 00007f81eac41090 R08: 0000000000000000 R09: 0000000000000000 [ 916.519240][T21855] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 916.527236][T21855] R13: 0000000000000000 R14: 00007f81ec7fffa0 R15: 00007fffe8aa9728 [ 916.535259][T21855] [ 916.564583][T21864] ref_ctr_offset mismatch. inode: 0x53a offset: 0x0 ref_ctr_offset(old): 0x0 ref_ctr_offset(new): 0x1fe [ 916.745542][T21858] device syzkaller0 entered promiscuous mode [ 916.938032][T21861] device syzkaller0 entered promiscuous mode [ 916.968058][T21860] GPL: port 1(erspan0) entered blocking state [ 917.022880][T21860] GPL: port 1(erspan0) entered disabled state [ 917.103495][T21860] device erspan0 entered promiscuous mode [ 917.134634][T21860] GPL: port 1(erspan0) entered blocking state [ 917.141411][T21860] GPL: port 1(erspan0) entered forwarding state [ 917.346182][T21874] device syzkaller0 entered promiscuous mode [ 917.495982][T21887] device wg2 left promiscuous mode [ 917.552374][T21887] device wg2 entered promiscuous mode [ 917.568723][T21887] device veth1_macvtap left promiscuous mode [ 917.575059][T21887] device macsec0 left promiscuous mode [ 917.603289][T21887] device veth1_macvtap entered promiscuous mode [ 917.611259][T21887] device macsec0 entered promiscuous mode [ 917.776487][T21880] device syzkaller0 entered promiscuous mode [ 917.841768][T21896] FAULT_INJECTION: forcing a failure. [ 917.841768][T21896] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 917.865274][T21894] €Â0: renamed from pim6reg1 [ 917.873258][T21896] CPU: 0 PID: 21896 Comm: syz.2.7419 Not tainted 5.15.185-syzkaller-00339-ge678c93d43cc #0 [ 917.883282][T21896] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 917.893368][T21896] Call Trace: [ 917.896669][T21896] [ 917.899624][T21896] __dump_stack+0x21/0x30 [ 917.903979][T21896] dump_stack_lvl+0xee/0x150 [ 917.908593][T21896] ? show_regs_print_info+0x20/0x20 [ 917.913830][T21896] dump_stack+0x15/0x20 [ 917.918015][T21896] should_fail+0x3c1/0x510 [ 917.922460][T21896] should_fail_usercopy+0x1a/0x20 [ 917.927513][T21896] strncpy_from_user+0x24/0x2e0 [ 917.932396][T21896] bpf_prog_load+0x1b8/0x1550 [ 917.937133][T21896] ? __kasan_check_write+0x14/0x20 [ 917.942249][T21896] ? proc_fail_nth_write+0x17a/0x1f0 [ 917.947546][T21896] ? map_freeze+0x360/0x360 [ 917.952059][T21896] ? selinux_bpf+0xc7/0xf0 [ 917.956484][T21896] ? security_bpf+0x82/0xa0 [ 917.960990][T21896] __sys_bpf+0x4c3/0x730 [ 917.965235][T21896] ? bpf_link_show_fdinfo+0x310/0x310 [ 917.970615][T21896] ? debug_smp_processor_id+0x17/0x20 [ 917.975992][T21896] __x64_sys_bpf+0x7c/0x90 [ 917.980411][T21896] x64_sys_call+0x4b9/0x9a0 [ 917.984918][T21896] do_syscall_64+0x4c/0xa0 [ 917.989442][T21896] ? clear_bhb_loop+0x50/0xa0 [ 917.994132][T21896] ? clear_bhb_loop+0x50/0xa0 [ 917.998829][T21896] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 918.004740][T21896] RIP: 0033:0x7fca94ad9929 [ 918.009161][T21896] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 918.028771][T21896] RSP: 002b:00007fca93142038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 918.037187][T21896] RAX: ffffffffffffffda RBX: 00007fca94d00fa0 RCX: 00007fca94ad9929 [ 918.045163][T21896] RDX: 0000000000000094 RSI: 00002000000000c0 RDI: 0000000000000005 [ 918.053134][T21896] RBP: 00007fca93142090 R08: 0000000000000000 R09: 0000000000000000 [ 918.061112][T21896] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 918.069085][T21896] R13: 0000000000000000 R14: 00007fca94d00fa0 R15: 00007fffdd5344d8 [ 918.077069][T21896] [ 918.437410][T21915] ref_ctr_offset mismatch. inode: 0x645 offset: 0x0 ref_ctr_offset(old): 0x0 ref_ctr_offset(new): 0x1fe [ 918.852379][T21922] device syzkaller0 entered promiscuous mode [ 919.108043][T21932] device syzkaller0 entered promiscuous mode [ 920.013193][T21945] device syzkaller0 entered promiscuous mode [ 920.625129][T21991] device sit0 entered promiscuous mode [ 921.153914][T21981] device syzkaller0 entered promiscuous mode [ 921.202836][ T30] audit: type=1400 audit(1750735816.349:156): avc: denied { create } for pid=21999 comm="syz.3.7454" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=isdn_socket permissive=1 [ 922.276635][T22017] device syzkaller0 entered promiscuous mode [ 923.688353][T22060] device syzkaller0 entered promiscuous mode [ 924.060680][T22080] device wg2 left promiscuous mode [ 924.091837][T22080] device veth1_macvtap entered promiscuous mode [ 924.098185][T22080] device macsec0 entered promiscuous mode [ 924.112629][ T8903] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 925.084840][T22120] device syzkaller0 entered promiscuous mode [ 926.616969][T22165] FAULT_INJECTION: forcing a failure. [ 926.616969][T22165] name failslab, interval 1, probability 0, space 0, times 0 [ 926.721631][T22165] CPU: 0 PID: 22165 Comm: syz.1.7510 Not tainted 5.15.185-syzkaller-00339-ge678c93d43cc #0 [ 926.731671][T22165] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 926.741834][T22165] Call Trace: [ 926.745134][T22165] [ 926.748079][T22165] __dump_stack+0x21/0x30 [ 926.752413][T22165] dump_stack_lvl+0xee/0x150 [ 926.757003][T22165] ? show_regs_print_info+0x20/0x20 [ 926.762206][T22165] dump_stack+0x15/0x20 [ 926.766362][T22165] should_fail+0x3c1/0x510 [ 926.770780][T22165] __should_failslab+0xa4/0xe0 [ 926.775548][T22165] should_failslab+0x9/0x20 [ 926.780049][T22165] slab_pre_alloc_hook+0x3b/0xe0 [ 926.784989][T22165] kmem_cache_alloc_trace+0x48/0x270 [ 926.790273][T22165] ? __get_vm_area_node+0x11d/0x350 [ 926.795472][T22165] __get_vm_area_node+0x11d/0x350 [ 926.800501][T22165] __vmalloc_node_range+0xe8/0x840 [ 926.805606][T22165] ? dev_map_alloc+0x24c/0x560 [ 926.810378][T22165] bpf_map_area_alloc+0xd5/0xe0 [ 926.815232][T22165] ? dev_map_alloc+0x24c/0x560 [ 926.819995][T22165] dev_map_alloc+0x24c/0x560 [ 926.824598][T22165] map_create+0x455/0x21b0 [ 926.829021][T22165] __sys_bpf+0x2cf/0x730 [ 926.833275][T22165] ? bpf_link_show_fdinfo+0x310/0x310 [ 926.838651][T22165] ? asm_sysvec_apic_timer_interrupt+0x1b/0x20 [ 926.844809][T22165] __x64_sys_bpf+0x7c/0x90 [ 926.849228][T22165] x64_sys_call+0x4b9/0x9a0 [ 926.853732][T22165] do_syscall_64+0x4c/0xa0 [ 926.858152][T22165] ? clear_bhb_loop+0x50/0xa0 [ 926.862831][T22165] ? clear_bhb_loop+0x50/0xa0 [ 926.867515][T22165] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 926.873410][T22165] RIP: 0033:0x7f81ec5d8929 [ 926.877855][T22165] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 926.897464][T22165] RSP: 002b:00007f81eac41038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 926.905888][T22165] RAX: ffffffffffffffda RBX: 00007f81ec7fffa0 RCX: 00007f81ec5d8929 [ 926.913861][T22165] RDX: 0000000000000050 RSI: 0000200000000bc0 RDI: 0000000000000000 [ 926.921834][T22165] RBP: 00007f81eac41090 R08: 0000000000000000 R09: 0000000000000000 [ 926.929809][T22165] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 926.937790][T22165] R13: 0000000000000000 R14: 00007f81ec7fffa0 R15: 00007fffe8aa9728 [ 926.945776][T22165] [ 926.998904][T22157] device syzkaller0 entered promiscuous mode